The Null Device
Posts matching tags 'paedoterrorists'
The latest casualty of Jimmy Savile and the consequent Paedogeddon-style panic at the BBC: the South-East Asia forums on a travel discussion board run by the BBC-owned Lonely Planet. Just in case, you know:
The site did not officially reveal the reason for closing the forum without warning except that some posts did not conform with the site's ''standards''. But a source with links to Lonely Planet management said the decision to shut the forum was ''all about Jimmy Savile''.
It's Paedogeddon: The FBI has released an alert, warning that a new Barbie doll with an embedded video camera could be used to make child pornography; the terror level has been raised to pink. There haven't actually been any recorded incidents of the Barbie Video Girl dolls having been used by paedoterrorists, but there have been incidents of paedophiles using dolls (not containing cameras) and hidden cameras (not embedded in dolls). Nonetheless, the alert has prompted several more suggestible parents to express concern about the irresponsibility of Mattel marketing such a dangerous "toy".
It's paedogeddon: A school in Welwyn Garden City, north of London, has taken to blacking out pupils' eyes in school photographs, to prevent perverts from photoshopping their faces onto pornographic images. Each copy of a school photograph issued to a parent has the eyes of all children other than that parent's own occluded by black lines, just in case. Parents are also banned from taking photographs at the school's nativity play, just in case they might turn out to be paedophiles.
Applecroft Primary School has not commented on alleged plans to fit all children with containers containing pressurised sewage, which can be remotely detonated in the event of a paedophile attack.
The San Luis Obispo County Sheriff's Department has issued a public warning about groups of paedophiles using an image of a cartoon bear they use to secretly identify themselves to one another. (*Ahem* an image of a cartoon bear.)
Recently, pedophiles have adopted the bear as a mascot. Although there have been no reported sightings of the image on the Central Coast, individuals dressed in the bear costume and car decals have been seen in Southern California.In other news, "Dusty Blonde Lulu" is a codeword used by paedophiles to refer to a male paedophile disguised as a lion.
The Australian censorship authorities are now banning nude images of small-breasted women, on the grounds that they "encourage paedophilia". From now on, both porn models and sexual appetites in Australia must be traditionally built.
Australia is expected to have a national internet firewall in place before the next election; I wonder whether there's a team at CSIRO working on an image analysis algorithm for detecting unacceptable breast sizes as we speak.
In an attempt to fight pornography and disharmony on the internet, the Chinese government has banned individuals from registering personal domain names, and announced that those with personal websites might lose them. From now on, only licensed businesses will be able to own domain names in China.
Meanwhile, the Italian government is considering restricting criticism on the internet, after a violent assault on the prime minister, Silvio Berlusconi, which his party have argued was caused by "a climate of hate generated by virulent opposition criticism". Italy already requires anybody using internet access facilities to show and register identity documents, under the guise of fighting terrorism and paedophilia.
Channel 4 will screen a fictional documentary in which, in a parallel Britain, Gary Glitter is sentenced to death for paedophilia, something a majority of Britons reportedly would approve of:
In the Channel 4 programme, The Execution of Gary Glitter, public revulsion has led to the return of the death sentence and the first person to be tried under the new Capital Crimes Against Children legislation is Glitter.
An Ipsos Mori poll commissioned by Channel 4 found 70% of those surveyed thought the UK should have the death penalty as the maximum possible penalty for the most serious crimes.It has not been confirmed that, when respondents were informed that reinstating the death penalty would require Britain to leave the EU, this figure jumped to 80%.
