[72151] in North American Network Operators' Group
Re: E-Mail Snooping Ruled Permissible
daemon@ATHENA.MIT.EDU (Eric Brunner-Williams)
Thu Jul 1 11:37:02 2004
To: William Allen Simpson <wsimpson@greendragon.com>
Cc: North American Network Operators Group <nanog@merit.edu>,
brunner@nic-naa.net
In-Reply-To: Message from William Allen Simpson <wsimpson@greendragon.com>
of "Thu, 01 Jul 2004 11:02:09 -0400." <40E4275D.EEE266EF@greendragon.com>
Date: Thu, 01 Jul 2004 11:28:30 +0000
From: Eric Brunner-Williams <brunner@nic-naa.net>
Errors-To: owner-nanog-outgoing@merit.edu
Hey Bill,
> Switches, routers, and any intermediate computers are fair game for
> warrantless wiretaps.
I looked at that and thought about the one-bit-delay in a ring, and
started playing with fragments and error correction and reassembly and
buffer size in the intermediate network element(s) and ...
Not the sort of thing you'd want to hang whether or not a data stream
was subject to the Act or not.
Thanks for pointing out the scope of the dissenting opinion, that with
the Act confined to no-temporary-store communications paths, goverment
would be free to conduct taps w/o warrant, not just Councilman.
Someone should tell the rocket scientists that work for Tommy Ridge that
liability for duplication of classified data may be dependent on the RAM
present in each intermediate node, and that if the amount of RAM is not
sufficient to support buffer copy operations, the government will be more
likely to successfully prosecute terrorist keyboarders. It is possible
that the DHS network has way too much RAM to be safe.
Eric