* 비활성페이지
- 이 페이지는 지는 2001.10.23 ~ 2001.12.20 사이에 있었던 인터넷내용등급제 폐지와 정보통신부장관 퇴진을 위한 제 시민사회단체들의 60일간 1인 릴레이 단식농성 이슈페이지로, 지금은 자료 열람만 가능합니다.
       
[정보통신검열반대 공동행동]
 
 
30초 Speech
전교조 여준성
관련자료
검열반대 공동행동 자료실
정보통신윤리위원회 자료실
관련소식
뉴스 클리핑
관련 논쟁들
영상 보고서
-참세상주간리포트
-인터넷 공안정국
 
관련 논쟁들

제 목 미국테러와 표현의자유
작성자 della <della@www.jinbo.net>
작성일 2001-09-13
 
영어라 죄송합니다. -_-
번역할 능력은 안되고 대강 해석해본 바에 따르면
이번 미국테러로 인하여 (사이버 테러에 대한 소문도 있답니다)
미국내에서 (특히 카니보어라는 인터넷 감청 프로그램으로
지난해 물의를 빚은 바 있는 FBI에 의해) 인터넷에 대한
내용 규제가 한층 강화될 조짐이라는 기사입니다.
이에 대한 WIRED의 기사와,
그에 대한 외국 활동가의 코멘트를 싣습니다.

===========================================
http://www.blythe.org/nytransfer-subs/Radical_Politics/Feds_Attempt_to_Deploy_Universal_Carnivore
Feds Attempt to Deploy Universal Carnivore

Via NY Transfer News * All the News That Doesn't Fit

from Peter in San Francisco:

Well, from here on out *everyone* should assume that Carnivore is
universally deployed.

Yes, *universally* deployed must be the default assumption here,
based on the comments of FBI staffers turning up nationwide
with Carnivore boxes at web hosts and web email services
yesterday - that they only need to have the devices in place
temporarily, since they'll be setting up dedicated snifffers
soon.

Also, assume that remailers are compromised.  Permanently.  I
had already made the assumption that they were compromised
at Federal discretion, and this story confirms that.

Given past history, once the Feds have their hooks in place, they
won't be letting them loose.

If you can get BBC online, they'll be interviewing Chomsky
soon about what he sees coming down the pike.

-Peter

The following is from "Wired"
http://www.wired.com/news/politics/0,1283,46747,00.html

Anti-Attack Feds Push Carnivore
By Declan McCullagh

2:00 a.m. Sep. 12, 2001 PDT

WASHINGTON -- Federal police are reportedly increasing Internet
surveillance after Tuesday's deadly attacks on the World Trade Center
and the Pentagon.

Just hours after three airplanes smashed into the buildings in what
some U.S. legislators have dubbed a second Pearl Harbor, FBI agents
began to visit Web-based, e-mail firms and network providers,
according to engineers at those companies who spoke on condition of
anonymity.

An administrator at one major network service provider said that FBI
agents showed up at his workplace on Tuesday "with a couple of
Carnivores, requesting permission to place them in our core, along
with offers to actually pay for circuits and costs."

The person declined to say for publication what the provider's
response was, "but a lot of people" at other firms were quietly going
along with the FBI's request. "I know that they are getting a lot of
'OKs' because they made it a point to mention that they would only be
covering our core for a few days, while their 'main boxes were being
set up at the Tier 1 carriers' -- scary," the engineer said.

The FBI's controversial Carnivore spy system, which has been renamed
DCS1000, is a specially configured Windows computer designed to sit
on an Internet provider's network and monitor electronic
communications. To retrieve the stored data, an agent stops by to
pick up a removable hard drive with the information that the
Carnivore system was configured to record.

Microsoft's Hotmail service has also been the target of increased
federal attention, according to an engineer who works there.

"Hotmail officials have been receiving calls from the San Francisco
FBI office since mid-(Tuesday) morning and are cooperating with their
expedited requests for information about a few specific accounts,"
the person said. "Most of the account names start with the word
'Allah' and contain messages in Arabic."

By Tuesday evening, nearly 12 hours after the twin attacks that
crippled Manhattan and left Washington deserted by mid-afternoon, it
was unclear who was responsible.  The Washington Post, citing
anonymous government sources, reported that former Saudi businessman
Osama bin Laden appears to be the prime suspect.

In February, U.S. officials claimed that bin Laden had turned to
data-hiding steganography software to conceal communications with his
operatives by means of public websites.

In Washington, use of data-scrambling encryption software is also
frequently mentioned in conjunction with terrorists. "Uncrackable
encryption is allowing terrorists Hamas, Hezbollah, al-Qaida and
others to communicate about their criminal intentions without fear of
outside intrusion," then-FBI Director Louis Freeh told a Senate panel
last year. "They're thwarting the efforts of law enforcement to
detect, prevent and investigate illegal activities."

Those comments, and the prospect of congressional reaction to
Tuesday's terrorist attacks, have prompted some civil libertarians to
fret about possible domestic regulation of encryption products.

A few years ago, one House committee approved a bill that would have
banned any encryption product without a back door entrance for the
federal government. By Tuesday afternoon, at least one NBC affiliate
had interviewed defense expert Jim Dunnigan, who warned that "PGP and
Internet encryption" would be blamed for the attacks.

"Those of us who value our liberty, even in the face of danger, will
need to be vigilant in the days to come," says Thomas Leavitt, an
online activist who co-founded Webcom.

Other civil libertarians say it's a mistake to believe that the U.S.
government will overreact to Tuesday's disasters. Marc Rotenberg of
the Electronic Privacy Information Center said he believes that the
better approach is to argue that the U.S. must not allow a terrorist
attack on our form of open government to succeed.

It's too early to tell whether he's right or not, but by late
Tuesday, operators of anonymous remailers were already so worried
about being conduits for terrorist communications -- or being blamed
for the communications, rightly or wrongly -- that they pulled the
plug.

Operator Len Sassaman said in a post to a remailer-operators list: "I
don't want to get caught in the middle of this. I'm sorry. I'm
currently unemployed and don't have the resources to defend myself.
At this point in time, a free-speech argument will not gain much
sympathy with the Feds, judges and general public."

Remailers forward messages but remove the originating information, so
that the resulting e-mail is anonymized. They customarily don't keep
logs, so if the system works as designed, it should be nearly
impossible for anyone to find who sent the message.

                           * * *

=================================================================
  NY Transfer News Collective   *   A Service of Blythe Systems
           Since 1985 - Information for the Rest of Us
              339 Lafayette St., New York, NY 10012
  http://www.blythe.org                  e-mail: nyt@blythe.org
=================================================================

nytrad-09.12.01-17:30:05-5411

 
| |
 
  Korean Progressive Network Jinbo.Net No CopyRight, Just CopyLeft!!