From: S.C.Sprong on
Canadian and American
Intelligence Establishments" book by Mike Frost yet.

So for now I'll quote from his article in CAQ, an issue entitled "The New
Age of Surveillance".

Covert Action Quarterly, Winter 1996-97, Number 59
1500 Massachusetts Ave. NW #732
Washington, DC 20005
202/331-9763, caq(a)igc.org, http://mediafilter.org/caq

Article: "Second Thoughts from the Second Oldest Profession.
Inside the US-Canada Spyworld."
By Mike Frost

[ Pictured is him on two of his Canadian security IDs ]

I was a spy. For almost two decades, I spied for Canada's Communications
Security Establishment (CSE), the most secret and least known branch of
National Defense. But although my paycheck came from the Canadian government,
more often than not, my orders, assignments, and much of my training ---
like those of many other CSE operators --- came from the National Security
Agency (NSA) in Fort Meade, Maryland.

Over the twelve years I spied for CSE, it became increasingly to resemble
the NSA. Both specialize in providing secure communications and signals
intelligence (SIGINT); both operated for years with little public knowledge
or legislative oversight until they were exposed by the media.
[snip]



From: Rotwang on
the existence of a highly sensitive and
highly-available secret key or collection of keys that must be maintained in a
secure manner over an extended time period. These systems must make decryption
information quickly accessible to law enforcement agencies without notice to
the key owners. These basic requirements make the problem of general key
recovery difficult and expensive - and potentially too insecure and too costly
for many applications and many users.

Attempts to force the widespread adoption of key-recovery encryption through
export controls, import or domestic use regulations, or international standards
should be considered in light of these factors. The public must carefully
consider the costs and benefits of embracing government-access key recovery
before imposing the new security risks and spending the huge investment
required (potentially many billions of dollars, in direct and indirect costs)
to deploy a global key recovery infrastructure.


******************************************************************************

Government Steamroller
---------- -----------

Force anyone receiving government money to use crackable crypto?

Import restrictions in the U.S.?

Outlaw all non-government approved crypto?

That would never happen...would it?

: http://cgi.pathfinder.com/netly/ [search for article title]
:
: The Netly News
:
: Bill of Goods
:
: by Declan McCullagh May 9, 1997
:
: Senate Democrats are preparing legislation
: that requires universities and other groups
: receiving Federal grants to make their
: communication networks snoopable by the
: government, The Netly News has learned. The
: draft also includes penalties for "unauthorized
: breaking of another's encryption codes," and
: restrictions on importing encryption products.
:
:


From: Risto Lankinen on
Reconnaissance Office
National Law Enforcement Telecommunications System Projects Agency
FEMA: Federal Emergency Management Agency
OSI: Office of Special Investigations
NCB: Triple I National Central Bureau
FINCEN: Financial Crimes Enforcement Network
CTC: Counter-Terrorist Center
DIA: Defense Intelligence Agency
LESS: Law Enforcement Satellite System
CDIS: Combined DNA Identification System
INTERPOL: International Criminal Police Organization

...and a slew of other systems, using a biometric number from all of us.

And: that everyone at birth should be issued a biometric identity card.

Biometric identification of everyone at birth.

As Texe says, that must be to get all them terrorist babies.

As I say, we all are viewed as presumed potentially guilty.

That's why police hold guns to the heads of four-year-olds.

The universal number assigned by the biometrics
becomes your worldwide identification number.

This was a serious proposal.

The authors are associated with Interpol (one is a staff member) and the U.N.

INTERPOL is essentially dependent on the NSA.

Consider it an NSA p


From: Risto Lankinen on
during this annual Black
College Spring Break 'Freaknick' police coverage?

The police also illegally ordered the videotaper to stop taping.

----

Recently on ABC Primetime live, they wired for video and sound a nice car
owned by the father of the black son who drove it, with another black friend.

BTW, picture yourself being a black citizen to try and appreciate this.

Picture yourself as the monitored group.

Shortly after starting out, they were pulled over by police for a search.

Not one, but two squad cars came to do the search.

Because they crossed lanes while going through an intersection.

If you are white, when was the last time two squad cars searched your
vehicle inch-by-inch because you crossed lanes while passing through
an intersection? Never happened to me.

The police were recorded saying a container they found "probably had drugs"
in it. It was a make-up container. [All you little people are probably guilty]

When ABC asked the police chief later why they were pulled over,
he said for crossing lanes while going through an intersection.

ABC's cameras then showed cars doing that constantly at the same intersection.
They said they counted hundreds the same night.

The police chief then tacitly admitted they
were pulling over black people on purpose.

----

[ Yes, I am aware of the cocaine/crack sentencing discrimination. ]

You monitor any group real close, you'll get many arrests.

The implications of heavy monitoring are serious.


* Jan 30 1997, The New York Times, page A12
*
* Blacks make up 51 percent of the 1.1 million inmates in state and
* Federal priso


From: fortune.bruce on
Main()
----


Using mainly publicly available material, here is my documentation of:


o Part 1: Massive Domestic Spying via NSA ECHELON

This is highly detailed documentation of NSA spying.
This spying is illegal, massive, and domestic.
The documentation is comprehensive, especially since
it is now brought together in this one section.

o Part 2: On Monitoring and Being Monitored

In this section, I describe the capabilities of ECHELON
keyword monitoring. A detailed example --- how to use
keywords to pick out conversations of interest --- is given.
I also put forth a case of what it means to be monitored
heavily by the government.

o Part 3: 1984 Means a Constant State of War

The politics of war, and the Orwellian tactics employed by
by the U.S. Government to control its citizens.

o Part 4: Why unlimited cryptography must be legislated NOW

In additional to the reasons given in the previous sections,
the 'debate' reasons constantly given by the government
are reviewed and debunked. And our nation's experts say it
will hurt security. The GAO says the same thing.

o Part 5: There is no part five.

o Part 6: Louis Freeh & The Creeping Police State

Basically, Louis Freeh is the anti-Christ leading us to Hell.
National ID cards are effectively being implemented without
needing to issue cards. The U.S. Government is trying to
monitor all phone calls and banking transactions, and have
all equipment worldwide designed for their monitoring. They
are bent on controlling the world to