784 lines
33 KiB
Plaintext
784 lines
33 KiB
Plaintext
|
|
Computer underground Digest Sun Feb 1, 1998 Volume 10 : Issue 08
|
|
ISSN 1004-042X
|
|
|
|
Editor: Jim Thomas (cudigest@sun.soci.niu.edu)
|
|
News Editor: Gordon Meyer (gmeyer@sun.soci.niu.edu)
|
|
Archivist: Brendan Kehoe
|
|
Shadow Master: Stanton McCandlish
|
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|
Ralph Sims / Jyrki Kuoppala
|
|
Ian Dickinson
|
|
Field Agent Extraordinaire: David Smith
|
|
Cu Digest Homepage: http://www.soci.niu.edu/~cudigest
|
|
|
|
CONTENTS, #10.08 (Sun, Feb 1, 1998)
|
|
|
|
File 1--Court Blocks Discharge in Navy/AOL Privacy Case (EPIC Alert)
|
|
File 2--The EFF Pioneer Awards -1998
|
|
File 3--Quad/Graphics v. Sthrn Adirondack Lib System
|
|
File 4--National & International Communications Interceptions Networks
|
|
File 5--How Big is the Internet Today?
|
|
File 6--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|
|
|
CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
|
|
THE CONCLUDING FILE AT THE END OF EACH ISSUE.
|
|
|
|
---------------------------------------------------------------------
|
|
|
|
Date: Mon, 26 Jan 1998 17:43:30 -0500
|
|
From: EPIC-News List <epic-news@epic.org>
|
|
Subject: File 1--Court Blocks Discharge in Navy/AOL Privacy Case (EPIC Alert)
|
|
|
|
==============================================================
|
|
Volume 5.01 January 26, 1998
|
|
--------------------------------------------------------------
|
|
|
|
Published by the
|
|
Electronic Privacy Information Center (EPIC)
|
|
Washington, D.C.
|
|
|
|
http://www.epic.org/
|
|
=======================================================================
|
|
[1] Court Blocks Discharge in Navy/AOL Privacy Case
|
|
=======================================================================
|
|
|
|
A federal judge has enjoined the dismissal of a highly decorated sailor
|
|
after finding that the proposed discharge was based upon information the
|
|
Navy obtained from America Online in apparent violation of federal
|
|
privacy law. The decision, issued today by U.S. District Judge Stanley
|
|
Sporkin, concludes that Naval investigators "likely" violated the federal
|
|
Electronic Communications Privacy Act (ECPA) when they requested and
|
|
received confidential subscriber information from AOL, the nation's
|
|
largest online service. (Excerpts from the decision are included below).
|
|
|
|
Navy officials had ordered the discharge of the sailor, Timothy R.
|
|
McVeigh (no relation to the convicted Oklahoma City bomber), on the
|
|
ground that McVeigh violated the military's "Don't Ask, Don't Tell"
|
|
policy on homosexuality. The Navy's proposed action is based entirely
|
|
upon information obtained from AOL linking the sailor to a "screen name"
|
|
on the system in which the user's marital status was listed as "gay."
|
|
|
|
The information was received from AOL in violation of ECPA, which
|
|
prohibits the government from obtaining "information pertaining to a
|
|
subscriber" without a court order or subpoena. In addition to the
|
|
privacy protections contained in ECPA, AOL's contractual "Terms of
|
|
Service" prohibit the company from disclosing such information to *any*
|
|
third party "unless required to do so by law or legal process."
|
|
|
|
McVeigh's lawsuit is the first case to challenge governmental access to
|
|
sensitive subscriber information maintained by an online service. In a
|
|
statement issued when the suit was filed last week, EPIC said, "It is an
|
|
important test of federal privacy law that will determine whether
|
|
government agents can violate the law with impunity, or whether they will
|
|
be held accountable for illegal conduct in cyberspace." EPIC noted that
|
|
the incident also raises serious questions concerning the adequacy of
|
|
contractual privacy protections like those contained in the AOL
|
|
subscriber agreement.
|
|
|
|
In a letter sent to Navy Secretary John Dalton on January 14, EPIC urged
|
|
a postponement of McVeigh's discharge pending an investigation of the
|
|
Navy's conduct. EPIC noted that, "Any other result would make a mockery
|
|
of federal privacy law and subject the American people to intrusive and
|
|
unlawful governmental surveillance."
|
|
|
|
More information on the case, including a form for sending faxes to the
|
|
White House and the Pentagon, is available at:
|
|
|
|
http://www.hrc.org/mcveigh/
|
|
|
|
=======================================================================
|
|
[2] Excerpts From Court Decision in Navy/AOL Privacy Case
|
|
=======================================================================
|
|
|
|
From the Memorandum Opinion of U.S. District Judge Stanley Sporkin in
|
|
McVeigh v. Cohen, et al. (Civil Action 98-116, D.D.C.):
|
|
|
|
The [investigative] steps taken by the Navy in its "pursuit" of the
|
|
Plaintiff were not only unauthorized under its [Don't Ask, Don't Tell]
|
|
policy, but likely illegal under the Electronic Communications Privacy
|
|
Act of 1986 (ECPA). . . .
|
|
|
|
The government knew, or should have known, that by turning over the
|
|
information without a warrant, AOL was breaking the law. Yet the Navy,
|
|
in this case, directly solicited the information anyway. What is most
|
|
telling is that the Naval investigator did not identify himself when he
|
|
made his request. . . .
|
|
|
|
In these days of "big brother," where through technology and otherwise
|
|
the privacy interests of individuals from all walks of life are being
|
|
ignored or marginalized, it is imperative that statutes explicitly
|
|
protecting these rights be strictly observed. . . .
|
|
|
|
Certainly, the public has an inherent interest in the preservation of
|
|
privacy rights as advanced by the Plaintiff in this case. With
|
|
literally the entire world on the world-wide web, enforcement of the
|
|
ECPA is of great concern to those who bare the most personal
|
|
information about their lives in private accounts through the Internet.
|
|
In this case in particular, where the government may well have violated
|
|
a federal statute in its zeal to brand the Plaintiff a homosexual, the
|
|
actions of the Navy must be more closely scrutinized by the Court.
|
|
|
|
=======================================================================
|
|
Subscription Information
|
|
=======================================================================
|
|
|
|
The EPIC Alert is a free biweekly publication of the Electronic
|
|
Privacy Information Center. To subscribe or unsubscribe, send email
|
|
to epic-news@epic.org with the subject: "subscribe" (no quotes) or
|
|
"unsubscribe". A Web-based form is available at:
|
|
|
|
http://www.epic.org/alert/subscribe.html
|
|
|
|
Back issues are available at:
|
|
|
|
http://www.epic.org/alert/
|
|
|
|
------------------------------
|
|
|
|
Date: Mon, 26 Jan 1998 09:13:00 -0800 (PST)
|
|
From: Mike Godwin <mnemonic@well.com>
|
|
Subject: File 2--The EFF Pioneer Awards -1998
|
|
|
|
THE SEVENTH ANNUAL INTERNATIONAL EFF PIONEER AWARDS:
|
|
CALL FOR NOMINATIONS
|
|
|
|
* Please feel free to redistribute this notice in appropriate forums. *
|
|
|
|
In every field of human endeavor,there are those dedicated to expanding
|
|
knowledge, freedom, efficiency and utility. Along the electronic frontier,
|
|
this is especially true. To recognize this, the Electronic Frontier
|
|
Foundation established the Pioneer Awards for deserving individuals and
|
|
organizations.
|
|
|
|
The Pioneer Awards are international and nominations are open to all.
|
|
|
|
In March of 1992, the first EFF Pioneer Awards were given in Washington
|
|
D.C. The winners were: Douglas C. Engelbart, Robert Kahn, Jim Warren, Tom
|
|
Jennings, and Andrzej Smereczynski. The 1993 Pioneer Award recipients were
|
|
Paul Baran, Vinton Cerf, Ward Christensen, Dave Hughes and the USENET
|
|
software developers, represented by the software's originators Tom
|
|
Truscott and Jim Ellis. The 1994 Pioneer Award winners were Ivan
|
|
Sutherland, Whitfield Diffie and Martin Hellman, Murray Turoff and Starr
|
|
Roxanne Hiltz, Lee Felsenstein, Bill Atkinson, and the WELL. The 1995
|
|
Pioneer Award winners were Philip Zimmermann, Anita Borg, and Willis Ware.
|
|
The 1996 Pioneer Award winners were Robert Metcalfe, Peter Neumann,
|
|
Shabbir Safdar and Matthew Blaze. The 1997 Pioneer Award winners were Hedy
|
|
Lamarr and George Antheil (who won a special award), Marc Rotenberg, and
|
|
Johan Helsingius.
