Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Privacy Government The Courts The Internet Your Rights Online News

Child Porn Probe Uses Live Internet Wiretap 364

rrkap writes "The Sacramento Bee is reporting that Jason Heath Morgan, a suspect in a child porn case was subject to the first 'live internet wiretap.' According to the story, 'Technology used in the surveillance is very similar to a phone tap. Agents attached a monitoring device to Morgan's phone line, then tracked his Internet activity from remote computers.' This packet sniffing was authorized by the PROTECT Act - officially Prosecutorial Remedies and Other Tools to End the Exploitation of Children Today Act, which authorizes such tapping of internet connections."
This discussion has been archived. No new comments can be posted.

Child Porn Probe Uses Live Internet Wiretap

Comments Filter:
  • by Anonymous Coward on Saturday May 22, 2004 @08:09AM (#9224205)
    Prosecutorial Remedies and Other Tools to End the Exploitation of Children Today

    Will these forced acronyms never end?
    • by Anonymous Coward on Saturday May 22, 2004 @08:21AM (#9224243)
      PROTEECT? Can't they at least spell properly?
      • by Anonymous Coward
        > > Prosecutorial Remedies and Other Tools to End the Exploitation of Children Today

        > PROTEECT? Can't they at least spell properly?

        Okay, I'm all for speling korrectlee butt neether:

        "Prosecutorial Remedies and Other Tools to Exploit Children Today"

        nor

        "Prosecutorial Remedies and Other Tools to End Children Today" would get much support during an election year.
      • by identity0 ( 77976 ) on Saturday May 22, 2004 @03:50PM (#9226060) Journal
        As it stands, I guess "PROTECT Act" stands for either:

        "Prosecutorial Remedies and Other Tools to End Children Today Act" - An act that shall finally address the growing menace to today's society: children. Yes, we will outlaw children forever, and end the suffering of untold numbers of would-be parents. Won't someone think of the children?!

        or "Prosecutorial Remedies and Other Tools to Exploit Children Today Act" - Children are our most valuable resource. Why should we spend money educating those brats, when we can put them to work in the forced-labor camps? Either that, or lawmakers want to 'exploit' children without those messy child molestation trials. Won't someone think of the children?!
    • Will these forced acronyms never end?

      WITH-FANE
    • by Black Parrot ( 19622 ) on Saturday May 22, 2004 @08:36AM (#9224285)


      > Will these forced acronyms never end?

      How 'bout -

      "Law Against Media Exploitation - A Constitutional Regulation Of New York Media.

    • Is this a Backronym [wikipedia.org]?
  • Not .. Exactly (Score:5, Insightful)

    by CrankyFool ( 680025 ) on Saturday May 22, 2004 @08:11AM (#9224215)
    It sounds like when they investigated him the act was not in force yet and they had to actually get a judge to agree to the tap; that makes this not a particularly interesting or scary story -- judges have had the ability to approve taps to compromise our privacy for a long, long time now.

    It looks like PROTECT might make this at the discretion of the prosecutor which is, obviously a Very Bad Thing[tm], but it's not all that relevant in this case, it seems.
    • Re:Not .. Exactly (Score:3, Insightful)

      by txviking ( 768200 )
      Until some of those cops hacks into someone's wireless hub and produce the evidence themselves
      • Exactly (Score:5, Insightful)

        by Anonymous Coward on Saturday May 22, 2004 @08:57AM (#9224340)
        It's not far fetched to assume an overly zealous agent might consider planting evidence on a computer either. They already do this in a variety of other cases. Sometimes they are caught at it, a lot of times they aren't, and you can't tell. And there's a lot of prior cases to prove the point, the miami cops busted planting guns on suspects, trying to clear themselves of murder. the texas prosecutiors and cops who "flaked" (that's the cop slang term for it, it's so common, taken originally from gold mining and planting gold flakes I think to make a mine look better)) hundreds of people in this small town with drugs that weren't drugs, getting convictions, sending people to jail.

        There's just something spooky about it. Child porn is a real problem, but we can't deny government lying isn't a problem as well. It's a serious major problem, ongoing, chronic. Just now on drudge headlines they are investigating a secret service guy for falsifying evidence/perjury in the martha stewart case. And remember the FBI "crime lab" tests scandals of a couple of years ago.

