From: Pubkeybreaker on
communications network."
*
* The L.U.C.I.D. article gives numerous examples of non-criminal
* information the system will register against everyones Universal
* Biometrics Card...it will control the entire gamut of human activity,
* from jobs and licenses of all kinds to court hearings and indictments,
* custody of children, and permits to own and/or carry a firearm. Massive
* quantities of information will be acquired and made available on demand.
*
* The L.U.C.I.D. authors state it will "support, search, and update data
* ...from the networks of federal, state and local government agencies;
* public and private organizations;" and so on.

What's left to monitor?

Nothing.

Not a damn thing.

Cybernetic control of society.


Some people have taken a stand. They are fighting back.

* "Police in California Fight Citizen Complaints"
* By Tim Golden, The New York Times, 8/15/1996
*
* With a quiet but forceful lobbying campaign, officers' unions and their
* supporters are pressing for new state laws that would remove unsubstant-
* iated complaints from police personnel files and limit the time in which
* a citizen's complaint must be investigated.
*
* Only 4% of complaints are upheld by review boards, and 70% are ruled
* inconclusive. Over time, some officers build up quite a bulk of complaints
* in their personnel file. Police chiefs oppose the legislations because it
* could undermine early warning systems for spotting bad officers.
*
* In some states, police unions have begun filing libel suits against those
* who file police complaints.
*
* The police officers assert that paper trails on complaints can ruin
* law-enforcement careers.

Police are the same bunch of law enforcement personnel who keep extensive
non-criminal notes and allegations on citizenry.




From: Rotwang on
throughout life."
*
* The article continued: "Most likely, he added, it woud be implanted on
* the back of the right or left hand for convenience, `so that it would
* be easy to scan....It could be used as a universal identification card
* that would replace credit cards, passports, that sort of thing. At the
* checkout stand at a supermarket, you would simply pass your hand over
* a scanner and your bank account would automatically be debited."

There it is again: people talking about assigning
everyone a biometric identifying number at birth.


----

# Privacy Journal, By Robert Ellis Smith, June 1994 issue
#
# The Hughes Aircraft Company is selling a tiny transponder for injection
# under the skin of laboratory animals. Hughes has also moved into "the
# human market."
#
# Effective this year, the federal Food and Drug Administration requires
# every breast implant carry a transponder chip with a unique identifying
# number. A hand-held scanner can read the number much like a supermarket
# scanner.
#
# The reason the government gave for the transponder was that bot


From: Phil Carmody on
//
////////////////////////////////////////////////////////////////////////

o Risk Management reports ("positions") caught outbound, including DRMS
(Derivatives) going to someone who started working for Merrill Lynch

o Risk Management reports inbound: Phibro positions [Salomon subsidiary]

o Internal product documentation and trading desk procedures outbound

o Many hostname/username/password transmissions for Salomon's internal systems

o Many Sybase database passwords, including SA passwords

o People working on their own businesses while within Salomon

o Someone soliciting people for porno videos from Salomon

o Phibro Chart of Accounts and internal accounting procedures

o Year-end summary of lawsuits filed against subsidiary Basis Petroleum

o Pirating of third-party copyright programs

o Other firms' IUO (Internal Use Only) inbound

o Our detailed systems inventory

o Determined what PGP (encrypted) traffic was occurring. Among others, we had
constant small traffic back-and-forth with Military contractor Rockwell.

o Salomon's Official Restricted List being repeatedly transmitted outbound
(list of securities Salomon can't purchase without a conflict of interest)

o Unreleased Financing Summaries and unreleased IPO's: SEC violations

o Internal Use Only documents

o Trade confirmations

o JobTalk hits concerning internal budget details by an SOO.

o JobTalk hit of a resume of a risk management person who wanted to
"explain how it works" here

o Hundreds of router (security) configurations

o 42,000 lines of OASYS data

o router and bridge passwords

o Hostname/username


From: Matthew T. Russotto on
by the false accusations of drug use,
* and some may even attempt suicide out of their shame.

Thank you very much Free World Leaders for that intelligent discourse on
marijuana. What would we do without you? We love being your lemmings. Keep
beating the Drums so we can march into your ocean of insanity.


"Zero Tolerance" is an extremely dangerous attitude to have regarding crime.

Zero Tolerance by definition means excessive vigilancy.


# "War on Drugs Runs Up Against the 4th Amendment"
# By Tony Mauro, USA Today
#
# J. LeWayne Kelly went to the Austin, Texas, airport two months ago.
#
# But because he's black, dressed casually and wore expensive cowboy boots,
# he soon was surrounded by strangers---police who suspected him of being
# a drug courier.
#
# Mr. Kelly had gone to the airport only TO PICK UP A FRIEND.
#
# He felt numb, agreed to be searched because he didn't want to get beaten.
#
# Kelly tried an experiment. He had a white friend WEAR THE SAME OUTFIT he
# had worn that day and retrace his steps at the airport.
#
# Police gave the friend not even a glance.
#
# His lawyer filed a class-action suit in a Texas state court.
#
# "The Supreme Court has hobbled the Fourth Amendment so much that I
# never even thought about filing in Federal court."


A major foobar in Zero Tolerance mania occurred
when the government seized a ship over a couple joints.

The government had seized the ship from itself.


The Drug War. The Drug War. The Drug War. The Drug War. The Drug War.

Hear it enoug


From: Risto Lankinen on
The feedback was not simply machine throughput rates, but also---via
the central computer---a system 'through which anyone could consult
anyone else'.

I used keyword monitoring to filter "information" from "noise" in
Salomon's HUGE email traffic. What I did, of course, was small potatoes;
what Stafford Beer did was a serious cybernetic attempt to control an
entire nation's economy.

In order for him to do that, he needed to set
up a (cybernetic) monitoring infrastructure.

The nation's banks, factories and industrial companies.

It would have given Allende maximum control over the nations
industrial infrastructure, real-time monitoring of everything.

Everything had a computer monitoring it.

* "The Future of War - Power, Technology, and American World Dominance in
* the 21st Century", by George & Meredith Friedman, 1996, ISBN 0-517-70403-X
*
* McNamara's revolution built on an idea that was central to operations
* research and propounded by many nuclear strategists, that war was not
* methodologically distinguishable from economics. The process whereby you
* analyzed, managed, and controlled an economy was not essentially different
* from the way you managed a war, except that one was an economy of produc-
* tion and the other was an economy of force. The principal underlying both
* was the doctrine of efficiency: maximizing the benefits received from the
* efforts and expenditures---a cost benefit analysis.


Cyberneticians hope to use their capabilities for the
betterment of the human race, of which they are a part.

They are not naive when it comes to the government and politics, either.

* "The Rise of the Computer State", David Burnham, 1984
*
* Norbert Wiener, the MIT professor who is generally credited with being
* one of the principal minds behind the development of the computer,
* refused to take research money from the Pentagon because he was
* convinced it would corrupt his research and unde