Interesting 1st Ammendment Issue w/Janet Reno

Noel

New member
See : http://www.theregister.co.uk/000309-000011.html

Posted 09/03/2000 12:23pm by Thomas C. Greene in Washington

Janet Reno would curb press freedom on line

Constitutional protections of the press are getting in the way of cyber-crime prosecutions and may have to be reconsidered, a White House committee chaired by US Attorney General Janet Reno believes.

"With the advent of the Internet and widespread computer use, almost any computer can be used to 'publish' material. As a result, the [Privacy Protection Act of 1980 (PPA)] may now apply to almost any search of any computer," the committee's report laments.

The act in question protects the freedom of American journalists, scholars and writers to publish freely by prohibiting all law enforcement agencies from searching for or seizing "any work product materials" or any related "documentary materials....possessed by a person....with a purpose to disseminate to the public a newspaper, book, broadcast, or other similar form of public communication," [42 U.S.C. §2000aa].

Under those circumstances, the Feds would be forced to find some gizmo or technique to copy only those portions of a suspect journalist's hard disk which might pertain to a crime, and do it without interrupting the work in progress; or, failing that, rely on the suspect himself to turn over the relevant files.

It's a formidable technical challenge, as the Feds must not seize, or even examine, data meant for publication, and its supporting, documentary information such as notes, transcripts and related research materials.

The Reno Department of Justice (DoJ) apparently finds this an intolerable burden, especially while the precious life of an innocent child kidnapped by rogue chemistry professors could hang in the balance.

"Because computers now commonly contain enormous data storage devices, wrongdoers can use them to store material for publication that the PPA protects while simultaneously storing child pornography, stolen classified documents, or other contraband or evidence of crime," the report warns.

We may joke about rogue professors, but we're only covering up the chill we feel in contemplating the way Internet superstition and Reno's relentless child-protective hype might give the Feds the excuse they've been waiting for to do an end-run around the PPA.

It appears that this is exactly what Reno has in mind. "Features of the Internet that make it different from prior technologies may justify the need for changes in laws and procedures that govern the detection and investigation of computer crimes," the committee notes ominously.

The committee's report, "The Electronic Frontier: The Challenge of Unlawful Conduct Involving the Use of the Internet" is due to be released in final form this month. A draft copy obtained by Wired News is available on line here.

It's a disturbing read. ®
 
How many times have we all asked some anti whether the First only applies to printing presses and quill pens, since the Second only applies to muskets?

Well, here's your answer. OF COURSE!
Silly us, trying to point out the absurdity of their arguments by suggesting other absurd ideas. Now it feels like all we accomplished was putting notions in their lil' puddin' heads.
 
Gwinny -
I've always figured that. For example, the humorous comparison to cars over in the general thread might one day be siezed upon with relish should the ecoterrorists ever come to power...

------------------
"...and he that hath no sword, let him sell his garment, and buy one."
Luke 22:36
"An armed society is a polite society."
Robert Heinlein
 
To paraphrase a certain BATF agent:
There was no way the Founding Fathers could have forseen such an efficient publishing method such as the Internet. The 1st Amendment is archaic and should be revised.

Rememember "All animals are created equal - But some animals are more equal than others" The butchering of the Bill of Rights has already begun.

They can take my computer when they pry it from my cold, dead hands.

[This message has been edited by jcoyoung (edited March 09, 2000).]
 
This just proves what I have been telling antigunners that I know. Once they are done with taking our second ammendment away, they will start working on the others.
 
Is there some kind of software that exists today...that you could put in your computer...that would totally erase everything on your hard drive?? Either preload it, and upon some kind of password command... destroy or totally encrypt everything?Or maybe have it on a floppy to stick in, with the same results???? Is this possible?
 
<BLOCKQUOTE><font size="1" face="Verdana, Arial">quote:</font><HR>Originally posted by Mr.X:
Is there some kind of software that exists today...that you could put in your computer...that would totally erase everything on your hard drive?? Either preload it, and upon some kind of password command... destroy or totally encrypt everything?Or maybe have it on a floppy to stick in, with the same results???? Is this possible? [/quote]


A very large magnet.

Or a large wooden badger :).
 
http://www.mach5.com/kremlin/pc_index.html

<BLOCKQUOTE><font size="1" face="Verdana, Arial">quote:</font><HR>"...encryption doesn't get much easier
than Kremlin!"
Kremlin rated out of by Hotfiles.com!

Whether it's keeping your little sister out of your private
files or protecting your free speech from Big Brother,
Kremlin is the perfect tool for the job. Not only does
Kremlin feature secure encryption with such algorithms
as DES, IDEA, and Blowfish, Kremlin helps to erase all
traces of your sensitive data from your computer. And
Kremlin includes powerful built-in predictive
compression to produce secure, compressed archives.
Who needs WinZip when you have Kremlin?

In its most secure setting, Kremlin uses 160 bits of
encryption key. If one billion computers were each
searching one billion keys per second, it would take
over 1013 years to recover a file encrypted with Kremlin.
That's 10,000,000,000,000 years, more than the life of
the universe!

Many products feature secure encryption, but Kremlin
does more: Kremlin builds a wall around your computer,
protecting your sensitive files from snooping intruders.
Windows was not designed to be secure; it literally
strews your sensitive data all over the computer. The
Kremlin Sentry automates the process of securing your
computer by scheduling itself to secure portions of your
hard disk and all used memory when you log off your
computer or your computer becomes idle.

And Kremlin is easy to use, too. Want to encrypt a file?
Just right-click on it and hit Encrypt. You can securely
remove files from your computer by dragging them to the
Kremlin Secure Recycle Bin. And when you log off,
Kremlin clears sensitive areas of your hard disk and
wipes all records of your activities.

Kremlin can also automatically encrypt files and
directories when you log off your computer and decrypt
them when you log back on, providing a transparent way
to protect your files from any nosy intruders.

If you're worried about your word processor leaking
scraps of your sensitive documents all over your hard
drive, you can use Kremlin Text, a full-featured and
secure text editor that automatically encrypts your
documents. You can even e-mail a secret memo to a
co-worker from within Kremlin Text.

And Kremlin is so secure that the U.S. Government
considers it a munition! To snoops, Kremlin is a deadly
weapon.
[/quote]

This is a very cool proggie...even the shareware version is great.

------------------
"Quis custodiet ipsos custodes" RKBA!
 
One bullet, even a .22 through the harddrive is terminal. Seriously, rig yourself a miniature flashbang with a covered switch to set it off.

------------------
The Bible is my lawbook. I turn the other cheek when applicable, and spend the rest of my days resisting evil at every front, until I have breathed my last breath.
 
Well, where's the cry from the media? Or are they exempt from this type of invasion because they give Reno cover?

Dick
 
Let me clue ya' in.

Traditional media is in on the heist. They're just waiting for Big Gubmint to start regulating the 'net. The free (more or less) dissemenation of information means death for media that relies on paper mills and transmitters to publish.

They care about the 1st about the same way they care about the 2nd.
 
<BLOCKQUOTE><font size="1" face="Verdana, Arial">quote:</font><HR>Originally posted by Mr.X:
Is there some kind of software that exists today...that you could put in your computer...that would totally erase everything on your hard drive?? Either preload it, and upon some kind of password command... destroy or totally encrypt everything?[/quote]

Actually, there are two freeware programs:

BCWipe will wipe everything off your drive, but dependent upon the HD size, may take a while (2-3 hours for complete wiping. But it is very unlikely that you would have to wipe everything. Just make sure your sensitive files are in on directory.

PGP Freeware is an encryption/wiping program that can be used with your e-mail as well as other files and directories.

I believe both are available on Download.com. Or you may have to do a search.
I use and recomend both.




[This message has been edited by Ezeckial (edited March 09, 2000).]
 
Gwinnydapooh:

Spot on.

Unless Alan Keyes becomes President this kind of thing will work itself to its logical conclusion.
Our Republic can't take much more of this relentless barrage on sanity and liberty.

We would have suffered less damage from a nuclear attack than from the last few years of psychopathic liberalism.

I'm tellin' ya, folks, things is lookin' bad.

------------------
ALARM! ALARM! CIVILIZATION IS IN PERIL! THE BARBARIANS HAVE TAKEN THE GATES!
 
