Dr. Lauren Weinstein, internet pioneer and privacy expert, dissects the web’s vulnerabilities—50% of emails now spam, zombie computers fueling fraud, and VeriSign’s 2003 .com meltdown crippling global systems. He warns of unchecked corporate/government power in "walled gardens," RFID tracking risks (even in pets), and brain fingerprinting’s flawed accuracy, while rejecting 9/11 conspiracy claims as "reprehensible." Callers share harrowing cases: a coworker’s $1,500 identity theft, a Nigerian scam victim losing $400K, and ISPs sabotaging security. Weinstein stresses outdated laws and global threats like spyware outpace solutions, urging balance between oversight and freedom to prevent systemic collapse. [Automatically generated summary]
Al-Qaeda is claiming a U.S. claiming an honest remember Al-Qaeda was warning U.S. citizens were going to be killed and that Saudi citizens and others should stay away from anybody while they're doing it.
Suspected militants killed an American in the Saudi capital on Saturday, shooting him in the back grave, huh?
As he parked at his home garage.
And the U.S. Embassy said it was searching for an American who is listed as missing.
A purported al-Qaeda statement posted on an Islamic website late Saturday did claim the terror group had killed one American, kidnapped another in Riyadh.
It threatened to treat the captive U.S. rather treat their captive as U.S. troops treated Iraqi prisoners in Iraq.
Senator John Edwards, the smooth-talking populist who emerged from the nominating campaign as John Kerry's chief rival, is now his chief favored, probable vice presidential running mate.
You know, he had considered John McCain, and oh, that would have been quite a ticket, huh?
I really like, oh, I have liked for a very long time John McCain, and that would have made a very interesting ticket.
And polling showed, by the way, that McCain ticket with Kerry would have been about 15% ahead of the president or so.
But it looks like next best choice is going to be Edwards.
In the bloodiest fighting this year in Afghanistan, U.S. Marines killed more than 80 insurgents in a three-week offensive against a Taliban stronghold in the mountains of southern Afghanistan.
U.S. military insisted the battle was a victory that will help secure fall elections rather than a sign of the resilience of Taliban-led militants.
Toughening its stance in advance of a meeting of the UN Nuclear Watchdog Agency, Iran on Saturday said it would reject international restrictions, any of them at all, on its nuclear program and challenged the world to accept Iran as a member now of the nuclear club.
There's something to think about a little bit.
Iran as a full nuclear nation.
The internationally built Cassini spacecraft completed a flyby of Saturn's largest outer moon as it prepared to enter a four-year orbit to study the ringed planets at NASA on Saturday.
The plutonium-powered spacecraft, which is carrying 12 science instruments and a probe, came within about 1,285 miles of the dark moon on Friday.
So we've got it out there.
I wonder if any of you, and I know for a lot of you, this will have been a long time ago, saw the series Taken because I received a million emails saying, hey, Art, that was you in an RV at the end.
Well, I never watched Taken.
Instead, my wife and I obtained it on DVD and watched it commercial-free, all 20 hours of it, and finished just yesterday.
And I must tell you, and if you think back, I'm sure you'll recall, that young lady, that Dakota Fanning, who played the little girl in Taken, was incredible.
She was absolutely incredible.
And she did the, of course, that was her voice, you know, doing the narration during the series as well.
And she was so good that she was, I really don't have the right words to describe the way she played that part.
It was surreal.
That anybody that age, and she's, what, nine or so, I guess, when she did take it, it was just beyond all reason that there would be a young lady with that sort of ability to read and act and have on her face the exact correct expression at the correct moment.
There was nothing no fake moments, no moments when you went, oh, come on, or any of the rest of it with respect to what she did in that series.
It was absolutely amazing.
So better late than never, but I did get C taken, which I thought was incredibly Spielberg's taken, which was incredibly well done.
And Dakota Fanning, I don't even know what to say about her.
I've only seen two what you would regard as UFOs in my entire life.
One, the very large black triangle, a story of which I've told many times.
Second one, in both cases, my wife was with me, thank goodness.
Second one was on this property, just simply looking up, watching a jet and the contrail Behind it, suddenly seeing a silvery object, a saucer, it was a saucer, in the contrail behind this airplane, which then moved above and finally took off like a bat out of hell to the western horizon.
And we stood in my driveway and watched that.
I received a bit of a video footage from Mark, Mark O. We'll call him, on May 14th.
Well, actually, just a couple days ago, but it occurred May 14th in Sonora, California.
It shows what he caught on camera, which I showed to Ramona, and she said, yep, that's what we saw.
It didn't act exactly the same way.
Ours more or less stayed within the contrail, moved aside from it a little bit, and then took off to the west and was gone.
But what he's captured, what Mark has captured on video here is very, very reminiscent of exactly what we saw.
Didn't act quite the same way physically.
Other than that, certainly what we saw, it's a saucer, and it's good video footage, and it's on the website right now.
So I invite you to go to coastam.com and play the video footage that Mark caught.
Same thing we saw.
Just about exactly the same thing.
So that was the second sighting I've had in my life.
Now, while you're up there at the website, you might also want to go by my webcam.
In the upper left-hand corner of the website, you'll see Arts webcam.
Click on that.
This is from Chuck in Orlando, Florida, and it says, Hey, Art, the webcam photo you have up, an aerial view of your property, leads me to ask, are you building a small harp?
Yeah, I guess I am, Chuck.
This is sort of an interesting story, of course, and Chuck refers here to a photograph of my antenna, which is indeed up there right now, and of my property.
And that antenna that you see covers five acres in total, five acres, and it is remarkable in every sense of the word, remarkable.
I built this antenna, which was quite a very serious undertaking, after reading a book about W6AM.
It was called W6AM Amateur Radio's Pioneer.
And he built very large rhombic antennas and put two wires on them and claimed that it gave additional gain.
That's a very long time ago, right after, well, virtually in years following SparkGap, you know, at the very beginning of radio.
And he made some claims in his book that were remarkable about using two wires.
And so I thought, why not apply the technology to a very large loop, which is what I did.
And it has been most anomalous.
I must tell you, we've been testing this antenna for some time now, and it does much more than I ever asked or imagined that it would.
As you know, there are about now an excess of 300 anomalous volts, which I have carefully shunted to ground, which there are many theories about what it's doing there.
It's been measured on a cloudless, stormless, windless, blue sky day.
It's still there when there are power failures in the area, disabling the grid, so you would have imagined any coupling.
It's still there because we had power failure, and I ran out and measured the voltage, and sure enough, there it was.
So it's a fairly remarkable thing that I've built, it would seem.
And I did take a photograph of it, had a good friend come over in a helicopter, and he took me up.
And it's really the only way to capture the size.
And as for the scale, as I just told you, it takes up about five acres of ground.
And what it does is really, really incredible.
And so it would seem that in the very early days of radio, those days following the old spark gap transmitters, they may have known a lot more than they know today in some ways.
In other words, I'm suggesting there was technology developed that has been virtually forgotten with the advent of directional antennas and beams.
A lot of these very large array antennas have been virtually forgotten.
And so I must tell you that building something of this scale and magnitude has been illuminating, would be the right word, in a lot of ways.
I've got an email here from I've got, of course, a lot of things I want to cover with you.
From L. H. Davis asking me my opinion on the Burrish thing.
And I refer, of course, to somebody called Dan Burrish, I believe it is, who was allegedly a microbiologist or something, a whistleblower, somebody who was going to tell all.
And, you know, this thing went flying around the internet like there was no tomorrow.
And so I did some investigation on my own, and it was kind of vapor.
I guess there is a Mr. Burrish, and I guess Linda did talk to him.
But somebody asked me a week or two ago what I thought of it from a credibility point of view, and my answer is not much.
That's what I said then, and that's what I still think now after hearing what I heard last night on the radio.
I still think there is nothing to it.
But you never know, and I could certainly be wrong.
I followed the trail as best I could, and I talked to a lot of people who used pseudonames on the Internet and frankly were kind of strange.
The whole story just did not gel for me, and so I never went forward with it.
Now, there may be something to it, and there may turn out to be something To it, but I don't know.
I would join George, who I heard last night suggest Mr. Bursch be solicited to take a lie detector test.
Now, this is interesting.
This comes from the following comes from Whitley Streeber's unknowncountry.com A Bob White kept a secret for many years.
He says, I'm a 73-year-old.
I don't have much longer.
This is the most difficult thing I've ever done in my life.
He's showing the world an artifact he claims fell off a UFO in 1985.
Steve Rock writes in the Kansas City Star that White keeps the artifact locked up in a small building that he calls the Museum of the Unexplained.
White says, I've been called every name you can think of.
What I'd like to see before I'm gone is the national media get their heads out of the sand.
I'd like to see the national media and everybody else realize that what I have is real.
