Author Topic: Seems Like Old Times  (Read 2333 times)

0 Members and 1 Guest are viewing this topic.

Offline ajax13

  • Newbie
  • *
  • Posts: 1614
  • Karma: +3/-0
    • View Profile
Seems Like Old Times
« on: September 09, 2008, 03:17:41 PM »
http://www.brasschecktv.com/page/410.html
I watched a program on CBC last night about the destruction of WTC 7 after the attacks of 2001.  The program touched on the issue of widespread doubt of the the offical story and the suspicions of US citizens regarding US government complicity in the attacks.  The fact that the actions of 19 criminals acting outside of the official policy of any state, Afghanistan included, resulted in the invasion of two sovereign nations by the armed forces of the United States aside, perhaps the subject of the video linked above has something to do with the people's reservations about the legend of September 11, 2001.
« Last Edit: December 31, 1969, 07:00:00 PM by Guest »
"AARC will go on serving youth and families as long as it will be needed, if it keeps open to God for inspiration" Dr. F. Dean Vause Executive Director


MR. NELSON: Mr. Speaker, AADAC has been involved with
assistance in developing the program of the Alberta Adolescent
Recovery Centre since its inception originally as Kids of the
Canadian West."
Alberta Hansard, March 24, 1992

Offline Antigen

  • Newbie
  • *
  • Posts: 12992
  • Karma: +3/-0
    • View Profile
    • http://wwf.Fornits.com/
Re: Seems Like Old Times
« Reply #1 on: September 09, 2008, 06:26:40 PM »
Damn, that's some old stuff! It still amazes me how many people just aren't even alarmed by this sort of thing, then or now.
« Last Edit: December 31, 1969, 07:00:00 PM by Guest »
"Don\'t let the past remind us of what we are not now."
~ Crosby Stills Nash & Young, Sweet Judy Blue Eyes

Offline dishdutyfugitive

  • Newbie
  • *
  • Posts: 1105
  • Karma: +0/-0
    • View Profile
    • http://www.foxmovies.com/fightclub/
Bad things happen when good people stay silent
« Reply #2 on: September 09, 2008, 06:51:50 PM »
I caught that show last night too.

On that note, last week the Daily Show and Colbert report coverage did an outstanding job covering the Republican convention.

http://www.thedailyshow.com/tagSearchRe ... Convention


God bless imposed democracy and doublespeaking politicians.
« Last Edit: December 31, 1969, 07:00:00 PM by Guest »

Offline ajax13

  • Newbie
  • *
  • Posts: 1614
  • Karma: +3/-0
    • View Profile
Re: Seems Like Old Times
« Reply #3 on: September 09, 2008, 10:37:11 PM »
http://www.thenation.com/doc/20020311/corn
The criminals who brought you Iran/Contra are still kicking around.
A few weeks ago US forces bombed some Afghans.  The official US report claimed that seven civilians died, along with a couple dozen Taliban, or Mujahadeen or whatever we're calling those folks today.  The people whose families were massacred disagreed with the US figure, claiming that somewhere in the neighborhood of 90 women and children were killed in the attack.  The embedded reporter with the US forces who corroborated the original death toll of 7 civilians was reputed to be none other but super-shredder Ollie North.
http://www.informationclearinghouse.inf ... e20705.htm
« Last Edit: December 31, 1969, 07:00:00 PM by Guest »
"AARC will go on serving youth and families as long as it will be needed, if it keeps open to God for inspiration" Dr. F. Dean Vause Executive Director


MR. NELSON: Mr. Speaker, AADAC has been involved with
assistance in developing the program of the Alberta Adolescent
Recovery Centre since its inception originally as Kids of the
Canadian West."
Alberta Hansard, March 24, 1992

Offline Anonymous

  • Newbie
  • *
  • Posts: 164653
  • Karma: +3/-4
    • View Profile
China writing US policy on anonymous communication
« Reply #4 on: September 12, 2008, 09:39:05 PM »
Quote from: "Today, CBS"
U.N. Agency Eyes Web Anonymity Controls
Sept. 12, 2008(CNET) A United Nations agency is quietly drafting technical standards, proposed by the Chinese government, to define methods of tracing the original source of Internet communications and potentially curbing the ability of users to remain anonymous.

