Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

[News] [SOT] Crackdown on Internet, Starting with "Terrorism" and Moving on...

The EU finally cops on to Cyber terrorism threat

,----[ Quote ]
| THE EU HAS only just arrived at the shocking conclusion that the Internet 
| could in fact be used by extremists to carry out nefarious acts of incitement 
| and help them in their evil terrorist plots.  


Sooner or later, the laws will be misused even for political censorship and
other stuff for Big Media. And look at this:

French courts clamp down on pro-anorexia sites

,----[ Quote ]
| THE FRENCH National Assembly this week approved a bill that could not only 
| say a firm “non” to sites promoting extreme thinness and eating disorders 
| like Anorexia, but could also give lawmakers the power to prosecute those 
| behind them, making them face hefty fines and years of jail time if 
| convicted.    


What's next? Animal right activists?


Animal Rights Activists Forced to Hand Over Encryption Keys

,----[ Quote ]
| If you remember, this was sold to the public as essential for fighting 
| terrorism. It's already being misused. 


Judge: Man can't be forced to divulge encryption passphrase

,----[ Quote ]
| In this case, Judge Niedermeier took the second approach. He said that 
| encryption keys can be "testimonial," and even the prosecution's alternative 
| of asking the defendant to type in the passphrase when nobody was looking 
| would be insufficient.    


>From Zero to Holy $&*#!

,----[ Quote ]
| What if Linux and Free and Open Source Software became illegal to use due 
| to “national security?”  Never mind the fact that the American military uses 
| it.  Never mind the fact that Microsoft funded both political parties in the 
| year 2000.  Never mind that Richard Stallman has accused Microsoft of 
| enabling terrorism in the first place.    


UK gov sets rules for hacker tool ban

,----[ Quote ]
| A revamp of the UK's outdated computer crime laws is long overdue. However, 
| provisions to ban the development, ownership and distribution of 
| so-called "hacker tools" draw sharp criticism from industry. Critics point 
| out that many of these tools are used by system administrators and security  
| consultants quite legitimately to probe for vulnerabilities in corporate 
| systems.    


German Security Professionals in the Mist

,----[ Quote ]
| This hope was important because earlier this year the German Government had 
| introduced similar language into Section 202c StGB of the computer crime 
| laws, which would have made the mere possession of (creates, obtains or 
| provides access to, sells, yields, distributes or otherwise allows access to) 
| tools like John, Kismet, KisMAC, Nessus, nmap, and the ability to Google 
| effectively a crime.     


BitTorrent Admin Monitored by US Government, Forced to Dump Linux

,----[ Quote ]
| Sk0t, an ex-administrator of the EliteTorrents BitTorrent tracker is to have 
| his internet connection forcibly monitored by the US Government. If that 
| wasn’t bad enough, the monitoring software is Windows based - which means he 
| is being forced to ditch Linux - or face being barred from the internet.   


Feds appeal loss in PGP compelled-passphrase case

,----[ Quote ]
| It's time to take another look at the intriguing case of United States v. 
| Boucher, which may set the ground rules for whether or not criminal 
| defendants can be compelled to divulge encryption passphrases.  


N. Dakota Judge rules that "host -l" command constitutes hacking

,----[ Quote ]
| A North Dakota judge issued a ruling in Sierra Corporate Design v. Ritz that 
| has some pretty stunning implications about the use of the "host -l" command 
| when accessing DNS records. In the judgment (which was prepared by the 
| plaintiff's counsel and sent to the judge), the use of the "host -l" command 
| is tantamount to computer hijacking and hacking.     


[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index