LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: October 20th, 2014
Linux Advisory Watch: October 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
StopCarnivore.org Website Launched Print E-mail
User Rating:      How can I rate this item?
Source: Cipherwar.com - Posted by Benjamin D. Thomas   
Security Projects A new site devoted to shutting down the FBI's Carnivore email surveillance system has launched, "Stop Carnivore", http://www.stopcarnivore.org. The site explains what Carnivore is, why it is wrong, what you can do, and how it hurts the Internet. Below is a quick summary on the major issues the site deals with. . . . A new site devoted to shutting down the FBI's Carnivore email surveillance system has launched, "Stop Carnivore", http://www.stopcarnivore.org. The site explains what Carnivore is, why it is wrong, what you can do, and how it hurts the Internet. Below is a quick summary on the major issues the site deals with.

It's Unconstitutional: The Constitution is largely a document of limits- limits on the ways in which Government may interfere with our lives. The Bill of Rights (the first ten Amendments to the Constitution) is a short list of specific aspects of our lives which Government may not interfere. The 4th Amendment clearly prohibits such sweeping invasions of privacy and property as Carnivore commits.

It Threatens Freedom and The Internet: The best thing about the Internet, the thing which has allowed it to prosper as much as it has, is lack of centralized control. An while there are those who would use this lack of control to their criminal advantage, it would be a far worse consequence to give up the "chaos" in favor of stringent control.

All of the wondrous possibilities that the Internet offers us come at the price of it having no central control or governing body. To impose that type of control will be at the expense of the freedoms which have made the Internet what it is today. For 30 years, Government control stifled and suppressed the growth of the Internet. We must not allow such a fate to be reinstated.

It Sets a Bad Precedent: What if the FBI said they wanted to monitor all telephone calls, for information about suspected criminals? What if they wanted to intercept all postal mail, to check and see if any of it was related to any of their suspects? What if they wanted to do a "profile" of the average marijuana user, by scanning huge amounts of electronic data, and compiling the marijuana-related communications? What if they wanted keys to everyone's houses, in case they had to get inside to investigate a crime? Use of the Carnivore system plants the seeds for all of those types of developments, and many more frightening ones.

It Will Harm Innocent People: The FBI can hardly be trusted to conduct their investigations with proper handling and precision, but even if they could, Carnivore will end up hurting innocent people. The amount of guesswork involved in a sweeping search like the type Carnivore does insures that many "dead ends" and "bad leads" will be pursued. What this means is that the FBI will inevitably end up investigating (including search, seizure, intimidation, prosecution, etc.) innocent people. The use of a mass-level tool like Carnivore simply insures that these will occur more frequently, and at a more widespread level. (

Read this full article at Cipherwar.com

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Hacker Halted 2014: Johnny Long Calls for Hackers for Charity Volunteers
RIPS – Static Source Code Analysis For PHP Vulnerabilities
Finding a Video Poker Bug Made These Guys Rich—Then Vegas Made Them Pay
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.