FBI Confirms Magic Lantern Existence 461
The_THOMAS (and many others) writes: "A day after major
anti-virus firms waffle on their support for 'Magic Lantern', and nine days
after Thomas C Greene of The Register tried to throw cold
water on it's existence,
the FBI Confirms
the 'Magic Lantern' Project Exist. Welcome to a Brave New World!"
ITS (Score:2, Informative)
Re:ITS (MOD PARENT UP) (Score:2, Offtopic)
AGAIN: If you can't replace "it's" with "it is" in the sentence you were using, use "its". "it is existence" would not be correct; therefore, the correct form of the word is "its".
I don't want to be a troll, but I'm really sick of seeing this kind of amateurish grammar on Slashdot, and I know I'm not the only one. Taco seems to have given up. He always uses "its", but that's not correct either! Remember the "it is" rule stated above, and you'll be correct every time.
P.S. "Better then" is not correct either. When comparing, use "than."
They can get us Linux users too (Score:2, Troll)
To start, I talked with my colleague's brother, "Joe," who is a criminal defense attorney. Joe told me that he has been following the Magic Lantern debate very closely, because his sources indicate that the FBI will be using it in many, many cases to prevent the possibility of seizing equipment with undecryptable data on it. In fact, it has been rumored that the proposed new FBI policy regarding searches of premises requires agents to attempt to use Magic Lantern (which technically counts as a consensual search) prior to even obtaining a warrant, if the warrant is to seize computer hardware.
Joe is not very familiar with computer technology, but he did say that a large part of the Magic Lantern program involves contacting ISPs to allow the FBI to alter network data destined for the suspect's computer. I will take that at face value because they seem to have no problem pulling rank on ISPs. I suspect that their "do it or we'll arrest you" attitude plays a big part in this.
With all of that in mind, I decided to find out just how vulnerable I was. I set up a stock Debian 2.2r3 box, and a stock Red Hat 7.2 box. Both used the installation CDs produced at least a few months ago, so they were both vulnerable to the wu-ftpd exploit and would need to be upgraded for production use.
My goal was simple: I needed to play the part of the FBI, and trick my machines into accepting a trojaned version of the new wu-ftpd package.
First, I set up a transparent proxy on my gateway box, which is used to split my cable modem connection amongst my home machines and those of several neighbors. I used a program called "squirm" to rewrite URLs ending in .deb or .rpm so that they would be redirected to my local web server,
from which the trojanned .deb and .rpm files would be served.
Second, I produced trojaned .deb and .rpm files. The .deb file was
trivial to modify, as only a checksum stood between me and a valid hacked
version. The .rpm was a bit more difficult, because RedHat signs their
packages with a PGP key. However, once I rebuilt the package and did not
sign it with PGP, I had a fixed package.
Third, I went to the Debian box and typed 'apt-get update ; apt-get upgrade'. After a few routine prompts, none of which triggered security alerts, the box was rooted by my "custom" package.
Fourth, I went to the Redhat box and did an 'rpm -U' pointed at the updates.redhat.com server. I got my trojanned RPM back, with no warnings or prompts to tell me it hasn't been signed. And I had an ftp server with a new backdoor up in a matter of minutes.
So, to summarize: the FBI can easily set up a transparent proxy between you and the Internet, and trick your OS into installing malware. You're damned if you do and you're damned if you don't, because you need to download the wuftpd-of-the-week sometime.
As a matter of comparison, my Windows 2000 box has no such vulnerability. The first time I went to Windows Update, I checked the box that said "always trust content from Microsoft Corporation." Therefore, only Microsoft's real certificate will be accepted by my machine. Even if the FBI forces Verisign to issue an impostor certificate, it will be detected and thwarted.
Linux distributions need to band together and find a trusted individual who will be responsible for signing all packages and verifying that they do not contain backdoors. That is the only way to solve this issue. Personally, I nominate Eric Raymond, because of his widespread respect from the community and business leaders alike. Additionally, he is a staunch libertarian and would not cave to government pressure to insert backdoors into something that he has signed. I believe that by charging the distribution vendors a small fee per package, ESR can again achieve financial success for himself and his family.
This is a serious issue for Linux users and I believe it should have been addressed years ago. That said, now is not too late and definitely not too early. I look forward to seeing this feature in all future releases of the major Linux distributions.
df
Another reason to not use packages. (Score:2)
Not an easy task (Score:2, Insightful)
The super-paranoid will be safe from Magic Lantern because they probably don't upgrade software often and they probably patch security holes themselves. But for the rest of us who want to *use* our computers, this is an enormous problem.
df
Re:Never claimed it would be easy. (Score:2)
Dunno about
Re:Never claimed it would be easy. (Score:3, Informative)
make sure the publisher's public key is really the publisher's
Aye, there's the rub!
It really takes an independent confirmation route to verify the veracity of some random downloaded package.
It galls me to no end seeing a download site providing "one-stop" authentication: here's the package, here's the signature, here's the key!
Proving identity and authenticity in this kind of environment would be improved if there were multiple authorities for one to use. Anything else subjects you to the risk of living in Dr Morarty's HollowDeck, if you remember that particular episode of Star Trek TNG.
The network downloaded packages have to be verified independently, using
Re:Another reason to not use packages. (Score:2)
Lets assume that you do, do you really have the time to check every line of code in wuftpd, or sendmail, or the kernel, or any other download?
All it would take is transparent rewrites from kernel.org to a new compromised kernel.
Can FTP affected by this?
Re:What about your compiler? (Score:2, Funny)
Not until I've finished checking every last line of code in the compiler source ... and in the source of the one I use to compile that ... and ... :o
Re:What about your compiler? (Score:3, Interesting)
Re:They can get us Linux users too (Score:5, Informative)
Shaun
Re:They can get us Linux users too (Score:3, Insightful)
It's an American idea, an American problem and based on American laws... and you are enforcing it on the rest of the world
What's left to us rest-of-the-world-westeners is to stop buying US software because otherwise we risk that our secrets will be sold to American businesses by the CIA/FBI gang... as it has happened before on numerous occassions where European companies (Siemens, for instance) suddenly lost deals in the middle east. Not enough that they eversdrop on our mobile phone communications (Echolon), now they bug our software...
Re:They can get us Linux users too (Score:2, Funny)
Re:They can get us Linux users too (Score:2, Interesting)
What if they tell them: you let us spy on windows users, and we will be as helpful as we can be in the field of antitrust and similar stuff.
While I believe that it is concretely possible to receive an infested .deb or even an infested kernel, I believe we linux users have two
advantages: 1) we are more attentive and careful and 2) we know how to
handle our systems.
Our system could become compromised, but there would most probably be little time before we found out. And really fixed our boxes.
Which is what attentive and careful windows user could also do if they had hold of the source.