        The bad guys commit crimes, but we have a much harder time exposing the "good guys" who really aren't. Look at all the controversy about iraq now, the weird circumstances around 9-11, prisoner abuse, etc.
        • Re: (Score:3, Interesting)

          Comment removed based on user account deletion
          • Re:Exactly (Score:5, Insightful)

            by julesh ( 229690 ) on Saturday May 22, 2004 @10:28AM (#9224611)
            Gnutella, Freenet, and other file sharing networks are rampant with child pornography. I have yet to see any outrage in particular over this.

            Then you haven't been looking very hard. Most file sharing discussion boards have frequent "what can we do to stop all the child porn... nothing, it's technically impossible to stop this kind of thing" threads. (E.g., this one [shareaza.com]).
            • Comment removed based on user account deletion
              • The problem is (Score:4, Interesting)

                by Adolph_Hitler ( 713286 ) on Saturday May 22, 2004 @11:31AM (#9224865)


                Just reporting files to the FBI does nothing. The name of the file does not tell you it is or isnt child porn. The file itself might be on the computer but this does not tell you that the owner of this computer is the child pornographer who created the file.

                So it's more complicated than simply arresting random people who have files with the wrong names or who have kiddie porn files. This does absolutely nothing to stop the creation of these files and you only are arresting the people who share it.

                To me it seems to be more of an attack on P2P and internet freedom than an attack on childporn. Everyone knows the childporn is produced offline yet everyone is focused on the internet? This would be equal to going to the ghettos and trailer parks to arrest drug addicts. Yes of course you will find drug addicts if you look for them but arresting them does absolutely nothing because the drug dealers will continue producing more drugs.

                In this situation we have to remove the producers of child porn and by doing so, the child porn will eventually become too rare to find and won't be floating around on kazaa. I don't really see how tapping peoples internet connections has anything to do with stopping childporn, it seems more like invading peoples privacy. If there is a wiretap used it should be to monitor the activity of the computer, not monitor internet activity.

                Anyone who produces childporn most likely uses Windows and one of the digital camera programs. Shouldnt law enforcement work with the makers of this software and hardware to allow them to tap just that software or access JUST the pictures on a computer? Or movies if movies are the problem could still be handled in such a way so that it does not require a wiretap.
              • However... (Score:3, Interesting)

                by Anonymous Coward
                The biggest problem with an automated approach is defining what is child pornography. When one person hears that term, they may assume the image is of an adult having sex with a child. Another person may assume it's pictures of naked kids. Another person may assume it's as little as a provacatively posed fully dressed child. The hard-core stuff is easy to spot, and most everyone agrees it's a problem. It's when you get narrowly focused groups trying to get everything labelled child porn that you run into di
          • Re:Exactly (Score:5, Insightful)

            by julesh ( 229690 ) on Saturday May 22, 2004 @10:36AM (#9224639)
            Forgot to comment on this in my previous reply.

            How do we prevent child pornography, how do we report it? I would suggest that plugins be provided to automatically scan for these items and forward significant results to the FBI or the ISP that the user is coming from. At the very least we have a moral responsibility to create software that prevents child pornographers from proliferating on the Internet.

            And how do you propose we do this? All right, a few years ago it might have been vaguely feasible to stick a keyword-scanner plugin that automatically reported anything that looked dodgy, but these days about 50% of the legitimate content (that is, people trying to promote perfectly legal porn sites, just about the only completely legal purpose file sharing networks are regularly put to) has strings of keywords added to the end that don't have anything to do with the content. There are tens of thousands of files out there with either "lolita", "underage sex", "1[23456]yo", "schoolgirl", or some other keyword that might once have meant something, but a very high proportion of these aren't what the keywords suggest, and the filename tends to make this clear. I remember coming across a whole bunch of files that were labeled "not underage porn".

            Until we have working AI that can analyse the content of the files and come to at least a 99% accurate conclusion, there is nothing that can be done on a technical level, as far as I can see.

            Sorry.
          • How do we prevent child pornography, how do we report it? I would suggest that plugins be provided to automatically scan for these items and forward significant results to the FBI or the ISP that the user is coming from. At the very least we have a moral responsibility to create software that prevents child pornographers from proliferating on the Internet.

            ...first off, how do you identify it? "Umm yeah I was just doing one-handed investigative work for the police, looking at those pics" Or are they going
        • On face value, there appears to be nothing wrong with increased police powers, for example, the ability to detain somebody for significant periods of time if they are suspected of something, without allowing the detainee to contact their lawyer or make a phone call to the outside world. Law enforcement officials would only detain bad guys, right ?

