From: JSH on 18 Apr 2008 22:18 are on record at Fort Meade. * "The End of Ordinary Money, Part I", by J. Orlin Grabbe * http://www.aci.net/kalliste * * The most important communications network for international financial * market transactions is the Society for Worldwide Interbank Financial * Telecommunication (SWIFT), a not-for-profit cooperative. * * This system for transferring foreign exchange deposits and loans began * actual operation in May 1977 and by 1990 had 1,812 members, and connected * 3,049 banks and securities industry participants in eight-four countries. * * In 1993 SWIFT began asking users of its messaging system to include a * purpose of payment in all messages, as well as payers, payees, and * intermediaries. This type of arrangement would allow NSA computers * to use keyword monitoring to scan for any names in which they were * interested. ! FBI Director Louis J. Freeh, Senate Judiciary Committee, June 4, 1997 ! ! NOT THAT LONG AGO, NO ONE PERCEIVED THAT TELEPHONE SYSTEMS COULD BECOME !
From: Risto Lankinen on 18 Apr 2008 20:48 ", the Internal * Revenue Service seized $88,315.76, the life savings of a hard-working * immigrant. * * The government, of course, had no evidence that Alvarez was using the * money for improper purposes, or was in any way connected with drugs or * drug-dealing, for the simple reason that he wasn't doing any such thing. * * In this case, under the astonishing provisions of our nation's asset * forfeiture laws, the mere administrative finding that Alvarez had * "structured" his transactions was enough to justify the seizure. [ We have Federal laws against terminating someone's benefits based solely (automatically by computer) on "computer matching" hits of possible ineligibility. But NOTHING to protect us from this nearly IDENTICAL use of computer data to terminate "benefits". ] * To the government, the question of whether the money had been legally * earned or was the product of a nefarious drug sale was of no concern. * * Maybe worse than the nebulous structuring provision is a feature of the * same group of laws that places the burden of proof on the victim. In
From: Marshall on 18 Apr 2008 19:32 to true law * and order. ! "Welfare Recipients Lose Benefits Through Glitches in Computers" ! By Joe Sexton, The New York Times, 5/16/96 ! ! The fingerprint-imaging system that is a central element of the Giuliani ! administration's effort to crack down on welfare fraud has resulted in ! hundreds of recipients cases being closed. ! ! The public advocate's office has been inundated with complaints from ! improper case closings. ! ! The failure seems to stem from the local offices not transmitting the ! fingerprints to Albany's central computer. This resulted in AUTOMATICALLY ! TERMINATING BENEFITS OF PEOPLE THE COMPUTER THOUGHT WERE NOT FINGERPRINTED. ---- Prior to the fingerprint "final solution" of control over us, there were other attempts---which would have required a vote---which tried to roll out a National ID Card. * "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5 * * Since total and absolute control can be obtained only by a Police State * bureaucracy, efforts have escalated in recent years to require a National * ID Card. * * Upon Bill Clinton's election as President, Secretary of Health and Human * Services Donna Shalala and Massachusetts Senator Edward K
From: Pubkeybreaker on 18 Apr 2008 18:47 Folmsbee v.Tech Tool Grinding & Supply Inc., 417 Mass. 338, 630 : N.E. 2d 586 (1994). It is totally urinating what the politicians and courts have allowed in the name of the Drug War. : Privacy Journal's War Stories, By Attorney Robert Ellis Smith : : Burlingame, CA, 1990: A flight attendant suffered medical complications : because of Federal requirements that compel drug-monitors to have : employees drink water until they can provide a urine sample. The 40-year- : old woman was unable to urinate in a random drug test. She drank three : quarts of water and even vomited some of it but could not urinate in the : noisy crowded test site. She became ill at home and a doctor diagnosed : her condition as "water intoxication." The lack of privacy inhibits : 25 percent of people from urinating, surveys show [JAMA 1/2/91]. Drug testing doesn't even work. Could there be a more important use for it than public safety? It made no difference to the drunk and sleepy subway motorman in the spectacular underground smash-up at the Union Square Station in NYC. Even if he had a drug test before his shift, he still would have had the accident. Non-invasive (eye-hand co-ordination and other) tests w
From: Rotwang on 18 Apr 2008 19:26
and consisted of a strict lecture about never, for the rest of his life, talking about his job with anyone except other indoctrinated people. GCSB workers are forbidden to say anything about their work, even to their partners. The indoctrination concluded with Holmes signing the two page indoctrination form, which refers to New Zealand laws for punishing infringements (in the Crimes Act) but which originates primarily in UKUSA regulations. Equivalent forms must be signed by staff throughout the UKUSA alliance. P44- In the middle of 1994 Holmes got his first overseas posting - and a prestigious one at that. He is on a three-year posting to the center of the UKUSA alliance, the enormous NSA headquarters at Fort George G. Meade. This posting was the first ever by a GCSB analyst to the NSA. Before he left New Zealand his daily work, like that of all analysts, revolved entirely around that most striking manifestation of GCSB's links with the NSA: the ECHELON Dictionary system. Each morning the signals intelligence analysts in New Zealand log on at their computer terminals and enter the Dictionary system, just as their equivalents do in the United States, the United Kingdom, Canada and Australia. What follows is a precise description of how the system works, the first time it has been publicly described. [Buy the book for full details] After entering their security passwords, the analysts reach a directory that lists the different categories of intercept available, each with a four digit code; 4066, for instance, might be Russian fishing trawlers, 5535 Japanese diplomatic traffic in the South Pacific, 4959 communications from South Pacific countries and so on. They type in the code for the category they want to use first that day. As soon as they make a selection, a 'search result' appears, stating the number of documents which have been found fitting that category |