Big Brother

27
Aug
2004

Big Brother, big business

GEORGE Orwell first coined the term, numerous sci-fi books and movies have delved into it, and now there’s also a reality show on TV: Big Brother fears are gradually becoming a real-world concern. Just look at Japan, where the schoolbags and uniforms of primary school kids are being tagged with microchips that can track their whereabouts on school grounds. All a Japanese kid has to do is to pass by readers that have been installed in the school gates and at other key locations, and his location will be captured and relayed to the school surveillance system.

In the Ross Correctional Facility in Chillicothe, Ohio, inmates are now part of a pilot project which requires them to wear wristwatch-sized devices that transmit radio signals to the readers and then to the prison computer, allowing authorities to determine their exact location. Tamper with the devices, and they will set off an alarm, allowing prison guards to easily track down the inmates.

These applications all stem from a not-so-new wireless technology called radio frequency identification (RFID). Its ultimate objective is to trace, identify and connect objects with objects, via radiowaves.

http://star-techcentral.com/tech/story.asp?file=/2004/8/24/corpit/8707845&sec=corpit


Source:
Aftermath News
Top Stories - August 26th, 2004

26
Aug
2004

25
Aug
2004

UK Information commissioner criticises ID-card

In an interview with The Times newspaper on 16 August, the UK Information Commissioner, Richard Thomas, has warned against the danger of 'sleepwalking into a surveillance society', as a result of ID cards and other plans. Mr Thomas said he was also uneasy about plans for a population register and a database of every child. He used General Franco's Spain as an example of what can happen when a state knows too much about its citizens.

Thomas said, although he is not for or against an ID card scheme itself, he was concerned about the government's failure to spell out their exact purpose. "The government has changed its line over the last two or three years as to what the card is intended for. You have to have clarity. Is it for the fight against terrorism? Is it to promote immigration control? Is it to provide access to public benefits and services?"

On 30 July 2004, a UK parliamentary committee wrote a similarly critical report and concluded that objections against the ID-card should not be lightly dismissed and that the proposed scheme to introduce biometric identity cards will 'represent a significant change in the relationships between the state and the individual in this country.'

Literally the Commissioner told The Times: "My anxiety is that we don't sleepwalk into a surveillance society where much more information is collected about people, accessible to far more people shared across many more boundaries, than British society would feel comfortable with."

According to an online BBC news item, a spokesman for the Home Office said the government remained committed to its plans for national identity cards which would, among other things, protect people against identity fraud and organised crime.

Mr Thomas also questioned the plans for a childrens database, championed by Margaret Hodge, Minister of State for Children. Mrs Hodge already won the Big Brother Award on 28 July 2004 as 'Worst public servant' for the plan. Under the scheme, every child would have a unique number which would enable the different organisations that come into contact with children, such as social services, police and educational bodies to share information.

Mr Thomas told the Times: "There are reasons why we need to promote better information sharing where children are at risk, but whether the answer is to create a database of every child in the country should be questioned."

Interview in The Times (requires registration)
http://www.timesonline.co.uk/printFriendly/0,,1-2-1218615,00.html

Watchdog's Big Brother UK warning (16.08.2004)
http://news.bbc.co.uk/1/hi/uk_politics/3568468.stm

UK Parliamentary Committee Releases Report Damning ID System (30.07.2004)
http://www.privacyinternational.org/article.shtml?cmd[347]=x-347-63601


Source: EDRI-gram newsletter - Number 2.16, 25 August 2004

We Want Your Soul, Inc. (WWYS®)

http://www.wewantyoursoul.com/index.php


Informant: dragon downstairs

Covert Operations of the U.S. National Security Agency (NSA)

http://tinyurl.com/4e24w

Experten warnen vor großem Lauschangriff

Hallo,

dies sollte man gelesen haben.

Gruß
A.

P.S. letztendlich ist es egal, wie die Daten beschafft werden - es wird lediglich der Besitz persönlicher Daten durch Gesetzgebungen legalisiert.


Von Jessica Fischer

23.08.2004 16:42
Experten warnen vor großem Lauschangriff

Mit einem Änderungsentwurf der Telekommunikationsüberwachungsverordnung (TKÜV) will die Regierung staatlichen Stellen den Zugriff auf sämtliche Telekommunikationskennungen verschaffen. Gemeint ist damit, dass alle Internetanschlüsse (IP-Adressen, Internet-Protokolle), die Gerätekennungen von Handys (IMEI, International Mobile Equipment Identity) sowie von kompletten Funkzellen und WLAN-Hotspots personenbezogen erfasst werden sollen. Davor warnt der Verband der deutschen Internetwirtschaft (eco). Das Ergebnis sei ein "gläserner Telekommunikationsbürger", der auf allen technischen Kontaktwegen - per Internet, Handy, Funk oder WLAN - abgehört werden kann.

Der Weg ins Ausland soll eco zu Folge ebenfalls "dicht gemacht" werden. So sei vorgesehen, dass sämtliche Netzknoten, die zur Zusammenschaltung mit ausländischen Telekommunikationsnetzen dienen, zum Mithören für staatliche Stellen geöffnet werden müssen. "Leidtragender ist jeder in Deutschland, der einen Telekommunikationsanschluss besitzt, also ein Telefon, ein Handy oder einen Internetzugang.", warnt Klaus Landefeld, Vorstand des Verbandes der deutschen Internetwirtschaft.

Eco möchte in seiner Rolle als Lobbyist die Politiker auf die Problematik der Gesetzesnovelle aufmerksam machen: "Schon allein vom benötigten Speicherplatz und den Kosten ist dieses Vorhaben nicht zu bewältigen, von datenschutzrechtlichen Bedenken einmal ganz abgesehen.", kommentierte Harald Summa, Geschäftsführer bei eco, das Regierungsvorhaben gegenüber PC-WELT.

http://www.pcwelt.de/news/vermischtes/102325/index.html

24
Aug
2004

23
Aug
2004

Passports with biometric data to be tested by several nations

One of the basic forms of personal identification, the passport, is on the verge of taking on a new, high-tech identity. A number of countries are about to start trials of passports and visas that incorporate biometric information alongside the traditional photo and passport number -- data such as a digital image of the citizen's face that will be compared with a facial scan taken at the airport.

The first country to use the system will probably be Belgium, which plans an e-passport trial later this year. The United Kingdom's passport office said it is looking for volunteers to test the recording and verification of facial recognition, iris and fingerprint biometrics, and New Zealand and Canada are also looking into conducting trials.

The United States and Australia, meanwhile, have issued requests for proposals for trials of their own, and the Netherlands is looking at ways for banks to adopt chip-based documents that would be used to confirm identification.

http://makeashorterlink.com/?V27B26C19


Aftermath News
Top Stories - August 23rd, 2004

Großer deutscher Lauschangriff geplant

23. August 2004

11:15

Großer deutscher Lauschangriff geplant

Verband der deutschen Internetwirtschaft eco warnt vor dem gläsernen Telekommunikations-Bürger

Der Verband der deutschen Internetwirtschaft eco-Forum (Electronic Commerce Forum) warnt vor dem geplanten Lauschangriff in Deutschland. Grund ist ein neuer Entwurf der Telekommunikations-Überwachungsverordnung (TKÜV) der staatlichen Stellen Zugang zu sämtlichen Telekommunikations-Kennungen erzwingen will. Laut eco würde die Umsetzung des Entwurfs einen "gläsernen Telekommunikations-Bürger" schaffen, der auf allen technischen Kontaktwegen wie Internet, Handy, Funk oder WLAN abgehört werden kann.

Schnüffeln

Laut eco ist das Ziel des neuen Entwurfs, dass Bürgerinnen und Bürger keinen einzigen technischen Kommunikationsweg mehr finden, der nicht vom Staat abgehört werden kann. Dazu wollen die staatlichen Organe sämtliche Internetanschlüsse (IP-Adressen, Internet-Protokolle) und Gerätekennungen von Handys (IMEI, International Mobile Equipment Identity) sowie von kompletten Funkzellen und allen WLAN-Hotspots personenbezogen erfassen, um im Bedarfsfall Abhörmaßnahmen einleiten zu können.

Transparent

Vor allem die staatliche Überwachung der IP-Adressen der Bevölkerung wird sehr rasch zu einem "durchlöcherten Bürger" führen, warnt eco. Der Grund: Künftig werden immer mehr Geräte mit einem Internetanschluss ausgestattet werden, vom Audio- und Video-Equipment über Waschmaschinen, Kühlschränken bis zum Auto. "Zu einer einzelnen Person könnten künftig über 100 IP-Adressen gehören, von der Kaffeemaschine bis zur Armbanduhr", warnt eco-Vorstand Klaus Landefeld. "Leidtragender wäre dann jeder in Deutschland, der einen Telekommunikationsanschluss besitzt. Es bleibt zu hoffen, dass sich die Menschen gegen so eine Hightech-Überwach zu wehren wissen", so Landefeld. (pte)

© derStandard.at 2004

http://derstandard.at/?url=/?id=1769336

22
Aug
2004

Big Brother's Last Mile

The FCC's new ruling on broadband wiretaps will force customers to pay for the privilege of making the Internet less secure.

