As SCOTUS checks and balances apply to the legislative and executive branches, more members in both chambers must migrate to Constitutional rule. Abuse of the citizen was inevitable and corruption was the fruit found on the ground.
Read moreReal ID: The 2nd Round
DHS bureau heads mistakenly believe that Real ID is properly regulated. EPIC expressed concerns early this year TSA’s biometric collection would not comply with privacy law. DHS has not promoted information about a long-term plan to store and/or dispose of US identity securely after collection. Now they are moving the saw against US States with a non-compliant posture without providing evidence the reforms are necessary or compliant with privacy practices. If these agencies continue to proceed with this, you may see a new method of resistance from States: a cascade of lawsuits due to DHS non-compliance with US privacy laws.
Read moreWhy leftists might care less about individual privacy than the rest of us
There are a lot of Asian and Russian influences impacting the business community on the West Coast, particularly Silicon Valley and Seattle subsidiaries. Eastern countries have taken it upon themselves to inject their way into our political machining, our intellectual property and our networks breaching vital Western infrastructure. What people don’t understand yet is that this is what the Leftist wants: aggression and dominance of capital commerce structure and consolidation of economic power in the hands of socialized governance. Perhaps they believe China and Russia can export communism to the U.S.
Read moreReally ‘Smart' Cities Regard Federal Rules for Privacy
Over 70 cities nationwide have signed up as grant recipients for Obama’s Smart Cities initiative. Most are expected to build diverse systems to apply wireless, IoT infrastructure or Artificial Intelligence to municipal projects. What seems to be lacking in Obama’s 80 million endorsement of Artificial Intelligence is guidance on IoT privacy compliance.
Read moreThe Assertive Privacy Consumer: Know your opposition
Just like every other conflict, in user privacy conflicts you have to identify and respect your opponents. Sometimes your opponents are only situational. They have one goal in mind: win in the moment. In other cases, your opponents are predatory. They want to deleverage your rights so they have unlimited access and power over even the smallest of your affairs.
Read more