So, the solution is, yes, to use an open OS, but also to be and remain attentive and careful. And to learn what we are doing and why. This is what information age boils to:
a) you don't use computers (and you probably live in some monastery in the mountains).
b) you use computers but you prefer to remain ignorant about what happens behind the hood. I would prefer to say: you are used by computers.
c) you understand computers, you use them for what they're worth, you don't let any corporation or government pull dirty tricks to you. You help family and friends and common people in doing so (provided they accept to shed off their laziness).
Windows is the lazy choice. Due to their laziness, people willingly "bend over." Microsoft does not need to "bend over:" they are slowly fusing with the US government, who will find it (already finds it?) extremely useful to keep an eye on lazy corporations and people.
The process will be very quiet.
Re:They can get us Linux users too (Score:2, Interesting)
Technically, Windows Update could insert something that removes the need for Microsoft's signatures and the Debian example would work just as well for our friends at M$.
As a similar matter of example: With W2K SP/2, M$ decided to disable the ability to disable Windows File Protection. A nice concept in some respects, but forces you to keep whatever files M$ thinks you should have... say... NetMeeting (or any other program you no longer get to uninstall.)
A bit of research, and a good-ole 2 bytes of NOP carefully inserted disables WFP. I was a bit shocked when I realized it did work! I boot W2K now, and although no WFP causes an event log message, the only way to tell my SFC.DLL is hacked is to test the signature manually! No "A Windows File Fails Integrity Checks" error message comes up. It could have just as well been the FBI's hack. Or, worse yet, the FBI could use WFP to ASSURE that you can't replace their files with a clean, non-recording version!...
Shiver
P.S. Try using SSH + SFTP. Beats the WUFTP problems and the tricky firewall rules FTP bringeth.
Re:They can get us Linux users too (Score:2)
I do not think that means what I think you think it means.
You are wrong in a couple of ways: 1. What makes you think the FBI wouldn't be able to get a valid signature on Magic Lantern if they so desired? 2. You haven't actually denied non-properly signed software, you just made it so that properly signed software can be installed without you knowing about it. 3. The signature part is only checked by the windows installer service. You can put software on a machine without using the installer service. The faint sound of NIMDA and Code-Red poinding on my firewall is proof of that.
Re:They can get us Linux users too (Score:5, Informative)
Most major vendors (with the notable exception of Debian =( ) sign packages using GNuPG. You can check these signatures using rpm. There is no need to get Eric raymond to sign stuff (and he's supposed to read all the source code, then build all the packages on his own machines? excuse me?). I suggest reading the following two security advisories, which point out some mistakes that have been made, and one possible attack, but also largely corrected by vendors, and can be easily verified by users with minimal effort.
Devil in the details - why package signing matters [seifried.org]
Red Hat 7.2 GnuPG signed RPM verification fails on distribution files [seifried.org]
RPM PGP/GnuPG verification bug [seifried.org]
Been there, done that (Score:2, Interesting)
Distributions should reject packages that aren't signed with a trusted key by default. And make the user specify the --really-install-an-untrusted-package flag in order for the package manager to accept it.
df
Re:They can get us Linux users too (Score:2)
Re:They can get us Linux users too (Score:5, Informative)
You, sir, are not merely a troll, but an expert troll, and I applaud you for a job well done! Thanks for the best laugh I've had this thread.
References: Slashdot article: Don't Trust Code Signed by 'Microsoft Corporation' [slashdot.org]
Microsoft bulletin detailing story of VeriSign issuing two Class 3 code-signing digital certificates to an individual fraudulently claiming to be a Microsoft employee: Erroneous VeriSign-Issued Digital Certificates Post Spoofing Hazard [microsoft.com]
Re:They can get us Linux users too (Score:2, Informative)
So basically, he was right, and you were wrong.
Wait, who's the troll again?
Re:They can get us Linux users too (Score:2)
/Janne
Re:They can get us Linux users too (Score:2, Insightful)
Actually, in this case it is safer to actually always trust Microsoft. The reason is simple, if you always trust Microsoft and you get an executable signed with the fraud verisign signature, you will be asked if you want to run this file signed by Microsoft corporation. Now you should know that you always trust Microsoft, and therefore you shouldn't be asked if you want to run a file signed by Msoft. However, if you don't always trust msoft, it won't surprise you when you're asked if you want to run a file signed by them.
Re:They can get us Linux users too (Score:2, Interesting)
Re:They can get us Linux users too (Score:3, Informative)
Why can't the FBI use Microsoft's real certificate? Why wouldn't Microsoft work with them? Are you so certain that "always trust content from Microsoft Corporation" is such a good idea?
Even then, the code which checks a newly-downloaded package against the MS certificate is on your computer, right? It could be modified by anything (say, a virus) which had the right permissions to do something different, like checking against a certificate on microsoft.fbi.com, correct? Perhaps this will be the next "I Love You" payload (or the last one).
Open source certificates, ping times, etc? (Score:2)
First off, this shows how much we need to have some kind of open registry of certificates. I mean, does anyone really trust Verisign, especially now that they own NSI? I mean, talk about people willing to give up credibility in order to pursue monopoly.
Also, is there not a way in which we can set up some kind of distance authenticity verification? Or routing verification?
What if there was a service set up that allowed us to send out a request through an alternate random routing (for which we got back and traceroute list to verify) and set a codekey on the machine, and then when we connected to the machine, it would only connect if it had the codekey. Even if they spoofed the network connections and routing, then we wouldn't be able to connect, since we'd know that there was no codekey there. Granted, doesn't solve the problem, but it quickly says to me, time to get a new ISP who doesn't let the Feds run the whole deal.
Re:They can get us Linux users too (Score:2)
Re:They can get us Linux users too (Score:5, Insightful)
Of course, I wonder just how far the Fibbies will actually go in doing this. Most criminals are stupid. Hell, al Qaeda stood out like a sore thumb, it's just that most modern Americans have had their senses so dulled by television and government schools that nothing makes them paranoid anymore....
Sure, our hero slapped something together that dropped a back door in nothing flat. How many guys that smart are going to go work for what Uncle Sugar pays? How many of the ones that are smart enough actually know something about Linux?
And then there's the question of sheer manpower. Sure, they can tap your data, but who's going to go thru all that crap? They simply don't have THAT many Beowulf clusters....
If I was Ashcroft, I'd settle for netting all the Windows users, and worry about all those other OS's if and when I had a specific hard target. Once they hard-target you, you're a goner anyway; if they can't get what they want by giving you a Windows virus, they're just gonna come bust your door down. Meanwhile, I think most of us non-Windows users are relatively safe from any fishing expeditions the Fed might want to do on our hard drives.
And so it is that the umpteen zillion different distros of Linux becomes one of its advantages....
Besides, Red Hat has already let on that it's not going to play ball; remember that early release of a security patch (was it wu-ftpd?) that caused the flap a few weeks back? I think Bob Young and company had a lot of balls for doing that; it shows that his loyalty is to his users, and not to some calbal in some smoky chat room... I hope and pray and offer virgin sacrifices that it stays that way. Of course, there's also OpenBSD; Theo, cagey bastard that he is (and I *like* cagey bastards in these situations), isn't going to play cloak and dagger with *anyone*. I figure if anyone *tried* he'd raise six kinds of hell.
