16 January 2010 - Google China 2

< yesterday -- tomorrow >

Open by Design

Some reports say that the breakin to Google accessed the systems that automatically leak—er, funnel—er, stream—er, gush data to law enforcement with no need for search warrants. Why should we object if the information which one government takes by decree is also stolen by another legally constituted governing authority? Most of us can’t even spell “jurisdiction”. No, the real problem is that access is only granted to organizations rich enough to afford their own zero-day exploits. We demand equal rights for stalkers and cat burglars!

clue:

Under U.S. law, the date, sender, recipient, subject line, and in fact everything about an e-mail except for the message body itself, is considered “pen register” information which law enforcement is allowed to request under easy conditions. Similar rules go for other electronic communications. Large companies now receive such a huge volume of law enforcement requests that they have automated systems to respond to them. It happens without human intervention—a government-ordered security hole just waiting to be exploited.

give me a clue so sweet and true

the Daily Whale || copyright 2010, 2024 Jay J.P. Scott <jay@satirist.org>