|
|
|
|
The 7th Annual Pioneer Awards will be given in Austin, Texas, at
|
|
the 8th Conference on Computers, Freedom, and Privacy in February of 1998.
|
|
|
|
All valid nominations will be reviewed by a panel of judges chosen
|
|
for their knowledge of computer-based communications and the technical,
|
|
legal, and social issues involved in computer technology and computer
|
|
communications.
|
|
|
|
There are no specific categories for the Pioneer Awards, but the
|
|
following guidelines apply:
|
|
|
|
1) The nominees must have made a substantial contribution to the
|
|
health, growth, accessibility, or freedom of computer-based
|
|
communications.
|
|
|
|
2) The contribution may be technical, social, economic or cultural.
|
|
|
|
3) Nominations may be of individuals, systems, or organizations in the
|
|
private or public sectors.
|
|
|
|
4) Nominations are open to all, and you may nominate more than one
|
|
recipient. You may nominate yourself or your organization.
|
|
|
|
5) All nominations, to be valid, must contain your reasons, however
|
|
brief, for nominating the individual or organization, along with a means of
|
|
contacting the nominee, and, ideally, your own contact number. Anonymous
|
|
nominations will be allowed, but we prefer to be able to contact the
|
|
nominating parties in the event that we need more information..
|
|
|
|
6) Every person or organization, with the single exception of EFF staff
|
|
members, may be nominated for a Pioneer Award.
|
|
|
|
7) Persons or representatives of organizations receiving a Pioneer Award
|
|
will be invited to attend the ceremony at the Foundation's expense.
|
|
|
|
You may nominate as many as you wish, but please use one form per
|
|
nomination. You may return the forms to us via email (preferred) to:
|
|
|
|
pioneer@eff.org
|
|
|
|
You may fax them to us at:
|
|
|
|
+1 415 436 9993
|
|
|
|
Just tell us the name of the nominee, the phone number or email address at
|
|
which the nominee can be reached, and, most important, why you feel the
|
|
nominee deserves the award. You may attach supporting documentation.
|
|
Please include your own name, address, and phone number.
|
|
|
|
We're looking for the Pioneers of the Electronic Frontier that have made
|
|
and are making a difference. Thanks for helping us find them,
|
|
|
|
The Electronic Frontier Foundation
|
|
|
|
-------EFF Pioneer Awards Nomination Form------
|
|
|
|
Please return to the Electronic Frontier Foundation the following
|
|
information about your nominee for the Pioneer Awards:
|
|
|
|
Nominee's name:
|
|
|
|
Title:
|
|
|
|
Company/Organization:
|
|
|
|
Contact number or email address:
|
|
|
|
Reason for nomination:
|
|
|
|
Your name and contact information:
|
|
|
|
Extra documentation attached:
|
|
|
|
------------------------------
|
|
|
|
Subject: File 3--Quad/Graphics v. Sthrn Adirondack Lib System
|
|
Date: Sun, 25 Jan 1998 14:34:15 -0600
|
|
From: jthomas@SUN.SOCI.NIU.EDU(Jim Thomas)
|
|
|
|
((MODERATORS' NOTE: Here's the text of the decision reported by a
|
|
recent poster regarding a company's attempt to access the user
|
|
records of a library to determine who had used the libraries
|
|
computers to allegedly access the company's computer resources.))
|
|
|
|
source: http://www.lcp.com/products/NY/slipops/pay/misc/F9757370.htm
|
|
|
|
Matter of Quad/Graphics, Inc. v Southern Adirondack Lib. Sys.
|
|
|
|
|
|
IN THE MATTER OF QUAD/GRAPHICS, INC., Petitioner, v. SOUTHERN
|
|
ADIRONDACK LIBRARY SYSTEM, Respondent.
|
|
|
|
Miscellaneous Courts -- 1997 NYSLIPOP 97573
|
|
|
|
Index No. 97-386
|
|
|
|
|
|
RJI 45-1-97-0189
|
|
|
|
|
|
|
|
SUPREME COURT
|
|
|
|
|
|
|
|
SARATOGA COUNTY
|
|
|
|
DECISION
|
|
|
|
COUNSEL
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
APPEARANCES:
|
|
|
|
|
|
|
|
BOND, SCHOENECK & KING, L. L. P., Albany, for petitioner.