          The problem with this is that it is based on the assumption that the everybody within the law enforcement organisations involved are totally and 100% honest. Of

          • On face value, there appears to be nothing wrong with ... the ability to detain somebody for significant periods of time if they are suspected of something

            Detention = incarceration = punishment when you have been convicted of no crime. I'd say that, on the face of it, there is something very wrong with giving the police this power. Since when does suspicion give someone the right to deprive you of your freedom? Don't forget that, in the United States at least, you have the right to a trial by jury of you
    • by twitter ( 104583 ) on Saturday May 22, 2004 @10:39AM (#9224654) Homepage Journal
      The PROTECT Act - officially Prosecutorial Remedies and Other Tools to End the Exploitation of Children Today - gave authorities the right to tap into a suspect's computer to catch child abusers, including Internet pornographers. ... When Sacramento agents made their request in August 2003, the wiretap provision had not yet been used, and authorities had to convince a federal judge to grant the authority.

      That article is very disturbing. It admits that the old system worked while glorifying the newfound ability of police to wiretap anyone they feel like. It's hard for me to understand how the reporters, Stanton and Walsh, were able to twist their brains into missing the big picture.

      How on Earth can this case be seen a triumph of ghastly new police powers? This creep was caught despite the inconvenience of judicial oversite and due process. The issue is a simply put in the US Bill of Rights, amendment 4 to the Constitution:

      The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

      That is, your house will not be violated unless reasonable evidence presented and sworn too in a public court of law.

      "Terrorism" and kiddie porn are declared serious enough to remove this protection but the removal for some crimes eliminates the protection for everyone. Without that public record and oversight, anyone can be tapped as a "suspect". The potential for abuse is enormous. PROTECT is a perverse name indeed.

  • oh yeah (Score:2, Funny)

    by Anonymous Coward
    now if I can only set one of these babies up at echelon I'll know everything :)
  • by DreadCthulhu ( 772304 ) on Saturday May 22, 2004 @08:13AM (#9224220)
    This issue doesn't seem to be a big deal, for the privacy issue - the authorities did have to go to a judge and get a warrant first, just like they would for a phone tap or for an in house search.
    • This shouldn't be a problem with privacy concerns. First, they had a judge willing to authorize the tap. Second, phone taps have been in use a long time. The biggest difference here is that they were tracking data, not voice. It's not a revolutionary change to the way things are done, it's just a technology being used in a very slightly different way.
      • by Curtman ( 556920 ) on Saturday May 22, 2004 @09:26AM (#9224436)
        It's not a revolutionary change to the way things are done, it's just a technology being used in a very slightly different way

        I beg to differ. If they present evidence at your trial where they have your voice on tape describing a crime, that's one thing.. But presenting a log of bits with your IP on them as evidence to a non-technical, ill-informed, pedophilia hysterical jury, they might just believe that it necessarily proves that you committed the crime. In this day and age of botnets, and sasser worms, that scares me a bit.
    • I'm glad you aren't not worried. At this point in history, government lying is a well developed art form.

      I find it most interesting that no one speaks up for the rights of the individuals as long as the cops can say 'it's for the children'.
  • by Pave Low ( 566880 ) on Saturday May 22, 2004 @08:14AM (#9224226) Journal
    From the article:
    When Sacramento agents made their request in August 2003, the wiretap provision had not yet been used, and authorities had to convince a federal judge to grant the authority.

    The court order was granted, with a requirement that two groups of agents be involved in monitoring Morgan. The first scrutinized his computer use and culled out everything not related to the investigation. The rest was turned over to the second team.

    Everything was by the book here. Now, it's just that computer users aren't invulnerable to using the Internet to commit crimes, the Feds have caught up.

    • And then the two groups of agents met over some beers after work and exchanged all the details.
  • Not the first... (Score:5, Informative)

    by JohnnyCannuk ( 19863 ) on Saturday May 22, 2004 @08:15AM (#9224227)
    I believe this is exactly how the RCMP and the Montreal Urban Community Police (MUC) caught Mafia Boy back in 2000....