Once it happens, White says, it's something you'll never forget.
What I saw was not one of this earth.
He didn't believe in the existence of UFOs before 1985.
In fact, I was the biggest skeptic in the world, he said, but he and a friend were driving from Denver to Las Vegas on a lonely highway at about 2 or 3 a.m., White asleep in the passenger seat, when his friend woke him up and pointed to a strange light in the sky, which eventually became so bright that it almost blinded them.
White got out of the car to look at it, says the object was only about 100 yards in front of him.
It was huge, absolutely huge.
That's a quote.
Eventually, it zoomed quickly up into the sky where it merged with what looked like a cigar-shaped UFO, and then the larger ship disappeared.
Now, as the craft flew away, White saw an orange light falling to the ground.
It was red hot, but when it cooled, he picked it up and kept it secret for about ten years.
I didn't want anybody to call me a UFO nut, said he.
I was afraid it might hurt my career.
The object is about seven and one-half inches long and shaped like a teardrop.
It's metallic.
It weighs less than two pounds.
White had it tested and discovered it's made mostly of aluminum.
He removes the object from the museum display and puts it in a gun case at the end of every day.
It never spends the night at the same place any two nights in a row.
In 1996, NIDS, you know NIDS, right?
Sent a sample of it to the New Mexico Institute of Mining and Technology.
The analysis was pretty mundane, said a NIDS spokesperson.
We didn't find any evidence that it was extraterrestrial, but we also couldn't identify it.
White has twice now passed polygraph tests about the encounter and the artifact.
Captain George Larby, who conducted the first polygraph test in 1990, says, I believe he found an object that fell from the sky.
There was no reason for me to believe he was intentionally fabricating any aspect of this story.
White says, I don't know what I've got to do to prove this is the truth.
You can't make this stuff up.
Well, you could, I guess.
But I believe him.
And you can imagine there are many people out there who probably have things that they could tell us.
And they're probably approaching their golden years, and perhaps they would like to talk.
Well, I would love to hear anybody, what anybody has to say on that score.
And a lot of us who are now getting toward the end of our lives, the last, you know, the twilight years, I don't know what Frank Sinatra would say, the fall of it all.
If you have something of that magnitude that has been a burden to you all your life, I can imagine you might want to get it off your chest.
So by all means, if you have something like that, get hold of me.
It's easy.
Artbell at AOL.com or Art Bell at mindspring.com.
Either one will work just fine.
And this email, this last weekend, you mentioned that it was strange that in other countries, if people see UFOs, they report them to the military.
And we don't do that here in the United States.
I know why.
Well, he's right.
I did say that.
In other countries, like South America, for example, a bunch of Europe, people will call the military if there's a UFO.
Here in the U.S., no.
And there is a good reason why.
A Carlene writes, there's no number.
So you'd have to guess which agency are they listed in your local phone book, which one of their many offices and so forth?
Chances are you'd get a lower-level clerk, maybe an enlisted person who wouldn't know what to do with the phone call.
Wasn't included in their training.
So they'd leave a message for someone who'd probably think the whole thing was a joke.
But we do have our local law enforcement that do get such calls.
I think a lot of people used to call their local radio stations.
But that's become a joke with all the mergers.
I tried to call a local station about something big happening in the San Diego area.
It just kept getting told the news department wasn't in.
Or the phone line doesn't even get answered.
So that's a pretty good point, isn't it?
There's really nobody in the military that you can call.
Really?
No one.
I have made or tried to make such calls in the past.
And I had a little bit of luck, but not a lot.
And generally, you don't get past the night duty officer or somebody like that.
So we don't.
In this country, civilians don't really communicate directly with their military, Do they?
Anymore.
There may have been a day in America where that was once routinely done, and if you had a question that would seem to bear on something the military might know about, you could call them.
But a good point is made here.
Who would you call now?
There is no real office to report unidentified flying objects.
Officially, there's not even anybody investigating them.
As a matter of fact, all of that ended with Project Blue Book.
If you believe that, I've got a river that you might want to consider purchasing.
Of course, they're investigating, but there's no public admission of this, nor is there any agency that you can pick up a telephone and call.
As you would with a crime, if you thought it was interstate, you'd call the FBI, right?
A federal crime?
Or a local crime?
But where do you report a UFO?
You can't.
There is really nowhere.
There's Peter Davenport, of course.
The UFO reporting center, NIDS, perhaps.
And that's fine.
Thank goodness we've got at least that.
But none of it is even remotely official, even though NIDS, of course, has people that can go out and investigate such claims when they are backed up by something physical, for example.
That certainly tempts them.
But nobody in the military, you can't pick up the phone and say, would you give me the military's UFO investigation number, please?
They're not going to give you that number because there is no such thing.
All right.
We're going to do open lines in the half hour coming up.
So you're going to want to listen very carefully for the numbers coming up.
They are a little different on the weekend.
Open lines means anything at all you want to talk about, whatever it may be.
We're that close, and it's coming up.
unidentified
We're that close.
Be it silent, sand, smell, or touch, the something inside that we need so much.
The sight of a touch or the scent of a sand, or the strength of an oak when roots deep in the ground.
The wonder of flowers to be covered and then to burst up through tarmac to the sun again.
Or to fly to the sun without burning a wing.
To lie in the meadow and hear the grass sing, to have all these things in our memories hoar and the useless warmth of the city.
Right past your soul, take this place On this trip, just go me Run, take a free roll Take my place, have my seat It's for free Want to take a ride?
To talk with Art Bell, call the wildcard line at area code 775-727-1295.
The first-time caller line is area code 775-727-1222.
To talk with Art Bell from east of the Rockies, call toll-free 800-825-5033.
From west to the Rockies, call 800-618-8255.
International callers may reach ART by calling your in-country sprint access number, pressing option 5, and dialing toll-free 800-893-0903.
From coast to coast and worldwide on the internet, this is Coast to Coast AM with Art Bell.
I was just sitting here watching this video of myself from Mark, the one with the disc in the tail of the jet, the contrail.
And I was thinking, how strange that we've reached a point in this country where a talk show host, me in this case, can sit here presenting you with a video of this, and it's almost mundane.
I mean, this is a flying saucer.
It's in the contrail of a commercial aircraft, and it's doing things and making movements that no aircraft could make.
And it's almost, well, not quite, but almost mundane that I show you this video.
And there's no number in the military to call.
They don't investigate things like this.
Come on.
This is a silvery disk flying in the sky, no doubt with a radar cross-section behind an aircraft captured on videotape.
I saw one just like it.
And our military doesn't look at stuff like that.
There's no number you can call.
Our military doesn't investigate those things anymore.
Kenny D. All right, Kenny D. From the Fantastic Forum.
All right, so what's up?
unidentified
Well, recently, well, I shouldn't say recently, like, for probably about a year or so, I've been contemplating whether ascension's possible for humans.
It answers the age-old question of what did Howard Dean do before he went into politics?
But I've got two things.
First off, comment on Dan Burrish.
I think until we get the polygraph tests, like two or three of them, and they've been independently confirmed, we've got to take this with a whole lot of salt simply because of the fact that he is alive and he's telling this story.
The media is pretty much, by a gigantic margin, leftist, in my opinion.
There's no question about it.
But to imagine that they would ignore and not do a story of that magnitude, that's a little hard to believe.
unidentified
Well, I can tell you about two weeks ago I heard a story on the news, just one story where the Republicans were coming out and going, they basically said the Republicans have contended they have proof that George Buss clearly won the state of New Mexico.
Heard one story and they never heard anything again.
I don't know.
It just makes me wonder if we're getting any truth at all.
We had received a signal that some number of us were hearing on 1,420 megahertz, which is a hydrogen frequency.
And that got a little stir going at SETI.
And that's what you're referring to.
unidentified
Yes, and early on, astronomers were concerned that the iridium satellite, which has frequencies near that in L-band, might have intermodulation products that could interfere with this frequency.
This Mr. Dan Burrish affair, this whole idea of a secret PhD doesn't pass the smell test.
People do secret work at universities, and the report, the work product, may be classified, but the DOD can't classify anything that doesn't belong to them.
And besides, it would be very impractical because if you or I got a PhD that nobody else knew about, we'd be indentured to the DOD, and we could never move anyplace else because no one would recognize our credentials.
And unfortunately, I've just caught up with you in the last five or six months or so.
But I wanted to ask your opinion about BPL.
If you think that that's part and parcel of this shadow government, if that's an extension or a cousin, I call it, of HAARP, the so-called Skybuster AKA.
I think it is a disaster and that it will screw up the shortwave bans all across the entire country.
Do I think it has anything to do with the new world order or the shadow government or whatever?
No, not necessarily.
I think this has to do with a bunch of people who see an easy, fast way to make money.
That's all.
