1 vote

FBI wants widespread monitoring of 'illegal' Internet activity

by Anne Broache | CNET News

WASHINGTON--The FBI on Wednesday called for new legislation that would allow federal police to monitor the Internet for "illegal activity."

The suggestion from FBI Director Robert Mueller, which came during a House of Representatives Judiciary Committee hearing, appears to go beyond a current plan to monitor traffic on federal-government networks. Mueller seemed to suggest that the bureau should have a broad "omnibus" authority to conduct monitoring and surveillance of private-sector networks as well.

The surveillance should include all Internet traffic, Mueller said, "whether it be .mil, .gov, .com--whichever network you're talking about."

Continue...




Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

I saw this ad.

I just saw on a local job internet daily digest I get they are looking for local FBI agents to work in our smaller Boulder County town in Colorado!

I think it was related to this.

Uggh!

What do we do to fight this one.?

Peace.

Liberty Girl.

This.

I'd like to see them try and

I'd like to see them try
and fail!!!

How bout they try it out on .mil and .gov first

and let us know if it works.

Another WAKE UP Call !

People I am here to tell you this is another sure fire way towards a total police state. Do not except this fear tactic of monitoring terrorist or hackers that are trying to take control of information in America. The hackers and information terrorist are already infiltrated in our so called leadership (goverment) at every level. Many tactics are being used to control the sheeple (people with there brains disengaged)of this land. We need to continue educating our families, acquaintances, colleagues, and more important get into the political system from within. We need more delegates, more constitutionalist in political positions. Study and find out how to get yourself or fellow supporters in positions to vote out the corruption that is trying to take total control of our society.
By the way the elephant and donkey with the boxing gloves should be shown as the two parties actually ripping the flag apart while Ron Paul is trying to mend it.

We're using RonPaulians.com ...

We're using RonPaulians.com to get organized for the March and State actions. Please spread the word :)

Very easy to use.

LETS GET ORGANIZED!!!

Be sure to put your profile on www.RonPaulians.com !!!

A MySpace JUST for Ron Paul supporters with profiles, photo albums, chat, classifieds, events, blogs and more. Add video/music widgets etc.
Tell all Ron Paulians!!! :)

Be sure to put your profile on www.RonPaulians.com !!!

A MySpace JUST for Ron Paul supporters with profiles, photo albums, chat, classifieds, events, blogs and more. Add video/music widgets etc.
Tell all Ron Paulians!!! :)

Future thought

Most of us here would agree that this proposal (if not already covertly implemented anyway), will serve only to stifle speech and create databases storing unconstitutional searches available for query by authorities for whatever purpose deemed necessary at the time.

Imagine if the next time you're pulled over, that the officer could see your recent blog postings? Emails? What additional charges could be levied?

What happens to privacy when part of an IRS audit includes verification of your business activities through Internet activity audits?

What if your prospective employer decides to employ an FBI background check that reviews for suitable credit card purchases, appropriateness in political discourse, or a "risk factor" in communication to foreign entities? How free a country is that? It sounds like China to me.

Are these the ultimate intentions of such search power by the state? Or worse?

I recommend an occasional check of the blog by Jonathan Turley (a Ron Paul advisor), for commentary on issues just like this one.

FYI - Get ready to turn over your laptop and passwords for a border inspection the next time you come back from Cancun:

http://jonathanturley.org/2008/04/23/ninth-circuit-rules-tha...

Already have.

Comin into Miami last year. Spent a few hours in 'detention' for no reason, while a DHS thug had his way with my laptop, looking at my personal docs , email, etc etc. When they finally let me go (I had already missed my connection), I asked why? the answer: None of your F%@%ing business" Nice, huh.

It's kinda like already over, people...... :(

THIS IS UNACCEPTABLE!!!!!!.

IF SOMEONE IS SAVVY WITH FINDING PHONE #'S of our..

CONGRESSMAN / WOMAN..... LETS START A PHONE/EMAIL/ LETTER BOMB!!!!!

IF WE CAN GET 8000+ EMAILS TO C2COAST FOR AN INTERVIEW, WE CAN CREATE AN UPSET THAT THEY WILL FEEL!!!!!

someone please get a list and lets go to work

bump

....

Obama = O.ne B.ig A.ss M.istake A.merica

yeah

so what else is new ? they want to stifle every source of free speech available.

~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
Stop the NWO....It's just illumi..Naughty !

they want to regulate and tax...

the internet, as long as it exists in it's current form it is the #1 threat to their agenda...

