From: S.C.Sprong on 18 Apr 2008 21:31 HISTORICAL CROSSROAD ON THE ENCRYPTION ISSUE. IF PUBLIC POLICY MAKERS ACT WISELY, THE SAFETY OF ALL AMERICANS WILL BE ENHANCED FOR DECADES TO COME. [1984 Newspeak:] BUT IF NARROW INTERESTS PREVAIL, LAW ENFORCEMENT WILL BE UNABLE TO PROVIDE THE LEVEL OF PROTECTION THAT PEOPLE IN A DEMOCRACY PROPERLY EXPECT AND DESERVE. ANY SOLUTION THAT IGNORES THE PUBLIC SAFETY AND NATIONAL SECURITY CONCERNS RISK GRAVE HARM TO BOTH. And what was a critical public safety and national security item the FBI insisted on in the first version of CALEA? They wanted all cellular phones to continually monitor the location of the owner, EVEN WHEN NOT IN USE. Every cellular phone would become a location tracking monitor for the government. And why would this be a critical public safety and national security item? Because: The NSA/FBI are raving rabid frothing-at-the-mouth lying looneys. I hope you understand that by now. * "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996 * * A few months after his appointment as the new director of the Federal * Bureau of Investigation, Louis J.
From: Rotwang on 18 Apr 2008 20:45 exists. ****************************************************************************** Secret Court ------ ----- : The Washington Post Magazine, June 23 1996 : Government surveillance, terrorism and the U.S. Constitution: : The story of a Washington courtroom no tourist can visit. : By Jim McGee and Brian Duffy [snipped article excerpts shown here] : Adapted from the book "Main Justice", 1996, ISBN 0-684-81135-9. : * Last year, a secret court in the Justice Department authorized a record * 697 'national security' wiretaps on American soil, outside normal * constitutional procedures. * * The Foreign Intelligence Surveillance Act, is a 1978 law that permits * secret buggings and wiretaps of individuals suspected of being agents * of a hostile foreign government or international terrorist organization * EVEN WHEN THE TARGET IS NOT SUSPECTED OF COMMITTING ANY CRIME. * * The FISA court operates outside the normal constitutional standards for * searches and seizures. Non-government personnel are not allowed. * The courts files cannot be publicly reviewed. * * The average U.S. citizen might reasonably assume use of this court * is at the least: unusual. * * It is not. In fact, in the United States today it is increasingly * common. In 1994, federal courts authorized more wiretaps for * intelligence-gathering and national security purposes than they * did to investigate ordinary federal crimes. * * The review process to prevent legal and factual errors is virtually * non-existent. * * And the FISA system's courtroom advocacy is monumentally one-sided. * * The court has never formally rejected an application. Not once. * * For the first time in modern U.S. history, the Congress had * institutionalized a process for physical searches ou
From: fortune.bruce on 18 Apr 2008 22:06 biometric number during fingerprinting for driver's licenses. It will be too late. The high-tech American Leviathan will be in place. * "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5 * * The L.U.C.I.D. project "will interface multilingual messages * from all sources into a common communications network." * * The L.U.C.I.D. article gives numerous examples of non-criminal * information the system will register against everyones Universal * Biometrics Card...it will control the entire gamut of human activity, * from jobs and licenses of all kinds to court hearings and indictments, * custody of children, and permits to own and/or carry a firearm. Massive * quantities of information will be acquired and made available on demand. * * The L.U.C.I.D. authors state it will "support, search, and update data * ...from the networks of federal, state and local government agencies; * public and private organizations;" and so on. What's left to monitor? Nothing. Not a damn thing. Cybernetic control of society. Some people have taken a stand. They are fighting back. * "Police in California Fight Citizen Complaints" * By
From: Phil Carmody on 18 Apr 2008 20:25 it's desired, individuals are caught in the broad net of electronic surveillance. The experts can record and analyze all your communications at will. SIGINT organizations in Canada, US, UK, Australia, and New Zealand use supercomputers such as the Cray to select items of interest. The list is very fluid and is adapted rapidly to monitor people and policy areas. At any time, it is likely to contain names of all world leaders, terrorists, drug lords, mafia dons, members of radical groups, labor union activists and leaders, types of weaponry, explosives, financial dealings, money transfers, airline destinations, stock information, international conferences, demonstrations, and politically suspect groups and individuals. As is the case with operations, countries maintain deniability by getting information gathered on their domestic situations by allies. Under development is even more sophisticated "topic recognition" which can home in on guarded conversations that avoid potential trigger words. Nothing and no one is exempt. For example, you are talking on the telephone to a friend discussing your son's school play. "Boy," you say sadly, "Bobby really bombed last night," or perhaps you use the word "assassination" or "sabotage" or any one of the key words the computer has been told to flag. A hard copy of your conversation is produced, passed to the appropriate section (in this case terrorism), and probably ends up in the garbage. But perhaps the conversation is not so clear-cut or the analyst has poor judgement. Then your name is permanently filed under "possible terrorist". Weeks or even years later, you have a similar conversation and use the same words; the computer filters it out again. Since this is your second time, y
From: tchow on 18 Apr 2008 19:53
I am not an NSA employee. I wrote it myself. > P48, "Secret Power", by Nicky Hager > The best set of keywords for each subject category is worked out over time, > in part by experimentation. > > The staff sometimes trial a particular set of keywords for a period of time > and, if they find they are getting too much 'junk', they can change some > words to get a different selection of traffic. > > The Dictionary Manager administers the sets of keywords in the Dictionary > computers, adding, amending and deleting as required. > > This is the person who adds the new keyword for the watch list, deletes a > keyword from another because it is not triggering interesting messages, > or adds a 'but not *****' to a category because it has been receiving too > many irrelevant messages and a lot of them contain that word. Wow, people whose only job is to edit the keywords. What a cushy job! What I can imagine accomplishing with billions of dollars of support, instead of just little ol' me doing everything, is a truly nightmarish vision. There's more. ****************************************************************************** The FBI Investigations --- --- -------------- At the same time I was analyzing two Internet email feeds, I started a third. During the five months of monitoring at Salomon, I also ran the previous four months of Internet email (from the backups) through my analytics. I found plenty of stuff there too. Another major category of incidents: people in their last week at work. In most cases from the backups, the person had already left the firm. Even |