Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Former federal agent calls XP a threat to national security
NetworkWorld ^ | 10/15/2001 | John Fontana

Posted on 10/18/2001 1:30:08 PM PDT by Leroy S. Mort

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-55 last
To: OwenKellogg
I would like to respectfully correct you Owen, the Fourth Amendment you cited, has been eliminated by this Senate section 213.

SEC. 213. AUTHORITY FOR DELAYING NOTICE OF THE EXECUTION OF A WARRANT.

Section 3103a of title 18, United States Code, is amended-- (1) by inserting `(a) IN GENERAL- ' before `In addition'; and

(2) by adding at the end the following:

`(b) DELAY- With respect to the issuance of any warrant or court order under this section, or any other rule of law, to search for and seize any property or material that constitutes evidence of a criminal offense in violation of the laws of the United States, any notice required, or that may be required, to be given may be delayed if--

`(1) the court finds reasonable cause to believe that providing immediate notification of the execution of the warrant may have an adverse result (as defined in section 2705);

`(2) the warrant prohibits the seizure of any tangible property, any wire or electronic communication (as defined in section 2510), or, except as expressly provided in chapter 121, any stored wire or electronic information, except where the court finds reasonable necessity for the seizure; and

`(3) the warrant provides for the giving of such notice within a reasonable period of its execution, which period may thereafter be extended by the court for good cause shown.'.

This section authorizes un-elected, possibly unknown government bureaucrats, the absolute authority to secretly search American citizens homes and business, and not even inform that citizen that the search was made. This does not only apply to a suspected terrorist, but any suspicion, of anything.

41 posted on 10/18/2001 4:19:45 PM PDT by KeepTheEdge
[ Post Reply | Private Reply | To 7 | View Replies]

To: KeepTheEdge
I stand corrected .... and disappointed.
42 posted on 10/18/2001 4:23:16 PM PDT by OwenKellogg
[ Post Reply | Private Reply | To 41 | View Replies]

To: texlok
They wonder why so many are switching to Linux, hrmmm..

Better hope Linux never becomes a mass-market operating system. Linux has been relatively ignored (along with Apple) by hackers and script kiddies mainly because its low market share makes it a less attractive target. There's no OpSys that can't be compromised, assuming someone wants to take the time.

43 posted on 10/18/2001 4:37:29 PM PDT by Leroy S. Mort
[ Post Reply | Private Reply | To 40 | View Replies]

To: OwenKellogg
I share your disappointment, not only because this Constitutional Amendment is going to be eliminated, but also because the media is absent from covering this issue in a meaningful way.
44 posted on 10/18/2001 5:30:05 PM PDT by KeepTheEdge
[ Post Reply | Private Reply | To 42 | View Replies]

To: Redcloak
"I guess that this guy's never heard of PGP..."

???? Huh? PGP encrypts stuff. That's not what the guys talking about at all!! Scrubbing writes several 1's and 0's to every bit on the HD, so even an electron microscope can't make any sense of it.

45 posted on 10/18/2001 9:23:43 PM PDT by Bill Rice
[ Post Reply | Private Reply | To 37 | View Replies]

To: Bill Rice
PGP also wipes files. It uses a changing pattern of 0s and 1s so that after a few passes, the original polarization of any given bit is unreadable.
46 posted on 10/19/2001 1:42:11 AM PDT by Redcloak
[ Post Reply | Private Reply | To 45 | View Replies]

To: Redcloak
There is much better stuff out there. Look at the Steganos software available from www.infowar.com. There may not be enough computing power available to crack the encryption provided.

Files can be saved to a "safe" on your hard drive, and no one but you will know they are there. Documents can be encrypted into picture files of any type, and stored without a hint that it is anything other than a picture of your favorite flower.

47 posted on 10/19/2001 2:00:22 AM PDT by Brad C.
[ Post Reply | Private Reply | To 46 | View Replies]

To: Brad C.
I've 20 Gigabytes of mindless s**t on my hard disk, anything I feel I need to hide I use Steganos with .wav and .jpg files. I guess 20 Gb would be several ENcyclopedia Britannicas, Give the Feds some work to find anything in that lot. The ideal software would scrub the hard disk and just leave one text file;- THE GUY READING THIS IS A DUMB A**HOLE
48 posted on 10/19/2001 2:21:03 AM PDT by unending thunder
[ Post Reply | Private Reply | To 47 | View Replies]

To: unending thunder
Might what to make it a little more polite, if they are digging that deep, I don't think you would want to make them any madder. 20Gb, that's a lot of mindless stuff. I have a lot of jpegs and bmp files that I use for wallpaper and other handy things. Fine art at it's best.
49 posted on 10/19/2001 2:27:29 AM PDT by Brad C.
[ Post Reply | Private Reply | To 48 | View Replies]

To: Leroy S. Mort
>Better hope Linux never becomes a mass-market operating system. Linux has been relatively ignored (along with Apple) by hackers and script kiddies mainly because its low market share makes it a less attractive target. There's no OpSys that can't be compromised, assuming someone wants to take the time.

But if you are not logged in as root, the most they can do is screw with a few files and not compromise the system like windwos...If your logging in as root and are on the internet you almost deserve to get hacked.

No matter what OS, people need to be running firewalls.

50 posted on 10/19/2001 5:39:38 AM PDT by texlok
[ Post Reply | Private Reply | To 43 | View Replies]

To: texlok
Re: firewalls. The only thing that REALLY works is a bastion host firewall like Sidewinder--that means that you have TWO separate computers besides the one you're working on.

"Personal" firewall programs are of variable quality (one such program closed port 80 and resisted all efforts to reopen it) and dubious reliability.

51 posted on 10/19/2001 5:47:26 AM PDT by HoweverComma
[ Post Reply | Private Reply | To 50 | View Replies]

To: sigSEGV
"BS. There are plenty of 3rd party tools out there that do the same thing."

And HTML screen images can send secret messages also. Secret Message Enclosed:

Egads, I've been discovered!

52 posted on 10/19/2001 6:10:02 AM PDT by Rebelbase
[ Post Reply | Private Reply | To 3 | View Replies]

To: unix
I guess they were thinking the same thing as those who wrote Unix...

Unix has open sockets as well Mr. Unix...

53 posted on 10/19/2001 6:22:51 AM PDT by DB
[ Post Reply | Private Reply | To 34 | View Replies]

To: Leroy S. Mort
So this idiot is looking for press? His story sucks, and makes no sense whatsoever.
54 posted on 10/19/2001 7:35:14 AM PDT by PatrioticAmerican
[ Post Reply | Private Reply | To 1 | View Replies]

To: Rebelbase
Not too hard to discover.
55 posted on 10/19/2001 9:47:07 AM PDT by JosephW
[ Post Reply | Private Reply | To 52 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-55 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson