From: tchow on 18 Apr 2008 20:31 reveal our inner selves. ****************************************************************************** Why I Monitor --- - ------- Why do I feel companies should monitor their Internet traffic, but the Government shouldn't monitor me and everyone else? > Salomon is a "computer-based" firm. > > Any connections between Salomon's internal network and the outside world > exposes Salomon to a potential number of problems. > > One of the largest data pipelines in and out of Salomon are its Internet > connections. > > Therefore it is also a large security problem, which must be managed. > [snip] > > The terminology "email monitoring" has a Big-Brother ring to it. > > But monitor it we must - there is no choice. > > It connects all of our inside systems to all of outside. > > And it is the Internet ("public wire") traffic going in/out of Salomon > we are checking - not internal email. > > The security rule for Internet traffic is "don't send anything you > wouldn't want to read about in tomorrow's news
From: Chip Eastham on 18 Apr 2008 20:44 on New York City's Grand Central Station pay phones, bureau head John Ingersoll asked the NSA for help. Within a few months the spy agency was sorting through all the conversations it was already acquiring for general intelligence purposes. Of course, the technicians were required to acquire, monitor, and discard a large number of calls made by people with no connection with the cocaine business in South American cities. But so pleased was Mr. Ingersoll with the tips he was getting from the dragnet monitoring that he ultimately persuaded the NSA to monitor simultaneously nineteen other U.S. communication hubs. ] * "Project L.U.C.I.D.", continued... * * Fort Meade is the hub of an information gathering octopus whose tentacles * reach out to the four corners of the earth. * * The principal means of communicating this information is by the National * Aeronautical and Space Administration (NASA) satellite communications * system, which most people erroneously think exists primarily for the * space program. * * It does not. * * The satellites,
From: Pubkeybreaker on 18 Apr 2008 20:17 keeping a file ("but we 'closed' it") on him even though they should have seen he was not a threat to national security. Fear, loathing, hysteria, and spying on our reading habits: The FBI also had their counter-intelligence unit start a "Library Awareness Program", which meant they wanted to know everyone who checked out certain books. What a bunch of peeping tommy guns! * "LIBRARY SPY HUNT IS CURBED BY FBI", By Herbert Mitgang, NYT, 11/11/1988 * * Bowing to pressure from a House subcommittee and continued resistance from * librarians, the Federal Bureau of Investigation has set limits on its * program seeking the help of librarians in "detecting Soviet spies." * * Under the Library Awareness Program. which the FBI says has been in exist- * ence for years, librarians have been asked to report suspicious-looking * people who might be Soviet spies, to be alert to which books and periodi- * cals such people read or check out and to disclose the names and informa- * tion about book borrowers suspected of using libraries for espionage * purposes or recruiting library users for espionage [what???]. * * FBI Director William S. Sessions said the bureau would continue to contact * public, university and corporate libraries in the New York City area about * "hostile intelligence service activities at libraries." [fuh-gedda-boutit] Of course, they know all the books you've ever bought using credit cards. Fear, loathing, hysteria, and a loosening of the rules for "national security": * "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996 * * After the Oklahoma City bombing, Deputy Attorney General Jamie Gorelick * and FBI Director Freeh announced that they had decided to reinterpret * twenty-year-old Justice Department guidelines originally put in place to * restrain the FBI from violating the constitutional rights of polit
From: Pubkeybreaker on 18 Apr 2008 20:37 of the lines between Military and civilian control. o Requests for political reasons are acceptable. (last paragraph) o The NSA uses a huge number of computers to listen for "key words" on "watch lists" for ALL border crossing traffic, including voice conversations. That means in 1975 they could convert voice to text, then do keyword searches against it. It's 1997 now. Just how did United States citizens lose these Fourth Amendment rights, granted by the Constitution? And why is the Military monitoring the communications of Americans on U.S. soil and working with domestic law enforcement? Well, one day President Truman issued a secret order creating the NSA. As testified by Library of Congress members on C-SPAN, the names of these presidential findings change with administrations. They are called variously Presidential Decision Directives, National Security Council Decision Directives, Executive Orders, etc. One might think these special override-the-constitution presidential directives (which came out of nowhere) would be used for short-term emergencies. Wrong: the NSA is now a HUGE intelligence organization, eating billions and billions and billions and billions of dollars in budgets each year, and monitoring billions of
From: JSH on 18 Apr 2008 23:01
"probable" file. Sound absurd? Not at all; it actually happened while I was at CSE. [snip] SIGINT specialists are honing their skills at monitoring digital information. SIGINT agencies everywhere are increasingly throwing their surveillance web over the Internet and other data networks of interest. [snip] Mini-recap: o The countries sharing intelligence: US, UK, Canada, Australia, New Zealand o Massive domestic spying by the NSA, using an Orwellian "1984" technology to search all communications using computers, including domestic phone calls, via keyword searches. o Circumvention of domestic spy laws via friendly "foreign" agents ****************************************************************************** Wow. How chilling to think the military has set up a real-life domestic Orwellian spy apparatus. Used repeatedly for political purposes. ECHELON has almost no Military purpose left: Russia is practically part of NATO now. We must start dismantling ECHELON before it is too late. 6/3/97: Barnes & Noble informs me his book is no longer available, and that my order is cancelled. ****************************************************************************** BAM-BAM-BAM --- --- --- Let's pause to take a look back at the first and still classic expose of NSA. : The Puzzle Palace : Inside the National Security Agency, : America's most secret intelligence organization : Author James Bamford, 1983 revision, ISBN 0-14-00.6748-5 Page numbers are from the above 1983 release. Ready? P171-172: David Kahn, in a transatlantic phone call, reluc |