|
|
|
|
|
|
|
|
EDWARD LINDNER, Saratoga Springs, for respondent.
|
|
|
|
|
|
|
|
|
|
_________________________________________________________________
|
|
|
|
|
|
|
|
OPINION
|
|
|
|
|
|
|
|
MAJORITY
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
KENIRY, J.:
|
|
|
|
|
|
|
|
In a case of first impression, petitioner corporation seeks to compel
|
|
pre-litigation disclosure of the names of certain of its employees
|
|
whom it suspects have misappropriated corporate computer resources.
|
|
Quad Graphics, Inc. is a major national commercial printing company.
|
|
Its headquarters is in Wisconsin. It maintains a large plant (1,000
|
|
employees) in Saratoga Springs, New York. Petitioner uses computers
|
|
extensively in its business. Examination of relatively high
|
|
long-distance telephone bills led the corporation to suspect that its
|
|
computers were being misused.
|
|
|
|
|
|
|
|
The respondent in the case is Southern Adirondack Library System
|
|
(SALS). SALS is a cooperative system composed of 30 member libraries
|
|
located in four upstate New York counties. Respondent operates, from
|
|
its headquarters in Saratoga Springs, New York, an electronic
|
|
information service known as "Library Without Walls". Users of
|
|
"Library Without Walls" (LWW) possessing a valid library card and a
|
|
personal identification number issued by any one of SALS'
|
|
participating libraries, may access the "Internet". A library-based
|
|
computer or a personally-owned computer can be used to log online.
|
|
Access is free for 30 minute periods.
|
|
|
|
|
|
|
|
Quad Graphics employees are prohibited from using Quad Graphics
|
|
computers for personal purposes. Petitioner's Saratoga computer
|
|
terminals do not have the capability of directly accessing outside
|
|
telephone lines. However a computer operator in the Saratoga Springs
|
|
plant may log into the company's mainframe computer located in
|
|
Wisconsin. The terminal user can cause the mainframe by the use of a
|
|
Quad Graphics password to access long distance. Then by telephoning
|
|
the library in Saratoga Springs and providing a correct library
|
|
password the employee-caller accomplishes a hook up with the LWW
|
|
(third party) computer network.
|
|
|
|
|
|
|
|
Petitioner contends that a cadre of its Saratoga Springs-based
|
|
employees employed the library feature during working hours to effect
|
|
the hookup and explore the "Internet" for personal purposes.
|
|
Petitioner, after examining its long distance telephone billing
|
|
records, asserts that unauthorized use between April 1995 and December
|
|
1996 has resulted in petitioner incurring over $23,000 in long
|
|
distance telephone charges to the "LWW" telephone line and in
|
|
petitioner losing 1,770 Saratoga Springs employee manhours in devotion
|
|
to personal use of the "Internet". Petitioner, through internal
|
|
investigative techniques, has been able to decipher nine distinct
|
|
13-digit identification numbers which were used to access "LWW" from
|
|
its computer system.
|
|
|
|
|
|
|
|
Petitioner, in an effort to learn the identity of the individuals to
|
|
whom those nine identification numbers were issued, made a request
|
|
under the Freedom of Information Law (Public Officers Law, art.6) to
|
|
the Saratoga Springs Public Library for such information. Petitioner's
|
|
request was rejected by the library on the basis that such information
|
|
is confidential and may not be voluntarily disclosed. [1]
|
|
|
|
|
|
|
|
In this application petitioner contends that SALS as a quasi-municipal
|
|
agency is subject to and bound by the Freedom of Information Law and
|
|
is required to disclose the names it seeks.
|
|
|
|
|
|
|
|
SALS contends that under CPLR 4509 the identities are required to be
|
|
kept confidential.
|
|
|
|
|
|
|
|
Section 4509 of the Civil Practice Law and Rules, first enacted in
|
|
1982 (L. 1982, ch. 14) and broadened in 1988 (L. 1988, ch.112),
|
|
provides as follows:
|
|
|
|
|
|
|
|
Library records, which contain names or other personally identifying
|
|
details regarding the users of public, free association, school,
|
|
college and university libraries and library systems of this state,
|
|
including but not limited to records related to the circulation of
|
|
library materials, computer database searches, interlibrary loan
|
|
transactions, reference queries, requests for photocopies of library
|
|
materials, title reserve requests, or the use of audio-visual
|
|
materials, films or records, shall be confidential and shall not be
|
|
disclosed except that such records may be disclosed to the extent
|
|
necessary for the proper operation of such library and shall be
|
|
disclosed upon request or consent of the user or pursuant to subpoena,
|
|
court order or where otherwise required by statute.
|
|
|
|
|
|
|
|
The court has reviewed the legislative history of CPLR 4509 as
|
|
contained in the bill jackets for the original enactment and the
|
|
subsequent amendment. The supporting memorandum issued by the Assembly
|
|
of the State of New York when the law was enacted, states:
|
|
|
|
|
|
|
|
The New York State Legislature has a strong interest in protecting the
|
|
right to read and think of the people of this State. The library, as
|
|
the unique sanctuary of the widest possible spectrum of ideas, must
|
|
protect the confidentiality of its records in order to insure its
|
|
readers' right to read anything they wish, free from the fear that
|
|
someone might see what they read and use this as a way to intimidate
|
|
them. Records must be protected from the self-appointed guardians of
|
|
public and private morality and from officials who might overreach
|
|
their constitutional prerogatives. Without such protection, there
|
|
would be a chilling effect on our library users as inquiring minds
|
|
turn away from exploring varied avenues of thought because they fear
|
|
the potentiality of others knowing their reading history.
|
|
|
|
|
|
|
|
Enactment of '4509 in 1982 was supported by the New York Civil
|
|
Liberties Union, the New York Public Library and the New York County
|
|
Lawyers' Association. The State Education Department and State
|
|
University of New York raised no objection to the bill.
|
|
|
|
|
|
|
|
In 1988, the Law Revision Commission of the State of New York, acting
|
|
on a request by library staff and faculty of State University of New
|
|
York at Buffalo and its Law School, recommended that '4509 be
|
|
broadened to protect additional library records. The statute as
|
|
originally enacted protected only a library's circulation records. An
|
|
amendment enacted in 1988 protected records relating to computer
|
|
database searches, interlibrary loan transactions, reference
|
|
inquiries, photocopy requests, title reserve requests and audio-visual
|
|
materials, films and records usage information. The New York Library
|
|
Association, the State Education Department, and the New York Civil
|
|
Liberties Union supported broadening '4509's reach.
|
|
|
|
|
|
|
|
It is clear that '4509 does not grant an absolute privilege
|
|
prohibiting the disclosure of library records. The law is intended to
|
|
allow limited disclosure pursuant to court order. A court order is
|
|
precisely what petitioner seeks. The salient issue is whether or not
|
|
petitioner's expressed desire to learn the identity of individuals who
|
|
are alleged to have misused its computer system and misappropriated
|
|
its property, in order to initiate civil legal proceedings, is a
|
|
proper basis for release of the library system's records.
|
|
|
|
|
|
|
|
It is the court's determination that disclosure of the information
|
|
sought should not be permitted. Petitioner certainly has an internal
|
|
security problem involving the unauthorized use of its computer
|
|
equipment and resources. However a criminal complaint is not before
|
|
this court and apparently has not been made. Were this application to
|
|
be granted, the door would be open to other similar requests made, for
|
|
example, by a parent who wishes to learn what a child is reading or
|
|
viewing on the "Internet" via "LWW" or by a spouse to learn what type
|
|
of information his or her mate is reviewing at the public library.
|
|
|
|
|
|
|
|
The court recognizes the significance of the problem that petitioner
|
|
faces and the difficulty that petitioner has encountered in trying to
|
|
identify the users. The Legislature has expressed, in rather direct
|
|
and unequivocal fashion, a public policy that the confidentiality of a
|
|
library's records should not be routinely breached and this court, in
|
|
denying the petitioner's request, is following the clearly expressed
|
|
legislative purpose of CPLR 4509.
|
|
|
|
|
|
|
|
One of the petitioner's other arguments deserves brief comment.
|
|
Petitioner contends that disclosure of the records sought is required
|
|
under '4509 since it, as the owner of the computer equipment and
|
|
telephone lines utilized to access the Internet, should be considered
|
|
the "user" of "LWW" and thus it is entitled to the information as a
|
|
matter of right. The argument is specious. The operation of a computer
|
|
is controlled by the person who gives it commands. The users in this
|
|
case are the individuals who actually operated the computers guiding
|
|
them through the "Internet".
|
|
|
|
|
|
|
|
Petitioner's application is denied without costs.
|
|
|
|
Dated: September 30, 1997, Ballston Spa, New York
|
|
|
|
|
|
|
|
Footnotes
|
|
|
|
Footnote 1: The Saratoga Springs Public Library was originally named
|
|
as the respondent in this proceeding. An order, based upon a written
|
|
stipulation, was made and entered substituting SALS as respondent
|
|
since "LWW" was and is a program of SALS and not of the Saratoga
|
|
Springs Public Library.
