Technology

US Assumes Global Cyber-Police Authority

By Mark Rasch, theregister


Posted: 27/11/2001 at 10:32 GMT

Much has been written about the new anti-terrorism legislation passed by Congress and signed by President Bush, particularly as it respects the ability of the government to conduct surveillance on email, voice-mail, and other electronic communications. However, too little attention has been paid to other provisions of the legislation, particularly a significant change to the definition of the types of computers protected under federal law.

An amendment to the definition of a "protected computer" for the first time explicitly enables U.S. law enforcement to prosecute computer hackers outside the United States in cases where neither the hackers nor their victims are in the U.S., provided only that packets related to that activity traveled through U.S. computers or routers.

This remarkable amendment is to the Computer Fraud and Abuse Act, which Congress enacted in 1984 to prohibit conduct that damages a "Federal interest computer," defined at the time as "a computer owned or used by the United States Government or a financial institution," or, "one of two or more computers used in committing the offense, not all of which are located in the same State."

Full article is at theregister

http://www.securityfocus.com/news/294

R.I.P. Cypherpunks

Once the online haunt of top cryptographers, the Cypherpunks list was
characterized by its mix of revolutionary politics and advanced
mathematics. This week, a founder pronounced it dead and buried

By Will Rodger
Nov 29 2001 10:15AM PT

The Cypherpunks list, an online forum that in many ways defined Internet
activism, was booted unceremoniously from its original home, toad.com,
earlier this week.

In an open posting to several mailing lists, Cypherpunks veteran John
Gilmore all but dismissed the computer-security and privacy forum he
co-founded in the early 1990s. It had, he wrote, "degenerated a long time
ago to the point where I have no idea why more than 500 people are still
receiving it every day."

Yet, for all the irrelevant comments, vicious infighting and radical
libertarian politics that flourish on the list, Cypherpunks has chronicled
every important event in the short history of modern cryptography, as well
as the cyber-rights movement that grew out of it.

.... this is an incomplete and inadeqaute rant, but I couldn't go to sleep withiout writing it. Night-night.

2600 DMCA APPEAL LOST

The decision has come down in the DMCA appeal in the 2nd Circuit Court of Appeals. 2600 lost. Bad news for free thinkers, programmers, researchers, budding independent artists, media mavericks and the kids, who will soon (and some already do) get courses in respecting copyrights and how it's bad to share knowledge and culture.


The text of the decsion is available in PDF format here, and a much cleaner and intelligible HTML version at the 2600 website.


A synopsis of the court's main findings can be found below. First however it is important to set the scene for those who may not be familiar with the case. This is not arcane stuff and affects us all.

hydrarchist writes:

The Napsterisation of Everything:

A Review of John Alderman, Sonic Boom:

Napster, P2P and the Battle for the Future of Music,


Fourth Estate, London, 2001

by Richard Barbrook

"They just don't get it." During the dotcom boom of the late-1990s, this
catch phrase was a popular way of dismissing anyone who expressed doubts
about the world-historical significance of the Net. How could someone be so
out-of-touch as not to realise that this technology was transforming
everything: business, politics, culture and even personal relationships?
The future would belong to those did "get it." Yet, only a couple of years
later, such optimism about the potential of the Net already sounds dated.
How can anyone still believe that this technology will change anything
after the implosion of the NASDAQ share bubble and the collapse of so many
dotcom companies. Surely the wild times of the Net were only a temporary
aberration? As Microsoft, AOL-Time-Warner and the other big corporations
take over cyberspace, it will soon be back to business as usual. There is
no longer any necessity to "get it." The Net will change nothing.

hydrarchist writes: "

Freedom or Power?


by Bradley M. Kuhn and Richard M. Stallman

"The love of liberty is the love of others; the love of power is the love of ourselves." -- William Hazlitt


In the Free Software Movement, we stand for freedom for the users of software. We formulated our views by looking at what freedoms are necessary for a good
way of life, and permit useful programs to foster a community of goodwill, cooperation, and collaboration. Our criteria for Free Software specify the freedoms that a
program's users need so that they can cooperate in a community.


We stand for freedom for programmers as well as for other users. Most of us are programmers, and we want freedom for ourselves as well as for you. But each of
us uses software written by others, and we want freedom when using that software, not just when using our own code. We stand for freedom for all users, whether
they program often, occasionally, or not at all.


However, one so-called freedom that we do not advocate is the "freedom to choose any license you want for software you write". We reject this because it is really
a form of power, not a freedom.

Read the rest of this story at openflows.org."

Anonymous Comrade writes: "http://www.stopcarnivore.org/threeproblems.htm

The Backdoor, the Rogue Agent, and the Mishap:

The Hidden Dangers of Carnivore

Introduction

Most of the discussion about the F.B.I. spy tool
Carnivore has focused on the 4th Amendment. By its
nature, Carnivore violates the 4th Amendment, but many
people have seemed willing to overlook that,
especially in recent weeks, as long as it will make
them safer.

This paper is written for the people who believe the
"4th Amendment argument" is not sufficient to justify
prohibiting Carnivore. Make no mistake, we at
StopCarnivore.org still firmly hold that Carnivore is
in clear and disturbing violation of the 4th
Amendment, but there are clearly those who believe
that is not a good enough reason to prevent its use.
This paper is intended to provide convincing reasons,
beyond the 4th Amendment argument, why Carnivore is a
law enforcement tool that we all should reject.

This paper is also designed to provide a response to
those who say, "If you're not doing anything wrong,
you don't have anything to worry about." The following
are things that affect everyone, innocent people
included.

Anonymous Comrade writes: There has been a story picked up by the major media outlets about how the
Department of Energy has been pulling "sensitive" nuclear information from
its web site.


in case you want to see that information, simply go to:


http://web.archive.org/web/*/http://www.energy.gov


WHAT?! that's right... a rather complete set of www archives from all over
the world - including last year's version of the DOE website containing all
of the "sensitive" nuclear information.


so all the creative terrorist needs to do is compare the current pages with the
archived version and he will be conveniently served up with a list of all
the data that our govn't thinks is "sensitive"


damn! i love the internet!

so what next!?? demand that the web.archive.org remove all DOE web page archives? and if so, let the legal debate begin!

Tags:

Louis Lingg writes: "The Defense Department was roundly (and perhaps unjustly) mocked when it solicited ideas from US citizens on how to fight the war on terror.

cryptome.org has posted the DoD's Technical Support Working Group's 'wishlist' of technologies, resources, and capabilities they hope will be addressed and developed.

Maybe someday soon State Department policy-makers will also call upon the initiatives of US citizens, but don't hold your breath."

Louis Lingg writes: "The Department of Computer Science at Georgetown University is offering a course that 'will study the nature of information warfare, including computer crime and information terrorism, as it relates to national, economic, organizational , and personal
security': Information Warfare: Terrorism, Crime, and National Security.

The syllabus, bibliography, and on-line resources have been posted at COSC 511."

Anonymous Comrade writes: "Thoughts in the Presence of Fear

by Wendell Berry

I. The time will soon come when we will not be able to remember

the horrors of September 11 without remembering also the

unquestioning technological and economic optimism that ended on

that day.

II. This optimism rested on the proposition that we were living

in a "new world order" and a "new economy" that would "grow" on

and on, bringing a prosperity of which every new increment would

be "unprecedented."

Syndicate content