Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

House Panel Approves Bill Forcing ISPs to Log Users’ Web History

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Latest Breaking News Donate to DU
 
Hissyspit Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 09:06 PM
Original message
House Panel Approves Bill Forcing ISPs to Log Users’ Web History
Source: CNet / Raw Story

House panel approves bill forcing ISPs to log users’ web history
Published on July 28th, 2011
Written by: Eric W. Dolan
Prev

The House Judiciary Committee approved legislation on Thursday that would require Internet service providers (ISPs) to collect and retain records about Internet users’ activity.

CNET reported the bill would require ISPs to retain customers’ names, addresses, phone numbers, credit card numbers, bank account numbers, and temporarily-assigned IP addresses for 12 months.

The bill passed by a vote of 19 to 10, and is aimed at helping law enforcement track down pedophiles.

“The bill is mislabeled,” Rep. John Conyers (D-MI), a senior member of the panel told CNET. “This is not protecting children from Internet pornography. It’s creating a database for everybody in this country for a lot of other purposes.”

Read more: http://www.rawstory.com/rs/2011/07/28/house-panel-approves-bill-forcing-isps-to-log-users-web-history
Printer Friendly | Permalink |  | Top
Ruby the Liberal Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 09:14 PM
Response to Original message
1. Okay, this is not good
I am inately curious - even about things that may disgust and/or horrify me. No, I am not talking about porn but more sensational stories about bizarre people.

I would hate to think what my browsing history would look like plugged into some random data analyzer.
Printer Friendly | Permalink |  | Top
 
SpiralHawk Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 09:17 PM
Response to Reply #1
2. Doubleplusungood
Note that it is the REPUBLICON house that is pushing this

Freaking Republicons

Major skankery (R) is afoot

depend upon it
Printer Friendly | Permalink |  | Top
 
Maine-ah Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 10:37 PM
Response to Reply #2
16. did you see the cosponsors?
http://www.govtrack.us/congress/bill.xpd?bill=h112-1981

"H.R. 1981: Protecting Children From Internet Pornographers Act of 2011"

Cosponsors:
Ken Calvert
Steven Chabot
Howard Coble
Mark Critz
Ted Deutch
Jo Ann Emerson
Bill Flores
Randy Forbes
Trent Franks
Elton Gallegly
Trey Gowdy
Sheila Jackson-Lee
Steven LaTourette
Cynthia Lummis
Daniel Lungren
Thomas Marino
Mike Quigley
Dutch Ruppersberger
Adam Schiff
Heath Shuler
Fortney Stark
Frederick Upton
Debbie Wasserman Schultz

Steven LaTourette
Cynthia Lummis
Daniel Lungren
Thomas Marino
Mike Quigley
Dutch Ruppersberger
Adam Schiff
Heath Shuler
Fortney Stark
Frederick Upton
Debbie Wasserman Schultz
Pedro Pierluisi

"The Protecting Children from Internet Pornographers Act of 2011 (H.R. 1981) was sponsored by House Judiciary Committee Chairman Lamar Smith (R-TX) and Congresswoman Debbie Wasserman Schultz (D-FL)"
Printer Friendly | Permalink |  | Top
 
Ruby the Liberal Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 10:40 PM
Response to Reply #16
17. Did Jackson Lee and Wasserman Schultz vote for it in its final form?
Fuck Heath Schuler. He should just switch from DINO to full blown Tea Bagger and be done with it.
Printer Friendly | Permalink |  | Top
 
No Elephants Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 02:06 AM
Response to Reply #17
66. How different was the final form of the bill from the version Wasserman Schultz co-sponsored?
Edited on Fri Jul-29-11 02:08 AM by No Elephants
Printer Friendly | Permalink |  | Top
 
shanti Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 10:44 PM
Response to Reply #16
21. they always hide their stinkbombs
in a pretty covering. as if anyone wouldn't see thru that bullshit. :(
Printer Friendly | Permalink |  | Top
 
No Elephants Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 02:03 AM
Response to Reply #16
65. Stop it! Please do not try to confuse us with facts.
Republicons are the bad ones and the ONLY bad ones.
Printer Friendly | Permalink |  | Top
 
PatrynXX Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 03:45 AM
Original message
and how many of those are accused sexual perverts.
I'm guessing the RIAA/MPAA sunk to a new low using perverts instead...
Printer Friendly | Permalink |  | Top
 
PatrynXX Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 03:45 AM
Response to Reply #16
82. and how many of those are accused sexual perverts.
I'm guessing the RIAA/MPAA sunk to a new low using perverts instead...
Printer Friendly | Permalink |  | Top
 
tavalon Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 05:53 AM
Response to Reply #16
101. HR 1981 needs to be renumbered: HR 1984
The, we are so lying to you, we don't give a damn about pedophilia, we just want your papers Act.
Printer Friendly | Permalink |  | Top
 
Zorra Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 07:46 AM
Response to Reply #16
117.  "Birds of a feather flock together" nt
Printer Friendly | Permalink |  | Top
 
peacetalksforall Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 09:37 AM
Response to Reply #16
130. Sooner or later, a heroine crashes - Sheila-Jackson Lee. She is no longer a heroine of mine.
Edited on Fri Jul-29-11 09:37 AM by peacetalksforall
Debbie W-S? I lost respect for her a couple of years ago. She is on my 'disgust' list.
Printer Friendly | Permalink |  | Top
 
defendandprotect Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 02:39 PM
Response to Reply #130
178. How could Shelia Jackson Lee have voted for this? Wasserman-Schultz, I get -- !!
Printer Friendly | Permalink |  | Top
 
mntleo2 Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 10:20 AM
Response to Reply #16
143. I just cleaned out my computer and ...
...found a BUNCH of porn links on my computer. Since I am the only one using this computer and I have *never* been to a porn site, what would they charge me with possessing? Fortunately I am a woman so perhaps that would save me?

No. And here is why:

I personally know a minister who was accused by his 15 year old daughter that he had molested her because he laid down the law and would not let her go out on a school night until after midnight. She thought it might be a way to get her way because she learned at school how "telling" worked. She then tried to retract it, but CPS, Title IV paid counselors, social workers and the courts would not listen to her retraction.

She is now in her late 20's and horribly regrets that ~ but this is after her entire family was destroyed, her parents divorced, her father spent time in prison, and his career ruined for life and their family decimated into poverty, her mother forced to raise all the kids alone with no help.

Worse, now the daughter's own children have been taken by CPS for "imminent danger" because she was supposedly a molested child and therefore a "risk" to her kids. Imminent danger means that something MIGHT happen in the future (not that it has ever happened) and it is thanks to laws like this. She is fighting to get them back and CPS admits nothing has ever happened to her kids, but this makes little difference to the courts and CPS.

If they had found the porn links I found on my computer on EITHER ONE OF THESE PEOPLE, it would be further "proof" both father and daughter are sexual predators.

I have to disclose here that I am an advocate for Family Preservation and hear stories like this all the time. I was inspired after being involved with the Wenatchee Witch Hunt in the 1980s. Things are no better today than it was then when they destroyed hundreds of kid's lives, sent dozens of innocents to prison for decades, and then were sued millions for false allegations. the minister I speak about is not one of these, but suffered as bad of consequences, almost 15 years later than this trial.

I cannot tell you enough how destructive these laws can be!

If anyone reading this thinks that this kind of "collateral damage" is necessary to protect REAL victims, think again. The truth is that if a predator is wealthy enough he can pay to defend himself, he will get away with it. Far more accused are innocent than guilty, but the fallout for being accused lasts for YEARS unless you can PAY for justice, and most cannot afford that.

Cat in Seattle

Printer Friendly | Permalink |  | Top
 
peacetalksforall Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 07:11 PM
Response to Reply #143
200. If police can plant drugs or weapons on you or your car - our isps can plant
Edited on Fri Jul-29-11 07:12 PM by peacetalksforall
porn as a little income raising side contract. All the Mafia's won in this country. Our 'leaders' and their lobbyists and much of lobbying is 100% political.

Our country is a crime and criminal setting - citizens being sold out by their leaders.
Printer Friendly | Permalink |  | Top
 
Enthusiast Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 03:16 AM
Response to Reply #2
79. Skankery is job one. nt
Printer Friendly | Permalink |  | Top
 
tavalon Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 05:50 AM
Response to Reply #2
97. 1984 all the way.
Shit this is not, not, good.
Printer Friendly | Permalink |  | Top
 
krabigirl Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 12:23 PM
Response to Reply #2
166. uh yeah, Democrats AND Republicans. Also, Lamar Smith..he is one of the worst repukes.
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 12:20 AM
Response to Reply #1
42. Totally misleading headline.
They aren't tracking browsing history, they're tracking who had which DHCP address assigned, and when.

When tech meets sensationalism = bad reporting.
Printer Friendly | Permalink |  | Top
 
Tunkamerica Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 12:50 AM
Response to Reply #42
54. I am not technically minded but
this is what wkipedia says about DHCP security:

Because the client has no way to validate the identity of a DHCP server, unauthorized DHCP servers can be operated on networks, providing incorrect information to DHCP clients. This can serve either as a denial-of-service attack, preventing the client from gaining access to network connectivity, or as a man-in-the-middle attack. Because the DHCP server provides the DHCP client with server IP addresses, such as the IP address of one or more DNS servers,<6> an attacker can convince a DHCP client to do its DNS lookups through its own DNS server, and can therefore provide its own answers to DNS queries from the client. This in turn allows the attacker to redirect network traffic through itself, allowing it to eavesdrop on connections between the client and network servers it contacts, or to simply replace those network servers with its own.
Because the DHCP server has no secure mechanism for authenticating the client, clients can gain unauthorized access to IP addresses by presenting credentials, such as client identifiers, that belong to other DHCP clients. This also allows DHCP clients to exhaust the DHCP server's store of IP addresses—by presenting new credentials each time it asks for an address, the client can consume all the available IP addresses on a particular network link, preventing other DHCP clients from getting service.