There are existing power lines, and if they can carry the Internet over these power lines into every single home where every single wall socket will have the Internet integrated with the electrical service, I think there are many reasons that we should be examining this and looking very carefully before we proceed, as the Federal Communications Commission now is inclined to do, blindly, I might add, just proceed.
There are privacy issues to be addressed.
There are interference issues to be addressed.
There's a lot of things that need to be done, and ruining the ability of Americans to get shortwave on a 24-7 basis is insane.
So until we know that it will not produce so much interference as to render all the HF frequencies useless, we should not proceed at all.
But they are.
And what do I think is behind it?
I think money is behind it.
People who want lots and lots of money.
However, let me say one more time.
With regard to this whole secret shadow government, I don't know.
There may be dark forces that work behind the scene.
I'm not so foolish that I would say that doesn't occur, because it does, because people are secretive.
People do make deals with each other, and all kinds of things go on, but I just don't buy into all of this ridiculous, asinine, that's what I said, asinine, propensity of late for some people to be suggesting that the United States destroyed its own buildings in New York,
destroyed a portion of the Pentagon with airplanes, that the United States was in any way whatsoever complicit with those who knocked down those buildings and killed so many Americans.
I think it's reprehensible that these kinds of things are spread around without any proof.
Oh, I know.
You can always say, well, then, you know, I didn't see the right wreckage here or there, or jets could have gotten there, or whatever it is people are saying.
But they're making these horrendous allegations without a shred, not a shred of proof.
And that bothers me because this is my country, too.
You know?
And I just don't happen to believe that our elected officials would choose to kill by thousands their own citizens.
I may believe a lot of things, but that's not one of them.
unidentified
I may believe a lot of things, but that's not one of them.
Can you hear my heartbeat in this corner?
You can run, but...
*music*
*music*
To talk with Art Bell, call the wildcard line at area code 775-727-1295.
The first-time caller line is area code 775-727-1222.
To talk with Art Bell from east of the Rockies, call toll-free at 800-825-5033.
From west of the Rockies, call 800-618-8255.
International callers may reach Art by calling your in-country sprint access number, pressing option 5, and dialing toll-free 800-893-0903.
From coast to coast and worldwide on the internet, this is Coast to Coast AM with Art Bell.
People for Internet responsibility, I'm not laughing, of course, at those people because that's what they want, but the level of irresponsibility being exhibited now on the Internet is astounding, Lauren.
My understanding of the origin of the Internet was that it was created by scientists basically to be able to communicate or to have a communications network that was so much like a spider web that you literally couldn't knock it out, for example, in a nuclear conflict or something of that scale, that there would be this interwoven communications capability that would be so widespread with so many points that you simply couldn't knock it out.
Yeah, that in fact was one of the key issues behind the driving of the original network, which was the ARPANET, that was brought from the Advanced Research Projects Agency, which is a division of the Department of Defense.
The same ARPA, in fact, that was behind the Total Information Awareness Project, which was very controversial recently.
Basically, what they have done all these years, all these decades, is invest in speculative technology, things that may not pay off, they may pay off, maybe they'll go nowhere, maybe they'll invent a super weapon.
The ARPANET was in that category of systems to allow government entities, researchers, other people that had to be able to communicate to continue doing so, even if there was a nuclear war in theory.
In some respects, it's almost been too successful because I think what we've got now is a system where spam will continue even in the event of a nuclear war.
If somehow, after a nuclear conflict, you managed to get a computer up and running and connected to some kind of Internet, there'd probably be something that would come through and say, we've got this pill.
We're laughing about it, and in a way, it's the only way to deal with it.
But the really sad thing is that those kinds of messages and these kinds of problems are literally bringing the Internet down.
I mean, the percentage of traffic now on the net, and this costs us all because we all have to pay for the infrastructure for all of this, is just astounding.
And unless it's dealt with through major changes fairly soon, there's just not going to be anything left.
It picked my last name out, I guess, and assigned it so that it was specifically targeted spam, which is a little higher quality than the normal.
But they actually used my last name.
Some poor guy named Bell had died in Nigeria, leaving however many millions, and I was the only living relative.
So that was a particularly creative one.
But what I've wondered, Lauren, is whether these companies that sell the pills or any of the rest of this baloney that comes through actually makes anybody any money?
Well, first of all, you have to realize that there are different Categories of spam.
A lot of spam exists only to sell systems for sending spam.
So it's the snake eating its own tail.
There's no real product there.
So there's a certain category of those messages where there's really no product.
It all exists for just to sell people software, to do other spamming.
A lot of things going on are what are called phishing now, where people try to get you to put in your credit card number, or they claim your PayPal account has expired.
Please put your account data in here again.
There's those kinds of frauds.
Then there are the things where the product actually exists.
I mean, there's actually a pill, which probably, as we know, does nothing.
There's people selling illegal cable filters, things like that, that also tend to do nothing.
Do people get rich on it?
Yeah, there seem to be a few top-level people who become very, very wealthy at this.
These are the ones that we hear about occasionally being arrested and being sued for $50 million and all these kinds of things.
At the lower levels, it's not clear that people really make money.
But that's sort of usually.
It's basically a pyramid scheme when you come down to it.
And the pyramid's so broad at the bottom that all of us are inundated with the results.
Yeah, well, I mean, the attitude that the people take is that even if a fraction of 1% of recipients will bite on these things, if you send out enough of them and you saturate the universe with them enough, just that little percentage is going to add up.
And that's where the money comes from.
Now, the 419 scams, the Nigeria stuff you were talking about, that's kind of interesting because unlike most spams you see, most of the 419s have actual live human beings behind them.
Oh, it is illegal, and they do try to act on it, but these people move around very rapidly.
And in fact, there are people out there on the network who have made a career out of responding to these things and playing along with them and trying to activate it.
And then there's even a darker side, personally, for example, of the Internet.
I'm going to tell you a little story.
Somebody, I mean, you can be a dog on the Internet is the old phrase.
Well, I've had a couple dogs go after me.
Somebody wrote several years ago, Lauren, they wrote an article, ostensibly by me.
My name was assigned to this article, which trashed the Filipino race.
I mean, it was a racist piece of garbage.
It was horrible.
And it was sent from the campus of UCSD, which, by the way, apologized for the fact that it came from their campus.
And it was sent round the world.
Well, I got all these threatening things.
How dare you threaten my race?
I mean, my God, my own wife is Filipino.
Part Filipino anyway, half Filipino.
But nevertheless, it didn't make any difference.
In fact, you have no idea how bad it got.
For example, it was picked up and published by a newspaper in Manila, in the Philippines, who decided to publish it without ever having called me to find out if it might be real or false, without doing any investigation whatsoever.
They had to print a retraction.
I think it ran, damn thing ran for about six or seven weeks.
And of course, I threatened to sue them and all kinds of things.
But they picked it up off the internet, giving it reality by printing it in the largest newspaper in Manila.
And every now and then, about every year or two, this thing then goes around again.
But this was done as an act of, well, I don't know, some sort of vengeance against me for some God knows what reason, but it was done, and I've had to answer those things for years now.
And no matter how many times you say it ain't so, it goes around, around the world on the Internet, Lauren.
Nothing stops it.
And so there you have it.
One act by one person faking something, and away you go.
You've hit what is probably one of the top three issues on the Internet today, and I'm constantly caught in the middle on this one because of competing interests on both sides.
What you're talking about is what we call largely authentication and identification, which is trying to decide to what extent email and other postings on the Internet should or can be tracked to a given individual and what the implications of that are for free speech,
for anonymous speech, whistleblowers, political speech, other kinds of protected speech, versus on the other side, people who want to commit fraud, libel, things like that.
A very, very complicated area.
And at this point, what makes it even worse is that the legal structure that we're dealing with, I mean, let's not even worry about the technology for a moment.
The technology of doing this is hard enough and is a big, big problem right now that's being worked on.
I have a project now under PFER, which is called Tripoli, which is aimed at dealing with some of this.
And it's going to take years to implement it if it's accepted.
But the legal system is the other part of this, because you have a patchwork of laws at the state level, at the federal level, and then the Internet, of course, is international.
So you have different countries with different domestic laws, many of which are in conflict in all of these issues.
So even if you have a way of saying, well, I'm going to deal with this a certain way in countries A, B, and C, you have the other countries that do it differently, and mail could just as easily be relaying through those.
In the case, a case in point, in this story about this Filipino fraud letter, I mean, somebody just walked into a computer at UCSD at a library and sent this.
Now, it was able to be tracked back to the library's computers, but it could have been anybody sitting there.
It's very difficult because you do have these competing interests.
I mean, it's possible to postulate a highly controlled Internet where you couldn't touch it without some form of authentication.
That isn't to say, however, that there wouldn't be ways around that because authentication is only as good as the underlying ID mechanisms.
