Monday is Wiretap the Internet Day 264
Alien54 wrote with a link to a Wired blog entry noting that May 14th is the official deadline for internet service providers to modify their networks, and meet the FBI and FCC's new regulations. The Communications Assistance for Law Enforcement Act requires that everyone from cable services to Universities give them access, within certain parameters, to the usage habits of customers. "So, if you're a broadband provider (separately, some VOIP companies are covered too) ... Hurry! The deadline has already passed to file an FCC form 445, certifying that you're on schedule, or explaining why you're not. You can also find the 68-page official industry spec for internet surveillance here. It'll cost you $164.00 to download, but then you'll know exactly what format to use when delivering customer packets to federal or local law enforcement, including 'e-mail, instant messaging records, web-browsing information and other information sent or received through a user's broadband connection, including on-line banking activity.'"
Limits on government (Score:5, Insightful)
Remember folks that the Constitution is not a document about what rights people possess, nor is it a document that outlines what governments can do. Rather it is a document that describes limits on what government can do and it could be clearly argued that the Communications Assistance for Law Enforcement Act violates those provisions in the Constitution designed to protect the individual from unreasonable governmental surveillance.
Re: (Score:2, Interesting)
Remember folks that the Constitution is not a document about what rights people possess, nor is it a document that outlines what governments can do. Rather it is a document that describes limits on what government can do and it could be clearly argued that the Communications Assistance for Law Enforcement Act violates those provisions in the Constitution designed to protect the individual from unreasonable governmental surveillance.
The central part of the US Constitution pretty much describes what the Federal government can do and gives authority to do so. It is the Bill of Rights and subsequent amendments that puts the limits on government powers - and the Bill of Rights was passed because of concerns with the powers granted in the Constitution. The Constitution was created and ratified because the central government under the Articles of Confederation was too weak to be effective.
Re: (Score:3, Insightful)
Re:Limits on government (Score:5, Insightful)
The way I understand it is that the constitution limits the powers that the government has by enumerating them. It defines the upper limit of the power of the government. In contrast, the bill of rights defines the lower limit of rights that the people have by enumerating basic rights. People have more rights than are defined in the bill of rights. They are only limited by the law (the manifestation of other people's rights).
Re: (Score:3, Insightful)
Re: (Score:3, Insightful)
Re:Limits on government (Score:5, Funny)
You Americans should try it once... it's pretty cool actually.
Re: (Score:2, Funny)
Oh, we did try it once. We didn't think it nearly so cool as watching Paris Hilton go to jail for being a spoiled twit.
-
Re: (Score:3, Interesting)
You Americans should try it once... it's pretty cool actually.
We've actually been trying it for a centuries - so long that the powers that be have learned to game
Re: (Score:3, Insightful)
The United States were built through wars, not diplomacy. Why does anyone expect that to change now ? It's a young country whose only history involves fighting... fighting others, fighting itself... It takes a long time for a nation to stabilize and harmonize, the only reason the US is even on the map is because of their notoriety and a few long streaks of financial success, as well as some pretty serious tunnel-vision as evidenced
Re: (Score:3, Insightful)
Re: (Score:2)
While I agree with you that there are many huge differences between Bush and Gore, this probably isn't the right discussion in which to depend on those differences. Google "Clipper chip" and "key escrow" for more information. Gore doesn't exactly have a history of valuing individual privacy rights over ease of government wiretapping.
Also, thanks to the electoral college system, it is often possible to safely vote for a third party, becaus
Re: (Score:2)
Re:Limits on government (Score:5, Insightful)
Re: (Score:2, Interesting)
-- Ed Howdershelt
Re: (Score:3, Interesting)
Soapbox - the real "soap box" is the TV, only big media moguls and rich corporations get to play. Blogs don't have nearly the same impact, but I guess this one is fairly alive. Too bad there's so little left people can do that matter.
Ballot box - two parties, both on a power trip. Even if a third party started to gain traction, they'd shift politics a little and it'd disappear into nothingness again. Not to mention that going to a third party makes your side weaker -
Re: (Score:3, Interesting)
The really sick part is, once we do realize it it will be way
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Informative)
the Constitution is academic (Score:2)
So, harping on the Constitution doesn't change anything; if you want less centralized government and more liberties, you have to convince your fellow citizens to ignore the fear mongering by power-hungry politicians. Oddly enough (or perhaps not), t
Re: (Score:3, Insightful)
Re: (Score:2)
suggestion (Score:5, Informative)
Interestingly, this is the same kind of solution often resorted to by residents of those countries usually tagged as 'repressive regimes' by the good ole U.S. of A. Make ya think, at all?
