RE: layered deception

2001-05-03 Thread Bill Stewart
At 07:45 AM 05/02/2001 -0700, David Honig wrote: >Yeah but is there a (contract etc.) *law* being broken or is this a >legally-null claim? After all, if click-through EULAs are legally binding... Maybe a real lawyer could tell you. The answer may depend on whether there's valuable consideration

Re: layered deception

2001-05-03 Thread Eric Murray
On Wed, May 02, 2001 at 07:56:34PM -0700, Sandy Sandfort wrote: > Eric Murray wrote: > > > ...I most definitely agree with Tim > > and Bill that the best way to deal > > with this is [keeping logs] thru > > technology. > > Careful, you're beginning to sound like a Cypherpunk. :-D Careful with

re: layered deception (timestamping logs)

2001-05-03 Thread David Honig
At 10:12 PM 5/2/01 -0700, Anonymous wrote: > >Seems to me that secure digital timestamps on the logs >would be really interesting to anyone wanting to preserve >their usefulness as evidence. > If you protected some logs (say, local user logins) really well, and left other logs (say HTTP) unprote

RE: layered deception

2001-05-03 Thread David Honig
At 11:36 AM 5/2/01 -0700, Greg Broiles wrote: >In any scenario, it seems like a few points are likely to be crucial - > >1. Was the logging foreseeable at the time the statement/promise >regarding "no logging" was made? >If there was no intentional misrepresention, pretty much everything exc

Re: layered deception (timestamping logs)

2001-05-03 Thread Tim May
At 9:20 AM -0500 5/3/01, Harmon Seaver wrote: >Tim May wrote: > >> The asymmetry arises this way: almost _never_ does an ISP/operator > >> benefit from having logs, but prosecutors can use logs to prove various >> crimes and thoughtcrimes. >> > > Well, that's not quite true -- logs are pr

Re: layered deception (timestamping logs)

2001-05-03 Thread Harmon Seaver
Tim May wrote: > The asymmetry arises this way: almost _never_ does an ISP/operator > benefit from having logs, but prosecutors can use logs to prove various > crimes and thoughtcrimes. > Well, that's not quite true -- logs are pretty useful, in fact even necessary, for a number of things

Re: layered deception (timestamping logs)

2001-05-02 Thread Tim May
On Wednesday, May 2, 2001, at 10:12 PM, Anonymous wrote: > At 11:00 PM 05/01/2001 -0500, Harmon Seaver wrote: >> Has anyone given any though to how log files could be accepted as >> evidence in the first place? They're just text files, and exceedingly >> trivial to alter, forge, erase, what

re: layered deception (timestamping logs)

2001-05-02 Thread Anonymous
At 11:00 PM 05/01/2001 -0500, Harmon Seaver wrote: > Has anyone given any though to how log files could be accepted as >evidence in the first place? They're just text files, and exceedingly >trivial to alter, forge, erase, whatever. They get edited all the time >by hackers -- how can anyone,

RE: layered deception

2001-05-02 Thread Sandy Sandfort
Eric Murray wrote: > ...I most definitely agree with Tim > and Bill that the best way to deal > with this is [keeping logs] thru > technology. Careful, you're beginning to sound like a Cypherpunk. :-D S a n d y

Re: layered deception

2001-05-02 Thread Bill Stewart
At 11:00 PM 05/01/2001 -0500, Harmon Seaver wrote: > Has anyone given any though to how log files could be accepted as >evidence in the first place? They're just text files, and exceedingly >trivial to alter, forge, erase, whatever. They get edited all the time >by hackers -- how can anyone,

Re: layered deception

2001-05-02 Thread Greg Broiles
At 12:34 AM 5/2/2001 -0500, Harmon Seaver wrote: >Greg Broiles wrote: > > > Hmm. Can you identify any problems with log files as evidence which aren't > > also present in, say, eyewitness testimony, audiotape recordings, video > > recordings, fingerprints, photographs, tool & die marks, paper reco

