click here:
about faith.
new(s).
features.
friends.
work.
Recent Features include:
  • Facing Prison for Protesting
  • Confounding Carnivore: How to Protect Your Online Privacy
  • Recycled Christmas: One Family's Revolution Against the Shopping Mall

  • Contributed by: Lisa Wilkinson
    At: Fri, 7 Dec 2001 10:29:58 -0500

    Facing prison for protesting
    By Nicole Colson, from Socialist Worker
    December 7, 2001

    "OUR GOAL is for the people involved to serve jail time." That's what Hartford, Conn., prosecutor Jeff Lee declared last week --as he sought 10-year prison terms for two student antiwar protesters. "We suspect the defense might try to reach a plea, but we have every intention of taking this case to trial," he sneered.

    The incredible charges stem from an October 25 antiwar demonstration of more than 200 activists. Although the march was peaceful, police claim that a few protesters strayed from the sidewalk--and used this as an excuse to attack.

    "Halfway through the march, some cop cars started showing up and driving alongside of us," Jason Capell, one of those arrested, told Socialist Worker. Then police began using batons and pepper spray on demonstrators.

    A 61-year-old protester had his ribs broken. Another man was forced onto the ground, pepper sprayed and beaten by police until his head was bloody.

    "A police officer stepped in front of me--full riot gear, with his baton up in front of him," said Capell. "He asked me where I was going, and I just told him that I was walking down the sidewalk. And he said, 'No you're not.'

    "As soon as I asked him where I could go, he put handcuffs on me and started walking me towards the police van. And my charges are inciting a riot, interfering with police conduct and disorderly conduct."

    In all, 18 demonstrators were arrested and taken to jail on similar charges. In a clear effort to discourage protest, bail was set ridiculously high, at between $15,000 and $50,000.

    According to Capell, police specifically targeted leaders of the demonstration. "A lot of us were asked numerous times, 'Who are the leaders?'" he said.

    "It appears that this came down from the higher-ups, whether it be the mayor or the chief of police, to nail us with high charges. Because that sends a message out to people. They're trying to scare people from speaking out against this war and what's going on."

    Capell said that it was important for antiwar activists to continue speaking out. "It's definitely scared a lot of other people," he said. "It's a really important time for people to be very vocal and open about where they stand on these issues."

    Donations to the legal defense fund for the Hartford 18 can be sent to: Free Speech and Legal Defense Fund, 13 Farview Ave., Danbury, CT 06810.


    Contributed by: Doug Medina
    At: Fri, 30 Nov 2001 16:26:04 +0000

    Confounding Carnivore: How to Protect Your Online Privacy
    By Omar J. Pahati, AlterNet
    November 29, 2001

    Ever since the FBI confirmed the existence of their Internet wiretapping device -- a device they named Carnivore -- cyberprivacy activists have been up in arms. Carnivore promised to be their worst nightmare: a technology that could track and record every email sent, every Web page browsed, every chat room visited.

    Today, those fears are more likely to come true than ever before. The passage of anti-terrorism laws in the wake of Sept. 11, and the extended powers of the FBI, CIA and police agencies everywhere, make it likely that Carnivore will see more use in the near future. Congress has been quite willing to trade some privacy for security, and the Bush Administration -- especially Attorney General John Ashcroft -- has been no defender of online privacy. With Constitutional protections being chipped away, what can civil liberties-minded citizens do to maintain their privacy online?

    Though the technology behind the mysterious Carnivore box (officially renamed DCS1000 in early 2001, though that name hasn't stuck) has been portrayed as quite sophisticated, it's actually very simple. When attached to server computers at an Internet service provider (ISP), the device records the details of all traffic coming through that ISP. It can snatch email headers and content, and keep a history of Web pages accessed. This data can then be saved onto disk and admitted as evidence in court.

    Similar devices have long been used in private enterprise, allowing cautious business administrators to monitor the Internet activity of employees. In network security circles, these devices are referred to as "sniffers."

    As common as this technology is, its potential uses give security specialists great power to track electronic communications. Sniffers can produce a list of Web sites visited so that ISPs can block access to sites deemed questionable or subversive. Carnivore can also keep track of whom you send email to and who sends you email, shedding light on the company you keep and potentially tying you to activities you know nothing about. Aside from these scary scenarios, the mere fact that someone is watching is disconcerting.

    But before you panic about the government tracking those flirty emails you sent to a co-worker last year, consider that the FBI is reported to have used Carnivore only 13 times between October 1999 and August 2000 (the latest figures available). That's not very much, given the enormous amount of Web traffic. So the chances that Carnivore has been watching you are incredibly low -- you're much more likely to have been sniffed by your employer.

    Nevertheless, with the passage of the USA Patriot Act, Carnivore's use is very likely to increase. In addition to committing unprecedented resources to security, the new law drops some of the checks and balances once required for getting permission to eavesdrop. Futhermore, rumors that Osama bin Laden has used encrypted messages, images, and Web sites to communicate with the global Al Qaeda network, and fears that unknown terrorists are using the Web as a tool, has upped Carnivore's value in law enforcement's eyes. The FBI has even begun to enhance Carnivore, effectively broadening its net and fortifying its encroachment into once private sectors of cyberspace.