The latest dispatch from the Long Siege: in the US, the EFF is arguing that users of devices such as the Apple iPhone should have a right to "jailbreak" them, i.e., to circumvent mechanisms which prevent them from installing software unapproved by the manufacturer. Apple have countered this with a dire warning that jailbroken iPhones could be a terrorist weapon, with the capability to bring America's communications infrastructure to its knees:
By tinkering with this code, “a local or international hacker could potentially initiate commands (such as a denial of service attack) that could crash the tower software, rendering the tower entirely inoperable to process calls or transmit data,” Apple wrote the government. “Taking control of the BBP software would be much the equivalent of getting inside the firewall of a corporate computer — to potentially catastrophic result.To their credit, Apple didn't actually use the T-word, but they insinuated it pretty hard, and added to that the possibility of drug traffickers using hacked phones to make anonymous phone calls. Hey Apple, don't forget about the paedophiles; surely they'd find some nefarious use for jailbreaking as well.
The EFF's experts, meanwhile, have called bullshit on the whole thing.
red von Lohmann, the EFF attorney who made the request, said Apple’s latest claims are preposterous. During a May public hearing on the issue in Palo Alto, California, he told regulators there were as many as a million unauthorized, jailbroken phones.
He added that, if Apple’s argument was correct, the open-source Android phone from Google on T-Mobile networks would also be a menace to society. ”This kind of theoretical threat,” von Lohmann said, “is more FUD than truth.”Of course, if unauthorised clients on the phone network are such a threat, then merely keeping jailbreaking technically illegal wouldn't deter actual paedoterrorists; a threat of such severity could only be countered by declaring possession of jailbroken phones to be a terrorist act and actively hunting down and prosecuting transgressors under national security laws, using the full surveillance infrastructure of the Department of Homeland Security. Perhaps that's what Apple are hoping for?
Meanwhile, the very same week, Apple have demonstrated why users have an interest in jailbreaking their gadgets, by banning all Google Voice applications from the App Store, reportedly at the behest of phone companies not wanting their cozy business models upset. And some are speculating that Spotify's much-anticipated iPhone client may be rejected by Apple, due to it competing with iTunes.
More dispatches from the War on the Unexpected: London police forced an Austrian tourist to delete photographs of a bus station, on the grounds that photographing transport infrastructure was "strictly forbidden". Which sounds like something more befitting of, say, Belarus or North Korea than of an ostensibly free country:
Matkza, a 69-year-old retired television cameraman with a taste for modern architecture, was told that photographing anything to do with transport was "strictly forbidden". The policemen also recorded the pair's details, including passport numbers and hotel addresses.
In a telephone interview from his home in Vienna, Matka said: "I've never had these experiences anywhere, never in the world, not even in Communist countries."Meanwhile, in the United States, police seized a student's computers on the grounds that he was using a suspicious operating system (i.e., Linux), and thus probably up to no good:
_________ reported that Mr. Calixte uses two different operating systems to hide his illegal activities. One is the regular [Boston College] operating system and the other is a black screen with white font which he uses prompt commands on.Which sounds like he's guilty of some kind of technological witchcraft.
A US congressman has taken a leaf out of Japan's book and proposed a law requiring camera phones to make a sound when a photo is taken, to prevent evil perverts from surreptitiously photographing people for their vile gratification. The Camera Phone Predator Alert Act will also prohibit the sale of phones in which the tone can be disabled. And, of course, it will make taking photos at concerts or weddings or similar more fraught, though... for God's sake, won't someone think of the children‽
Mind you, the bill appears to be the brainchild of one Congressman, with no cosponsors, which suggests that it probably won't come anywhere near becoming law.
A representative of Britain's Police Cental E-crime Unit has complained about how difficult their job is, and outlined what would really help: a nifty black box, as easy to use as a breathalyser, which can identify illegal activity on PCs:
McMurdie said such a tool could run on suspects' machines, identify illegal activity - such as credit card fraud or selling stolen goods online - and retrieve relevant evidence.