And as you know, there's tremendous fraud in IDs and driver's licenses, social security, all that stuff.
So just having authentication at the Internet level doesn't deal with it.
But if you take this to its logical conclusion in terms of really plugging up all the holes, it's pretty hard to do that without creating what amounts to a police state.
So the Balancing Act is very, very delicate, and I don't think any of us really know how to do that balance correctly yet.
And this is just one of the ongoing issues of the time.
This is Coach Jose, and we're talking about a fact of modern life, and that is the internet.
And I know so far it sounds like I'm kind of down on it, but actually the exact opposite is true.
And so we'll get to that part of it.
But I do want to know about internet and responsibility.
We'll ask more about that in just a moment.
Music Lauren Weinstein is my guest, and he's got a website, of course, at www.vortex.com.
That's V-O-R-T-E-X.com, where you can learn a whole lot more about what we're discussing.
Lauren, the question was with regard to civil laws and the Internet, can somebody go and publish an article about somebody else, clearly slanderous or whatever, in a newsgroup read by many, many people, which is the rough equivalent of publishing, and will that person or not be held responsible for what they write if it's liable?
Because we were talking about that mishmash of domestic laws and international law, there were treaties that are involved in some of these issues also.
It becomes a situation that is very case by case, depending on the country, depending on the person, depending on the courts, all these kinds of things.
So it's hard to know.
Now, you mentioned earlier how do you even figure out who really did these things in a lot of cases?
And I want to give you an example of something that's going on right now.
There's a big controversy over the data that controls who owns domains.
Make it harder to find out who owns a domain, where their address is, their phone number, things like that.
And the reason this has happened is because a lot of that information has been abused.
Spammers have gotten hold of it.
Stalkers have gotten hold of it in some cases.
As ordinary people have gotten domains, not just big companies, they've been putting their home addresses into these things because there's required to be accurate data.
So there's a lot of controversy.
And of course, there are people on the other side of this.
Think of the RIAA, for example, who want to stop file traders of music, who want to be able to track down very quickly who's doing what.
So at this very moment, there are actually comments being received by the controlling organizations, or at least the influencing organizations, because no one really controls the Internet, as to how this is going to be handled.
Now, this is all happening below the radar for most people using the Net, but the impact on the sorts of things you're talking about could be vast, affecting real lives.
So these kinds of decisions aren't out there in the public where most people even know that they're being thought about, which is an unfortunate situation.
Now, having said all these negative things about the Internet, and there are more to be said, I should add, I've been a very, very, very early user of the Internet, and I, very early on, recognized its relevance, for example, to the radio program that I'm doing.
If I have a guest on, even before the Internet came along, I had a bulletin board service in which listeners could dial in and get information on the night's guest or leave messages or what have you.
It was very early use.
And then when the Internet came along, I was one of the, I think, the first actually to stream video.
For example, I would sit here and just let a camera watch me while I did the entire program.
And I don't know.
I did that for a couple of years and then invented the Fast Blast that we now use on this program.
And I've had a sort of interactive relationship between the radio program and the Internet now for years.
And it has been wondrous.
I mean, it is absolutely wonderful.
Beyond that, Lauren, I own, I think, 15 computers.
I'm not sure.
I've got about 15 for a lot of different purposes.
I live out in the Sticks here, not too far from Area 51 in the desert.
And so I do most of my shopping on the Internet, Lauren.
The Internet's damn well very important to me.
And you're suggesting the Internet could go down in flames.
You know, it's very important to remember, as you're doing now, The good side of this, because the Internet is, when you come right down to it, a tool, right?
Kids are growing up now who will never have known a world where you couldn't get the answer to almost any question a couple of seconds away at a screen sitting in their bedroom.
But like any other tool, like a hammer, you can use a hammer to build a house.
You can use a hammer to crack someone's skull.
It's the user that controls what the tool is used for.
And that's the same thing with the Internet.
The meltdown that we're talking about mainly has to do with all these corruptions that are occurring of the net.
And by corruptions, I mean both technical problems, spam, viruses, worms, all these kinds of things, and control problems, governance problems, the issue of who makes the rules for the Internet, who makes sure it's reliable, who makes sure it's secure, that you're not being spied on, that your privacy isn't being invaded.
You know how you can go to your C drive, Lauren, and you can look at basically the contents of your computer, the various directories you have, and then down below that, of course, is the operating system files.
And the other day I was looking at one of my computers, and I noticed that I have more megabytes of patches than I do operating system.
And to keep up on all the current patches for all the current viruses, you do end up with more files that are patches to fix problems and holes and security problems than you do operating system itself.
So if you want to take a moment and bash Microsoft have at it, I understand Apple people don't quite go down the same road.
Their whole attitude until fairly recently has been features first, which is an understandable commercial attitude.
Of course it is.
And what happened, though, is that a lot of those features were implemented without, in retrospect, appropriate attention being paid to the security aspects.
So while they brought some nice bells and whistles for some situations, they did open up a lot of holes.
Now Microsoft is now trying to get their act together on this.
But because 99% of people's PCs run Windows, that will continue to be the dominant target.
The reason that Apple people, for example, have less of a problem partly relates to the technical functioning of the operating system, that the newer Apple systems are actually based on Unix underneath.
But also because they represent a much tinier percentage of the users.
So the people that write these viruses and spams and such will target the big one, the big kahuna and the other.
Yeah, interestingly enough, the most likely way for it to come crashing down is not necessarily a technical crash, but a sort of political control crash in terms of what's essentially a war that's starting to occur between these different large corporations and some government entities that are involved in all of this.
The ISPs, for example, the Internet service providers, more and more are trying to control what their users do.
And because of all these conflicts that are starting to occur, the probability is that the kind of meltdown we would see first would be fragmentation of the Internet, where it became harder and harder to do communications that weren't approved in one way or another or to contact people outside your particular, what they call, walled gardens.
Now there are technical issues too that are occurring.
Some of these are being triggered by companies.
For example, .com, right?
Right.
The big domain.
.com is controlled by VeriSign, a company called VeriSign.
And VeriSign operates what's called the registry.
So when you type a .com address, they're involved in figuring out where that address is and how you're actually going to connect to that site and all that kind of thing.
The intent of what they did was to try to deal with a situation where you type the wrong address into a web browser.
Seems simple, right?
So if you typed coast-to-coast AM and you spelled it wrong, instead of just getting an error message that said wrong site, no such site, something like that, you would get a special web page that they were presenting that would suggest to you various alternatives.
And it would have other commercially oriented information and links on it also.
No, because what VeriSign did was make this change at a fundamental core level of the Internet.
So it didn't just affect web applications, it affected all applications, including email, which meant that if you mistyped a domain address on a piece of email, that email actually got sent to them rather than where you wanted it to go.
Or at least it tried to go to them is what actually happened.
The Internet is a lot of applications that are going on all the time beyond mail, beyond the web, beyond the obvious stuff.
And it broke a lot of them.
And what really got people upset was that they did this unilaterally.
I mean, there are standards groups, there are people who are out there trying to make sure that the Internet runs properly because, again, there's no central authority.
Right, but they do operate under a complex set of government rules and regulations because of the history relating to all of this.
They don't own the Internet.
And to the extent that they can just type a few keys on a keyboard and break, really break, I mean, people's printers stopped working around the world.
We're making a case for balance, which doesn't exist right now.
Now, it's important to realize that if we try just to let things run the way they are now, if we just say we want to maintain the status quo, we are going to fail.
Because at the international level, things are happening right now that will impact the way the Internet is operated and controlled, relating to organizations such as the International Telecommunications Union.
So, to the extent that we don't want to act on this ourselves, we are ceding the power and the authority to others outside the U.S. Well, so far, the United States government has kept a pretty hands-off attitude with respect to the Internet, have they not?
And in fact, there not only are suggestions of using actual cache to try to stop spam, but also various virtual kinds of cache, computational cache where you would have to burn a certain amount of computer time doing calculations in order to send a message.
These are all things floating around in the anti-spam community which I spend a fair bit of time inside of.
Yeah, not only that, there's two other key things you need.
One of them is if you're dealing with real money, you need a way to deal with micropayments.
Tiny, tiny little payments, which is actually a much tougher nut to crack than some people think.
The other thing you need, though, and this is the part you're not going to get, is some way to actually control the end applications.
Because there is no way from a technical standpoint to mandate that these applications are going to work the way you want.
Anyone can build their own mail program.
A group of people could get together and design a whole new mail system if they wanted to and completely bypass the normal mail channels and bypass those costs.
And they could hide this.
They could make it look like something else.
They could make it look like web pages.
They could do anything.
So my view of this, and there's people that will disagree with me, is that these pay-per-message schemes, at least in terms of using them to try to control spam, are doomed to failure.
