I guess it never occurs to them that the Internet is a peer-to-peer network... Their email has no need to pass through an ISP, it can be directly transferred via many different methods... I guess now we will have to record every packet that traverses our network at the full dump level... I guess we should all buy stock in storage media companies now... Tim McKee -----Original Message----- From: owner-nanog@merit.edu [mailto:owner-nanog@merit.edu]On Behalf Of William Allen Simpson Sent: Wednesday, October 10, 2001 15:31 To: nanog@merit.edu Subject: Re: PATRIOT/USA technical problems, call to action If you live or work in their state, especially call: Daschle, Tom Feingold, Russ Graham, Bob Hatch, Orrin G. Leahy, Patrick J. Lott, Trent Sarbanes, Paul S. Shelby, Richard C. -- According to http://www.senate.gov/~leahy/press/200110/100401a.html, "Administration initially proposed expansion of pen register and trap and trace authority to capture undefined "routing" and "addressing" information of Internet users. " I have received private confirmation that during negotiations, "... the Republicans and the Administration would not accept the definitions and prefer to leave it undefined. " Apparently, the Administration wants the capability to track every Internet user simultaneously, just like they want to track every cell phone user. They want the ISPs to record all addresses assigned, all email transmitted, all web sites accessed, and all routing changes, so that they can access the information without going to the trouble of a warrant. Believe me, I've been explaining for days that URLs and email addresses are content, and routing changes are carried by ISPs not suspects, but I've only convinced some of my representatives. Instead, others believe that we need to track every public library terminal, etc, that a suspect _might_ use, everywhere in the US. According to former FBI agent nee Congressman Mike Rogers, "It will only give them addresses and other basic information.... these terrorists have multiple ways of communicating. They can communicate through the Internet, they can use 15 cell phones and rotate them to avoid detection. (The act) would allow us to keep pace with that.... it allows you rather than targeting a phone, to target an individual and their electronic communications. " -- William Allen Simpson Key fingerprint = 17 40 5E 67 15 6F 31 26 DD 0D B9 9B 6A 15 2C 32