tag:blogger.com,1999:blog-21633793.post8427441213872613100..comments2023-12-12T03:19:42.467-05:00Comments on CYB3RCRIM3: Reply E-Mail Doctrine?Susan Brennerhttp://www.blogger.com/profile/17575138839291052258noreply@blogger.comBlogger1125tag:blogger.com,1999:blog-21633793.post-27124989781769309892010-12-05T23:16:26.460-05:002010-12-05T23:16:26.460-05:00Of course the reply-letter presumption that email ...Of course the reply-letter presumption that email is private and not viewable by others when crossing the internet is wrong. <br /><br />In the later 1990s and early 2000s millions of folk found their email hacked to send spam and viruses as if they were the originator. Often subject lines and even initial lines of the body were copied for fake replies. This situation has not really changed but only the detection of harmful automatic code advanced. <br /><br />This is why the government and other security conscious group emphasize encryption of data being passed by internet.<br /><br />In fact a classic and very common hacker technique is called "man in the middle" and makes use of the fact that the Internet relies on the "technological courtesy" of disregarding all data not addressed to you. The "man in the middle" can either observe content invisibly -- OR the "man in the middle" can alter messages or send totally fake replies. <br /><br />truthful most courts either lack the expertise -- or pretend ignorance of such issues in pursuit of someone they are sure is guilty. I suspect some courts outright suppress some legitimate appeals in a effort to avoid opening a very difficult can of technological worms. <br /><br />Unfortunately most defense layers<br />are even more ignorant of electronic data issues.<br /><br />Prosecution and law enforcement should look more toward guiding online prosecution toward means which apply digital signatures and sequence numbers or dates to information at both ends of undercover work. Such means can ensure that the messages have not been alters and were at lest sent from the specific computer in question -- although not necessarily without viral or remote control submission.Anonymousnoreply@blogger.com