DO ANTIFA AND BLACK LIVES MATTER WORK WITH THE DEMOCRATS?
WHERE IS THE GOP?

DO NOT CONSIDER GOVERNMENT ACCESS TO ENCRYPTED PERSONAL DATA UNTIL HILLARY CLINTON AND OTHERS GO TO JAIL

huawei-5gAfter Obama-gate and the political compromise of our premier intelligence and law enforcement agencies, the GOP has the nerve to request that technology companies compromise the personal, medical, and financial safety of every American citizen…

The Lawful Access to Encrypted Data Act (S. 4051) is a cruel GOP joke on an already beleaguered public.

First, because any backdoor or access to encryption keys can be compromised by hackers using so-called undiscovered “zero-day” coding flaws. And the Russians, Chinese, Iranians, and North Koreans have some of the best world-class hackers.

Secord, because we need to fear those employees and contractors with the “keys to the kingdom,” as demonstrated by the exploits of Edward Snowden, a CIA employee and NSA subcontractor who copied and leaked highly classified information from the National Security Agency. Considering that the Communist Chinese have the entire government employee database, including the information contained in security clearance files, they can select systemically important people to compromise.

Third, technology companies, especially those linked to hostile foreign governments, are known to provide backdoors in their equipment linked to foreign servers. Consider communications equipment provider Huawei which is known to be connected to the Communist Chinese government and attempted to compromise our national security as well as personal security on the internet.

Four, we know most of the significant technology companies employ former agents of intelligence and law enforcement agencies whose loyalty is to their agency friends and not necessarily to the U.S. Constitution. the rule of law. or their employers.

Five, we know the federal courts are corrupt, and judge-shopping is a widely employed practice. And as we have seen, even the FISA Court, charged with top-level intelligence and law enforcement matters, was both negligent and lazy in issuing warrants. Even years after the Court was compromised, there has yet to be a single evidentiary hearing or sanction imposed on those who lied to the Court and submitted false evidence.

You might think that the GOP was working for the progressive socialist Democrats…

Graham, Cotton, Blackburn Introduce Balanced Solution to Bolster National Security, End Use of Warrant-Proof Encryption that Shields Criminal Activity

Senate Judiciary Committee Chairman Lindsey Graham (R-South Carolina) and U.S. Senators Tom Cotton (R-Arkansas) and Marsha Blackburn (R-Tennessee) today introduced the Lawful Access to Encrypted Data Act, a bill to bolster national security interests and better protect communities across the country by ending the use of “warrant-proof” encrypted technology by terrorists and other bad actors to conceal illicit behavior.

“Terrorists and criminals routinely use technology, whether smartphones, apps, or other means, to coordinate and communicate their daily activities. In recent history, we have experienced numerous terrorism cases and serious criminal activity where vital information could not be accessed, even after a court order was issued. Unfortunately, tech companies have refused to honor these court orders and assist law enforcement in their investigations.”

[OCS: Technically accurate, some of the highest elected officials in the U.S. Government also used encrypted technology and private servers to hide their nefarious and evil actions. It is unlikely that any court would issue warrants against these evildoers unless their name was Trump or associated with Trump.]

My position is clear: After law enforcement obtains the necessary court authorizations, they should be able to retrieve information to assist in their investigations. 

[OCS: Unfortunately, we have seen Courts that rubber-stamp such warrant requests and take “verified” documents as gospel.]

Our legislation respects and protects the privacy rights of law-abiding Americans. It also puts the terrorists and criminals on notice that they will no longer be able to hide behind technology to cover their tracks,” said Graham.

[OCS: Lindsey Graham is a liar when he full-well-knows that there is a significant difference between the legal theory and the practice of law.]

“Tech companies’ increasing reliance on encryption has turned their platforms into a new, lawless playground of criminal activity. Criminals from child predators to terrorists are taking full advantage. This bill will ensure law enforcement can access encrypted material with a warrant based on probable cause and help put an end to the Wild West of crime on the Internet,” said Cotton.

[Tom Cotton is a liar when he knows that the government skipped over the “probable cause” provisions when Obama and his cadre of criminals targeted Lt. General Michael Flynn who was to become the head of the intelligence agencies and the National Security Advisor to the President.]

User privacy and public safety can and should work in tandem. What we have learned is that in the absence of a lawful warrant application process, terrorists, drug traffickers and child predators will exploit encrypted communications to run their operations,” said Blackburn.

[Marsha Blackburn is a liar when she claims something “should” work. Experience with the government at all levels proves this is a non-starter.]

The Lawful Access to Encrypted Data Act is a balanced solution that keeps in mind the constitutional rights afforded to all Americans while providing law enforcement the tools needed to protect the public from everyday violent crime and threats to our national security.

The bill would require service providers and device manufacturers to provide assistance to law enforcement when access to encrypted devices or data is necessary – but only after a court issues a warrant, based on probable cause that a crime has occurred, authorizing law enforcement to search and seize the data.

[OCS: Insert laugh track here.

The Utah Data Center, code-named Bumblehive, is the first Intelligence Community Comprehensive National Cyber-security Initiative (IC CNCI) data center designed to support the Intelligence Community's efforts to monitor, strengthen and protect the nation. Our Utah "massive data repository" is designed to cope with the vast increases in digital data that have accompanied the rise of the global network. <Source>

How many people know that the NSA has been hoovering-up almost all electronic communications, including those that are encrypted, and storing them in a not-so-secret facility. Imagine getting a Court order and doing a backward search through that treasure trove to prove “intent,” take things out of context, and force individuals to pay for a defense that will require expensive lawyers and technical experts? Where “exculpatory evidence will stay buried and not be given to the defense as required by law.]

Read more here. S.4051 Lawful Access to Encrypted Data Act.pdf

Bottom line…

Until we see conclusive proof that the U.S. Government has adequately punished those officials who violated the law and those who mishandled and leaked classified information, I say that the keys to the kingdom stay in our pockets. And considering the number of foreign spies and compromised individuals, maybe that’s the price we have to pay to keep our secrets. Have you noticed that every terrorist takedown lately seems to have weak-minded individuals led down the garden path by individuals paid by our law enforcement agencies?

We are so screwed when we can’t trust our government.

-- steve


“Nullius in verba”-- take nobody's word for it!
"Acta non verba" -- actions not words

“Beware of false knowledge; it is more dangerous than ignorance.”-- George Bernard Shaw

“Progressive, liberal, Socialist, Marxist, Democratic Socialist -- they are all COMMUNISTS.”

“The key to fighting the craziness of the progressives is to hold them responsible for their actions, not their intentions.” – OCS

"The object in life is not to be on the side of the majority, but to escape finding oneself in the ranks of the insane." -- Marcus Aurelius

“A people that elect corrupt politicians, imposters, thieves, and traitors are not victims... but accomplices” -- George Orwell

“Fere libenter homines id quod volunt credunt." (The people gladly believe what they wish to.) ~Julius Caesar

“Describing the problem is quite different from knowing the solution. Except in politics." ~ OCS

Comments