From: Rotwang on
a single umbrella the SIGINT organizations of
the United States, Britain, Canada, Australia and New Zealand. The UKUSA
Agreement's existence has never been officially acknowledged by any country
even today.


P271: Sharing seats alongside the NSA operators, at least in some areas,
are SIGINT specialists from Britain's Government Communications Headquarters
(GCHQ). According to a former Menwith Hill official, the two groups work
very closely together.


P229: David Watters, a telecommunications engineer once attached to the
CIA's communications research and development branch, pulls out a microwave
routing map of the greater Washington area and jabs his index finger at a
small circle with several lines entering it and the letters NSA. "There's
your smoking pistol right here." Watters says it is tied into the local
telephone company circuits, which are interconnected with the national
microwave telephone system owned by AT&T. Other specialists testified to
the same thing: purely domestic intercepts.


P223: "Technical know-how" for microwave communications intercept was
aided by William Baker, head of AT&T's Bell Laboratories and at the
same time an important member of the very secret NSA Scientific


From: S.C.Sprong on
interest and $5000 in
* legal fees were the result.
*
* The government's abrupt assault shocked Paolo Alvarez to his core,
* leaving him with powerful feelings of fearful despair and isolation.
*
* While the fear was obviously justified, the feeling of isolation was
* way off the mark. He has lots of company.
[snip]
*
* The federal government seized the home of an elderly couple under the
* Drug War's "facilitation" provision. The judge was so embarrassed he
* gave the couple half the cash value of their house back. The drugs had
* belonged to the teenaged-grandson. "The whole program is a nightmare,"
* said their lawyer, "If it keeps up, the Justice Department is going to
* be the largest property owner in Connecticut."
[snip]
*
* Between 1985 and 1993, as a result of more than 200,000 forfeitures, the
* Justice Department Asset Forfeiture Fund took in over $3.2 billion.
*
* In 1993 alone the department took in $556 million, twenty times more
* than it did when the program began in 1985.

And what were some of the reasons of the dramatic
increase in forfeitures between 1985 and 1993?

What caused it to increase by more than a MAGNITUDE?

* "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996
*
* In June 1989, the Deputy Attorney General ordered the nation's U.S.
* attorneys to "take all possible actions" on forfeitures, even if it meant
* dropping other matters. "You will be expected to divert personnel from
* other activities."
*
* One year later, t


From: Pubkeybreaker on
Even though NSA's specialized supercomputers
have enormous storage capacities, the tremendous number of targets forces
the Agency to squeeze the watch lists together as tightly as possible.


P462-465: Its power to eavesdrop, the NSA had always insisted, came under no
earthly laws but rather emanated from some celestial "inherent presidential
authority" reposed in the chief executive by the Constitution.

Senator Edward M. Kennedy tried year after year to pass legislation to
require the NSA to submit to judicial review.

Finally, the Foreign Intelligence Surveillance Act [FISA] was signed into
law by president Carter on October 25, 1978.

The key to the legislation could only have been dreamed up by Franz Kafka:
the establishment of a supersecret federal court.

The legislation established a complex authorization procedure and added a
strict "minimization" requirement to prohibit the use and distribution of
communications involving Americans inadvertently picked up during the
intercept operations.

These requirements constitute the most important parts of the FISA law, and
were included to prevent the watch-listing of American citizens, which took
place during the 1960s and 1970s.

The Supreme Court Chief Justice picks which federal judges serve in the
Star Chamber.


P466-467: The FISA court judge rules that black-bag jobs of "nonresidential
premises under the direction or control of a foreign power" need no court
approval. The FISA legislation also exempts from judicial review communica-
tions of these sites, including embassies. P464: A final judicial review
exception authorized the Agency to distribute the communication if it relates
to criminal activity.

* * * * * * * * * *
* * * * * * * * * *
* * * * * * * * * * * * * * * * * * * * * * * * * * * * * *
*** *** *** *** *** *** *** *** *** ***



From: tchow on
" ---Woodstock

----

Whew!

Cybernetics is VERY heavy-duty stuff.

It can yield the ULTIMATE in control.

It can be applied to controlling people in a society.

Cybernetic control of society.

The 'arousal filter' Stafford Beer and his cyberneticians
set up was effectively keyword monitoring of traffic.

When you use keywords to either select or exclude traffic, each step
is a 'filter' step. If you make it past all the filters, a human then
reviews the results to see if it calls for action. "arousal filter"

Mr. Beer was trying to help the economy by massive real-time monitoring
of factories and companies and banks, and thus help the people of Chile.

* "Brain of the Firm", Stafford Beer, 1986, ISBN 0 471 27687 1
*
* Twenty-four hours a day, messages were flowing in non-stop. This instantly
* posed an enormous problem in handling the inundation of information.
*
* Two of the senior cyberneticians organized a filtration system.

The feedback was not simply machine throughput rates, but also---via
the central computer---a system 'through which anyone could consult
anyone else'.

I used keyword monitor


From: Risto Lankinen on
Steven M. Bellovin[3]
Josh Benaloh[4]
Matt Blaze[5]
Whitfield Diffie[6]
John Gilmore[7]
Peter G. Neumann[8]
Ronald L. Rivest[9]
Jeffrey I. Schiller[10]
Bruce Schneier[11]

Final Report -- 27 May 1997[12]

Executive Summary

A variety of ``key recovery,'' ``key escrow,'' and ``trusted third-party''
encryption requirements have been suggested in recent years by government
agencies seeking to conduct covert surveillance within the changing environ-
ments brought about by new technologies. This report examines the fundamental
properties of these requirements and attempts to outline the technical risks,
costs, and implications of deploying systems that provide government access to
encryption keys.

The deployment of key-recovery-based encryption infrastructures to meet law
enforcement's stated specifications will result in substantial sacrifices in
security and greatly increased costs to the end-user. Building the secure
computer-communication infrastructures necessary to provide adequate
technological und