Bottom line, folks, there are more of us than there are of Them; they can't get to us all. And try and remember, if they do try to get to you, your first obligation is to escape and warn the rest of us. We have to hang together... lest we all hang separately.
Signatures on Debian packages (Score:5, Interesting)
With all of that in mind, I decided to find out just how vulnerable I was. I set up a stock Debian 2.2r3 box... I went to the Debian box and typed 'apt-get update ; apt-get upgrade'. After a few routine prompts, none of which triggered security alerts, the box was rooted by my "custom" package.
Progeny Linux Systems wrote, tested, deployed, and submitted as patches to Debian, code to implement cryptographic package signatures. Some of the patches now exist in dpkg CVS, but Wichert Akkerman rejected others. Part of it had to do with a command that would prompt you (package maintainer) for your GPG passphrase and cache it so that it could be applied to each binary package (consider how tedious it would be to re-type the passphrase for each binary package in a package like XFree86, which has dozens; moreover, you're no *more* susceptible to a keystroke logger if the passphrase is cached). Anyway, this tool was written in C for security (locked memory pages), but Wichert wanted a version in Python instead, so he never accepted the code.
I never have quite figured that one out.
Anyway, since Progeny ceased development on its own distribution, not much work has been done on our signed package implementation. The code has already been publicly released; maybe it's time for people in the Debian community to take up the fight?
The specification, authored jointly by Ben Collins and John Goerzen, allows for multiple signatures per package. I wrote a policy administration tool called apt-checksigs that would let the user configure the strictness of signature checking on a per-repository basis.
Is anyone interested in this stuff?
Re:They can get us Linux users too (Score:2)
Re:They can get us Linux users too (Score:2)
Actually cince I switched back to slackware, I can now use source code again, as the
The problem with your attack is that they have to anticipate that I will want bigboobies_3.12_src.tar.gz within the time limits before they raid my house. sure they could profile me by watching my traffic and habits for a 30 day period. but then I am so fickle I doubt that they could get an accurate profile. The only thing I do regulary is read slashdot and freshmeat, I jump around on so many projects for work and personal use they would have to try and spoof about 30-40 different sourcecode packages in-order to get it on my machine, and then hope that I dont look throught the sourcecode.
but then most terrorists and violent criminals dont have the brain power to compile sourcecode let alone know what slackware is.
Re:Congratulations. (Score:2)
Paranoia (Score:4, Interesting)
surprised? (Score:2)
Ratted out by our ISPs - What legal recourse? (Score:2)
Yes, I know this part is old news. Still, it makes me cringe whenever I see it. I assume there have been discussions of lawsuits/injunctions against ISPs to keep them from divulging this kind of stuff without a customer's consent. Could anyone post links to resources out there on these efforts for me? Thanks in advance.
Not a great idea (Score:3, Insightful)
Viruses spread because each time a user is infected they spread the infection to an average of more than one user. Most viruses die very quickly. Of the thousands launched each day only a handfull infect more than a few hundred sites. The probability of infecting a particular machine is actually quite low. It is going to take rather more effort to spread the trojan payload than the FBI expect.
Simply sending out random spam and hoping the target opens an executable that installs the trojan is not likely to work. A more likely means of succeeding is to attach the trojan to a downloaded executable.
A much easier solution with lower downside risk is simply to install a good old fashioned room mike or to use CRT radiation to snoop on the screen.
Re:Not a great idea (Score:2)
There is a common misconception that the use of an LCD will prevent the ability of gov't agencies from detecting the signals. This is NOT true. LCDs DO infact emit electro-magnettic noise (just like LCDs,etc.) The difference is that LCDs are lower power and can't be easily read from as great a distance as a CRT. So in a since, you're correct, if "evil people" use LCDs, it'd be slightly more difficult to detect, but not impossible by ANY means!
Additionally, who cares if they use an LCD. All the other components are emitting EMI. The keyboard can be read; the disk access can be intercepted; the switch/hub in the room can be read, etc.
I've seen this technology demonstrated. A laptop, running on batteries, had it's LCD redisplayed on a CRT that was 40 feet away. Yeah, 40 feet isn't that far... but then again, if there's a bug in your room, you're up the creek, etc.
If you wanna see some products that have been secured against emitting EMI (and are thus significantly less vulnerable to TEMPEST attacks) check out http://www.hetrasecure.com/ [hetrasecure.com]. Enjoy!
-Andy
BORRRRING! (Score:4, Funny)
Oh goodie! (Score:3, Funny)
What this country needs is more power and oversight by police agencies - East Germany had it right when "smell samples" were collected in jars so dogs could hunt down disenters.
Of course, this will mean nothing to civil rights because as we all know that the FBI is a trust worthy organization that would never do things that would jeopardize our civil rights by installing key loggers via internet virus (because that would not exactly be targeted eh?.
The FBI is also trust worthy, they would never, for example, abuse the justice system by, say using RICO (anti-organized crime) laws to punish pesky protesting environmentalists, or arbitrarily ask nearly all muslim students in the USA to come in for interviews (and chase them down if they don't come by) - or even threaten to reveal that a person charged with a crime is gay (and cause his suicide)
And they would never do anything like compile a list of "persons of interest" and maintain a dossier on each person in the USA that has been charged (not convicted) of a crime), as well as all immigrants in the USA (they did a mighty fine fucking job lately eh?)
Don't worry, the FBI will protect you in the future because of their new powers!
BTW, would it be in a anti-virus company's best interest to reveal that their software has programmed defects? I dunno. . .
Unacceptable. (Score:4, Troll)
Get a warrant. I'll show you anything you want to see, but show me your goddamn warrant first. Until you have it, you have no right whatsoever to search my, or anyone else's computer. I don't care what your reason is. This is not acceptable.
Re:Unacceptable. (Score:2)
Re:Unacceptable. (Score:2)
Re:Unacceptable. (Score:2, Informative)
that's listed in the warrant. Don't get a warrant to search my workshop and then decide to search my house while you're here.
Why FBI came out with this news NOW (Score:5, Informative)
Surveys show that most people, given the 9-11 attacks, are more than willing to trade freedom for security.
"A recent ABC/Post survey found two out of three people expressing willingness to surrender 'some of the liberties we have in this country to crack down on terrorism.' Cole attributes this not only to a heightened concern for safety, but to the fact that the majority are not generally affected--that is, it's not their relatives being detained and questioned." (Taking Liberties: Fear and the Constitution [prospect.org])
"At times like this, a democracy must balance its need to protect itself with the freedoms that define it. Last week's terrorist attacks have raised the debate pitting homeland defense against civil liberties to a level not seen since World War II." (For now, security trumps liberties [csmonitor.com])
"From the very first surveys after the World Trade Center and Pentagon attacks, most Americans told pollsters that the country would have to give up some rights to fight terrorism (79 percent in a CBS/New York Times poll in September). A Gallup survey conducted Nov. 26-27 found six in 10 Americans who said the Bush administration has been 'about right' in its limits on civil liberties, as opposed to 10 percent who said the administration had gone too far and 26 percent who think it hasn't gone far enough." (Public Supports Domestic Crackdown on Terror [publicagenda.org])
After all, if you're innocent, what do you have to worry about anyway?
"Welcome to a Brave New World" (Score:5, Informative)
Seriously, "Magic Lantern" and all the other privacy-invasive technologies used to snoop on private citizens are still a far cry away from the world of "Brave New World." After all, we still possess enough of our wits to question whether these steps are necessary, legal, and ethical. The folks in "Brave New World" didn't even go that far.
We are much closer to Orwell's "1984" then we are to "Brave New World." And I'm not sure which is the more frightening.
In 1984, the government had to force people to behave using the classic methods of tyranny. In Brave New World, the citizens were kept so damn happy that they would never question that the government didn't have their best interest in mind, regardless of what it did.
Remember: in 1984, our protagonist was someone from withen the society who began to realize what a living hell he was in and began to try to do something to better his condition. In brave new world, our protagonist was someone how came from outside of the society, having been raised on a "reservation". It was only because of this distance from the reality of the "Brave New World" society that he was able to see how awful it truly was.
Read it online (Score:4, Offtopic)
It isn't hard to read. It is available online for free reading [huxley.net]. Have a look. I took the time out to read it - and now I know what the parent to this post is on about.
Re:"Welcome to a Brave New World" (Score:3, Informative)
"Oh brave new world, that has such people in it."
Re:"Welcome to a Brave New World" (Score:2, Interesting)
And who protests? Geeks, living partialy in some abstract cyberspace, and various idealists like libertarians or people who still believe in American Democracy as some ideal being which exists and now is threatened by evil FBI, NSA or whatever. All these are also kind of outsiders.
So, I would say, we're somewhere in between: nobody's gonna use rats if you say that the goverment is evil, and most of the people are happy with their freedom shrinking, but still, it's just _most_ of the people, not everyone.
Rav
What I read (Score:2)
With a remotely installed spy app they could remotely uninstall it. AKA no search warrant needed to get it on there in the first place because they can remove it any time they want causing a gapping hole in the 4th amendment (remember the Bill of Rights?). The other thing is how do they get this installed on a Linux system? The same binaries that work on win32 systems will not work natively on nix systems. Does this mean it could be the first Trojan to work across multiple OS's?
my fear... (Score:2)
my fear is what if the FBI comes up empty after trying magic lantern against a target?
iow - install it, then fail to find or obtain what they're looking for. Will the warrants require removal of the lantern after a certain amount of time?
And what about repeated failures? Get into the computer, not find anything, back off, get another warrent, try again, still nothing. Would there be limits on how many attempts there are? Or a limit to the the number of searches within a given timeframe?
possibility of detection might exist (Score:2)
also, what about personal firewall programs? I use Tiny Software's PF (yes, under Windows, sad isnt it) that checks the md5 of an executable before granting internet access. on top of that, it can allow you to block certain apps from making/accepting connections from various sites. for example I have it set to not allow Mozilla access to doubleclick and some other ad servers.
Here, two things exist: the lantern has to find a way around the md5 and also find a way around asking the user "PGP wants to connect to [fbi-ip-address], allow it? (y/n)" Getting through one or the other might prove difficult.
Yeah. Right ... (Score:3, Insightful)
And in 1968, the Hugues Glomar Explorer was looking for nodules on the pacific floor ...
Seriously though, how plausible do you think the following scenario is :
McAfee receptionist : Hello gentlemen, how can I direct you ?
Men in black : [showing their IDs] We work for the department of Homeland security. We need to speak to the CEO at once. You also are not to mention our visit to anyone by measure of national security.
MR : [picking up the phone] Mr. Sampath, important visitors for you.
Srivats Sampath : What can I do for you folks ?
MIB : Your company is under strict orders from the FBI and the department of Homeland security to provide appropriate backdoors in the software it produces. These backdoors are confidential-defense and must be revealed to the following persons only : [list of persons]. Any of you or your employees who have knowledge of these backdoors who reveals the existence of the backdoors will be detained and judged by a military court. Any question ?
SS : [going into brown alert] Yes yes Mister, anything you say. Have a good day Sir.
SS : [later, talking to the PR guy] John, write the following press annoucement and send it immediately to PRNewsWire : McAfee will NOT NEVER EVER UNDER ANY CIRCUMSTANCES NOT ON YOUR LIFE install any backdoor ever in our software. Never ever. Promise.
You think I'm paranoid ? Heck yes I am. The above is a bad fiction, and if nothing else, it certainly shows that I have no knowledge of who does what in the government, but my point is : none of these anti-viruses are open-source, how the hell are we supposed to know they're saying the truth ? especially nowaday, can you really trust anybody even remotely involved in computer security to tell you the truth ? Well, I'm taking the easy way out of that dilemma and I'm sticking to "alternative operating systems" that don't require proprietary anti-virus softwares in the first place, and that are known not to contain backdoors as long as the user administers the box properly.
Interesting question (Score:2)
The layer would only allow input to be passed to a specified program, and output would be passed only from that program - encryption would also be used between the input / system / output.
Sort of like an encrypted remote login, except that it would take place within / on the same machine, sorta a basterdized winnt.
It would be a shitload of programming methinks (i.e. a new shell, re-written (or heavily modified) programs) I dunno, I could be full of shit. However, if you would only be using the prog for the encryption of files / sensitive data . . . possibly send output to another device instead of thru the vid card..
TRading freedom for security (Score:4, Interesting)
As another poster mentioned, it is quite likely that none of us would like to have all of our keystrokes made public -- some of our innermost thoughts go right through our keyboards, and Magic Lantern wouls apparently make no distinction between keystrokes that you intend to publish on the web, and those intended to stay private (financial info, personal letters, diaries, medical correspondence). If you think this sort of tapping would only occur under warrant, you aren't following the latest news.
Since 9/11, we already see our government detaining people for more extended periods of time even when the detaineee has not been accused of a crime, refusing to share the evidence [sfgate.com] against those detained, and the Dept of Justice is even, per AG Ashcroft, allowed to monitor conversations between people in custody and their lawyers [aclu.org]. That last one applies to everyone, and is not limited to suspected illegal immigrants.
This is the top of a very slippery slope. If we give away rights to privacy in our homes and with our legal counsel, we will never get these rights back.
"A man who gives up some of his liberty for a little temporary safety deserves neither liberty nor safety." - Benjamin Franklin
"Whether or not legislation is truly moral is often a question of who has the power to define morality." -- Jerome Skolnick
Getting around Magic Lantern (Score:5, Insightful)
Re:Getting around Magic Lantern (Score:3)
Re:Getting around Magic Lantern (Score:2)
do pretty much everything, not just keylogging. For instance they could encrypt your text in the manner it would be possible to decrypt it later.
Re:Getting around Magic Lantern (Score:3, Insightful)
Re:Getting around Magic Lantern (Score:3, Interesting)
This would work. In fact, this is exactly the method used by amazon.com in their (very) early days to "secure" their database of credit card information. Credit card info was stored on a separate, non-networked computer. Every morning, the names of customers who had placed an order since the previous day, would be saved to a floppy disk which was then physically "carried" to the database PC to be matched up against their credit card info. That PC then generated a list (on paper) of billing requests to be sent off to Visa etc. The only way to modify the database (to add a new customer or update a credit number) was to actually call Amazon.com, and get someone on the phone to walk over to the database machine and enter some SQL woopla.
Whee. (Score:5, Insightful)
If someone puts a trojan or virus on your machine to spy on you, it's "cyberterrorism."
If the government puts a trojan or virus on your machine to spy on you, it's "domestic security."
Not scared of magic carnivores..... (Score:2, Insightful)
Does anyone really think that Magic lantern, or carnivore, or any other media whore flavor of the week is a truely serious concern? Yes, there are possibilities for backdoors to fall "into the wrong hands" But just what do *you* stand to lose? A piece of your freedom? yeah, that is a legitimate concern, however, was that a freedom you really had?
Anyone who has had to deal with law enforcement with a computer-related incident loves nothing more than to howl about how woefully out of touch those in authority are. Then, when said groups make attempts at learning, the same folks go on half cocked screaming orwellian brave new world like lemmings.
the one argument that keeps coming up is "if you have nothing to hide why are you concerned?" Well, if you have nothing to hide, odds are you'll never have to deal with software like this in the first place. they still need a warrent, they still need a reason to target you. There's a reason search warrents aren't mentioned in 1984.....
Is there a signifcant risk to freedom at stake with recent legislation? There could be. Is there a dedicated group of individuals that want to run around screaming "brown-shirted nazi jackboot black helicopter Orwellian thought crime brave new thugs!" at the first mention of the FBI? Yeah. Any government agency concerned with the safety of the populace is going to end up on the wrong end of popular opinion anyway.......
What next? (Score:2)
How we can use DEFIANCE to PROTEST (Score:2, Interesting)
I have a bbiagent.net router that I routinely check on. Several times my friends have brought over M$ machines infected with viruses, I would see them trying to connect to the router on goofy ports, then look up what viruses use that port and take the right action.
What would be really nice is if the EFF or some similar organazation makes a blacklist of products infected with this crap. I don't think it would be too hard to detect, lots of smart people out of work with time on their hands now. More of us than the FBI, yeah coppers good luck!
I would not buy a product nor subscibe to a service that allows access unauthorized by me. The rest of
What to do, what to do... (Score:2, Interesting)
Then, watch as Melissa hits again and devistates the economy. Seem radical? Yes. But frankly, there comes a time when drastic steps need to be taken. Just think about how long it would take, in such a scenario, for the FBI to force the antivirus makers to update their software to clean things out... Short-sighted lawmakers may take away a citizen's freedom, but we still have the power to control what does and what doesn't happen in our government (well, with regard to the FBI).
Maybe an open source anti-virus tool for Windows is a better idea... as long as the FBI's targets are protected the software will be useless.
Re:What to do, what to do... (Score:5, Insightful)
What makes anyone think they won't do the same for the FBI? Simply put, they will.
The answer, of course, is free software. If we had a free software virus scanner/remover, that was completely open source, such tomfoolery would be impossible (so long as you knew how to read the code, or could get someone to do it for you, not that hard to do in the Linux community)
Open source=accountability.
This is why I'm concerned that this sort of thing will end up playing into Microsoft's hands, in getting an increasingly paranoid government, that is absolutely determined to outgun it's citizens in every aspect of life, to get free software made illegal..
Imagine it being ILLEGAL to posess a true open source operating system because it would be the legal equivalent of having a private nuclear bomb.
This is not so farfetched, as a networked computer that the government cannot monitor nor break into is as great a threat to our ever paranoid government AS a nuclear bomb in the hands of a private citizen. The precedent proof is in the fact that the government has made the ownership of weapons that would allow resistance to it illegal (had the same been true in 1776 the revolution would never have suceeded).
I think all who value freedom should oppose a government from being able to impose restrictions on citizens that it will never place on itself, IE, the fact that the GOVERNMENT is allowed to have strong encryption, unhackable (or so they think) computers, networks, etc, to hide information, but that private citizens should not.
How many crimes comitted by our government are hidden in encrypted files on government computers that will never EVER be discovered? Why should we trust a "justice system" that in the past decade has massacred more people without cause (Waco, Ruby Ridge) than at any point since the civil war?
Unlike the days of Woodward and Bernstein, it's likely our government's worst crimes aren't written on paper to find, they are stored encrypted in a computer somewhere. Which means, unless the citizens are allowed to install trojans to go on "fishing" expeditions through our government computers, we will never know.
But, as our government is saying to us, I'll say to them "if you've done nothing wrong, you have NOTHING to fear, right?"
In this, the government is non-partisan. Janet Reno presided over those aforementioned massacres, and John Ashcroft is pushing the current horror. All the more reason to abandon our one-party Demopublicans and vote Libertarian.
Can't connect to one site! (Score:2)
Unfortunatly I can't find anything - in every browser [IE, Mozilla and Netscape] I get a "host not found" error...
... weird.
But at least now when I say that they [Big Brother] are watching us I have proof and people won't say I'm crazy.
Think for a minute (Score:5, Insightful)
It's the networked computer-version of a phone wiretap.
In both cases, permission to use either information-collecting method has to be authorized first by a court-order. From the article [news.excite.com]:
When asked if Magic Lantern would require a court order for the FBI to use it, as existing keystroke logger technology does, Bresson said: "Like all technology projects or tools deployed by the FBI it would be used pursuant to the appropriate legal process."
...which is legalspeak for "Yeah, as long as wiretaps require court orders, so does Magic Lantern."
I can't believe the number of posts comparing the introduction of Magic Lantern to a civil liberties meltdown getting +1 Insightfuls. They're about as insightful as the patriotic idiots who'd allow government agencies unchecked freedom to invade private citizens' lives in the name of antiterrorism.
The citizens of the US have a responsibility to watch over the actions of its government, to serve as a check against the growth of abuse of power. Melodramatic statements like "Welcome to a Brave New World!" and knee-jerk antigovernment statements like "Trust the FBI to abuse this the minute they get it" merely serve to marginalize and decrease the credibility of those that speak out against government agencies becoming too unfettered.
Am I afraid that Magic Lantern may someday be abused? Well, yeah, but I'm a lot more frightened by the potential abuse of "old-fashioned" things like the aforementioned wiretaps and unwarranted searches and seizures than I am of the FBI emailing me an easily detectable and easily deletable script or executable virus. Magic Lantern doesn't strike me as a shadowy menace so much as the amateurish nature of a government agency still in the first steps of dealing with a wired world.
