From: Jim Ray <jmr@shopmiami.com>
To: fight-censorship@vorlon.mit.edu
Message Hash: 8daf426859f7a1518247f7460a65216a7986b6b1fbea64ee47e55852b36d91d8
Message ID: <3.0.16.19970829200959.30f7c528@pop.gate.net>
Reply To: N/A
UTC Datetime: 1997-08-30 00:21:33 UTC
Raw Date: Sat, 30 Aug 1997 08:21:33 +0800
From: Jim Ray <jmr@shopmiami.com>
Date: Sat, 30 Aug 1997 08:21:33 +0800
To: fight-censorship@vorlon.mit.edu
Subject: Re: Feasibility of censoring and jamming pronography and racism in informatics
Message-ID: <3.0.16.19970829200959.30f7c528@pop.gate.net>
MIME-Version: 1.0
Content-Type: text/plain
-----BEGIN PGP SIGNED MESSAGE-----
At 09:54 PM 8/29/97 +0200, Ulf Möller wrote about:
>A European parliament study evaluating `Feasibility of censoring and
>jamming pronography and racism in informatics':
...
>7.1.2 It is concluded that available technology does no and is
> not likely to provide any satisfactory means for
> automatically classifying such material. Such judgements
> will therefore have to be made by humans.
The perfect kind? (One wonders what sort of humans would be drawn
to such a job, and which humans will choose or be forced to pay
them?)
...
> - it can not be absolutely guaranteed that Internet
> anonymity services can not be used to frustrate
> detection of offenders in certain circumstances.
Ahh, the double-negatives of understatement.
...
>7.2.9 It is concluded that only implementation of the most
> intrusive surveillance technology could be exspected to
> impact heavily upon abuse of the Internet on committed
> offenders (because of their ready access to strong
> encryption and covert communication technologies). To
> enable this policy scenario, it would be necessary for
> access providers to constrain the equipment used by
> subscribers to access the Internet to be such that:
>
> - no content could be removed;
>
> - all content and processing could be subject to
> automatic and manual surveillance.
Achtung, information-Juden!
>7.2.10 The technical and economic feasibility of the necessary
> technology is evidenced by the emergence, with purely
> commercial motivations, of technical systems which privde
> the basic facilities required to implement the necessary
> measures. It is notes that this coincidental emergence of
> such systems may raise siginificant privacy issues
> outside of the scope of this study. The economics of
> manual surveillance, however, can not be assessed.
How 'bout "tax-and-spend"? That's an assessment.
...
> Detecting offenders
>
>7.2.13 If access providers and service providers maintain
> proper subscriber authentication systems and system
> management environments, offending actions at the site to
> which the subscriber authenticates can be traced to the
> offender. Detection of offenders committing offences 'at
> a distance' (ie a subscriber in a country committing an
> offence in another), however, would require:
>
> - access and service providers to take steps to ensure
> subscriber identity information is carried in their
> transmissions;
>
> - monitoring of services provided on the Internet to
> prevent subscribers misusing anonymity services to
> remove such information.
This kind of monitoring, were it actually possible to implement,
would mean the effective end of anonymity services. Thankfully,
it is presently merely a statist pipe dream.
>7.2.14 Whilst a variety of means exist to attach identity
> information, detection of anonymity services is not
> straightforward. However, monitoring such services would
> be exspected to limit the number available for overt, eg
> to transmit offensive material to innocent parties,
> offensive use.
Translation: "Shut as many of 'em down as possible."
>7.2.15 Legally, handling offences detected through voluntary
> authentication would be relatively straightforward as the
> offending subscriber would be resident in the country
> where the offence was committed. However, offences can
> only be detected through forced identification, ie those
> committed 'at a distance', would currently be subject to
> extradition arrangements and it is not clear that new
> opportunities for prosecution would arise in practice.
Oh boy - "opportunities for prosecution," WHEEE!
> Meanwhile, it may be that the social implications of
> forced and general identification of Internet subscribers
> would leave subscribers open to a variety of forms of
> intrusion on privacy and discrimination.
Oh, but "we" can trust Craig Livingstone, Louis Freeh, Aldrich
Ames, and the rest of the spies, can't "we."
Why am I feeling so worried these days, anyway?
JMR
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
Comment: Freedom isn't Freeh.
iQEPAwUBNAdktTUhsGSn1j2pAQGolQfPYfomnbZzYDGugsixCOrwWPB4L50VMwzS
8EUnjgJ1f62zMkRjYBZyO62qzYaiVru6mktSsGl6qJnnMXophPnpc9hVMyOHdq1X
lWJDG0IRj7/0fffpvk9RKw+DJlFvbI1oKk9b2hCyTnTBgpJeTi4vK3x3zjq2bB3c
R0fagEb2/M700q5KZdG4GkctAwYBGJtTs3MooVCVD++HikTTHyITOhFCUBnQmZKP
haWyHi7kT9HeHfkd708eXEHSxQLcv5l/Slpbi3wZr0YrcwbzlicTHip1eGGU2Nrq
3mJvf04bMBBWtyEa9jQb+1hUfPzQDVzu/Y/xVBPE/1D9jQ==
=EZTV
-----END PGP SIGNATURE-----
Return to August 1997
Return to “Jim Ray <jmr@shopmiami.com>”
1997-08-30 (Sat, 30 Aug 1997 08:21:33 +0800) - Re: Feasibility of censoring and jamming pronography and racism in informatics - Jim Ray <jmr@shopmiami.com>