RE: layered deception

2001-05-02 Thread David Honig
At 08:05 PM 5/1/01 -0500, Aimee Farr wrote: >Honig: > >> Is it in fact a crime of fraud to advertise that you don't keep logs >> when in fact you do? > >Seems deceptive... Yeah but is there a (contract etc.) *law* being broken or is this a legally-null claim? After all, if click-through EULAs ar

Re: layered deception

2001-05-02 Thread Tim May
On Wednesday, May 2, 2001, at 07:45 AM, David Honig wrote: > At 08:05 PM 5/1/01 -0500, Aimee Farr wrote: >> For >> example, while there is no 'requirement' or 'reg' to keep email, >> American >> courts have '$trongly $ugge$ted' doing so pursuant to a good faith >> electronic document retention p

Re: layered deception

2001-05-01 Thread Harmon Seaver
Greg Broiles wrote: > Hmm. Can you identify any problems with log files as evidence which aren't > also present in, say, eyewitness testimony, audiotape recordings, video > recordings, fingerprints, photographs, tool & die marks, paper records, and > all of the other evidence which courts admit o

Re: layered deception

2001-05-01 Thread Greg Broiles
At 11:00 PM 5/1/2001 -0500, Harmon Seaver wrote: > Has anyone given any though to how log files could be accepted as >evidence in the first place? They're just text files, and exceedingly >trivial to alter, forge, erase, whatever. They get edited all the time >by hackers -- how can anyone,

Re: layered deception

2001-05-01 Thread Jon Beets
lt;[EMAIL PROTECTED]> Sent: Tuesday, May 01, 2001 10:03 PM Subject: RE: layered deception > On Tue, 1 May 2001, David Honig wrote: > > >Is it in fact a crime of fraud to advertise that you don't keep logs > >when in fact you do? > > If someone winds up losing money (or

Re: layered deception

2001-05-01 Thread Harmon Seaver
Has anyone given any though to how log files could be accepted as evidence in the first place? They're just text files, and exceedingly trivial to alter, forge, erase, whatever. They get edited all the time by hackers -- how can anyone, even the sysadmin, swear that they are "true"? We just

RE: layered deception

2001-05-01 Thread Ray Dillinger
On Tue, 1 May 2001, David Honig wrote: >Is it in fact a crime of fraud to advertise that you don't keep logs >when in fact you do? If someone winds up losing money (or suffering other damages) because of it, it is at least a tort. If you were planning some kind of money-making scam that hinge

RE: layered deception

2001-05-01 Thread Aimee Farr
Tim: > On Tuesday, May 1, 2001, at 06:05 PM, Aimee Farr wrote: > > > Honig: > > > >> Is it in fact a crime of fraud to advertise that you don't keep logs > >> when in fact you do? > > > > Seems deceptive... > > > > A profound new insight. deceptive trade practices depend on context > We still a

RE: layered deception

2001-05-01 Thread David Honig
At 12:13 AM 4/30/01 -0400, Phillip H. Zakas wrote: >i agree...unless you're specifically directed to do so, maintaining log >files is completely optional. Is it in fact a crime of fraud to advertise that you don't keep logs when in fact you do?

Re: layered deception

2001-05-01 Thread Tim May
On Tuesday, May 1, 2001, at 06:05 PM, Aimee Farr wrote: > Honig: > >> Is it in fact a crime of fraud to advertise that you don't keep logs >> when in fact you do? > > Seems deceptive... > A profound new insight. We still await some real insights from a real graduate student (!), beyond her say

RE: layered deception

2001-05-01 Thread Aimee Farr
Honig: > Is it in fact a crime of fraud to advertise that you don't keep logs > when in fact you do? Seems deceptive... I look for the continued development of tortious evidentiary spoliation in a digital context, which includes negative legal presumptions, sanctions up to default judgmen

Re: layered deception

2001-04-30 Thread Declan McCullagh
Steve, Even assuming that what you say is true, and I suspect it is, you'd be relying on protections enshrined in the law. The purpose of this treaty, of course, is to change the law. :) -Declan On Mon, Apr 30, 2001 at 10:07:33AM -0700, Steve Schear wrote: > At 10:56 AM 4/30/2001 -0400, Declan