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 27 Jan 1998 23:18:21 +1100
|
|
From: Felipe Rodriquez <felipe@xs4all.nl>
|
|
Subject: File 4--National & International Communications Interceptions Networks
|
|
|
|
I think this may be of interest to this list. This report is not available
|
|
electronically, so I typed in the most interesting part. If you are
|
|
interested in obtaining a free copy of the report, then refer to the bottom
|
|
of this message and use the example-fax that is attached there.
|
|
|
|
|
|
This message is a quote from a report published by the EU Parliament:
|
|
|
|
AN APPRAISAL OF TECHNOLOGIES OF POLITICAL CONTROL
|
|
Published by Scientific and Technological Options Assessment (STOA)
|
|
Directorate General for Research
|
|
Luxembourg 6 january 1998
|
|
Document nr: PE 166 499
|
|
|
|
"The document is a working document. The current version is being
|
|
circulated for consultation. It is not an official publication of STOA or
|
|
of the European Parliament. The document does not necessarily represent the
|
|
views of the European Parliament."
|
|
|
|
"4.4 National & International Communications Interceptions Networks
|
|
|
|
Modern communications systems are virtually transparent to the advanced
|
|
interceptions equipment which can be used to listen in. Some systems even
|
|
lend themselves to a dual role as a national interceptions network. For
|
|
example the message switching system used on digital exchanges like System
|
|
X in the UK supports an Integrated Services Digital Network (ISDN)
|
|
protocol. This allows digital devices. E.g. fax to share the system with
|
|
existing lines. The ISDN subset is defined in their documents as "Signaling
|
|
CCITT1-series interface for ISDN access. What is not widely known is that
|
|
built in to the international CCITT protocol is the ability to take phones
|
|
'off hook' and listen to the conversations occurring near the phone,
|
|
without the user being aware that it is happening. (SGR Newsletter,
|
|
No.4,1993) This effectively means that a national dial up telephone tapping
|
|
capacity is built into these systems from the start. (System X has been
|
|
exported to Russia and China) Similarly, the digital technology required to
|
|
pinpoint mobile phone users for incoming phone calls, means that all mobile
|
|
phone users in a country when activated, are mini-tracking devices, giving
|
|
their owners whereabouts at any time and stored in the company's computer
|
|
for up to two years. Coupled with System X technology, this is a custom
|
|
built mobile track, tail and tap system par excellence. (Sunday telegraph,
|
|
2.2.97)
|
|
|
|
Within Europe, all email, telephone and fax communications are routinely
|
|
intercepted by the United States National Security Agency, transferring all
|
|
target information from the European mainland via the strategic hub of
|
|
London then by satellite to Fort Meade in Maryland via the crucial hub at
|
|
Menwith Hill in the North York Moors of the UK. The system was first
|
|
uncovered in the 1970's by a group of researchers in the UK (campbell,
|
|
1981. The researchers used open sources but where subsequently arrested
|
|
under Britain's Official Secrets legislation. The 'ABC' trial that followed
|
|
was a critical turning point in researcher's understanding of both of the
|
|
technology of political control and how it might be challenged by research
|
|
on open sources. (See Aubrey, 1981 & Hooper 1987) Other work on what is now
|
|
known as Signals intelligence was undertaken by researchers such as James
|
|
Bamford, which uncovered a billion dollar world wide interceptions network,
|
|
which he nicknamed the 'Puzzle Palace'. A recent work by Nicky Hager,
|
|
Secret Power, (hager 1996) provider the most comprehensive details to date
|
|
of a project called ECHELON. Hager interviewed more than 50 people
|
|
concerned with intelligence to document a global surveillance system that
|
|
stretches around the world to form a targeting system on all of the key
|
|
Intelsat satellites used to convey most of the world's satellite phone
|
|
calls, internet, email, faxes and telexes. These sites are based at Sugar
|
|
grove and Yakima, in the USA, at Waihopai in New Zealand, at Geraldton in
|
|
Australia, Hong Kong and Morwenstow in the UK.
