Anti-privacy legislation: Difference between revisions
m moved the sim card part of the table up, converted 2 citations used, added another category in "further reading" |
|||
| (3 intermediate revisions by the same user not shown) | |||
| Line 4: | Line 4: | ||
==How it works== | ==How it works== | ||
The US legislative process is as follows:<ref name=":0">{{Cite web |title=The Legislative Process |url=https://www.house.gov/the-house-explained/the-legislative-process | | The US legislative process is as follows:<ref name=":0">{{Cite web |date=23 Feb 2026 |title=The Legislative Process |url=https://www.house.gov/the-house-explained/the-legislative-process |url-status=live |archive-url=http://web.archive.org/web/20260119083226/https://www.house.gov/the-house-explained/the-legislative-process |archive-date=19 Jan 2026 |access-date=23 Feb 2026 |website=[[United States House of Representatives]]}}</ref> | ||
#A representative '''needs to sponsor a bill''' | #A representative '''needs to sponsor a bill''' | ||
| Line 20: | Line 20: | ||
*The 1st amendment states: | *The 1st amendment states: | ||
<blockquote>Congress shall make no law respecting an establishment of religion, or '''prohibiting''' the free exercise thereof; or '''abridging''' the '''freedom of speech''', or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.<ref>{{Cite web |title=U.S Constitution - First Amendment |url=https://constitution.congress.gov/constitution/amendment-1/ |access-date=28 Feb 2026 |website=Constitution Annotated}}</ref></blockquote> | <blockquote>Congress shall make no law respecting an establishment of religion, or '''prohibiting''' the free exercise thereof; or '''abridging''' the '''freedom of speech''', or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.<ref>{{Cite web |date=28 Feb 2026 |title=U.S Constitution - First Amendment |url=https://constitution.congress.gov/constitution/amendment-1/ |url-status=live |archive-url=https://web.archive.org/web/20260307171826/https://constitution.congress.gov/constitution/amendment-1/ |archive-date=2026-03-07 |access-date=28 Feb 2026 |website=[[Constitution Annotated]]}}</ref></blockquote> | ||
If '''Anti-privacy legislation''' were to be implemented, that gives anyone with access to data on someone the ability to '''restrict freedom of speech''' or oppose those with unwanted views of the world, thus infringing the 1st amendment.{{Citation needed|date=28 Feb 2026}} | If '''Anti-privacy legislation''' were to be implemented, that gives anyone with access to data on someone the ability to '''restrict freedom of speech''' or oppose those with unwanted views of the world, thus infringing the 1st amendment.{{Citation needed|date=28 Feb 2026}} | ||
| Line 26: | Line 26: | ||
*The 4th amendment reads as follows: | *The 4th amendment reads as follows: | ||
<blockquote>The right of the people to be secure in their persons, houses, papers, and effects, against '''unreasonable searches and seizures''', shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.<ref>{{Cite web |title=U.S Constitution - Fourth Amendment |url=https://constitution.congress.gov/constitution/amendment-4/ |access-date=28 Feb 2026 |website=Constitution Annotated}}</ref></blockquote>'''Anti-privacy legislation''' infringes on a citizen's right to avoid "'''unreasonable searches and seizures'''" since It may require/force citizens to show proof of age('''selfies, id's, credit cards''') without real probable cause and since It may also force said citizen to use less secure services that allow federal agencies to gain higher access to said services and retrieve to whatever data is "needed".{{Citation needed|date=28 Feb 2026}} | <blockquote>The right of the people to be secure in their persons, houses, papers, and effects, against '''unreasonable searches and seizures''', shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.