Madinat al-Muslimeen Islamic Message Board
|02/13/01 at 22:42:31|
|salami had an email sent to me containing a list of words that if you |
include them in your emails, they will be monitored by "big brother". i was
wondering if someone else has that emails since i lost it. and i would
also like to know where to go in the web to search for canadian laws and
their rights if raided or questioned?
|Re: seeking info|
|02/18/01 at 00:44:00|
I looked but I couldn't find a list like you were looking for. Here's an interesting article though:
FBI system covertly searches e-mail
by Neil King Jr. and Ted Bridis
WASHINGTON -- The U.S. Federal Bureau of Investigation is using a superfast system called Carnivore to covertly search e-mails for messages from criminal suspects.
Essentially a personal computer stuffed with specialized software, Carnivore represents a new twist in the federal government's fight to sustain its snooping powers in the Internet age. But in employing the system, which can scan millions of e-mails a second, the FBI has upset privacy advocates and some in the computer industry. Experts say the system opens a thicket of unresolved legal issues and privacy concerns.
The FBI developed the Internet wiretapping system at a special agency lab at Quantico, Va., and dubbed it Carnivore for its ability to get to "the meat" of what would otherwise be an enormous quantity of data. FBI technicians unveiled the system to a roomful of astonished industry specialists here two weeks ago in order to steer efforts to develop standardized ways of complying with federal wiretaps. Federal investigators say they have used Carnivore in fewer than 100 criminal cases since its launch early last year.
Word of the Carnivore system has disturbed many in the Internet industry because, when deployed, it must be hooked directly into Internet service providers' computer networks. That would give the government, at least theoretically, the ability to eavesdrop on all customers' digital communications, from e-mail to online banking and Web surfing.
The system also troubles some Internet service providers, who are loath to see outside software plugged into their systems. In many cases, the FBI keeps the secret Carnivore computer system in a locked cage on the provider's premises, with agents making daily visits to retrieve the data captured from the provider's network. But legal challenges to the use of Carnivore are few, and judges' rulings remain sealed because of the secretive nature of the investigations.
Internet eavesdropping Internet wiretaps are conducted only under state or federal judicial order, and occur relatively infrequently. The huge majority of wiretaps continue to be the traditional telephone variety, though U.S. officials say the use of Internet eavesdropping is growing as everyone from drug dealers to potential terrorists begins to conduct business over the Web.
The FBI defends Carnivore as more precise than Internet wiretap methods used in the past. The bureau says the system allows investigators to tailor an intercept operation so they can pluck only the digital traffic of one person from among the stream of millions of other messages. An earlier version, aptly code-named Omnivore, could suck in as much as to six gigabytes of data every hour, but in a less discriminating fashion.
Still, critics contend that Carnivore is open to abuse.
Mark Rasch, a former federal computer-crimes prosecutor, said the nature of the surveillance by Carnivore raises important privacy questions, since it analyzes part of every snippet of data traffic that flows past, if only to determine whether to record it for police.
"It's the electronic equivalent of listening to everybody's phone calls to see if it's the phone call you should be monitoring," Rasch said. "You develop a tremendous amount of information."
Others say the technology dramatizes how far the nation's laws are lagging behind the technological revolution. "This is a clever way to use old telephone-era statutes to meet new challenges, but clearly there is too much latitude in the current law," said Stewart Baker, a lawyer specializing in telecommunications and Internet regulatory matters.
Privacy and security concerns Robert Corn-Revere, of the Hogan & Hartson law firm here, represented an unidentified Internet service provider in one of the few legal fights against Carnivore. He said his client worried that the FBI would have access to all the e-mail traffic on its system, raising dire privacy and security concerns. A federal magistrate ruled against the company early this year, leaving it no option but to allow the FBI access to its system.
"This is an area in desperate need of clarification from Congress," said Corn-Revere.
"Once the software is applied to the ISP, there's no check on the system," said Rep. Bob Barr (R., Ga.), who sits on a House judiciary subcommittee for constitutional affairs. "If there's one word I would use to describe this, it would be 'frightening."'
Marcus Thomas, chief of the FBI's Cyber Technology Section at Quantico, said Carnivore represents the bureau's effort to keep abreast of rapid changes in Internet communications while still meeting the rigid demands of federal wiretapping statutes. "This is just a very specialized sniffer," he said.
He also noted that criminal and civil penalties prohibit the bureau from placing unauthorized wiretaps, and any information gleaned in those types of criminal cases would be thrown out of court. Typical Internet wiretaps last around 45 days, after which the FBI removes the equipment. Thomas said the bureau usually has as many as 20 Carnivore systems on hand, "just in case."
FBI experts acknowledge that Carnivore's monitoring can be stymied with computer data such as e-mail that is scrambled using powerful encryption technology. Those messages still can be captured, but law officers trying to read the contents are "at the mercy of how well it was encrypted," Thomas said.
Most of the criminal cases where the FBI used Carnivore in the past 18 months focused on what the bureau calls "infrastructure protection," or the hunt for hackers, though it also was used in counterterrorism and some drug-trafficking cases.
|Re: seeking info|
|02/18/01 at 01:02:57|
|as salaamu alaykum wa rahmatallahi wa barakatuh,|
Check this out...
Big Brother is Listening
By Judy S. Kwok
from [url=http://www.thinkcurrent.com/mag-11-00/business_tech/echelon.html]think current[/url]
"Those involved in ECHELON have stressed to Congress that there are no formal controls over who may be targeted. Junior intelligence staff can feed target names into the system at all levels, without any check on their authority to do so."
"Just send email around with lots of words along the same lines as 'Burn down the White House.'"
Explosives, guns, assassination. NSA, CIA, hackers. Anarchy, rogue, mailbomb.
According to a growing group of researchers, journalists, and cyber-activists, simply saying the above words on the telephone will trip the keyword recognition filter on ECHELON, a global spy system allegedly managed in part by the National Security Agency (NSA).
In other words, anti-government malcontents may be well advised to look into carrier pigeons and smoke signals. Big Brother is not just watching, he is listening in on the nation's telephone conversations and reading email too.
"The near-mythical worldwide computer spy network reportedly scans all email, packet traffic, telephone conversations-and more-around the world, in an effort to ferret out potential terrorist or enemy communications," according to a Wired article about ECHELON.
Computers intercept and scan large quantities of communications, rather those of a particular individual, according to the CovertAction Quarterly. A chain of secret interception facilities allegedly exists around the globe, with sites in Menwith Hill, England, central Australia, New Zealand, and Canada. Each facility taps into its own specific set of communications satellites, land-based communications networks, and radio communications. ECHELON links together the computers in these facilities, providing the United States and its allies with the ability to intercept a sizeable proportion of communications on the planet.
Each station in the ECHELON network reportedly contains computers that automatically search millions of intercepted messages for pre-programmed keywords, fax and telephone numbers, and email addresses. Every word of every message intercepted at the stations is searched in the quest to find the pre-programmed data. "The thousands of simultaneous messages are read in 'real time' as they pour into the station, hour after hour, day after day, as the computer finds intelligence needles in telecommunications haystacks," writes the CovertAction Quarterly.
"This massive surveillance system apparently operates with little oversight," states the ECHELON Watch website of the American Civil Liberties Union. "Moreover, the agencies that purportedly run ECHELON have provided few details as to the legal guidelines for the project. Because of this, there is no way of knowing if ECHELON is being used illegally to spy on private citizens."
The NSA declined to discuss alleged intelligence operations and did not confirm or deny the ECHELON network.
The idea of a massive Cold War-era surveillance network largely dedicated to spying on citizens constitutes a conspiracy theorist's dream. "In the days of the Cold War, ECHELON's primary purpose was to keep an eye on the U.S.S.R.," one conspiracy theorist's website shrills. "In the wake of the fall of the U.S.S.R. ECHELON justifies it's [sic] continued multi-billion dollar expense with the claim that it is being used to fight 'terrorism,' the catch-all phrase used to justify any and all abuses of civil rights."
The Internet is rife with lists of ECHELON keywords, each list rumored to be the master list of words that trigger surveillance. Most lists include the terms "bomb," "Spec Ops," "handgun," "FBI," "CIA," "IRS," and "terrorism." Yet the lists inevitably reflect the more dubious beliefs of their originators. Some lists include "Whitewater," "Vince Foster," "Hillary," and "Chelsea"; others focus on "Waco, Texas," "Oklahoma," and "Ruby Ridge."
I don't doubt Echelon exists.
[url=http://www.allsouthwest.com/library/nsa/echelon.html]Here[/url]'s a page that lists some words echelon supposedly picks up. I'm sure you can add "Allah", "Islam", "Jihad", etc to the list.
|Re: seeking info|
|02/23/01 at 22:08:57|
hmm what do you care how the Federal Bureau of Intimidation tries to scare you?..imam malik was once told that all islamic judges would have to wear black and he refused saying 'they seek to remove islam from the people'..
you ever wonder why these government issue goons all wear similar clothing , haircuts etc?..it's to try to make you view them as a unifacial monolithic entity...this obsession of theres of collecting information is just another aspect of their dajjal nature where they try to copy all the attributes of allah (swt) that are concerned with power and knowledge..underneath they are just a bunch of humans with weird clothes doing the 9 to 5 .(the founder of this cult was a guy who dressed up in a wig and was called maureen on weekends lol)....some of them like the ones who harass muslims are serious sickos paid by the government..but when you took the oath at the beginning akhi, allah (swt) warned you of the burden...let these power mad idiots enjoy themselves a moment of earth is not even a drop in the ocean of paradise or the fire of hell and if your still worried read 'The return of the pharoah' by zainab al-ghazzali
Individual posts do not necessarily reflect the views of Jannah.org, Islam, or all Muslims. All trademarks and copyrights on this page are owned by their respective owners. Comments are owned by the poster and may not be used without consent of the author.The rest © Jannah.Org