The U.S. National Security Agency is also participating in the "IP Traceback" drafting group, named Q6/17, which is meeting next week in Geneva to work on the traceback proposal. Members of Q6/17 have declined to release key documents, and meetings are closed to the public.

The potential for eroding Internet users' right to remain anonymous, which is protected by law in the United States and recognized in international law by groups such as the Council of Europe, has alarmed some technologists and privacy advocates. Also affected may be services such as the Tor anonymizing network.

"What's distressing is that it doesn't appear that there's been any real consideration of how this type of capability could be misused," said Marc Rotenberg, director of the Electronic Privacy Information Center in Washington, D.C. "That's really a human rights concern."

Nearly everyone agrees that there are, at least in some circumstances, legitimate security reasons to uncover the source of Internet communications. The most common justification for tracebacks is to counter distributed denial of service, or DDoS, attacks.

But implementation details are important, and governments participating in the process - organized by the International Telecommunication Union, a U.N. agency - may have their own agendas. A document submitted by China this spring and obtained by CNET News said the "IP traceback mechanism is required to be adapted to various network environments, such as different addressing (IPv4 and IPv6), different access methods (wire and wireless) and different access technologies (ADSL, cable, Ethernet) and etc." It adds: "To ensure traceability, essential information of the originator should be logged."

The Chinese author of the document, Huirong Tian, did not respond to repeated interview requests. Neither did Jiayong Chen of China's state-owned ZTE Corporation, the vice chairman of the Q6/17's parent group who suggested in an April 2007 meeting that it address IP traceback.

A second, apparently leaked ITU document offers surveillance and monitoring justifications that seem well-suited to repressive regimes:

    A political opponent to a government publishes articles putting the government in an unfavorable light. The government, having a law against any opposition, tries to identify the source of the negative articles but the articles having been published via a proxy server, is unable to do so protecting the anonymity of the author.



That document was provided to Steve Bellovin, a well-known Columbia University computer scientist, Internet Engineering Steering Group member, and Internet Engineering Task Force participant who wrote a traceback proposal eight years ago. Bellovin says he received the ITU document as part of a ZIP file from someone he knows and trusts, and subsequently confirmed its authenticity through a second source. (An ITU representative disputed its authenticity but refused to make public the Q6/17 documents, including a ZIP file describing traceback requirements posted on the agency's password-protected Web site.)

Bellovin said in a blog post this week that "institutionalizing a means for governments to quash their opposition is in direct contravention" of the U.N.'s own Universal Declaration of Human Rights. He said that traceback is no longer that useful a concept, on the grounds that few attacks use spoofed addresses, there are too many sources in a DDoS attack to be useful, and the source computer inevitably would prove to be hacked into anyway.

Another technologist, Jacob Appelbaum, one of the developers of the Tor anonymity system, also was alarmed. "The technical nature of this 'feature' is such a beast that it cannot and will not see the light of day on the Internet," Appelbaum said. "If such a system was deployed, it would be heavily abused by precisely those people that it would supposedly trace. No blackhat would ever be caught by this."

Adding to speculation about where the U.N. agency is heading are indications that some members would like to curb Internet anonymity more broadly:

#   An ITU network security meeting a few years ago concluded that anonymity should not be permitted. The summary said: "Anonymity was considered as an important problem on the Internet (may lead to criminality). Privacy is required but we should make sure that it is provided by pseudonymity rather than anonymity."

#   A presentation in July from Korea's Heung-youl Youm said that groups such as the IETF should be "required to develop standards or guidelines" that could "facilitate tracing the source of an attacker including IP-level traceback, application-level traceback, user-level traceback." Another Korean proposal -- which has not been made public -- says all Internet providers "should have procedures to assist in the lawful traceback of security incidents."

# An early ITU proposal from RAD Data Communications in Israel said: "Traceability means that all future networks should enable source trace-back, while accountability signifies the responsibility of account providers to demand some reasonable form of identification before granting access to network resources (similar to what banks do before opening a bank accounts)."

Multinational push to curb anonymous speech

By itself, of course, the U.N. has no power to impose Internet standards on anyone. But U.N. and ITU officials have been lobbying for more influence over the way the Internet is managed, most prominently through the World Summit on the Information Society in Tunisia and a followup series of meetings.

