timschochet
Footballguy
The whole point is that right now nobody is going around reading your emails. There's a computer scanning them, looking for certain patterns. Nobody is looking through your ####. That's why it's not a violation.Your term of "targeted search" appears to match identically my criteria of "as long as the search extends to everyone equally", no?None, because it's not really a government search as I would define a targeted search, and prohibitve is not a correct word either. I'm not trying to frustrate you, but what you have written here does not match what I am saying. What I wrote above (bolded) is pretty clear, it doesn't really need too much interpretation IMO.What I'm trying to get at here is where your line is drawn, but your answer isn't really an answer. It's too wishy-washy and instead leaves me with a "I know it when I see it" feeling. I don't want "I know it when I see it" when I'm talking about my civil liberties; I want something concrete.1. Government searches do not violate civil liberties as long as the search extends to everyone equally.
2. Government searches do not violate civil liberties as long as the effort expended and technology used are not "prohibitive" (we'll get to how we define "prohibitive" a little later).
3. Government searches do not violate civil liberties as long as both A) the search extends to everyone equally, and B) the effort expended and technology used are not "prohibitive".
Again:
I believe that so long as there is no specific targeting or people or groups, and so long as there is no specific searching being performed (such as each piece of mail being opened and read), the program under discussion manages to infringe upon the 4th Amendment, within permissible limits, and without violating civil liberties.
I do not understand your criteria of "specific searching". It seems to me that you're going for "computers do the work rather than people"?
In every "what if" example you and others keep throwing at me, somebody is actually looking through your ####. That's when it becomes a violation.
I was being honest. You seem to be hung up on the (human) profiling before the act and are ignoring the (human) profiling that happens after the act. By recording everything and linking it together using an easily identifiable key like email address and giving access to perform these queries to analysts (a low level worker for the NSA) either by key (email address) or by any criteria they want (profile data) removes the "computer is just data mining" argument you keep using.
Your question is irrelevant. And inaccurate as to my point. The Bill of Rights limits both.
