From: S.C.Sprong on
HISTORICAL CROSSROAD ON THE ENCRYPTION ISSUE.

IF PUBLIC POLICY MAKERS ACT WISELY, THE SAFETY OF ALL AMERICANS WILL
BE ENHANCED FOR DECADES TO COME.

[1984 Newspeak:] BUT IF NARROW INTERESTS PREVAIL, LAW ENFORCEMENT WILL
BE UNABLE TO PROVIDE THE LEVEL OF PROTECTION THAT PEOPLE IN A DEMOCRACY
PROPERLY EXPECT AND DESERVE. ANY SOLUTION THAT IGNORES THE PUBLIC SAFETY
AND NATIONAL SECURITY CONCERNS RISK GRAVE HARM TO BOTH.

And what was a critical public safety and national security
item the FBI insisted on in the first version of CALEA?

They wanted all cellular phones to continually monitor
the location of the owner, EVEN WHEN NOT IN USE.

Every cellular phone would become a location
tracking monitor for the government.

And why would this be a critical public safety and national security item?

Because:

The NSA/FBI are raving rabid frothing-at-the-mouth lying looneys.

I hope you understand that by now.



* "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996
*
* A few months after his appointment as the new director of the Federal
* Bureau of Investigation, Louis J.


From: Rotwang on
exists.




******************************************************************************

Secret Court
------ -----


: The Washington Post Magazine, June 23 1996
: Government surveillance, terrorism and the U.S. Constitution:
: The story of a Washington courtroom no tourist can visit.
: By Jim McGee and Brian Duffy [snipped article excerpts shown here]
: Adapted from the book "Main Justice", 1996, ISBN 0-684-81135-9.
:
* Last year, a secret court in the Justice Department authorized a record
* 697 'national security' wiretaps on American soil, outside normal
* constitutional procedures.
*
* The Foreign Intelligence Surveillance Act, is a 1978 law that permits
* secret buggings and wiretaps of individuals suspected of being agents
* of a hostile foreign government or international terrorist organization
* EVEN WHEN THE TARGET IS NOT SUSPECTED OF COMMITTING ANY CRIME.
*
* The FISA court operates outside the normal constitutional standards for
* searches and seizures. Non-government personnel are not allowed.
* The courts files cannot be publicly reviewed.
*
* The average U.S. citizen might reasonably assume use of this court
* is at the least: unusual.
*
* It is not. In fact, in the United States today it is increasingly
* common. In 1994, federal courts authorized more wiretaps for
* intelligence-gathering and national security purposes than they
* did to investigate ordinary federal crimes.
*
* The review process to prevent legal and factual errors is virtually
* non-existent.
*
* And the FISA system's courtroom advocacy is monumentally one-sided.
*
* The court has never formally rejected an application. Not once.
*
* For the first time in modern U.S. history, the Congress had
* institutionalized a process for physical searches ou


From: fortune.bruce on
biometric number
during fingerprinting for driver's licenses.

It will be too late.

The high-tech American Leviathan will be in place.

* "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5
*
* The L.U.C.I.D. project "will interface multilingual messages
* from all sources into a common communications network."
*
* The L.U.C.I.D. article gives numerous examples of non-criminal
* information the system will register against everyones Universal
* Biometrics Card...it will control the entire gamut of human activity,
* from jobs and licenses of all kinds to court hearings and indictments,
* custody of children, and permits to own and/or carry a firearm. Massive
* quantities of information will be acquired and made available on demand.
*
* The L.U.C.I.D. authors state it will "support, search, and update data
* ...from the networks of federal, state and local government agencies;
* public and private organizations;" and so on.

What's left to monitor?

Nothing.

Not a damn thing.

Cybernetic control of society.


Some people have taken a stand. They are fighting back.

* "Police in California Fight Citizen Complaints"
* By


From: Phil Carmody on
it's desired,
individuals are caught in the broad net of electronic surveillance.

The experts can record and analyze all your communications at will.

SIGINT organizations in Canada, US, UK, Australia, and New Zealand use
supercomputers such as the Cray to select items of interest. The list
is very fluid and is adapted rapidly to monitor people and policy areas.

At any time, it is likely to contain names of all world leaders, terrorists,
drug lords, mafia dons, members of radical groups, labor union activists
and leaders, types of weaponry, explosives, financial dealings, money
transfers, airline destinations, stock information, international
conferences, demonstrations, and politically suspect groups and individuals.

As is the case with operations, countries maintain deniability by getting
information gathered on their domestic situations by allies.

Under development is even more sophisticated "topic recognition" which
can home in on guarded conversations that avoid potential trigger words.

Nothing and no one is exempt.

For example, you are talking on the telephone to a friend discussing
your son's school play. "Boy," you say sadly, "Bobby really bombed last
night," or perhaps you use the word "assassination" or "sabotage" or any
one of the key words the computer has been told to flag.

A hard copy of your conversation is produced, passed to the appropriate
section (in this case terrorism), and probably ends up in the garbage.

But perhaps the conversation is not so clear-cut or the analyst has poor
judgement. Then your name is permanently filed under "possible terrorist".
Weeks or even years later, you have a similar conversation and use the
same words; the computer filters it out again. Since this is your second
time, y


From: tchow on
I am not an NSA employee.

I wrote it myself.


> P48, "Secret Power", by Nicky Hager
> The best set of keywords for each subject category is worked out over time,
> in part by experimentation.
>
> The staff sometimes trial a particular set of keywords for a period of time
> and, if they find they are getting too much 'junk', they can change some
> words to get a different selection of traffic.
>
> The Dictionary Manager administers the sets of keywords in the Dictionary
> computers, adding, amending and deleting as required.
>
> This is the person who adds the new keyword for the watch list, deletes a
> keyword from another because it is not triggering interesting messages,
> or adds a 'but not *****' to a category because it has been receiving too
> many irrelevant messages and a lot of them contain that word.

Wow, people whose only job is to edit the keywords.

What a cushy job!

What I can imagine accomplishing with billions of dollars of support, instead
of just little ol' me doing everything, is a truly nightmarish vision.


There's more.


******************************************************************************


The FBI Investigations
--- --- --------------

At the same time I was analyzing two Internet email feeds, I started a third.

During the five months of monitoring at Salomon, I also ran the previous
four months of Internet email (from the backups) through my analytics.

I found plenty of stuff there too.

Another major category of incidents: people in their last week at work.

In most cases from the backups, the person had already left the firm.

Even