Doesn't that mean that the system can be gamed by anyone who actually wants to do something unscrupulous? If it can't be verified then how can any info be trusted? Only the stupid and the innocent will get "caught". Worse, anyone with the know-how can set someone up if they know their ip address. Am I wrong?
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 01:12 AM
Response to Reply #54
60. Yes, the system can be gamed.
Yes, somebody can set you up.

As an analog comparison:
With no more equipment than a pair of wire-cutters and a spare phone, I can go near your house, access your phone lines from *outside* of your house, and use "your" phone to call in death threats and bomb threats...it would show up on your phone bill, and it would use your caller ID..... for that matter, I could even send paper mail from your house, from "your" mailbox.

All systems are game-able. The proposed bill removes one point of *really* easy gaming, which is to use ISP connections that change IP's every time you connect (kind of like if your phone number frequently changed when you used the phone).... but all systems are game-able.
Printer Friendly | Permalink |  | Top
 
HillWilliam Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 07:29 AM
Response to Reply #60
113. One doesn't even need wirecutters
Just find a pedestal and use a butt-set. Then again, there was a lineman caught doing something similar; making nasty calls. Not particularly bright, but some idiot will try it (again). Phone lines are the least secure thing going but most folks never consider the notion.
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Jul-30-11 04:47 PM
Response to Reply #113
205. I was going for the minimum amount of available equipment.
Most folks don't own a butt-set.
Printer Friendly | Permalink |  | Top
 
Recursion Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 05:38 AM
Response to Reply #54
93. This person would have to have physical access to your network somewhere
http://tools.ietf.org/html/rfc2131 is a good place to start.

This putative attacker has to be physically between you and the server, at which point if he wanted to set you up he could just pretend to be you instead. Adding a rogue DHCP server to a network:

A) is detectable (the ISP would know immediately)
B) most of the time just shuts the network down rather than allowing the attacker to insert false information
C) Ironically enough would render this legislation moot, since a rogue server would keep you from getting a lease from the real server, so what this attacker would be doing is preventing the ISP from recording the lease you had.
Printer Friendly | Permalink |  | Top
 
Ghost Dog Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 02:28 AM
Response to Reply #42
72. Yes. Which IDs every packet you sent/received through the net
over the year.
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 04:32 AM
Response to Reply #72
83. Which IP's you used to connect is *not* every packet you have sent.
1. Connect to your ISP (logged)
2. Connect to another server, we'll call it "mickey" (not logged)
3. Connect using mickey to a third server, call it minnie, and talk between "mickey and minnie" (not logged)

This is about logging last-mile connections.
Printer Friendly | Permalink |  | Top
 
Mosaic Donating Member (851 posts) Send PM | Profile | Ignore Fri Jul-29-11 08:17 AM
Response to Reply #42
122. You know
I don't trust anyone on the internet. You are totally correct, this is not only misleading. It serves a purpose I believe in the manipulation of the public, to seem to excuse a supposed slide to fascism. Some "liberals" must have been beaten as children because as adults they cynically post crap that makes us all believe fascism is our future. I am an optimist and I think socialism is our future.
Printer Friendly | Permalink |  | Top
 
oviedodem Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 08:32 AM
Response to Reply #42
126. Not entireley..... I do this for a living. It is trivial to simply add in a couple
more data points to attach the web history to the ip-address. If you supposedly want to track a pedophile, then you have to know where he/she is going right?

Printer Friendly | Permalink |  | Top
 
Bill USA Donating Member (628 posts) Send PM | Profile | Ignore Fri Jul-29-11 12:36 PM
Response to Reply #126
170. since browsers can keep track of how many have linked into a cite, why don 't they establish the
child porn sites and then track back to the linked in ISPs (with attention being given to those ISPs which linked and stayed - to allow for accidental links)?



Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Jul-30-11 05:18 PM
Response to Reply #170
208. You're kind of close.
They can find child porn sites, and after seizing the equipment, view what addresses have been viewing them, but that only goes to the ISP. The ISP may not have tracked which users had which addresses, which is what the law is about: if a user with the address 192.168.41.23 was visiting the child porn site, it's trivial to find out which ISP that user was using, but it's not always trivial to determine which ISP customer had that specific address at a given point in time.
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Jul-30-11 04:51 PM
Response to Reply #126
206. Tracking that much data requires serious hardware.
Since you "do this for a living", I assume you know that it's technically possible to add a snort box (or similar) and sniff all the traffic, then record all websites, emails, etc....

But it fills hard-drives *fast*, if it's done indiscriminately.
Printer Friendly | Permalink |  | Top
 
drm604 Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 09:53 AM
Response to Reply #42
135. Okay, I'm somewhat technically oriented
but I'm not familiar down to that level. What exactly does this give them the ability to do? Can they tell what IP addresses your IP address has contacted?
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Jul-30-11 04:54 PM
Response to Reply #135
207. So, when you connect to your ISP:
They give you an address to use.

The law is designed to record who got which address.

That is not a record of which addresses you have contacted.
Printer Friendly | Permalink |  | Top
 
Ratty Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 03:15 PM
Response to Reply #42
183. Yup. That headline is NOT what the bill says
Geez, it's like something you'd expect on Fox news. As you said, the bill says they will keep records of the IP address assigned to a customer. There's nothing about web history or credit card information.

Now, the feds *could* use that IP address to subpoena Google for a log of your searches, but that's not a complete log of "internet activity." They could also subpoena the ISP for the credit card you use to pay your bill. But that's a completely separate issue from this bill.

And yeah, I have no doubt the feds have "other ways" to track your internet activity, like the secret rooms in the basements of the telcos. But that's not the issue here.
Printer Friendly | Permalink |  | Top
 
foo_bar Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 04:40 PM
Response to Reply #183
188. "There's nothing about ... credit card information."
Edited on Fri Jul-29-11 04:42 PM by foo_bar
As you said, the bill says they will keep records of the IP address assigned to a customer
A last-minute rewrite of the bill expands the information that commercial Internet providers are required to store to include customers' names, addresses, phone numbers, credit card numbers, bank account numbers, and temporarily-assigned IP addresses, some committee members suggested. By a 7-16 vote, the panel rejected an amendment that would have clarified that only IP addresses must be stored.

http://news.cnet.com/8301-31921_3-20084939-281/house-panel-approves-broadened-isp-snooping-bill/

...although "some committee members suggested" suggests our knowledge is limited to hearsay, and you and bopper are correct about RawStory getting the headline wrong since this has absolutely nothing to do with "Forcing ISPs to Log Users' Web History" according to their own summary of the story.

If these reports are true, I wouldn't be surprised if credit card companies opposed the CC provision of the proposed legislation since superfluous card number retention affects their bottom line, and ISPs will oppose it (for all the good that does) since this appears to work at cross purposes with industry best practices with regard to "Payment Card Industry Data Security Standards":

3.1 Keep cardholder data storage to a minimum. Develop a data retention and disposal policy. Limit storage amount and retention time to that which is required for business, legal, and/or regulatory purposes, as documented in the data retention policy.

https://www.pcisecuritystandards.org/pdfs/pci_audit_procedures_v1-1.pdf

Minimization of both cardholder data stored, and the amount of time the data is stored (retention period) is key.

http://resource.onlinetech.com/guide-to-becoming-pci-compliant-protect-cardholder-data/

Another measure your business should take to help you remain PCI compliance is to purge credit card information after a certain number of months. Failing to purge credit card data is putting your business at risk and if a security breach occurs, your business will pay fines on a “per credit card stolen” basis.

http://blog.dydacomp.com/keeping-m-o-m-pci-compliant

Requirement 3.1 of the PCI Data Security Standard (DSS) states that cardholder data storage must be minimized and a policy defining the appropriate retention length must be defined. There may be legal or regulatory requirements relating to data retention that must be adhered to. However, in most circumstances, documents containing full primary account numbers (PANs) need not be retained past 90 days, which is typically when chargebacks or disputes occur. If there is no business need to store cardholder data (for instance, so that a third party can supply access to transaction data and provide a mechanism for disputes and chargebacks), merchants should consider purging or redacting PANs stored both electronically and in hardcopy.

http://www.netspi.com/blog/2010/10/18/common-compliance-hurdles-part-3-data-retention/

After this 'Retention Period', all credit cards are shredded doing a deposit (end of day process) unless still required for a future post dated payment, or it has been specifically marked as retain permanently under the patron record.

Schedule "D" compliance with about 120 days of retention is sufficient for most venues, especially if you are using post dated payments or may have to deal with refunds for cancelled events.

http://www.theatremanagerhelp.com/book/export/html/1620

I think I'm with Lofgren on this one:
Lofgren proposed an amendment to rename the bill the "Keep Every American's Digital Data for Submission to the Federal Government Without a Warrant Act."

http://www.eweek.com/c/a/Data-Storage/US-ISP-Data-Retention-Bill-Goes-to-House-for-Debate-806677/
Printer Friendly | Permalink |  | Top
 
Ratty Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 04:53 PM
Response to Reply #188
191. I don't understand what "last minute rewrite" means
None of those other things are in the text of the bill currently made available via Thomas. So is it in the act of being rewritten? Where can one go to actually read the text of the "true" bill?
Printer Friendly | Permalink |  | Top
 
foo_bar Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 05:24 PM
Response to Reply #191
193. the Thomas version seems to be the original
Edited on Fri Jul-29-11 05:25 PM by foo_bar
Here's a transcript of the hearing: http://judiciary.house.gov/hearings/pdf/7%2028%2011%20HR%201981%20HR%201433.pdf

And the text of the amendment: http://judiciary.house.gov/hearings/pdf/HR1981%20Managers%20Amendment.pdf

I'm not a lawyer but the key phrase appears to be "that enables the identification of the corresponding customer or subscriber information under subsection (c)(2) of this section":

And if you look at page 2 of the manager's amendment, line 4, it refers to Subsection (c)(2) of the section, and HJU209000 Subsection (c)(2) of the section references Title 18 of the U.S. Code 2703(c)(2). And that section of the law requires the provider of electronic communication to provide to the Government entity the name, the address, local and long distance telephone connection records, length of service, subscriber number identity, means and source of payment, including credit card or bank account numbers.

