Blog Flux Directory Subscribe in NewsGator Online Subscribe with Bloglines http://www.wikio.com Blog directory
And, yes, I DO take it personally: limited snooping ?
Mandy: Great blog!
Mark: Thanks to all the contributors on this blog. When I want to get information on the events that really matter, I come here.
Penny: I'm glad I found your blog (from a comment on Think Progress), it's comprehensive and very insightful.
Eric: Nice site....I enjoyed it and will be back.
nora kelly: I enjoy your site. Keep it up! I particularly like your insights on Latin America.
Alison: Loquacious as ever with a touch of elegance -- & right on target as usual!
"Everybody's worried about stopping terrorism. Well, there's a really easy way: stop participating in it."
- Noam Chomsky
Send tips and other comments to: profmarcus2010@yahoo.com /* ---- overrides for post page ---- */ .post { padding: 0; border: none; }

Tuesday, July 31, 2007

limited snooping ?

Some tools for total surveillance are located on-site of telcos and ISPs, in that cozy Government/Corporate marriage. Other tools include OLAPs.

Types of tools coming online at present include "Deep packet inspection", an example of which is discussed here.

Much ballyhoo has been made of making particular digital pictures into crime. Those, as well as mp3 music files or other types of data files have identifiable "signatures", by means of "CRC", (cyclic redundancy check) and/or "checksum".

Much has been written already that the Vista operating system is Orwellian in nature. Now it is being reported that some anti virus companies may abandon scanning files for viruses and use "whitelisting" instead. Whitelisting will certify known files by their CRC or checksum. It is easy to see how that will fit into a police state.

The DoJ has already demanded records from major search engine companies. Apparently, only Google put up a substantial fight.

This article shows preliminary means to join the government grid.

For a peek ahead you can jump right to a look at the Global Justice Justice XML Data Model, or right ahead to see the National Information Exchange Model.

Of course, ultimately "users might need access to the global Centrix network, the Secret IP Router Network and the Non-classified IP Router Network to get all the information they require".

This report, among other topics, contemplates Information Sharing. (.pdf)

The pretexts for government to monitor all financial transactions seem similar to their need to know what library books people read and what Web sites they visit.

Starting with problems of a cashless society: government can cancel credit cards at a mere whim. And Government has been all over the alternate-forms-of-payment industry:

Consider E-gold and some of their tribulations.

The pretexts to monitor all electronic financial transactions are of course, framed in the emotional bugaboos of the day.

From comments on Press Esc:

'The Patriot Act is only temporary. It includes sunset provisions.' We all know what happened with that."

Similar legislation has already been shot down. (.pdf) (COPA was originally the basis for compelling the search engine records sharing compliance.)

So what else will Deep Packet Inspection look for? Consider this. (h/t slashdot)

Labels: , , , ,

Submit To Propeller


And, yes, I DO take it personally home page