| 
          
         | 
        
          
            <<  
             ^ 
              >>
          
          
            
              
                Date: 1998-10-30
                 
                 
                Kinderschaender traditionell gefasst
                
                 
-.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- 
                 
                
      q/depesche  98.10.30/1 
updating       98.7.22/3 
 
Kinderschaender traditionell gefasst 
 
Der Tenor dieses Berichts der Los Angeles Times besagt,  
dass bei Auffliegen des internationalen Rings von  
Kinderschändern,  der das Sommerloch mit Schlagzeilen  
gefüllt hatte, vor allem traditionelle Mittel wie  
Hausdurchsuchungen und abgehörte Telefonate zum Ziel  
geführt hatten - obwohl unter den Tätern ein  
Verschlüsselungsexperte war. In Europa überschlugen sich  
dagegen Politiker u& Medien mit Ideen, wie man derartige  
Kriminalität bekämpfen könne -indem man die Bürgerrechte  
aller ganz einfach annulliert. 
 
-.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-   
28-10-1998 There are several widely held notions about  
Internet-related crime.  One holds that law enforcement  
cannot deal with quick-hit criminals whose global computer  
transactions can be accomplished in seconds. Another is  
that the police forces of many nations will never close ranks  
to share information and coordinate investigations. Still  
another holds that Washington must have the means to  
decode computer encryption if law enforcement is to do its  
job. As Times staff writers Mark Fritz and Solomon Moore  
showed last Friday in an article about a child pornography  
investigation, none are necessarily true.  
 
U.S. Customs Service computer experts worked closely with  
local law enforcement and several foreign police agencies to  
conduct, over the course of two days, 100 raids in California  
and 21 other states and in Australia, Austria, Belgium,  
Britain, Finland, France, Germany, Italy, the Netherlands,  
Norway, Portugal, Spain and Sweden. Their target was the  
largest Internet child pornography ring discovered to date,  
known as Wonderland.  
.... 
Wonderland was a tight-knit group that freely traded 100,000  
images of child pornography. Its members had production  
studios for live child sex shows that they transmitted over the  
Net. The operation had a computer-security designer and  
programming and hardware specialists who built a daunting  
array of codes and powerful encryption to maintain secrecy.  
 
Encryption employs complicated algorithms to scramble  
documents until they can be decoded by the intended  
receiver. Although encryption surely will be a backbone of  
trust and security in the electronic communications and  
business transactions of the future, U.S. federal law  
enforcement agencies presently maintain that they need  
access and eavesdropping ability to prevent criminals from  
plying their trade in secrecy. But in the child pornography  
case, traditional law enforcement means like wiretaps,  
search warrants and message tracing proved sufficient. In  
other words, traditional methods were applied to a new  
medium.  
... 
This case exposes vile secrets. But more important, it shows  
how an electronically well-defended crime ring can be broken  
without overarching laws and assaults on privacy.  
 
full text 
http://www.latimes.com
                   
 
relayed via ncb05@uow.edu.au & jericho@dimensional.com 
 
-.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-
    
                 
- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- 
                
edited by  
published on: 1998-10-30 
comments to office@quintessenz.at
                   
                  
                    subscribe Newsletter
                  
                   
                
- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- 
                
                  <<  
                   ^ 
                    >> 
                
                
               | 
             
           
         | 
         | 
        
          
         |