By Mark Rasch Aug 16 2004 10:00AM PT

On August 9th, 2004, the U.S. Federal Communications Commission (FCC) took a major step toward mandating the creation and implementation of new Internet Protocol standards to make all Internet communications less safe and less secure. What is even worse, the FCC's ruling will force ISP's and others to pay what may amount to billions of dollars to ensure that IP traffic remains insecure.

The FCC ruling comes pursuant to a request by U.S. law enforcement agencies to extend the reach of a decade old federal statute, the Communications Assistance for Law Enforcement Act, or CALEA, to broadband Internet service providers including cable companies, DSL providers, satellite providers and even electric companies that provide inline Internet access. The ruling, if it becomes final, may require such ISPs to create and deploy new and expensive technologies that would ensure that communications carried over broadband were deliberately insecure and capable of being intercepted, retransmitted, read, and understood by law enforcement. Of course, whatever law enforcement can do, hackers will be able to do easier and faster. What this means is that IP protocols may have to be adjusted, and the future of encryption may also be in doubt.

A Brief History of Taps

To understand CALEA, you need a bit of history. From the dawn of Alexander Graham Bell to 1968, there were few if any specific rules on the legal requirements for listening in on electronic communications. The U.S. Supreme Court had tried to apply the precepts of the Fourth Amendment's protections of the privacy of "persons, places, houses and effects" to a voice traveling over a wire, finally concluding in 1963 that the amendment protects people's privacy rights, not simply their physical location. In response, Congress passed the Omnibus Crime Control and Safe Streets Act of 1968, Title III of which established the rules for intercepting telephone calls.

By making ISPs the electronic equivalent of the phone company, and therefore subject to CALEA, the FCC opens the door to mandating that all future TCP/IP technologies be tapable by design. Concerned that the FBI lacked the technical ability to install and monitor wiretaps, Congress in 1970 mandated that the cops could ask for, and a court could order, the phone company to give the police "information, facilities, and technical assistance necessary to accomplish the interception unobtrusively and with a minimum of interference with the [the company's] services." It also provided that the communications company "be compensated . . . by the applicant for reasonable expenses incurred in providing such facilities or assistance." In other words, a court could order an ISP to cooperate, conditioned on the cops agreeing to pay for the help. Effectively, this is no different than requiring a landlord, when presented with both a court authorized search warrant and an order requiring cooperation, and an order requiring the cops to pay up, to show the police where the target's apartment is, and maybe show them how to pick the lock.

In 1994, however, at the request of law enforcement, Congress broadly expanded the law. No longer was the phone company merely required to provide technical assistance to help execute an already issued wiretap order -- now all covered telecommunications providers had to spend billions of rate-payer's dollars to design their systems in such a way as to be susceptible to the possibility of later court ordered surveillance. This is the equivalent of requiring that the landlord design the building without doors or locks (or with very weak ones), just in case the cops later want to search anyone in the building. As the Department of Justice described it, "CALEA for the first time required telecommunications carriers to modify the design of their equipment, facilities, and services to ensure that lawfully-authorized electronic surveillance could actually be performed."

But CALEA never applied to ISPs, per se. In fact, section 102 of CALEA states that it "does not [apply to] persons or entities insofar as they are engaged in providing information services" although it does apply to "person[s] or entit[ies] engaged in providing wire or electronic communication switching or transmission service to the extent that the Commission finds that such service is a replacement for a substantial portion of the local telephone exchange service and that it is in the public interest to deem such a person or entity to be a telecommunications carrier."

In other words, if you are replacing the local telephone exchange service, and the FCC concludes it is in the public interest, you might be covered by CALEA. On August 9th, the FCC tentatively concluded that broadband providers were exactly that.

Push Me, Pull You

The FCC concluded that "facilities-based providers of any type of broadband Internet access service. . . are subject to CALEA because they provide a replacement for a substantial portion of the local telephone exchange service."

They arrived at this conclusion, it turns out, by completely misreading recent technology history The FCC wrote that, at the time CALEA was enacted, Internet services were generally provided on a dial-up basis by two separate entities providing two different capabilities -- a local exchange telephone company carrying the calls between an end user and her chosen Internet Service Provider, and the ISP providing e-mail, content, Web hosting and other Internet services.

ISPs were exempt from CALEA. But because the local phone company was subject both to FCC jurisdiction and to CALEA, dial-up access was implicitly covered as well: to accomplish its purposes of intercepting communications pursuant to a court order, the FBI only had to capture the communication at the POTS (Plain Old Telephone Service) line, and the problem was solved.

The FCC's reasoning is that because broadband replaces dial-up access to the Internet, and dial-up was subject to CALEA, broadband must ipso facto be subject to CALEA.