If you are a Patriot and don't like

what is going on in Washington...get ready for the gulags..they are going to spy on you every way they can and it is strictly for you me and the normal citizens that are trying to keep our Constitution intact. G.W.B. says it is a G** D*** piece of paper. Forget about rights they done done away with them in his E.Orders. We need some folks to run for senate and house badly to curb this stuff. Dr Ron has opened up a lot of eyes..He is a Patriot 1st Class. GOD help us on Nov 5

Government is not reason; it is not eloquent; it is force. Like fire, it is a dangerous servant and a fearful master... George Washington

Government is not reason; it is not eloquent; it is force. Like fire, it is a dangerous servant and a fearful master... George Washington

I'll go ahead and let the cat out of the bag.

I have put money into a coporation that is working with algothrim compression and point based technology in video compression. It is being privately sold to one of the bigger computer moguls for a very very hefty sum.

If the government get's ahold of this technology it will bring the science fiction of the movie Minority report to life literally. Think of it this way. You can only transfer so much info at once. With this technology you will be able to put 10,000 songs on a CD. Send a 3 hour movie over dialup in 45 seconds. Talk to someone in India realtime over your cell phone screen.

You get where I am going here. All this coupled with realtime cameras and biometric devices that alex jones talks about and you can see that we have some real problem ahead of us.

You'll be hearing about new technology in a few months. They have adapted it to MPEG 4 and MPG3 players. It is in the final stages of completion before the major investing groups get ahold of it and begin the selling process.

When I first invested in it I thought what a great techonology that will help all mankind. Now I am concerned.

We can all say what needs to be done, but who here led by example today?

Find out if you have a local militia - http://www.uaff.us/

Real Patriots for 9/11 truth -- http://patriotsquestion911.com/

The big red flag here is the

The big red flag here is the phrase "The FBI wants .....".

As someone who

ran a computer/information security team at a large upscale web hosting company, I can say that the threats are real. Since we live in a society that bases basically all transactions with computer systems, an attack on our network infrastructure would be hundred times more problematic than a nuclear strike. With that being said, this is simply another attempt to get us to give up civil liberties in the name of security. And we cannot allow this to happen.

The need to monitor web traffic for illegal activity is a joke and they couldn't do it if they wanted to. The Feds went to Sprint a while back and asked for all the web traffic on their main (trunk) lines for a two day period. Sprint couldn't do it. Not an aspect of not wanting to do it, but physically unable to do it. The amount of computer power needed would be amazing. But once again, that is not a good reason to sit on the couch and let legislation be passed.

Preventing attacks on the

Preventing attacks on the "network infrastructure" has nothing to do with what the FBI's stated motivations are. They are (supposedly) looking for communications related to any illegal activity.

I didn't make

claim about their motivations. We all know what their motivations are. I was not condoning this idea at all. I was just pointing out that they really couldn't do it even if they wanted to. Sure, they could "pick" certain sites and watch those, but right now, watching the whole internet is impossible. It may possible years from now. But as of today, they couldn't do it.

No, I disagree with the generalization...

When you say "our network infratructure" what do you mean? What would you attack? The Internet itself was actually designed to remain operable under attack as it was created for military communication purposes. Attacking the root servers would cause a lot of disruption, but IP addresses would still work. A bank computer being hacked would not affect my credit union transactions or information. In other words, there is no one central "core" to attack and bring down the whole thing. Although, I suppose a large enough army of drone computers affected by a virus could be effective.

Yes and no

Yes I used a generalization because it keeps it simple. I do agree it would be extremely difficult to "bring down" the internet. I was referring to a more spealized attack, such as against NADAQ or banking intitutions. I believe it is highly unlikely to succeed (unless an inside job) but to think it wasn't possible is being Irresponsible. I am not sure what assumptions you are making when you say that someone hacking a bank comuputer would have absolutely no affect on your account. How so?

I meant if someone hacked

I meant if someone hacked the bank computer of Bank of America, for example, it would not affect my account with my Credit Union. Please remember that not everyone understands even the basics of how the Internet, or the online world works. By generalizing, some may think the FBI really is needed to monitor everything.

ok

gottcha. That is good point.

deluge of cyber-attacks

When you read the transcript, you'd think that the united States was under a deluge of cyber-attacks 24/7/365, right down to your favorite liberty-loving Congressman's website. Since this assertion is unsupported in that context, can someone who is more tech-savvy than myself comment on the validity of this "threat"? Thank you.

"We don't have to start a brand new revolution...All we have to do is restore the original Constitution." -Ron Paul

----

"...a nation that is afraid to let its people judge the truth and falsehood in an open market is a nation that is afraid of its people." -John F. Kennedy

Sure...