I understand the reason that they seem attractive.
But when you look at it the other way, it's those same companies that are providing the Internet services.
Right?
Cable companies are providing telephone services.
Well, SBC, for example, a big telephone company, provides DSL, they provide the infrastructure, the long-distance circuits that provide the Internet connectivity.
Well, for example, a company I know in Mexico City installs a T1 down in Mexico City for whatever purpose.
And as part of that, they install a voiceover IP system so that when they pick up a telephone in Mexico City, they get a dial tone in Las Vegas, Nevada.
And they dial locally as many calls for as long as they wish.
Now, I guess you can say, gee, it still, you know, it just goes from one pile to another, but they're avoiding all kinds of long distance call charges.
Well, the incremental cost of long distance now is rapidly going down to zero even on the conventional phone network.
I mean, call Europe, for example, it used to cost $12 for three minutes years ago, I remember that.
Now it can be cheaper to call London than it is to call across Los Angeles if you've got the wrong kind of plan.
What's probably more interesting, though, is the battle between the local phone companies and the long-distance companies when it comes to Internet calls because of what are called access charges.
And that's the fees that the long-distance companies traditionally pay to the local phone companies for access to their circuits.
And there's actually little hidden charges on our phone bills that deal with that.
And Internet calls bypass a lot of that.
So there's been a lot of fights, court fights, FCC rules, judgments, all kinds of things relating to that, and some interesting trickery that some companies have tried to pull to get around those charges.
And another area where there's a difference is to the extent there's security and privacy issues that differ between voice over IP and conventional telephone because, again, our laws haven't kept up, and there's all kinds of interesting issues about how wiretaps affect these things and such.
So they're not exactly equivalent, and there's issues beyond the money ones.
I think in an era where long distance is getting so cheap, though, the issues for the end user in terms of the relative costs are getting vanishingly small.
We live in an era when people drive airplanes into buildings and terrorists have networks.
And these networks, it seems to me, Lauren, would find the Internet the ideal tool to communicate with each other and plan their terrorism, wouldn't you think?
If you send an unencrypted message, that is it's plain text as you send it and plain text as received and you send it through your ISP's mail servers, the guarantee of privacy is relatively low.
The probability of any given message being monitored is also relatively low unless you're a person of interest or fall into the sphere somehow of a net that's been cast in a particular place.
The reason for this is just because the amount of traffic is so vast.
Well, all it takes really is being physically in the topology of the Internet, where you're located, the servers you use, things like that, sharing facilities with somebody who was under surveillance, for example.
There have been a lot of cases where the nets were a little bit too broad or very broad, sucking up a lot of people's materials that shouldn't have been.
This ties in with systems.
They used to be called Carnivore, things like that that are used to monitor network traffic.
Well, you run into the old problem when it comes to that kind of surveillance, which is that, yeah, you could argue that someone who was predisposed to agree with those points of view might visit those websites.
On the other hand, people who were ardently opposed to those points of view would be visiting those websites also on the know thy enemy basis.
And people who were doing investigations, reporters who were working on stories and want to track what these groups are doing.
But I think a more important point is that in all probability, the really nasty stuff, that the stuff that's really of concern when you talk about terrorists using the Internet are at a different level and are not somewhere where they're publicly visible.
And it is so technically simple to obscure these things in ways that are basically undetectable that the really public stuff that you can see is unlikely to be the real problem.
So you're saying it is possible to escape responsibility for having written something or published something on a website entirely, and the authorities are just stumped?
There has never been in the history of the world, I challenge anyone to come up with an example, of any technology that's ever existed that allows for one-to-many communications of the kind that the Internet presents today.
And it's the old genie out of the bottle.
You can't get the genie back in.
And the technology is so powerful that the ways it can be used and the way things can be encrypted and obscured and hidden means that the world has changed.
We talk about the world changing after 9-11.
The world has also changed because of the Internet.
And as you point out, a lot of those changes are wondrous and fantastic.
And there are downsides, too.
And not all of them can be fixed the way we might want to in a perfect world.
For the average person out there, let me ask this.
As I mentioned to you, I live out in the boonies, so we do a lot of our shopping.
For me, electronics, for my wife, she'll buy a dress or, you know, whatever on the Internet.
And in doing so, you give your credit card information and the rest on a secure page.
Should I regard that, and should my audience regard that, as absolutely safe as walking into a store and handing the clerk your credit card to swipe into the machine?
Is there a great deal of difference between sitting on your home computer and ordering something on a secure page and buying it in the store?
Well, and or it's sent across probably the Internet or God knows what, even a secure satellite link up to the company's main office where it's run through some other computers probably to the credit card company.
I guess my point is it's going to get on a network one way or another, whether you do it or whether someone else swipes it, isn't it?
Yeah, and in fact, the act of moving the data from your computer to the computer at the other end, assuming you're really dealing with a, quote, secure page, unfortunately, there have been a lot of cases of sites that were just misconfigured.
They were just set up in stupid ways.
I'm sure.
Where they looked like they were secure, but they really weren't.
But by and large, getting the data between the two points isn't the problem.
The problem is what happens to the data at the other end.
Because often those servers themselves and the people that run them are set up very badly.
And there have been a lot of cases, I'm sure you've heard of it, where hackers have gotten thousands and thousands of credit cards at once.
Now, they didn't crack any encryption or anything like that.
The encryption between the PC and the computers was just fine.
It was just that the servers had holes in the way they were set up, and so they got mass numbers of cards.
Now, there's ways to do these things better so that that kind of thing is less likely to happen.
If you're dealing with a known entity at the other end, a firm that you trust, a firm that you believe is competent and that you have reason to have faith in, then you should be in pretty good shape.
If you're dealing with an unknown organization and you don't have time to do your homework and the research and who has that kind of time, then you might be better off dealing with a brick-and-mortar, walk-in-the-door kind of place locally, if you have a place locally.
I mean, the individual user doesn't see it because if there's a problem on their credit card bill, they can call the bank and they'll get it credited back.
But that's actually coming out of merchants' pockets and out of the whole system's costs that are built up.
So the Internet becomes another factor in that whole cost structure that drives these prices up little by little.
Now, keep in mind that a lot of times when you find that best price, and I've had this happen myself, you'll go to one of these sites that does the comparisons, right?
You see that for this particular camcorder, for example, there seems to be a $400 variation in the price to high and the low.
And when you call the low, it's some weird Jose's Cameras, or something, somewhere, and you've never heard of it, but they've got a great price.
And when you call them up, it turns out, well, they don't really have it in stock, and you can't get it unless you also buy the extra special carrying case.
All those kinds of things start to happen.
So that's one of the risks when you don't have a physical store nearby when if there's a problem, you can go back into the store and say, I want to see the manager.
I want this fixed.
And if you're dealing with some company on the other side of the country or maybe in another country, your leverage in those kinds of cases is considerably less.
So that's a situation where the physical locality really can matter.
I believe that in terms of the totality of traffic on the Internet, the amount that is monitored is relatively small.
I think it is probably much bigger now than it was a few years ago.
I believe that the monitoring tends to be focused in places and on people of which there is, like I was saying earlier, some kind of interest already, just to make the amount of data being gathered manageable.
Looking for keywords tends not to be very productive unless you're dealing with very unsophisticated targets, let's say.
Because it's relatively unlikely that your typical terrorist is going to be speaking in plain, simple words that are easy to pick out about what they're doing.
They're more likely to say, yes, the meeting is at 8.
And in fact, you pick up so much noise when you look for keywords.
It's not as simple as just scanning the Internet for people talking about bombs and airplanes and buildings.
It just doesn't work that way.
But there is surveillance going on, clearly.
There are increasing amounts of it.
This is driving moves toward encryption.
And encryption can't be controlled.
You can't outlaw it effectively.
So that takes us back to that same situation again where there are problems that just can't necessarily be solved, and we have a world that's very different than it used to be.
From a theoretical standpoint, there is a kind of encryption that can't be broken if it's used properly.
And that's one-time, what's called one-time pad encryption, which actually has a very long history, but it means that you have to have a good source of random numbers to use for your encryption.
And you can never reuse those numbers.
But if you do it right, and all of the high-level military codes have been using this kind of system for a long time, it is uncrackable.
Now, that doesn't mean that people don't screw up using it.
And in fact, the way these systems have tended to be broken is when people got sloppy in the way they were dealing with them.
And then they can be cracked.
But used right, used the way they're supposed to be used, good random source of numbers, you can't crack them.
My guest is Lauren Weinstein, and if we haven't given you the Heebee GBs just yet, stick around.
they're straight ahead.
All right.
We have discussed in some detail the internet, although we could do that all night, and probably We'll go to the phones at the top of the hour and let you ask questions.
But a couple of other areas that I want to cover with you, Lauren.