However, while most individual users in 1994 connected to the Internet via dial-up, the Internet was already built principally on broadband communications. In fact, from its inception until 1991, very little of the overall bandwidth of the Internet consisted of an individual user dialing into a node for access. Most users were government, industry, military or educational users sitting at terminals with relatively fast (for 70's and 80's technology) non-dial-up connections. Broadband isn't some newfangled replacement for dial-up: it's the backbone and spine of the Internet, and has been for decades.

A Brave New Internet

The FBI, in requesting this authority defined "broadband access service" as "the process and service used to gain access or connect to the public Internet using a connection based on packet-mode technology that offers high bandwidth" but "does not include any 'information services' available to a user after he or she has been connected to the Internet, such as the content found on Internet Service Providers' or other websites."

Essentially, the FCC concluded that CALEA can't force website operators to design their systems to reveal the IP addresses or identity of people who visit the site, but could force ISPs not only to reveal the identical information, but also to design the system to enable law enforcement to reveal the information.

It is important to note that this expansion of CALEA was not needed to compel the ISPs to comply with a lawful subpoena. ISP's and everyone else must already comply under existing law. But a subpoena can only compel a recipient to turn over documents or records that exist.

The FCC's ruling goes well beyond the extensive subpoena authority of the grand jury and the Foreign Intelligence Surveillance Court, and even the USA-PATRIOT Act. By making ISPs the electronic equivalent of the phone company, and therefore subject to CALEA, the FCC opens the door to mandating that all future TCP/IP technologies -- possibly even encrypted ones -- be designed at the outset to be tapable. After all, it would do the cops no good to receive a mass of encrypted packets.

What's worse, all of this would be done on your dime. As Commissioner Abernathy pointed out in a statement, "upgrading networks to comply with a new packet-mode standard for surveillance will be a costly endeavor, and there are many unanswered questions about how these costs should be recovered."

The FBI had an answer when ISPs and phone companies complained about the cost. The Bureau suggested that the cost be defrayed by increasing the rates you and I pay. So much for the government's E-rate program to make broadband more affordable.

I am all for letting the cops tap phones, and even IMs, chat sessions, e-mail and websites with appropriate court orders. What I don't like is making us reinvent the Internet just for these purposes. The FCC action is a large step towards requiring this.


SecurityFocus columnist Mark D. Rasch, J.D., is a former head of the Justice Department's computer crime unit, and now serves as Senior Vice President and Chief Security Counsel at Solutionary Inc.

Copyright © 1999-2004 SecurityFocus

Source/Quelle:
http://www.securityfocus.com/columnists/261


Wir haben vor kurzem ebenfalls über dieses Thema berichtet
http://www.quintessenz.org/cgi-bin/index?id=000100002989

Omega siehe auch http://omega.twoday.net/stories/297660/

relayed by Doser

quintessenz-list Digest, Vol 17, Issue 15
logo

Omega-News

User Status

Du bist nicht angemeldet.

Suche

 

Archiv

September 2025
Mo
Di
Mi
Do
Fr
Sa
So
 1 
 2 
 3 
 4 
 5 
 6 
 7 
 8 
 9 
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
 
 
 
 
 
 
 
 

Aktuelle Beiträge

Wenn das Telefon krank...
http://groups.google.com/g roup/mobilfunk_newsletter/ t/6f73cb93cafc5207   htt p://omega.twoday.net/searc h?q=elektromagnetische+Str ahlen http://omega.twoday. net/search?q=Strahlenschut z https://omega.twoday.net/ search?q=elektrosensibel h ttp://omega.twoday.net/sea rch?q=Funkloch https://omeg a.twoday.net/search?q=Alzh eimer http://freepage.twod ay.net/search?q=Alzheimer https://omega.twoday.net/se arch?q=Joachim+Mutter
Starmail - 8. Apr, 08:39
Familie Lange aus Bonn...
http://twitter.com/WILABon n/status/97313783480574361 6
Starmail - 15. Mär, 14:10
Dänische Studie findet...
https://omega.twoday.net/st ories/3035537/ -------- HLV...
Starmail - 12. Mär, 22:48
Schwere Menschenrechtsverletzungen ...
Bitte schenken Sie uns Beachtung: Interessengemeinschaft...
Starmail - 12. Mär, 22:01
Effects of cellular phone...
http://www.buergerwelle.de /pdf/effects_of_cellular_p hone_emissions_on_sperm_mo tility_in_rats.htm [...
Starmail - 27. Nov, 11:08

Status

Online seit 7877 Tagen
Zuletzt aktualisiert: 8. Apr, 08:39

Credits