-Caveat Lector-
That goes without saying, but it is not an excuse to be less than diligent in the
rooting out of what we can. Stating that it is so and then doing nothing and saying
nothing is not the answer. Sure it goes on that is why we must expose it and tlak
about it in forums like this!!
On Wed, 08 August 2001, Jeanne S wrote:
>
> -Caveat Lector-
>
> They are already using it. There is no privacy on the web. They watch
> anyone they see as a threat.
> Jeanne
> ----- Original Message -----
> From: "tenebroust" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Sent: Tuesday, August 07, 2001 8:54 PM
> Subject: Re: [CTRL] Feds- Spy Tool Is A Secret
>
>
> > -Caveat Lector-
> >
> > This sounds like a very interesting case that is well worth keeping an eye
> on, since a keystroke interceptor would enable the Feds to bypass any type
> of firewall or encryption and if they can do it willy nilly then no one's
> data is secure. Scary.
> >
> >
> >
> > On Tue, 07 August 2001, William Shannon wrote:
> >
> > >
> > > <HTML><FONT FACE=arial,helvetica><BODY BGCOLOR="#ffffff"><FONT SIZE=2
> FAMILY="SANSSERIF" FACE="Arial" LANG="0"><A
> HREF="http://www.wired.com/news/politics/0,1283,45851,00.html">http://www.wi
> red.com/news/politics/0,1283,45851,00.html</A>
> > > <BR>
> > > <BR>
> > > <BR>
> > > <BR>Feds: Spy Tool Is a Secret
> > > <BR></FONT><FONT COLOR="#000000" SIZE=1 FAMILY="SANSSERIF"
> FACE="Verdana" LANG="0">By <A
> HREF="mailto:[EMAIL PROTECTED]%3Fsubject=Feds:%20Spy%20Tool%20Is%20a%20Secret
> ">Declan McCullagh</A> </FONT><FONT COLOR="#000000" SIZE=3
> FAMILY="SANSSERIF" FACE="Verdana" LANG="0">
> > > <BR>
> > > <BR></FONT><FONT COLOR="#000000" SIZE=2 FAMILY="SANSSERIF" FACE="Arial"
> LANG="0">2:00 a.m. Aug. 7, 2001 PDT
> > > <BR></FONT><FONT COLOR="#000000" SIZE=3 FAMILY="SANSSERIF"
> FACE="Verdana" LANG="0"><IMG
> SRC="http://a1112.g.akamai.net/7/1112/492/03312000/static.wired.com/news/ima
> ges/spacer.gif" WIDTH="89" HEIGHT="21" BORDER="0"></FONT><FONT
> COLOR="#000000" SIZE=2 FAMILY="SANSSERIF" FACE="Verdana" LANG="0">
> > > <BR></FONT><FONT COLOR="#000000" SIZE=2 FAMILY="SANSSERIF" FACE="Arial"
> LANG="0">The U.S. government has invoked national security to argue that
> details of a
> > > <BR>new electronic surveillance technique must remain secret.
> > > <BR>Justice Department attorneys told a federal judge overseeing the
> prosecution
> > > <BR>of an alleged mobster that public disclosure of a classified
> keystroke logger
> > > <BR>would imperil ongoing investigations of "foreign intelligence
> agents" and
> > > <BR>endanger the lives of U.S. agents.
> > > <BR>
> > > <BR>In court documents <A
> HREF="http://www2.epic.org/crypto/scarfo/gov_supp_brief.pdf">(PDF)</A> filed
> Friday, the Justice Department claims that
> > > <BR>such stringent secrecy is necessary to prevent "hostile intelligence
> > > <BR>officers" from employing "counter-surveillance tactics to thwart law
> > > <BR>enforcement."
> > > <BR>
> > > <BR>U.S. District Judge Nicholas Politan <A
> HREF="http://www.wired.com/news/politics/0,1283,45730,00.html">heard
> arguments</A> last Monday in the
> > > <BR>prosecution of Nicodemo S. Scarfo, the alleged mastermind of a loan
> shark
> > > <BR>operation in New Jersey. Politan asked both sides to submit
> additional briefs
> > > <BR>before he decided whether or not to order the feds to disclose
> details about
> > > <BR>their keystroke logging device, which captured Scarfo's PGP
> passphrase.
