From: Christian Siebert on 18 Apr 2008 19:11 that is how 'The Creeping Police State' works. Slowly, bit-by-bit. Slowly, State-by-State everyone in the U.S. is being fingerprinted. The FBI is now advocating biometric capture of all newborns too. This is an interesting manifesto, please take the time to read it. Cryptography can be used to keep private: Internet traffic, such as email, and telephone conversations (PGP phone). A version of PGP phone that looks and works like a normal telephone --- but can't be spied upon --- would eventually become wide-spread. It begins to change the mind-set that the Police State is inevitable. ---- Major references... In the last several years intelligence operatives, specifically including SIGINT (signal intelligence) people, have started telling the story about the massive domestic use of computer monitoring software in the U.S. Including our domestic phone calls, Internet, fax, everything. I'm going to quote a number of articles and books; they involved talking to over 100 of these intelligence operatives. Buy this book: "Secret Powe
From: fortune.bruce on 18 Apr 2008 19:57 sometimes be found in supermarkets. : : Mr. Hogshire was arrested for possession of dried poppy pods which can be : bought in most any florist's shop or craft store. : : The charges have finally been dropped. : : Prosecution is so rare his story made the cover of Harper's magazine. : : One police officer told him: : : "With what you write, weren't you expecting this?" * "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5 * * Individuals who have been arrested and their property seized will then be * transported with other dissidents to a Federal Prison Transfer Center for * proper "categorization" and "disposition." * * Entire families are to be disposed of in this manner. Final disposition, * when deemed appropriate, will be made at a regional Processing and * Detention Center. Other countries have called these 'concentration camps' * and 'gulags'. * * At these "Centers," methods and techniques of interrogation, torture and * final disposition honed and developed by the CIA and Special Forces Green * Berets through their 'Operation Phoenix' program are to be used on * victimized citizens. * * Operation Phoenix, during the Vietnam conflict, was responsible for the * arrest, incarceration, torture and mur
From: Risto Lankinen on 18 Apr 2008 21:09 to have the FCC or other agency approve or * reject equipment mainly on the basis of whether the FBI had the capacity * to wiretap it. The GSA further stated this would weaken security." [40] The FBI and Military are EXEMPT from any Key Recovery crypto requirements, BECAUSE IT WOULD SERIOUSLY WEAKEN NATIONAL SECURITY. CALEA even directs cable TV companies to restructure themselves for spying. What??? Why does the government want to see traffic BEFORE it reaches the Internet or public telephone networks? CALEA will give the FBI "legal" domestic listening posts. : The Washington Post Magazine, June 23 1996 : "Government surveillance, terrorism and the U.S. Constitution" : from Main Justice, by Jim McGee and Brian Duffy, 1996, ISBN 0-684-81135-9 : : The FBI is growing in tandem with the NSA. With the help of the National : Security Agency, the U.S. eavesdropping bureaucracy that spans the globe, : the FBI operates a super-secret facility in New York code-named Megahut : that is linked to the other FBI listening posts. : : After the OKC bombing, Janet Reno and Louis Freeh asked Congress to raise : to 3,000 the number of FBI agents working counter-intelligence and counter- : terrorism. : : With the new legislation, the funding for just the FBI's counter-intelli-
From: tchow on 18 Apr 2008 20:52 # number. A hand-held scanner can read the number much like a supermarket # scanner. # # The reason the government gave for the transponder was that both the doctor # and patient might lose track of what kind of breast implant was installed, # and so if a certain model had a recall, they could tell what was installed. # # # The American Textile Partnership, a research consortium linked to the U.S. # Department of Energy, is sponsoring a research called "Embedded Electronic # Fingerprint" to develop a transponder the size of a grain of wheat that # could be attached to a garment until the owner threw it out. # # Heretofor, this application has been considered only for security purposes. # # The definition of "security", according to the textile industry magazine # 'Bobbin', has been expanded to include "anti-counterfeit" tracking after # purchase. [What???] # # Could a machine-readable tag on a person's clothing serve many of the same # tracking
From: Pubkeybreaker on 18 Apr 2008 21:31
including SIGINT (signal intelligence) people, have started telling the story about the massive domestic use of computer monitoring software in the U.S. Including our domestic phone calls, Internet, fax, everything. I'm going to quote a number of articles and books; they involved talking to over 100 of these intelligence operatives. Buy this book: "Secret Power" by Nicky Hager, ISBN 0-908802-35-8. It describes in detail the ECHELON platform. It's one of the most important. New Zealand people are quite unhappy at their place within ECHELON. Buy this book: "Spyworld: Inside the Canadian and American Intelligence Establishments" By Mike Frost [NSA trained sigint person] and Michel Gratton, Toronto Doubleday 1994. Mr. Frost describes missions in the U.S. where he was trained by the NSA to handle domestic jobs that would be illegal for the NSA. These books are quite damning, in a heavily documented way. This is an AMAZINGLY COMPREHENSIVE BOOK: buy it! "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996 Buy this book: "The Secret War Against the Jews", Authors: John Loftus and Mark Aaro |