Re: [Re: CRIME Wiretapping WiFi]

From: Brian Varine (witchdr@private)
Date: Wed Oct 15 2003 - 10:14:27 PDT

  • Next message: George Heuston: "RE: CRIME Wiretapping WiFi"

    The Patriot Act is far from 1984. Wiretaps still require a judges order only
    now it can cover multiple numbers and jurisdictions which is prudent. How many
    of us have one phone number? Criminals carry cellular phones and travel as
    well. The computer trespasser provision makes it possible for LEO's to track
    someone hacking into your system if you give LEO's permission, otherwise
    they'd need yet another warrant. Prior to the Patriot Act, there was nothing
    defining the rules of Pen Registers and Trap Trace directly to the Internet.
    The Patriot Act at least specifies that the PR/TT applies to the Internet as
    well as telephone systems. Content cannot be collected. Don't believe all the
    hype on the Patriot Act.
    
    Duane Nickull <duane@private> wrote:
    >  Anwers inline... 
    >  Crispin Cowan wrote:
    > 
    >  A friend posed
    >  this question, and I have no idea what the answer might be: 
    
    >  If I'm running an open, non-encrypted wireless network, what is (say) > 
    the FBI allowed to intercept in an effort to gain evidence?  Do they >  need a
    warrant?  Is the data admissible?  What if I live in an 
    >  apartment with  
    >  other folks.  What about when I'm using a t-mobile hotspot?
    >  Yes - There is a new sherrif in town in the US and he likes ot read 
    >  the Patriot
    >  Act (anything on anybody anytime).
    
    >  As George Orwell implied in 1984, nothing can get a group of citizens to
    >  voluntarily give up their rights faster than a prolonged war against an
    unseen
    >  enemy.
    > 
    >  
    > 
    >  Read about the vast new powers of wiretaps on American Citizens here:
    > 
    >  
    > 
    >  http://archive.aclu.org/issues/privacy/Patriot_Chart_law.html
    >   Same questions,
    >  but this time, I'm running an encrypted network?  Can they 
    > 
    >  capture the data and crack the key?  Can they capture it for later use
    after 
    >    
    > 
    >  they sieze my equipment and get my key? 
    >  Yes - they have that right under the new act.  They can do whatever they
    >  deem necessary in the name of national security.
    > 
    >  
    > 
    >  From the act itself:
    > 
    >  
    > 
    >  "Permits interception without notice to   
    >      the target of communications of a broadly defined "computer
    trespasser"
    >         with consent of owner/operator of a protected computer.   
    >                                "
    



    This archive was generated by hypermail 2b30 : Wed Oct 15 2003 - 11:08:38 PDT