The official charter of the ITU's Q6/17 group says that it will work "in collaboration" with the IETF and the U.S. Computer Emergency Response Team Coordination Center, which could provide a path toward widespread adoption -- especially if national governments end up embracing the idea.

Patrick Bomgardner, the NSA's chief of public and media affairs, told CNET News on Thursday that "we have no information to provide on this issue." He would not say why the NSA was participating in the process (and whether it was trying to fulfill its intelligence-gathering mission or its other role of advancing information security).

Toby Johnson, a communications officer with the ITU's Telecommunication Standardization Bureau in Geneva, also refused to discuss Q6/17. "It may be difficult for experts to comment on what state deliberations are in for fear of prejudicing the outcome," he said in an e-mail message on Thursday.

    U.N. "IP traceback" documents
  # China's proposal obtained by CNET News says "to ensure traceability, essential information of the originator should be logged."
  # Leaked requirements document says governments may need "to
    identify the source of the negative articles" posted by political adversaries.
  # Korean presentation says standards bodies should be "required to develop standards or guidelines" to facilitate unmasking users.
  # Verisign executive's summary summarizes presentation saying protocols must have "a strong traceback capability, and establishing traceback considerations in developing any new standards."

When asked about the impact on Internet anonymity, Johnson replied: "I am not fully acquainted with this topic and therefore not qualified to provide an answer." He said that he expects that any final ITU standard would comport with the U.N.'s Universal Declaration of Human Rights.

It's unclear what happens next. For one thing, the traceback proposal isn't scheduled to be finished until 2009, and one industry source stressed that not all members of Q6/17 are in favor of it. The five "editors" are: NSA's Richard Brackney; Tian Huirong from China's telecommunications ministry; Korea's Youm Heung-Youl; Cisco's Gregg Schudel; and Craig Schultz, who works for a Japan-based network security provider. (In keeping with the NSA's penchant for secrecy, Brackney was the lone ITU participant in a 2006 working group who failed to provide biographical information.)

In response to a question about the eventual result, Schultz, one of the editors, replied: "The long answer is, as you can probably imagine, this subject can get a little 'tense.' The main issue is the protection of privacy as well as not having to rely on 'policy' as part of a process. A secondary issue is feasibility and cost versus benefit." He said a final recommendation is at least a year off.

Another participant is Tony Rutkowski, Verisign's vice president for regulatory affairs and longtime ITU attendee, who wrote a three-page summary for IP traceback and a related concept called "International Caller-ID Capability."

In a series of e-mail messages, Rutkowski defended the creation of the IP traceback "work item" at a meeting in April, and disputed the legitimacy of the document posted by Bellovin. "The political motivation text was not part of any known ITU-T proposal and certainly not the one which I helped facilitate," he wrote.

Rutkowski added in a separate message: "In public networks, the capability of knowing the source of traffic has been built into protocols and administration since 1850! It's widely viewed as essential for settlements, network management, and infrastructure protection purposes. The motivations are the same here. The OSI Internet protocols (IPv5) had the capabilities built-in. The ARPA Internet left them out because the infrastructure was a private DOD infrastructure."

Because the Internet Protocol was not designed to be traceable, it's possible to spoof addresses -- both for legitimate reasons, such as sharing a single address on a home network, and for malicious ones as well. In the early part of the decade, a flurry of academic research focused on ways to perform IP tracebacks, perhaps by embedding origin information in Internet communications, or Bellovin's suggestion of occasionally automatically forwarding those data in a separate message.

If network providers and the IETF adopted IP traceback on their own, perhaps on the grounds that security justifications outweighed the harm to privacy and anonymity, that would be one thing.

But in the United States, a formal legal requirement to adopt IP traceback would run up against the First Amendment. A series of court cases, including the 1995 decision in McIntyre v. Ohio Elections Commission, provides a powerful shield protecting the right to remain anonymous. In that case, the majority ruled: "Under our Constitution, anonymous pamphleteering is not a pernicious, fraudulent practice, but an honorable tradition of advocacy and of dissent. Anonymity is a shield from the tyranny of the majority."

More broadly, the ITU's own constitution talks about "ensuring the secrecy of international correspondence." And the Council of Europe's Declaration on Freedom of Communication on the Internet adopted in 2003 says nations "should respect the will of users of the Internet not to disclose their identity," while acknowledging law enforcement-related tracing is sometimes necessary.

