limited snooping ?
Some tools for total surveillance are located on-site of telcos and ISPs, in that cozy Government/Corporate marriage. Other tools include OLAPs.
Types of tools coming online at present include "Deep packet inspection", an example of which is discussed here.
Much ballyhoo has been made of making particular digital pictures into crime. Those, as well as mp3 music files or other types of data files have identifiable "signatures", by means of "CRC", (cyclic redundancy check) and/or "checksum".
Much has been written already that the Vista operating system is Orwellian in nature. Now it is being reported that some anti virus companies may abandon scanning files for viruses and use "whitelisting" instead. Whitelisting will certify known files by their CRC or checksum. It is easy to see how that will fit into a police state.
The DoJ has already demanded records from major search engine companies. Apparently, only Google put up a substantial fight.
This article shows preliminary means to join the government grid.
For a peek ahead you can jump right to a look at the Global Justice Justice XML Data Model, or right ahead to see the National Information Exchange Model.
Of course, ultimately "users might need access to the global Centrix network, the Secret IP Router Network and the Non-classified IP Router Network to get all the information they require".
This report, among other topics, contemplates Information Sharing. (.pdf)
The pretexts for government to monitor all financial transactions seem similar to their need to know what library books people read and what Web sites they visit.
Starting with problems of a cashless society: government can cancel credit cards at a mere whim. And Government has been all over the alternate-forms-of-payment industry:
Consider E-gold and some of their tribulations.
The pretexts to monitor all electronic financial transactions are of course, framed in the emotional bugaboos of the day.
From comments on Press Esc:
Similar legislation has already been shot down. (.pdf) (COPA was originally the basis for compelling the search engine records sharing compliance.)
So what else will Deep Packet Inspection look for? Consider this. (h/t slashdot)
Tweet
Types of tools coming online at present include "Deep packet inspection", an example of which is discussed here.
Much ballyhoo has been made of making particular digital pictures into crime. Those, as well as mp3 music files or other types of data files have identifiable "signatures", by means of "CRC", (cyclic redundancy check) and/or "checksum".
Much has been written already that the Vista operating system is Orwellian in nature. Now it is being reported that some anti virus companies may abandon scanning files for viruses and use "whitelisting" instead. Whitelisting will certify known files by their CRC or checksum. It is easy to see how that will fit into a police state.
The DoJ has already demanded records from major search engine companies. Apparently, only Google put up a substantial fight.
This article shows preliminary means to join the government grid.
For a peek ahead you can jump right to a look at the Global Justice Justice XML Data Model, or right ahead to see the National Information Exchange Model.
Of course, ultimately "users might need access to the global Centrix network, the Secret IP Router Network and the Non-classified IP Router Network to get all the information they require".
This report, among other topics, contemplates Information Sharing. (.pdf)
The pretexts for government to monitor all financial transactions seem similar to their need to know what library books people read and what Web sites they visit.
Starting with problems of a cashless society: government can cancel credit cards at a mere whim. And Government has been all over the alternate-forms-of-payment industry:
Consider E-gold and some of their tribulations.
The pretexts to monitor all electronic financial transactions are of course, framed in the emotional bugaboos of the day.
From comments on Press Esc:
'The Patriot Act is only temporary. It includes sunset provisions.' We all know what happened with that."
Similar legislation has already been shot down. (.pdf) (COPA was originally the basis for compelling the search engine records sharing compliance.)
So what else will Deep Packet Inspection look for? Consider this. (h/t slashdot)
Labels: ATT, Department of Justice, domestic spying, domestic surveillance, NIE
Submit To PropellerTweet