Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
The Internet Your Rights Online

"Dark Alleys" on the Internet 704

nokilli writes "Sounding the alarmist tone many of us became used to in the early days of the web, The New York Times has a story that talks about "national security" concerns over the myriad ways in which two people (i.e., terrorists) can communicate using the Internet today [NYT=Kneel before Zod]. They're talking about monitoring chat rooms, email servers, etc. I'd like to see how they plan on monitoring my mage as it talks to your cleric in some obscure, nearly impossible to reach (unless you're level 50) corner of our favorite MUD."
This discussion has been archived. No new comments can be posted.

"Dark Alleys" on the Internet

Comments Filter:
  • Server Access? (Score:2, Informative)

    by piett134 ( 713199 ) on Tuesday December 21, 2004 @11:02AM (#11146999)
    They may not need server access to monitor your chat session in your MUD. Simply monitoring your incomming / outgoing data should be sufficient.
    Remember, even encryption can be broken :)
  • Comment removed (Score:3, Informative)

    by account_deleted ( 4530225 ) on Tuesday December 21, 2004 @11:08AM (#11147061)
    Comment removed based on user account deletion
  • by dead sun ( 104217 ) <aranach@gma i l .com> on Tuesday December 21, 2004 @11:08AM (#11147071) Homepage Journal
    Most of the MUD codebases I have looked into have all had this nifty feature to log what players do, should the admins start suspecting foul play. It'll keep track of where the players go, what they say, emote, do, pretty much everything. Simply talking to an admin and letting them know that you're with some national TLA and would like cooperation in logging a characters conversation would probably be enough to get the job done.

    Or, consider most MUDs are transmitted in plaintext, and a simple sniff on your connection would be more than sufficient.

    No, the real tricks should be information hiding, all messages stongly encrypted, sensitive or otherwise, and simple knowledge of where not to communicate. Wonder if crypto hidden in the least significant bits of a scan of a point and shoot 35mm picture of some random "family" photo would ever go noticed. I hope you don't think your chatting in the open in an "obscure" MUD location really helps you any.

  • Noise and Signal (Score:3, Informative)

    by Thangodin ( 177516 ) <elentar AT sympatico DOT ca> on Tuesday December 21, 2004 @11:22AM (#11147235) Homepage
    The more extraneous crap they monitor, the higher the noise to signal ratio. Kerry mentioned in the debates that there were hundreds of thousands of hours of unexamined surveillance tape. Of course there is! The best thing you can hope for with the growing mountain of surveillance output is that after the next attack, the cops will be able to look at the tapes and say, "Oh, yeah, there go the terrorists..."

    The intelligence community needs men on the ground, deep cover agents in the places where the terrorists are recruiting. By the time they are sending encoded messages to each other in secret areas of the net, it's already too late. Getting rid of Ashcroft helps too. They just don't come any more incompetent than that.
  • Re:Server Access? (Score:4, Informative)

    by leuk_he ( 194174 ) on Tuesday December 21, 2004 @11:28AM (#11147307) Homepage Journal
    They can arrest and hold you (without charges) just for being a (terrorist) suspect, what you are right now. The only way to come out of prison is to reveal your password. I hope for you it is just porn.
  • Re:impossible (Score:4, Informative)

    by Total_Wimp ( 564548 ) on Tuesday December 21, 2004 @11:48AM (#11147587)
    We used to say the same thing about electronic dossiers--that storage was so expensive there was no way to keep all that transactional data forever. Now they can.

    So they can store it. Can they find it through all the noise?

    If out of every 300 million people there are a couple dozen terrorists, how do you expect to find the terrorists talking about bombs through all the talk about bombs in video games, bombs in the movies, blonde bombshells and new cars that are "the bomb"?

    Even if you solve storage and you solve relevance, you still have to solve monitoring every delivery avenue. With the incentive of P2P, video games and new hardware you have several new avenues opening up every day. What if they terrorist wanted to communicate via handwritten text on his new Nintendo DS? Is that monitored?

    When communication was just phone and post, spies used flashes of light, pigeons and cleverly placed symbols in public locations. There is always a way to communicate without being spotted. Being able to store all you _can_ find will only help a little bit.

    TW
  • Re:Server Access? (Score:3, Informative)

    by Have Blue ( 616 ) on Tuesday December 21, 2004 @01:20PM (#11148987) Homepage
    You forgot to include "based on current knowledge of algorithms, mathematics, and computation methods and technology".

    And encryption in general is still vulnerable to the rubber-hose attack :P
  • Re:Uhm (Score:1, Informative)

    by Anonymous Coward on Tuesday December 21, 2004 @02:05PM (#11149635)
    You don't have a fucking clue about how SSL work. Having the certificate of the server only helps if you can trick someone to connect to you - it doesn't help eavesdropping, as you'd need the private keys of the certificates for that, and that is never disclosed to the certificate authorities, so there is no way for them to disclose it to the NSA.
  • by Kurt Granroth ( 9052 ) on Tuesday December 21, 2004 @02:18PM (#11149810)
    I think that the message here is much more ominous than what the surface story tells. The young man simply stated his great dislike for the United States government that is in place. He also made a flip comment about himself being a pilot of one 9/11 planes that crashed into the towers. I only see a crime here if he actually did the task.


    If that was the only reason he was arrested and indicted, then I agree that this is a scary precedent. But is it the reason? I don't think this story gives that kind of detail. This is all it says:

    Mr. Walker, a 19-year-old student, is accused, among other things, of using his roommate's computer to communicate with - and offer aid to - a federally designated terrorist group in Somalia and with helping to run a jihadist Web site.


    "I hate the U.S. government," is among the statements Mr. Walker is said to have posted online. "I wish I could have been flying one of the planes on Sept. 11."


    It doesn't say that he is accused of making treasonous speech or inciting war or anything at all of the type. He is accused of offering aid and running a website for known terrorist groups. The quotes from Walker seem to be included only to make him look obviously guilty to the reader.


    Still, this article doesn't say very much at all. It's entirely possible that those statements really are the crux of the case ("offering aid"). If that's the case, then I agree, this case if far more serious than anything to do with "wiretapping the Internet". This would be a dagger deep into the heart of our notion of free speech.


    So with that in mind, I tend to think that this case is something else. Yes, I know we've lost a lot of our rights concerning free speech in the past few years, but I don't think we've gotten quite that far.

  • by m50d ( 797211 ) on Tuesday December 21, 2004 @02:51PM (#11150239) Homepage Journal
    I'm a terrorist and planning to overthrow the government. I just need a load of explosives and some weapons grade plutonium so I can make a dirty bomb to hold the government hostage until I can assasinate the president.

One man's constant is another man's variable. -- A.J. Perlis

Working...