[72151] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: E-Mail Snooping Ruled Permissible

daemon@ATHENA.MIT.EDU (Eric Brunner-Williams)
Thu Jul 1 11:37:02 2004

To: William Allen Simpson <wsimpson@greendragon.com>
Cc: North American Network Operators Group <nanog@merit.edu>,
	brunner@nic-naa.net
In-Reply-To: Message from William Allen Simpson <wsimpson@greendragon.com> 
   of "Thu, 01 Jul 2004 11:02:09 -0400." <40E4275D.EEE266EF@greendragon.com> 
Date: Thu, 01 Jul 2004 11:28:30 +0000
From: Eric Brunner-Williams <brunner@nic-naa.net>
Errors-To: owner-nanog-outgoing@merit.edu


Hey Bill,

> Switches, routers, and any intermediate computers are fair game for 
> warrantless wiretaps.

I looked at that and thought about the one-bit-delay in a ring, and
started playing with fragments and error correction and reassembly and
buffer size in the intermediate network element(s) and ...
Not the sort of thing you'd want to hang whether or not a data stream
was subject to the Act or not.

Thanks for pointing out the scope of the dissenting opinion, that with
the Act confined to no-temporary-store communications paths, goverment
would be free to conduct taps w/o warrant, not just Councilman.

Someone should tell the rocket scientists that work for Tommy Ridge that
liability for duplication of classified data may be dependent on the RAM
present in each intermediate node, and that if the amount of RAM is not
sufficient to support buffer copy operations, the government will be more
likely to successfully prosecute terrorist keyboarders. It is possible
that the DHS network has way too much RAM to be safe.

Eric




home help back first fref pref prev next nref lref last post