Feitelijke contekst bescherming grondrechten.

Arie Dirkzwager aried at XS4ALL.NL
Thu May 27 15:18:19 CEST 1999


(excuses voor cross-posting - is enige manier om zoveel mogelijk
geinteresseerden/betrokkenen te bereiken)
Lijstgenoten,
        Deze forward lijkt mij ook voor politiek van/in Nederland van belang.
Bovendien zou ik graag jullie mening hebben om mijn positie in de werkgroep
grondrechten van he ISOC (i.v.m. herziening Grondwet) beter te kunnen
bepalen. Bij voorbaat dank voor reacties - op deze lijst of
mailto:aried at xs4all.nl
        Ik schreef naar de werkgroep:
Beste mede-werkgroepleden,
        Wellicht vinden jullie het volgende geforward bericht "off-topic" maar ik
denk dat het in het kader van de tot nu toe gevoerde discussie relevant is
om bij ons werk met beide benen op de grond te blijven zodat we een goede
bijdrage kunnen leveren. Juist in verband met het praktisch
oncontroleerbare wereld-wijde Internet is het van belang te weten wat er
internationaal en op Europees niveau gaande is. Hoe formuleren we in onze
grondwet de grondrechten van burgers en civile organisaties en de
toegelaten methoden om deze in Nederland te handhaven waarbij we mogen
verwachten dat ook onze Europarlementariers hun (internationale) politiek
door onze grondwet mede laten bepalen: het is, meen ik, een stuk van onze
nationale identiteit.

Arie

>Delivered-To: aried
>Date: Thu, 27 May 1999 04:37:42 -0500
>From: Richard Hornbeck <hornbeck at primenet.com>
>Subject: U.S. Uses Key Escrow To Steal Secrets
>To: "gilc-plan at gilc.org" <gilc-plan at gilc.org>
>Reply-To: gilc-plan at gilc.org
>
>FYI - Intersting article.
>
>'The report offered evidence that a leading U.S. Internet and
>telecommunications company had contracted with the NSA to develop
>software to capture Internet data of interest, and that deals had been
>struck with Microsoft, Lotus, and Netscape to alter their products for
>foreign use.'
>
>=======
>
>Technology News
>
>Report: U.S. Uses Key Escrow To Steal Secrets (05/18/99, 9:27 a.m. ET)
>By Madeleine Acey, TechWeb
>
>European plans for controlling encryption software are nothing to do
>with law enforcement and everything to do with U.S. industrial
>espionage, according to a report released by the European Parliament on
>Friday.
>
>The working document for the Scientific and Technological Options
>Assessment panel said the United States has tried to persuade European
>Union countries to adopt its key escrow or key recovery policies --
>allowing backdoor access to encryption programs -- saying this was
>necessary to read messages exchanged by criminals.
>
>But the report details how the UKUSA alliance -- made up of the United
>Kingdom, United States, Canada, Australia, and New Zealand -- has used
>its secret Echelon global spying network to intercept confidential
>company communications and give them to favored competitors. Thomson
>S.A., located in Paris, and Airbus Industrie, based in Blagnac Cedex,
>France, are said to have lost contracts as a result of information
>passed to rivals.
>
> "The U.S. government misled states in the EU and [Organization for
>Economic Cooperation and Development] about the true intention of its
>policy," the report adds.
>
> "Between 1993 and 1997 police representatives were not involved in the
>NSA [National Security Agency]-led policy-making process for key
>recovery. Despite this, during the same period the U.S. government
>repeatedly presented its policy as being motivated by the stated needs
>of law-enforcement agencies."
>
> The document went on to detail how the agencies specifically studied
>Internet data. Apart from scanning all international communications
>lines -- using 120 satellites, microwave listening stations, and an
>adapted submarine -- it said they stored and analyzed Usenet
>discussions. "In the U.K., the Defence Evaluation and Research Agency
>maintains a 1-terabyte database containing the previous 90 days of
>Usenet messages."
>
> The "NSA employs computer 'bots' (robots) to collect data of interest,"
>the report adds. "For example, a New York website known as JYA.COM
>offers extensive information on cryptography and government
>communications interception activities. Records of access to the site
>show that every morning it is visited by a bot from NSA's National
>Computer Security Center, which looks for new files and makes copies of
>any that it finds."
>
> According to a former employee, NSA had by 1995 installed "sniffer"
>software to collect traffic at nine major Internet exchange points.
>
> The report offered evidence that a leading U.S. Internet and
>telecommunications company had contracted with the NSA to develop
>software to capture Internet data of interest, and that deals had been
>struck with Microsoft, Lotus, and Netscape to alter their products for
>foreign use.
>
> "There can't be any doubt any longer that there's an economic
>imperative to these policies," said Simon Davies, director of Privacy
>International. "We have been lied to for years. But it will be up to
>companies like Airbus to take legal action to force a definition of
>national security in the context of the European Union. Then we can
>establish a legal framework and appeals process."
>
> Meanwhile, the Financial Times reported on Monday that the U.K.
>government had agreed to take key escrow "off the agenda" and had
>accepted industry proposals for a "largely voluntary program of
>co-operation with the security services".
>
> Government officials could not confirm the report.
>
> But Caspar Bowden, director of the Foundation for Information Policy
>Research, questioned how far any compromise would go. "Will they persist
>with statutory licensing [of trusted third parties]and criminal
>legislation on decryption warrants?" he asked.
>
> Andrew Dornan of Data Communications International contributed to this
>report.
>
>
>
For discussions on political issues in the Netherlands join the PNYX,
http://www.db.nl/pnyx (language Dutch, all citizens and members of
parliament are represented there independent of their membership of any
political party).

 ===========================================================================
  Accept that some days you are the statue, and some days you are the bird.
 ===========================================================================
  To-day is to-morrow's "yesterday": build good memories and all evil will
be past.
 ===========================================================================
  Look for eternal life - it is at hand and within reach.
 ===========================================================================



More information about the D66 mailing list