From: JSH on 18 Apr 2008 21:38 U.S. Constitution: : The story of a Washington courtroom no tourist can visit. : By Jim McGee and Brian Duffy [snipped article excerpts shown here] : Adapted from the book "Main Justice", 1996, ISBN 0-684-81135-9. : * Last year, a secret court in the Justice Department authorized a record * 697 'national security' wiretaps on American soil, outside normal * constitutional procedures. * * The Foreign Intelligence Surveillance Act, is a 1978 law that permits * secret buggings and wiretaps of individuals suspected of being agents * of a hostile foreign government or international terrorist organization * EVEN WHEN THE TARGET IS NOT SUSPECTED OF COMMITTING ANY CRIME. * * The FISA court operates outside the normal constitutional standards for * searches and seizures. Non-government personnel are not allowed. * The courts files cannot be publicly reviewed. * * The average U.S. citizen might reasonably assume use of this court * is at the least: unusual. * * It is not. In fact, in the United States today it is increasingly * common. In 1994, federal courts authorized more wiretaps for * intelligence-gathering and nati
From: Risto Lankinen on 18 Apr 2008 22:12 // by law and will result in prosecution. // // // //////////////////////////////////////////////////////////////////////// o Risk Management reports ("positions") caught outbound, including DRMS (Derivatives) going to someone who started working for Merrill Lynch o Risk Management reports inbound: Phibro positions [Salomon subsidiary] o Internal product documentation and trading desk procedures outbound o Many hostname/username/password transmissions for Salomon's internal systems o Many Sybase database passwords, including SA passwords o People working on their own businesses while within Salomon o Someone soliciting people for porno videos from Salomon o Phibro Chart of Accounts and internal accounting procedures o Year-end summary of lawsuits filed against subsidiary Basis Petroleum o Pirating of third-party copyright programs o Other firms' IUO (Internal Use Only) inbound o Our detailed systems inventory o Determined what PGP (encrypted) traffic was occurring. Among others, we had constant small traffic back-and-forth with Military contractor Rockwell. o Salomon's Official Restricted List being repeat
From: Christian Siebert on 18 Apr 2008 20:12 * * How could this be done? * * The basic idea was that crucial indices of performance in every plant * should be transmitted daily to the computers, where they would be * processed and examined for any kind of important signal that they * contained. If there was any sort of warning implied by these data, * then an alerting signal would be sent back to the managers of the * plant concerned. What are 'arousal filter' and 'homeostatic loops'? The scope of Cybernetics is, in a word, awesome. A cyberneticist can talk from atoms to cells to nervous systems, to management of a company, country, world, solar system. Whether an organism is mechanical, biological or social, it requires a feedback mechanism to survive. Your nervous system does some amazing things to fight off infections. It creates custom anti-bodies to attack foreign microbes. Custom living cells created through a system of feedback to spot that there was a problem, analysis of the problem, action on the problem. This is a life-sustaining feedback 'homeostatic' loop. [bracket comments are mine] When Stafford Beer says Cyberstride needed to filter 'homeostatic loops': * "The Human Use of Human Beings - Cybernetics and Society" * by Norbert Wiener, 1954, pre-ISBN * * The process [such as that employed by our nervous system] by which we * living beings resist the general stream of corruption and decay is * known as homeostasis. Stayin' alive, stayin' alive... So, "statistical filtration for all homeostatic loops" means one is checking on the health of the monitored system. The cybernetician uses the same language for feedback of weapons systems (picking out a submarine from the background noise of the ocean) as they do for describing human life, as they do for the political organization of a country. Like I said, an awesome scope. Norbert Wiener even came up with a physics-based description of how life is
From: quasi on 18 Apr 2008 22:16 ENCRYPTION WILL ALLOW DRUG LORDS, TERRORISTS, AND EVEN VIOLENT GANGS [Secret Service to Ed Cummings: "We are the biggest gang in town"] TO COMMUNICATE WITH IMPUNITY. OTHER THAN SOME KIND OF KEY RECOVERY SYSTEM, THERE IS NO TECHNICAL SOLUTION. As if real terrorists or drug lords would use Key Recovery crypto! Furthermore, Freeh is arguing BOTH SIDES of the issue when he complains "DRUG LORDS ARE NOW SUPPORTED BY THE BEST TECHNOLOGY MONEY CAN BUY", AND THEN SAYS we need Key Recovery so we can read their traffic! Even the NSA is talking Doublethink at us: * NYT: Stuart A. Baker, General Counsel for the NSA, explained why crooks * and terrorists who are smart enough to use data encryption would be stupid * enough to choose the U.S. Government's compromised data encryption * standard: * * "You shouldn't overestimate the I.Q. of crooks." ...which is also apparently their view of the American public. WE ARE NOW AT AN HISTORICAL CROSSROAD ON THE ENCRYPTION ISSUE. IF PUBLIC POLICY MAKERS ACT WISELY, THE SAFETY OF ALL AMERICANS WILL BE ENHANCED FOR DECADES TO COME. [1984 Newspeak:] BUT I
From: Pubkeybreaker on 18 Apr 2008 22:06
began in 1985. And what were some of the reasons of the dramatic increase in forfeitures between 1985 and 1993? What caused it to increase by more than a MAGNITUDE? * "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996 * * In June 1989, the Deputy Attorney General ordered the nation's U.S. * attorneys to "take all possible actions" on forfeitures, even if it meant * dropping other matters. "You will be expected to divert personnel from * other activities." * * One year later, the Attorney General himself warned the U.S. attorneys * that the Justice Department had fallen far behind its budget projection * in the collection of assets. "We must significantly increase production * to reach our budget target... Failure to achieve the $470 million * projection would expose the Department's forfeiture program to criticism * and undermine confidence in our budget projections. Every effort must be * made to increase forfeiture income during the remaining three months of * fiscal year 1990." * * In addition, forfeiture activities affect how many federal prosecutors * will be allocated to each U.S. Attorney by the Ju |