From: S.C.Sprong on 18 Apr 2008 20:16 can be : bought in most any florist's shop or craft store. : : The charges have finally been dropped. : : Prosecution is so rare his story made the cover of Harper's magazine. : : One police officer told him: : : "With what you write, weren't you expecting this?" * "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5 * * Individuals who have been arrested and their property seized will then be * transported with other dissidents to a Federal Prison Transfer Center for * proper "categorization" and "disposition." * * Entire families are to be disposed of in this manner. Final disposition, * when deemed appropriate, will be made at a regional Processing and * Detention Center. Other countries have called these 'concentration camps' * and 'gulags'. * * At these "Centers," methods and techniques of interrogation, torture and * final disposition honed and developed by the CIA and Special Forces Green * Berets through their 'Operation Phoenix' program are to be used on * victimized citizens. * * Operation Phoenix, during the Vietnam conflict, was responsible for the * arrest, incarceration, torture and murder of over 50,000 innocent civilians. * * The CIA and U.S. Army acclaimed it a success and a model for future "human * pacification" programs. * http://ursula.blythe.org/NameBase * * Valentine, Douglas. The Phoenix Program. New York: William Morrow, 1990. * 479 pages. * * Operation Phoenix * * Along with saturation bombing of civilian populations, Operation Phoenix * has to rate as America's most atrocious chapter in the Vietnam War. * * Between 1967 to 1973 an estimated 40,000 Vietnamese were killed by CIA- * sponsored "counterterror" and "hunter-killer" teams, and hundreds of * thousands were sent to secret interrogation
From: JSH on 18 Apr 2008 22:20 no sense whatsoever. I shudder to think that most Americans will not understand these admittedly technocratic basic details of computer systems and cryptography. If they knew, they would be STUNNED that our leaders would lie so boldly to us, including Mr. Kantor, to protect ECHELON. That the public would misunderstand Kantor and Clinton to think they are offering a "reasonable compromise"...even though what is actually happening is our government demanding you lose all right to privacy, that we must give the government a copy of our personal security key. ****************************************************************************** ****************************************************************************** ****************************************************************************** Part 6: Louis Freeh & The Creeping Police State ---- - ----- ----- --- -------- ------ ----- o Louis Freeh o National ID Card o Worldwide Banking and Phone Monitoring o Cybernetic Control of Society o Conclusions ****************************************************************************** Louis Freeh ----- ----- Louis Freeh is accomplishing something that real terrorists themselves could never have accomplished. Destruction of the American Way of Life. Freedom, Liberty. It is as if freedom terrorists were in charge of our government. * "The End of Ordinary Money, Part I", by J. Orlin Grabbe * http://www.aci.net/kalliste * * The GSA opposed CALEA [FBI code name: "Operation Root Canal"], stating * "the proposed bill would have to have the FCC or other agency approve or * reject equipment mainly on the basis of whether the FBI had the capacity
From: Pubkeybreaker on 18 Apr 2008 21:19 homes and seized computer equipment after monitoring Internet traffic and spotting regular people browsing WWW/USENET clicking on an article they CAN'T SEE UNTIL THEY CLICK ON IT which contained nude pixels representing children. Out of fear that child-molesting child pornographers might encrypt these files, even pro-cryptography legislation has 'using cryptography to commit a crime gets you an additional five years'. What happens with a five year prison clause? Well, let's say the person clicked on what turned out to be child pornography. So they click on something else and that wipes it off the screen. It's still sitting in their browser's cache. * "Man Arrested After Retrieving Child Pornography by Computer" * The New York Times, May 19, 1995 * * A Los Angelos man has been arrested on charges of possessing child porno- * graphy that he obtained over the Internet. His Internet traffic was under * surveillance because he placed an ad seeking an "open relationship" with * couples interested in "family nudity." * * City Attorney James K. Hahn said "Certainly if you see something flicker * across your computer monitor, then you are not in possession, but if you * go to the difficulty of downloading...then you're guilty." As you can see, this technical detail totally escapes some people. Continuing: then the Feds raid their place. Naturally,
From: Pubkeybreaker on 18 Apr 2008 20:07 and protection of the intelligence collected as well as for personnel security. P20 New Zealand Prime Minister Robert Muldoon, on June 12 1984, admitted the GCSB liaised closely with Australia, Canada, the United Kingdom and the United States - the closest the government has ever come to talking about the secret five-nation signals intelligence alliance of which the GCSB is part. P108 The New Zealand analysts have a high level of contact with the overseas agencies, including overseas staff training, postings and exchanges. In the early 1990s the GCSB began conducting its own training courses, teaching them the special procedures and regulations governing the production of signals intelligence reports for the UKUSA network. It is at these courses where the analysts are told about the UKUSA agreement, which is described by senior staff as the 'foundation stone' of all the arrangements with the 'partner' agencies. P110 The GCSB introduces the new trainees to the world of codebreaking by advising them to read two of the greatest exposes of signals intelligence: James Bamford's 'The Puzzle Palace' and David Kahn's 'The Code Breakers'. P22 In 1984, Glen Singleton of the NSA was formally appointed GCSB's Deputy Director of Policy and Plans. Having an American inside the GCSB serving as a foreign liaison officer would be one thing: allowing an officer fro
From: JSH on 18 Apr 2008 21:36
* In a complete collapse of accountability, NRO, the Government agency that * builds spy satellites, accumulated about $4 billion in uncounted secret * money. [First they said it was $1 billion, then $2 billion...] * * The new head of the agency, John Nelson, said that the secret agency had * undergone "a fundamental financial meltdown." * * The agency's secrecy made Congressional oversite next to impossible, * intelligence officials said. * * Just two years previously, the NRO constructed a "stealth building". * It was a $300 million new headquarters. The agency had explained that * happened because they treated the construction of the building as a * covert operation. A covert operation against whom? The Pentagon was in operational charge of the NRO. The NRO is a sister agency to the NSA. ****************************************************************************** Key Recovery Means No Cryptography --- -------- ----- -- ------------ It's one way or the other. Zero or One. We either have uncrackable crypto, or crackable crypto, meaning no crypto. # "White House Challenged on Data Security" # By John Markoff, The New York Times, May 31, 1996 # # The United States Government should IMMEDIATELY relax export controls on # software products containing encryption and allow industries to set their # own standards. # # The report was prepared by the National Research Council of the National # Academy of Sciences, and stands in direct opposition to the Clinton # Administration. # # The National Research Council provides science and technology advice # under a Congressional charter. # # The report was commissioned by Congress. Clipper III is a Key Recovery plan. We know what Key Recovery means... : The Puzzle Palace, Author James Bamford, 1983 revision, p407-409 : : Crypto A.G. was owned by Boris Hagelin, who made his first millio |