From: Tim Little on 18 Apr 2008 20:20 * * In Europe, this system has already been used at track and field events * where the competitors wear the device attached to their jersey. This * provides their coordinates during each event and can be used for the * timing of races. * * Widespread use among sports figures could go a long * way toward popularizing the chip among the young. * * According to microchip researcher Terry Cook, U.S. military recruits are * also being introduced to the bracelet, just as Marine recruits at Parris * Island helped test the military's Smartcard prototype. * * Eagle Eye Technologies of Herndon, Virginia is marketing a microchip * embedded in a sportswatch to be worn by Alzheimer patients who have a * tendency to wander. When the patient strays from home, Eagle Eye calls up * an orbiting satellite, which "interrogates" the patient's microchip to * determine the patient's position to within the length of a football field. * * Sounds protective? Relevance recognizes the bonafide use of this * technology but we continue to harbor reservations about its potential for * abuse. * * Notably, Eagle Eye Technologies received its initial funding from the * U.S. government through the Defense Advanced Research Projects Agency * (DARPA), headed for many years by current Secretary of Defense, William * Perry. In fact, much of the surveillance technology being introduced in * the private sector was fostered, fu
From: S.C.Sprong on 18 Apr 2008 20:28 said, the fact that it could have been > showed how serious this was. Nobody questioned his logic. Wow, I'd better throw out my copy of "The Anarchist's Cookbook", eh?. Oh wait: it would be more fitting if I blew it up. * C-SPAN Television, Wednesday June 5th, 1997 * * Andrew Grove, Chairman & CEO of Intel Corporation, is asked whether * bomb-making information should be censored from the Internet. * * "No. The same information is available in libraries, and we don't * censor libraries, nor should we. When I was thirteen I built a * nitroglycerin bomb. It was an incredibly stupid thing to do, * and I knew someone who had their hand blown off, but I am * adamantly against censoring such material." * * "And unlike a library, a parent can buy a program that uses keyword * monitoring to disallow Internet traffic per the parents' wishes. * Such a program is available now, and costs only $29." I think I looked at it for all of 30 seconds before putting in my bookshelf. I don't remember the bomb-making details in it. I have a vague impression of a lot of squiggly lines, suitable for a really bad coloring book. I also purchased a variety of odd privacy-related publications from Eden Press. What is the Official Federal Dangerous Book List? What books did they check on for their 'Library Awareness Program'? How was it determined these books made people dangerous? Who approved this Fahrenheit 451 persecut
From: Risto Lankinen on 18 Apr 2008 19:46 to use the complete CALEA capacity. You can select many more lines for monitoring than actually end up active at the same time. The effect is indistinguishable from a MUCH larger monitoring capacity. Even greater when the software programmatically decides (at the FBI end) which conversations to continue listening to. I'm sure law-enforcement will be able to dynamically configure their connection to the phone companies' networks. And probably cheat to use ECHELON to direct this programmatic control, yielding no effective monitoring limit for domestic law-enforcement, and domestic political control. Law enforcement has absolutely no need for the Digital Telephony Act except to give them their own access terminals and PRETEND there is a firewall between what the Military is doing versus what the FBI is doing. Of course, to monitor phone calls at full capacity, the FBI will need to use Military surveillance software. We've come a long way from requiring a person to listen to the first minute of conversation to even decide whether the person could continue to monitor. It's a brave new world now. We're there. Surprise. ****************************************************************************** Australian ECHELON Spotted ---------- ------- ------- * http://www.texemarrs.com, Living Truth Ministries 800/234-9673 Texe Marrs and his organization are big on the "Anti-Christ" aspects of all the technology the UKUSA governments have deployed to monitor people. I am just glad he knows the Beast when he sees it, that it is Evil (without the people involved necessarily b
From: Risto Lankinen on 18 Apr 2008 21:54 Yep. # Subject: ---> Big Bro and the Intelligent Transportation System <--- # From: 99(a)spies.com (Extremely Right) # Date: 1997/06/03 # # If you live in a big city you will find that there is an interesting # proliferation of cameras pointed at the freeway. Do you know what they # are, what they can do, and what is their potential for abuse? # # The System is called the Intelligent Transportation System (ITS) and you # may find it everywhere on the net. The cameras are linked to a city # control room, who are supposed to use them to improve traffic flow. The # cameras are "uplinked" to the net, to satellites, and I suppose to the # United States Transportation Command at Scott AFB or some other # centralized information storage base. Software is being harmonized so that # on the net you may find many countries adopting a GLOBAL ITS. The toys # being developed by the various planners including MIT will be able to # track your travel, monitor your vehicle emissions, determine if you have # been drinking, and even issue you speeding tickets by mail! "Smart" cards # may be used to automatically track individual people and deduct tolls or # bus fares. * REMARKS PREPARED FOR DELIVERY * Technology and Privacy in Intelligent Transportation Systems * http://weber.ucsd.edu/~pagre/cfp-its.html Phil Agre :pagre(a)ucsd.edu * * Conference on Computers, Freedom, and Privacy San Francisco, March 1995 * * Intelligent Transportation Systems (ITS) are being developed in most of * the industrialized countries. Promoters of such systems envision * information technology be
From: David Bernier on 18 Apr 2008 22:01
references to President Richard M. Nixon * [ "I had no prior knowledge of the Watergate break-in," said President * Nixon looking straight at the camera on a national television address, * "It's that simple." ], for example, technicians would have to program * a variety of keywords, such as "Tricky Dicky." This, according to the * former NSA G Group chief, would be converted to 'ky----ky." * * Should this selection process still produce a considerable amount of * traffic, the data could then undergo 'secondary testing', such as the * addition of the words "New York," to reduce the number. You may wonder what keywords excel at picking up "resume condition" traffic. You want the truth? YOU CAN'T HANDLE THE TRUTH Just kidding. That was Jack Nickelson speaking for the NSA. Here is how it is done: o Select all traffic. o Exclude commonplace traffic, such as mailing lists. example: FROM <firewalls(a)greatcircle.com> This is done by selecting keywords that match against the routing information in the email header: who it came from, who it is going to. The phone analogy is recipient and originating phone numbers. This cuts down on "noise". "Secret Power" gave examples of this too. o Search all traffic for a set of keywords that are found (tuned) over time to have the best results. SOME of the ones I used: first day last day resign new job resume interview drug test It's ironic that drug testing of employees is so wide-spread that it can be used to pick out people looking for new jobs. o Further exclusion logic (keywords) to isolate the meaning of the keyword 'resume' to mean job history. Also, UK people say 'CV'. Example: do NOT allow a sentence fragment like 'resume playin |