Re: (Score:2, Insightful)
Re: (Score:2, Funny)
Won't help. Tuesday is wiretap your brain stem day.
Re:suggestion (Score:5, Interesting)
Weven where communications are more secure at the application layer, most people simply click on the "do you accept this key" buttons when making an encrypted connection, which makes such monitoring even easier because the user in the field winds up using the man-in-the-middle's public keys, instead of the target destination's public keys. I saw this about six years ago in a rather clever router reconfiguration to minotor all SSH traffic to a victim's internal network administration servers. We only noticed it when I got brought in to see why there were such large latencies on incoming traffic, and dumped the configuration to plain text and actually *read* it, along with noticing that the previous admin had never bothered to install and enable the SSH tools. Then I found out he had been programming it, via telnet, from his laptop on the road.
We had a long, private talk before I went to the company president with the analysis. He hadn't been allowed the time or resources to do things more securely, and his manager had been saying "we have a firewall, we can trust people inside the network" and had denied this engineer's attempts to do things more securely. It would have been a lot cheaper to do it right than to have me try to clean up the mess later, but it's often difficult to get people to do things right.
If you think a colo service is robust protection, then go ahead and check how many of your colo setups have encrypted file systems, password protected boot loaders, and password protected BIOS's, just to start with. Then compare what you could do with the same money and resources to secure your systems against rootkits, implement proper password management, etc.
Yes, of course. (Score:2)
The real vulnerability in my suggestion is the unencrypted side of the proxy.
But I already said it's NOT PERFECT but BETTER THAN NOTHING.
Re: (Score:3, Insightful)
A famous example of this is the death of anon.penet.fi, after numerous assaults on it with and without warrants. It's well-described over at Wikipedia.
Re: (Score:2)
Re: (Score:2)
Are there any services like this located in known "shelter"/"haven" countries like Luxembourg, Switzerland, the Cayman Islands, and so on? These countries are already pretty well-versed in giving the finger to tax authorities around the world and protecting client confidentiality in other ways; what about ISPs?
Re: (Score:3, Funny)
Bert
Who is considering encryption in the Navaho language
Wouldn't work (Score:2, Insightful)
Bot me up, baby... (Score:5, Interesting)
Re: (Score:2)
Re: (Score:2)
Hah, like the old trick of including suspicious keywords in your email signature to fuck with Echelon [wikipedia.org], eh?
Something as simple as a Perl script googling for suspicious keywords (e.g., "kiddie porn", "assassinate president", "jihadi", "moqawama", "site:.sa", "site:.lb", ...) and then fetching some/all the results at random would do what you want.
Look into the LWP::Simple and HTML::LinkExtor Perl modules to get started. Make sure you set the user-agent line to something like Internet Explorer or Firefox us
Re: (Score:2)
So in short, if under surveillance, perform every crime you could possibly conceive! That's confuse the surveillance team and it
Re: (Score:2, Insightful)
Re: (Score:2)
Hey hey there! Don't you go butchering a treasured American phrase! The proper phrase is:
The land of the free and the home of the brave.
In fact just a few days ago on Slashdot I happened to write about my strong feelings on the bravery and behavior of so many of may fellow Americans, [slashdot.org] particularly in the wake of 9/11. And it just so happens to be relevant to the internet surveillance topic as well.
-
Re: (Score:2)
He's not performing any crime at all.. It's still not illegal to just browse any of the pages that he said:
few porn sites, maybe an offshore gambling site, and *any* site in Arabic that should be enough
Re: (Score:2)
Re:Bot me up, baby... (Score:4, Insightful)
Yeah! The false positive rates will be so high the government will have no choice but to kill the programme! It'll be just like the no-fly list!
Re: (Score:2)
Seriously, it's the high tech equivalent of yelling fire falsely in a crowded theatre. And these days, the government will overreact in some insane way like banning theatres.
Parent apparently didn't think before typing. (Score:2, Insightful)
$164 (Score:5, Funny)
Re: (Score:2, Interesting)
Re:$164 (Score:5, Interesting)
I still find it amusing that a friend of mine at the time disagreed with the thuggish tactics they used but is now OK w/ denying commoners access to the law. The difference is that he recently graduated from Duke law school. He is now very anti-Constitution, anti-EFF (despite having donated money to them several years ago!), and very pro-Democrat.
