The ultimate aim of eJazeera is to make even the thought of "capturing" such video non-existent, due to the commonplace practices outlined in an eJazeera-type document (or eventually tribal knowledge). Short of that, it is of course in itself desirable for such events to get onto the public 'Net.
The methods can be various, but the easiest one was (I think) described by Tim May. Bob and Alice are pre-known to each other. Bob holds a camera, Alice has a Wi-Fi enabled laptop operational in her knapsack. After Bob takes the photos/video, he transfers the images to ALice, who walks off and moves the data to a secure and public site.
Other methods seek to eliminate the need for various levels of pre-knowledge between Bob and Alice, and to also stave off the "round up" scenario where a large group is examined and cleansed of all electronica, before data can make it onto the public net. (Less likely in US now, but easily possible elsewhere).
ALso to be addressed in the document are (possibly) suggested technologies, down to the actual gadgets and manufacturers, and recommended spacial resolutions vs distances in order to record, say, badge numbers and facial features. Also, powering requirements won't hurt, as well as suggested methods for mitigating power issues.
(Hey--this might be way beyond what's needed or desirable, butI still think like an engineer).
In a reasonably just world, such images might be used in he short run to prosecute those that overstepped their legal bounds. Inthe long run, the commonplace practice of uploading such images should act as a deterrent to such overzealousness.
As it turns out, however, those POWs being transported were photographed in such a way as to not need something like eJazeera (unless the scope as I imagine it is broadened...is it worthwhile to consider the robust creation of image links etc... on the 'Net?).
-TD
From: "Major Variola (ret)" <[EMAIL PROTECTED]> To: "[EMAIL PROTECTED]" <[EMAIL PROTECTED]> Subject: Re: Photos in transport plane of prisoners: Time for eJazeera? Date: Sat, 09 Nov 2002 17:53:48 -0800At 08:32 PM 11/9/02 -0500, Tyler Durden wrote: >So I'm still playing with the idea of a publically-accessible document that >outlines the strategies, technologies, aims and requirements for somehow >uploading images and data to public repositorioes. Such a document should enumerate the threat model and describe how each threat is resisted, or not. Specific use-cases can be written: the GI who took the picture; the photo-developer-tech who kept copies; the bored netop who intercepted the pix; an activist who is under <insert type> surveillance. >Anyone interested? And what does it mean (if anything) to do this within the >context of the Cypherpunk list? Dis be da place, at least for talk :-)
_________________________________________________________________
Help STOP SPAM with the new MSN 8 and get 2 months FREE* http://join.msn.com/?page=features/junkmail
