SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Politics : View from the Center and Left

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: epicure who wrote (8795)1/12/2006 9:59:45 AM
From: Lane3  Read Replies (1) of 541430
 
If you were never going to use the information, and tie it to a phone line, it wouldn't be an invasion- but it wouldn't be useful then either, would it?

I'm glad we agree that it wouldn't be an invasion until and unless it was tied to a person. We agree, too, that it wouldn't be useful until and unless it was tied to a person. So far, no harm, no foul. And no utility.

So, if among those snippets there was something that set off the alarms, if they could then trace back and tie that snippet to a person, and if then they could get a warrant and listen in on what else that person had to say, there could be utility.

There are three parts to that. So far we agree that the first part, having computers listen to anonymous snippets, is not a problem and neither is the third part, tapping the line of the speaker with a warrant, then we have left in question only the middle bit, the process of tracking that snippet back to the originator, assuming such a thing is feasible. Is there a violation of the fourth amendment in that middle part, the process of identifying the originator of the snippet?
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext