Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Big Brother and your computer...
Self | The Watcher

Posted on 03/07/2007 8:43:09 PM PST by The Watcher

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-43 next last
To: The Watcher

It would have been nice if you defined the term CALEA for those of us not in the know.

Never mind, I found it with the Keyword search:
Communications Assistance for Law Enforcement Act


21 posted on 03/08/2007 7:55:37 AM PST by CedarDave
[ Post Reply | Private Reply | To 1 | View Replies]

To: The Watcher

What is Calea?


22 posted on 03/08/2007 7:58:32 AM PST by Rodney King (No, we can't all just get along.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: The Watcher

It's not quite that simple, and this is not constant wiretapping. I understand the threatening aspect of this, but there is another side too.

In the case of a valid and court-ordered surveillance, there does need to be a mechanism for law enforcement to actually perform the wiretap. Technology doesn't have to give bad guys an advantage just because the law didn't envision it years ago. If encryption and IP comms can be configured to make them untappable, is that really in our best interest?

Should terrorists be able to communicate with no way to stop them? I don't think so. I'm sensitive to the risk of abuse too, and I'm not sure I know where the exact balance point is... but there is a legitimate problem here that does need some attention.


23 posted on 03/08/2007 8:06:44 AM PST by Ramius ([sip])
[ Post Reply | Private Reply | To 1 | View Replies]

To: traviskicks

Thanks


24 posted on 03/08/2007 8:07:26 AM PST by TheKidster (you can only trust government to grow, consolidate power and infringe upon your liberties.)
[ Post Reply | Private Reply | To 20 | View Replies]

To: The Watcher

As I have said before, all governments move inexorably in the direction of becoming totalitarian dictatorships.


25 posted on 03/08/2007 8:13:31 AM PST by Leftism is Mentally Deranged
[ Post Reply | Private Reply | To 1 | View Replies]

To: antiRepublicrat

...onion routing?

(which, ironically was developed by the U.S. Navy)...


26 posted on 03/08/2007 8:21:19 AM PST by rzeznikj at stout (Boldly Going Nowhere...)
[ Post Reply | Private Reply | To 7 | View Replies]

To: gilor
The funny thing is all the idiots that think inet communications (or even phone calls) were ever private.

Being a Telecommunications tech for over thirty years I can sure speak to that. I've listened to phone calls that would really turn your head, but strangely only one crime being planned. Since it was not against the President or the rest of the NCA I couldn't do anything about it.

Years ago, when I worked on MIDS at Sprint, we would even monitor the IMTs between New York and Miami instead of listen to the radio. That was always good for laughs! The Gays alone were a Soap Opera! I had no idea people could really be like that.

Oh, by the way, we always only monitored calls for quality control ostensibly to detect possible noise and static or other transmission impairments. Wink - wink, nudge - nudge!

Nowadays, with digital communications, there is a much lower chance that anyone will monitor you calls or emails.

27 posted on 03/08/2007 8:24:43 AM PST by higgmeister (In the Shadow of The Big Chicken, Cobb County, Georgia, USA!)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Ramius
Should terrorists be able to communicate with no way to stop them? I don't think so.

Encryption is easy these days. We'd only catch the few terrorists stupid enough not to use it, and we'd probably catch terrorists that stupid in other ways.

28 posted on 03/08/2007 8:47:29 AM PST by antiRepublicrat
[ Post Reply | Private Reply | To 23 | View Replies]

To: The Watcher

http://www.freerepublic.com/focus/f-news/1797295/posts


Total Information Awareness
The Washington Times ^ | March 8, 2007 | Audrey Hudson


Posted on 03/08/2007 6:49:14 AM CST by Golden Press


Homeland Security officials are testing a supersnoop computer system that sifts through personal information on U.S. citizens to detect possible terrorist attacks, prompting concerns from lawmakers who have called for investigations. The system uses the same data-mining process that was developed by the Pentagon's Total Information Awareness (TIA) project that was banned by Congress in 2003 because of vast privacy violations.

(Excerpt) Read more at washingtontimes.com ...


The ADVISE and TIA data-mining projects rely on personal data to track individual behavior and consumer transactions to develop computer algorithms that create a pattern that some behavioral scientists say can predict terrorist behavior.

Data can include credit-card purchases, telephone or Internet details, medical records, travel and banking information.

Privacy concerns prompted lawmakers on both sides of the aisle to introduce legislation in January to require that government agencies disclose data-mining practices in regular reports to Congress.



29 posted on 03/08/2007 8:55:16 AM PST by Esther Ruth (For the devil is come down unto you, having great wrath, because he knows his time is short!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ramius

correct, so long as this is through valid court orders - there is no issue.

now, that's not to say I haven't heard gonzales and DHS asking for historical logging of EVERYTHING, that idea is floating out there, and its crazy.


