Internet Surveillance: Recent U.S. Developments
نویسنده
چکیده
Congress revisited the issue of Internet surveillance days after the September 11 attacks when the Attorney General presented draft legislation addressing " new surveillance authorities; " the USA Patriot Act developed from this proposal. The executive branch of the Federal government has since pursued a number of policies and strategies dealing with Internet surveillance and data mining. Many of the difficulties surrounding the question of Internet surveillance center on the analogies between Internet surveillance and telephone surveillance. Are these analogies appropriate; and if we accept that there is a place for telephone surveillance in law enforcement and intelligence activities, does Internet surveillance or data mining naturally follow? Carnivore (DSC 1000) Carnivore is a Microsoft Windows based system developed and used by the U.S. Federal Bureau of Investigation that directly connects to an ISPʼs server. The FBI draws analogies from telephone surveillance to describe the Carnivore system. Carnivore is used in two ways: as a " content wiretap " and a " trap and trace/pen-register. " A telephone " content wiretap " is where law enforcement eavesdrops on a suspectʼs telephone calls, recording the oral communications on tape. Carnivore provides analogous capabilities for e-mail, capturing all e-mail messages to and from a specific account or all the network traffic to and from a specific IP address. " Trap and trace " technology tracks all caller IDs of inbound telephone calls, while " pen-register " tracks all outbound telephone numbers dialed. Similar functionality for e-mail consists of capturing all e-mail headers (including e-mail addresses) going to or from an e-mail account, but not the actual contents. For other forms of Internet activity similar functionality consists of listing all the servers (web servers, FTP servers, etc.) accessed but not capturing the content of this communication, tracking everyone who accesses a specific web page or FTP file, or tracking all web pages or FTP files that a suspect accesses (Independent Technical Review of the Carnivore System; Final Report, 2002). Earthlink Carnivore first came to public attention through a February 4, 2000 court decision. An Internet service provider, later identified as EarthLink, questioned the legal authority of the court to issue an order requiring the installation of a " device which captures the time, date, source, and destination of electronic mail (e-mail) messages sent to and from an e-mail address maintained by a customer at the ISP. " The court found that it had the …
منابع مشابه
Justifiability of State Surveillance of the Internet as E-Security Mechanism
The purpose of this paper is to investigate the legal justifiability of measures contained in state surveillance laws pertaining to the Internet. Prior to the terrorist attack on the United States of America (U.S.) on 11 September 2001, the concept ‘surveillance’ was nothing new and is indeed as old as human society. As far back as the sixteenth century the first central state surveillance appe...
متن کاملO19: Recent Developments in the Treatment of Anxiety, Trauma, and Emotional Disorders
Advances in the treatment anxiety, trauma, and emotional disorders have been the focus of numerous international research efforts, including transdiagnostic approaches, internet-delivered treatments, and combined medication and cognitive-behavioral strategies. Recent research have identified emerging strategies for improving immediate efficacy, availability and dissemination, treatment engageme...
متن کاملRecent Developments in Monetary Macroeconomics and U.S. Dollar Policy
This paper summarizes recent developments in the theory and practice of monetary policy in a closed economy and explains what these developments mean for United States dollar policy. There is no conflict between what is appropriate U.S. monetary policy at home or abroad because the dollar is the world’s key currency. Both at home and abroad, the main problem for U.S. policymakers is to provide ...
متن کاملSurveillance Or Security? The Risks Posed by New Wiretapping Technologies
The United States has moved large portions of business and commerce, including the control of critical infrastructure, onto IP-based networks. This reliance on information systems leaves the U.S. highly exposed and vulnerable to cyberattack. Yet despite this, U.S. law enforcement and national security policy remain firmly focused on building wiretapping systems within communications infrastruct...
متن کاملInternet Users' Privacy Concerns and Beliefs About Government Surveillance: An Exploratory Study of Differences Between Italy and the United States
The study examines differences in individual’s privacy concerns and beliefs about government surveillance in Italy and the United States. By incorporating aspects of multiple cultural theories, we argue that for both countries, the user’s decision to conduct e-commerce transactions on the Internet is influenced by privacy concerns, perceived need for government surveillance that would secure th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004