For example, the black boxes that are rumored to be in new cars.
When you buy a new car these days, I'm told these black boxes, oh my gosh, they can record how fast you've been driving, how many miles you've been driving, all kinds of things about your driving that I suppose in a pinch the authorities would just love to know about in some cases.
What's the real skinny on these black boxes, do you know?
And since they were in there, and because typically there aren't laws controlling this kind of stuff, there we are again with our 19th century legal system.
More and more functions have been added to them in terms of keeping track of not only accident type events, if you have an accident, they keep track of when the airbags deployed, what the speed was at the moment of impact, whether you had your foot on the brakes, that kind of thing.
But more and more now they are keeping track of more routine data that can be read out with the appropriate equipment at repair stations, service stations, and things like that.
Really?
And there has been interest expressed, as you might imagine, from some government agencies, to have access to that data to charge people for speeding and all kinds of things like that.
And there have been people convicted of serious crimes based on the data from those boxes.
So, for example, someone was in an accident and they said, look, I tried to stop.
I couldn't tell you the exact time without digging through the research material, but it was really when airbags started to come in that this stuff got started.
And the use in criminal cases and things like that has been over the last few years mainly, I believe, as the technology has become more and more sophisticated.
Now, one of the big issues here is that this has happened under the radar for most people.
People buy their cars, and they don't realize that there's this kind of surveillance equipment built into it.
So there are concerns that there should at least be laws that say that people have a right to know that it's there, to know what information is collected, to have access to the information, and that there should be laws that control how that information is used and who has access to it.
Yeah, I just wanted to add one thing on the black boxes.
Fire away.
There's another aspect of this which can go even further, which is a lot of people have systems like OnStar, for example.
These systems nowadays have full GPS global positioning satellite systems in them.
And they can also record information about where you are and where you've been.
And they have been used to recover, obviously, stolen cars.
They have been used to, when police have asked for information on a given car at a given time, there have been cases of cars that have been modified so that the driver didn't even realize that special things were going on through these specialized communication systems to track them.
So the technology in these boxes is becoming vaster.
In some countries, there have actually been calls for every car to have GPS systems in them.
And this also has happened in some states here in the U.S. There have been calls for this so that people could be charged a tax based on when they travel the roads and whether the road was busy that day and so they want to know where you traveled and when you did it and all of that.
It's promoted by the folks who like it as a super barcode, like a super version of the UPC code, the bars on the products and such.
What it actually is, is a little transponder, there are different kinds, that picks up a radio signal that's transmitted at it, and in its simplest form, sends back an ID code that's received at the other end, a unique ID code.
And this could be used on products to give you a checkout without having to scan, because you just kind of go by the sensor, and you could read your whole supermarket card at once, in theory, right?
Wow.
Which sounds kind of neat.
Now, the problems that have come up is that most of these things don't turn off after you leave the store.
So you could have a situation where everything you buy and everything you use, and people are talking about having this RFID technology on just about everything, could be tracked later.
So you could be walking down the street and anybody could just be kind of waving a wand or maybe be 50 feet away.
You wouldn't even know It and keeping track, they know what's in your wallet.
There's talk about putting RFID in money.
This is very seriously under consideration for the Euro, and it could come our way, so you could kind of add up the contents of someone's wallet from a distance.
That might be interesting.
And of course, then there's the issue of RFID implants, which was sort of a science fiction-y thing a few years ago, but isn't anymore.
Yes, but the same technology, in fact, promoted by the same people who make the pet inserts, is also being promoted for being implanted in people.
And while it is possible to look at some of the applications that are being promoted, and these are things like, well, somebody has Alzheimer's disease and they wander off, you want to be able to find them if they don't have any ID, this kind of thing.
In reality, what's being looked at here is much broader applications.
There have actually been promotions where people are saying, well, this will be great.
You get the implant, and then when you go to the store, you can check out by waving your hand.
Well, okay, I guess that's for some people.
That might be a good thing.
But you can't turn them off, right?
So everywhere you go, you're essentially broadcasting, in effect, if there's a transmitter nearby, who you are, your ID for everyone to know.
And I think what will probably happen is that we'll find calls for these applications first in people who don't have any choice in the matter, where there won't be arguments about it too loudly, right?
You could picture people saying, well, prisoners should have these implanted, whether they like it or not.
I mean, these are things where you're not going to get a lot of argument from people at large.
But that's where it starts.
And then pretty soon you've got the chips in everyone, and then the world is very much different.
Is that a nightmare scenario?
Well, it depends on your point of view.
It depends on what kind of society you want.
Is that kind of thing likely to happen?
Yeah, I think it probably is unless we take a serious look again at the laws and personal privacy and how we want to draw the balance between security and privacy.
Not only can you not necessarily trust the mechanism of the identification, and that leads into biometrics, too, if you want to talk about that, fingerprints and eye scans and things like that.
But you have to be able to trust the underlying information.
So, for example, if you have, and this goes into things that people are dealing with right now, a lot of the things going on at airports, the whole CAPS2 system that's going into place now to do a background check on people going to airports or the trusted traveler cards that they'll be giving out soon to people that meet certain criteria so they don't get as much scrutiny at airports.
Boy, I just went through a hellish experience at an airport going to New York.
I'll tell you what.
Just manage to walk through and forget one little item, beep, and they will take you in the back and they will swipe and sniff everything that you have.
I mean, it is, flying is just not the joy it once was.
And the worst part of it is that when you have these systems in place that will make it easier for some people to get through security than others, you have basically opened up a giant hole in your security system for what we might call deep cover agents who live here.
They live exemplary lives.
They have their credit cards.
They qualify for all the benefits.
They get the frequent traveler card.
They only have to succeed once because you're dealing with people in some cases who don't care if they come back.
And so a trusted traveler card can turn into a trusted terrorist card if this kind of scenario plays out.
And what that tells us is just because you have an ID card from someone or an implanted chip or a biometric identification, even assuming you can trust the biometric identification, doesn't mean that the decisions you're going to make about that person, whether they're a good person or a bad person, a trustworthy person or an untrusty person, are accurate.
You might know that it's person A, but you don't know if the information you have about person A is any good.
In the earlier days, the information was fairly limited.
I mean, it's sort of intrinsic to the system because you have these cell towers or you have the antennas that are scattered everywhere.
The system has to know where you are so that it communicates with you through the correct tower and the correct antennas.
Yes.
But because of FCC mandates related to emergency services, 911, extended 911, there were mandates on all the telephone carriers that they be able to do very, very accurate location tracking, down To just a few feet in some cases is a kind of complicated formula they use.
But there were not restrictions put on how that information could really be used.
It wasn't like they said, well, you can only use this for 911, you can only use it for emergencies.
So immediately, people started looking at commercial applications and other applications.
And again, we've already had court cases where people have had their records polled and the tracking information pulled.
And they said, well, according to our records, you were here.
I am not in the glass half-full camp when it comes to this, as you might imagine.
My view of it is that right now we are living in the golden age.
And people in the future will look back on us, and it will seem like a different universe, because the whole concept of individuality, the way we view it now, of privacy, those things will be archaic terms.
They will be studied in history classes when privacy was something that people expected.
What an oddball group of people those were back in the early 21st century.
And one of the arguments that's made by law enforcement, for example, is, and they have legitimate interests.
They want to catch criminals and such, is that there's no expectation of privacy in public places.
The problem with that logic when you start putting cameras everywhere and linking them into these vast networks, though, is that at some point it becomes like having a little guy in a raincoat holding a clipboard following everyone around.
Only a technical version of that.
Where any time you step out your door, you are immediately subject to tracking wherever you go.
There are systems in England now, they have systems that are reading license plates as people come and go from London to tax them appropriately.
Those kinds of systems are starting to pop up here, too, that read license plates.
You start to have a situation where you can't leave your house without having all your movements followed.
I don't think people would put up with that if they were being followed by real human beings recording everything they did, every store you went to, everywhere you drove.
But because it's done with technology, because it's done with cameras, we're supposed to be less concerned about it.
That's not to say that the legitimate interests of law enforcement in terms of catching criminals and stopping terrorism, these are very important things.
The problem is that we don't want to proverbably here throw the baby out with the bathwater.
We could create an extremely secure society through technology if we want to.
That will not be a free society, however.
It will be very different from the United States of America that we've been pledging allegiance to all these years.
Now, if people want to do that, that will be their decision.
I think that that's something we haven't thought about enough.
But you're allowed to bring on board your sharp pens, your umbrella, liquids in your suitcase that might be anything, all manner of things that are much more serious weapons.
So airport security, like most security, is largely an issue of perception.
The perception of security is at least as important as the reality of it.
And it's been that way with airport security all along.
It's understandable why that happens, but that doesn't make it any more honest.