The key to preventing abuse by the FBI and other agencies is not by depriving it of tools to work with, such as wiretaps or Magic Lantern, but to ensure that adequate oversight exists and continues to do so in the future. Spending time and energy protecting and advocating the transparency and accountability of the FBI is infinitely more effective, and more likely to work, than seeking to deprive the FBI of intelligence-gathering tools to work with.
Re:Think for a minute (Score:4, Interesting)
Power corrupts. Absolute power corrupts absolutly.
And now let me expound upon that.
I have a friend-of-a-friend story: a friend of mine is a lawer who defended a client accused of a computer crime- namely, running p0rn and selling 'services' on the 'net. When the police (Atlanta, GA- local mind you) raided his house, they took everything. Incuding, for no reason whatsoever, his pickup truck. And then auctioned said truck off. Before he was proven guilty in a court of law- before, even, he went to court. In total defiance of the constitutional protections against unreasonable search and seizure. And this was doubly unreasonable as a) they had no reason to sieze his vehicle and b) the had no right to sell it before his guilt was determined.
So if you want to say something sensible and levelheaded like "ensure that adequate oversight exists", keep in mind that the overseer needs to know about the issures involved. And when they don't, any amount of oversight won't do anything to stem corruption. Because I'm sure as sure can be that the goverment has sharp oversight over the local police departments, but yet that didn't stop this from happening. I don't even want to think about what the police really do in cases of phone tapping.
Re:Think for a minute (Score:3, Insightful)
When asked if Magic Lantern would require a court order for the FBI to use it, as existing keystroke logger technology does, Bresson said: "Like all technology projects or tools deployed by the FBI it would be used pursuant to the appropriate legal process."
Baloney. If that's what he meant, he would have said, "Yes". In fact, this is doubletalk for "no". The FBI wants to do this with only a warrant (easily obtained) instead of by seeking phone-tapping permission (much harder).
Possiable solution (peer-to-peer key checking) (Score:5, Interesting)
Its a bit insane but think about it..
This would ideally be applied to jxtra (www.jxta.org) - suns peer to peer protcal layor (different things can be put ontop, like a web browser, a IM message,file sharing, etc).
Have the a key/checksum on the file itself. Then to authenticate, connect to the p2p network. Each host would have their own UNIQUE key. The longer a machine is up the more trust. Nearby machines get the key as well.
So, to authenticate the program goes and finds a bunch of random machines, asks what their keys are and what the key is for the package file. Then, you check the machines keys with other machines to make sure they can be "trusted". This would be a cross between the gpg signing "web" and p2p networking.
So the machines that have been on longer can be trusted more. This is to prevent a machine at the isp to generate new keys on the spot (or use the same one over and over again). It would have to be around for a resonable amount of time (24 hours?).
So each time you check package x, at random a series of "hosts" are asked what their checksums are for package x. For the paranoid, could add some route/different isp checking as well. Let say it asks 20 machines. If all match, then odds are pretty good its correct. Also, each host's key would have to be unique and "trusted". Then you can go out onto 100's (even more?) of hosts to check.
True, (in theory) it would be possiable to fiter for those specific requests, generate a seperate key for a bunch of ip's RANDOMLY and have them authenticate with each other, but that would be quite difficult. In order to do that, they would essentially have your connection severed from the net, with no direct path and on a "virtual" network, in which case your screwed anyway.
It isn't the most efficent way, but probably about as secure as you could get. Well, without being the govenment itself ^_^.
Re:Possiable solution (peer-to-peer key checking) (Score:2)
Having the checksum on the file itself is a bit ridiculous because if there's a trojan filtering stuff between me and the rest of the network it can easily strip the checksum off the file, change it, then add its own checksum. It will validate but it won't have the original checksum that you thought it had. No matter where it propogates it'll have the fucked up checksum. You've also got to be able to handle the event of half of the machines don't validate your file. What then? Half of the systems say it works and half don't, who do you trust then? Say with that system I write a quickly propogating virus or trojan that makes checksum requests fail. Who then do you believe when you're authenticating your file?
An analogy (Score:5, Insightful)
In both cases:
Writing letters to your representatives and starting petitions about strengthening the oversight mechanisms over the FBI makes a lot more sense, just like the FBI using other methods to gather intelligence on criminals makes more sense than banning strong encryption.
Re:An analogy (Score:3, Insightful)
It grants no rights to government. There is a reason for that. Think about it.
Yes, it is a double standard, but that is the way our founding fathers made it, because they knew it was necessary.
Entering passwords without the keyboard (Score:4, Interesting)
He claimed he was a terrible typist. I couldn't tell though, because he didn't touch the keyboard. He would literally copy and paste every character he entered. While this would be tedious for all typing, it strikes me that would be a good way to enter passwords if you're concerned about a keylogger.
That generally wouldn't work for whole-system logins, but it would work for encrypted files and other "lesser" logins. Copy a letter from this page, a letter from that, paste it in your password box, and I doubt seriously even a macro recorder could follow what you're doing.
I'm violated and I can't fight back. (Score:5, Insightful)
I am Australian. I use American antivirus software. There is no indication that Symantec or McAfee are going to protect their Australian consumers from the American government.
Most of this discussion has centred on the FBI invading domestic computers. I am more concerned, not personally, but ethically as a global citizen, with the CIA or another US body using this technique to invade my country's rights.
I have no recompense, short of diplomatic channels, or through whatever (uberexpensive) international anti-espionage laws , at stopping this.
Magic Lantern is a very blunt intelligence instrument. Right now (and the irony is NOT lost on me) all I have to be thankful for is that my sychophantic Prime Minister has been licking Dubwya's scrotum so much lately that Australians are probably far down the list of suitable intelligence targets.
Foreign troubles (Score:3, Funny)
Can I sue the US Government for privacy infractions and computer crimes if I find this program on my PC? Can my government sue the US Government for the same?
Don't worry, noone will ever accuse Australians of having any intelligence to target.
*rimshot*
How does this affect non-us users? (Score:2, Insightful)
I don't really see the problem with the AV vendors (Score:2, Interesting)
First - think about how AV software works. It usually scans a file when it's accesed for certain known patterns - the virus signatures. Every virus/trojan/worm have their more or less unique signature which is used to identify it. So, when AV vendors say they won't detect it they software is not deliberately letting ML through - the software just will not have a signature for ML, and therefore it won't be recognized as a trojan.
This is not a hole.
It's just how antivirus software works - looking for known malware patterns.
Now, if I were to make my own personal Magic Lantern, I could theoretically modify FBIs software, or write my own. They will both be equally undetectable. Now, when certain AV vendors say the won't look for ML it is in fact good - because they are open about it. You KNOW their software won't detect it, and if you feel threatened by it you are free to change vendor and add in additional layers of paranoia (Firewalls, IDS, tripwire).
If we are going to hate AV vendors for something, we could just as well blame them for not including anti-spyware in their signature files. They have overlooked this specific kind of malware for years, and not many have raised their voices about it.
