From: JSH on
" before critical U.S. computer
* systems face major attack, the head of a White House panel on the nation's
* infrastructure systems warned.
*
* Robert Marsh is the head of the President's Commission on Critical
* Infrastructure Protection.

Whatever should we do about those nasty hackers?

******************************************************************************

Secret Service: Harassment of 2600
------ ------- ---------- -- ----

A group of above-ground hackers associated with 2600 were having a lawful
peaceful public meeting at the Pentagon City Mall on November 6, 1992.

The meeting was busted up by mall police for no apparent reason.

Identification was demanded from everyone.

Bags were searched.

It's the 1990s now.

The harassment was publicized by 2600, and a reporter talked to the head
of the mall's security: he let slip that the Secret Service ordered them
to harass 2600's lawful peaceful public meeting.

That was definitely news.

The mall security manager then denied what he said about Secret Service
ordering the harassment: luckily the reporter recorded his conversation.

CPSR [Computer Professionals for Social Responsibility] and Marc Rotenberg
of EPIC [Electronic Privacy Information Center] began FOIA [U.S. Freedom
of Information Act] proceedings to find out about this incident.

The case raises significant issues of freedom of speech and assembly,
privacy and government accountability.

In response to an FOIA asking why this ha


From: tchow on
of the surprised children: "How cheesy of our government!"


NSA's ECHELON goes beyond any system Americans would EVER approve.

That's why we weren't asked.

If the full scope of ECHELON had been made public and debated
in Congress and passed: civil war would have broken out.

The CALEA bill was suddenly brought to a quick
vote on the last day of Congress' session.

Congress should be ashamed of itself.

Have you NO IDEA what is at stake?

We ARE at a crossroads.

Passage of pro-crypto legislation is an important first step for backing
away from the abyss of having every single aspect of our lives --- including
our telephone calls --- monitored by computer for the UKUSA International
Secret Government.

Even the Prime Minister of New Zealand wasn't told about it.

Even the director of the NSA wasn't told about it, until after a year
[ Puzzle Palace, p333 ] of UKUSA deciding if he was "one of them".

And, as documented in the books I've been referencing, when the director
of the NSA knows about it and testifies before Congress, UKUSA not only
lies about their activities, they also do so with impunity.

A Secret Government?

: The Puzzle Palace, Author James Bamford, 1983 revision, p206
:
: Bypassing not only the Joint Chiefs but even the secretaries of the
: branches of the armed forces, the NSCID devolves incredible authority
: and responsibility on the NSA director, giving him, at least where
: SIGINT is concerned, his own Army, Navy, Marines, and Air Force.

Let's just say lots of secrecy, Military power, Military and civilian
pers


From: Gerry Myerson on
linked to Medicare.
* In fact, the Department of Health used Social Security's computer
* facilities there until their own were completed.
*
* A small, but highly significant, part of the building is, in fact,
* occupied by Telecom. This is the part that contains the networking
* junctions for the optical-fiber lines leased by the banks for their
* "Electronic Funds Transfer System" (EFTS). ALL financial transactions
* for the banks pass through there via subsidiary company, "Funds
* Transfers Services Pty Ltd." (FTS)


* The New York Times INTERNATIONAL Wednesday, May 21, 1997
* by Clyde H. Farnsworth, Woomera, Australia.
*
* As Darth Vader's Death Star is blown to bits in the newly remastered "Star
* Wars" at the local theater, the audience of Australian and American Air
* Force personnel, and squadrons of their children, lets out a whoop. As the
* lights go on, everyone is beaming.
* [snip]
*
* Pine Gap employs nearly 1,000 people, mainly from the CIA and the U.S.
* National Reconnaissance Office.
*
* It is the ground station for a U.S. satellite network that intercepts
* telephone, radio, data links and other communications around the world.

Worldwide telephone interception.


******************


From: Tim Smith on
have to
: comply with a legion of rules to qualify for grants.
: Kerrey's proposed bill, called "The Secure Public
: Network Act," would add yet another provision to
: the fine print. It requires that "all encryption
: software purchased with federal funds shall be
: software based on a system of key recovery" and
: "all encrypted networks established with the use
: of federal funds shall use encryption based on a
: system of key recovery." Key recovery, or key
: escrow, technology enables law-enforcement
: officials to obtain copies of the mathematical keys
: needed to decipher messages. In other words,
: someone else keeps a copy of your secret key
: -- and some proposed bills say that the cops
: may not even need a search warrant to seize it.
: [snip]
:
: What about the penalties for "unauthorized
: breaking of another's encryption codes?" That
: would criminalize cryptanalysis, the way to verify
: the security of encryption software you buy. "The
: only way to know the strength of a cipher is
: cryptanalysis," says Marc Briceno, a
: cryptography guru at Community ConneXion.
:
: Then there's Kerrey's statement saying "there
: will be" restrictions on what encryption products
: you're permitted to buy from overseas firms. This
: contradicts Justice Department official Michael
: Vatis, who told me at a conference this year that
: the Clinton administration did not want import
: controls. Though Cabe Franklin, spokesperson
:


From: Risto Lankinen on
Federal Bureau of Investigation
Before the Senate Judiciary Committee

June 4, 1997

THE ISSUES YOU AND THE OTHER MEMBERS RAISE ARE CRITICAL AND IMMEDIATE.
MANY GO TO THE CORE OF THE FBI AND OUR ABILITY TO PROTECT THE AMERICAN
PEOPLE. TO ADDRESS THESE VITAL ISSUES --- SERIOUS CRIME, TERRORISM AND
ESPIONAGE --- THE FBI MUST BE AND IS A DYNAMIC INSTITUTION ANTICIPATING
OR REACTING TO NEW TECHNOLOGY. PERHAPS UNLIKE ANY TIME IN OUR HISTORY,
THE NATURE OF CRIME AND TERRORISM IS EVOLVING AT AN UNPRECEDENTED PACE.
TERRORISM, BOTH INTERNATIONAL AND DOMESTIC THREATENS US LIKE NEVER BEFORE.

* "The End of Ordinary Money, Part I", by J. Orlin Grabbe
*
* Ironically, the World Trade Center was subsequently bombed by a group
* that was already under FBI surveillance.

Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang
Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum
War War War War War War War War War War War War War War War


THE MARVELS OF THE INTERNET CAN BE USED FOR EVIL AGAINST CHILDREN.
CHILDREN CONTINUE TO FALL PREY TO VIOLENT ABDUCTORS OR PEDOPHILES WHO
NOW COME INTO HOMES OVER MODEMS AND TELEPHONE LINES. THE NEED FOR THE
RIGHT INVESTIGATIVE TOOLS IS IMMEDIATE.

* The FBI arrests hundreds for child pornography despite unbreakable
* cryptography being available free worldwide for years.

Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang
Drum D