[Raven] Comments on Draft: Take 2B
Chris Savage <chris.savage@crblaw.com> Fri, 04 February 2000 22:58 UTC
Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA12299 for <raven-archive@ietf.org>; Fri, 4 Feb 2000 17:58:23 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA15152; Fri, 4 Feb 2000 17:47:45 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA15118 for <raven@optimus.ietf.org>; Fri, 4 Feb 2000 17:47:44 -0500 (EST)
Received: from crbexch.crblaw.com (webaccess.crblaw.com [216.88.51.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA12180 for <raven@ietf.org>; Fri, 4 Feb 2000 17:49:04 -0500 (EST)
Received: by webaccess.crblaw.com with Internet Mail Service (5.5.2448.0) id <12368GPH>; Fri, 4 Feb 2000 17:54:25 -0500
Message-ID: <D1A6C6C41B4CD311965D00C04F2C8D514526E6@webaccess.crblaw.com>
From: Chris Savage <chris.savage@crblaw.com>
To: "IETF Wiretapping List (E-mail)" <raven@ietf.org>
Date: Fri, 04 Feb 2000 17:54:24 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2448.0)
Content-Type: text/plain; charset="iso-8859-1"
Subject: [Raven] Comments on Draft: Take 2B
Sender: raven-admin@ietf.org
Errors-To: raven-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id: Raven Discussion List <raven.ietf.org>
X-BeenThere: raven@ietf.org
Below are my comments on Section 3 of the draft. 3. A definition of wiretapping . . . [[[Replace this:]]] Wiretapping is what occurs when information passed across the Internet from one party to one or more other parties is delivered to a third party: [[[With this:]]] Wiretapping occurs when information passed across the Internet from one party (or group) to one or more other parties is delivered to a third party: [[[Replace this:]]] 1. Without the sending party knowing about the third party [[[With this:]]] 1. Without the sending party (or group) knowing about the third party [[[Replace this:]]] 3. When the normal expectation of the sender is that his information will only be seen by the recipient parties or parties obliged to keep the information in confidence [[[With this:]]] 3. When the normal expectation of the sending party (or group) is that the transmitted information will only be seen by the recipient parties or parties obliged to keep the information in confidence [[[Replace this:]]] 4. When the third party acts deliberately to target the transmission of the first party, either because he is of interest, or because the second party's reception is of interest. [[[With this:]]] 4. When the third party acts deliberately to target the transmission of the first party (or group), either because he is (or they are) of interest, or because the second party's reception is of interest. . . . [[[Replace this:]]] Thus, for instance, monitoring public newsgroups is not wiretapping (condition 3 violated), random monitoring is not wiretapping (condition 4 violated), a recipient passing on private email is not wiretapping (condition 2 violated). [[[With this:]]] Thus, for instance, monitoring public newsgroups is not wiretapping (condition 3 violated), random monitoring is not wiretapping (condition 4 violated), a recipient passing on private email is not wiretapping (condition 2 violated). [[[The following might be construed to be a substantive change but is intended to clarify things. [[[Replace this:]]] Telephone call tracing by means of accounting logs (sometimes called "pen registers") is also wiretapping by this definition, since the normal expectation of the sender is that the telephone company will keep this information in confidence. [[[With this:]]] The definition above is limited to Internet transmissions and so does not apply to traditional circuit-switched telephone calls. By analogy, however, telephone call tracing by means of accounting logs (sometimes called "pen registers") would also be wiretapping, since the normal expectation of the sender is that the telephone company will keep this information in confidence. For this reason, in the Internet context, random monitoring of network traffic may become (or at least facilitate) wiretapping if records of the monitored traffic are kept and are then reviewed to identify the transmissions of particular sending parties or groups. . . . [[[Replace this:]]] Wiretap is also sometimes called "interception", but that term is also used in a sense that is considerably wider than the monitoring of data crossing networks, and is therefore not used here. [[[With this (only change is first word):]]] Wiretapping is also sometimes called "interception", but that term is also used in a sense that is considerably wider than the monitoring of data crossing networks, and is therefore not used here. Chris S. All views/opinions my own... *************************************************************************** This electronic mail transmission may contain confidential or privileged information. If you believe that you have received the message in error, please notify the sender by reply transmission and delete the message without copying or disclosing it. *************************************************************************** _______________________________________________ raven mailing list raven@ietf.org http://www.ietf.org/mailman/listinfo/raven
- [Raven] Comments on Draft: Take 2B Chris Savage