[Raven] Comments on Draft: Take 2B

Chris Savage <chris.savage@crblaw.com> Fri, 04 February 2000 22:58 UTC

Received: from optimus.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA12299 for <raven-archive@ietf.org>; Fri, 4 Feb 2000 17:58:23 -0500 (EST)
Received: from optimus.ietf.org (localhost [127.0.0.1]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA15152; Fri, 4 Feb 2000 17:47:45 -0500 (EST)
Received: from ietf.org (odin [132.151.1.176]) by optimus.ietf.org (8.9.1a/8.9.1) with ESMTP id RAA15118 for <raven@optimus.ietf.org>; Fri, 4 Feb 2000 17:47:44 -0500 (EST)
Received: from crbexch.crblaw.com (webaccess.crblaw.com [216.88.51.71]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA12180 for <raven@ietf.org>; Fri, 4 Feb 2000 17:49:04 -0500 (EST)
Received: by webaccess.crblaw.com with Internet Mail Service (5.5.2448.0) id <12368GPH>; Fri, 4 Feb 2000 17:54:25 -0500
Message-ID: <D1A6C6C41B4CD311965D00C04F2C8D514526E6@webaccess.crblaw.com>
From: Chris Savage <chris.savage@crblaw.com>
To: "IETF Wiretapping List (E-mail)" <raven@ietf.org>
Date: Fri, 04 Feb 2000 17:54:24 -0500
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2448.0)
Content-Type: text/plain; charset="iso-8859-1"
Subject: [Raven] Comments on Draft: Take 2B
Sender: raven-admin@ietf.org
Errors-To: raven-admin@ietf.org
X-Mailman-Version: 1.0
Precedence: bulk
List-Id: Raven Discussion List <raven.ietf.org>
X-BeenThere: raven@ietf.org

Below are my comments on Section 3 of the draft.

3. A definition of wiretapping

. . .

[[[Replace this:]]]

Wiretapping is what occurs when information passed across the Internet from
one party to one or more other parties is delivered to a third party:

[[[With this:]]]

Wiretapping occurs when information passed across the Internet from one
party (or group) to one or more other parties is delivered to a third party:

[[[Replace this:]]]

1.	Without the sending party knowing about the third party

[[[With this:]]]

1.	Without the sending party (or group) knowing about the third party

[[[Replace this:]]]

3.	When the normal expectation of the sender is that his information
will only be seen by the recipient parties or parties obliged to keep the
information in confidence

[[[With this:]]]

3.	When the normal expectation of the sending party (or group) is that
the transmitted information will only be seen by the recipient parties or
parties obliged to keep the information in confidence

[[[Replace this:]]]

4.	When the third party acts deliberately to target the transmission of
the first party, either because he is of interest, or because the second
party's reception is of interest.

[[[With this:]]]

4.	When the third party acts deliberately to target the transmission of
the first party (or group), either because he is (or they are) of interest,
or because the second party's reception is of interest.

. . .

[[[Replace this:]]]

Thus, for instance, monitoring public newsgroups is not wiretapping
(condition 3 violated), random monitoring is not wiretapping (condition 4
violated), a recipient passing on private email is not wiretapping
(condition 2 violated). 

[[[With this:]]]

Thus, for instance, monitoring public newsgroups is not wiretapping
(condition 3 violated), random monitoring is not wiretapping (condition 4
violated), a recipient passing on private email is not wiretapping
(condition 2 violated).

[[[The following might be construed to be a substantive change but is
intended to clarify things.

[[[Replace this:]]]

Telephone call tracing by means of accounting logs (sometimes called "pen
registers") is also wiretapping by this definition, since the normal
expectation of the sender is that the telephone company will keep this
information in confidence.

[[[With this:]]]

The definition above is limited to Internet transmissions and so does not
apply to traditional circuit-switched telephone calls.  By analogy, however,
telephone call tracing by means of accounting logs (sometimes called "pen
registers") would also be wiretapping, since the normal expectation of the
sender is that the telephone company will keep this information in
confidence.  For this reason, in the Internet context, random monitoring of
network traffic may become (or at least facilitate) wiretapping if records
of the monitored traffic are kept and are then reviewed to identify the
transmissions of particular sending parties or groups.


. . .

[[[Replace this:]]]

Wiretap is also sometimes called "interception", but that term is also used
in a sense that is considerably wider than the monitoring of data crossing
networks, and is therefore not used here.

[[[With this (only change is first word):]]]

Wiretapping is also sometimes called "interception", but that term is also
used in a sense that is considerably wider than the monitoring of data
crossing networks, and is therefore not used here.


Chris S.
All views/opinions my own...


*************************************************************************** 
This electronic mail transmission may contain confidential or 
privileged information.  If you believe that you have received the 
message in error, please notify the sender by reply transmission 
and delete the message without copying or disclosing it. 
***************************************************************************

_______________________________________________
raven mailing list
raven@ietf.org
http://www.ietf.org/mailman/listinfo/raven