<ref>{{Cite web |date=28 Feb 2026 |title=U.S Constitution - Fourth Amendment |url=https://constitution.congress.gov/constitution/amendment-4/ |url-status=live |archive-url=https://web.archive.org/web/20260224165919/https://constitution.congress.gov/constitution/amendment-4/ |archive-date=2026-02-24 |access-date=28 Feb 2026 |website=Constitution Annotated}}</ref></blockquote>'''Anti-privacy legislation''' infringes on a citizen's right to avoid "'''unreasonable searches and seizures'''" since It may require/force citizens to show proof of age('''selfies, id's, credit cards''') without real probable cause and since It may also force said citizen to use less secure services that allow federal agencies to gain higher access to said services and retrieve to whatever data is "needed".{{Citation needed|date=28 Feb 2026}} | ||
*'''Anti-privacy legislation''' can also build the framework and foundation for other & more extreme anti-privacy measures, & such anti-privacy measures can lead to the slow development of a '''''surveillance state.'''''<ref>{{Cite web |last=Sherwinter |first=Daniel |title=Surveillance's Slippery Slope; Using Encryption to Recapture Privacy Rights |url=http://www.jthtl.org/content/articles/V5I2/JTHTLv5i2_Sherwinter.PDF |access-date=28 Feb 2026 |website=Journal on Telecommunications and High Technology Law}}</ref> | *'''Anti-privacy legislation''' can also build the framework and foundation for other & more extreme anti-privacy measures, & such anti-privacy measures can lead to the slow development of a '''''surveillance state.'''''<ref>{{Cite web |last=Sherwinter |first=Daniel |date=28 Feb 2026 |title=Surveillance's Slippery Slope; Using Encryption to Recapture Privacy Rights |url=http://www.jthtl.org/content/articles/V5I2/JTHTLv5i2_Sherwinter.PDF |url-status=live |archive-url=https://web.archive.org/web/20240730145810/http://jthtl.org/content/articles/V5I2/JTHTLv5i2_Sherwinter.PDF |archive-date=2024-07-30 |access-date=28 Feb 2026 |website=Journal on Telecommunications and High Technology Law}}</ref> | ||
==List of Legislation== | ==List of Legislation== | ||
| Line 93: | Line 93: | ||
|Approved | |Approved | ||
|- | |- | ||
|Real-life identity disclosure required to activate SIM cards.<ref>{{Cite web |title=SIM Card Registration |url=https://privacyinternational.org/learn/sim-card-registration |access-date=6 Mar 2026 |website=Privacy International}}</ref><ref>{{Cite web |last=Bischoff |first=Paul |title=Which governments impose SIM-card registration laws to collect data on their citizens? |url=https://www.comparitech.com/blog/vpn-privacy/sim-card-registration-laws/ |access-date=6 Mar 2026 |website=Comparitech}}</ref> | |Real-life identity disclosure required to activate SIM cards.<ref>{{Cite web |date=6 Mar 2026 |title=SIM Card Registration |url=https://privacyinternational.org/learn/sim-card-registration |url-status=live |archive-url=https://web.archive.org/web/20251208124027/https://privacyinternational.org/learn/sim-card-registration |archive-date=2025-12-08 |access-date=6 Mar 2026 |website=[[Privacy International]]}}</ref><ref>{{Cite web |last=Bischoff |first=Paul |date=2025-04-23 |title=Which governments impose SIM-card registration laws to collect data on their citizens? |url=https://www.comparitech.com/blog/vpn-privacy/sim-card-registration-laws/ |url-status=live |archive-url=https://ghostarchive.org/archive/ShIek |archive-date=2026-01-17 |access-date=6 Mar 2026 |website=[[Comparitech]]}}</ref> | ||
|Many countries. | |Many countries. | ||
|People are required to associate their real-life identity with their SIM cards, making "burner phones" impossible, and making it impossible to access the cellular Internet without being tracked by the government. Additionally, this can be used to exclude political dissidents from accessing the Internet. | |People are required to associate their real-life identity with their SIM cards, making "burner phones" impossible, and making it impossible to access the cellular Internet without being tracked by the government. Additionally, this can be used to exclude political dissidents from accessing the Internet. | ||