From: Risto Lankinen on 18 Apr 2008 21:29 the Congressman continued, "has been * perverted too often into a series of frontal attacks on basic * American constitutional guarantees --- including due process, * the presumption of innocence, and the right to own and enjoy * private property." ---- * 2 Customs Agents are Facing Charges in Kidnapping Case * by David Kocieniewski, The New York Times, 1996 * * Two United States Customs inspectors have been charged with kidnapping * and beating someone they suspected was a drug dealer last year while * trying to rob him of cash and cocaine, Federal prosecutors said. * * Three men charged in all put on bullet-proof vests and police badges, * according to the complaint, and stopped the victim after identifying * themselves as Federal agents. The Federal agents then beat the man, * handcuffed him, forced him into their car and drove off, witnesses * said. * * The victim, whom Federal officials refuse to identify, dashed from the * car when it stopped at an intersection and persuaded a motorist to take * him to a police station. Wow. People seeking sanctuary fr
From: JSH on 18 Apr 2008 20:41 Secret Service ordering the harassment: luckily the reporter recorded his conversation. CPSR [Computer Professionals for Social Responsibility] and Marc Rotenberg of EPIC [Electronic Privacy Information Center] began FOIA [U.S. Freedom of Information Act] proceedings to find out about this incident. The case raises significant issues of freedom of speech and assembly, privacy and government accountability. In response to an FOIA asking why this happened, the Secret Service responded: "We are sure no one knows why we had the meeting disrupted". They have made a mockery of FOIA. This mockery of FOIA is still being litigated by EPIC. An intentional illegal government surveillance program...it just never stops. Marc Rotenberg has gotten the Secret Service to admit in court that this was done to "investigate hacking into a company's telephone switch." Since when did the "investigative" techniques used by the Secret Service become valid for use in the United States? Going up to a bunch of mall patrons and DEMANDING IDENTIFICATION from them and searching them? How exactly was this supposed to further investigate a switch hacking? For extended details of this governmental perse
From: Rotwang on 18 Apr 2008 20:59 Why I Monitor --- - ------- Why do I feel companies should monitor their Internet traffic, but the Government shouldn't monitor me and everyone else? > Salomon is a "computer-based" firm. > > Any connections between Salomon's internal network and the outside world > exposes Salomon to a potential number of problems. > > One of the largest data pipelines in and out of Salomon are its Internet > connections. > > Therefore it is also a large security problem, which must be managed. > [snip] > > The terminology "email monitoring" has a Big-Brother ring to it. > > But monitor it we must - there is no choice. > > It connects all of our inside systems to all of outside. > > And it is the Internet ("public wire") traffic going in/out of Salomon > we are checking - not internal email. > > The security rule for Internet traffic is "don't send anything you > wouldn't want to read about in tomorrow's newspaper". I think it's pretty obvious why company traffic involving company systems is monitored. After all, companies aren't democracies. Finally, I should point out that all the people at both sites were told repeatedly that Internet email was being monitored; this includes all traffic picked up by my JobTalk analytic: > Salomon site. > > All sites start out with the employment contract stating unequivocally > that the systems are the company's and are to be used only for work > purposes. And that they are subject to inspection. You signed it. > > Salomon's goes further by stating the firm's computer systems may be > audited and that they have the right to do so even if you have put > personal information on the system. > > After the first couple of months of security incidents at Salomon, > they began issuing global email broadcasts saying that a new security > package "Internet Risk Management: email facility" had been installed, > and that Internet email traffic was actively being monitored. >
From: Gage on 18 Apr 2008 22:41 or techniques. Cybernetic control of society. Everything on-line and monitored in real-time. : From: "EPIC-News" <epic-news(a)epic.org> : Date: 05 Jun 1997 19:01:58 -0400 : Subject: EPIC: Clinton Endorses Privacy Rights : : In a commencement address at Morgan State University on May 18, : President Clinton called privacy "one of our most cherished freedoms" : and said that technology should not "break down the wall of privacy and : autonomy free citizens are guaranteed in a free society." Is President Clinton being honest? He supports Clipper III and ECHELON's legal domestic extension CALEA. The Washington Post, July 7, 1996: the Clinton Administration has sharply increased use of Federal telephone wiretaps and other electronic surveillance and officials estimate it will continue to grow. What do you think? Whitfield Diffie, Distinguished Engineer---Security at Sun Microsystems: "An essential element of freedom is the right to privacy, a right that cannot be expected to stand against an unremitting technological attack." One cannot come up with a more 'unremitting technological attack' than what is happening now. Tha
From: Gerry Myerson on 18 Apr 2008 20:50
Yes. [201-207] * * "Safe harbor" liability protections for * licensed CA's and recovery agents * Yes. Yes. [501-505] Less extensive * than Administration draft. * * Requires Pres. to negotiate for * international key recovery. * No. Yes. [Title 6] * * New Commerce Dept. enforcement * powers * No. Yes. [701-702] * * Information Security Board * No. Yes. [801] * * Waiver of any provision of Act by * Executive Order. * No. Yes [901] * * * *The Encrypted Data Security Act, draft dated April 29, 1997. * * **The Secure Public Networks Act, as released on June 17 * by Senator Kerrey's office. Crypto is either GAK crackable, or it is real crypto. There is no such thing as "good faith attempts to balance". You either have to choose between the best interests of the |