1994-03-23 - Profiles and DTII

Header Data

From: VACCINIA@UNCVX1.OIT.UNC.EDU
To: cypherpunks@toad.com
Message Hash: ac8f46354336a980d84f635030aba40a53ecd2ec4b93547f85d5862aa3a5a3b0
Message ID: <01HAAH5ZWWO2000NL6@UNCVX1.OIT.UNC.EDU>
Reply To: N/A
UTC Datetime: 1994-03-23 04:38:21 UTC
Raw Date: Tue, 22 Mar 94 20:38:21 PST

Raw message

From: VACCINIA@UNCVX1.OIT.UNC.EDU
Date: Tue, 22 Mar 94 20:38:21 PST
To: cypherpunks@toad.com
Subject: Profiles and DTII
Message-ID: <01HAAH5ZWWO2000NL6@UNCVX1.OIT.UNC.EDU>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----

I would like to offer up a scenario which I have heard allusions to, but has 
not been concretely spelled out. It is admittedly farfetched, but not out of 
the realm of possibility. Imagine a room full of Cray XMP's running an AI 
program developed ala FinCen, NSA etc. This program can obtain "setup" 
information (because DTII has passed) without need for even a warrant. The 
program detects certain patterns of information transfer (phone, Net, 
whatever) that it deems suspicious. Suspects are then "explored" further. 
What kind of computing power would it take to implement complete survailence
on say, Washington, D.C.?

This system is very similar to how law enforcement agents now patrol the 
nations highways. People fitting a certain profile are detained by the police,
and searched. Has it been determined if such search and seizures are legal?

I recently wrote to NBC to inform them of what the detection of their calling 
patterns (in real time) could mean to the confidentiality of their sources. 
How many people would commit sensitive information to the media knowing that 
they could be easily monitered? It should be constantly pointed out to the 
media that they have a great deal to lose by passage of DTII, Clipper et al.
The information exchange business could easily be coerced by Gov't in the near
future. Just a few ramblings I wanted to get off my chest.

Scott G. Morham             !The First, 
Vaccinia@uncvx1.oit.unc.edu !           Second
PGP Public Keys by Request  !                  and Third Levels
                            !        of Information Storage and Retrieval
                            !DNA,                       
                            !     Biological Neural Nets,
                            !                             Cyberspace

-----BEGIN PGP SIGNATURE-----
Version: 2.3a

iQCVAgUBLY+olT2paOMjHHAhAQFDrAP/Qnok1TUHx06MG3oc72So39OkJyVCFph6
yMzeHWw65MfarOy12KcB2ASx0XCX5/q1xMocVKIsNMrqnwA018gzUuOzUUrcVp1I
DKqHaBkfcfFkoJ+S3DJQnpXIKw2qjH27dKqsyPLEmH5cripaSSK5xswakwY6mJIu
/cKMMXCMCvU=
=Yaym
-----END PGP SIGNATURE-----





Thread