Re: layered deception

2001-04-30 Thread Steve Schear
At 10:56 AM 4/30/2001 -0400, Declan McCullagh wrote: >On Sun, Apr 29, 2001 at 11:24:09PM -0700, Steve Schear wrote: > > What if the sysadmin is intentionally located in an offshore location so > > that they cannot be kept from notifying all users of the logging order? > >Then we pass a "cybercrim

Re: layered deception

2001-04-30 Thread Declan McCullagh
On Sun, Apr 29, 2001 at 11:24:09PM -0700, Steve Schear wrote: > What if the sysadmin is intentionally located in an offshore location so > that they cannot be kept from notifying all users of the logging order? Then we pass a "cybercrime" treaty to require them to follow U.S. laws. Law enforcem

Re: layered deception

2001-04-29 Thread Steve Schear
At 12:04 AM 4/30/2001 -0500, Kevin L Prigge wrote: >On Mon, Apr 30, 2001 at 12:13:01AM -0400, Phillip H. Zakas wrote: > > i agree...unless you're specifically directed to do so, maintaining log > > files is completely optional. there are no regs requiring isps or websites > > or mail providers to

RE: layered deception

2001-04-29 Thread Sandy Sandfort
Kevin wrote: > It's a written notice... >From whom? Hell, I could send you a "notice." > ...that a search warrant is being > prepared. The ECPA allows for orders > to preserve electronic evidence > (section 2704 deals with this). All that 2704 (http://www.usiia.org/legis/ecpa.html#s2704) spea

Re: layered deception

2001-04-29 Thread Tim May
On Sunday, April 29, 2001, at 10:59 PM, Kevin L Prigge wrote: > On Sun, Apr 29, 2001 at 10:11:40PM -0700, Sandy Sandfort wrote: >> Kevin wrote: >> >>> From recent experience, LE provides us >>> with an order to preserve certain logged >>> information. The order is in advance of >>> obtaining a s

Re: layered deception

2001-04-29 Thread Kevin L Prigge
On Sun, Apr 29, 2001 at 10:11:40PM -0700, Sandy Sandfort wrote: > Kevin wrote: > > > From recent experience, LE provides us > > with an order to preserve certain logged > > information. The order is in advance of > > obtaining a search warrant... > > What form do these "orders" take? Who, spec

RE: layered deception

2001-04-29 Thread Sandy Sandfort
Kevin wrote: > From recent experience, LE provides us > with an order to preserve certain logged > information. The order is in advance of > obtaining a search warrant... What form do these "orders" take? Who, specifically, makes the order? What authority is cited to back up the power to make

Re: layered deception

2001-04-29 Thread Kevin L Prigge
On Mon, Apr 30, 2001 at 12:13:01AM -0400, Phillip H. Zakas wrote: > i agree...unless you're specifically directed to do so, maintaining log > files is completely optional. there are no regs requiring isps or websites > or mail providers to do so, other than the standard 'you need to comply with >

RE: layered deception

2001-04-29 Thread Phillip H. Zakas
i agree...unless you're specifically directed to do so, maintaining log files is completely optional. there are no regs requiring isps or websites or mail providers to do so, other than the standard 'you need to comply with a court order or search warrant, etc.' as for the 'encrypt it' or 'store

Re: layered deception

2001-04-29 Thread Tim May
On Sunday, April 29, 2001, at 07:41 PM, Declan McCullagh wrote: > I think Matt is a bit too quick to conclude a court will charge the > operator with contempt and that the contempt charge will stick on > appeal. Obviously judges have a lot of discretion, but it doesn't seem > to me like the qu

RE: layered deception

2001-04-28 Thread Sandy Sandfort
Declan wrote: > I rather like the idea of encrypting > the logs on the fly and shipping them > offshore. Your offshore partner will > be instructed to turn over the logs > only if you are not asking for them > under duress. (A reasonable protocol > can probably be worked out. Would a > court orde