    Cyber-libertarians determined to maintain anonymity have already found ways to circumvent Carnivore's watchful eyes. Most of the methods were developed by hackers to cover their tracks when engaging in questionable, sometimes illegal activity. But these techniques work just as well for the law-abiding citizen who wishes to uphold the right to privacy. And thankfully, you don't have to be a hacker to use these tools effectively.

    Controversial, but legal, encryption software has been publicly available for years. Encryption allows users to maintain a high level of secrecy when sending email or files over the Internet.

    The most storied of encryption tools is a free program called PGP. PGP stands for Pretty Good Privacy, but it's a whole lot more than just pretty good. PGP is "strong crypto," geek speak for encryption that is nearly impossible to break. PGP is so strong that after releasing PGP to the public in 1991, Philip Zimmermann, the program's creator, drew immediate attention from federal prosecutors intent on preventing its distribution.

    Zimmermann says, "PGP empowers people to take their privacy into their own hands. There has been a growing social need for it. That's why I wrote it."

    And that's why governments are so afraid of it. As a result, Zimmermann became the target of a three-year criminal investigation that questioned the legality of exporting PGP to users in other nations. But by 1996, the investigation had produced no evidence of wrongdoing and PGP had become the most widely used encryption program in the world.

    A few versions later, PGP is stronger in popularity and security. PGP works by scrambling the data such that only the recipient can descramble it. Even the sender cannot descramble the data because only the recipient has the descramble key.

    Part of the reason behind PGP's strength is thorough peer review. The original programming source code for PGP is publicly viewable for anyone and everyone to scrutinize. The openness allows engineers to point out flaws, back doors or any other kind of weakness.

    By using PGP to encrypt transmissions, one can ensure with high confidence that only the person intended to see its contents actually has access to it. Even if someone intercepts the transmission it would be completely unreadable unless that person has the decryption key. This would not prevent Carnivore from biting email off the network, but it will prevent prying federal agents from reading your private communications.

    "You may be planning a political campaign, discussing your taxes, or having an illicit affair," says Zimmermann. "Whatever it is, you don't want your private electronic mail or confidential documents read by anyone else."

    Zimmermann acknowledges that PGP could be used to conceal illegal activity but believes the right to privacy supercedes this concern.

    A warning: Encryption is illegal in many countries. It is also illegal to export encryption tools from the U.S. without authorization. So you're best using PGP only in the United States or checking your local laws before using PGP.

    PGP Freeware will get your messages across the Net safely, but it cannot stop Carnivore from watching what Web sites you are viewing. Most people surf from Web site to Web site not knowing that every click they make can be recorded not just by the government, but by more than one monitoring system. Your ISP, your ISP's ISP, and every Web site has a record of where Web traffic comes from and where it goes. Even if Carnivore is not watching you, federal agents can subpoena ISP logs to track you down. Whether you're merely looking at NYTimes.com or AlterNet.org or one of Osama bin Laden's alleged porn-fronted Al Qaeda Web sites, you are being watched.

    There are several ways to keep your surfing habits hidden. Most involve placing a computer on your network between you and the Internet. This computer is called a proxy. Proxies work by taking your request for a Web page, getting the page from the Internet and then passing it on to you. With a proxy installed, the Internet knows the proxy is there, but doesn't know who is behind the proxy. While proxies are common in corporate networks, average home users don't have this luxury, unless they have the economic resources and technical know-how to set one up.

    However, in the last few years, services have been created to provide Web surfers with a virtual proxy. In this case, instead of setting up a proxy on your own network, you connect to a virtual proxy over the Internet. One that works very well is Anonymizer.com. The Web service effectively allows users to surf anonymously without additional hardware or software.

    You connect to Anonymizer with your Internet browser, tell it what site you want to see and it takes you there anonymously. If Carnivore is watching you, it will know that you are connected to Anonymizer, but not where Anonymizer has taken you. If the Web site you visit is recording your vital signs (your computer address, operating system, browser type, and the page you last visited), all it sees is the Anonymizer server.

    Singapore, Vietnam, Iran, Algeria, Yemen, Bahrain, the United Arab Emirates, Saudi Arabia and China have banned sites like Anonymizer. Each country has attempted to block citizens' access to such services; testament to the technology's ability to keep government eyes from peeking into private activity.

    Another way that people are surfing anonymously is by using someone else's network proxy. Hackers often do this surreptitiously, hacking into a private network and hiding behind its proxy. While this is effective, it may not be completely legal. You should only use someone else's proxy with their expressed permission. Also, not all proxies will be effective anonymizers out of the box, so it is best to coordinate the setup with the proxy's rightful administrator.