The text from the SC law:
"The State of South Carolina owns the copyright to the Code of Laws of South Carolina, 1976, as contained herein. Any use of the text, section headings, or catchlines of the 1976 Code is subject to the terms of federal copyright and other applicable laws and such text, section headings, or catchlines may not be reproduced in whole or in part in any form or for inclusion in any material which is offered for sale or lease without the express written permission of the Chairman of the South Carolina Legislative Council or the Code Commissioner of South Carolina."
They consider distribution for free on a web site a sale for $0 so that makes it illegal without written permission. I tried to obtain permission and after making around four dozen phone calls and two trips to Columbia, SC, I finally gave-up.
Re: (Score:2)
I don't know if a state counts as an entity of the United States Government, but it seems to me like it would. So, your state cannot copyright anything because of an over-riding federal law [copyright.gov]. My understanding was that the reason for that law was to prevent the exact problem you're experiencing.
Re: (Score:3, Informative)
Re:$164 (Score:5, Informative)
There has since been a court ruling against copyrighting law. I did a Search of SC law for the term COPYRIGHT [scstatehouse.net] and only got five hits.... none of which have any relation to the "text from the SC law" that you quoted. Maybe the law you quoted did exist in 1998, but it does not appear to exist now. They may have specifically repealed it in response to the court ruling on the subject.
-
Re: (Score:2)
Section 109(b)(1) Petitions for Cost-Shifting Relief
... First, the carrier must file a section 109(b)(1) petition with the FCC
CALEA section 109(b) permits a "telecommunications carrier," as that term is defined by CALEA, to file a petition with the FCC and an application with the Department of Justice (DOJ) to request that DOJ pay the costs of the carrier's CALEA compliance
[...]
Please note that a filing fee of $5,000.00 is required to accompany all CALEA section 109(b)(1) petitions filed with the FCC.
(Emphasis mine)
They want you to pay $5,000 to file a request for financial assistance! How ridiculous is that?!
Amendment IV (Score:5, Insightful)
Amendtment IV
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
Re: (Score:3, Interesting)
Scanning Internet packets also does not constitute either a search nor a seizure. You are already passing the information through the ISP. All the new law requires is that the ISP willingly pass over any of that information to the FBI upon issuance of a warrant.
Re: (Score:2, Insightful)
Don't be naive. Here are two workarounds off the top of my head, either of which would be solid enough to be repeated ad nauseum to the nodding masses on talk shows: 1) It's not unreasonable to search and seize whatever we have to, if it means keeping the public safe from another 9/11. 2) We have probable cause to believe that terror cells are operating somewhere in the US, and the Internet is the place it's holding its meetings.
The Constitution has never been much of an obstacle to people in power. Hell,
Re: (Score:2, Insightful)
Re: (Score:2)
and.. (Score:5, Funny)
Re: (Score:2)
Typo alert! Don't you mean "agree"?
Re: (Score:2)
Just in time to this technology to detect and weed out people who disagree with the HILLARY administration, and to restore the US to its former glory.
Muahahahahahaha!
-
So the next step (Score:2)
Save us from the "big brother" mentality, since then the terrorists of the world have won by letting the governments take over to make things miserable for the citizens.
A government shall serve the citizens, not the other way around. Sometimes the people in government should be taking a step back and consider what is really the consequences of the actions.
Re:So the next step (Score:5, Interesting)
This law actually makes a special exception for encrypted data:
Full text here [wikisource.org].
Re:So the next step (Score:4, Interesting)
Re: (Score:2)
There you go, people... your government is just making you use really strong encryption. Always.
In other words, it'll be good for you.
/me ducks
Re: (Score:2)
Hopefully this will drive people and information service providers to use encryption wherever they can. Web (SSL/HTTPS), SMTP ("STARTTLS" over port 25 or SSMTP over port 465), IMAPS, POPS, SSH, VPN (SSL or IPsec), and so on. Some IRC servers and IM protocols offer SSL connections. There're a few encrypted p2p services such as Freenet or I2P. Practically all your basic Internet services can be encrypted nowadays; for the rest, there's SSH tunneling to a safe place so the plaintext traffic doesn't originate f
Re:So the next step (Score:5, Insightful)
Of the general population of the US, only the technically minded minority will do that.
Seriously. Try to talk to someone who thinks that the Internet is the IE icon (really, a co-worker keeps saying this) and all you'll get is glazed eyeballs and a "I don't get it. It's too complicated. I have nothing to hide" reaction.