"When NSA takes the lead on standard-setting, you have to ask yourself how much is about security and how much is about surveillance," said the Electronic Privacy Information Center's Rotenberg. "You would think (the ITU) would be a little more sensitive to spying on Internet users with the cooperation of the NSA and the Chinese government."


© 2008 CNET Networks, Inc., a CBS Company. All rights reserved.


Quote from: "in 1787, Publius"
To the People of the State of New York:

AFTER an unequivocal experience of the inefficiency of the subsisting federal government, you are called upon to deliberate on a new Constitution for the United States of America. The subject speaks its own importance; comprehending in its consequences nothing less than the existence of the UNION, the safety and welfare of the parts of which it is composed, the fate of an empire in many respects the most interesting in the world. It has been frequently remarked that it seems to have been reserved to the people of this country, by their conduct and example, to decide the important question, whether societies of men are really capable or not of establishing good government from reflection and choice, or whether they are forever destined to depend for their political constitutions on accident and force. If there be any truth in the remark, the crisis at which we are arrived may with propriety be regarded as the era in which that decision is to be made; and a wrong election of the part we shall act may, in this view, deserve to be considered as the general misfortune of mankind.

This idea will add the inducements of philanthropy to those of patriotism, to heighten the solicitude which all considerate and good men must feel for the event. Happy will it be if our choice should be directed by a judicious estimate of our true interests, unperplexed and unbiased by considerations not connected with the public good. But this is a thing more ardently to be wished than seriously to be expected. The plan offered to our deliberations affects too many particular interests, innovates upon too many local institutions, not to involve in its discussion a variety of objects foreign to its merits, and of views, passions and prejudices little favorable to the discovery of truth.
Full Text/Context

Quote from: "Not long thereafter, A Federalist"
Antifederalist No. 1 GENERAL INTRODUCTION: A DANGEROUS PLAN OF BENEFIT ONLY TO THE "ARISTOCRATICK COMBINATION"

From The Boston Gazette and Country Journal, November 26, 1787.

I am pleased to see a spirit of inquiry burst the band of constraint upon the subject of the NEW PLAN for consolidating the governments of the United States, as recommended by the late Convention. If it is suitable to the GENIUS and HABITS of the citizens of these states, it will bear the strictest scrutiny. The PEOPLE are the grand inquest who have a RIGHT to judge of its merits. The hideous daemon of Aristocracy has hitherto had so much influence as to bar the channels of investigation, preclude the people from inquiry and extinguish every spark of liberal information of its qualities. At length the luminary of intelligence begins to beam its effulgent rays upon this important production; the deceptive mists cast before the eyes of the people by the delusive machinations of its INTERESTED advocates begins to dissipate, as darkness flies before the burning taper; and I dare venture to predict, that in spite of those mercenary dectaimers, the plan will have a candid and complete examination. Those furious zealots who are for cramming it down the throats of the people, without allowing them either time or opportunity to scan or weigh it in the balance of their understandings, bear the same marks in their features as those who have been long wishing to erect an aristocracy in THIS COMMONWEALTH [of Massachusetts]. Their menacing cry is for a RIGID government, it matters little to them of what kind, provided it answers THAT description. As the plan now offered comes something near their wishes, and is the most consonant to their views of any they can hope for, they come boldly forward and DEMAND its adoption. They brand with infamy every man who is not as determined and zealous in its favor as themselves. They cry aloud the whole must be swallowed or none at all, thinking thereby to preclude any amendment; they are afraid of having it abated of its present RIGID aspect. They have strived to overawe or seduce printers to stifle and obstruct a free discussion, and have endeavored to hasten it to a decision before the people can duty reflect upon its properties. In order to deceive them, they incessantly declare that none can discover any defect in the system but bankrupts who wish no government, and officers of the present government who fear to lose a part of their power. These zealous partisans may injure their own cause, and endanger the public tranquility by impeding a proper inquiry; the people may suspect the WHOLE to be a dangerous plan, from such COVERED and DESIGNING schemes to enforce it upon them. Compulsive or treacherous measures to establish any government whatever, will always excite jealousy among a free people: better remain single and alone, than blindly adopt whatever a few individuals shall demand, be they ever so wise. I had rather be a free citizen of the small republic of Massachusetts, than an oppressed subject of the great American empire. Let all act understandingly or not at all. If we can confederate upon terms that wilt secure to us our liberties, it is an object highly desirable, because of its additional security to the whole. If the proposed plan proves such an one, I hope it will be adopted, but if it will endanger our liberties as it stands, let it be amended; in order to which it must and ought to be open to inspection and free inquiry. The inundation of abuse that has been thrown out upon the heads of those who have had any doubts of its universal good qualities, have been so redundant, that it may not be improper to scan the characters of its most strenuous advocates. It will first be allowed that many undesigning citizens may wish its adoption from the best motives, but these are modest and silent, when compared to the greater number, who endeavor to suppress all attempts for investigation. These violent partisans are for having the people gulp down the gilded pill blindfolded, whole, and without any qualification whatever. These consist generally, of the NOBLE order of C[incinnatu]s, holders of public securities, men of great wealth and expectations of public office, B[an]k[er]s and L[aw]y[er]s: these with their train of dependents form the Aristocratick combination. The Lawyers in particular, keep up an incessant declamation for its adoption; like greedy gudgeons they long to satiate their voracious stomachs with the golden bait. The numerous tribunals to be erected by the new plan of consolidated empire, will find employment for ten times their present numbers; these are the LOAVES AND FISHES for which they hunger. They will probably find it suited to THEIR HABITS, if not to the HABITS OF THE PEOPLE. There may be reasons for having but few of them in the State Convention, lest THEIR '0@' INTEREST should be too strongly considered. The time draws near for the choice of Delegates. I hope my fellow-citizens will look well to the characters of their preference, and remember the Old Patriots of 75; they have never led them astray, nor need they fear to try them on this momentous occasion.
Context/full text
« Last Edit: December 31, 1969, 07:00:00 PM by Guest »

Offline Anonymous

  • Newbie
  • *
  • Posts: 164653
  • Karma: +3/-4
    • View Profile
China writing US policy on anonymous communication
« Reply #5 on: September 12, 2008, 09:40:33 PM »
Quote from: "Today, CBS"
U.N. Agency Eyes Web Anonymity Controls
Sept. 12, 2008(CNET) A United Nations agency is quietly drafting technical standards, proposed by the Chinese government, to define methods of tracing the original source of Internet communications and potentially curbing the ability of users to remain anonymous.

The U.S. National Security Agency is also participating in the "IP Traceback" drafting group, named Q6/17, which is meeting next week in Geneva to work on the traceback proposal. Members of Q6/17 have declined to release key documents, and meetings are closed to the public.

The potential for eroding Internet users' right to remain anonymous, which is protected by law in the United States and recognized in international law by groups such as the Council of Europe, has alarmed some technologists and privacy advocates. Also affected may be services such as the Tor anonymizing network.

"What's distressing is that it doesn't appear that there's been any real consideration of how this type of capability could be misused," said Marc Rotenberg, director of the Electronic Privacy Information Center in Washington, D.C. "That's really a human rights concern."

Nearly everyone agrees that there are, at least in some circumstances, legitimate security reasons to uncover the source of Internet communications. The most common justification for tracebacks is to counter distributed denial of service, or DDoS, attacks.

But implementation details are important, and governments participating in the process - organized by the International Telecommunication Union, a U.N. agency - may have their own agendas. A document submitted by China this spring and obtained by CNET News said the "IP traceback mechanism is required to be adapted to various network environments, such as different addressing (IPv4 and IPv6), different access methods (wire and wireless) and different access technologies (ADSL, cable, Ethernet) and etc." It adds: "To ensure traceability, essential information of the originator should be logged."

The Chinese author of the document, Huirong Tian, did not respond to repeated interview requests. Neither did Jiayong Chen of China's state-owned ZTE Corporation, the vice chairman of the Q6/17's parent group who suggested in an April 2007 meeting that it address IP traceback.

A second, apparently leaked ITU document offers surveillance and monitoring justifications that seem well-suited to repressive regimes:

    A political opponent to a government publishes articles putting the government in an unfavorable light. The government, having a law against any opposition, tries to identify the source of the negative articles but the articles having been published via a proxy server, is unable to do so protecting the anonymity of the author.



That document was provided to Steve Bellovin, a well-known Columbia University computer scientist, Internet Engineering Steering Group member, and Internet Engineering Task Force participant who wrote a traceback proposal eight years ago. Bellovin says he received the ITU document as part of a ZIP file from someone he knows and trusts, and subsequently confirmed its authenticity through a second source. (An ITU representative disputed its authenticity but refused to make public the Q6/17 documents, including a ZIP file describing traceback requirements posted on the agency's password-protected Web site.)

Bellovin said in a blog post this week that "institutionalizing a means for governments to quash their opposition is in direct contravention" of the U.N.'s own Universal Declaration of Human Rights. He said that traceback is no longer that useful a concept, on the grounds that few attacks use spoofed addresses, there are too many sources in a DDoS attack to be useful, and the source computer inevitably would prove to be hacked into anyway.

Another technologist, Jacob Appelbaum, one of the developers of the Tor anonymity system, also was alarmed. "The technical nature of this 'feature' is such a beast that it cannot and will not see the light of day on the Internet," Appelbaum said. "If such a system was deployed, it would be heavily abused by precisely those people that it would supposedly trace. No blackhat would ever be caught by this."

Adding to speculation about where the U.N. agency is heading are indications that some members would like to curb Internet anonymity more broadly:

#   An ITU network security meeting a few years ago concluded that anonymity should not be permitted. The summary said: "Anonymity was considered as an important problem on the Internet (may lead to criminality). Privacy is required but we should make sure that it is provided by pseudonymity rather than anonymity."

#   A presentation in July from Korea's Heung-youl Youm said that groups such as the IETF should be "required to develop standards or guidelines" that could "facilitate tracing the source of an attacker including IP-level traceback, application-level traceback, user-level traceback." Another Korean proposal -- which has not been made public -- says all Internet providers "should have procedures to assist in the lawful traceback of security incidents."

# An early ITU proposal from RAD Data Communications in Israel said: "Traceability means that all future networks should enable source trace-back, while accountability signifies the responsibility of account providers to demand some reasonable form of identification before granting access to network resources (similar to what banks do before opening a bank accounts)."

Multinational push to curb anonymous speech

By itself, of course, the U.N. has no power to impose Internet standards on anyone. But U.N. and ITU officials have been lobbying for more influence over the way the Internet is managed, most prominently through the World Summit on the Information Society in Tunisia and a followup series of meetings.

The official charter of the ITU's Q6/17 group says that it will work "in collaboration" with the IETF and the U.S. Computer Emergency Response Team Coordination Center, which could provide a path toward widespread adoption -- especially if national governments end up embracing the idea.

Patrick Bomgardner, the NSA's chief of public and media affairs, told CNET News on Thursday that "we have no information to provide on this issue." He would not say why the NSA was participating in the process (and whether it was trying to fulfill its intelligence-gathering mission or its other role of advancing information security).

Toby Johnson, a communications officer with the ITU's Telecommunication Standardization Bureau in Geneva, also refused to discuss Q6/17. "It may be difficult for experts to comment on what state deliberations are in for fear of prejudicing the outcome," he said in an e-mail message on Thursday.

    U.N. "IP traceback" documents
  # China's proposal obtained by CNET News says "to ensure traceability, essential information of the originator should be logged."
  # Leaked requirements document says governments may need "to
    identify the source of the negative articles" posted by political adversaries.
  # Korean presentation says standards bodies should be "required to develop standards or guidelines" to facilitate unmasking users.
  # Verisign executive's summary summarizes presentation saying protocols must have "a strong traceback capability, and establishing traceback considerations in developing any new standards."

When asked about the impact on Internet anonymity, Johnson replied: "I am not fully acquainted with this topic and therefore not qualified to provide an answer." He said that he expects that any final ITU standard would comport with the U.N.'s Universal Declaration of Human Rights.

It's unclear what happens next. For one thing, the traceback proposal isn't scheduled to be finished until 2009, and one industry source stressed that not all members of Q6/17 are in favor of it. The five "editors" are: NSA's Richard Brackney; Tian Huirong from China's telecommunications ministry; Korea's Youm Heung-Youl; Cisco's Gregg Schudel; and Craig Schultz, who works for a Japan-based network security provider. (In keeping with the NSA's penchant for secrecy, Brackney was the lone ITU participant in a 2006 working group who failed to provide biographical information.)