"For example, look at breathalysers - I am not a scientist, I could not do a chemical test on somebody when they are arrested for drink driving but I have a tool that tells me when to bring somebody in."Of course, knowing New Labour, this will probably result in legislation mandating police-accessible data-logging devices in all PCs. And the legislation will make these devices not only accessible to the police, but also to the Inland Revenue, TV Licensing, the British Phonographic Industry and local council officials. And, knowing that laws (specifically British laws dealing with privacy and data security) are drafted in a parallel universe in which security is perfect, there will be no possibility whatsoever of these devices either being defeated by the potential paedoterrorists they are meant to monitor or else hijacked by other criminals and used to massively victimise the innocent.
Several of the UK's biggest ISPs are blocking access to a Wikipedia page about a heavy metal album. The page in question, on Virgin Killer, an album by German band Scorpions (best known for their fall-of-the-Berlin-wall anthem Winds of Change), includes an image of the cover artwork, which includes a photograph of a naked prepubescent girl; presumably this sort of thing was less unacceptable back when major label RCA signed off on it.
The measures applied redirect traffic for a significant portion of the UK's Internet population through six servers which can log and filter the content that is available to the end user. A serious side-effect of this is the inability of administrators on Wikimedia sites to block vandals and other troublemakers without potentially impacting hundreds of thousands of innocent contributors who are working on the sites in good faith.The ISPs in question include O2, Demon, Sky and Virgin Media. There is no word on whether the ISPs will block other instances of this artwork, such as those appearing on Amazon, or indeed images of other cover artwork with child nudity (a certain Nirvana album comes to mind).
The Times reports that paedophiles and terrorists are joining forces online into a unified axis of unstoppable evil.
Secret coded messages are being embedded into child pornographic images, and paedophile websites are being exploited as a secure way of passing information between terrorists.
It is not clear whether the terrorists were more interested in the material for personal gratification or were drawn to child porn networks as a secure means of sending messages. In one case fewer than a dozen images were found; in another, 40,000.And another piece, looking for a rationale for the paedoterrorist nexus:
Some paedophiles have become adept at encrypting information and burying it so deeply in the internet that no outsider can easily find it. Paedophiles then meet in cyberspace and swap notes on how to reach the images. None is likely to rush to police saying they suspect that they have spotted a terrorist loitering on their child porn website.
Another area investigators will want to explore is the similarity between the personalities of paedophiles and terrorists. “If they are going out, a lot of time is spent by going to the mosque or going off to internet cafés,” the source said.Of course, there is no way that the timing of these explosive and terrifying revelations could have anything to do with the government's plans for an "Orwellian" database of all phone calls, emails and internet communications in Britain facing opposition.
A Pentagon researcher has laid out a chilling possibilities: that terrorists could be using online role-playing games to plan attacks, disguised as raids in the virtual world:
In it, two World of Warcraft players discuss a raid on the "White Keep" inside the "Stonetalon Mountains." The major objective is to set off a "Dragon Fire spell" inside, and make off with "110 Gold and 234 Silver" in treasure. "No one will dance there for a hundred years after this spell is cast," one player, "war_monger," crows.
Except, in this case, the White Keep is at 1600 Pennsylvania Avenue. "Dragon Fire" is an unconventional weapon. And "110 Gold and 234 Silver" tells the plotters how to align the game's map with one of Washington, D.C.Of course, the same argument could apply to any form of discussion. Terrorists could just as easily use last.fm playlists or online mixtapes to hatch their plans. (The above plan could be encoded as a copy of OMD's Enola Gay and a song by industrial noise band Whitehouse, followed by a song exactly 11 minutes long, which would give the time of the attack. For chemical or biological weapons, replace Enola Gay with Britney Spears' Toxic. You get the idea.) Or they could use internet memes; who's to say that the particular spelling/grammatical anomalies on the caption of the latest set of cat photos don't encode the details of a planned terrorist attack?
