Posted on 02/05/2010 1:38:42 PM PST by Free ThinkerNY
The FBI is pressing Internet service providers to record which Web sites customers visit and retain those logs for two years, a requirement that law enforcement believes could help it in investigations of child pornography and other serious crimes.
FBI Director Robert Mueller supports storing Internet users' "origin and destination information," a bureau attorney said at a federal task force meeting on Thursday.
As far back as a 2006 speech, Mueller had called for data retention on the part of Internet providers, and emphasized the point two years later when explicitly asking Congress to enact a law making it mandatory. But it had not been clear before that the FBI was asking companies to begin to keep logs of what Web sites are visited, which few if any currently do.
The FBI is not alone in renewing its push for data retention. As CNET reported earlier this week, a survey of state computer crime investigators found them to be nearly unanimous in supporting the idea. Matt Dunn, an Immigration and Customs Enforcement agent in the Department of Homeland Security, also expressed support for the idea during the task force meeting.
Greg Motta, the chief of the FBI's digital evidence section, said that the bureau was trying to preserve its existing ability to conduct criminal investigations. Federal regulations in place since at least 1986 require phone companies that offer toll service to "retain for a period of 18 months" records including "the name, address, and telephone number of the caller, telephone number called, date, time and length of the call."
(Excerpt) Read more at news.cnet.com ...
They can monitor visits to THIS site, and gun sites too.
I thought this issue was pretty much paid to rest with library books. I remember hearing a while back the Feds wanted to be able to track BOOKS people took from the library “just in case” like this and they were told to go fish. No crime no right to check.
Phone calls are already there, I guess piling on MORE Government regulations is in style now.
Hurry, Hurry, HURRIE, GET your Government Regulations HERE while Obama is HOT......Hurrry, Hurrry.......
IXquick is completely SSL, including it’s free proxy service. Your ISP knows you went to IXquick, but doesn’t know anything else until you click on some link, not using the proxy. Until then, the stuff you see is secure.
Scroogle.org allows your ISP to see what you do UNLESS you use its special SSL mode “https://ssl.scroogle.org" Unfortunately, the default for everyone is the insecure version that screws you over with your ISP. But even if you click through on a Scroogle.org with your SSL mode, you leave SSL when you click on a link.
It is possible that the DNS lookup is what some ISPs will be recording. Using a different service will leave your ISP only knowing the final IP address at a point in time, which might be different for sites (especially for end-users) after a period of time, making just collecting IP address a little less useful.
There are paid proxy services that would take care of everything, but you are looking at probably $20+ dollars a month and slower web access for everything. More information here:
By the way, access Scroogle.org in that post assuring your browser isn’t pulling in a quote. The link works without the quote.
bump to track this thread. ;^)
Have you no shame, sir?
Don’t sweat it. You’re wasting your time.
The boys at Ft. Meade are years ahead of all of these “fixes”.
Ask the Imperial Japanese fleet.
(Hint: You’ll need a submarine.)
Really? Is it going to cut down on illegal immigration if we do so?
TOR does actually encrypt the internet traffic that is routed though it. The most that your ISP would know is that you routed traffic to another TOR relay.
Why does the Library (or bookstore) need to even keep a track history of your dealings once the transaction has completed (book has been returned to library or payment has cleared at a bookstore)?
Yet we read miranda rights to international terrorists who attempt to kill hundreds of Americans.
Well, if you are an exit point, every website other people accessed through your connection would be known. Did they go to a child porn site? If so, your exit node told your ISP it was you who went there.
You could choose to not be an exit point, but you are one of the pile-on people who load TOR down.
Finally, did you know that all of the traffic that exits TOR at one of those endpoints is viewable by the person with the endpoint? Free Republic does not encrypt our logins or anything, meaning your name and password go through in plaintext for them to play with.
Enjoy.
More seriously, can we start asking whether or not the types of things the government needs to investigate is worth surrendering even more of our privacy?
Could you please explain a little more about how Open DNS works after you install it? Does it do what it does automatically or do you have to activate it every time you go online? I already use Ixquick and Firefox’s Ghostery, so I’m good in that aspect in regards to your recommendations.
Or you could be a non-exit relay. There's no real shame in not wanting to be an exit relay given the kinds of risk and server load.
Finally, did you know that all of the traffic that exits TOR at one of those endpoints is viewable by the person with the endpoint?
Yes, the TOR docs are quite specific on this - that it only encrypts the relay-to-relay traffic, not end-to-end traffic. But that's usually enough to protect you from an ISP snooping (again unless you're an exit relay). But this isn't much different from the regular internet. FR hasn't felt it necessary to implement SSL logins so anyone sufficiently interested could steal your FR login info already.
Exactly. Everything is logged. In some cases, every keystroke is logged. They can sit around for months or years before being cleared.
To really use OpenDNS best, you need to go into your router and change your DNS numbers to the two OpenDNS gives. When you do that, any computer using dynamic IP through your router will also use OpenDNS. You could just put it in your network settings on your home computer, though. Make sure no other fallback exists, and if you are on Comcast, you also need to go into your online account settings to turn off their default behavior of resolving your missed addresses.
http://arstechnica.com/tech-policy/news/2009/08/comcasts-dns-redirect-service-goes-nationwide.ars
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.