22 August 2000
Date: Mon, 21 Aug 2000 22:25:11 -0800
To: jya@pipeline.com
From: SD
You guys are still covering Carnivore but ignoring the way our local ISP, GCI, in Alaska, is getting around the whole issue. By simply recording EVERYTHING they can fall under an exception in the federal statutes that says they can turn over any information collected "incidentally" - thus they are giving all packet traffic to the FBI. Of course the FBI then does the filtering or targeting of individuals but without the requirement of a search warrant. nice and tidy for them.
There is a big story here! Do you have the interest and guts to cover it??
Cryptome welcomes information for publication here on how ISPs are providing information or cooperating with federal and local officials to gain access to private communications, notwithstanding the ISPs' public privacy policies.
For example:
A recent federal case in Brooklyn, New York, reportedly heard testimony from AOL representatives that it had a firm privacy policy of never disclosing private communications without a court order, but that the legal department regularly reported to law enforcement agencies instances of what it believed to be illegal activity by AOL customers.
The way it works is that there are informants in various AOL forums who complain to AOL about objectionable activity, then AOL is obliged to investigate and perhaps report to the law enforcement its findings. AOL can honestly state it does not monitor is users, but must investigate customer complaints. Some, maybe all, of the informants are self-appointed vigilantes or law enforcement agents posing as AOL customers. Law enforcement agents can honestly state they are not illegally surveilling without court order, merely complaining to AOL about objectionable behavior as customers. What is not clear is whether the objectionable acitivity was instigated and promoted by the informants and undercover feds.
That is the procedure allegedly followed by Exodus some months back, and may indicate a widespead complicity among ISPs' legal and customer service departments and law enforcement to get around the ECPA.
Cryptome is attempting to get from its ISP, NTT/Verio/Digital Nation, information on such unpublished "supplemental" methods and arrangements. See: http://cryptome.org/verio-ntt-vpp.htm
Send to: jya@pipeline.com
If needed, John Young's public key:
-----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGPfreeware 5.5.3i for non-commercial use <http://www.pgpi.com> mQGiBDmZkSERBADe/jKsU2Nl5Aoyf8tmGY1SVJA2iEyYxpY0iWpnL2h9py7C7p4R HOmQ9KQUaMleyljMaDL8AtF8+PQ93pfHx9FRVTJJ748sC5b7N/RpkdTcxCIZUKRM 0TD2wxQrqaG2U6d6mmJKNtNMflVgbtKZBqhcOTsMaL0gHYTv5RUdtr2myQCg/x+H GG5X+a6t4U6r3t0/paRAzCED/1TCwxQ71vO9iXw3DkjS/p9c/p1OpZTDrT4vkz8p veOp5hfTS/a0DS9nvCPq/kzvNFe2WTytPRSLuTtk8E/6EhYo038Z6JiPqML4MiWy nCTrzEJlSyGXObyWDiteIu0vN4b7f1EhB1hTyZmp8saTXqrL1jQNv8Aex7duVEBD ktamA/9KzFzVUtZcjoa/m7v/fGAm5yol3KbZxJiwTobg7RY3A2XtqlRsaifHwPgB od01ToGmtjvlsrXu/bfKeBLaC2WMYftXk/blYE4ZFnC+J8PCK7A9azviwpTqKY9M twFBDIbSgG/RbbDnllkLQv6Q3NCynhJS0tACf944RAKcEB2m4bQdSm9obiBZb3Vu ZyA8anlhQHBpcGVsaW5lLmNvbT6JAEsEEBECAAsFAjmZkSEECwMCAQAKCRA8FVNu j+wfjgBYAKCNDk5K7uwlTEZ8jPv8cgwFWWfrMQCg0jQJsL1y/pgqxiebAIsk+6fR bv65Ag0EOZmRIhAIAPZCV7cIfwgXcqK61qlC8wXo+VMROU+28W65Szgg2gGnVqMU 6Y9AVfPQB8bLQ6mUrfdMZIZJ+AyDvWXpF9Sh01D49Vlf3HZSTz09jdvOmeFXklnN /biudE/F/Ha8g8VHMGHOfMlm/xX5u/2RXscBqtNbno2gpXI61Brwv0YAWCvl9Ij9 WE5J280gtJ3kkQc2azNsOA1FHQ98iLMcfFstjvbzySPAQ/ClWxiNjrtVjLhdONM0 /XwXV0OjHRhs3jMhLLUq/zzhsSlAGBGNfISnCnLWhsQDGcgHKXrKlQzZlp+r0ApQ mwJG0wg9ZqRdQZ+cfL2JSyIZJrqrol7DVekyCzsAAgIIAIM2afVmmy9AmfMAZ5Gw mCxSE3kV08B+aRR7FNpLlu7z+CAp5EXcsLMLwjyVfRnHlC/0B7krWgLYgfaluJ2I /O/4MYeG+5KIUvhZzocFWm8g9QRkhp97jb7ohVfcOmOcD1LJ/fo0/UYv8sDEFYAu fc9ENjJz1A3Fmuuhs3UznTVUXMRw/V+w8b7taK3w/tU+sN5yuKI4jvBJM9/NwQTR LPnEg4vzv7/8vDBeJguMWbsqNhCXaiGWfYA1QuZipocq1Dw3fhbGBJ/ZF1SPMJvN 8rQa2lGGwFg+A0c80nTNEGHN7QLdEq9WtBXHtiybgboK643lTG4pqyFH2UOCCkan fXCJAEYEGBECAAYFAjmZkSIACgkQPBVTbo/sH46aggCfVF7KvLYa9+uMYhD+a8y2 d5p0HJsAnRrL2BC8xUpWYPFCK3yU/BU8YgLW =0BKy -----END PGP PUBLIC KEY BLOCK-----