Of course, the terrorists could even eschew the internet altogether, using other means of communicating their plans, such as, say, public art. Who's to say that a terrorist sleeper agent hasn't been quietly making a name for himself as an artist, getting lucrative commissions, and waiting for the order to encode doomsday plans in a public sculpture (plenty of opportunity there) or a semi-abstract mural. (Avant-garde art itself is too easy.) Or architecture, or urban planning (if there are Masonic symbols in the layout of Washington DC's streets, there could be other things elsewhere.) The possibilities are infinite.
Perhaps Bruce Schneier could make his next Movie Plot Threat Contest hinge on coming up with creative ways in which evildoers could go to elaborate lengths to encode the message "nuke the Whitehouse at 11:00" in innocuous-looking environments. Because, as we all know, supervillains love complexity in and of itself, and the ideal terrorist plan would look more baroque than a steampunk laptop on Boing Boing.
The latest threat to America's children is digital drugs, or MP3 files which affect the listener's brain to induce illegal and dangerous states of consciousness. Called "idozers", they're sold from web sites by evil drug dealers:
Some sites provide binaural beats that have innocuous effects. For example, some claim to help you develop extrasensory powers like telepathy and psychokinesis.
Other sites offer therapeutic binaural beats. They help you relax or meditate. Some allegedly help you overcome addiction or anxiety. Others purport to help you lose weight or eliminate gray hair.
However, most sites are more sinister. They sell audio files ("doses") that supposedly mimic the effects of alcohol and marijuana.
But it doesn't end there. You'll find doses that purportedly mimic the effects of LSD, crack, heroin and other hard drugs. There are also doses of a sexual nature. I even found ones that supposedly simulate heaven and hell.It gets worse than is. I have it on very good authority that paedophiles are using similar technologies to remotely molest children with penis-shaped sound waves. There's no evidence to prove it, but it is a scientific fact.
The fact that the audio files are allegedly being "sold" by evil drug dealers is a dead giveaway. If today's kids are willing and able to download the latest movies and music, would they really pay or MP3s alleged to get them high or simulate heaven or hell?
I wonder what the provenance of this absurdity is. Could it be a particularly desperate RIAA-instigated black-ops campaign to bring the full force of the War On Drugs to bear against uncontrolled file-sharing and/or lock down the internet?
Another milestone in the prolonged death of USENET: US ISP Verizon has removed the unregulated alt.* hierarchy, along with all other newsgroups that aren't formally regulated, on the grounds that they are a stagnant pond that breeds paedoterrorists:
Cuomo claimed that his office found child porn on 88 newsgroups--out of roughly 100,000 newsgroups that exist. In a press release, he took credit for the companies' blunderbuss-style newsgroup removal by saying: "We are attacking this problem by working with Internet service providers...I commend the companies that have stepped up today to embrace a new standard of responsibility, which should serve as a model for the entire industry."
The alt.hierarchy is even more extensive. In the discussion thread attached to our earlier story, one of our readers said: "This is ridiculous. I actually met my wife on alt.personals, 14 years ago... I still use usenet - there are a lot good discussions and a person can get answers to questions on specific topics pretty quickly. It's nice to have a decentralized place to hold discussions, one that is not beholden to a sysadmin to correctly run a forum, one that's free of blinking gifs and flash ads."
The Untold History of Toontown's SpeedChat, or an account of what happened when some pioneering virtual-community software developers accepted a commission from Disney to build an online community site—one compliant with Disney's values, so that "there could be no swearing, no sex, no innuendo, and nothing that would allow one child (or adult pretending to be a child) to upset another ... No kid will be harassed, even if they don't know they are being harassed.".
"We spent several weeks building a UI that used pop-downs to construct sentences, and only had completely harmless words - the standard parts of grammar and safe nouns like cars, animals, and objects in the world."
"We thought it was the perfect solution, until we set our first 14-year old boy down in front of it. Within minutes he'd created the following sentence:
I want to stick my long-necked Giraffe up your fluffy white bunny.
