Monday, January 28, 2008

AT&T reborn, Former Death Star now Net Nanny

This is a great article about what AT and T is going to do; monitor every bit of information that goes across its network. Oh sure, we’ve known for a while that they do this for the government, but apparently now they are doing it for the RIAA (recording industry) and MPAA (film industry). If this feels a little strange, maybe it’s because it reverses the idea of innocent until proven guilty (granted that is for govt. and no such principal necessarily applies to private industry). The article does a great job of pointing out that the telecoms pushed for (and got) a protection from liability for providing material (as opposed to what happened to Napster or Grokster) assuming that they had no part in deciding what it was. This would seem to contravene that. This also brings in an interesting question about which is more important as a service provider; serving your customers, or helping another industry. If free enterprise is correct, then this knowledge should mean terrible impacts on AT and T’s financial (as the article predicts). If not, then we have a profound example of user’s naïveté about privacy and control measures that is destined to play itself out with potentially unfortunate consequences in the future (the TIA program’s plant to use letter carriers as agents for the govt. and then later firefighters comes to mind as such things in the govt. sector). As for how the public will react, and if AT and T will suffer any measurable financial impact, only the future will tell.

Sunday, January 13, 2008

Border Seizure: Is All Information Equal?

The New York Times reported that border guards have seized computers and searched hard drives. The auspices of such actions are based around the noble effort to stop the trafficking of child pornography into the country. The reference to two cases (supporting searches, blocking searches) about the same kinds of searches, the concern that I have in such cases is how a line is drawn between different kinds of data. If the government is allowed to take copies of the data on a hard drive, what is to distinguish between medical records or diary entries from child porn or calls to treason? On a hard drive they are all just zeros and ones and there in lies the difference between real and “intellectual” property. Perhaps one solution is technological (like the use of the carnivore (DCS 1000) email reading system that the NSA uses). Another option is to decide which is the more important liberty to our society. If we search all hard drives looking for illegal material and we find no illegal material but we do find information about a crime that was committed but unprosecuted, should the govt. be allowed to use that? What about the cost of the lost ability to be secure in your “papers” if such things are searchable? If we are not presented a technological solution then how do we draw this line and is this a bright line or one that changes with the times and other information? I personally question if such searches are worth the loss of liberty they provide. Carrying such data across borders is certainly less efficient than just copying it across the internet (Gmail account, LiveDrive, BitTorrent, Anonymous FTP, etc.) so the ability to transmit such data does not seem to me to be significantly impeded by such an action. On the flip side, the self-censorship that would be imposed by individuals who travel abroad based upon the knowledge that the government would have access to such data seems to have great ill effects on first and forth amendment protections. Likewise, the implications of such searches being used against political opponents (like that of Hoover’s FBI) or as a way to monitor US citizens should be something that we should not allow without eminent threat. How do we make decisions about such things in the current time is left to the courts but I think we should not tread recklessly on such tings as they are likely to set precedent for how digital data is perceived by the law in our world where all data is quickly becoming just ones and zeros.

If you are concerned about such searches, I suggest you check out encryption software, like TrueCrypt, and use it to create “virtual drives” that contain the files you would not want searched.

Monday, January 7, 2008

Steve Rambam on Why Privacy is Dead at ToorCon

OK, this lecture is a bit long (almost 2 hrs) but it covers many reasons why the genie may already be out of the bottle. He’s Ex-Law enforcement and a currently private Investigator. He goes over a lot of the sources where info is collected and how people are accessing that data. If you are interested in privacy, it’s worth your time to watch this: http://video.google.com/videoplay?docid=-383709537384528624&q=privacy&total=12601&start=0&num=10&so=0&type=search&plindex=0