From: Phil Carmody on
Freeh indicated that if five years from now the FBI had solved the
: * access problem but was only hearing encrypted messages, further
: * legislation might be required.
: *
: * The obvious solution: a federal law prohibiting the use of any
: * cryptographic device that did not provide government access.
: *
: * Freeh's hints that the government might have to outlaw certain kinds
: * of coding devices gradually became more explicit. "The drug cartels
: * are buying sophisticated communications equipment", he told Congress.
: * "Unless the encryption issue is RESOLVED soon, criminal conversations
: * over the telephone and other communications devices will become
: * indecipherable by law enforcement. This, as much as any issue,
: * jeopardizes the public safety and national security of this country."

Louis Freeh, banging the Drums of War.


It's official:

* http://epic.org/crypto/ban/fbi_dox/impact_text.gif
*
* SECRET FBI report
*
* NEED FOR A NATIONAL POLICY
*
* A national policy embodied in legislation is needed which insures
* that cryptography use in the United States should be forced to be
* crackable by law enforcement, so such communications can be monitored
* with real-time decryption.
*
* All cryptography that cannot meet this standard should be prohibited.



The U.S. asked the OECD to agree to internationally required Key Recovery.

* What Is The OECD
*
* The Organization for Economic Co-operation and Development, based in
* Paris, France, is a unique forum permitting governments of the
* industrialized democracies to study and formulate the best policies
* possible in all economic and social spheres.

: From owner-firewalls-outg


From: quasi on
national welfare, benefits and immigration programs. In
* recent contracts, technology from Fingerscan has replaced traditional
* password systems at the White House and at the U.S. Strategic Air Command.
*
* Fingerscan, an Identix company, provides biometric identification in
* the form of a three dimensional scan of a fingerprint, captured when a
* finger is held against a Fingerscan device, a self-contained terminal
* that stores finger records, keeps a log of transactions and interacts
* with other devices.
*
* The terminal works by mapping, recording and storing data contained in
* a 3-D scan of various dimensions of the entire finger - including skin
* patterns and reflections and blood flow - for subsequent comparison.

Oh my gawd, a Universal Biometric Card!

What losers are getting one?

* Sandia and Coms21, currently engaged in an agreement to support the
* People's Republic of China's driver license and national ID card
* program, have partnered to create a fraud-proof solution for on-the-spot
* positive identification of card bearers.
*
* This combination features Sandia's personalization printing and encoding
* technologies that add photos and encode chips onto smart ID cards.
*
* Coms21's hand-held smart card readers then provide portable verification
* of cardholders' personalized information by bringing smart-card stored
* photos, text and graphics up on a screen.

# With the Universal Biometric Car


From: JSH on
' could not be described!


******************************************************************************


Cybernetic control of society
---------- ------- -- -------

You are about to encounter the true use of the 'cyber' prefix.

Cybernetics is a cross-disciplinary science. The name was coined by
Norbert Wiener [pron. whiner], who was a professor of mathematics at
MIT, and did radar and firing-feedback mechanisms for the U.S. in
World War II. Cybernetics describes the complex of sciences dealing
with communication and control in the living organism AND in the
machine. Its application is sometimes called operations research.

I personally rank Norbert Wiener above Albert Einstein.

Operations research is a difficult discipline --- I certainly don't understand
it --- but when it was desperately needed during World War II, the U.S. Dept.
of War went for it gung-ho, rightfully. Signals intelligence (SIGINT) is the
first step...the NSA grew out of these wartime operations research efforts.

To seek out information from noise, then act on the information.

Target accuracy for precision high altitude bombing requires
a complex feedback mechanism to control deployment (pre-GPS WW II).

* My dad:
*
* Norden bombsights revolutionized aerial bombing.
*
* They were so accurate we stopped putting explosives
* in the bombs and just aimed for people.

Communications, Command and Control. The above wasn't really the best
example of OR, but I did get to quote my dad again. ;-)

* "The Future of War - Power, Technology, and American World Dominance in
* the 21st Century", by George & Meredith Friedman, 1996, ISBN 0-517-70403-X
*
* A discipline named operations research had begun to develop prior to World
* War II that aspired to use quantitative methodologies to develop a science
* of management. [snip]
*
* For the physicists and mathematicians of the Rand Corporation, the
* intuitio


From: Rotwang on
> out and sure enough, she is Kurt Russel's little sister! I got her phone
> number, but boy she is a big LOSER.

This email didn't contain his age, yet I knew it and many other things about
him simply from collecting them over time. I had no special need to do so,
but found it could add important detail to a security incident report. As
previously shown, for an incident report on someone working on their own job
within the firm I compared the capabilities of the code he sent out to his
own job description which he transmitted in his resume many months prior.

Why waste information that's just flying by for the taking?

Care for a fun conspiracy theory?

If I were pro-ECHELON, I would monitor all the Senators and ALL their staff
AND all their families. That's just to start. I would also monitor ALL
up-and-coming politicians.

You never know when you're going to need to squeeze some support out of them.

Has Bill Clinton been compromised by NSA ECHELON monitoring?

* "The Secret War Against the Jews", Authors: John Loftus and Mark Aarons
*
* A large number of American candidates for public office have been placed
* under electronic surveillance by British intelligence officers sitting
* at their "temporary listening post" at Fort Meade.
*
* An admittedly secondhand source insists that the British eavesdroppers
* were the source of the 1992 campaign stories that presidential candidate
* Clinton had expressed pro-Soviet views while a student in London.
*
* Young Clinton's remarks were nothing more than an ambiguous comparison
* of Soviet and American efforts for peace in Vietnam, fairly innocent at
* the time.
*
* Because the wiretap itself could not be disclosed, it set off a scurry
* of searching through archives on both sides of the Atlantic for any
* incriminating documents. There was none, and in


From: Phil Carmody on
service," said Col. L.N. Hagan, DPS director. The new system offers
* faster production of the license as applicants receive them within one
* week, rather than three to four weeks required by the current system.
*
* The new system also features simplicity of operation at work stations
* and enhanced on-line help for probate judge/license commissioner issuing
* clerks.
*
* The Sandia system produces fully digitized photos and signatures of the
* holder and combines them with demographic and graphic text, which is all
* printed in a single pass on the front and back of a composite polyester-PVC
* card. The card's front is three different colors and has a secure
* holographic overlay.

Digitized signatures? I've started signed 'X' for UPS, since they'll post
your signature to the Internet.

Well, at least there's no biometric information!

Is there?

* How convenient that only 7 months after Sandia scored the drivers
* license contract, DPS decides it will quietly (without any vote)
* implement rules requiring fingerprinting and barcoding on Alabama
* drivers licenses -- which Sandia specializes in -- just like they are
* doing in Communist China!
*
* Your papers, Comra