|
|
|
|
The ECHELON system forms part of the UKUSA system but unlike many of the
|
|
electronic spy systems developed during the cold war, ECHELON is designed
|
|
for primarily non-military targets: governments, organisations and
|
|
businesses in virtually every country. The ECHELON system works by
|
|
indiscriminately intercepting very large quantities of communications and
|
|
then siphoning out what is valuable using artificial intelligence aids like
|
|
Memex. To find key words. Five nations share the results with the US as the
|
|
senior partner under the UKUSA agreement of 1948, Britain, New Zealand, and
|
|
Australia are very much acting as subordinate information sevicers.
|
|
|
|
Each of the five centres supply "dictionaries" to the other four of
|
|
keywords, Phrases, people and places to "tag" and the tagged information
|
|
intercept is forwarded straight to the requesting country. Whilst there is
|
|
much information gathered about potential terrorists, there is a lot of
|
|
economic intelligence, notably intensive monitoring of all the countries
|
|
participating in the GA TT negotiations. But Hager found that by far the
|
|
main priorities of this system continued to be military and political
|
|
intelligence applicable to their wider interests. Hager quotes from a
|
|
"highly placed intelligence operatives" who spoke in the Observer in
|
|
London. "We feel we can no longer remain silent regarding that which we
|
|
regard to be gross malpractice and negligence within the establishment in
|
|
which we operate." They gave as examples. GCHQ interception of three
|
|
charities, including Amnesty International and Christian Aid. "At any time
|
|
GCHQ is able to home in on their communications for a routine target
|
|
request," the GCHQ source said. In the case of phone taps the procedure is
|
|
known as Mantis. With telexes its called Myfly. By keying in a code
|
|
relating to third world aid, the source was able to demonstrate telex
|
|
"fixes" on the three organisations. With no system of accountability, it is
|
|
difficult to discover what criteria determine who is not a target.
|
|
|
|
In February, the UK based research publication Statewatch reported that the
|
|
EU had secretly agreed to set up an international telephone tapping network
|
|
via a secret network of committees established under the "third pillar" of
|
|
the Maastricht Treaty covering co-operation on law and order. Key points of
|
|
the plan are outlined in a memorandum of understanding signed by EU states
|
|
in 1995. (ENFOPOL 112 10037/95 25.10.95) which remains classified.
|
|
According to a Guardian report (25.2.97) it reflects concern among European
|
|
intelligence agencies that modern technology will prevent them from tapping
|
|
private communications. "EU countries it says, should agree on
|
|
"international interception standards set at a level that would ensure
|
|
encoding or scrambled words can be broken down by government agencies."
|
|
Official report say that the EU governments agreed to co-operate closely
|
|
with the FBI in Washington. Yet earlier minutes of these meetings suggest
|
|
that the original initiative cane from Washington. According to Statewatch,
|
|
network and service providers in the EU will be obliged to install
|
|
"tappable" systems and to place under surveillance any person or group when
|
|
served with an interception order. These plans have never been referred to
|
|
any European government for scrutiny, nor one suspects to the Civil Liberty
|
|
Committee of the European Parliament, despite the clear civil liberties
|
|
issues raised by such an unaccountable system. We are told that the USA,
|
|
Australia, Canada, Norway and Hong Kong are ready to sign up. All these bar
|
|
Norway are parties to the ECHELON system and it is impossible to determine
|
|
if there are not other agendas at work here. Nothing is said about finance
|
|
of this system but a report produced by the German government estimates
|
|
that the mobile phone part of the package will cost 4 billion D-marks.
|
|
|
|
Statewatch concludes that "It is the interface of the ECHELON system and
|
|
its potential development on phone calls combined with the standardization
|
|
of "tappable communications centres and equipment being sponsored by the EU
|
|
and the USA which present a truly global threat over which there are no
|
|
legal or democratic controls" (press release 25.2.97)"
|
|
|
|
|
|
|
|
If you are interested in obtaining a free copy of this report, then
|
|
complete this fax and
|
|
send it to +32-22-849059
|
|
|
|
|
|
|
|
TO: Karin Sercu, STOA Programme
|
|
Directorate-General for Research,
|
|
Directorate B, Eastman 112,
|
|
rue Belliard 97-113, B-1047 Bruxelles, Belgium
|
|
|
|
Subject-- STOA report 'Technologies of Political Control'
|
|
|
|
|
|
FROM: "YOUR NAME AND ADDRESS HERE"
|
|
|
|
|
|
|
|
|
|
Dear Ms. Sercu,
|
|
|
|
I'd like to acquire the STOA Report "AN APPRAISAL OF TECHNOLOGIES OF
|
|
POLITICAL CONTROL", document number PE 166 499.
