From: fortune.bruce on 18 Apr 2008 22:10 Mr. Farrakhan. * Eight of the counts involved taped telephone calls between Ms. Shabazz and * Mr. Fitzpatrick, a cocaine addict who faces a possible five-year prison * sentence in an unrelated drug case. [read: blackmailed] * * Of the 40 recorded conversations, 38 were initiated by Mr. Fitzpatrick. * "Most of the conversations during these calls consisted primarily of * remarks by Mr. Fitzpatrick." said defense lawyer William M. Kunstler. * [Kunstler was a silvered haired angel even while still on Earth] * * The Government had a statement initialed from Ms. Shabazz. * * "I jokingly asked Fitzpatrick if he would kill Louis Farrakhan." * * The statement was written by two FBI agents, who did not advise her of * her right to remain silent and have a lawyer present. * * Federal officials in Washington and Minneapolis say Ms. Shabazz was * 'obsessed' with killing Mr. Farrakhan, and they had enough on her to * put her away for 90 years. * * Mr. Fitzpatrick prodded her: "I'm willing to do whatever you want me to * do, this feels righteous." Ms. Shabazz replied "I don't really know * what you're asking me." Mr. Fitzpatrick l
From: quasi on 18 Apr 2008 19:31 (and does) do just about whatever it wants, whenever, and * wherever it wants. Although little known in both the U.S. and elsewhere, * the NSA is quite literally the most powerful organization in the world. * * Not limited by any law, and answerable only to the U.S. National Security * Council through COMSEC, the NSA now controls an information and * surveillance network around the globe that even Orwell, in his novel * "1984", could not have imagined. * * Most people believe that the current "computer age" grew out of either * the space program or the nuclear weapons race; it did not. * * ALL significant advances in computer technology over the last thirty * years, from the very beginnings of IBM, through to the super computers * of today, have been for the NSA. In fact, the world's very first super * computer, the awe-inspiring CRAY, was built to specification for the * NSA, and installed in their headquarters in 1976. * * The entire twentieth century of development of computer technology has * been the result of the NSA's unquenchable thirst for ever bigger, ever * faster machines on which to collect, collate, and cross-reference data * on hundreds of millions of honest, law-abiding, and totally unsuspecting * individuals. And not only in America, but in many other countries as * well. Including, as we shall see, Australia. [ "The Rise of the Computer State", David Burnham, 1984 p134: ...the technical advances that were occurring did so not entirely by chance. The computers' ability to acquire, organize, store and retrieve huge amounts of data was an essential factor leading to the broad definition of intelligence that was fostered by the National
From: Matthew T. Russotto on 18 Apr 2008 20:48 system works, just how immense and powerful it is and what it can and cannot do. The electronic spies are not ubiquitous, but the paranoia is not unfounded. The global system has a highly secret codename - ECHELON. The intelligence agencies will be shocked to see it named and described for the first time in print. Each station in the ECHELON network has computers that automatically search through millions of intercepted messages for ones containing pre-programmed keywords or fax, telex and email addresses. Every word of every message is automatically searched: they do not need your specific telephone number or Internet address on the list. All the different computers in the network are known, within the UKUSA agencies, as the ECHELON Dictionaries. Computers that can search for keywords have existed since at least the 1970s, but the ECHELON system has been designed to interconnect all these computers and allow the stations to function as components of an integrated whole. Under the ECHELON system, a particular station's Dictionary computers contain not only its parent agency's chosen keywords, but also a list for each of the other four agencies. For example, each
From: Pubkeybreaker on 18 Apr 2008 20:58 into the # Constitution, was designed to let each of the three branches of # Government check abuse by the others. # # Congress does not like to tangle with the executive on claims of # national security. # # But will it lie down before this claim of exclusive, imperial power? The New York Times, June 20, 1997 President Threatens Veto of Senate Bill for CIA By TIM WEINER WASHINGTON -- The Senate on Thursday passed a secret spending bill for U.S. intelligence, but the White House threatened to veto it over a provision that would protect whistleblowers. The Senate bill would let employees of the Central Intelligence Agency and other branches of the government tell members of Congress classified information that would expose a crime, reveal lying to Congress, uncover fraud or stop abuses. They could do so without approval from their superiors and without fear of reprisal. They could only pass on information to appropriate members -- for example, CIA information would have to go to the Intelligence Committee. But the White House said it would veto the entire bill ove
From: fortune.bruce on 18 Apr 2008 20:46
majority the US was cornered completely, and had to accept : the international views. And actually adopted those as well. EFF, EPIC and : other US organizations were delighted to see the formal US views barred, : but expressed their concern on the development of alternate political : pressure that would cause the same effects. : : As time went by that was indeed what the US did, and up to now with minor : success. : : Bertil Fortrie : Internet Security Review : == There it is yet again: "anytime, anywhere", and "UKUSA". There is absolutely no doubt whatsoever that Netscape and other companies --- the U.S. is a world leading producer of software technology --- are having their products outlawed for world-wide distribution because of ECHELON. Ubiquitous full-strength crypto --- in all our email products and web browsers --- would immediately begin to lessen ECHELON's ability to spy in such a massive dragnet fashion. There is an ugly implication to ECHELON being the reason Netscape and company are being held hostage by the NSA. "Only with a court authorized warrant..." --- Louis Freeh, FBI Director Louis Freeh is lying. ****************************************************************************** Key Recovery Isn't Even Feasible --- -------- ----- ---- -------- http://www.epic.org Distinguished cryptographers and computer scientists have released a new report, "The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption." The report follows an earlier recommendation of the OECD that the risks of key escrow encryption be considered before key escrow infrastructures are establishe |