(- Rep. Lofgren) http://judiciary.house.gov/hearings/pdf/7%2028%2011%20HR%201981%20HR%201433.pdf

The amendment clarifies that providers must retain not simply a list of the IP addresses they assign to customers but rather a log of the IP addresses and the corresponding account information needed to identify the customer.

http://judiciary.house.gov/news/Statement%20Managers%20Amendment%20HR1981.html
Printer Friendly | Permalink |  | Top
 
SkyDaddy7 Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 04:54 AM
Response to Reply #1
85. I agree! I have searched for and read about
Tons of stuff especially if it has been in the news...scary stuff indeed!
Printer Friendly | Permalink |  | Top
 
Stinky The Clown Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 09:18 PM
Response to Original message
3. Next, we'll hear that this data will be turned over to TSA
The electronic equivalent of "May I haff yawr papahs, pleas."
Printer Friendly | Permalink |  | Top
 
Amonester Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 11:10 PM
Response to Reply #3
28. Prolly is already, by other 'ancient' 'retro-active' bill...
"if needed be"
Printer Friendly | Permalink |  | Top
 
zeemike Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 09:20 PM
Response to Original message
4. Good time to act on it.
When we are all so distracted with the debt crapola....they really know how to work the system.
Printer Friendly | Permalink |  | Top
 
No Elephants Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 02:10 AM
Response to Reply #4
67. They ARE the system.
Printer Friendly | Permalink |  | Top
 
DJ13 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 09:29 PM
Response to Original message
5. names, addresses, phone numbers, credit card numbers, bank account numbers
What juicy targets for hackers.

Great idea (NOT!).
Printer Friendly | Permalink |  | Top
 
Recursion Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 05:35 AM
Response to Reply #5
92. Did you read the article? That's not what they're talking about
Don't let that stop people from freaking out, though.
Printer Friendly | Permalink |  | Top
 
LeftyMom Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 09:30 PM
Response to Original message
6. My ISP doesn't even have half of that information. And I don't intend to give it to them.
I'm not in the habit of passing out my banking information to companies other than my bank.
Printer Friendly | Permalink |  | Top
 
Name removed Donating Member (0 posts) Send PM | Profile | Ignore Thu Jul-28-11 10:44 PM
Response to Reply #6
20. Deleted message
Message removed by moderator. Click here to review the message board rules.
 
blank space Donating Member (266 posts) Send PM | Profile | Ignore Thu Jul-28-11 11:18 PM
Response to Reply #6
33. Riiight,
how on earth did you get your internet connection ?
Printer Friendly | Permalink |  | Top
 
LeftyMom Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 12:24 AM
Response to Reply #33
45. "Hi big national company, I'd like to set up an account."
Edited on Fri Jul-29-11 12:26 AM by LeftyMom
They have my address, my name and my phone number. They send me bills, the quaint paper kind because I prefer them. I pay them in cash when I happen to be near their office, because I find it easy enough to do. I did not have to give them my bank account information, a credit card number, my blood type or tell them what role my mother played her senior class' play to set up an account.
Printer Friendly | Permalink |  | Top
 
Tunkamerica Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 12:42 AM
Response to Reply #45
49. how do you pay when you don't pay cash?
if it's a check they have yr account info and if it's a credit card ...

maybe you have that new rush card
Printer Friendly | Permalink |  | Top
 
LeftyMom Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 01:12 AM
Response to Reply #49
58. I always pay that bill in cash.
:shrug:
Printer Friendly | Permalink |  | Top
 
Tunkamerica Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 03:42 AM
Response to Reply #58
80. Oh, I read the sentence as: "When I'm near the office I pay cash, when I'm not I pay..."
I see.
Printer Friendly | Permalink |  | Top
 
blank space Donating Member (266 posts) Send PM | Profile | Ignore Fri Jul-29-11 01:31 AM
Response to Reply #45
63. Most people pay by card,
further most people have it debited.

Either way - everything you look at, search for, or anyone else searches for or looks at, hears, types is going to be logged straight back to you - every single thing. Not just legally, but they are legally obliged to log everything you do.

Awesome. What a day - keep on defending having your every single movement tracked.


I build the software that tracks you by the way - I know exactly what I can know about YOU. And it terrifies me beyond belief how much control they have over your life already - you have no idea.

I can assure you that it would not take me ten minutes to track down almost any of you, catch your packets, retrace access and then start storing my searches via your machine - someone could be building a terrorist attack from your machine while you are browsing democratic underground, and you would absolutely be ghosted before they realised you had squat to do with it.
Printer Friendly | Permalink |  | Top
 
Ghost Dog Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 02:35 AM
Response to Reply #63
74. "I know exactly what I can know about YOU. And it terrifies me beyond belief"
Can you give us a summary of what you can know?
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Jul-30-11 05:43 PM
Response to Reply #74
209. I can't speak for them, but I worked in the spook edge of the industry for a bit.
With warrants, and equipment installed:
1. Every phone call made is logged, and recorded.
2. Every website, email, and IM, and video chat (etc. etc. etc.) is logged, and recorded.
3. Every debit card, credit card, (etc.) transaction is logged, and recorded.
4. Every purchase made at a major retailer with cash, but with an "account" (think of "customer rewards" cards) is logged, and recorded.

Without a warrant, less information is available, but it's still a fairly large amount.

For example: Last I checked, on one web search alone, there are 71,800 pages of documents about me (and the one guy on the whole planet that I share a terribly obscure name with). Adding in emails, it's easily 300,000 pages of documents or more. Since I mostly live in cash, there isn't much of a bank trail, because my "customer rewards" cards point to somebody who doesn't exist.

I'm not terrified by it, however.

Yes, I watch porn, go to strip clubs, buy a lot of beer, have slept with men and women, struggle with drinking too much, and people who don't like me because of it.... can fuck off. I don't care if they think I'm immoral, or sinful, or whatever.

Blackmail only works on people who feel they have to hide something.
Printer Friendly | Permalink |  | Top
 
Randypiper Donating Member (527 posts) Send PM | Profile | Ignore Fri Jul-29-11 06:12 PM
Response to Reply #45
196. Don't think your safe because you you don't give out that info
Your digital info is online because your bank and credit card company are.
Printer Friendly | Permalink |  | Top
 
Tunkamerica Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 12:40 AM
Response to Reply #33
48. envelopes full of quarters
Printer Friendly | Permalink |  | Top
 
No Elephants Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 02:13 AM
Response to Reply #6
68. I've never done online banking and never will.
Among many other things, online banking is one more way to take jobs away from human beings.

For the same reason, I will often also wait through 43 menu prompts on an automated phone answering system in ordeer to speak to a human being.

Printer Friendly | Permalink |  | Top
 
Tunkamerica Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 03:44 AM
Response to Reply #68
81. maybe this will make it easier, maybe you already use this
Printer Friendly | Permalink |  | Top
 
Tunkamerica Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Jul-30-11 02:46 AM
Response to Reply #81
204. and this
Printer Friendly | Permalink |  | Top
 
Recursion Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 05:52 AM
Response to Reply #68
99. There are more tellers working today than 30 years ago, even per capita (nt)
Edited on Fri Jul-29-11 05:52 AM by Recursion
Printer Friendly | Permalink |  | Top
 
DireStrike Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 02:36 PM
Response to Reply #68
177. You don't have to wait
I just keep pressing zero until someone comes on.
Printer Friendly | Permalink |  | Top
 
ejpoeta Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 05:50 PM
Response to Reply #177
195. that is not always possible. trust me. i have tried. sometimes they make it impossible to talk to
a person. especially when you really really want to talk to a person.
Printer Friendly | Permalink |  | Top
 
Newest Reality Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 09:32 PM
Response to Original message
7. Let me be the first
in this thread to say that:

I LOVE BIG BROTHER!

I just want to stay out of Room 101 for now.

Be SEEING you!
Printer Friendly | Permalink |  | Top
 
avaistheone1 Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 12:16 AM
Response to Reply #7
41. Smile.
Printer Friendly | Permalink |  | Top
 
tavalon Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 05:57 AM
Response to Reply #7
102. You aren't the first to reference this, but yeah, room 101 is bad.
This,OTOH, is doubleplus good! Really!
Printer Friendly | Permalink |  | Top
 
Dirigo Donating Member (157 posts) Send PM | Profile | Ignore Fri Jul-29-11 12:14 PM
Response to Reply #102
164. What is the significance of Room 101 ???
What is room 101?
Printer Friendly | Permalink |  | Top
 
JBoy Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 02:23 PM
Response to Reply #164
174. From the novel 1984.
http://en.wikipedia.org/wiki/Room_101

Room 101 is a place introduced in the novel Nineteen Eighty-Four by George Orwell. It is a torture chamber in the Ministry of Love in which the Party attempts to subject a prisoner to his or her own worst nightmare, fear or phobia.
Printer Friendly | Permalink |  | Top
 
tavalon Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 06:30 PM
Response to Reply #164
197. It's from Orwell's 1984
This was actually the first reference to the torture or retraining room, but many references have been made to 1984 in this thread because it is beyond apropos.
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Jul-30-11 05:51 PM
Response to Reply #7
210. You mean room 641A.
http://en.wikipedia.org/wiki/Room_641A

(Yes, it's real, I've seen it when I was in that data center).
Printer Friendly | Permalink |  | Top
 
liberal N proud Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 09:35 PM
Response to Original message
8. And when that data gets hacked?
You will be exposed like never before.

Printer Friendly | Permalink |  | Top
 
Recursion Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 05:29 AM
Response to Reply #8
89. Ooh... somebody will know what my IP address was last month!
I'm terrified, I tell you. Terrified. :eyes:

Sensationalist low-information tech reporting is the bane of good policy...
Printer Friendly | Permalink |  | Top
 
liberal N proud Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 08:14 AM
Response to Reply #89
121. Orwell said it best...
“On coins, on stamps, on the covers of books, on banners, on posters, and on the wrappings of a cigarette Packet -- everywhere. Always the eyes watching you and the voice enveloping you. Asleep or awake, working or eating, indoors or out of doors, in the bath or in bed -- no escape. Nothing was your own except the few cubic centimetres inside your skull. “ – George Orwell “1984”
Printer Friendly | Permalink |  | Top
 
Recursion Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 08:58 AM
Response to Reply #121
127. When I care I use crypto
There are free, easy-to-use tools for hiding network traffic from 3rd parties (and at this point I'm much more worried about the Russian mob than the FBI). People who can't be bothered to protect their own privacy when the means are available garner little sympathy from me.
Printer Friendly | Permalink |  | Top
 
The Doctor. Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 03:05 PM
Response to Reply #127
182. Three things:
1) Not everyone knows how to use or where to find such tools.

2) Not all of those tools are legit. It's way too easy to drop some quiet, malign code into such programs.

3) Try spoofing your mac id. Point? It's illegal. How long will it be before it's illegal to use encryption programs?

Your 'I'm covered so screw everyone else' attitude makes it easy for you to ignore the simple fact that this legislation is bullshit. It reeks of the exact same 'I'm doing nothing wrong so I have nothing to fear' attitude people had toward the Patriot Act and Warrantless Wiretapping.
Printer Friendly | Permalink |  | Top
 
w0nderer Donating Member (430 posts) Send PM | Profile | Ignore Fri Jul-29-11 08:22 PM
Response to Reply #182
201. happy SA day
i can't seem to find anything but hearsay on that mac spoof being illegal

to include the july 19 2011
http://bits.blogs.nytimes.com/2011/07/19/reddit-co-founder-charged-with-data-theft/
even the full indictment

refered to from the simplistic
http://en.wikipedia.org/wiki/MAC_spoofing

doesn't have that he's going down for mac spoofing, he's going down for other things

the legislation is bovine fertilizer, that being said, people online and off will try to take your privacy away
it's a historical trend so...

for people in category 1, don't know where:
http://www.gnupg.org
http://www.truecrypt.org
https://www.torproject.org/projects/vidalia
is where
for people in category 1, don't know how: read the manuals and play around or ask online
it's not as hard as a lot of people, companies and agencies would like you to believe it is


for category 2
that goes for any and all programs online
with multipass compression and encryption (morphing) virii and trojans/malware
no program can be considered even he beginning of safe until sig checked, virus scanned and preferably sandbox tested
depends on how paranoid one wants to be...

most good security ware has SIGs
hence download gnupg first
http://gnupg.org/download/integrity_check.en.html
how to integrity check that

only tor/vidalia has anything with this to do, but gnupg allows you to check the sig on tor/vidalia
and i always mention 'the trinity' of crypts never just the one part

as a side issue spoofing mac only affects LAN traffic, doesn't go outside the network seg ((in general)broadcast area)

yes, it can help one get a different ip from the dhcp server, that ip would still be connected to digital subscriber ((cable modem mac usually), which incidentally is hardware hacking to change, and highly illegal) and you'd need a mac address from another subscriber since they are usually white listed, and often the router will block out MAC's not from the immediate area

as for why it won't help much past that, osi model layer 2 vs 3 aka bridges vs routers

Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Jul-30-11 06:05 PM
Response to Reply #201
212. A huge amount of virtualization systems *rely* on MAC spoofing,
As do home routers.... besides which, as you note, MAC is local only.

Happy SA day to you too, a day late! Always good to see more BOFH on DU!

Printer Friendly | Permalink |  | Top
 
Recursion Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Jul-30-11 08:34 PM
Response to Reply #201
221. Nobody knows your MAC except link-local nodes anyways
Spoofing it certainly isn't illegal, though it conceivably could make your network stop working if you managed to repeat one already on it.
Printer Friendly | Permalink |  | Top
 
w0nderer Donating Member (430 posts) Send PM | Profile | Ignore Sat Jul-30-11 09:23 PM
Response to Reply #221
223. It was the legality of Mac spoofing i was wondering about...
couldn't see how it could be illegal with as limited an effect as it has and as many legitimate uses
then again i've seen some strange laws

as for managing to make it stop
that's why a list of retired MAC addresses for use, and another list of addresses on the network already are good to have

Printer Friendly | Permalink |  | Top
 
Recursion Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Jul-30-11 09:46 PM
Response to Reply #223
224. The namespace for MAC addresses is nearly 300 trillion
The odds of a collision are low enough that you generally have better things to worry about; even if you do, there are reserved address ranges you can safely use for virtualization, etc.
Printer Friendly | Permalink |  | Top
 
w0nderer Donating Member (430 posts) Send PM | Profile | Ignore Sat Jul-30-11 10:54 PM
Response to Reply #224
225. SA != NA && whitelisted cisco ; odds bite both ways! n/t
Printer Friendly | Permalink |  | Top
 
Generic Other Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 09:40 AM
Response to Reply #121
131. even the few centimeters in your skull will be probed!
Printer Friendly | Permalink |  | Top
 
BetsysGhost Donating Member (176 posts) Send PM | Profile | Ignore Fri Jul-29-11 10:10 AM
Response to Reply #131
141. mine already is
NO JOKE
Printer Friendly | Permalink |  | Top
 
wtmusic Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 09:37 PM
Response to Original message
9. House Panel Approves Bill != Bill Becomes Law. nt
Printer Friendly | Permalink |  | Top
 
Ruby the Liberal Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 09:38 PM
Response to Reply #9
10. Who is claiming it is?
The mere thought is profoundly disturbing.
Printer Friendly | Permalink |  | Top
 
blkmusclmachine Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 09:57 PM
Response to Original message
11. UnPatriot Act, Part 2.5
Printer Friendly | Permalink |  | Top
 
L0oniX Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 10:04 PM
Response to Original message
12. WTF! ...another big ol hole for gov privacy abuse. Do we have any rights left?
Edited on Thu Jul-28-11 10:05 PM by L0oniX
Printer Friendly | Permalink |  | Top
 
No Elephants Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 02:18 AM
Response to Reply #12
69. If we do, for heaven's sake, don't tell anyone or we won't have them any longer.
Printer Friendly | Permalink |  | Top
 
Fearless Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 10:26 PM
Response to Original message
13. This is like the feds looking for people's library history after the PATRIOT ACT.
How very unconstitutional.
Printer Friendly | Permalink |  | Top
 
Ghost Dog Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 02:40 AM
Response to Reply #13
75. Would it not imply unjustified entry and search?
- entry into the private area which in this case is not so much your home as it is your 'information zone'.

- and search, because the gathering of this data can only be useful as input to a search process whereby information zone is to be analysed for specific but arbitrary search results.
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 04:58 AM
Response to Reply #75
86. 3rd party doctrine.
If you use a 3rd party, you lose an expectation of privacy, unless that 3rd party is providing a reasonable expectation of privacy.

As it pertains to the internet, it's still being hammered out, so I'll explain it in terms of talking on the phone:
If you are in an enclosed phone booth (if you're old enough to remember those), you have an expectation of privacy. Even if they tap the call from *outside* the phone booth, since you have an expectation of privacy (a closed door), a warrant is required.

Now, if you're at a phone *bank*, with wooden partitions separating the phones, the rules change. They can hang a mic above the bank, in a public place, no warrant needed, because part of the conversation is in "public".

Now, where 3rd party comes in is that if the phone bank is in, say, a nightclub, they are allowed to hang a microphone, without a warrant, to listen.... (unless that microphone is hung to listen to an enclosed space). Since you are sharing information with a third party, it is not "private" anymore.

As far as your concept of "information zone", I haven't seen that legally defined. The courts have already held that if you are, for example, mixing public and private (talking loudly on a phone in a park), you have no expectation of privacy.

What's gob-smacking to me is the idea that billions of people started communicating on the internet without realizing that it is *not* private, unless you "close the phone booth door".

To repeat: The two most popular connection methods in the U.S. for consumers, cable broadband and WiFi, are NOT PRIVATE. You have to do things to "close the door".
Printer Friendly | Permalink |  | Top
 
BiggJawn Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 10:28 PM
Response to Original message
14. OK, I'll confess...
I like pictures of voluptuous women and middle-age ladies.

There. DARPA can't blackmail me now!
Printer Friendly | Permalink |  | Top
 
McCamy Taylor Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 10:35 PM
Response to Original message
15. This is a blackmail ops. My suggestion---everyone log onto a gay porn site at least once
Edited on Thu Jul-28-11 10:36 PM by McCamy Taylor
a day. Make their data mining useless.

PS How will this track pedophiles? I thought child porn was illegal. Does the US Post Office plan to produce kiddie porn to set up internet sites to entrap? Is it legal and ethical for our government to exploit children in this way?
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 12:40 AM
Response to Reply #15
47. "PS How will this track pedophiles?"
It creates a log at an ISP of when you had an address. It doesn't track what sites you visited (headline was not written by a techie, surf away on gay porn if you want).

Here's how it typically works in real life:
1. Cops find porn operator website, or sent an email with a death threat to the POTUS, etc.
2. Cops grab evidence of what *addresses* visited that site, or sent the email.
3. Cops can use that to trace what ISP "owns" that address (this information is already public).
Now, here is the reason for law:
4.a) If an ISP doesn't keep any records of which person's equipment had that address, at which time, cops are at a dead end. There's usually enough information to say "oh, that's from someone living in southern florida, and using XYZ ISP", but it may not provide enough information to say *which* person using that ISP.
4.b) If an ISP *does* keep records of who logged on, when they logged on, and what addresses they have been assigned (and when), the cops can track it back to some specific person's equipment.

Printer Friendly | Permalink |  | Top
 
gtar100 Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 03:14 AM
Response to Reply #47
78. If what you are saying is true, then a lot of people are blowing this out of proportion.
Especially the author of the main article.

Still, it's essential we be vigilant so that methodical databasing of all user activity is *not* collected as a means to profile everyone. I have no problem with allowing them to work from a specific site backwards and requiring DHCP assignment *only* being kept for a maximum specified time. But not collecting all browsing history at the ISP. Google and other individual sites are already bad enough.

It also seems that if the bad guys know how to work around this stuff to go undetected, some of us good guys ought to come up with easy-to-use "anonymizers" to keep the playing field level. Because if tracking software, even if just at the ISP, abuses its role, then it should be treated like a virus. The virus may not reside on your local computer, but it does on the server.