> > > <BR>
> > > <BR>Politan has barred attorneys in the case from talking to reporters.
> > > <BR>
> > > <BR>Donald Kerr, the director of the FBI's lab, said in an affidavit
> filed Friday
> > > <BR>that "there are only a limited number of effective techniques
> available to
> > > <BR>the FBI to cope with encrypted data, one of which is the 'key logger
> > > <BR>system.'" He said that if criminals find out how the logger works,
> they can
> > > <BR>readily circumvent it.
> > > <BR>
> > > <BR>The feds believe so strongly in keeping this information secret that
> they've
> > > <BR>said they may invoke the <A
> HREF="http://www.fas.org/irp/offdocs/laws/pl096456.htm">Classified
> Information</A> Procedures Act if necessary.
> > > <BR>The 1980 law says that the government may say that evidence requires
> > > <BR>"protection against unauthorized disclosure for reasons of national
> > > <BR>security."
> > > <BR>
> > > <BR>If that happens, not only are observers barred from the courtroom,
> but the
> > > <BR>trial could move to a classified location. Federal regulations say
> that if a
> > > <BR>courtroom is not sufficiently secure, "the court shall designate the
> > > <BR>facilities of another United States Government agency" as the
> location for
> > > <BR>the trial.
> > > <BR>
> > > <BR>But the FBI's Kerr said that CIPA's extreme procedures aren't good
> enough.
> > > <BR>Says Kerr: "Even disclosure under the protection of the court ...
> cannot
> > > <BR>guarantee that the technique will not be compromised.... To assume
> otherwise
> > > <BR>may well lead to the compromise of criminal and national security
> > > <BR>investigations, and, in some cases, threaten the lives of FBI or
> other
> > > <BR>government agency personnel."
> > > <BR>
> > > <BR>Scarfo allegedly used PGP to encode his confidential and
> incriminating
> > > <BR>business data. With a judge's approval, FBI agents repeatedly
> sneaked into
> > > <BR>Scarfo's business to plant a keystroke sniffer -- it could be either
> software
> > > <BR>or hardware -- and monitor its output.
> > > <BR>
> > > <BR>During last Monday's hearing, Judge Politan wondered aloud how the
> law should
> > > <BR>treat the keyboard tap.
> > > <BR>
> > > <BR>Was it akin, Politan wondered, to a telephone wiretap, regulated by
> the
> > > <BR>federal law known as Title III? Perhaps it was a general search of
> the sort
> > > <BR>loathed by the colonists at the time of the American Revolution and
> > > <BR>thereafter outlawed by the Fourth Amendment? Or was it, as the
> government
> > > <BR>argued, just like cops rummaging around someone's home or office
> with a
> > > <BR>search warrant in hand?
> > > <BR>
> > > <BR>The difference is crucial: If Politan rules that the FBI's keystroke
> monitor
> > > <BR>is a wiretap, the evidence may have to be discarded and Scarfo would
> be more
> > > <BR>likely to walk free. That's because wiretaps must follow strict
> rules -- such
> > > <BR>as minimizing information that's recorded -- that the FBI's
> technique didn't.
> > > <BR>
> > > <BR>"If no court has yet assessed the legality of this technique, it
> seems clear
> > > <BR>that Scarfo should be entitled to make that inquiry," says David
> Sobel,
> > > <BR>general counsel of the Electronic Privacy <A
> HREF="http://www.epic.org/">Information Center</A>.
> > > <BR>
> > > <BR>"Whether or not this was the equivalent of a wiretap is a central
> question --
> > > <BR>how can that be answered without knowing how this worked and what it
> was
> > > <BR>capable of capturing?"
> > > <BR>
> > > <BR>For its part, the defense <A
> HREF="http://www2.epic.org/crypto/scarfo/def_supp_brief.pdf">argues</A>
> (PDF) that without public disclosure, judges
> > > <BR>will be giving their "approval to secret entries which do nothing
> less than
> > > <BR>spy on the citizen so targeted."