I suppose it's a natural evolution that we're going through.
Lauren Weinstein is my guest, and we're talking about issues of privacy as it relates to the internet, OG, your automobile, your own face on a camera somewhere.
In other words, the totality of your life being followed.
Every step you take, every move you make being followed.
Lauren, welcome back.
One more thing I want to ask you about, and then we're going to go to the phone.
It's going to be very interesting to see how people react to all of this, understanding all of this.
There are reports, rumors, perhaps, a myth, perhaps, that there are people working on machines that literally can determine, for example, if you are a terrorist or a criminal or have dark thoughts, or in other words, some machine that can in some way detect brain waves and virtually read your mind.
I'm sorry to report that there is technology like that that has been developed.
The level of accuracy is a matter of some dispute, but it is in its infancy and it is an area that people are watching very closely.
The way it works, it's called, generically, it's called brain fingerprinting, brain printing, different ways.
But it operates on the theory that if, for example, you have seen something, you have been at a murder scene where the public has not been, that if you are shown a photo of that place, your brain will react to seeing that photo again, seeing that place again, where an ordinary person who hadn't been there wouldn't react that way.
And this will be a physical reaction in the brain that can be detected through a particular brain wave reaction that could be recorded.
And when this particular wave appears, this particular electrical pattern appears, that would, according to these systems, be proof that you had been there before.
Similarly, the idea is that if you were shown pictures of terrorist activity, for example, and if you were of that ilk, your brain would react in a certain way.
You couldn't stop it.
You couldn't prevent it.
There'd be no way to control your thoughts.
It would be at a subconscious level.
And that also would be indicated to these systems.
This is very much at the bleeding edge of these technologies, but it appears that there may actually be some reality to this and that it is definitely not a science fiction sort of concept.
All of this, if you really consider what it means, is rather difficult to digest.
And as you pointed out, I guess our children are going to look back on perhaps our generation as the last of the great privacy, back in a day when a person actually had the expectation of privacy.
Well, when these future generations, I mean, at some point, this antiquated legal system that you talked about and reality are going to collide heavily, and how do you leave the Fourth Amendment intact, its wording, and maybe some of the other amendments, for that matter?
You can't leave it there any longer.
You've got to change that, don't you?
Otherwise we don't even have a resemblance to reality any longer in legal or yeah I think it it has to be changed.
It would have to be changed to cause the sorts of negative things to happen that we're talking about.
But that goes on already.
I mean, that's how the Supreme Court works.
It reinterprets the Constitution based on the existing world.
And I would expect that to continue happening.
If there's a sense in society that people want to give up privacy, that they want a different kind of society where privacy is no longer important and where a sort of what I'll call a police state mentality would be considered preferable.
That may be a decision people will make, and I think the courts will eventually go along with that way.
When our privacy rights really are completely gone, then the Fourth Amendment has no meaning at all, and it will have to be redacted or changed or something.
Is Lauren talking this machine that will measure brain waves to detect guilt?
Anything related to that machinery I've been hearing about in the last year regarding tells that your face is flushed, that you are lying because blood is rushing to your eyeballs and forehead area?
Actually, it does broadly enter into the same area because it does have to do with biometric measurements of looking for physical changes in the body that you can't control.
The theory behind these systems, and you can believe it or not, it has yet to be demonstrated rigorously, is that there are certain biological functions that you can't control.
I mean, that's supposed to be the theory behind polygraphs, behind lie detectors.
Now, we know those can be beaten by some people.
It may prove to be the case that people can beat these other systems too.
But at the moment, the claims are that they can't be beat.
I mean, one of the problems, of course, is that if someone's really good at beating a lie detector, you wouldn't know that they beat it.
You would just think that they passed it.
So the only time you know someone beat a lie detector is if they passed a test and then later on you found out they were lying.
Otherwise, it just looks like a normal pass.
So it's hard to get statistics on that.
But there are lots of documented cases of people.
I mean, some of the biggest spies who have been convicted in this country passed numerous lie detector tests.
So there's absolute clear evidence that some people are just not going to cooperate physically with those systems.
And of course, there's interpretation involved in reading a polygraph also.
So you get a number of things that can vary.
But there are a lot of people who consider polygraphs to be basically voodoo and not really to be science at all.
It's interesting that polygraph results are generally not acceptable in court, but they are used by, for example, our security agencies for screening purposes.
Now, why they're good enough for one and not for the other, you can read that either way, but that technology does have a lot of people who don't really believe in it.
Because that's certainly the one that's the scariest to me when I think about the ramifications of something like that for privacy in the future.
The theory is, what we're being told is that this is something that's fundamental in the structure of the brain.
And that when you see, when you are presented with a photo of something that makes you react in certain ways or a scene that you've seen before, you can't control how your brain is going to react, not at the level that these machines are looking at.
If that's true, then that kind of system will be vastly more accurate than a polygraph, which is actually just looking for variations in much broader kinds of things, respiration.
Let's back up a little bit in biometric identification.
For example, in a lot of modern movies, you see people required to stare into a machine, and the machine reads their iris or their eyeball or whatever it does.
There's retinal scans that require basically more cooperation from the user because you've got to get closer to the scanning device.
And then there's iris scans, which can be done actually at a distance, because if you can just get a good shot of the eye, you can look at the patterns in the iris, which are supposed to be unique.
The claim, again, is that both of those systems are supposed to be foolproof.
Now, we originally heard the same thing about that regarding fingerprint biometric systems.
And then a researcher discovered that he could fool virtually every fingerprint scanner on the market using a high-tech piece of material called gummy bears.
And he was able to build fake fingers using gummy bears.
Later, he found even better cheap materials.
He could even simulate the temperature of the finger in case the scanners were looking for that.
He was able to beat basically all of them.
So there's a lot of question about the reliability of even iris scans and retinal scans.
But the funny part about it is, and I mean funny sick, not funny, ha ha, is that if, again, we talked about this a little earlier, even if you have a biometric match, that doesn't mean that the information you have related to that and that person means anything.
Another really creepy part about biometrics is that people don't think about a lot is what happens if your information is compromised somehow, right?
Let's see, that'd be 26.4 miles south of Cincinnati if our readings are right here.
Go ahead.
Just kidding.
unidentified
I have a quick comment and a question.
You were talking about black boxes earlier.
I'm a third-generation truck driver, and I can remember back in the mid to late 80s, companies could purchase these black boxes and put them in trucks and monitor how their drivers drove their trucks.
And I remember my father and my grandfather just throwing an absolute fit over it.
And nowadays, with all companies having satellite communications, I can look at my little keyboard over here and see how I'm driving my own truck.
It's become the norm.
So it's, you know, it's just one of those deals.
But my question is, I'm kind of out of the loop when it comes to computers and internet doing the job that I do, but I keep hearing about this spyware.
Yeah, spyware broadly defined is any software that's in your computer that is sending information out to someone else somewhere without your knowledge and or permission.
And what's common is especially the most common, perhaps you could say the most benign version of these is systems where you get some software that says it's free, but it gives you ads that are relevant to you, perhaps.
But the way it determines that is by tracking what websites you visit, sending that information off over the Internet to some server somewhere, where decisions are made about what ads to send back to you.
That's perhaps the most benign, though a lot of people find that very objectionable anyway.
At the worst, it could do anything to your computer, transmit the entire contents of your disks, change any information, put child pornography on your computer that you don't know is there, anything you can imagine in your darkest nightmares.
Because once one of these programs has access to your computer, because of the way computers are designed now and the operating systems, it has total access.
And you could download one of these spyware systems, particularly the nefarious ones that could monitor everything you do.
They can see your screen.
They can see the keys you type.
It could be hidden in any program you download.
And it's almost impossible to know what they're doing unless you have software that is watching the Internet connection very carefully to look for data traffic moving in and out of your computer that shouldn't be there.
But to the normal person, the lights are blinking.
You're not paying attention.
You don't know what data is moving.
So the possibilities are really endless.
So it goes all the way from sort of benign to disastrous.
There are commercial programs that attempt to detect spyware to varying degrees of success.
And part of the way they do that is to look for traffic that shouldn't be there.
So for example, if you're looking at a website, just looking at a simple website, it would be considered odd for there to be just this kind of strange flow of data associated every time you change pages going off to some server unrelated to the site you're looking at.
Now determining that in a final kind of way is very complicated and error prone.
But what tends to happen is over time people learn where the bad spyware is and then they can look for those servers.
They can say if traffic is going out to this server, you know you've got a problem.
Why is this traffic going to Croatia when you're looking at a site in Silicon Valley?
In general, at this point, there has been very little in the legal system to protect you from this.
The Federal Trade Commission has been actively working in this area now, and I expect we will see more protections.
But again, keep in mind that that can only work domestically.
