-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
The Continued Cheapening of the Word "Terrorism"
,----[ Quote ]
| Now labor strikes are terrorism...
|
| [...]
|
| Terrorism is a heinous crime, and a serious international problem. It's not a
| catchall word to describe anything you don't like or don't agree with, or
| even anything that adversely affects a large number of people. By using the
| word more broadly than its actual meaning, we muddy the already complicated
| popular conceptions of the issue. The word "terrorism" has a specific
| meaning, and we shouldn't debase it.
`----
http://www.schneier.com/blog/archives/2008/07/the_continued_c.html
How to Get Rid of the "War on Terror"
,----[ Quote ]
| What we should do now is to use "terrorism" for even the most trivial
| infraction: "parking terrorism", "litter terrorism", "noise terrorism" - you
| get the idea. In no time at all, even the politicians will recognise that the
| whole concept of "terror" has become eviscerated, and risible. The "War on
| Terror" will sound - rightly - about as sensible as a "War on Flatulence".
`----
http://opendotdotdot.blogspot.com/2008/07/how-to-get-rid-of-war-on-terror.html
The neo-fascists and maximalists use "terrorism" to pass new laws. They get to
define what "terrorism" (or "pirate") is.
Recent:
The war on photographers - you're all al Qaeda suspects now
http://www.theregister.co.uk/2008/06/23/police_photographer_stops/
MPAA: We Don't Need No Stinking Evidence!
,----[ Quote ]
| You get some positive news, such as the Amicus brief filed by the EFF and
| others in the Jammie Thomas case, which could net her a new trial.
|
| But also on Friday, the MPAA filed its own brief, one which basically says it
| feels evidence isn't necessary in the case of one of its copyright
| infringement trials.
`----
http://technologyexpert.blogspot.com/2008/06/mpaa-we-dont-need-no-stinking-evidence.html
Bavaria sanctions police spyware
,----[ Quote ]
| Bavaria has become the first German state to approve laws that allow police
| to plant spyware on the PCs of terror suspects.
`----
http://www.theregister.co.uk/2008/07/07/bavaria_police_spyware_plan/
The EU finally cops on to Cyber terrorism threat
,----[ Quote ]
| THE EU HAS only just arrived at the shocking conclusion that the Internet
| could in fact be used by extremists to carry out nefarious acts of incitement
| and help them in their evil terrorist plots.
`----
http://uk.reuters.com/article/technologyNews/idUKL1889698320080418
French courts clamp down on pro-anorexia sites
,----[ Quote ]
| THE FRENCH National Assembly this week approved a bill that could not only
| say a firm “non” to sites promoting extreme thinness and eating disorders
| like Anorexia, but could also give lawmakers the power to prosecute those
| behind them, making them face hefty fines and years of jail time if
| convicted.
`----
http://www.theinquirer.net/gb/inquirer/news/2008/04/21/promoters-anorexia-web-punished
Related:
Animal Rights Activists Forced to Hand Over Encryption Keys
,----[ Quote ]
| If you remember, this was sold to the public as essential for fighting
| terrorism. It's already being misused.
`----
http://www.schneier.com/blog/archives/2007/11/animal_rights_a.html
Judge: Man can't be forced to divulge encryption passphrase
,----[ Quote ]
| In this case, Judge Niedermeier took the second approach. He said that
| encryption keys can be "testimonial," and even the prosecution's alternative
| of asking the defendant to type in the passphrase when nobody was looking
| would be insufficient.
`----
http://www.news.com/8301-13578_3-9834495-38.html?tag=nefd.blgs
- From Zero to Holy $&*#!
,----[ Quote ]
| What if Linux and Free and Open Source Software became illegal to use due
| to “national security?” Never mind the fact that the American military uses
| it. Never mind the fact that Microsoft funded both political parties in the
| year 2000. Never mind that Richard Stallman has accused Microsoft of
| enabling terrorism in the first place.
`----
http://nixedblog.thenixedreport.com/?p=55
UK gov sets rules for hacker tool ban
,----[ Quote ]
| A revamp of the UK's outdated computer crime laws is long overdue. However,
| provisions to ban the development, ownership and distribution of
| so-called "hacker tools" draw sharp criticism from industry. Critics point
| out that many of these tools are used by system administrators and security
| consultants quite legitimately to probe for vulnerabilities in corporate
| systems.
`----
http://www.theregister.co.uk/2008/01/02/hacker_toll_ban_guidance/
German Security Professionals in the Mist
,----[ Quote ]
| This hope was important because earlier this year the German Government had
| introduced similar language into Section 202c StGB of the computer crime
| laws, which would have made the mere possession of (creates, obtains or
| provides access to, sells, yields, distributes or otherwise allows access to)
| tools like John, Kismet, KisMAC, Nessus, nmap, and the ability to Google
| effectively a crime.
`----
http://www.beskerming.com/commentary/2007/08/12/249/German_Security_Professionals_in_the_Mist
BitTorrent Admin Monitored by US Government, Forced to Dump Linux
,----[ Quote ]
| Sk0t, an ex-administrator of the EliteTorrents BitTorrent tracker is to have
| his internet connection forcibly monitored by the US Government. If that
| wasn’t bad enough, the monitoring software is Windows based - which means he
| is being forced to ditch Linux - or face being barred from the internet.
`----
http://torrentfreak.com/bittorrent-admin-monitored-by-us-government-forced-to-dump-linux/
Feds appeal loss in PGP compelled-passphrase case
,----[ Quote ]
| It's time to take another look at the intriguing case of United States v.
| Boucher, which may set the ground rules for whether or not criminal
| defendants can be compelled to divulge encryption passphrases.
`----
http://www.news.com/8301-13578_3-9854034-38.html?part=rss&subj=news&tag=2547-1_3-0-20
N. Dakota Judge rules that "host -l" command constitutes hacking
,----[ Quote ]
| A North Dakota judge issued a ruling in Sierra Corporate Design v. Ritz that
| has some pretty stunning implications about the use of the "host -l" command
| when accessing DNS records. In the judgment (which was prepared by the
| plaintiff's counsel and sent to the judge), the use of the "host -l" command
| is tantamount to computer hijacking and hacking.
`----
http://www.downloadsquad.com/2008/01/17/n-dakota-judge-rules-that-host-l-command-constitutes-hacking/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkhz2mcACgkQU4xAY3RXLo7xMACcDQoEpcIcVbhLD/+m4JVc5Hjw
cR4AoLLdHcw5AFu6tNMhq/4EPPnFMwav
=IiJm
-----END PGP SIGNATURE-----
|
|