  • Implementation (Score:5, Interesting)

    by beachplum ( 777797 ) on Saturday May 22, 2004 @08:15AM (#9224228) Homepage
    Just curious, I realize a lot of slashdotters have jobs where you have to help with implementing some of these things, how do you feel when asked to assist?
    • Re:Implementation (Score:3, Interesting)

      by MoonFog ( 586818 )
      What is the problem in it? If you've read the article you'd see that there is no difference here compared to tapping a telephone, it's just the first time it's been done this way. If they can catch child pr0n people with this stuff I'm all for it.
      • by account_deleted ( 4530225 ) on Saturday May 22, 2004 @08:27AM (#9224257)
        Comment removed based on user account deletion
      • What is the problem in it? If you've read the article you'd see that there is no difference here compared to tapping a telephone, it's just the first time it's been done this way. If they can catch child pr0n people with this stuff I'm all for it.


        What he said. There are some sick fux out there who think that children are sexual playthings. If I were King I'd be all like, "OFF WITH HIS SCROTUM!!"
      • Re:Implementation (Score:2, Insightful)

        by bconway ( 63464 ) *
        What about when it's for copyright infringement? That's still illegal, you know.
    • I'd feel great.
  • Good Idea (Score:3, Informative)

    by Timesprout ( 579035 ) on Saturday May 22, 2004 @08:16AM (#9224229)
    This is one of the more rational and intelligent responses I have seen to address what is a hugely emotive issue.
  • Umm... (Score:3, Insightful)

    by Kjella ( 173770 ) on Saturday May 22, 2004 @08:27AM (#9224258) Homepage
    ...first off it's approved by a court order, so no problems there. Second, what's the big deal about "live" as opposed to "near-real" time? I mean computer logs are kinda like a tape of a regular wiretap. Yes, you might have an officer to listen in "live", but unless that's about something going down in the next few minutes, does that matter?

    What's more surprising is that they haven't been able to do this before. drop a LOG line in iptables and you can have a complete log of every packet, live. Somehow I fail to see the big difficulty in this...

    Kjella
    • Re:Umm... (Score:4, Insightful)

      by Vellmont ( 569020 ) on Saturday May 22, 2004 @08:47AM (#9224311) Homepage

      What's more surprising is that they haven't been able to do this before. drop a LOG line in iptables and you can have a complete log of every packet, live.

      Except where's the machine with the huge hard-drive that's intercepting all the packets and logging them? You can't run iptables on the cable modem.

      The interesting part is just that they've got some kind of device to sniff cable or DSL modems and send them somewhere to be analysed. Then you'd have to put everything back together again into meaningfull data (including intercepting binary transmissions). It's _far_ more complicated than a simple tap of a voice line.
      • Yes, that and the fact that there is nothing compelling an ISP to log everything, there is no law requiring them to do so, if the do, they can't delete the logs because that would be destruction of evidence.
        • It's only destruction of evidence if there is an investigation and the ISP is aware of it.

          Until then, it's just data.

          After however... its a crime.
  • by dupper ( 470576 ) * on Saturday May 22, 2004 @08:34AM (#9224279) Journal
    Brought to you by a commission of Acronyms Sliding into Silliness through Halfwits Appending with Thesauruses Simple-mindedly (ASSHATS).
  • This is MUCH better. (Score:3, Interesting)

    by Shoten ( 260439 ) on Saturday May 22, 2004 @08:37AM (#9224290)
    With technology like this in place, it becomes harder for the government to justify the need for less discriminate and more easily abused capablities like Carnivore/DCS-1000 or their demands that VoIP wiretapping capability be built into ISP networking gear. If they can tap someone's net connection like their phone line, they don't need to have things installed in every ISP to be able to track what someone does.
    • "Look here, how much we can do when we wiretap one person. Imagine what it'd be like if we could retroactively monitor everyone like this with a system like Carnivore. We could simply look up their logs and put them away!"

      Of course, you could say the same about pretty much everything. Let's log all phone calls so they can go back and listen to everyone that chatted up or SMSed a kid, and track all our movements so we can see who flew/drove in to meet a kid, or track all money so we can see who gave a kid m
  • Seriously... (Score:5, Insightful)

    by 222 ( 551054 ) <stormseeker@nOsPAm.gmail.com> on Saturday May 22, 2004 @08:46AM (#9224307) Homepage
    you still need a judge to ok something like this, and who *really* wants to bother supporting child porno slime.
    These guys followed the letter of the law, and im glad they caught the guy. Case closed.
  • internet wiretapping can be useful but the pointless-to-society-that-only-benefits-higher-up s type of wiretapping (such as spying on everyone at all times to get info on them (such as spyware) and to just get people on anything, and to get them on anything corporations feel they can get them on, etc) is bad.