Mr. X:
Even though 128+ bit encryption is available, it will not do you any good. A dangerous precedent was set in the recent case of Kevin Mitnik. If the files the government holds as evidence are encrypted, before copies those files are given to the defense for review under the rules of discovery, the government can hold them until the accused or the defense sees fit to decrypt them. Basically, they can force you to unlock them to be used as evidence against you.

My advice:
If the data you seek to keep private is important enough it could be used as evidence, get a really good high power electromagnet. The Fifth Amendment no longer applies where a computer-related crime is concerned.
 
Fastforty;

I use a deadman switch, rather than a covered
one.

I won't go into specifics, but I can promise
LEOs that my hard drive destruction device is
not likely to injure or maim, it being an electro magnet, fired by some monster capacitors.

However, either I stop it from going off, or
it goes. Period.

If you have to reach for a switch, it's already way too late.
 
Is a giant electromagnet enough? You'd think the FBI would have come up with a way to still retreive the data. They can lift SNs after they have been ground off, maybe they have a method for retreiving zapped data?

I think I would probably rig a shaped charge. Kinda hard to retreive data from dust. :D
 
<BLOCKQUOTE><font size="1" face="Verdana, Arial">quote:</font><HR>Is a giant electromagnet enough? You'd think the FBI would have come
up with a way to still retreive the data. They can lift SNs after they
have been ground off, maybe they have a method for retreiving zapped
data?[/quote]

SN's are stamped in...even after ground off, the metal underneath has been compressed in the pattern of the SN. Compression=higher density=greater resistence to dilute acid/etching solution.
Puter data is electromagnetic, and is irreparably destroyed under strong enough EMF.



------------------
"Quis custodiet ipsos custodes" RKBA!
 
Peace Jcoyoung,

<BLOCKQUOTE><font size="1" face="Verdana, Arial">quote:</font><HR>Originally posted by jcoyoung:
Is a giant electromagnet enough? You'd think the FBI would have come up with a way to still retreive the data. They can lift SNs after they have been ground off, maybe they have a method for retreiving zapped data?[/quote]

Actually, there is an over-the-counter device which is used to bulk erase VCR tapes which should perform the function you are looking for. Go to your local Radio Shack, etc. and get a bulk tape eraser.

------------------
James R. McClure Jr.
Sir Knight of Columbus
Democrat candidate for Indiana's Ninth congressional district
 
I don't mean to throw a wet blankie on the paranoia parade but the Gov't has a cool " catch all " . It can merely determine that any device that destroys data does so because the data is incriminating .
To possess child porn , as distastful as it may seem has been used to secure a desired effect . The porn itself is harmless since it does not have a life . The info needed to make a nuke device is available and legal . Hardly a contrast . You can't see naked children but you can blow up your neighborhood or even your county .
The fact is that getting something declared unlawful is the first step . Even while it is under appeal they can use it to some extent . All it takes is one judge to see it their way and you are looking at a de facto law until the appeals process reverses it . It may not seem like much sitting at your computer but it's a big thing if you are the target . Your life will never be the same .

------------------
TOM SASS MEMBER AMERICAN LEGION MEMBER NRA MEMBER
 
I believe you should all visit www.ontrack.com and check out their data recovery service. If you feel the need to protect your data enough to justify a doomsday device, you best try your doomsday device in real practice. The results should be a part of your solution. Just be prepared to spend $$$. Lots of $$$. Data recovery is big business, mostly on the good side of the force, those businesses that have a crashed server and such. Although, please note the Government link on the site.

RE: Encryption. Don't rely on it. If it's in binary format it can be gotten. When all is said and done, it's just ones and zeros. A simple parity generator can be built to crack any "key". Software oriented people always look for the most convoluted and expensive way to justify something simple. 160 bit encrytion, from a software standpoint, requires billions of calcs per second to do a read and compare. From a hardware standpoint, you flip a switch and the answer pops out in pico seconds. "They" don't need much as far as evidence in a world where a single carpet fiber is enough. Bottom line; "They" don't need the entire contents of the drive, only a cluster or 2 or 3 or 4.

[This message has been edited by RAE (edited March 11, 2000).]
 
Back
Top