The Federal Trade Commission, U.S. government agencies only have domestic authority, and these kinds of problems can easily be international in nature and can come from places where there is very little concern about protecting people in these regards.
On the Vortex.com website, there's the Privacy Forum, which discusses a lot of these privacy issues, some related to the Internet and some more broad, even non-technical privacy issues.
And the other is the pfir.org website for people for Internet responsibility.
And we are trying to create people who will be responsible with the Internet.
And that has a lot of position papers and discussions of the specific kinds of topics we've been talking about.
Some privacy, security, who's going to control the Internet, spyware, hacking, all these kinds of concerns, and how we hope to deal with it.
It also has an announcement for our Preventing the Internet meltdown conference, which is next month here in Los Angeles, where we'll be bringing together people to try to come up with specific action plans to try to make some of this stuff better.
So even though I think we're looking at a very dark future, we are still trying to at least hold off the day of reckoning when it comes to that, make things a little bit better for now, and whether we'll succeed or not, we'll find out.
Well, if you were a, knowing all you know, Lauren, if you were of dictatorial power and you could mandate what would and would not happen with reference to the Internet and even other privacy issues, what would you mandate in a perfect world?
I don't think I can answer that question because part of the reason we're bringing these groups together, these people together, is to try to figure out exactly what the right way to answer that question would be.
I do believe that the answer has to do with balance.
You can't really operate this kind of environment without some input from government.
On the other hand, it has become apparent that too much input from government can have lots of negative impacts as well.
I think it may well be applicable if we assume enough exposure and understanding of the issues and technology involved.
Unfortunately, if people haven't had the time, and this is what usually happens, people have lives.
They're busy.
They don't have the time to read all the fine print and the click-through licenses and all these sorts of things.
So they have to make their decisions in a lot of cases based on hype.
And then you don't necessarily get good decisions.
But if people had the true story, and that's why I'm so glad that you've devoted this show to this topic tonight and this morning, it's this kind of discussion that helps to give people enough to go out there and look for more if they're interested and really get to understand these issues.
And that's where we can really start to move in what I think would be the right direction.
And while my life has been a living HELL since February 16th of 2004, I had a coworker create profiles on pornographic internet sites with my name, address, everything, Social Security number, phone number.
I have trucks going by my house beeping the horn continually.
I've reported it to every single police agency in Erie County, all the way up to the FBI.
They're quote unquote conducting an investigation, which apparently is stalled.
The person is a self-professed member of the Aryan Nations and allegedly the Ku Klux Klan.
I've had, and he's also a gun freak.
I've also had my identity stolen by the same individual, and I've been slammed for probably $1,500 worth of cell phone calls.
Yeah, part of the reason things like that are possible is that a lot of sites don't do reasonable verification of information.
I mean, if, for example, someone is creating a profile, it has an address and a phone number and an email, there are certain reasonable steps.
There's that word reasonable again, that could be taken to at least do rudimentary checking of that information to make sure it's valid and call the person back, make sure it's really them.
There's things you can do.
But obviously a lot of sites don't even try to do the minor things.
Once it's spread, once it's gone from the original source to other entities, it's very, very difficult.
If credit reports and things like that have been damaged, then it's possible to go to the credit reporting agencies and there are mechanisms for correcting those.
But in general, this is one of those situations where once the data has been corrupted, it can be damaged for a long time.
And incidentally, this is worth thinking about when we talk about trusted databases and trying to decide who might be a terrorist and who might not.
There's a lot of bad data out there, sometimes because of accidents, sometimes because, as in this person's case, someone purposely planted bad information.
In this case, it was financial information, but you can imagine how other kinds of information could be manipulated in the same way.
So it's very dangerous to have too much faith in these databases because you can see that the information can be often far from accurate.
Wildcard Line, you're on the air with Lauren Weinstein.
Hi, Ayn.
unidentified
Yeah, hi, Art.
Hi, Lauren.
I saw a show on television recently where a bunch of college students, computer science majors, took a bunch of off-the-shelf PCs and attempted to form basically a supercomputer out of several units.
But the point of my question is more what sort of damage could a terrorist organization do if they, in fact, had a supercomputer or something close to it?
I don't think supercomputers are really on the terrorist agenda.
The kinds of number crunching that are done for those things are useful for cracking codes, but that's mainly the opposite side of what they're involved with.
They're useful for weather predictions and things like that, large-scale numerical analysis.
But I think the kinds of computers that terrorists are more likely to be interested in are just the off-the-shelf PCs running off-the-shelf applications, basically.
unidentified
Could I ask you one more thing?
Do you think as a dissuasion against people writing these viruses and attacking people's computers that such acts could be classified as terrorism?
I think the problem is that you run the risk when doing that of sweeping into that net a lot of basically immature people who don't really deserve to be classified that way.
That's not to say that someone that creates a destructive virus and is trying to steal credit card numbers with it and all that kind of thing shouldn't be treated very harshly.
But you find that a lot of these things are created by 13-year-olds and 14-year-olds who don't really understand what's going on.
I don't really see, in terms of the ramifications of what they're doing, I don't see what the benefit would be of classifying something like that as terrorism.
It's going to have to be handled on a case-by-case basis.
I mean, first off, I don't think you would find government agencies interested in this because he is not committing a crime.
He is the victim of a crime.
Correct.
However, and I say this just based on what you are telling me without all the facts of the case, obviously, there may be a situation here where it's possible that his behavior could be classified as incompetent.
I mean, once somebody had been burned, as unlikely as it seems, that somebody would fall for one of those Nigerian scams, why would he continue to fall for it?
unidentified
Because he's addicted, and he thinks that he's going to be one of the 100,000 that's going to get lucky, and $25 million will put in our bank account.
The only way that something like this could be controlled would be to demonstrate that he is not behaving in a way that a rational person would behave.
And then there are avenues that can be taken in terms of courts and rulings that can be made to put controls on what he can do with the bank accounts and such.
I think that might be the only avenue to explore.
Boy, of all the calls, I thought a very sad situation, and I wish I had something better to say about that, a better solution.
West of the Rockies, you're on the air with Lauren Weinstein.
Hi.
unidentified
Hi, thanks, Art, for taking my call.
Hi, Lauren.
I've subscribed to your newsletter for quite some time now.
This poor lady, I mean, my first thought would be to write back to those people and say that if you attack my husband one more time, there's going to be a lot of enforcement action taken.
My question is on a very basic level, and that is the 800-pound gorilla that nobody has talked about, the dial-ups, the high-speed modems that neuter your operating system and DSL.
Well, what do you mean neuter your operating system?
unidentified
Well, what they do is they take your files of security stuff and put it in a separate folder in Windows Explorer and they make it a bare operating system so that they have complete access to what you are doing and then you have to go in and redo it.
On top of that, in their contract, it says that it could damage your computer and they would have no responsibility for that.
On top of that, there are address books, there are vice version of Internet Explorer.
Yeah, I think what he's talking about is sort of a case of the everyone wants to control the defaults on the computer kind of situation.
The different vendors of these things, whoever they happen to be, the competing ISPs and everything else, they all want to control the computer.
And so what tends to happen is when you install their stuff, it basically takes over everything, in some cases undoes important things that you had set up.
That doesn't only happen with modems and things, it also happens with various programs to play audio and video.
You install a new one, and it just takes over all those other ones that you had installed.
The thing is, though, that you're not reading the fine print, because as you install that application, it virtually tells you it's going to take these kinds of files and take over.
And if you don't read it, which most people don't, I mean, they just keep clicking next, then you're doing it to yourself, really.
In a lot of cases, it is explained, but in some of those cases, it is explained in a legalese that a lot of people don't really understand what it's saying.
It's often not put in a very clear-cut way.
But I think it would be reasonable for people to assume that it's not necessary for each program to completely take over the system.
So this is one of those kind of, well, if we can do it, let's do it kind of philosophies in these software packages that can be very annoying to users at least.
Listen, I wanted to know something about the pass-through laws that exist concerning banking laws and how certain machines and operating systems and languages at the bank cannot be corrupted.
How can it be applied to Internet?
And not only that, what about Ordonance laws, the ancient laws of the Europeans that would not allow certain images of people around the idolatry thing?
And only that, what about policing the Internet with some sort of quantum shift copper or cabal or something like that that can look into it by means of pass-through laws and sort of overcome all of this bad redominance?
Well, I think that the basic answer to that is that we need to look very carefully at both the technical side, which is part of what he's talking about there, and the legal side of how the Internet is going to be controlled and governed.
And we don't know what the right answers to that really are going to be.
Part of the reason we're doing this is my partner in PFIR and myself have been involved in the network for so long that our perspective, I think, is pretty useful on a lot of these issues.
But we're just two of many who are working on these.
But we hope by bringing a lot of people together from these other organizations, we'll be able to make considerable progress.