    certain things can be good, as long as people use them for the right reasons (as we know, doesnt happen) but it doesnt matter anyways, the FBI taps people all the time without them knowing it, but the
  • by Chatmag ( 646500 ) <editor@chatmag.com> on Saturday May 22, 2004 @09:01AM (#9224351) Homepage Journal
    I'm glad to see that the Feds are pursuing predators online by using methods that will stand up in court, rather than the questionable tactics [chatmag.com] used by the vigilantes of Perverted Justice [perverted-justice.com]
    • "used by the vigilantes"

      Vigilantism could work, just have them cut off all their penises, or for woman their breasts.

      Also the sick species of Bonobo Chimps [wikipedia.org] should be wiped out since those animals fuck each other, even adult / child sexual intercourse. Such a sick fucking world we live in, we must reject anything that is disgusting or different from us and make it extinct.

  • Two sided (Score:5, Interesting)

    by QBasicer ( 781745 ) on Saturday May 22, 2004 @09:01AM (#9224352) Homepage Journal
    I don't know about you, but I hate this invasion of privacy the gouvenment is doing.

    I have nothing to hide, and most people don't, but in a few years, everybody will be scared to click links because of fear of what might load, and the cops thinking they went there on purpose.

    And yes, it will happen, and it pretty much already is (with cellphones and other methods of telecommunication).
    • Are you afraid to get onto a plane because somebody might have slipped a gun into your bag and claim you were trying to hijack it? It's about as likely to be a problem.

      This tap was authorised by a judge, presumably because there was _already_ compelling evidence against the man, just not enough to get a conviction.
  • by Anonymous Coward
    Why didn't this guy use encryption, good encryption techniques would defeat the cops, them being the man in the middle.

    Pedophiles are not smart enough to use encryption?
  • by Anonymous Coward on Saturday May 22, 2004 @09:04AM (#9224358)
    Do the feds ever actually bust the guys making the porn in the first place i.e. doing the real explotation. Or do they always just bust some sorry shlub who tried to download some old .jpeg and never touched a kid in his life?
    • I've no idea what happens in the US, but in the UK they do go after the people making it. They also go after the downloaders because, among other reasons, this provides them with the evidence (the child porn) to locate the people who made it. Also, until they've arrested and investigated the guy, how are they supposed to know whether or not he's making his own?
    • The "sorry shlub"s comprise the market. If there's no money in child pr0n, there's no need to continue the industry. Yes, it is impossible to remove the market, but it can be cut significantly, with direct arrests and just fear of arrest.
  • by sam1am ( 753369 ) on Saturday May 22, 2004 @09:33AM (#9224458)
    One of the advantages (assuming they use it this way) is a real-time wiretap lets them confirm who is actually *at* the computer when something's happening. A log, unless combined with large amounts of surveillance, can not necessarily be correlated back to an individual. But now, they can see illegal activity and go look at who's doing it while it's happening.

    (Hopefully they are, and aren't just assuming the owner of a computer is the one breaking the law..)
  • Thats nothing (Score:4, Informative)

    by Anonymous Coward on Saturday May 22, 2004 @09:44AM (#9224491)

    In the netherlands somewhere in the nineties law was developed forcing isp`s to make their networks tappable. The first plan was based on the idea that this would be just as easy as with previously goverment owned telephone compnies wich always cooparated with police investigations. Internet providers howevery are many *many* small buisnesses that operate on much tighter margins and are owned by an entire diffren kind of people. And the goverment wanted to listen in on all of them. This became a big conflict. The conflict even gave rise to a very small group of people that figured that in order to meet these requirements cheaply, scaleable and securely an opensource implementation of the goverment proposed protocols should be made. The site [opentap.org] is still alive and contains a world of information on goverment imposed eavesdropping in all sorts of networks. (read the cyberpunks collection of standards and documentation, Or better yet get the more recent docs for free at etsi.org and the osi sites. Goverment acces is developed into standards nowadays which is ofcourse much cheaper then adding it when networks are up and running [cryptome.org]. This was demonstrated when german celluar phone users where billed for having their phones listened into ;-). This also includes some information on the biometric/rfid passport ideas that politicians think are a great idea becouse... you know terrorist and stuff, let pump millions in this and get on our way kissing babies and doing TV interviews okey?)

