Google Groups no longer supports new Usenet posts or subscriptions. Historical content remains viewable.
Dismiss

Citizens strike back in intelligence war

0 views
Skip to first unread message

Chief Thracian

unread,
Oct 9, 2003, 1:22:03 PM10/9/03
to
I think alternative spiritual groups should take advantage of this
new, free service.


---begin article:

Citizens strike back in intelligence war
http://www.newscientist.com/news/news.jsp?id=ns99994246

19:00 08 October 03

With the recent demise of the Bush administration's controversial
Terrorist Information Awareness (TIA) programme to monitor
everyone in the US, citizens now have a chance to get their own
back. A website to be launched later in 2003 will allow people to
post information about the activities of government
organisations, officials and the judiciary.

[ http://opengov.media.mit.edu/ ]

The two MIT researchers behind the project face one serious
problem: how to protect themselves against legal action should
any of the postings prove false. The answer, they say, is to
borrow a technique from the underground music-swapping community.

Instead of storing the data in one place, they plan to distribute
it around the internet in a similar way to the notorious Napster
software that got music file-sharing under way. Just like TIA,
the new website, called Government Information Awareness (GIA),
is designed to collect snippets of information to build a
database that can later be searched to reveal patterns of
suspicious behaviour.

It is based on a site that Chris Csikszentmihályi and Ryan
McKinley of the Massachusetts Institute of Technology's Media
Laboratory set up in July. That site encourages members of the
public to post information about organisations, officials and
politicians, such as their business links and the source of their
campaign donations.

The original site was hosted on one of MIT's servers. But soon
after the site was launched it had to be dramatically scaled back
after being overwhelmed with traffic and because of legal
worries. The researchers do not edit the content, and became
worried that if any of the postings were malicious or untrue MIT
could be held responsible.


Peer-to-peer

They hope that following the Napster approach will get them round
this problem. Instead of storing the data on a single server,
so-called peer-to-peer networks hold data in a number of
locations around the internet, from where it can be downloaded
directly.

This strategy thwarted the music industry's attempts to sue some
of the groups that organise the swapping of digital music files.
For the relaunched site, MIT will simply provide the facilities
to post data and search for it. "It will be a sort of citizens'
intelligence agency," says Csikszentmihályi.

"It's an interesting tactic in the battle for civil liberties,"
says Lee Tien, a lawyer at the Electronic Frontier Foundation in
San Francisco. He believes the site has value, even if it appears
to be stooping to the government's level. "A lot of people do
know bits and pieces - we are handicapped in not being able to
connect them."

But whether MIT will be immune from legal action remains unclear.
Some lawyers say that as long as the organisers do not edit the
content, they cannot be held responsible for any libellous
material.

Others are more cautious. "Whoever hosts something that is
defamatory and untrue takes a risk," says Mike Godwin, technology
adviser for the public interest group Public Knowledge in
Washington DC. The researchers' strategy may minimise that risk,
he says. "Peer- to-peer is probably the best way."

Celeste Biever

---end of article

---
Lavender-Velvet Revolution
http://www.gay-bible.org/

Kevin Jones

unread,
Oct 9, 2003, 5:41:11 PM10/9/03
to
"Chief Thracian" <zekeol...@chiefthracian.mailshell.com> wrote in message
news:d46ddbb9.03100...@posting.google.com...

> I think alternative spiritual groups should take advantage of this
> new, free service.

<snip>

<chuckle!> Sounds like a good idea to me.

The older I get the more the present world reminds me of John Brunner's
"Shockwave Rider." A similar solution was proposed there.

I'm waiting to see if anyone gets round to developing a P2P program that
uses anonymous proxies as a resource. The weak point for any conventional
anonymous proxy program is always between the user and the ISP (favourite
point for eavesdropping). Conversely, the weak point for programs like
Peek-a-booty is where the P2P request goes from the last PC in the chain to
the required server. A better idea might be if proxy programs communicated
by P2P, passing the request on several hops before sending it via anonymous
proxies. Such a hybrid programme would seriously fox any attempt at
tracking, though it would need to be widespread. Just an idea.

Kevin


Kevin Jones

unread,
Oct 10, 2003, 6:56:37 PM10/10/03
to
<mic...@thelastchurch.borg> wrote in message
news:qedbov8s7i3jkfr4n...@4ax.com...
> On 9 Oct 2003 10:22:03 -0700, zekeol...@chiefthracian.mailshell.com

> (Chief Thracian) wrote:
> >The two MIT researchers behind the project face one serious
> >problem: how to protect themselves against legal action should
> >any of the postings prove false. The answer,
>
> The answer is much simpler:
> Just register it as a news paper and use the same tactics as a
> news paper. Never make a clear allegation just say "allegedly."
> Your source is then confidential and you can't be made to tell.

:-)

Kevin


Andy Baxter

unread,
Oct 11, 2003, 2:17:43 PM10/11/03
to
On Thu, 09 Oct 2003 22:41:11 +0100, Kevin Jones wrote:

> "Chief Thracian" <zekeol...@chiefthracian.mailshell.com> wrote in message
> news:d46ddbb9.03100...@posting.google.com...
>> I think alternative spiritual groups should take advantage of this
>> new, free service.
>

> I'm waiting to see if anyone gets round to developing a P2P program that
> uses anonymous proxies as a resource. The weak point for any conventional
> anonymous proxy program is always between the user and the ISP (favourite
> point for eavesdropping). Conversely, the weak point for programs like
> Peek-a-booty is where the P2P request goes from the last PC in the chain to
> the required server. A better idea might be if proxy programs communicated
> by P2P, passing the request on several hops before sending it via anonymous
> proxies. Such a hybrid programme would seriously fox any attempt at
> tracking, though it would need to be widespread. Just an idea.
>
> Kevin

see: http://anon.inf.tu-dresden.de/index_en.html

andy.

--
remove 'n-u-l-l' to email me. html mail or attachments will go in the spam
bin unless notified with [html] or [attachment] in the subject line.

0 new messages