From: fortune.bruce on
Mr. Farrakhan.
* Eight of the counts involved taped telephone calls between Ms. Shabazz and
* Mr. Fitzpatrick, a cocaine addict who faces a possible five-year prison
* sentence in an unrelated drug case. [read: blackmailed]
*
* Of the 40 recorded conversations, 38 were initiated by Mr. Fitzpatrick.
* "Most of the conversations during these calls consisted primarily of
* remarks by Mr. Fitzpatrick." said defense lawyer William M. Kunstler.
* [Kunstler was a silvered haired angel even while still on Earth]
*
* The Government had a statement initialed from Ms. Shabazz.
*
* "I jokingly asked Fitzpatrick if he would kill Louis Farrakhan."
*
* The statement was written by two FBI agents, who did not advise her of
* her right to remain silent and have a lawyer present.
*
* Federal officials in Washington and Minneapolis say Ms. Shabazz was
* 'obsessed' with killing Mr. Farrakhan, and they had enough on her to
* put her away for 90 years.
*
* Mr. Fitzpatrick prodded her: "I'm willing to do whatever you want me to
* do, this feels righteous." Ms. Shabazz replied "I don't really know
* what you're asking me." Mr. Fitzpatrick l


From: quasi on
(and does) do just about whatever it wants, whenever, and
* wherever it wants. Although little known in both the U.S. and elsewhere,
* the NSA is quite literally the most powerful organization in the world.
*
* Not limited by any law, and answerable only to the U.S. National Security
* Council through COMSEC, the NSA now controls an information and
* surveillance network around the globe that even Orwell, in his novel
* "1984", could not have imagined.
*
* Most people believe that the current "computer age" grew out of either
* the space program or the nuclear weapons race; it did not.
*
* ALL significant advances in computer technology over the last thirty
* years, from the very beginnings of IBM, through to the super computers
* of today, have been for the NSA. In fact, the world's very first super
* computer, the awe-inspiring CRAY, was built to specification for the
* NSA, and installed in their headquarters in 1976.
*
* The entire twentieth century of development of computer technology has
* been the result of the NSA's unquenchable thirst for ever bigger, ever
* faster machines on which to collect, collate, and cross-reference data
* on hundreds of millions of honest, law-abiding, and totally unsuspecting
* individuals. And not only in America, but in many other countries as
* well. Including, as we shall see, Australia.

[
"The Rise of the Computer State", David Burnham, 1984

p134: ...the technical advances that were occurring did so not entirely
by chance. The computers' ability to acquire, organize, store and
retrieve huge amounts of data was an essential factor leading to the
broad definition of intelligence that was fostered by the National



From: Matthew T. Russotto on
system works, just how immense and powerful it is
and what it can and cannot do. The electronic spies are not ubiquitous, but
the paranoia is not unfounded.

The global system has a highly secret codename - ECHELON.

The intelligence agencies will be shocked to see it named and described for
the first time in print.

Each station in the ECHELON network has computers that automatically search
through millions of intercepted messages for ones containing pre-programmed
keywords or fax, telex and email addresses. Every word of every message is
automatically searched: they do not need your specific telephone number or
Internet address on the list.

All the different computers in the network are known, within the UKUSA
agencies, as the ECHELON Dictionaries.

Computers that can search for keywords have existed since at least the 1970s,
but the ECHELON system has been designed to interconnect all these computers
and allow the stations to function as components of an integrated whole.

Under the ECHELON system, a particular station's Dictionary computers contain
not only its parent agency's chosen keywords, but also a list for each of the
other four agencies. For example, each


From: Pubkeybreaker on
into the
# Constitution, was designed to let each of the three branches of
# Government check abuse by the others.
#
# Congress does not like to tangle with the executive on claims of
# national security.
#
# But will it lie down before this claim of exclusive, imperial power?

The New York Times, June 20, 1997

President Threatens Veto of Senate Bill for CIA

By TIM WEINER

WASHINGTON -- The Senate on Thursday passed a secret
spending bill for U.S. intelligence, but the White
House threatened to veto it over a provision that would
protect whistleblowers.

The Senate bill would let employees of the Central
Intelligence Agency and other branches of the
government tell members of Congress classified
information that would expose a crime, reveal lying to
Congress, uncover fraud or stop abuses. They could do
so without approval from their superiors and without
fear of reprisal. They could only pass on information
to appropriate members -- for example, CIA information
would have to go to the Intelligence Committee.

But the White House said it would veto the entire bill
ove


From: fortune.bruce on
majority the US was cornered completely, and had to accept
: the international views. And actually adopted those as well. EFF, EPIC and
: other US organizations were delighted to see the formal US views barred,
: but expressed their concern on the development of alternate political
: pressure that would cause the same effects.
:
: As time went by that was indeed what the US did, and up to now with minor
: success.
:
: Bertil Fortrie
: Internet Security Review
: ==


There it is yet again: "anytime, anywhere", and "UKUSA".

There is absolutely no doubt whatsoever that Netscape and other companies
--- the U.S. is a world leading producer of software technology --- are
having their products outlawed for world-wide distribution because of
ECHELON.

Ubiquitous full-strength crypto --- in all our email products and web
browsers --- would immediately begin to lessen ECHELON's ability to
spy in such a massive dragnet fashion.

There is an ugly implication to ECHELON being the reason Netscape and company
are being held hostage by the NSA.

"Only with a court authorized warrant..." --- Louis Freeh, FBI Director

Louis Freeh is lying.


******************************************************************************

Key Recovery Isn't Even Feasible
--- -------- ----- ---- --------

http://www.epic.org

Distinguished cryptographers and computer scientists have released a new
report, "The Risks of Key Recovery, Key Escrow, and Trusted Third-Party
Encryption."

The report follows an earlier recommendation of the OECD that the risks of
key escrow encryption be considered before key escrow infrastructures are
establishe