It would be equal to saying "There is a real threat because neighborhood streets are openly accessible to any car. A terrorist van could drive up to any house in America and set off a bomb. Therefore, we need to set up checkpoints at the ends of every street in America for monitoring."

Here

Here is what I was referring to specifically:

Rep. Issa: With a search warrant. Today every ISP is being maliciously attacked--this goes beyond the .mils and .govs--but I think that's the important reason that we approach it today. Every ISP is being attacked, maliciously both from in the United States and outside of the United States, by those who want to invade people's privacy.

But more importantly they want to take control of computers, they want to hack them, they want to steal information. This is also true of the .mils and .govs. Every one of our congressional offices, every day, is under attack. [...]

"We don't have to start a brand new revolution...All we have to do is restore the original Constitution." -Ron Paul

----

"...a nation that is afraid to let its people judge the truth and falsehood in an open market is a nation that is afraid of its people." -John F. Kennedy

Okay... the breakdown:

The first part "by those who want to invade people's privacy" is nothing new. Of course, people's privacy is made a bit more vulnerable with all of the information we exchange nowadays over the Internet. If you post something that does not go to a "secure" server such as we do here on Daily Paul, then yes someone can tap in and read the information being sent. This is why you should only send credit card numbers over secure connections. As far as private information stored on your local computer, that's a different story. That information is managed by your computer's filesystem, which is mangaged by the operating system. Most operating systems are not set up to automatically allow external access. In other words, you must be sitting at the terminal. The only way your private filesystem files can be compromised is if a program on the local system, such as a virus or spyware, gets executed or "ran" by the local system. Typically the only openings a virus has to get onto your system from the Internet is if you download an infected email attachment, or there is a security vulnerability in your browser software (Tip: use FireFox for better browsing security). Your computer can't simply be hacked because it's connected to the Internet sitting idle. It must be configured to "answer" an external request (such as Web servers do).

For the next part "But more importantly they want to take control of computers, they want to hack them, they want to steal information." The same as above applies. You must make your computer vulnerable, either unwittingly (by accepting virus, or trojan programs), or by configuring your computer to "answer" external access. It's only then that you are subject to getting hacked and file information stolen. Intranets are like the Internet, but this means the computers are all on their own isolated network. It's like having a private group conversation on an island. Nobody from outside can ever have access to that private group. So intranets can't be hacked by someone over the Internet, unless someone hooks a link from the Intranet into the Internet. Highly sensitive info like bank data should be available only on an intranet. But, yes, if a piece of malicious software did make it onto your local computer, a hacker could potentially control it remotely. In a worst case scenario, if you suspect your system has a hidden malicious program don't bother with antivirus removal junk, just reinstall your operating system. Highly important files should always be backed up and saved separately for just such an occasion.

Thanks

Excellent analysis in largely layman's terms. Could you please elaborate on this little gem: "Every one of our congressional offices, every day, is under attack." Would there be any sort of publicly documented statistics to support Issa's assertion?

"We don't have to start a brand new revolution...All we have to do is restore the original Constitution." -Ron Paul

----

"...a nation that is afraid to let its people judge the truth and falsehood in an open market is a nation that is afraid of its people." -John F. Kennedy

Sure

Any government computer system has a huge red bullseye painted on it. Computer hackers come in different shapes sizes and intents. Some do it for profit, others for the challenge and/or notoriety. For example, that's why you hear the stories about teenage kids getting busted for hacking into Defense Department, or NASA computers. They are not trying to become terrorists, it's a game, a challenge. A publicly acknowledged hack is like a trophy one can claim. If any government department is stupid enough to leave highly sensitive information vulnerable to hacking then they have no business using computers for their work. The bottom line is that if there is an opening to the outside world anywhere on the system, then that system should never be regarded as hackproof, and the value of stored data should be treated as such. Web servers that service .gov domains should only contain general public information anyway. The office of a congressional rep. should have a closed computer network, or intranet, and anyone with access to that network should be trained in the security risk of exposing the network to the Internet.

I don't know if they would document and/or make public all hack attempts they manage to find out about.

When do we start burning the books??????

Or are we just planing the modern day equivalent?

just push a button

Why burn when you can just push a button and delete whatever knowledge you don't like or think might be dangerous. Like just get rid of wikipedia and all that sort of non capitalistic, freeware, peer to peer, truth promoting avenues. No all knowledge and free speech needs to be controlled by government and corporations for a fee! Freedom of the press after all belongs to the owner of the press.

Who owns a public project.. The people do. The public owns the net it is a cooperative effort with standards publicly sugessted and cooperativly implemented to give us the web, and email, and peer to peer, and whatever else the people wish.