    Currently, most big providers (I think mostly the ones owned by kpn including XS4ALL???) have machines in their network permanently to sniff traffic when a warrant arrives. This can`t be that hard, people keep saying the netherlands taps more phones then the US but real numbers that are reliable are very hard to come by (dutch link) [www.bof.nl]. These machines then tunnel the sniffed traffic to central collection machines. For this the "ITO" is peering with all major isp`s. The dutch internet service provider association has a couple of the sniffing machines provider can borrow if they dont have their own. I havent actually read the current version of these laws but in preivous version webhosters to should sniff traffic when asked to.

    Ofcourse noone knows when this network is used, but it is safe to guess that the title of the first internet connection litened in to life by goverment snoops goes to the "hacking at large 2001" event (Lots of tents in a field, big network, lots of visitors and speakers on many topics and a big internet pipe). The then public traffic graph of the ASN of the goverment collection facility spiked really high during the days of that event ;-). I dont recal if it was this event or another one like it where people found out the police claimed to be dealing with "subversive anachist". When people found out about this T-shirts where sold with the text "staatsgevaarlijke anarchist", these where quite populair. OFcourse If this was the event the police was looking at then it would make sense that visitors where called dangerous, there needed to be a reasing for listening in.... what better reason then being anarchist-ish, terrorist-ish or terrorist-ish people releated, with a bit of pirate flavour to finish the mix.

    Ofcourse, we can all look ahead at another fantastic episode in this series. Unlike other epic sagas (starwars) these episodes get not only bigger but also better and more exciting every time ;-) You see the European union has been buzzing with the idea of mandating the storage of traffic data of not only telephone providers but also internet providers (and hosters?) for years. But a new proposol [eu.int] for this idea has recently been introduced by Britan, France, Ireland and Sweden... Imagene being forced to store terrabytes of logs on 99.999999

  • Thing is... (Score:4, Insightful)

    by demonhold ( 735615 ) on Saturday May 22, 2004 @09:45AM (#9224492) Journal
    In the Macarthy (sp) era you only had to point someone and scream "red", "pinko", "commie" and that individual's life was done for. Down the drain for good...

    What tell us that in the near future someone won't cry "pedophile" "child abuser" "terrorist" and your life goes down the drain. And nowadays evidence is soooooo easy to fake, and juries tend to be so damned illitare...

    This is not the whole thing, though, with worms and virus and spywares doing the gods know what to your computer, using your storage for the gods know what purposes, who can assure us that we won't wake up some day to the sound of the police storming our door and the press cameras getting us labeled as "worse than scum" for the rest of our life...

    • Re:Thing is... (Score:3, Insightful)

      by praedor ( 218403 )

      Uh...it is already that way now and it has nothing to do with evils such as the "Patriot Act", TIA, the PROTECT Act, etc. All that needs to happen to you is ANYONE point at you and yell, "Pedophile!" or "Rapist!". That's it. Even if you are absolutely innocent in all possible ways, you are "labelled" now, at least in your community, and you will have trouble. Any child disappearance, any rape, and you will fall under suspicion.

      This is particularly true of people who are teachers or professors. All it

  • What happens when this is used as a test case for including the right to record the internet habits of anyone they like in the next draconian revision to the Patriot Act? They might have needed a judge this time but all the authorities would have to do is claim it will help them monitor terrorists and the current state of paranoia will have a good chance of pushing any proposed bill through, no matter how invasive.

    Obviously I have no objection to getting another vile kiddie-porn peddler off the streets, t

  • I have 2 thoughts. (Score:4, Interesting)

    by Raven42rac ( 448205 ) * on Saturday May 22, 2004 @09:51AM (#9224507)
    1) Internet wiretapping has been going on for years, this does not surprise me.
    2) It will be very difficult to garner any sympathy for these sickos from myself or the /. community.
    Or any community for that matter.
  • There is plenty of porn out there that depicts 18 - 19 year olds as being much younger (or so I here), are these kind of images also illegal and considered child porn?
  • by foidulus ( 743482 ) * on Saturday May 22, 2004 @10:19AM (#9224580)
    Than going after the consumers versus going after the producers(I'm not defending consumers in any way though). All this will do is ensure that the consumers use better cryptography etc to protect what they are doing. Just like they started to use the internet after the government went after the people who would order it by mail.
    There is a different, and better way to catch these people. Most of these scumbags who make this stuff are quite proud of what they do, and often put both their faces and the faces of their victims in the picture. Canadian and US authorities have recently been using these faces to track down both the people commiting the acts and the victims. Going after the producers is a lot easier, and probably a lot more effective at stopping future abuse than going after consumers(esp. ones who don't pay any money), since the producers will probably continue to abuse new children regardless of whether or not they share the photos.
  • Interestingly enough (Score:5, Interesting)