In response to a question about the eventual result, Schultz, one of the editors, replied: "The long answer is, as you can probably imagine, this subject can get a little 'tense.' The main issue is the protection of privacy as well as not having to rely on 'policy' as part of a process. A secondary issue is feasibility and cost versus benefit." He said a final recommendation is at least a year off.

Another participant is Tony Rutkowski, Verisign's vice president for regulatory affairs and longtime ITU attendee, who wrote a three-page summary for IP traceback and a related concept called "International Caller-ID Capability."

In a series of e-mail messages, Rutkowski defended the creation of the IP traceback "work item" at a meeting in April, and disputed the legitimacy of the document posted by Bellovin. "The political motivation text was not part of any known ITU-T proposal and certainly not the one which I helped facilitate," he wrote.

Rutkowski added in a separate message: "In public networks, the capability of knowing the source of traffic has been built into protocols and administration since 1850! It's widely viewed as essential for settlements, network management, and infrastructure protection purposes. The motivations are the same here. The OSI Internet protocols (IPv5) had the capabilities built-in. The ARPA Internet left them out because the infrastructure was a private DOD infrastructure."

Because the Internet Protocol was not designed to be traceable, it's possible to spoof addresses -- both for legitimate reasons, such as sharing a single address on a home network, and for malicious ones as well. In the early part of the decade, a flurry of academic research focused on ways to perform IP tracebacks, perhaps by embedding origin information in Internet communications, or Bellovin's suggestion of occasionally automatically forwarding those data in a separate message.

If network providers and the IETF adopted IP traceback on their own, perhaps on the grounds that security justifications outweighed the harm to privacy and anonymity, that would be one thing.

But in the United States, a formal legal requirement to adopt IP traceback would run up against the First Amendment. A series of court cases, including the 1995 decision in McIntyre v. Ohio Elections Commission, provides a powerful shield protecting the right to remain anonymous. In that case, the majority ruled: "Under our Constitution, anonymous pamphleteering is not a pernicious, fraudulent practice, but an honorable tradition of advocacy and of dissent. Anonymity is a shield from the tyranny of the majority."

More broadly, the ITU's own constitution talks about "ensuring the secrecy of international correspondence." And the Council of Europe's Declaration on Freedom of Communication on the Internet adopted in 2003 says nations "should respect the will of users of the Internet not to disclose their identity," while acknowledging law enforcement-related tracing is sometimes necessary.

"When NSA takes the lead on standard-setting, you have to ask yourself how much is about security and how much is about surveillance," said the Electronic Privacy Information Center's Rotenberg. "You would think (the ITU) would be a little more sensitive to spying on Internet users with the cooperation of the NSA and the Chinese government."


© 2008 CNET Networks, Inc., a CBS Company. All rights reserved.


Quote from: "in 1787, Publius"
To the People of the State of New York:

AFTER an unequivocal experience of the inefficiency of the subsisting federal government, you are called upon to deliberate on a new Constitution for the United States of America. The subject speaks its own importance; comprehending in its consequences nothing less than the existence of the UNION, the safety and welfare of the parts of which it is composed, the fate of an empire in many respects the most interesting in the world. It has been frequently remarked that it seems to have been reserved to the people of this country, by their conduct and example, to decide the important question, whether societies of men are really capable or not of establishing good government from reflection and choice, or whether they are forever destined to depend for their political constitutions on accident and force. If there be any truth in the remark, the crisis at which we are arrived may with propriety be regarded as the era in which that decision is to be made; and a wrong election of the part we shall act may, in this view, deserve to be considered as the general misfortune of mankind.

This idea will add the inducements of philanthropy to those of patriotism, to heighten the solicitude which all considerate and good men must feel for the event. Happy will it be if our choice should be directed by a judicious estimate of our true interests, unperplexed and unbiased by considerations not connected with the public good. But this is a thing more ardently to be wished than seriously to be expected. The plan offered to our deliberations affects too many particular interests, innovates upon too many local institutions, not to involve in its discussion a variety of objects foreign to its merits, and of views, passions and prejudices little favorable to the discovery of truth.
Full Text/Context
Quote from: "Not long thereafter, A Federalist"
Antifederalist No. 1 GENERAL INTRODUCTION: A DANGEROUS PLAN OF BENEFIT ONLY TO THE "ARISTOCRATICK COMBINATION"

From The Boston Gazette and Country Journal, November 26, 1787.

