"Dark Alleys" on the Internet 704
nokilli writes "Sounding the alarmist tone many of us became used to in the early days of the web, The New York Times has a story that talks about "national security" concerns over the myriad ways in which two people (i.e., terrorists) can communicate using the Internet today [NYT=Kneel before Zod]. They're talking about monitoring chat rooms, email servers, etc. I'd like to see how they plan on monitoring my mage as it talks to your cleric in some obscure, nearly impossible to reach (unless you're level 50) corner of our favorite MUD."
Server Access? (Score:2, Informative)
Remember, even encryption can be broken
Comment removed (Score:3, Informative)
Apparently never looked into MUD code (Score:3, Informative)
Or, consider most MUDs are transmitted in plaintext, and a simple sniff on your connection would be more than sufficient.
No, the real tricks should be information hiding, all messages stongly encrypted, sensitive or otherwise, and simple knowledge of where not to communicate. Wonder if crypto hidden in the least significant bits of a scan of a point and shoot 35mm picture of some random "family" photo would ever go noticed. I hope you don't think your chatting in the open in an "obscure" MUD location really helps you any.
Noise and Signal (Score:3, Informative)
The intelligence community needs men on the ground, deep cover agents in the places where the terrorists are recruiting. By the time they are sending encoded messages to each other in secret areas of the net, it's already too late. Getting rid of Ashcroft helps too. They just don't come any more incompetent than that.
Re:Server Access? (Score:4, Informative)
Re:impossible (Score:4, Informative)
So they can store it. Can they find it through all the noise?
If out of every 300 million people there are a couple dozen terrorists, how do you expect to find the terrorists talking about bombs through all the talk about bombs in video games, bombs in the movies, blonde bombshells and new cars that are "the bomb"?
Even if you solve storage and you solve relevance, you still have to solve monitoring every delivery avenue. With the incentive of P2P, video games and new hardware you have several new avenues opening up every day. What if they terrorist wanted to communicate via handwritten text on his new Nintendo DS? Is that monitored?
When communication was just phone and post, spies used flashes of light, pigeons and cleverly placed symbols in public locations. There is always a way to communicate without being spotted. Being able to store all you _can_ find will only help a little bit.
TW
Re:Server Access? (Score:3, Informative)
And encryption in general is still vulnerable to the rubber-hose attack
Re:Uhm (Score:1, Informative)
Re:More ominous than that... (Score:3, Informative)
If that was the only reason he was arrested and indicted, then I agree that this is a scary precedent. But is it the reason? I don't think this story gives that kind of detail. This is all it says:
It doesn't say that he is accused of making treasonous speech or inciting war or anything at all of the type. He is accused of offering aid and running a website for known terrorist groups. The quotes from Walker seem to be included only to make him look obviously guilty to the reader.
Still, this article doesn't say very much at all. It's entirely possible that those statements really are the crux of the case ("offering aid"). If that's the case, then I agree, this case if far more serious than anything to do with "wiretapping the Internet". This would be a dagger deep into the heart of our notion of free speech.
So with that in mind, I tend to think that this case is something else. Yes, I know we've lost a lot of our rights concerning free speech in the past few years, but I don't think we've gotten quite that far.
Re:You don't understand (Score:3, Informative)