I'm more scared of the methods they intend to infect their targets - pushing ISPs into modifying data as it arrives at the victim's computer is just plain scary.
Then again, it's FBI we're talking about. For the most part they play by the rules. And if you're really so scared about Magic Lantern, you should be scared about phone wiretaps and Tempest too. They are all equally privacy-invading technologies, but very few of us encrypt our telephone calls or install lead-walls to protect our privacy.
I'm not saying that Magic Lantern is a good thing (it's not), but the AV vendors are not trying to make a gaping hole in you computer, and shouldn't be accused of such things.
possible solution (Score:2)
Give a lawyer in each country bank account number and legal duty to withdraw all the money when it has been proven that that company has been compromised. The lawyer must open a new bank account for a competitor who has never been compromised.
Something tells me we will end up pretty quickly with a well-funded open source antivirus company!
Security Enhanced Linux? (Score:4, Interesting)
It seems to me that sooner or later these two government projects are going to come into conflict and it will be very interesting to see who comes out on top.
Brave New World? ( or 1984 ) (Score:5, Insightful)
Now, if they ( the ever ubiquitous "they" ) were putting drugs ( got soma? ) into the water, then it'd be more similar to BNW, but instead it's the Government furthering it's ability to monitor the activities of it's citizen's, which strikes me as much more Orewllian.
Okay, back to your regulary scheduled MS sucks/Linux rules/I hate Katz ranting.
Remember, "a gramme is better than a damn!" :)
Re: (Score:2)
Re:Is FBI working together with the software compa (Score:2)
Footnote: in one of the proposed remedies against MS for its abuse of monopoly power, there was talk of opening the source for a bunch of their stuff... except for things that the government would choose to explicitly not allow open-sourcing.
One can readily see that as meaning the government gets to keep its backdoors and keyloggers and suchlike from prying eyes.
Re:Why do people get riddled with fear? (Score:2, Insightful)
I respectfully disagree.
It doesn't matter what you do, it matters what they can credibly claim you did. That's the threat. If the FBI were to accuse me in court of having written Goner, for instance, which judge is going to believe me? Any single techno-geek can't deny an allegation if it's strongly put.
The risk here is that the FBI gain more credibility to make accusations. That's it really. That credibility is a threat in itself.
Personally I don't have much to hide, because it's all posted on websites somewhere...
- Malx
Re:Why do people get riddled with fear? (Score:2)
Tell you what... (Score:3, Insightful)
If, after all that, you come back and say "It made no difference. I had nothing to hide" then I'll believe you. No cheating by self-censorship allowed.
'Till then I bet you're just like everyone else -- you have at least one skeleton in the closet.
Remember, the FBI are people too. What interests the mailman that's in those baggies interests an FBI agent just as much. The only difference is that the mailman is under special orders not to read your mail.
Re:Why do people get riddled with fear? (Score:2, Informative)
Then They came for the Trade Unionists, but I didn't say anything because I wasn't a Trade Unionist.
Then they came for the Jews, But I didn't say anything because I wasn't a Jew.
Then They came for the Catholics, but I didn' say anything because I wasn't Catholic.
Then they came for me, and nobody spoke because nobody was left.
Reverend Martin Niemoller
Re:Why do people get riddled with fear? (Score:2)
Given the risks to the FBI of this virus being reverse-engineered, I would presume they would want it distributed to as few people as possible.
It's not a virus because it doesn't self-replicate. Nor is it a worm (because, not being self-replicating, once on a host, it doesn't infect other hosts through the 'net).
So ML, if released through email, will be targetted directly to the suspect.
If you're a drug kingpin, watch out for "Guido! I send you this plans for drug factory to have your advice!"
If you're a warez d00d, "D00DZ! Drink0rDie got fux0r3d last week! Run this c0d3 to DDOS the fux0rz!" might not be a good email to open.
But if you're Joe Slashdotter, you'll never see it, because the FBI won't send it to you. Not just 'cuz you haven't done anything to make yourself worth attacking, but because even if you have, they know you'll just disassemble it and embarass them.
Gotta run. (Someone sent me a mail saying "Hey, you were wrong, check out the original source code for ML right here in this self-extracting .exe!" ;-)
Re:"Magic Lantern" Defense? (Score:2)
I don't know if this is a Troll or not, but I'll bite.
This is NOT a valid argument. First off, think about what you said for a minute. It may come as a huge shock to you, but people who are not guilty are and have been arrested. And that won't be changing any time soon. Plain & simple, there is nothing written anywhere that says this will ONLY be used on criminals. All it would take is one person having a suspicion about you, and presto, they are trying to keylog your system. If you want to just let the FBI into your computer and allow them to monitor you, go right ahead, but I most certainly do not.
I could go on, but I won't. All I'm going to say is that this is a stepping stone, and if we don't try to resist it now, we may not have the option to do so in the future.
Re:"Magic Lantern" Defense? (Score:2, Insightful)
The problem is that we have a government that is becoming increasingly oppresive. All three branches of our government are basically for sale to the highest bidder. We have lawmakers and people in positions of power who don't really care about the Constitution.
The government has locked people away for nothing more than expressing opinions in the past. I don't want the FBI knocking down my door because they read an email I wrote saying that I disagree with John Ashcroft's latest violations of the Constitution.
Re:"Magic Lantern" Defense? (Score:3, Informative)
(Flippant answer: "Look, it's the Fourth Amendment we're getting rid of, not the First! Get yer Amendments straight, duuuh!" ;-)
But I think that deserves a serious answer, and since it's the Constitution you're so worried about, I'll have at it.
Ashcroft's actions are highly constitutional. He's fulfilling his obligations as part of the Executive Branch as specified in the Constitution, namely to use the powers granted to him by Congress to fulfil his mandate. Once something gets passed by the Legislative branch, it's law, and the Executive is obliged to work within the (ever-shifting confines of the) law until the Judicial branch (after due prodding) says it did otherwise.
So if you have a beef with the changes going on lately, it's with your Congresscritters for passing bad law.
But please, if you're gonna go Constitutional on us, don't trash the Executive for doing what the Constitution says it has to do -- namely doing the things your representatives in the Legislature told it to!
The funny thing is... (Score:3, Insightful)
We know this because even the Congressional leadership didn't know about them, as evidenced by the hearings certain privacy-conscious sons of liberty among them demanded once Carnivore became known. The fact is the executive branch does most of what it does without any Congressional approval at all. Or what would you call President Bush's fiat about using military tribunals, an order which the Legislative branch did not authorize and, though most support it, almost all complain that they weren't even consulted.