    CyberArmy, a network of tech savvy privacy activists, has a list of known proxies scattered about the globe (www.cyberarmy.com/lists/proxy/). If you are able to obtain permission to use one of these proxy computers, go to your Web browser preferences and enter the proxy address under "Proxies." You will need to enter both the address and the port number. If possible, set the proxy method to "Tunnel" -- which creates a secure connection between you and the proxy. All current Web browsers in any operating system, from Netscape and Internet Explorer to Opera and Mozilla, have this functionality built in. With those settings in place you can surf the Web anonymously just as you would with your own in-house proxy.

    In addition to their proxy list, CyberArmy has a lot of information about Internet privacy. A lot of it is geared toward hacker-types but one useful tool for everyone is the Environment Check ( http://www.cyberarmy.com/cgi/whoami.pl). This page will tell you just what kind of information you are broadcasting to the world when you surf the Web. Information culled by the Environment Check includes what kind of computer you have, the version and type of browser you use, the Web address of your ISP and your computer's network address. Try Environment Check with a proxy and then without a proxy to see anonymity in action.

    For the less tech-experienced activist, PGP and proxies may not be the best way to fight Carnivore. Organizations like StopCarnivore, ACLU and Electronic Frontier Foundation are good places to start for finding a grassroots solution to a digital problem.

    StopCarnivore.org has been leading the charge to de-fang the device and the over-zealous legislators pushing its use on innocent Americans. The organization's founder Lance Brown says, "It may be a generation or two before the stifling effect of Carnivore manifests itself in ways that can be measured. By that time, America will have been able to spread its use around the globe."

    Brown's Web site offers ways to get in touch with lawmakers and law enforcement agencies to express concern over Carnivore. The site also lists ways to find out if Carnivore is tapping your ISP.

    Privacy activists say that as a matter of patriotism and democracy, everyone must fight to protect privacy. As Zimmerman says, "If we do nothing, new technologies will give the government new automatic surveillance capabilities that Stalin could never have dreamed of."


    Contributed by: Doug Medina
    At: Fri, 23 Nov 2001 16:38:53 +0000

    Recycled Christmas: One Family's Revolution Against the Shopping Mall
    by Brian Smith, AlterNet
    November 21, 2001

    Sitting around the dinner table out at the farm last Thanksgiving, the subject of what to do about Christmas came up. How would we organize a family gathering now that we kids are grown and scattered across the state? Whose house would we use? How would we deal with the whole gift-giving thing?

    Everyone seemed completely unenthusiastic about engaging in another orgy of shopping and crowds and waste. There was the sense of duty: to tradition, to the nation. TV newscasters claimed that the very health of the US economy depended upon our generous holiday spending. Christmas consumerism is patriotic. Don't think about it too much, just shut up and shop.

    After confessing distaste for the entire affair, one rebel relative proposed we just bag the whole holiday. The lobbying for this option was fierce and convincing. And for an agnostic family, ignoring Christmas altogether seemed like a perfectly viable option.

    Though we really enjoyed coming together for a mid-winter celebration, the very thought of shopping ruined Christmas. Wasn't there another option? Didn't we have the right to reclaim the holiday and create our own family tradition?

    After an hour of discussion, and a few more glasses of wine, we arrived at a solution: Recycled Christmas.

    And it turned out to be the best Christmas since I was a child.

    Here is how it works. Everyone is invited to give presents to anyone else, but these rules must be followed: you can only give a gift that has been previously owned, nothing new; you can make a present, a painting, a song, a poem, or whatever; you can give away something you already own; you can purchase your gift at a second-hand store or garage sale; and all gifts should be wrapped in newspaper. (Sunday comics if you want to get fancy.) That's it. Simple.

    Well, not exactly.

    As it turns out, giving the perfect Recycled Christmas present is a much more personal experience than just going to the mall with a credit card. When you give a present from a garage sale, or from your attic, you must understand and care about the person on the receiving end. Another tie for dad or bath soap set for auntie just won't do. You really have to think about your loved ones and who they are as people.

    My mother found some used photo albums for each of us kids and filled them with pictures from our childhoods. She had written personal memories next to each picture. I was in tears seeing photos that had lingered in shoeboxes and drawers for twenty years.

    I gave my intellectual cousin one of my favorite novels that she instantly curled up with and read by the fire until she fell asleep.

    My father received a big plastic lawn-goose, with a light bulb inside. It was the perfect gift for a man who had discovered his love for raising birds on the farm in his 50s. He giggled with delight as he turned it on and placed it proudly on the mantel.

    My aunt gave my girlfriend her favorite cookbook, with the best recipes clearly marked by gravy stains -- a subtle hint to make sure I was eating right.

    My brother and I baked loaves of beer bread and handed them out to family members still warm and wrapped in tinfoil.

    The gift giving went late into the night because each person told a story about what they were thinking when they chose the gift. We laughed and felt like a family again. We participated in the holiday on our own terms. The advantages of Recycled Christmas became apparent quickly.

    We all saved a ton of money. We had a lot more fun. We never even stepped foot in a mall or felt the crush of the holiday traffic. We contributed nothing to the local landfill. And best of all, we knew the presents we gave and received had all come from the heart.