Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

[News] [SOT] Crackdown on Internet, Starting with "Terrorism" and Moving on...

The EU finally cops on to Cyber terrorism threat

,----[ Quote ]
| THE EU HAS only just arrived at the shocking conclusion that the Internet 
| could in fact be used by extremists to carry out nefarious acts of incitement 
| and help them in their evil terrorist plots.  
`----

http://uk.reuters.com/article/technologyNews/idUKL1889698320080418

Sooner or later, the laws will be misused even for political censorship and
other stuff for Big Media. And look at this:

French courts clamp down on pro-anorexia sites

,----[ Quote ]
| THE FRENCH National Assembly this week approved a bill that could not only 
| say a firm “non” to sites promoting extreme thinness and eating disorders 
| like Anorexia, but could also give lawmakers the power to prosecute those 
| behind them, making them face hefty fines and years of jail time if 
| convicted.    
`----

http://www.theinquirer.net/gb/inquirer/news/2008/04/21/promoters-anorexia-web-punished

What's next? Animal right activists?


Related:

Animal Rights Activists Forced to Hand Over Encryption Keys

,----[ Quote ]
| If you remember, this was sold to the public as essential for fighting 
| terrorism. It's already being misused. 
`----

http://www.schneier.com/blog/archives/2007/11/animal_rights_a.html


Judge: Man can't be forced to divulge encryption passphrase

,----[ Quote ]
| In this case, Judge Niedermeier took the second approach. He said that 
| encryption keys can be "testimonial," and even the prosecution's alternative 
| of asking the defendant to type in the passphrase when nobody was looking 
| would be insufficient.    
`----

http://www.news.com/8301-13578_3-9834495-38.html?tag=nefd.blgs


>From Zero to Holy $&*#!

,----[ Quote ]
| What if Linux and Free and Open Source Software became illegal to use due 
| to “national security?”  Never mind the fact that the American military uses 
| it.  Never mind the fact that Microsoft funded both political parties in the 
| year 2000.  Never mind that Richard Stallman has accused Microsoft of 
| enabling terrorism in the first place.    
`----

http://nixedblog.thenixedreport.com/?p=55


UK gov sets rules for hacker tool ban

,----[ Quote ]
| A revamp of the UK's outdated computer crime laws is long overdue. However, 
| provisions to ban the development, ownership and distribution of 
| so-called "hacker tools" draw sharp criticism from industry. Critics point 
| out that many of these tools are used by system administrators and security  
| consultants quite legitimately to probe for vulnerabilities in corporate 
| systems.    
`----

http://www.theregister.co.uk/2008/01/02/hacker_toll_ban_guidance/


German Security Professionals in the Mist

,----[ Quote ]
| This hope was important because earlier this year the German Government had 
| introduced similar language into Section 202c StGB of the computer crime 
| laws, which would have made the mere possession of (creates, obtains or 
| provides access to, sells, yields, distributes or otherwise allows access to) 
| tools like John, Kismet, KisMAC, Nessus, nmap, and the ability to Google 
| effectively a crime.     
`----

http://www.beskerming.com/commentary/2007/08/12/249/German_Security_Professionals_in_the_Mist


BitTorrent Admin Monitored by US Government, Forced to Dump Linux

,----[ Quote ]
| Sk0t, an ex-administrator of the EliteTorrents BitTorrent tracker is to have 
| his internet connection forcibly monitored by the US Government. If that 
| wasn’t bad enough, the monitoring software is Windows based - which means he 
| is being forced to ditch Linux - or face being barred from the internet.   
`----

http://torrentfreak.com/bittorrent-admin-monitored-by-us-government-forced-to-dump-linux/


Feds appeal loss in PGP compelled-passphrase case

,----[ Quote ]
| It's time to take another look at the intriguing case of United States v. 
| Boucher, which may set the ground rules for whether or not criminal 
| defendants can be compelled to divulge encryption passphrases.  
`----

http://www.news.com/8301-13578_3-9854034-38.html?part=rss&subj=news&tag=2547-1_3-0-20


N. Dakota Judge rules that "host -l" command constitutes hacking

,----[ Quote ]
| A North Dakota judge issued a ruling in Sierra Corporate Design v. Ritz that 
| has some pretty stunning implications about the use of the "host -l" command 
| when accessing DNS records. In the judgment (which was prepared by the 
| plaintiff's counsel and sent to the judge), the use of the "host -l" command 
| is tantamount to computer hijacking and hacking.     
`----

http://www.downloadsquad.com/2008/01/17/n-dakota-judge-rules-that-host-l-command-constitutes-hacking/

[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index