I am pleased to see a spirit of inquiry burst the band of constraint upon the subject of the NEW PLAN for consolidating the governments of the United States, as recommended by the late Convention. If it is suitable to the GENIUS and HABITS of the citizens of these states, it will bear the strictest scrutiny. The PEOPLE are the grand inquest who have a RIGHT to judge of its merits. The hideous daemon of Aristocracy has hitherto had so much influence as to bar the channels of investigation, preclude the people from inquiry and extinguish every spark of liberal information of its qualities. At length the luminary of intelligence begins to beam its effulgent rays upon this important production; the deceptive mists cast before the eyes of the people by the delusive machinations of its INTERESTED advocates begins to dissipate, as darkness flies before the burning taper; and I dare venture to predict, that in spite of those mercenary dectaimers, the plan will have a candid and complete examination. Those furious zealots who are for cramming it down the throats of the people, without allowing them either time or opportunity to scan or weigh it in the balance of their understandings, bear the same marks in their features as those who have been long wishing to erect an aristocracy in THIS COMMONWEALTH [of Massachusetts]. Their menacing cry is for a RIGID government, it matters little to them of what kind, provided it answers THAT description. As the plan now offered comes something near their wishes, and is the most consonant to their views of any they can hope for, they come boldly forward and DEMAND its adoption. They brand with infamy every man who is not as determined and zealous in its favor as themselves. They cry aloud the whole must be swallowed or none at all, thinking thereby to preclude any amendment; they are afraid of having it abated of its present RIGID aspect. They have strived to overawe or seduce printers to stifle and obstruct a free discussion, and have endeavored to hasten it to a decision before the people can duty reflect upon its properties. In order to deceive them, they incessantly declare that none can discover any defect in the system but bankrupts who wish no government, and officers of the present government who fear to lose a part of their power. These zealous partisans may injure their own cause, and endanger the public tranquility by impeding a proper inquiry; the people may suspect the WHOLE to be a dangerous plan, from such COVERED and DESIGNING schemes to enforce it upon them. Compulsive or treacherous measures to establish any government whatever, will always excite jealousy among a free people: better remain single and alone, than blindly adopt whatever a few individuals shall demand, be they ever so wise. I had rather be a free citizen of the small republic of Massachusetts, than an oppressed subject of the great American empire. Let all act understandingly or not at all. If we can confederate upon terms that wilt secure to us our liberties, it is an object highly desirable, because of its additional security to the whole. If the proposed plan proves such an one, I hope it will be adopted, but if it will endanger our liberties as it stands, let it be amended; in order to which it must and ought to be open to inspection and free inquiry. The inundation of abuse that has been thrown out upon the heads of those who have had any doubts of its universal good qualities, have been so redundant, that it may not be improper to scan the characters of its most strenuous advocates. It will first be allowed that many undesigning citizens may wish its adoption from the best motives, but these are modest and silent, when compared to the greater number, who endeavor to suppress all attempts for investigation. These violent partisans are for having the people gulp down the gilded pill blindfolded, whole, and without any qualification whatever. These consist generally, of the NOBLE order of C[incinnatu]s, holders of public securities, men of great wealth and expectations of public office, B[an]k[er]s and L[aw]y[er]s: these with their train of dependents form the Aristocratick combination. The Lawyers in particular, keep up an incessant declamation for its adoption; like greedy gudgeons they long to satiate their voracious stomachs with the golden bait. The numerous tribunals to be erected by the new plan of consolidated empire, will find employment for ten times their present numbers; these are the LOAVES AND FISHES for which they hunger. They will probably find it suited to THEIR HABITS, if not to the HABITS OF THE PEOPLE. There may be reasons for having but few of them in the State Convention, lest THEIR '0@' INTEREST should be too strongly considered. The time draws near for the choice of Delegates. I hope my fellow-citizens will look well to the characters of their preference, and remember the Old Patriots of 75; they have never led them astray, nor need they fear to try them on this momentous occasion.
Context/full text
« Last Edit: December 31, 1969, 07:00:00 PM by Guest »