Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

[News] [SOT] HOWTO: Pass New Laws (Lows)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

The Continued Cheapening of the Word "Terrorism"

,----[ Quote ]
| Now labor strikes are terrorism...
| 
| [...]
| 
| Terrorism is a heinous crime, and a serious international problem. It's not a 
| catchall word to describe anything you don't like or don't agree with, or 
| even anything that adversely affects a large number of people. By using the 
| word more broadly than its actual meaning, we muddy the already complicated 
| popular conceptions of the issue. The word "terrorism" has a specific 
| meaning, and we shouldn't debase it.     
`----

http://www.schneier.com/blog/archives/2008/07/the_continued_c.html

How to Get Rid of the "War on Terror"

,----[ Quote ]
| What we should do now is to use "terrorism" for even the most trivial 
| infraction: "parking terrorism", "litter terrorism", "noise terrorism" - you 
| get the idea. In no time at all, even the politicians will recognise that the 
| whole concept of "terror" has become eviscerated, and risible. The "War on 
| Terror" will sound - rightly - about as sensible as a "War on Flatulence".    
`----

http://opendotdotdot.blogspot.com/2008/07/how-to-get-rid-of-war-on-terror.html

The neo-fascists and maximalists use "terrorism" to pass new laws. They get to
define what "terrorism" (or "pirate") is.


Recent:

The war on photographers - you're all al Qaeda suspects now

http://www.theregister.co.uk/2008/06/23/police_photographer_stops/


MPAA: We Don't Need No Stinking Evidence!

,----[ Quote ]
| You get some positive news, such as the Amicus brief filed by the EFF and
| others in the Jammie Thomas case, which could net her a new trial.
|
| But also on Friday, the MPAA filed its own brief, one which basically says it
| feels evidence isn't necessary in the case of one of its copyright
| infringement trials.
`----

http://technologyexpert.blogspot.com/2008/06/mpaa-we-dont-need-no-stinking-evidence.html


Bavaria sanctions police spyware

,----[ Quote ]
| Bavaria has become the first German state to approve laws that allow police
| to plant spyware on the PCs of terror suspects.
`----

http://www.theregister.co.uk/2008/07/07/bavaria_police_spyware_plan/


The EU finally cops on to Cyber terrorism threat

,----[ Quote ]
| THE EU HAS only just arrived at the shocking conclusion that the Internet 
| could in fact be used by extremists to carry out nefarious acts of incitement 
| and help them in their evil terrorist plots.  
`----

http://uk.reuters.com/article/technologyNews/idUKL1889698320080418


French courts clamp down on pro-anorexia sites

,----[ Quote ]
| THE FRENCH National Assembly this week approved a bill that could not only 
| say a firm “non” to sites promoting extreme thinness and eating disorders 
| like Anorexia, but could also give lawmakers the power to prosecute those 
| behind them, making them face hefty fines and years of jail time if 
| convicted.    
`----

http://www.theinquirer.net/gb/inquirer/news/2008/04/21/promoters-anorexia-web-punished


Related:

Animal Rights Activists Forced to Hand Over Encryption Keys

,----[ Quote ]
| If you remember, this was sold to the public as essential for fighting 
| terrorism. It's already being misused. 
`----

http://www.schneier.com/blog/archives/2007/11/animal_rights_a.html


Judge: Man can't be forced to divulge encryption passphrase

,----[ Quote ]
| In this case, Judge Niedermeier took the second approach. He said that 
| encryption keys can be "testimonial," and even the prosecution's alternative 
| of asking the defendant to type in the passphrase when nobody was looking 
| would be insufficient.    
`----

http://www.news.com/8301-13578_3-9834495-38.html?tag=nefd.blgs


- From Zero to Holy $&*#!

,----[ Quote ]
| What if Linux and Free and Open Source Software became illegal to use due 
| to “national security?”  Never mind the fact that the American military uses 
| it.  Never mind the fact that Microsoft funded both political parties in the 
| year 2000.  Never mind that Richard Stallman has accused Microsoft of 
| enabling terrorism in the first place.    
`----

http://nixedblog.thenixedreport.com/?p=55


UK gov sets rules for hacker tool ban

,----[ Quote ]
| A revamp of the UK's outdated computer crime laws is long overdue. However, 
| provisions to ban the development, ownership and distribution of 
| so-called "hacker tools" draw sharp criticism from industry. Critics point 
| out that many of these tools are used by system administrators and security  
| consultants quite legitimately to probe for vulnerabilities in corporate 
| systems.    
`----

http://www.theregister.co.uk/2008/01/02/hacker_toll_ban_guidance/


German Security Professionals in the Mist

,----[ Quote ]
| This hope was important because earlier this year the German Government had 
| introduced similar language into Section 202c StGB of the computer crime 
| laws, which would have made the mere possession of (creates, obtains or 
| provides access to, sells, yields, distributes or otherwise allows access to) 
| tools like John, Kismet, KisMAC, Nessus, nmap, and the ability to Google 
| effectively a crime.     
`----

http://www.beskerming.com/commentary/2007/08/12/249/German_Security_Professionals_in_the_Mist


BitTorrent Admin Monitored by US Government, Forced to Dump Linux

,----[ Quote ]
| Sk0t, an ex-administrator of the EliteTorrents BitTorrent tracker is to have 
| his internet connection forcibly monitored by the US Government. If that 
| wasn’t bad enough, the monitoring software is Windows based - which means he 
| is being forced to ditch Linux - or face being barred from the internet.   
`----

http://torrentfreak.com/bittorrent-admin-monitored-by-us-government-forced-to-dump-linux/


Feds appeal loss in PGP compelled-passphrase case

,----[ Quote ]
| It's time to take another look at the intriguing case of United States v. 
| Boucher, which may set the ground rules for whether or not criminal 
| defendants can be compelled to divulge encryption passphrases.  
`----

http://www.news.com/8301-13578_3-9854034-38.html?part=rss&subj=news&tag=2547-1_3-0-20


N. Dakota Judge rules that "host -l" command constitutes hacking

,----[ Quote ]
| A North Dakota judge issued a ruling in Sierra Corporate Design v. Ritz that 
| has some pretty stunning implications about the use of the "host -l" command 
| when accessing DNS records. In the judgment (which was prepared by the 
| plaintiff's counsel and sent to the judge), the use of the "host -l" command 
| is tantamount to computer hijacking and hacking.     
`----

http://www.downloadsquad.com/2008/01/17/n-dakota-judge-rules-that-host-l-command-constitutes-hacking/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkhz2mcACgkQU4xAY3RXLo7xMACcDQoEpcIcVbhLD/+m4JVc5Hjw
cR4AoLLdHcw5AFu6tNMhq/4EPPnFMwav
=IiJm
-----END PGP SIGNATURE-----

[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index