The Patriot Act is far from 1984. Wiretaps still require a judges order only now it can cover multiple numbers and jurisdictions which is prudent. How many of us have one phone number? Criminals carry cellular phones and travel as well. The computer trespasser provision makes it possible for LEO's to track someone hacking into your system if you give LEO's permission, otherwise they'd need yet another warrant. Prior to the Patriot Act, there was nothing defining the rules of Pen Registers and Trap Trace directly to the Internet. The Patriot Act at least specifies that the PR/TT applies to the Internet as well as telephone systems. Content cannot be collected. Don't believe all the hype on the Patriot Act. Duane Nickull <duane@private> wrote: > Anwers inline... > Crispin Cowan wrote: > > A friend posed > this question, and I have no idea what the answer might be: > If I'm running an open, non-encrypted wireless network, what is (say) > the FBI allowed to intercept in an effort to gain evidence? Do they > need a warrant? Is the data admissible? What if I live in an > apartment with > other folks. What about when I'm using a t-mobile hotspot? > Yes - There is a new sherrif in town in the US and he likes ot read > the Patriot > Act (anything on anybody anytime). > As George Orwell implied in 1984, nothing can get a group of citizens to > voluntarily give up their rights faster than a prolonged war against an unseen > enemy. > > > > Read about the vast new powers of wiretaps on American Citizens here: > > > > http://archive.aclu.org/issues/privacy/Patriot_Chart_law.html > Same questions, > but this time, I'm running an encrypted network? Can they > > capture the data and crack the key? Can they capture it for later use after > > > they sieze my equipment and get my key? > Yes - they have that right under the new act. They can do whatever they > deem necessary in the name of national security. > > > > From the act itself: > > > > "Permits interception without notice to > the target of communications of a broadly defined "computer trespasser" > with consent of owner/operator of a protected computer. > "
This archive was generated by hypermail 2b30 : Wed Oct 15 2003 - 11:08:38 PDT