> > > <BR>
> > > <BR>Another thing that's suspicious, says the defense, is that the log
> from the
> > > <BR>program ended as soon as it shows Scarfo's PGP passphrase: "The odds
> of
> > > <BR>someone subject to a 60-day period of observation via keystroke
> recording
> > > <BR>providing what was sought on the very last typed entries are
> alarmingly
> > > <BR>high." </FONT><FONT COLOR="#000000" SIZE=2 FAMILY="SANSSERIF"
> FACE="Verdana" LANG="0">
> > > <BR>
> > > <BR>
> > > <BR>
> > > <BR>
> > > <BR>
> > > <BR>
> > > <BR>
> > > <BR>
> > > <BR>
> > > <BR>
> > > <BR>
> > > <BR>
> > > <BR>
> > > <BR>
> > > <BR>
> > > <BR>
> > > <BR></FONT> </HTML>
> >
> > "Welcome to the desert of the real." Morpheus, in The Matrix
> >
> > "My God it's full of stars!" Dave Bowman, in 2001: A Space
> > Odyssey
> > Find the best deals on the web at AltaVista Shopping!
> > http://www.shopping.altavista.com
> >
> > <A HREF="http://www.ctrl.org/">www.ctrl.org</A>
> > DECLARATION & DISCLAIMER
> > ==========
> > CTRL is a discussion & informational exchange list. Proselytizing
> propagandic
> > screeds are unwelcomed. Substance-not soap-boxing-please! These are
> > sordid matters and 'conspiracy theory'-with its many half-truths, mis-
> > directions and outright frauds-is used politically by different groups
> with
> > major and minor effects spread throughout the spectrum of time and
> thought.
> > That being said, CTRLgives no endorsement to the validity of posts, and
> > always suggests to readers; be wary of what you read. CTRL gives no
> > credence to Holocaust denial and nazi's need not apply.
> >
> > Let us please be civil and as always, Caveat Lector.
> > ========================================================================
> > Archives Available at:
> > http://peach.ease.lsoft.com/archives/ctrl.html
> > <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
> > [EMAIL PROTECTED]</A>
> >
> > http:[EMAIL PROTECTED]/
> > <A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
> > ========================================================================
> > To subscribe to Conspiracy Theory Research List[CTRL] send email:
> > SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]
> >
> > To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
> > SIGNOFF CTRL [to:] [EMAIL PROTECTED]
> >
> > Om
>
> <A HREF="http://www.ctrl.org/">www.ctrl.org</A>
> DECLARATION & DISCLAIMER
> ==========
> CTRL is a discussion & informational exchange list. Proselytizing propagandic
> screeds are unwelcomed. Substance—not soap-boxing—please! These are
> sordid matters and 'conspiracy theory'—with its many half-truths, mis-
> directions and outright frauds—is used politically by different groups with
> major and minor effects spread throughout the spectrum of time and thought.
> That being said, CTRLgives no endorsement to the validity of posts, and
> always suggests to readers; be wary of what you read. CTRL gives no
> credence to Holocaust denial and nazi's need not apply.
>
> Let us please be civil and as always, Caveat Lector.
> ========================================================================
> Archives Available at:
> http://peach.ease.lsoft.com/archives/ctrl.html
> <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
> [EMAIL PROTECTED]</A>
>
> http:[EMAIL PROTECTED]/
> <A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
> ========================================================================
> To subscribe to Conspiracy Theory Research List[CTRL] send email:
> SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]
>
> To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
> SIGNOFF CTRL [to:] [EMAIL PROTECTED]
>
> Om
"Welcome to the desert of the real." Morpheus, in The Matrix
"My God it's full of stars!" Dave Bowman, in 2001: A Space
Odyssey
Find the best deals on the web at AltaVista Shopping!
http://www.shopping.altavista.com
<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please! These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.
Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
<A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]</A>
http:[EMAIL PROTECTED]/
<A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]
To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]
Om