Really, some core principles need to be clearly defined and made into policy and law if necessary. Leaving it up to site operators and ISP's leaves too much room for abuse. Allowing hysterical conservatives and fundamentalists to dictate regulations is also unacceptable. It seems the core principles are freedom, privacy, and respect. If any of these are abused, such as by pedophiles and other criminals, there should be some means to find out who they are. No easy answers for determining policy, and certainly nothing a republican could ever be trusted with since they have pissed away all their integrity and trustworthiness. But alas, this is the US where "special" interests dictate policy, not intelligence, thoughtfulness and foresight. Security is good only when it's in good measure - neither lacking, nor excessive.
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 05:41 AM
Response to Reply #78
94. "blowing this out of proportion."... 'emocrats' seems to be the current meme.
Emphasis on 'emo'. Big on fits and drama, headlines and hyperbole.

As far as collecting *all* history, that's just a huge waste of CPU. It's been tried. It's pointless, other than in *very* sensitive environments, where it has to be tuned. (Disclaimer: I have tuned systems for such environments, I was paid well, but the stress levels sucked).

'It also seems that if the bad guys know how to work around this stuff to go undetected, some of us good guys ought to come up with easy-to-use "anonymizers" to keep the playing field level.'

Yeah, done, and it's in the field. The thing is, though, is if you let everybody decide if they are a "good guy", the whole thing breaks.

'Really, some core principles need to be clearly defined and made into policy and law if necessary.'

This was done years ago, because we saw the problems years ago. The people who actually *run* the internet (yes, they exist, but they don't have a "boss") have a hardcore code of ethics, and violations are not taken easily. Because there was no "internet jurisdiction", we made our own. Same with internet ethics.

We are SAGE. We are BOFH. We are (in the US) NANOG. We are IANA. We are ARIN. We run as an "anarchist collective meritocracy". Very few people know who we are individually..... and we kind of like that. (TINC)

'Leaving it up to site operators and ISP's leaves too much room for abuse.'

I disagree, as every US legislative action taken seems to be an effort take power away, and give it to others.... to abuse. Most have failed at the Supreme Court.

I think the geek system is better.
Printer Friendly | Permalink |  | Top
 
tavalon Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 05:59 AM
Response to Reply #78
103. Incrementalism.
The creeping tide of fascism is nothing to ignore.
Printer Friendly | Permalink |  | Top
 
rayofreason Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-01-11 09:28 AM
Response to Reply #15
230. Any favorite sites in mind? n/t
Printer Friendly | Permalink |  | Top
 
RandySF Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 10:42 PM
Response to Original message
18. The cosponsor of this POS is our DNC Chair.
Printer Friendly | Permalink |  | Top
 
No Elephants Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 02:20 AM
Response to Reply #18
70. DLNC.
Printer Friendly | Permalink |  | Top
 
BadgerKid Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 10:42 PM
Response to Original message
19. Why not simply shut down the web sites in question?
But no, instead it will remain a whack-a-mole drug-war-like war. I'm confused.
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 12:44 AM
Response to Reply #19
51. Because this is about more than websites.
It's about internet chat death threats.
It's about abusive ex-spouses stalking people anonymously with fake email accounts.
It's about con men spamming from throw-away dial-up accounts.

It's about all kinds of crime, and making sure there's always an electronic evidence chain to follow.
Printer Friendly | Permalink |  | Top
 
liberation Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 10:44 PM
Response to Original message
22. LOL, I love how the use "the children" as an excuse
meanwhile the same people who want to protect "the children" from internet pornography are the same assholes who get a hard on about gutting medicaid, food stamp programs, and any other social safety network which actually does protect "the children."
Printer Friendly | Permalink |  | Top
 
woo me with science Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 07:57 AM
Response to Reply #22
119. Thank you. nt
Printer Friendly | Permalink |  | Top
 
krabigirl Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 12:24 PM
Response to Reply #22
167. and they dont think twice about sending their kids to church, where tons of pedos love to grope
the little ones...
Printer Friendly | Permalink |  | Top
 
grahamhgreen Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 10:47 PM
Response to Original message
23. OK, how do we get around this technologically?
Printer Friendly | Permalink |  | Top
 
cstanleytech Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 10:54 PM
Response to Reply #23
25. Maybe https://www.torproject.org/ ?
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 12:47 AM
Response to Reply #25
52. TOR doesn't hide when you dialed in.
It does, however, shield which ISP and IP you have, so there's that.
Printer Friendly | Permalink |  | Top
 
Recursion Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 05:49 AM
Response to Reply #52
96. Right, but if you use Tor, all anybody will know is
A) that you dialed in at such and such a time
B) that you then started using tor.
Printer Friendly | Permalink |  | Top
 
grahamhgreen Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 04:29 PM
Response to Reply #96
186. Is TOR the best way to go? I really don't have anything to hide, but I respect everyone's
right to privacy.
Printer Friendly | Permalink |  | Top
 
Tunkamerica Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 05:01 PM
Response to Reply #186
192. I tried it for a while last year and it was exceptionally slow
but your mileage may vary.
Printer Friendly | Permalink |  | Top
 
Amonester Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 11:13 PM
Response to Reply #23
30. Lots of 'FREE' open-air wi-fi access posts around where I live.
Although I don't always connect to them, I often do.
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 12:48 AM
Response to Reply #30
53. +1
Disposable cell-phone-dial-in works too.
Printer Friendly | Permalink |  | Top
 
Lorien Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 01:12 AM
Response to Reply #30
59. How about using 3G?
More expensive, but I guess that freedom really isn't free (or allowable) anymore. :-(
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 01:17 AM
Response to Reply #59
61. If you signed up for 3G without using a real name, didn't pay it with a card, etc.
That's pretty hard to do.
Printer Friendly | Permalink |  | Top
 
westerebus Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 07:46 AM
Response to Reply #61
116. That's what grandmother's second cousins are for. n/t
Printer Friendly | Permalink |  | Top
 
Recursion Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 05:27 AM
Response to Reply #23
88. Tor. Blind proxies. Point to point encryption. Not doing illegal things online.
All of those come to mind.
Printer Friendly | Permalink |  | Top
 
krabigirl Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 11:38 AM
Response to Reply #88
156. "illegal things"..whatever that means. Like going to sites run by anonymous? Reading wikileaks?
Fuck the two idiots who came up with this bill.
Printer Friendly | Permalink |  | Top
 
Recursion Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 12:01 PM
Response to Reply #156
162. Please explain how this bill will let the Feds know you read something Anonymous posted
I'm eager to hear.
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Jul-30-11 05:58 PM
Response to Reply #162
211. IIRC, several anonops folks have been nabbed.
(For the peanut gallery, anonops is one of many co-ordination centers for Anonymous).

In addition, some hardware got seized.

Since most web servers log page views by address, any web servers involved will have those records.

So: web logs->IP address->ISP of user->recorded user.
Printer Friendly | Permalink |  | Top
 
cstanleytech Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 10:53 PM
Response to Original message
24. Most of the bill from the article I dont object to
as its pretty basic stuff that the government would need to find out whos who (after a warrant only of course has been served) but the part of keeping track of activity on websites you visit or emails you send or recieve bothers me a great deal, thats just not info that should be logged by an isp imo.
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 12:52 AM
Response to Reply #24
55. The article doesn't explain the bill very well.
"keeping track of activity on websites you visit" is not in the bill.
"emails you send or recieve" is not in the bill... but what they're talking abut is the equivalent of a phone company keeping track of what phone numbers you called, and what phone numbers called you. It's called a PEN register on phones, and it doesn't require a warrant to request... and phone companies typically mail those out to people anyways (tracking usage/long distance charges).
Printer Friendly | Permalink |  | Top
 
cstanleytech Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 05:52 AM
Response to Reply #55
100. Well it said like the phone companies
and they list every call you make for month which if its like that would mean that the isp would have to record every url you visit also at the very least it would mean a list of emails sent and received.
Printer Friendly | Permalink |  | Top
 
Eric J in MN Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 11:16 AM
Response to Reply #24
153. The ISPs already store IPs for a few months, voluntarily.
Once there is a legal requirement to store IPs for a year, the ISPs will store IPs forever, in case they ever need to prove that they were in compliance during previous years.

Congress shouldn't pass an IP retention law.
Printer Friendly | Permalink |  | Top
 
totodeinhere Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 11:04 PM
Response to Original message
26. If this ever reaches his desk President Obama needs to veto it. n/t
Printer Friendly | Permalink |  | Top
 
mod mom Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 11:13 PM
Response to Reply #26
31. Don't hold your breath on that one.
Printer Friendly | Permalink |  | Top
 
bhikkhu Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 11:05 PM
Response to Original message
27. Congress can't pass jack shit for jobs or budget bills or taxes or anything...
but domestic surveillance gets fast-tracked?
Printer Friendly | Permalink |  | Top
 
No Elephants Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 02:26 AM
Response to Reply #27
71. They con't want to create jobs. They want to be able to surveill anyone and everyone.
On the other hand, I guess crap like this bill create jobs in Homeland Security and law enforcement. I guess both Parties can agree on the kind of "small" Government we read ahout in 1984, just not the kind that creats jobs or makes sure children and the disabled don't starve or die of exposure.

Ain't bipartisanship grand?
Printer Friendly | Permalink |  | Top
 
buckrogers1965 Donating Member (515 posts) Send PM | Profile | Ignore Thu Jul-28-11 11:13 PM
Response to Original message
29. Constitutional violation.
Edited on Thu Jul-28-11 11:13 PM by buckrogers1965
Fourth amendment: "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized."

