From: JSH on
11/5/95
#
# A meeting called "Mug Shot and Facial Image Standards Conference" was held
# to set facial image standards. The standards will take into account
# emerging technologies like software that determines if two facial images
# belong to the same person, even from composite sketches.

Yep. Even using photographs. More on this later.

----

And what does a National ID Card with a Universal Biometric identifier mean?

A number (that is: scanned fingerprint or iris) that cannot be faked.

Unprecedented possibilities for control of the presumed guilty population.

You will be forced to verify yourself for an endlessly ever-growing list of
items.

* Dr. Linda Thompson:
* YOUR STATE IS NEXT AND DON'T THINK OTHERWISE. Sandia and other defense
* contractors, without a war elsewhere, are OUT OF WORK, so they're
* creating job security for themselves by helping fascists wage war in the
* United States on us and our rights!!
*
* Georgia, Texas and Oregon ALREADY require fingerprints for licenses.


> California is already fingerprinting drivers, and many places outside of
> the US are creating identity cards with barcoded information.
>
> Also, AmSouth and Compass Banks will soon introduce fingerprinting of
> people who cash checks and have no account with their bank. This is
> now standard practice in Texas and will soon be nation-wide.


* "Fingerprints Used to Cut Welfare Fraud", by Sandra Blakeslee
* The New York Times, April 6 1992
*
* Los Angelos is the first county in the nation to install an automatic
* fingerprint-identification system for ferreting out welfare cheats.
*
* "We can deliver services faster too," said Eddy Tanaka, director of the
* Los Angelos County Department of Public Social Services.
*
* "We will not share the fingerprints with the police


From: Rotwang on
to spy on
* encrypted communications REPLACED KEY ESCROW as the favored
* technology. KEY RECOVERY works by locating information that is
* woven into the header of each message. This mechanism allows
* a recovery 'agent' to extract or reconstruct the message's key
* and decrypt its contents.
*
* Key recovery may have been the basis for NSA's most successful
* post-Cold War project for deciphering coded messages. Since the
* 1940's, the NSA reportedly rigged encryption systems sold by the
* Swiss firm Crypto A.G. so that the agency retained the ability
* to break the codes of anyone using the machines.
*
* Thus, Fort Meade was able to listen in on the coded military and
* diplomatic traffic of the more than 130 countries that were Crypto
* A.G. customers.


Initially, the NSA tried to say they couldn't decrypt Key Recovery
impaired traffic on the fly:

! The New York Times, December 29, 19??, by David Burnham
! "Vast Coding of Data is Urged to Hamper Electronic Spies"
!
! Because the National Security Agency is actively involved in the
! design [of Key Recovery cryptography], the agency will have the
! technical ability to decipher the messages.
!
! Walter G. Deeley, NSA deputy director for communications security
! said, "It is technically possible for the Government to read such
! messages, but it would be insane for it to do so. It would be an
! extraordinarily expensive undertaking and would require a massive
! increase in computer power."

Probably since noone believed that, they admitted it, and said why they
needed to decrypt in real-time:

# Encryption and Law Enforcement
#
# Dorothy E. Denning
# Georgetown University
#
# February 21,


From: JSH on
a row, it was still making the statistics sound worse than they
* actually were.
*
* That's because Government tends to exaggerate the violent nature of crime.
*
* According to the Justice Department's Bureau of Justice Statistics, less
* than a third of the 6.6 million violent crimes committed in the U.S in 1992
* resulted in injury; most of the victims suffered only minor cuts, scratches
* or bruises.
*
* About 20 percent of them needed minor medical care; 7 percent went to
* emergency rooms. Only 1 percent of the victims were hurt seriously enough
* to require hospitalization.
*
* The incongruity arises because of the way the law defines violent crime.
*
* For example, aggravated assault is defined as either intentionally causing
* serious bodily harm or using a weapon to threaten or attempt to cause
* bodily harm.
*
* Fortunately, most aggravated assault victims fall into the last category;
* most victims are never touched by the offender.
*
*


From: Pubkeybreaker on
of
* Fourth Amendment standards.
*
* Not even Congress' intelligence oversight committees review these
* special cases on a regular basis.


Mini-recap:

o Congress voted into existence a court that bypasses our normal
Fourth Amendment constitutional rights. Poof they're gone.

o Congressional oversite is weak.

Such a special court should be subject to the
highest standard of continual scrutiny: it is not.

! The New York Times, December 29, 19??, by David Burnham
!
! Because the National Security Agency is actively involved in the
! design [of Key Recovery cryptography], the agency will have the
! technical ability to decipher the messages.
!
! Walter G. Deeley, NSA deputy director for communications security
! said, "Another important safeguard to the privacy of communications
! was the continuous review of NSA's activities by the Senate and House
! intelligence committees."

Congressional oversite in real-time was non-existent.


Remember Ronald "I am a Contra" Reagan?

# U.S. Department of Justice, Federal Bureau of


From: JSH on
for written messages.

It has nothing to do with whether someone is deliberately tapping your phone,
simply whether you say a keyword or combination of keywords that is of
interest to one of the UKUSA agencies.


P47
The keywords include such things as names of people, ships, organizations,
countries and subjects. They also include the known telex and phone numbers
and Internet addresses of the individuals, businesses, organizations and
government offices they may want to target.

The agencies also specify combinations of these keywords to help sift out
communications of interest.

For example, they might search for diplomatic cables containing both the
words 'Suva' and 'aid', or cables containing the word 'Suva' but NOT the
word 'consul' (to avoid the masses of routine consular communications).

It is these sets of words and numbers (and combinations of them), under a
particular category, that are placed in the Dictionary computers.

The whole system was developed by the NSA.


P51-
The only known public reference to the ECHELON system was made in relation to
the Menwith Hill station. In July 1988, a United States newspaper, the
Cleveland Plain Dealer, published a story about electronic monitoring of
phone calls of a Republican senator, Strom Thurmond. The alleged monitoring
occurred at Menwith Hill.

Margaret Newsham worked at Menwith Hill as a contract employee of Lockheed
Space and Missiles Corporation. She is said to have told congress staff that,
while at Menwith, she was able to listen throug