You're quite naive if you believe this nation still operates as the Constitution intended it to. Instead of the Legislative branch setting things into motion through passing laws, the Executive branch carrying those laws out, and the Judicial branch overturning laws when necessary and interpreting them in just ways, it now works like this:
The Executive branch sets things into motion by executive order and abuse of over-broadened discretion; the Legislative branch quite rarely then puts the Executive back in its place by passing laws to curb its abuses, but much more often is too busy setting other abuses into motion through its own powers, such as CDA, COPA, DMCA, SSSCA, etc., which generally serve to magnify and reinforce the abuses of the Executive branch; meanwhile the Judicial branch occasionally slaps down a particular abusive law or executive practice only to be largely ignored and "worked around" by those other two branches who just keep hawking the same old abuses of liberty under new bills of sale, ceaselessly, since the actions of the Judicial have no bearing at all on what the Legislative and Executive branches have the power to do--write the same policy up into different words and all of a sudden it's a new law or executive order, which has to be nullified by a Court again through the same long and painful process, even though it's essentially the same abuse. Not that the Judicial branch can be trusted to defend liberty much better than the other two, though--cf. the insane decision upholding anti-sodomy laws by the High Court in *Bowers v. Hardwick*, which boils down to "your right to privacy doesn't include the right to go against mainstream moral teachings." Read the text of the decision--it actually uses the word "morality," as if the Judicial branch is there to enforce subjective Christian moral concepts rather than invoke objective attempts at justice.
To put it simply, the FBI has a Congressional mandate to arrest people for breaking laws, but it does not have a Congressional mandate to do whatever it wants and invent any methods of snooping it wants while investigating people it desires to arrest. The unfortunate part is that the Legislative branch is too busy violating our other rights and taking corporate perks to ever use its power to restrain the FBI by law, while the Judicial branch is so slow and addlepated that multitudes of people will have the FBI's Orwellian thoughtcrime-control toys unleashed on them before it ever decides to uphold or invalidate these invasions. Not that we can trust it to make the right decision anyway, considering that it won't even let me lick my adult and consenting wife or girlfriend's pussy in private.
Thomas Jefferson was right, my friends--"An elective despotism was not the government we fought for."
Re:"Magic Lantern" Defense? (Score:2)
Those who don't learn from history are bound to repeat it. Read up on the Reichstag. An evil man with a fondness for jackboots and genocide convinced people like you to think the way you're thinking. Inevitably, it all ends in tears.
Tragedy (Score:2, Insightful)
What does this currently threaten? It is only through this avenue that I believe IP/Patent laws can or ever will be reformed. I certainly hope they do, so I don't have to explain to my grandchildren why knowledge and human creation built for thousands of years, their Birthright, the first creation of man that had no scarcity, enough for anyone willing to see, was caged and locked away only to be available to the richest, or at worst lost forever.
This is a direct attack to the defenses the people have against their rulers.
My legal advice to you... (Score:3, Informative)
You are under the misguided beleifs that:
1. Only guilty people exercise their right to privacy
2. Only guilty poeple have items seized as evidence upon a voluntary search.
Lets say for example, the FBI knocks on your door saying they suspect someone has been sending death threats to the president from your computer. They are mistaken. They want in to "look around" and walk out with your computer. Good luck getting it back, cause it will be in a "evidence" vault till you die, regardless of innocence or charges being sought. They could do that with ANY item in your house that MIGHT be tied to the crime and odds are you won't get it back, ever.
Reminds me of a county n Texas, all traffic violators were searched and anything that the searchers thought was "drug related" was seized. Well, a buisness man was speeding though said county, pulled over and lost 10-15K (I don't remember the exact figure) in cash he was taking to his son as a loan, all of which he could prove was legally earned. He ended up sueing, and getting little more than half of it back.
So, my legal advice to you (IANAL-Lawyer) is to NEVER ever for any reason let any cop search any of your property, unless they have a court approved warrent.
Re:"Magic Lantern" Defense? (Score:5, Insightful)
Maybe I enjoy surfing porno websites. Maybe I work for a Fortune 100 company and have trade secrets on my computer. Maybe I'm secretly gay and that fact could be gleaned from my online habits. Or, hell, maybe I run the world's biggest cocaine trafficking ring over the internet. (Obligatory disclaimer, all of these situations are bogus.) It doesn't matter what I'm doing; without a warrant, the government has no more of a right to come in my house or my computer than a bum off the street.
The problem I see with Magic Lantern, vis a vis conventional searches, is that the potential for abuse is far too great. When the FBI raids a house, it's rather obvious. Maybe the person is at home, or the neighbors see it going down, etc. Makes it pretty difficult for them to just bust in any old house they want, without a warrant; and makes it pretty embarassing if they happen to screw up and raid the wrong house. This is (at least in my mind) a fairly good check and balance to ensure that the FBI isn't raiding houses on a whim.
What happens, though, if they bungle and put Magic Lantern on the wrong person's computer? It's a valid threat; if fucking bomb coordinates can be transposed, so can a suspect's IP address. What if Magic Lantern winds up on your computer or mine, even though we aren't doing anything illegal? There are no neighbors to see it happening, there is no embarassing story on CNN about the snafu, but before I know it, those corporate trade secrets on my computer are now in the government's hands. (IIRC, it was objection to exactly this type of risk that got France in a mess when they banned encryption.) If there are terrorists at the mall, I at least have the choice to stay home and avoid them.
Shaun
Re:Hackers Beware (Score:2, Insightful)
And rude people and dog owners... please, if you don't like your freedoms, then just pretend you're in prison. But don't volunteer away my rights. To me it sounds like you definitely are "one for violating our freedoms."
Re:Anti-virus software (Score:2, Informative)
No! You, like so many other people, didn't read the quotes well enough. To start with, everything was hypothetical (and that was made clear in the articles). All AV vendors were saying that they had not been contacted by anyone from the FBI, and the all also said that they did not know if there was a thing like Magic Lantern.
Now, some people in Network Associates and Symantec said that if the FBI gave them a copy of Magic Lantern, then they would avoid detecting it (I'm asuming using an MD5 sum or something similar so hacked versions won't escape detection).
Later, "higher" people in the same companies said that they WOULD detect magic lantern.
If we asume that the internal communication issue has been resolved and this has been discussed internally, the latter statements are probably the ones that will be followed.
End conclusion, AV programs WILL detect Magic Lanter if they get their hands on it.
Re:Defeating Magic Lantern (Score:2)
The FBI may then employ Dastardly and Muttley's Vulture Squadron, but to no avail as there is no recorded evidence of them ever catching the pigeon...!
Step 9. Stop being so paranoid and thinking that anyone really gives a shit what you do...
"O brave new world... (Score:2, Informative)
In case you couldn't tell, he was being sarcastic.
Huxley's book derives its title from a scene in The Tempest, in which Miranda, upon meeting a bunch of royal bad guys--whom she naively perceives as regal, not as the bunch of usurping, murderous scum they really are under their shiny hats--says "O wonder! How many goodly creatures are there here! How beauteous mankind is! O brave new world that has such people in't!" to which Prospero--sad cynic, curmudgeonly nihilist, all-around smarty-pants, exiled in a world of criminal dipshits--says "'Tis new to thee."
Not an inappropriate sentiment, in this case.
But of course you knew that.