From: S.C.Sprong on 18 Apr 2008 18:47 Canadian and American Intelligence Establishments" book by Mike Frost yet. So for now I'll quote from his article in CAQ, an issue entitled "The New Age of Surveillance". Covert Action Quarterly, Winter 1996-97, Number 59 1500 Massachusetts Ave. NW #732 Washington, DC 20005 202/331-9763, caq(a)igc.org, http://mediafilter.org/caq Article: "Second Thoughts from the Second Oldest Profession. Inside the US-Canada Spyworld." By Mike Frost [ Pictured is him on two of his Canadian security IDs ] I was a spy. For almost two decades, I spied for Canada's Communications Security Establishment (CSE), the most secret and least known branch of National Defense. But although my paycheck came from the Canadian government, more often than not, my orders, assignments, and much of my training --- like those of many other CSE operators --- came from the National Security Agency (NSA) in Fort Meade, Maryland. Over the twelve years I spied for CSE, it became increasingly to resemble the NSA. Both specialize in providing secure communications and signals intelligence (SIGINT); both operated for years with little public knowledge or legislative oversight until they were exposed by the media. [snip]
From: Rotwang on 18 Apr 2008 20:29 the existence of a highly sensitive and highly-available secret key or collection of keys that must be maintained in a secure manner over an extended time period. These systems must make decryption information quickly accessible to law enforcement agencies without notice to the key owners. These basic requirements make the problem of general key recovery difficult and expensive - and potentially too insecure and too costly for many applications and many users. Attempts to force the widespread adoption of key-recovery encryption through export controls, import or domestic use regulations, or international standards should be considered in light of these factors. The public must carefully consider the costs and benefits of embracing government-access key recovery before imposing the new security risks and spending the huge investment required (potentially many billions of dollars, in direct and indirect costs) to deploy a global key recovery infrastructure. ****************************************************************************** Government Steamroller ---------- ----------- Force anyone receiving government money to use crackable crypto? Import restrictions in the U.S.? Outlaw all non-government approved crypto? That would never happen...would it? : http://cgi.pathfinder.com/netly/ [search for article title] : : The Netly News : : Bill of Goods : : by Declan McCullagh May 9, 1997 : : Senate Democrats are preparing legislation : that requires universities and other groups : receiving Federal grants to make their : communication networks snoopable by the : government, The Netly News has learned. The : draft also includes penalties for "unauthorized : breaking of another's encryption codes," and : restrictions on importing encryption products. : :
From: Risto Lankinen on 18 Apr 2008 18:57 Reconnaissance Office National Law Enforcement Telecommunications System Projects Agency FEMA: Federal Emergency Management Agency OSI: Office of Special Investigations NCB: Triple I National Central Bureau FINCEN: Financial Crimes Enforcement Network CTC: Counter-Terrorist Center DIA: Defense Intelligence Agency LESS: Law Enforcement Satellite System CDIS: Combined DNA Identification System INTERPOL: International Criminal Police Organization ...and a slew of other systems, using a biometric number from all of us. And: that everyone at birth should be issued a biometric identity card. Biometric identification of everyone at birth. As Texe says, that must be to get all them terrorist babies. As I say, we all are viewed as presumed potentially guilty. That's why police hold guns to the heads of four-year-olds. The universal number assigned by the biometrics becomes your worldwide identification number. This was a serious proposal. The authors are associated with Interpol (one is a staff member) and the U.N. INTERPOL is essentially dependent on the NSA. Consider it an NSA p
From: Risto Lankinen on 18 Apr 2008 20:42 during this annual Black College Spring Break 'Freaknick' police coverage? The police also illegally ordered the videotaper to stop taping. ---- Recently on ABC Primetime live, they wired for video and sound a nice car owned by the father of the black son who drove it, with another black friend. BTW, picture yourself being a black citizen to try and appreciate this. Picture yourself as the monitored group. Shortly after starting out, they were pulled over by police for a search. Not one, but two squad cars came to do the search. Because they crossed lanes while going through an intersection. If you are white, when was the last time two squad cars searched your vehicle inch-by-inch because you crossed lanes while passing through an intersection? Never happened to me. The police were recorded saying a container they found "probably had drugs" in it. It was a make-up container. [All you little people are probably guilty] When ABC asked the police chief later why they were pulled over, he said for crossing lanes while going through an intersection. ABC's cameras then showed cars doing that constantly at the same intersection. They said they counted hundreds the same night. The police chief then tacitly admitted they were pulling over black people on purpose. ---- [ Yes, I am aware of the cocaine/crack sentencing discrimination. ] You monitor any group real close, you'll get many arrests. The implications of heavy monitoring are serious. * Jan 30 1997, The New York Times, page A12 * * Blacks make up 51 percent of the 1.1 million inmates in state and * Federal priso
From: fortune.bruce on 18 Apr 2008 20:11
Main() ---- Using mainly publicly available material, here is my documentation of: o Part 1: Massive Domestic Spying via NSA ECHELON This is highly detailed documentation of NSA spying. This spying is illegal, massive, and domestic. The documentation is comprehensive, especially since it is now brought together in this one section. o Part 2: On Monitoring and Being Monitored In this section, I describe the capabilities of ECHELON keyword monitoring. A detailed example --- how to use keywords to pick out conversations of interest --- is given. I also put forth a case of what it means to be monitored heavily by the government. o Part 3: 1984 Means a Constant State of War The politics of war, and the Orwellian tactics employed by by the U.S. Government to control its citizens. o Part 4: Why unlimited cryptography must be legislated NOW In additional to the reasons given in the previous sections, the 'debate' reasons constantly given by the government are reviewed and debunked. And our nation's experts say it will hurt security. The GAO says the same thing. o Part 5: There is no part five. o Part 6: Louis Freeh & The Creeping Police State Basically, Louis Freeh is the anti-Christ leading us to Hell. National ID cards are effectively being implemented without needing to issue cards. The U.S. Government is trying to monitor all phone calls and banking transactions, and have all equipment worldwide designed for their monitoring. They are bent on controlling the world to |