Fifth amendment: "nor shall be compelled in any criminal case to be a witness against himself"

The list of places I visit are my papers. They should need probable cause that I have committed a specific crime and if they get a warrant be able to only look for evidence of that one crime.
Printer Friendly | Permalink |  | Top
 
RC Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 12:54 PM
Response to Reply #29
172. That document is nothing but a museum piece now.
Just a picture in charter school iPods, listed under History.
Printer Friendly | Permalink |  | Top
 
Amonester Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 11:15 PM
Response to Original message
32. Thank Jeebus the bu$h/cheneyourself cabal is gone for good!
Wait...
Printer Friendly | Permalink |  | Top
 
midnight Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 11:23 PM
Response to Original message
34. They must be finished building the big data storage building in Utah...
Printer Friendly | Permalink |  | Top
 
Commie Pinko Dirtbag Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 11:26 PM
Response to Original message
35. What if the ISP's hard disk that holds that information crashes?
Will they be punished by not having up-to-the-minute backups?
Printer Friendly | Permalink |  | Top
 
Recursion Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 05:51 AM
Response to Reply #35
98. Since their billing systems use that same information...
...I'd imagine the sysadmins already have plenty of motivation to use redundant databases, or at least log shipping.
Printer Friendly | Permalink |  | Top
 
JesterCS Donating Member (627 posts) Send PM | Profile | Ignore Thu Jul-28-11 11:28 PM
Response to Original message
36. Peerblock. nuff said =D n/t
Printer Friendly | Permalink |  | Top
 
Tunkamerica Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 12:44 AM
Response to Reply #36
50. that just stops incoming connections and it's only as good as the lists it uses.
I use it, it just doesn't stop someone from seeing what sites you visit.
Printer Friendly | Permalink |  | Top
 
RKP5637 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jul-28-11 11:35 PM
Response to Original message
37. One more step in a fascist police state, increasing unreasonable surveillance. Anyone
Edited on Thu Jul-28-11 11:57 PM by RKP5637
thinking a complete profiling database is not being made of them isn't paying attention. This is grandiose data mining.

This will be used for everything including nebulous predictive analysis. Analyze what sites you visit and poof, you're a criminal, right or wrong, you just have not done anything wrong yet, but you're guilty, a predictive criminal.

They always use child protection as a cover to rip through civil liberties.

This makes the Internet even more worthless IMO, who wants big brother over their shoulder 7x24.


Printer Friendly | Permalink |  | Top
 
marions ghost Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 08:26 AM
Response to Reply #37
125. not me
:argh:
Printer Friendly | Permalink |  | Top
 
saras Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 12:00 AM
Response to Original message
38. It's a plot to sell more hard drives...just where do they expect to KEEP all this data?
Why the Internet any more than other businesses? Why don't ALL businesses keep permanent records of EVERYTHING you buy, just in case the police need to know who bought that bottle of hot sauce they found at the cannibal killings site? I mean, you can never tell just what might be useful?

Why not a permanent GPS record of where everybody travels, from a chip imbedded in childhood? No one who isn't a criminal has any legitimate reason to not have this information be public, right?
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 12:59 AM
Response to Reply #38
56. "...businesses keep permanent records of EVERYTHING you buy..."
Many do, to the best of their ability (What did you think those "shopper discount" cards were for?). Many are not, however, required to do so by law.

"Why the Internet any more than other businesses?"

Because huge amounts of crime is untraceable on the internet. The ISP's are being asked to keep records for the same reason phone companies do... they're a communications system.
Printer Friendly | Permalink |  | Top
 
avaistheone1 Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 12:09 AM
Response to Original message
39. Another reason why people won't have to "hate us for our freedom"
Printer Friendly | Permalink |  | Top
 
Rex Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 12:15 AM
Response to Original message
40. Those fucking idiots can't fix the economy, bring the troops home
balance anything or do something productive. All they can do is think of new ways to fuck over the working poor. Fuck them and all their privileged elite lifestyle. They will ALL be remembered as the biggest losers in our history when we default.
Printer Friendly | Permalink |  | Top
 
blackspade Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 12:22 AM
Response to Original message
43. This has nothing to do with protecting children.
This is more police state bullshit.
Printer Friendly | Permalink |  | Top
 
SoapBox Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 12:24 AM
Response to Original message
44. The RushThugs and PeeParty LOVES them some BIG GOV snooping!
For the parties that hate big government, they can't get enough BIG GOVERNMENT in you life!

Wake up America...
Printer Friendly | Permalink |  | Top
 
AllyCat Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 12:26 AM
Response to Original message
46. Remember when they did this to the US Postal Service to track child porn?
This is no different than it was in the '80s...opening people's mail, etc.
Printer Friendly | Permalink |  | Top
 
Lorien Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 01:10 AM
Response to Original message
57. Crap. EVERY DAY IT JUST GETS WORSE!
"It’s creating a database for everybody in this country for a lot of other purposes.” No shit. Marketers will use this info. We'll be put on FBI watch lists if we visit too many environmental, union or progressive sites. Enough of this Big Brother BS!!
Printer Friendly | Permalink |  | Top
 
ManiacJoe Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 01:18 AM
Response to Original message
62. Incredibly bad reporting by CNET.
All this bill does is add IP addresses to the existing list of data the government can request and must be saved. (Ignoring the non-ISP sections.)

Printer Friendly | Permalink |  | Top
 
lib2DaBone Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 01:52 AM
Response to Original message
64. Here we go again....
...another nail in the coffin from the, "Well.. if you are not doing anything wrong it wont matter" crowd.
Printer Friendly | Permalink |  | Top
 
No Elephants Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 02:34 AM
Response to Original message
73. While still in Congress, Mark Foley was known for his crusade against internet pedophiles.
Then karma kicked his sorry ass.
Printer Friendly | Permalink |  | Top
 
JCMach1 Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 03:02 AM
Response to Original message
76. Time to use TOR all the time
Printer Friendly | Permalink |  | Top
 
toddwv Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 03:09 AM
Response to Original message
77. This could potentially make free wifi spots illegal.
I haven't read through the bill though...
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 04:34 AM
Response to Reply #77
84. It depends on how the language goes through.
Specifically, if you run a free WiFi spot, are you an ISP?
Printer Friendly | Permalink |  | Top
 
hamerfan Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 04:59 AM
Response to Original message
87. There already
isn't any privacy on the web. This would just make it more un-private.
Printer Friendly | Permalink |  | Top
 
Recursion Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 05:35 AM
Response to Reply #87
91. That's not a legal question; that's inherent in the technology
This law basically just recognizes what's already a nearly universal best practice in Internet service.
Printer Friendly | Permalink |  | Top
 
Recursion Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 05:33 AM
Response to Original message
90. I'm a sysadmin. Any company that isn't already doing this is idiotic
Edited on Fri Jul-29-11 05:34 AM by Recursion
If you're on my network, you better believe I'm going to know who you are and keep track of what you're doing. I am responsible for everything that happens on that network. If you start spamming from my network and I don't keep track of that, shut you off, and report it, I'm responsible. I'm not even talking about legally responsible, I mean other sysadmins will start blocking all traffic from my network.
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Jul-30-11 06:14 PM
Response to Reply #90
213. Lots of people don't understand SA culture.
That includes the US Congress.

It probably doesn't help much that we spend most of our time quietly doing our work, without handing ourselves prizes and making our users aware of our activities and ethics.
Printer Friendly | Permalink |  | Top
 
w0nderer Donating Member (430 posts) Send PM | Profile | Ignore Sat Jul-30-11 09:11 PM
Response to Reply #213
222. hear hear
Also doesn't help for a lot of SA the job is or was a hobby as well as a passion
and a lot of SA seem to take issue with 'unwillingness to inform/educate oneself'

SA NA and similar tend to group because there is a common language with a common culture
so even/especially on free time, a lot of SA tend to stay away from 'users'
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jul-31-11 06:13 PM
Response to Reply #222
228. BOAF and all that.
Choose to sysadmin
Choose no life. Choose no career.

Choose no family.

Choose a fucking big computer,

Choose disk arrays the size of washing machines, modem racks, CD-ROM writers, and electrical cofee makers.

Choose no sleep, high caffeine and mental insurance.

Choose black jeans and matching combat boots.

Choose chairs for your use in a range of fucking fabrics.

Choose SMTP and wondering why the fuck you are logged on a Sunday morning.

Choose sitting in that swivel chair looking at mind-numbing, spirit-crushing websites, stuffing fucking junk food into your mouth.

Choose rotting away at the end of it all, pishing your last in some miserable newsgroup, nothing more than an embarrassment to the selfish, fucked up lusers Gates spawned to replace the computer literate.

Choose your future.

Choose to sysadmin.
Printer Friendly | Permalink |  | Top
 
w0nderer Donating Member (430 posts) Send PM | Profile | Ignore Mon Aug-01-11 09:10 AM
Response to Reply #228
229. sounds like it comes from the recruitment ad for sysadmins :-p



Printer Friendly | Permalink |  | Top
 
tavalon Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 05:49 AM
Response to Original message
95. This is not good
I need to check and see if the EFF is on this. This is a huge loss for Internet freedom. And no, the pedophile excuse doesn't work any better than al Quada does. I know when I'm being lied to.
Printer Friendly | Permalink |  | Top
 
tavalon Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 08:06 AM
Response to Reply #95
120. And yes they are
Electronic Frontier Foundation. On the front lines. Www.eff.org
Printer Friendly | Permalink |  | Top
 
Name removed Donating Member (0 posts) Send PM | Profile | Ignore Fri Jul-29-11 06:01 AM
Response to Original message
104. Deleted message
Message removed by moderator. Click here to review the message board rules.
 
Name removed Donating Member (0 posts) Send PM | Profile | Ignore Fri Jul-29-11 06:02 AM
Response to Original message
105. Deleted message
Message removed by moderator. Click here to review the message board rules.
 
Name removed Donating Member (0 posts) Send PM | Profile | Ignore Fri Jul-29-11 06:02 AM
Response to Original message
106. Deleted message
Message removed by moderator. Click here to review the message board rules.
 
Name removed Donating Member (0 posts) Send PM | Profile | Ignore Fri Jul-29-11 06:04 AM
Response to Original message
107. Deleted message
Message removed by moderator. Click here to review the message board rules.
 
Hubert Flottz Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 06:07 AM
Response to Original message
108. So what happens when the hackers break into that like they did
to all of the veteran's information?
Printer Friendly | Permalink |  | Top
 
Evasporque Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 06:32 AM
Response to Original message
109. I hate it when non-technical people make technical decisions.
Unrealistic! Scum bag money grubbing storage vendors talked them into it...

this will be bigger than the entire combined Internet content within a few days...thousands of petabytes of storage will be required...