30 posted on 03/08/2007 1:38:22 PM PST by oceanview
[ Post Reply | Private Reply | To 23 | View Replies]

To: oceanview

Agreed. That would be nuts. Talk about trying to drink from a firehose...


31 posted on 03/08/2007 1:57:31 PM PST by Ramius ([sip])
[ Post Reply | Private Reply | To 30 | View Replies]

To: Forgiven_Sinner
Realize that any transmission to and from any two points on the Internet is actually a broadcast that reaches every point of the Internet before the IP packet dies a normal death.

Not correct at all.

32 posted on 03/08/2007 2:07:20 PM PST by Centurion2000 (If you're not being shot at, it's not a high stress job.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: The Watcher

read later bump ...;-)


33 posted on 03/08/2007 5:29:33 PM PST by Tunehead54 (Nothing funny here. ;-)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Paloma_55

Agreed.


34 posted on 03/08/2007 5:35:25 PM PST by AEMILIUS PAULUS (It is a shame that when these people give a riot)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Forgiven_Sinner

".....don't know the provisions of CALEA, nor what you mean by "pre tap" your Internet connection--however, ANYTHING sent over the Internet is NOT private"

what if I don't use my true identity? and next, didn't they come up with a way for the party-line to go off into non-existance?


35 posted on 03/08/2007 5:41:02 PM PST by onyx eyes (Nothing can hurt you that you imagine or worry about; if it is not real.)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Ramius
It's not quite that simple, and this is not constant wiretapping. I understand the threatening aspect of this, but there is another side too. In the case of a valid and court-ordered surveillance, there does need to be a mechanism for law enforcement to actually perform the wiretap. Technology doesn't have to give bad guys an advantage just because the law didn't envision it years ago. If encryption and IP comms can be configured to make them untappable, is that really in our best interest?

You don't understand. For the most part, IP networks ARE NOT "tappable" anyway. Depending on the physical nature of the network, it may be all but impossible.

Should terrorists be able to communicate with no way to stop them? I don't think so. I'm sensitive to the risk of abuse too, and I'm not sure I know where the exact balance point is... but there is a legitimate problem here that does need some attention.

I disagree, should we do EVERYTHING POSSIBLE to prevent terrorists? Let's ban talking, let's ban guns, let's ban flying, let's ban box knives, let's ban fertilizer... Obviously NOT. But the issue is apparently not recognized by you, and that it's this... The federal government has created a wish list of services they want your ISP and other service providers TO GIVE THEM. No compensation, no payments, nothing. When the federal government takes your land without compensation, we fight all the way to the supreme court. When the federal government takes my time, money, and requires me to provide services that earn me a living for free... YOU DEFEND IT. Of all places, you'd expect AT LEAST Freepers to catch on to the issue. I guess I expect far too much to figure people would think for at least 5 seconds before they side with Big Brother. Apparenlty not even Freepers care about the Constitution and our rights to not be robbed.

36 posted on 03/08/2007 7:19:22 PM PST by The Watcher
[ Post Reply | Private Reply | To 23 | View Replies]

To: The Watcher

of course IP networks are tappable.

again, you have no constitutional issue to stand on - all of this is with court ordered warrants. if it goes beyond that, that's a different story.


37 posted on 03/08/2007 7:29:39 PM PST by oceanview
[ Post Reply | Private Reply | To 36 | View Replies]

To: oceanview

> again, you have no constitutional issue to stand on -

Ah well... better yet, with PGP or any other decent public key encryption, you don't need one. The feds can enjoy scanning gobbledegook all day long.

http://www.pgp.com/downloads/index.html


38 posted on 03/08/2007 7:32:50 PM PST by voltaires_zit (Government is the problem, not the answer.)
[ Post Reply | Private Reply | To 37 | View Replies]

To: oceanview

What do you mean they're "tappable"?

What, exactly, do you know about running an IP based network? Do you run one, I do.

YOu tell me how to "tap" a multipath, multihome, dynamicly routed network, with NO physical media between routers.

That's right, I run a WIRELESS network, that has no physical connections... EXCEPT at the customer's computer, and at the border gateway(s), with multiple paths out and in from each host.

You still don't get it. I guess I'll start a new thread, and this time try to explain it down to baby steps, since nobody seems to want to think... (sigh).


39 posted on 03/08/2007 7:51:52 PM PST by The Watcher
[ Post Reply | Private Reply | To 37 | View Replies]

To: The Watcher

your network is wireless to a point. at some point, it comes off the air to an access point - that has physical connections - that can be bridged and sniffed.


40 posted on 03/08/2007 7:57:19 PM PST by oceanview
[ Post Reply | Private Reply | To 39 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-43 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson