1. The Topic of the Month for October is "Make this the Perfect Bugout Location". Please join the discussion in the TOTM forum.

Vacuum cleaner surveilance

Discussion in 'Freedom and Liberty' started by ripsnort, Jan 30, 2007.

  1. ripsnort

    ripsnort Monkey+++

    <TABLE class=bordercolor style="TABLE-LAYOUT: fixed" cellSpacing=1 cellPadding=3 width="100%" align=center border=0><TBODY><TR class=titlebg><TD>Vacuum cleaner surveilance</TD></TR><TR><TD class=windowbg width="100%">http://news.com.com/FBI+turns+to+broad+new+wiretap+method/2100-7348_3-6154457.html?tag=nefd.lede

    "Call it the vacuum-cleaner approach. It's employed when police have obtained a court order and an Internet service provider can't "isolate the particular person or IP address" because of technical constraints, says Paul Ohm, a former trial attorney at the Justice Department's Computer Crime and Intellectual Property Section. (An Internet protocol address is a series of digits that can identify an individual computer.)

    That kind of full-pipe surveillance can record all Internet traffic, including Web browsing--or, optionally, only certain subsets such as all e-mail messages flowing through the network. Interception typically takes place inside an Internet provider's network at the junction point of a router or network switch.

    The technique came to light at the Search & Seizure in the Digital Age symposium held at Stanford University's law school on Friday. Ohm, who is now a law professor at the University of Colorado at Boulder, and Richard Downing, a CCIPS assistant deputy chief, discussed it during the symposium.

    In a telephone conversation afterward, Ohm said that full-pipe recording has become federal agents' default method for Internet surveillance. "You collect wherever you can on the (network) segment," he said. "If it happens to be the segment that has a lot of IP addresses, you don't throw away the other IP addresses. You do that after the fact."

    "You intercept first and you use whatever filtering, data mining to get at the information about the person you're trying to monitor," he added.

    On Monday, a Justice Department representative would not immediately answer questions about this kind of surveillance technique.

    "What they're doing is even worse than Carnivore," said Kevin Bankston, a staff attorney at the Electronic Frontier Foundation who attended the Stanford event. "What they're doing is intercepting everyone and then choosing their targets." "

  2. sheen_estevez

    sheen_estevez Monkey+++

    Well that's what Big Brother likes to do.

    Oh crap now they are going to be watching me [banghead]
  3. Tango3

    Tango3 Aimless wanderer

    We never stopped...:sneaky::sneaky::sneaky:[flag][LMAO][tinfoil101]
survivalmonkey SSL seal        survivalmonkey.com warrant canary