Here's the source for the data preservation requirement:
http://www.usdoj.gov/criminal/cybercrime/COEFAQs.htm
Preservation is not a new idea; it has been the law in
the United States for nearly five years. 18 U.S.C. 2703(f)
requires an electronic communications service provider to
"take
At 8:30 AM -0500 on 12/5/00, BNA Highlights wrote:
KEYSTROKE MONITORING AND THE SOPRANOS
A federal gambling case against the son of a New Jersey mob
boss may provide the courts with the opportunity to weigh in
on the privacy issues surrounding keystroke monitoring. The
FBI's surveillance
A nice rant, below, from a fellow anarcho-capitalist lapsed conservative
apparently Hillsdale College grad.
[I swear, folks, I *tried* snipping this to relevant bits. :-). I mean,
there's a URL in it and all, and, admittedly, he's preaching to the choir
around here, but this is nicely done that
Ritual Satanic Ritual Abuse in Denver Need Help
HI and Prrraise the Lord:
My wife Rev. Helen ( [EMAIL PROTECTED] ) got the following e mail
message. I didn't know what to do with it. Maybe you know
someone that can check this out or pass it on to someone in the
Denver area. I sent it
I am currently doing market research for a client --
Company Nurse(r). They reduce your worker's compensation
Insurance cost.
I was interested in finding out what advantages you see for your company to
use Company Nurse.
I have included some basis information for your review.
I would really
Adam Back wrote:
I think the thing that killed MT / digicash for this application was
MT at the time was reported to be closing accounts related to
pornography -- they apparently didn't want the reputation for
providing payment mechanisms for the porn industry or something.
James Donald
There's no particular need to make it a single-image random dot
stereogram. Double images are much easier to make and provide an extra
bonus (see below). Here is an example from a post to cypherpunks on
September 23, 1997:
VGhpcyBpcyBhIHRlc3Qg VGhpcyBpcyBhIHRlc3Qg
bWVzc2FnZSB3aGljaCBp
re: the keystroke sniffer:
http://inq.philly.com/content/inquirer/2000/12/04/front_page/JMOB04.htm
The FBI application is at:
http://www.epic.org/crypto/breakin/application.pdf
The court order is at:
http://www.epic.org/crypto/breakin/order.pdf
--
A host is a host from coast to
At 2:58 PM -0500 on 12/5/00, Somebody wrote:
So what does this have to do with IBM?
Oops.
Somehow I conflated IBM with FBI?
It was merely a typo. Really it was. Pay no attention to the man behind the
curtain...
Of course, (if) it turns out that IBM actually *built* a keyboard sniffer,
--- begin forwarded text
Date: Tue, 05 Dec 2000 08:47:20 -0800
From: Somebody
To: "R. A. Hettinga" [EMAIL PROTECTED]
Subject: Re: IBM Uses Keystroke-monitoring in NJ Mob Case (was Re:
BNA'sInternet
Law News (ILN) - 12/5/00)
An instructive case. Apparently they used the keystroke monitoring
On Tue, Dec 05, 2000 at 07:05:37PM -0500, John Young wrote:
The lilly-livered sys admins who betray people's trust in their systems
are a plague on the Internet, all braying about the need to secure their
systems from bad users, and all of them -- along with their bosses
and investors who
On Tue, Dec 05, 2000 at 06:06:41PM -0800, [EMAIL PROTECTED] wrote:
To prove destruction of evidence you must prove that it existed in a
form that was retrievable ( good luck ) and then that its destruction
was done by a person who was aware of the crime ( not always so in the
networking world
I'm misattributed below, at least as far as the quoted content goes,
anyway. :-). A victim of misplaced forward references, and certainly not
deliberate, I'm sure.
Cheers,
RAH
--- begin forwarded text
From: "Trotter, Frank" [EMAIL PROTECTED]
To: Digital Bearer Settlement List [EMAIL
--- begin forwarded text
From: [EMAIL PROTECTED]
Date: Tue, 05 Dec 2000 22:02:18 -0500
To: [EMAIL PROTECTED]
Subject: Secure communications + Human rights
Sender: [EMAIL PROTECTED]
Technomads,
Good day from Western Australia! I recently met with Peace Brigades
International (PBI)
Help! Can anyone refer me to a copy of the film "Cryptic Seduction" (1998)?
I can't find it anywhere...
Many thanks,
Jill
Jim,
The bloke with the extra ventilation notwithstanding, with an open OS
and open applications it seems easy to do pretty much whatever you want
with disk data and logs regardless of what the letter of the law says.
Electronic data is so malleable that its use as evidence seems
questionable to
http://www.abcnews.go.com/sections/world/DailyNews/phone001205.html
"...Hitting the 5, 6, 7 and 8 buttons on the phone gun fires
four .22-caliber rounds in quick succession. ..."
OK, so I can accept that only Mad Dogs (Home Office) Englishmen may
be looney enough to sit around under the
17 matches
Mail list logo