Such people can't even be trusted to keep their anti-malware software for Windows up to date. You think the general public is going to start encrypting everything suddenly because of this?
"Think of how stupid the average person is, and realize half of them are stupider than that." - George Carlin
Only if encryption gets as transparent as the fish:// ioslave in KDE will it get serious adoption, and even then it will have to be enabled by default. Don't expect Microsoft to lead the way in this department.
--
BMO
Re: (Score:2)
If by this you mean these new regulations, then no, the general public will not start encrypting everything.
They will eventually realize that unencrypted traffic is like sending postcards instead of letters and like yelling in a town square instead of making a phonecall (though I remember seeing people using a phone in a town square, yelling so loudly I thought they didn't really need the phone in the first place
Re: (Score:2)
I must be a cynical bastard because I see that what you say in the first half is contradicted in the second half of what you wrote. People don't know or care how wide open most communication is.
Re: (Score:2)
There's more than one definition of "drive."
My employer is in the process of migrating all of us from one email system to another. The new email system does not support plaintext IMAP, POP, or SMTP access. We're also migrating all our websites to new servers; the ones that require authorization forcibly redirect to the HTTPS version of the site.
This is the same route ISPs could take. An HTTP->HTTPS redirect for the company website is transparent to the end-user. For services like email, they can prov
Re: (Score:2)
Yes, in my comment I was specifically talking about websites that the ISP owns: company website, support site, whatever. Obviously not something an ISP's customers spend a lot of time at, but every little migration to HTTPS helps.
Slashdot has the HTTPS server for signing up for subscriptions, I believe. Since HTTPS adds a bit of overheard to do the encryption, supporting site-wide HTTPS for a busy site like Slashdot would probably require a lot more hardware, so that's probably why they push ordinary brow
Re:So the next step (Score:5, Interesting)
Re: (Score:2)
Hahahaha. Yes, thank god there is an exception for encrypted data!
For anyone out there who finds it difficult to real legalese, or who may be unfamiliar with the technical issues of cryptography involved here, allow me to translate that "exception" into plain English. It effectively says:
This law does not require companies to do things that are effectively impossible to do, nor does this law require companies to provide information that they do n
Telecommunications services only (Score:5, Informative)
It's important to note that CALEA doesn't apply to "information services" or "electronic messaging services", only "telecommunications". Here are the relevant parts of the actual law [wikisource.org]:
So glad I'm expat now... (Score:2)
When are the massive demonstrations going to take place? When are thousands of fed-up-to-the-gills decent Americans going to march on the Capitol and demand an end to the gratuitous use of the Bill of Rights as bumwipe? Feckin' bread-n-circuses wussies
Re: (Score:2)
If that ISP of yours is only providing you with email, they're not bound by CALEA. See #19102005 [slashdot.org] and #19102011 [slashdot.org].
A good business decision by ISPs that provide both connectivity and Internet services (i.e., most ISPs) might be to spin off their services to a subsidiary, provide only encrypted access to the them (SSMTP, IMAPS, POPS for email; HTTPS for the company website) for customers, and then when the feds demand to wiretap a connection, they won't be able to get much.
Re: (Score:2)
w00+!
If I was still in the US, I'd definitely be tunneling all traffic that I cared about. Too bad about the packet overhead.
Re: (Score:2)
Those all seem to fall under "information services" and "electronic messaging services" according to the law, from my IANAL reading of it. Of course, the question is, if the ISP is approached by law enforcement with a wiretap demand under CALEA:
But the obvious "solution"... (Score:2, Interesting)
Re:But the obvious "solution"... (Score:4, Insightful)
What happened in 1974-11? From this list [wikipedia.org], are you talking about:
What, Democrats wrecking the country? I'd pick FDR (ca. 1933) if I wanted to point to a turning point in which the Democrats got a bunch of overbearing laws passed, not 1974. Or perhaps 1917-1918, with the passage of the Sedition Act and Espionage Act, under president Wilson. But plenty of things happened prior to even that that have slowly eroded any meaning of "republic" or "freedom" in this country.
It was in 1886 [wikipedia.org] when corporations really got free reign to run this country.
In 1861, a constitutional crisis over secession by states was settled through war [wikipedia.org], by a president who also suspended the Constitution, instituted the first military draft, had congressional opponents accused of treason, and began printing massive amounts of paper fiat currency, among other things. The outcome of the war was also the beginning of rapid industrialization in the United States, turning the vast majority of Americans into wage slaves working in factories. This one is of course particularly ironic because it's been justified as a war for freedom.
And as for the first power grab by the federal government? Let's look at the passage of the U.S. Constitution itself, replacing the much weaker Articles of Confederation, justified as a response to Shays Rebellion [wikipedia.org]:
Re: (Score:2)
That's what PKI is for.
You're right that current implementations of things like SSMTP and IMAPS (using SSL) have the private key on the server-side, but SSL also allows for client-side certi
Re:So glad I'm expat now... (Score:5, Informative)
I'm afraid it's going to be difficult to coordinate protests with this kind of monitoring in place. And we're still seeing people say "but if it saves one life from terrorists", not realizing that it actually encourages terrorism by ruining trust in government and making people feel that only violent action might be effective.
Re: (Score:3, Interesting)
Monday (Score:3, Funny)
We win again, government, MUAHAHAHAH!
Comment removed (Score:5, Insightful)
Re: (Score:2)
The actions of this government and administration more resemble those of Fascism [wikipedia.org] than of Communism [wikipedia.org], although the subject of this article would certainly be exercised by either, as both are characterized by totalitarianism.
"Fascism may be defined as a form of political behavior marked by obsessive preoccupation with community decline, humiliation, or victim-hood and by compensatory cults of unity, energy, and purity, in which a mass-based party of committed nationalist militants, working in uneasy but effec
Re: (Score:2)
How bad will it have to get before people realize this post 9/11 government we are creating is little different than those we were fighting against less than 50 years ago.
misunderstood (Score:2)
People act like this is a new processes, but they've been taping phones, installing listening devices, and charging criminals with crimes for years. As long as the three branches of go
Re:misunderstood (Score:5, Interesting)
The three branches are *not* involved in this. The handling of the monitoring does not require warrants, and is thus executive policy, without court involvement or even notification of what is beiing monitored. And even if the three branches are involved, the people being monitored are *not* being notified of the monitoring!!! There is no warrant served: even libraries are prohibited by the Patriot Act from telling book borrowers that they've been forced to turn over records, without warrants, under the Patriot Act.
Yes, it's been going on for years. It's going to happen again and again, and it needs to get slapped down each time it occurs to prevent it becoming ubiquitous and a means of interfering with public policy or personal lives of the innocent. Given the documented monitoring of Martin Luther King by the FBI, the McCarthy era files of who was a communist and forced confessions of other potential "communist" americans, and stupidities of federal raids with warrants such as the "Operation Sundevil" raids on Steve Jackson games, there is just no reason to trust federal investigations or monitoring without public exposure and review.
Re: (Score:3, Insightful)
Re: (Score:3, Insightful)
This is clearly not the case. And whatever made you think charges will be pressed? Not only do they not need to press charges, under the Patriot Act and similar laws and policies, you can be held without bail, without a lawyer, and without the government admitting you exist under situations like Guantanamo Bay. And you can be
Re: (Score:2)
Then what you (or whoever is responsible for this at your ISP) need to do is make sure this procedure is accurately and vigorously followed. Make it expensive and time-consuming for them to go on fishing expeditions under this law.
Too many ISPs and telecommunications providers comply with subpoenas and/or court orders authorized under laws like this, the DMCA, OCILLA [wikipedia.org], and so on, when such orders were in fact invalid for a variety of reasons. Worse, the government is also in the habit of making noncompulso
Re: (Score:2)
The only new thing here is the standard format for the compliance with the court order (and the new requirement that you be able to produce the records for the court). Most ISPs have been saying, "yeah, we don't have that information because we wouldn't have the capacity to store it, duh" up until now.
Did you feel like your civil liber
finally ... now I know what.... (Score:2)
ah that explains it (Score:3, Funny)
Re: (Score:2)
Actually, my ISP announced over the last couple weeks that we would be switching over to a new email and filtering system by "Sunday evening". Coincidence?
Another reason to kill internet radio in the U.S.? (Score:2)
Re: (Score:2, Insightful)
Miss Hil
Wish it were so... (Score:2, Interesting)
Ever had a stranger m
Re: (Score:2)
I know of one setup that has installed probe systems in the following countries in just the past month: South Africa, Singapore, Israel, Turkey, Germany, Britain and Poland.
That was just in offhand conversation with a sales manager for one company. And considering I'm a contracted installer who has been putting these systems in all over the U.S. for the past couple months, and the discussion was about "he
Re: (Score:3, Interesting)
Don't say that I didn't warn ya.
http://www.askcalea.net/docs/calea.pdf [askcalea.net]