|
|
|
|
|
|
Please please send it to:
|
|
|
|
"YOUR ADDRESS HERE"
|
|
|
|
|
|
|
|
Kind regards,
|
|
|
|
"YOUR NAME HERE"
|
|
|
|
------------------------------
|
|
|
|
Date: Tue, 20 Jan 1998 19:09:35 -0500 (EST)
|
|
From: editor@TELECOM-DIGEST.ORG
|
|
Subject: File 5--How Big is the Internet Today?
|
|
|
|
Source - TELECOM Digest Tue, 20 Jan 98, Volume 18 : Issue 16
|
|
|
|
From--anthony@alphageo.com (Anthony Argyriou)
|
|
Date--Tue, 20 Jan 1998 04:15:58 GMT
|
|
|
|
Following a thread from an irreverent e-mail list story, I discovered
|
|
that Bellcore has a website which tracks the size of the Internet.
|
|
They're using statistical sampling of the DNS to estimate the number
|
|
of internet hosts.
|
|
|
|
The estimate as I write is 30,096,400 and growing. The site is
|
|
http://www.netsizer.com , and you need a Java-enabled browser to see
|
|
it. Information about the estimate is at
|
|
http://www.netsizer.com/info.html .
|
|
|
|
|
|
Anthony Argyriou
|
|
http://www.alphageo.com
|
|
|
|
------------------------------
|
|
|
|
Date: Thu, 7 May 1997 22:51:01 CST
|
|
From: CuD Moderators <cudigest@sun.soci.niu.edu>
|
|
Subject: File 6--Cu Digest Header Info (unchanged since 7 May, 1997)
|
|
|
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|
available at no cost electronically.
|
|
|
|
CuD is available as a Usenet newsgroup: comp.society.cu-digest
|
|
|
|
Or, to subscribe, send post with this in the "Subject:: line:
|
|
|
|
SUBSCRIBE CU-DIGEST
|
|
Send the message to: cu-digest-request@weber.ucsd.edu
|
|
|
|
DO NOT SEND SUBSCRIPTIONS TO THE MODERATORS.
|
|
|
|
The editors may be contacted by voice (815-753-6436), fax (815-753-6302)
|
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|
60115, USA.
|
|
|
|
To UNSUB, send a one-line message: UNSUB CU-DIGEST
|
|
Send it to CU-DIGEST-REQUEST@WEBER.UCSD.EDU
|
|
(NOTE: The address you unsub must correspond to your From: line)
|
|
|
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|
the PC Telecom forum under "computing newsletters;"
|
|
On Delphi in the General Discussion database of the Internet SIG;
|
|
on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
|
|
CuD is also available via Fidonet File Request from
|
|
1:11/70; unlisted nodes and points welcome.
|
|
|
|
In ITALY: ZERO! BBS: +39-11-6507540
|
|
|
|
UNITED STATES: ftp.etext.org (206.252.8.100) in /pub/CuD/CuD
|
|
Web-accessible from: http://www.etext.org/CuD/CuD/
|
|
ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
|
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
|
|
world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
|
|
wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
|
|
EUROPE: nic.funet.fi in pub/doc/CuD/CuD/ (Finland)
|
|
ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
|
|
|
|
|
|
The most recent issues of CuD can be obtained from the
|
|
Cu Digest WWW site at:
|
|
URL: http://www.soci.niu.edu/~cudigest/
|
|
|
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|
information among computerists and to the presentation and debate of
|
|
diverse views. CuD material may be reprinted for non-profit as long
|
|
as the source is cited. Authors hold a presumptive copyright, and
|
|
they should be contacted for reprint permission. It is assumed that
|
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|
specified. Readers are encouraged to submit reasoned articles
|
|
relating to computer culture and communication. Articles are
|
|
preferred to short responses. Please avoid quoting previous posts
|
|
unless absolutely necessary.
|
|
|
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|
the views of the moderators. Digest contributors assume all
|
|
responsibility for ensuring that articles submitted do not
|
|
violate copyright protections.
|
|
|
|
------------------------------
|
|
|
|
End of Computer Underground Digest #10.08
|
|
************************************
|
|
|