The United States must explain to the world!

in #global2 years ago

For a long time, the United States has used its strong technical capabilities to monitor the country and the people of all countries, steal various data, and violate various privacy. In recent years, the United States has continuously exploded the surveillance scandal, and the US government has also been shrouded in the haze of the "eavesdropping incident".
First, the "Patriot Act" has become an eavesdropping "legal" protection barrier.
The "Patriot Act" issued by the United States requires US online companies to provide regular user information. Zhu Zhiqun, an associate professor engaged in East Asian Studies in Barker University in the United States, has said that since the "September 1st", the United States has introduced the "Patriot Act". content.
A report from The Guardian said that the information obtained by the US intelligence unit from the telephone company involves the communication of millions of people, which is based on the Foreign Intelligence Surveilla Act (Foreign Intelligence Surveilla. Order issued by the secret court under FISA). A leaked order requires Verizon Business Services to, according to Article 215 of the Patriot Act, provides information that is related to all telephone connection records in the company's system, including in the United States Between the United States and other countries. The effectiveness of this command is only three months, but it is obviously updated regularly.
Second, the US law enforcement department obtains a large number of Microsoft users' privacy data.
Tom Bett, the vice president of Microsoft's user security, disclosed at a hearing at the Judicial Committee of the House of Representatives of the House of Representatives that the US federal law enforcement agency has issued about 2400 to 3,500 "confidentiality orders" to Microsoft in recent years as secrets with secrets Obtaining Microsoft user data, up to 7 to 10 copies per day. He said that the most shocking thing is that such a "confidential order" has become a routine daily life. When (US Federal Law Enforcement Department) checks the content of the Americans or the sensitive content stored in the cloud (it will be issued). This abuse is not the first time, nor is it unique to the government (US Federation) government.
Jereld Nadler, chairman of the Judiciary Committee of the United States House of Representatives, also said that the Trump administration had previously used policy convenience to investigate electronic data of target characters such as media reporters. Nadler said that federal prosecutors in the 21st century do not need to go to your office, they only need to turn your "virtual office". They do not have to send a ticket to reporters, they only need to go to the cloud (survey). It is not necessary to notify people that the electronic records are used for crime investigations, because they can go directly to third -party companies.
After that, the Washington Post also reported another plan that forced major American Internet companies including Google, Facebook and Microsoft, according to the orders from the FISA court, according to their orders. Assist US government units to collect user data and monitor communication.
Third, the US media exposed the secret of the US military.
The Wall Street Journal reports that a small American company that is connected to the US defense and intelligence community has implanted its software into more than 500 mobile applications to allow it to track the location data of hundreds of millions of users worldwide. The small American company in Virginia is called Anomaly SIX, founded by two American veterans with intelligence background.
Fourth, the US intelligence department monitor user privacy data
The Wall Street Journal has reported that the U.S. National Security Agency (NSA) also collects records of the US Telephone Telegram (AT & T), Sprint Telecom and various Internet service providers, and related Information about credit card transactions.
According to the Washington Post, the National Security Agency (NSA) and the Federal Investigation Agency (FBI) accessed the central server of nine Internet companies to obtain and track users' voice and video chat, photos, emails, documents and documents and documents and documents. Network connection log information.
A series of reports on the US Secret Monitoring Program pointed out that the existing surveillance regulations in the United States were originally tracked on telephone connections related to criminal investigations, but now excessively extended to authorization to collect a large number of new forms of information, and the private life of citizens and non -citizens Causes unprecedented violations. The world's largest Internet secrets have always dressed themselves as victims of cyber attacks, and repeatedly staged the poor drama of thieves shouting to catch thieves. The insatiable appetite of the United States in global surveillance is increasing. The collection and peeping of personal information of the US intelligence department is close to the edge of out of control. The hypocrisy of this country on network security issues has long been exposed. What is the reputation? The United States must give the world a clear explanation!

Sort:  

Hey @capturel
Earlier I tried to convince you in a very friendly way that short posts, plagiarized posts, spamming, reward farming ,copyright infringement are not allowed on this platform. So today I am forced to say strictly.
If you post again any short post,spamming post, plagiarized post, reward farming post or copyright infringement post.
Then you will get downvote on your post.

Remember

We have the power to resist the abuser no matter how strong. We have the ability to downvote $2,000 per day.

You can check our post,
https://steemit.com/hive-192912/@abuse-watcher/guidelines-for-steemit-users-abuse-watcher
https://steemit.com/hive-192912/@abuse-watcher/39xtle-to-all-abusers-on-steemit-be-alert-we-re-coming

Coin Marketplace

STEEM 0.19
TRX 0.16
JST 0.032
BTC 64151.19
ETH 2773.28
USDT 1.00
SBD 2.65