Printer Friendly | Permalink |  | Top
 
NorthCarolina Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 07:22 AM
Response to Reply #109
112. "The Internet is not a big truck"
"The Internet is a Series of Tubes!"
that could be clogged with information.

Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jul-31-11 06:05 PM
Response to Reply #112
227. Obligatory youtube techno mix:
Printer Friendly | Permalink |  | Top
 
The Doctor. Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 02:56 PM
Response to Reply #109
181. Not nearly.
The sort of data stored is actually very simple and doesn't take up much space. Maybe a few billion lines of data would be all that was stored.

What's that? Barely even 100 Gb?
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Jul-30-11 06:18 PM
Response to Reply #181
214. Depends on if you believe the headline.
Storing DHCP lease information is trivial.
Storing all websites visited is a magnitude larger.
Storing all URL's visited on those is another magnitude larger.
Printer Friendly | Permalink |  | Top
 
geckosfeet Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 06:35 AM
Response to Original message
110. Bad bad bad. Bad for the internet economy and business.
Printer Friendly | Permalink |  | Top
 
orbitalman Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 07:20 AM
Response to Original message
111. Very Dangerous. n/t
Printer Friendly | Permalink |  | Top
 
caseymoz Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 07:42 AM
Response to Original message
114. It's good to know this debt impasse hasn't dampened Congress' drive against the 4th Amendment.

:sarcasm:

In return, can every Congressman be followed by a camera broadcasting to the Internet 24 hours a day every day of their term? Along with their every correspondence, every word they say and write while they're a public servant be transcribed? Like child pornography, a corrupt Congressman must be prevented and punished at all cost. We need to have evidence that none of them are taking bribes or proposition an intern. Or absolute damning evidence when they do. If we never have that, it will at least be good reality television in between. Think of the shows you can cut together from all that video!

Besides respecting them the way they respect our rights, let's give them all the dignity they give anyone on the public payroll.

This has got to be stopped.

Printer Friendly | Permalink |  | Top
 
Zorra Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 07:42 AM
Response to Original message
115. The plutarchy is very aware that the natives are getting restless.
Yes, for sure, the database has been created for a lot of other purposes.
Printer Friendly | Permalink |  | Top
 
BNJMN Donating Member (461 posts) Send PM | Profile | Ignore Fri Jul-29-11 07:53 AM
Response to Original message
118. '...sponsored by Smith (R-TX) and Congresswoman Debbie Wasserman Schultz (D-FL)"
Edited on Fri Jul-29-11 07:56 AM by BNJMN
Thank God she was *appointed* (not elected) as DNC head and will decide which Democratic congress people and governors get all that sweet DNC money for their campaigns (i.e. which ones are moderate enough to deserve to win) and what the party's 'platform' will be.

The game seems rigged before, even, the primaries sometimes.
Go figure.


Edit: Party's not 'Parties', der dee doo.
:D
Printer Friendly | Permalink |  | Top
 
goforit Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 08:17 AM
Response to Original message
123. Repugs will use it to witch-hunt just like McCarthy.
Printer Friendly | Permalink |  | Top
 
HopeHoops Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 08:25 AM
Response to Original message
124. Eric Cantor just wants some fresh kiddie porn sites to look at and figures this will be a good way.
Don't worry, I'm sure he'll share them with the other GOP perverts.

Printer Friendly | Permalink |  | Top
 
KansDem Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 09:21 AM
Response to Original message
128. Murdock and the Connected hack big time -- but we have to provide our personal information
Fuck this!
Printer Friendly | Permalink |  | Top
 
Theo Haffey Donating Member (41 posts) Send PM | Profile | Ignore Fri Jul-29-11 09:36 AM
Response to Original message
129. The govt. has historically abused these kinds of privileges
Edited on Fri Jul-29-11 09:36 AM by Theo Haffey
They won't check out someone's search history only after suspicion of a crime is brought up. Instead, they will simply search everyone's histories a priori and used them for whatever purposes. I disagree with this bill.
Printer Friendly | Permalink |  | Top
 
valerief Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 09:42 AM
Response to Original message
132. TIA. That's all it is. TIA. Gotta crack down on Anonymous. nt
Printer Friendly | Permalink |  | Top
 
AlbertCat Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 09:43 AM
Response to Original message
133. Great! This should create LOTS of JOBS!!!!!
Edited on Fri Jul-29-11 09:43 AM by AlbertCat
Keep it focused, GOP!


:eyes:
Printer Friendly | Permalink |  | Top
 
Historic NY Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 09:52 AM
Response to Original message
134. WHAT makes this any different that your LIBRARY reading list??
Printer Friendly | Permalink |  | Top
 
Mosaic Donating Member (851 posts) Send PM | Profile | Ignore Fri Jul-29-11 09:54 AM
Response to Original message
136. Don't post this Raw Story alarmist crap
Edited on Fri Jul-29-11 09:58 AM by Mosaic
As many commenters already noted, this is alarmism. Raw Story is notorious for posting "big brother" crap to grab the gullible's attention. Stop posting from that site. Voted unrecommended.
Printer Friendly | Permalink |  | Top
 
Hugin Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 09:59 AM
Response to Reply #136
138. CNet is alarmist?
They're the original source.
Printer Friendly | Permalink |  | Top
 
Recursion Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 10:26 AM
Response to Reply #138
145. CNet also reported it much more accurately
Edited on Fri Jul-29-11 10:27 AM by Recursion
And didn't act like ISPs will be recording every single thing we do.

(Note: I trust corporations less than government. ISPs are corporations. I already assume they read anything I send or receive in cleartext. You should too.)
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Jul-30-11 06:22 PM
Response to Reply #145
215. More people need to learn what "cleartext" is.
FWIW, I already tried to lobby DU for https. They had other priorities.
Printer Friendly | Permalink |  | Top
 
Hugin Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 09:56 AM
Response to Original message
137. News Corpse, Inc. must be delighted at the prospect of fresh meat for their pulp rags.
Can you imagine? All of anybodies web history for a kiss! Roger must be pissing himself in anticipation. :eyes:
Printer Friendly | Permalink |  | Top
 
JJW Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 10:05 AM
Response to Original message
139. If they are so conerned abot pedophiles....
than why did they do nothing about those catholic priests?
Printer Friendly | Permalink |  | Top
 
Doctor_J Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 10:09 AM
Response to Original message
140. Hate Radio should be up in arms over this
and so should (Ayn) Rand Paul. They went apoplectic over a card to get health insurance. Now every web site you visit is going to have a permanent record for the government to comb through. Let's see how our "small government" wing nuts like this
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Jul-30-11 06:25 PM
Response to Reply #140
216. Every web site already has a record of your visit.
That's not new. Been that way since, well, at least 1995 or so.

The new part is tying your visit to *you*, or at least your internet connection, at a given moment.
Printer Friendly | Permalink |  | Top
 
N7Shepard Donating Member (191 posts) Send PM | Profile | Ignore Fri Jul-29-11 10:18 AM
Response to Original message
142. Good ol' small govt republicans
Printer Friendly | Permalink |  | Top
 
krabigirl Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 11:39 AM
Response to Reply #142
157. Uh, this is a bipartisan bill. The democrats are just as bad.
Oh, and the repuke is Lamar smith..ring a bell? He is the one holding back the bill by frank and Paul to decriminalize cannabis.
Printer Friendly | Permalink |  | Top
 
kestrel91316 Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 10:20 AM
Response to Original message
144. And Repigs can be trusted to NEVER misuse this data, like using it
to squelch free speech or the political opposition.......
Printer Friendly | Permalink |  | Top
 
Doctor_J Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 10:28 AM
Response to Reply #144
146. Or purge voter rolls
This would greatly simplify their drive to disenfranchise Dem-leaning individuals.
Printer Friendly | Permalink |  | Top
 
arcane1 Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 10:39 AM
Response to Original message
147. Yay jobs!!!
:eyes:
Printer Friendly | Permalink |  | Top
 
liberalgunwilltravel Donating Member (4 posts) Send PM | Profile | Ignore Fri Jul-29-11 11:00 AM
Response to Original message
148. ISP log
This is easy to kill. Just tell the NRA members that any time they discuss firearms on line a record will be kept by their ISP and the government, and it will be used to track gun ownership.
Printer Friendly | Permalink |  | Top
 
RC Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 01:09 PM
Response to Reply #148
173. Your post needs to be posted in the DU gungeon.
Otherwise most will never see it.
Printer Friendly | Permalink |  | Top
 
SteveM Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 02:49 PM
Response to Reply #173
180. So, which registration do you support? Guns or ISP users?
Printer Friendly | Permalink |  | Top
 
RC Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 05:39 PM
Response to Reply #180
194. ISP users, of course.
This bill is so unnecessary. They can already trace someone now without keeping anymore records. They just have to work a little harder.
This isn't to protect children, it is for the rogh-wing paranoids, so it is easier for them to put people on a list for later midnight knocks and visits.
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Jul-30-11 06:33 PM
Response to Reply #194
218. That is incorrect.
"They can already trace someone now without keeping anymore records." Is accurate, for an ISP with decent logging, which is a large number of them.

