From: Matthew T. Russotto on
chip planted under the skin and an
* identification number. The chip would transmit a signal that would bounce
* off a satellite and be picked up by police on a computer-screen map."
*
* The syringe implantable biochip
*
* Which brings us to what is undoubtedly the most fearsome potential threat
* in the surveillance arsenal -- one that should raise the hairs on the neck
* of even the most trusting techno-child of the nineties. It is the
* implantable biochip transponder.
*
* When implanted under the skin of the subject, the biochip will emit low
* frequency FM radio waves that can travel great distances e.g., some miles
* up into space to an orbiting satellite. The transmission would provide
* information on the exact location of the "chipee": his latitude, longitude
* and elevation to within a few feet anywhere on the planet.
*
* The April 2nd, 1989 Marin Independent Journal discussed the theory of
* biochip implants in humans. Tim Willard, the then- executive officer of
* the World Future Society and managing editor of its monthly magazine.
*
* The Futurist, noted that with a little refinement, the microchip could be
* used in a number of human applications. He stated: "Conceivably, a number
* could be assigned at birth and go with a person throughout life."
*
* The article continued: "Most likely, he added, it woud be implanted on
* the back of the right or left hand fo


From: Pubkeybreaker on
expression of their people, had sham laws and sham courts, all
dedicated to maintaining the power of the all-important State.

How the philosophy of communism was the rights of the individual were
subservient to the needs of the State, as determined by the State.
i.e. the antithesis of constitutional democracy

Ironically, it was the United States that built
the ultimate Orwellian surveillance mechanism.

There was no public discussion about it.

And used sham laws: Executive Orders and Congressional legislation.

To create a secret agency and a secret sham court.


Used repeatedly to control lawful domestic political protest.

The Soviet Union and China we were told to fear.


******************************************************************************
******************************************************************************
******************************************************************************


Part 2: On Monitoring and Being Monitored
---- - -- ---------- --- ----- ---------

o On Monitoring
- Driver's Seat
- Five Months Statistic


From: Matthew T. Russotto on
The New York Times, 9/6/1995
#
# The Justice Department confiscated the home of an elderly Cuban-American
# couple in Miami after the couple was arrested for playing host to a weekly
# poker game for family and friends.


* "Nynex Mistake Brings Scholarship Offer", NYT, 4/26/1995
*
* Walter Ray Hill, 18, was arrested and jailed for two days based solely on
* his phone number being used for a hoax bomb threat.
*
* Nynex eventually realized one of its employees transposed a number when
* tracing the call. [Ever see Terry Gilliam's movie Brazil?]
*
* A Nynex spokesman said today that they were offering to pay his complete
* four-year tutition bill, and that the offer was unconditional.


In Washington, D.C., police aggressively hassle motorists to give them
permission to search their vehicles. On C-SPAN, U.S. Attorney Eric Holder
further states that if a member of the car makes "furtive gestures" the
police may search the car.

Question: If sweating at the airport can get you a deep probing anal
search by a manly security guard, what "furtive gesture"
will get your car searched when the police stop you and
shine a flashlight in your face?

A


From: fortune.bruce on
track individual people and deduct tolls or
# bus fares.


* REMARKS PREPARED FOR DELIVERY
* Technology and Privacy in Intelligent Transportation Systems
* http://weber.ucsd.edu/~pagre/cfp-its.html Phil Agre :pagre(a)ucsd.edu
*
* Conference on Computers, Freedom, and Privacy San Francisco, March 1995
*
* Intelligent Transportation Systems (ITS) are being developed in most of
* the industrialized countries. Promoters of such systems envision
* information technology being applied to transportation systems in a
* variety of ways, primarily on public highways. Applications extend from
* wireless provision of traffic information to drivers to automatic
* toll-collection to law enforcement to totally automated vehicles.
*
* ITS may entail the collection of large amounts of information on the
* travels of particular people, for example through the automatic
* collection of tolls through road-side radio beacons that interact
* with transponders attac


From: tchow on
he
* opened fire on them, was unarmed when he was killed.
*
* A spokesman for the FBI, Ann Todd, declined to discuss the discrepancy
* between the FBI's initial report that Mr. Byrd had shot at members of
* the FBI task force and the subsequent discovery by the Union County
* Prosecutor that he was unarmed.
*
* The FBI shot Mr. Byrd to death as he hid under a bed from them.


The FBI had Varelli "plant" a gun.

Thus giving CISPES a terrorist organization designation.

Not only did the FBI hassle them big time, but also the FBI/NSA broke
nationwide into homes and offices that were associated with them and
many other groups, including lawyers offices and churches.

In almost every incident, documents and files were ransacked while office
equipment and other valuable items were left untouched.

# "Foes of Reagan Latin American Policies Fear They're Under Surveillance"
# By David Burnham, The New York Times, April 19, 198?
#
# Among those who have cited incidents Sara Murray, staff organizer with
# the Michigan Interfaith Committee on Central American Rights, said that
# her organization made three separate first-class mailings in the last
# few months but that only one out of about 100 letters was ever delivered.
#
# The Post Office denied any responsibility.
#
# Miss Murray also said someone had broken into her Detroit office and
# stolen a mai