    by Effugas ( 2378 ) on Saturday May 22, 2004 @10:29AM (#9224612) Homepage
    The farther you get from an endpoint, the harder it is to actually reassemble the stream. This is because packets can take multiple routes to their destination -- if not through load balancing, then through asymmetric routes (i.e. the packets from the client to the server are taking a wildly different network route from the path taken from server to client.)

    Asymmetric routing always seems to confuse people. It shouldn't -- the traffic on the freeways isn't symmetrical in each direction, and sometimes it makes sense to take one highway to work and another back.

    Upshot of all this is that, while all the long haul fiber lines actually are probably tapped by someone or other, it's an enormously tricky problem to integrate the data accurately, and you ultimately still don't get as good results as having a direct feed a hop or two up from the endpoint being monitored.

    Now, there have been tools for quite some time to do realtime stream monitoring -- Driftnet is a cheap (and occasionally very scary) one, but there have been solutions floating around the corporate space that basically reassemble a browser screen in realtime. I imagine the gov space has even nicer stuff.

    You know, "tcpbust" (a sniffer with integrated safe reassembly, third party cryptographically signed timestamps, and a pony) would probably be a really interesting thing to write...

    --Dan
  • I'm surprised that the issue of the lack of encrypted communication in this case hasn't been brought up. Pretty much limits law enforcement into only catching the more idiotic cleartext perverts. Begs the question of gov't access to encrypted communications. I wonder how many privacy-loving Slashdotters would flip on this issue if they had young children. Teenage girls spend hours chatting online these days...
  • by scupper ( 687418 ) * on Saturday May 22, 2004 @12:29PM (#9225143) Homepage
    Remember this story for the UK:
    Trojan horse found responsible for child porn [zdnet.co.uk]
    Munir Kotadia | ZDNet UK | August 01, 2003
    Excerpt:
    This is thought to be the second case in the UK where a "Trojan defence" has been used to clear someone of such an accusation. In April, a man from Reading was found not guilty of the crime after experts testified that a Trojan could have been responsible for the presence of 14 child porn images on his PC.
  • by Xemu ( 50595 ) on Saturday May 22, 2004 @01:26PM (#9225407) Homepage


    You too can help!

    If you find child porn on the internet, please contact SAVE THE CHILDREN at http://www.rb.se/hotline/ [www.rb.se]

    You are geeks, you can traceroute. Help make the world a better, safer place for children!

  • by Anonymous Coward on Saturday May 22, 2004 @04:10PM (#9226149)
    The child pornography "problem" was invented by the Meese Commission back in the Reagan years, as a way around the Constitutional limitations on censoring pornography generally. If you actually read the 1985 Meese Commission report, they're quite clear about their intent. (There's quite a bit of material on line about the Meese Commission report, most of it critical, but the report itself is hard to find.)

    So the next step was to criminalize pure possession of child pornography. (Molesting children was already illegal, but having pictures of it wasn't until the Reagan years.) This made it much easier for law enforcement to make arrests, and, significantly, provided much broader reasons for search and seizure.

    Then came the child porno entrapment industry. Law enforcement started sending out child pornography and seeing who'd bite. This is far less work than finding real child abusers, but generates cases.

    As with most forms of self-generating police activity, there's a tendency to lose touch with reality in such operations. In the complaint-driven end of law enforcement, performance is measureable - how many murders were solved, how many stolen cars were recovered. There are "customers" (people who report crimes) to be satisfied.

    Self-generated law enforcement activity (drugs, porno, "red hunting" in the 1930s and 1950s, and today "terrorism") doesn't have "customers", so there's a strong tendency for it to get out of control.

    The worst abuses come when self-generated law enforcement activity becomes self-financing through seizures. So far, child pornography and terrorism enforcement haven't reached that level. The "war on drugs" reached that level about fifteen years ago. For some law enforcement organizations, it's a profit center.

Dynamically binding, you realize the magic. Statically binding, you see only the hierarchy.

Working...