TIP: Click on subject to list as thread! ANSI
echo: consprcy
to: All
from: Steve Asher
date: 2002-11-25 01:51:36
subject: Discarded Pentagon Plan For `eDNA`

Date sent:         Sat, 23 Nov 2002 18:25:24 -0500
To:                politech{at}politechbot.com
From:              Declan McCullagh 
Subject:           FC: NYT: Pentagon considered plan to tag Net-traffic, 
                   limit anonymity
Send reply to:     declan{at}well.com



http://www.nytimes.com/2002/11/22/politics/22TRAC.html

November 22, 2002
Agency Weighed, but Discarded, Plan Reconfiguring the Internet
By JOHN MARKOFF

The Pentagon research agency that is exploring how to create a vast 
database of electronic transactions and analyze them for potential 
terrorist activity considered but rejected another surveillance idea: 
tagging Internet data with unique personal markers to make anonymous 
use of some parts of the Internet impossible.

The idea, which was explored at a two-day workshop in California in August, 
touched off an angry private dispute among computer scientists and policy 
experts who had been brought together to assess the implications of the 
technology.

The plan, known as eDNA, called for developing a new version of the 
Internet that would include enclaves where it would be impossible to be 
anonymous while using the network. The technology would have divided the 
Internet into secure "public network highways," where a computer
user would 
have needed to be identified, and "private network alleyways," which would 
not have required identification.

Several people familiar with the eDNA discussions said such secure areas 
might have first involved government employees or law enforcement agencies, 
then been extended to security-conscious organizations like financial 
institutions, and after that been broadened even further.

A description of the eDNA proposal that was sent to the 18 workshop 
participants read in part: "We envisage that all network and client 
resources will maintain traces of user eDNA so that the user can be 
uniquely identified as having visited a Web site, having started a 
process or having sent a packet. This way, the resources and those 
who use them form a virtual `crime scene' that contains evidence 
about the identity of the users, much the same way as a real crime 
scene contains DNA traces of people."

[...]


-------------------------------------------------------------------------
POLITECH -- Declan McCullagh's politics and technology mailing list
You may redistribute this message freely if you include this notice.
To subscribe to Politech: http://www.politechbot.com/info/subscribe.html
This message is archived at http://www.politechbot.com/
Declan McCullagh's photographs are at http://www.mccullagh.org/
-------------------------------------------------------------------------
Like Politech? Make a donation here: http://www.politechbot.com/donate/
Recent CNET News.com articles: http://news.search.com/search?q=declan
-------------------------------------------------------------------------


Cheers, Steve...

--- 
(3:800/432)
* Origin: "Scientia est Potentia" / "Wissen ist Macht"
SEEN-BY: 24/903 120/544 123/500 633/260 262 267 270 284 285 690 640/954 1674
SEEN-BY: 713/615 774/605 800/1 7 432 2432/200
@PATH: 800/7 1 640/954 774/605 633/260 285

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.