They added a method to allow direct chat between users that involves the exchange of secret codes that are generated for each user (with parental permission). The idea is that kids would print them out and give them to each other on the playground. This was a great way for Disney to end-run the standard - since Speed Chat was an effective method of preventing the exchange of these codes, and theoretically the codes had to be given "in-person", making the recipient not-a-stranger. Sure, some folks post them on message boards, but presumably those are folks who 1) are adults, or 2) know each other, right? In any case, as long as no one could pass secret codes within Toontown itself, Disney feels safe.The author, Randall Farmer, coined from this the SpeedChat Corollary: "By hook, or by crook, customers will always find a way to connect with each other."
(via BoingBoing (indirectly))
It has emerged that children in Britain are posing as paedophiles online to intimidate each other.
Officers have warned parents and children to be vigilant after as many as nine youngsters in Padstow, Cornwall, were targeted through the networking sites Bebo and MSN. Police initially believed a local man was trying to groom the children by befriending them online and arranging to meet them. But a member of the public has come forward and told them that youngsters are trying to settle playground disputes by posing as a paedophile to frighten their rivals.
A spokesman for Devon and Cornwall police said: "Information from the public has highlighted a possibility that the offenders could be children aged 10 and over, masquerading as a paedophile. The investigations are continuing and at this moment we are looking into every line of inquiry and are not ruling out any possibility. However, the language used on the social networking sites such as Bebo and MSN is at times childish. It could be youngsters playing a sick game to try and intimidate friends they have fallen out with. This will be treated seriously and we will be contacting the families of the children involved and we will try and help them by involving social services."Granted, a lot of this is the inevitable modern variant of kids trying to scare each other with imaginary serial killers/monsters/urban myths, updated for the age of paedoterror, though it wouldn't surprise me if, in these jumpy times, some 12-year-old ended up on the sex offenders' register after pulling such a stunt.
(via Boing Boing)
In today's paranoid age, controlling parents have ever-increasing options for monitoring everything their children do:
The SnoopStick looks like a memory stick. You plug it into your teenager's computer when they are not around, and it installs stealth software on to the machine. Then you plug it into your own computer and can sit back at your leisure and observe, in real time, exactly what your child is doing online - what websites they are visiting, the full conversations they are having on the instant messenger (IM) service, and who they are sending emails to. It is as if you are sitting and invisibly spying over their shoulder.
Significantly, the £37.50 device comes with the warning that, if you use it to monitor an employee's computer without notifying them, you may well be in breach of employment laws. But install it secretively on the computer of your teenager, who has absolutely no rights at all, and no one can touch you. The moral argument doesn't come into it.
The following devices, please note, are not just being marketed to private detectives to catch errant spouses; they are being targeted at parents of teenagers. You can get clothes with tracking devices fitted into them. You can fit such devices covertly into mobile phones. For $149 you can purchase a mobile spy data extractor, which reads deleted text messages from a SIM card. For $79 you can buy a semen detection kit, to test your teenage daughter's clothing. And for $99, if you really want to ape the mad ex-Marine father in American Beauty, you can buy a drug identification kit which can detect up to 12 different illegal drugs.
The SnoopStick symbolises the modern obsession with control. The American psychologist Robert Epstein, who wrote the controversial book The Case Against Adolescence, estimates that young Americans are now ten times more restricted than adults, and twice as restricted as convicted criminals. He says teenagers are infantilised and deprived of human rights. As well as the obvious legal bar to prevent them smoking, drinking, marrying, voting and gambling, teenagers have no privacy rights, no property rights, no right to sign contracts or make decisions regarding their own medical or psychiatric treatment.
The practice of street photography, taking spontaneous photographs in public places, is under threat, as photographers find themselves lumped in with the shadowy paedoterrorist hordes who are out to kill us all and molest our children:
In the past year, the photography blogs have buzzed with tales of harassment, even violence. There's the war photographer who dodged bullets abroad only to be beaten up in his own South London backyard by a paranoid parent who (wrongly) thought his child was being photographed. There's the amateur photographer punched prostrate in the London Tube after refusing to give up his film to a stranger; the case of the man in Hull, swooped on by police after taking photographs in a shopping centre. “Any person who appears to be taking photos in a covert manner should expect to be stopped and spoken to by police ...” ran the Humberside force's statement.
Sophie Howarth is a curator specialising in street photography. She says she's noticed - despite the difficulties - a boom for the art, enabled by technology, and with London at the centre. “In France, traditionally one of the great centres of street photography, the law now says you own the rights to your own image, so street photography's become a dead art. In London there's a growing community of photographers, using digi- tal technology, not just cameras, but blogs, too, to document the city and give each other instant feedback.”When did the law in France change? Was that one of Sarkozy's neo-Galambosian intellectual-property-maximalist reforms, like pushing for EU-wide copyright term extension?
“I'm not going to belittle the issue of terrorism, but this is paranoia. And unfortunately, since Lady Di and now this link with terrorists, photography's seen by many people as something that's a little ... cheap.”
As we dig in for the long siege and see potential terrorists in every shadow, the war on terror is, according to Bruce Schneier, turning into a war on the unexpected, with untrained civilians encouraged to report anything out of the ordinary, and the authorities escalating such reports to full-blown incidents:
We've opened up a new front on the war on terror. It's an attack on the unique, the unorthodox, the unexpected; it's a war on different. If you act different, you might find yourself investigated, questioned, and even arrested -- even if you did nothing wrong, and had no intention of doing anything wrong. The problem is a combination of citizen informants and a CYA attitude among police that results in a knee-jerk escalation of reported threats.
This story has been repeated endlessly, both in the U.S. and in other countries. Someone -- these are all real -- notices a funny smell, or some white powder, or two people passing an envelope, or a dark-skinned man leaving boxes at the curb, or a cell phone in an airplane seat; the police cordon off the area, make arrests, and/or evacuate airplanes; and in the end the cause of the alarm is revealed as a pot of Thai chili sauce, or flour, or a utility bill, or an English professor recycling, or a cell phone in an airplane seat.Schneier also links to this blog item, which shows that this principle is being extended towards the padeophile end of the paedoterrorist axis; apparently, in Virginia, a father holding his young daughter's hand is a sign of probable sexual abuse.
Legal fictions are a powerful thing; firstly unlicensed reproduction of copyrighted materials was equated with violent robbery at sea by being termed "piracy", and soon, at least in Sweden, it may be categorised as a form of paedophilia. Well, it had to be either that or terrorism...
In Britain, the police are arresting people for accessing open wireless access points without permission:
The man arrested at the weekend was cautioned for dishonestly obtaining electronic communications services with intent to avoid payment.According to the authorities, accessing wireless networks without permission is, much like downloading MP3s and skipping ads on TV, theft:
"Gaining unauthorised access to someone else's network is an offence and people have to take responsibility for their actions. Some people might argue that taking a joy-ride in someone else's car is not an offence either," he said.Not only that, but leaving your access point open for strangers to use is strongly discouraged; not only is it taking away business from commercial service providers (a cardinal sin in Thatcherism-Blairism), but it is giving paedoterrorists a convenient rock to hide under:
"There have been incidences where paedophiles deliberately leave their wireless networks open so that, if caught, they can say that is wasn't them that used the network for illegal purposes," said NetSurity's Mr Cracknell.
Such a defence would hold little water as the person installing the network, be they a home user or a business, has ultimate responsibility for any criminal activity that takes place on that network, whether it be launching a hack attack or downloading illegal pornography.I wonder whether that would hold up in court; could someone be successfully prosecuted for a crime committed by a stranger using their unsecured network? Perhaps a new crime of "facilitating evasion of surveillance" would be appropriate?
The BBC article provides the following helpful advice to anyone with a wireless access point wishing to avoid ending up on the Sex Offenders' Register:
There are many different types of security options available - but the most basic is to give the network a Wireless Encryption Protocol (WEP) key.
While not totally secure, WEP keys do at least provide a modicum of security to thwart all but the most technically-literate hackers.Well, them and any script kiddie who can download a WEP cracking program and run it for a few minutes.
A US television station blows the lid off "leetspeak", and the paedophilic menace lurking behind its innocent-sounding acronyms:
"LOL" for "laughing out loud" and "TTYL" for "talk to ya later" sound innocent enough, but if you look behind some other acronyms, there could be something sinister.
Apparently the instruction to get one's pants off is so common in the seamy teenage underworld of online chat that there's a four-letter acronym for it.
- "KPC" means "keeping parents clueless."
- "POS" means "parent over the shoulder"
- "GYPO" means "get your pants off."
- "TDTM" means "talk dirty to me"
The article also includes links to helpful websites with names like "Teen Angels" and "Parents' Edge", which specialise in listing the telltale signs your children may be being preyed on by
satanists paedophiles via Dungeons & Dragons online chatrooms.
BBC Newsnight's Adam Livingstone sets the record straight on paedophiles, terrorists and file sharing:
First though, an apology. File sharing is not theft. It has never been theft. Anyone who says it is theft is wrong and has unthinkingly absorbed too many Recording Industry Association of America press releases. We know that script line was wrong. It was a mistake. We're very, very sorry.
If copyright infringement was theft then I'd be in jail every time I accidentally used football pix on Newsnight without putting "Pictures from Sky Sport" in the top left corner of the screen. And I'm not. So it isn't. So you can stop telling us if you like. We hear you.With the intellectual-property industry (whose word-magicians are responsible for the "copying = theft" syllogism) making up an ever-increasing section of the economy of the West, and thus commanding the attention of politicians and bureaucrats, I wonder how much pressure will be brought to bear from high up for this particular Livingstone to be censured or sacked, and the BBC to toe the line.
The rest of the article goes on about ISPs blocking BitTorrent, other clients using encryption to bypass the blocks, and the resulting increase in encrypted content on the net allowing suspicious encrypted paedoterrorist communications, which would have otherwise drawn the security services' attention, to sink into the encryption soup unnoticed.
(via Boing Boing)
The latest salvos in the War on Intellectual Property Terrorism: Paypal have unilaterally suspended donations to Freenet, an underground crimeware project allowing data to be distributed anonymously with no provision for law enforcement monitoring, thus providing a safe haven for paedophiles, terrorists and dissidents living under oppressive regimes. Freenet is not technically illegal (except perhaps in Japan), though appears to be being de facto outlawed and driven further underground through third-party sanctions. You can still contribute to Freenet by using E-Gold, an alternative online currency favoured by heavily armed anarchist militia whackos and the tinfoil hat crowd.
Microsoft announces that they're shutting down all unsupervised chat rooms because of paedophiles. A few days later, Senator Alston, the Savonarola of Canberra, issues a statement praising the action, and saying how this will force other operators to shut down their chat rooms as well. You can almost see the glee in his beady little eyes as he contemplates the golden age of shame-based morality and self-righteous busybodyism this will usher in, in which everybody is their brother's keeper and private moral lapses (from morality as defined by our spiritual leaders) have serious public consequences.
The US Department of Defense recently investigated ways of redesigning the Internet to eliminate that pesky anonymity that allows terrorists, paedophiles, drug traffickers, Green Party activists and evil, evil people to go about their dastardly deeds undetected. After attempting to fudge a politically expedient result (or at least one likely to get money thrown in its direction, in the name of "national security"), they concluded that it was impractical and scrapped the idea.
I wonder how long until the MPAA/RIAA revive the idea and start pushing hard for Internet protocols to be rewritten to stamp out this un-American "file sharing" idea and protect their business models, late capitalism and the American Way.