9 | | While the seizure by the government of any equipment is pernicious and damaging, the reason the FBI has given for this seizure actually makes it extraordinarily dangerous. The FBI is investigating bomb threats being made to facilities and people at the University of Pittsburgh and believes that one of the servers used to email these threats was an anonymous email server operated by ECN. These servers have no logs or traces of who used them and so the FBI will not get any useful information from them; there is no useful purpose to the seizure. |
| 14 | While the seizure by the government of any equipment is pernicious and |
| 15 | damaging, the reason the FBI has given for this seizure actually makes it |
| 16 | extraordinarily dangerous. The FBI is investigating bomb threats being made to |
| 17 | facilities and people at the University of Pittsburgh and believes that one of |
| 18 | the servers used to email these threats was an anonymous email server operated |
| 19 | by ECN. These servers have no logs or traces of who used them and so the FBI |
| 20 | will not get any useful information from them; there is no useful purpose to |
| 21 | the seizure. |
11 | | But a lot of harm could be done. Anonymous email is one of the most important parts of the Internet. One of the benefits of Internet technology is the ability to communicate world-wide: communication that is fundamental to the struggles of the world's people and the continued existence of the human race. In a period in which we have made massive compromises in our privacy -- and in which just about everything we do on-line can be tracked, logged, studied and used for all kinds of purposes -- there is one oasis from the glaring sunlight of intrusion: anonymous email and communication. |
| 23 | But a lot of harm could be done. Anonymous email is one of the most important |
| 24 | parts of the Internet. One of the benefits of Internet technology is the |
| 25 | ability to communicate world-wide: communication that is fundamental to the |
| 26 | struggles of the world's people and the continued existence of the human race. |
| 27 | In a period in which we have made massive compromises in our privacy -- and in |
| 28 | which just about everything we do on-line can be tracked, logged, studied and |
| 29 | used for all kinds of purposes -- there is one oasis from the glaring sunlight |
| 30 | of intrusion: anonymous email and communication. |
13 | | Government information revealers, whistleblowers, critics within institutions, organizers who fear police repression -- they all use anonymous email. In fact, anonymous email is one of the primary tools of the democracy movement unfolding worldwide (particularly in the Middle East). Without it, such movements would have had much greater difficulty organizing and would face much greater danger and repression. Without it, our already too limited knowledge of what government and corporations actually do in our name and against our interests would be even more limited. Without it, the Internet becomes little more than a caricature of its true potentical and purpose. |
| 32 | Government information revealers, whistleblowers, critics within institutions, |
| 33 | organizers who fear police repression -- they all use anonymous email. In fact, |
| 34 | anonymous email is one of the primary tools of the democracy movement unfolding |
| 35 | worldwide (particularly in the Middle East). Without it, such movements would |
| 36 | have had much greater difficulty organizing and would face much greater danger |
| 37 | and repression. Without it, our already too limited knowledge of what |
| 38 | government and corporations actually do in our name and against our interests |
| 39 | would be even more limited. Without it, the Internet becomes little more than a |
| 40 | caricature of its true potentical and purpose. |
17 | | Obviously, the use of the technology made by this author of threats is horrible. We at MF/PL have never condoned threats of violence, terroristic activities or the use of Internet technology to frighten people and disrupt their lives. This runs counter to our vision of the reason the Internet exists and its proper use. And we are deeply troubled by the pain caused so many people by these sociopathic activities. |
| 47 | Obviously, the use of the technology made by this author of threats is |
| 48 | horrible. We at MF/PL have never condoned threats of violence, terroristic |
| 49 | activities or the use of Internet technology to frighten people and disrupt |
| 50 | their lives. This runs counter to our vision of the reason the Internet exists |
| 51 | and its proper use. And we are deeply troubled by the pain caused so many |
| 52 | people by these sociopathic activities. |
21 | | As we have said in the past, we will never give up information about our members. We will also aggressively seek the return of the computer the FBI stole from us and other legal rememedies against those who collaborated in the trouncing of our rights. And, in that context, we will assertively defend the use and protection of the anonymous email system world-wide and resist any actions that might harm it. |
| 59 | As we have said in the past, we will never give up information about our |
| 60 | members. We will also aggressively seek the return of the computer the FBI |
| 61 | stole from us and other legal rememedies against those who collaborated in the |
| 62 | trouncing of our rights. And, in that context, we will assertively defend the |
| 63 | use and protection of the anonymous email system world-wide and resist any |
| 64 | actions that might harm it. |