From: tchow on
reveal our inner selves.


******************************************************************************


Why I Monitor
--- - -------


Why do I feel companies should monitor their Internet traffic, but the
Government shouldn't monitor me and everyone else?

> Salomon is a "computer-based" firm.
>
> Any connections between Salomon's internal network and the outside world
> exposes Salomon to a potential number of problems.
>
> One of the largest data pipelines in and out of Salomon are its Internet
> connections.
>
> Therefore it is also a large security problem, which must be managed.
>
[snip]
>
> The terminology "email monitoring" has a Big-Brother ring to it.
>
> But monitor it we must - there is no choice.
>
> It connects all of our inside systems to all of outside.
>
> And it is the Internet ("public wire") traffic going in/out of Salomon
> we are checking - not internal email.
>
> The security rule for Internet traffic is "don't send anything you
> wouldn't want to read about in tomorrow's news


From: Chip Eastham on
on New York City's Grand Central
Station pay phones, bureau head John Ingersoll asked the NSA for help.

Within a few months the spy agency was sorting through all the
conversations it was already acquiring for general intelligence
purposes.

Of course, the technicians were required to acquire, monitor, and
discard a large number of calls made by people with no connection
with the cocaine business in South American cities.

But so pleased was Mr. Ingersoll with the tips he was getting from the
dragnet monitoring that he ultimately persuaded the NSA to monitor
simultaneously nineteen other U.S. communication hubs.

]

* "Project L.U.C.I.D.", continued...
*
* Fort Meade is the hub of an information gathering octopus whose tentacles
* reach out to the four corners of the earth.
*
* The principal means of communicating this information is by the National
* Aeronautical and Space Administration (NASA) satellite communications
* system, which most people erroneously think exists primarily for the
* space program.
*
* It does not.
*
* The satellites,


From: Pubkeybreaker on
keeping a file ("but we 'closed' it") on him even
though they should have seen he was not a threat to national security.

Fear, loathing, hysteria, and spying on our reading habits:

The FBI also had their counter-intelligence unit start a "Library Awareness
Program", which meant they wanted to know everyone who checked out certain
books.

What a bunch of peeping tommy guns!

* "LIBRARY SPY HUNT IS CURBED BY FBI", By Herbert Mitgang, NYT, 11/11/1988
*
* Bowing to pressure from a House subcommittee and continued resistance from
* librarians, the Federal Bureau of Investigation has set limits on its
* program seeking the help of librarians in "detecting Soviet spies."
*
* Under the Library Awareness Program. which the FBI says has been in exist-
* ence for years, librarians have been asked to report suspicious-looking
* people who might be Soviet spies, to be alert to which books and periodi-
* cals such people read or check out and to disclose the names and informa-
* tion about book borrowers suspected of using libraries for espionage
* purposes or recruiting library users for espionage [what???].
*
* FBI Director William S. Sessions said the bureau would continue to contact
* public, university and corporate libraries in the New York City area about
* "hostile intelligence service activities at libraries." [fuh-gedda-boutit]

Of course, they know all the books you've ever bought using credit cards.

Fear, loathing, hysteria, and a loosening of the rules for "national security":

* "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996
*
* After the Oklahoma City bombing, Deputy Attorney General Jamie Gorelick
* and FBI Director Freeh announced that they had decided to reinterpret
* twenty-year-old Justice Department guidelines originally put in place to
* restrain the FBI from violating the constitutional rights of polit


From: Pubkeybreaker on
of the lines between Military and civilian control.

o Requests for political reasons are acceptable. (last paragraph)

o The NSA uses a huge number of computers to listen for "key words"
on "watch lists" for ALL border crossing traffic, including voice
conversations. That means in 1975 they could convert voice to text,
then do keyword searches against it. It's 1997 now.

Just how did United States citizens lose these Fourth Amendment rights,
granted by the Constitution? And why is the Military monitoring the
communications of Americans on U.S. soil and working with domestic law
enforcement?

Well, one day President Truman issued a secret order creating the NSA.

As testified by Library of Congress members on C-SPAN, the names of these
presidential findings change with administrations. They are called variously
Presidential Decision Directives, National Security Council Decision
Directives, Executive Orders, etc.

One might think these special override-the-constitution presidential
directives (which came out of nowhere) would be used for short-term
emergencies.

Wrong: the NSA is now a HUGE intelligence organization, eating billions
and billions and billions and billions of dollars in budgets each year,
and monitoring billions of


From: JSH on
"probable" file.

Sound absurd? Not at all; it actually happened while I was at CSE.
[snip]

SIGINT specialists are honing their skills at monitoring digital
information. SIGINT agencies everywhere are increasingly throwing
their surveillance web over the Internet and other data networks
of interest.
[snip]


Mini-recap:

o The countries sharing intelligence: US, UK, Canada, Australia,
New Zealand

o Massive domestic spying by the NSA, using an Orwellian "1984"
technology to search all communications using computers, including
domestic phone calls, via keyword searches.

o Circumvention of domestic spy laws via friendly "foreign" agents

******************************************************************************




Wow.


How chilling to think the military has set up
a real-life domestic Orwellian spy apparatus.

Used repeatedly for political purposes.


ECHELON has almost no Military purpose left:
Russia is practically part of NATO now.

We must start dismantling ECHELON before it is too late.


6/3/97: Barnes & Noble informs me his book is no longer
available, and that my order is cancelled.


******************************************************************************

BAM-BAM-BAM
--- --- ---

Let's pause to take a look back at the first and still classic expose of NSA.

: The Puzzle Palace
: Inside the National Security Agency,
: America's most secret intelligence organization
: Author James Bamford, 1983 revision, ISBN 0-14-00.6748-5

Page numbers are from the above 1983 release.

Ready?


P171-172: David Kahn, in a transatlantic phone call, reluc