However, a dial-up or similar ISP, who throws away IP->MAC records, or (more to the point) IP->Customer records, cannot be traced.
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Jul-30-11 06:28 PM
Response to Reply #148
217. Welcome to DU!
I am amused by your argument. It's blatantly false, as are most gun arguments, but that never stopped the NRA.
Printer Friendly | Permalink |  | Top
 
Loge23 Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 11:05 AM
Response to Original message
149. America is dead and it's time to leave the corpse.
Seriously. I so want out of here.
Printer Friendly | Permalink |  | Top
 
Eric J in MN Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 11:06 AM
Response to Original message
150. Once ISPs are required to store that for a year...
...they will store it permanently, in order to be prepared to show the government that they were in compliance in previous years.
Printer Friendly | Permalink |  | Top
 
colsohlibgal Donating Member (670 posts) Send PM | Profile | Ignore Fri Jul-29-11 11:13 AM
Response to Original message
151. Police State Blues
Wow, just wow. If anyone thinks this is all about pedophiles they need to think again. I would like to think this won't pass in the senate but who knows - but I do know we have to fight this.
Printer Friendly | Permalink |  | Top
 
colorado_ufo Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 11:15 AM
Response to Original message
152. Get a firewall now - at least it is miniscule protection.
This is the worst thing to come down on the American people. This is our last bastion of free speech. It will also drive small ISPs out of business, due to the extended work and costs.
Printer Friendly | Permalink |  | Top
 
apnu Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 11:57 AM
Response to Reply #152
158. Firewall won't protect you, but proxies will. www.proxy4free.com (nt)
Printer Friendly | Permalink |  | Top
 
foo_bar Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 02:29 PM
Response to Reply #158
175. what difference would that make?
In the best case scenario, the gubmint would simply seize the proxy server's logs and connect the dots. The worst case is that most of these proxy servers are generously provided by malicious entities like identity thieves or Big Brother himself:
Although there are a few good people running safe proxy servers, it’s impossible to tell the difference between the two.

A common attack used by hackers is the MITM (man in the middle) attack. Creating and posting “anonymous” proxy servers is the easiest way for them to get “in the middle”. When people use proxy servers, their internet traffic is routed through another server. This server can do any number of nefarious things before the traffic reaches Myspace or Facebook. It can sniff out a username and password, if it is designed to do so.

http://www.democrakey.com/2009/09/anonymous-proxy-server-safety/

MITM should be seen as a general problem resulting from the presence of intermediate parties acting as proxy for clients on either side. If they are trustworthy and competent, all may be well; if they are not, nothing will be. How can one distinguish the cases? By acting as a proxy and appearing as the trusted client to each side, the intermediate attacker can carry out much mischief, including various attacks against the confidentiality or integrity of the data passing through it.

http://en.wikipedia.org/wiki/Man-in-the-middle_attack

Tor offers some advantages over simply trusting a random third party, but it has similar limitations:

The results presented in the bad apple attack research paper are based on an actual attack in the wild launched against the Tor network by the authors of the study. The attack targeted six exit nodes, lasted for 23 days, and revealed a total of 10,000 IP addresses of active Tor users. This study is particularly significant because it is the first documented attack designed to target P2P file sharing applications on Tor. BitTorrent may generate as much as 40% of all traffic on Tor, which means a significant number of Tor users are potentially at risk. Furthermore, the bad apple attack is effective against insecure use of any application over Tor, not just BitTorrent.

In September 2007, Dan Egerstad, a Swedish security consultant, revealed that he had intercepted usernames and passwords for a large number of email accounts by operating and monitoring Tor exit nodes.

http://en.wikipedia.org/wiki/Tor_(anonymity_network)

Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise

A security researcher intercepted thousands of private e-mail messages sent by foreign embassies and human rights groups around the world by turning portions of the Tor internet anonymity service into his own private listening post.

http://www.wired.com/politics/security/news/2007/09/embassy_hacks?currentPage=all

Printer Friendly | Permalink |  | Top
 
kenny blankenship Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 11:24 AM
Response to Original message
154. Republicans believe in Small Government - a govt so small it fits through the keyhole of your door!
Printer Friendly | Permalink |  | Top
 
krabigirl Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 11:58 AM
Response to Reply #154
159. Did you not notice that this is a bipartisan bill? Wasserman-Schultz is a democrat.
But go ahead and keep believing that Dems are different, lol.
Printer Friendly | Permalink |  | Top
 
Festivito Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 11:29 AM
Response to Original message
155. It's wrong to make people buy health insurance, but alright to make corporate persons buy memory.
These guys can look themselves in the face without the use of a mirror.
Printer Friendly | Permalink |  | Top
 
apnu Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 11:59 AM
Response to Original message
160. This is impossible to implement.
Imagine AOL tracking all http requests on their subscribers, the logistics alone would cripple them. That includes Comcast too. And that's not getting into the Tier 1 service providers selling directly to businesses, who consume way more bandwidth than home users.
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Jul-30-11 06:41 PM
Response to Reply #160
219. It's not impossible. It's expensive.
There's a difference.

Going by the original, but false, headline, it's doable (tracking all browser history), but it would require daily shipments of hard drives to all ISP's.

Never tell a geek something is impossible. It's like trying to win a land-war in Asia.

:evilgrin:
Printer Friendly | Permalink |  | Top
 
awoke_in_2003 Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 12:01 PM
Response to Original message
161. why don't they just get it over with...
remove the pretext, and go ahead and start installing the telescreens?
Printer Friendly | Permalink |  | Top
 
and-justice-for-all Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 12:02 PM
Response to Original message
163. That would be spying on Americans and I think a lawsuit is needed.nt
Printer Friendly | Permalink |  | Top
 
krabigirl Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 12:20 PM
Response to Original message
165. This is absolutely horrible. Really bad. Not that things aren't already bad, but..
Edited on Fri Jul-29-11 12:20 PM by krabigirl
heck, if they want to "stop pedos," perhaps they should investigate churches??? Wayyy too many pedophiles in the churches, but nothing will be done about that.

This bill is horrible and will force ISPs to invest a huge amount of money in storage solutions, passing off the costs to consumers, of course. Not to mention the huge breaches of privacy! I called a couple of the congresspeople who introduced this bill and gave them a piece of my mind.

Sad to see so many Democrats join in with Republicans on this kind of stuff, but it doesn't surprise me one bit. Glad I left the party.
Printer Friendly | Permalink |  | Top
 
Bill USA Donating Member (628 posts) Send PM | Profile | Ignore Fri Jul-29-11 12:29 PM
Response to Original message
168. the police state bill. Just wonderful.

everybody must call, email congressmen to kill this bill.

recommended!!
Printer Friendly | Permalink |  | Top
 
Gregorian Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 12:29 PM
Response to Original message
169. And even with this data, their "intended" purpose couldn't be fulfilled.
Take for example 9/11. Or this Norway murdering fool who had been followed by police. He was on a list. They knew his threat potential.

My point is, the information does little unless it's acted upon BEFORE some kind of crime has been committed. And that just doesn't happen. Well, it does, but usually in cases that end up being fraudulently pursued. Or at least that has been my experience.

Utter bullshit. But as a sleeping nation of idiots, I doubt very much this will be resisted.
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Jul-30-11 06:47 PM
Response to Reply #169
220. It's about gathering evidence, not preventing outcomes.
If you gather the data ahead of time, you can trace a crime quicker.

Printer Friendly | Permalink |  | Top
 
Mikeystyle Donating Member (131 posts) Send PM | Profile | Ignore Fri Jul-29-11 12:40 PM
Response to Original message
171. Republicans complain about "big govement" controlling everything, but that's their aggenda
This bill is like using an ocean-wide net to go after a couple of fish. They should increase penalties and make it easier to catch the sickos but without using an enormous dragnet that keeps track of everything and everyone.

Systems can be hacked into. People can steal information from a bank, credit card or retailer---this bill would make it possible to do the same with your internet history.

That's none of their business and won't solve the problem!
Printer Friendly | Permalink |  | Top
 
SteveM Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 02:36 PM
Response to Original message
176. This sounds like gun...I mean... excuse me, I-Net user registration! nt
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jul-31-11 06:02 PM
Response to Reply #176
226. How often do people die from accidentally connecting to the internet?
How often does viewing a web site kill somebody?

I'm not sure what point you're trying to make here.
Printer Friendly | Permalink |  | Top
 
lovuian Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 02:49 PM
Response to Original message
179. this is Orwell and against freedom of speech
this shows me the Republicans want to take us over
and put us in a dictatorship
Printer Friendly | Permalink |  | Top
 
Blue Owl Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 03:52 PM
Response to Original message
184. Fuck you big brother
n/t
Printer Friendly | Permalink |  | Top
 
Xipe Totec Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 04:00 PM
Response to Original message
185. Ok, this could be fun
All we need to do is each of us run a web crawler to scan the internet for every possible page.

Let's see how much space the ISP's can devote to storing useless logs for Big Brother.
Printer Friendly | Permalink |  | Top
 
Faryn Balyncd Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 04:31 PM
Response to Original message
187. And the "tea party" says they "believe in the constitution" !!!!
Printer Friendly | Permalink |  | Top
 
krabigirl Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 06:42 PM
Response to Reply #187
199. the people pushing this bill aren't even from the teahad party.
Printer Friendly | Permalink |  | Top
 
Juche Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 04:43 PM
Response to Original message
189. Where are all those anonymizer programs designed for totalitarian 3rd world countries
Edited on Fri Jul-29-11 04:45 PM by Juche
I thought there were several programs designed by web developers for people in Iran, North Korea, Myanmar, etc to let them surf the web w/o having everything logged and tracked by the government.

Do any of those work to avoid being constantly monitored and tracked by the government (esp a government run by pro-corporate, anti-civil rights politicians like ours is)? I have tried Tor but it is so slow I can't even load web browsers.
Printer Friendly | Permalink |  | Top
 
Taverner Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 04:51 PM
Response to Original message
190. Well with News Corp out of the picture, who was going to spy on us??
Printer Friendly | Permalink |  | Top
 
mother earth Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 06:36 PM
Response to Original message
198. All hail the Patriot Act & the war on terror, guised in a flag
and a bible....incognito...protect us from evil.
Printer Friendly | Permalink |  | Top
 
moondust Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 09:50 PM
Response to Original message
202. A totalitarian's dream!
Making it so much easier to detect, profile, and eliminate political enemies!
Printer Friendly | Permalink |  | Top
 
Eric J in MN Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-29-11 11:57 PM
Response to Original message
203. Form letter for Congress against this.
Printer Friendly | Permalink |  | Top
 
rayofreason Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Aug-01-11 09:34 AM
Response to Original message
231. Debbie Wasserman Schultz (D-FL) - COSPONSOR!!!!
Sensenbrenner (R) and Chaffetz (R) oppose it.

WTF?????
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Fri Apr 26th 2024, 09:43 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Latest Breaking News Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC