From: JSH on 18 Apr 2008 20:22 " before critical U.S. computer * systems face major attack, the head of a White House panel on the nation's * infrastructure systems warned. * * Robert Marsh is the head of the President's Commission on Critical * Infrastructure Protection. Whatever should we do about those nasty hackers? ****************************************************************************** Secret Service: Harassment of 2600 ------ ------- ---------- -- ---- A group of above-ground hackers associated with 2600 were having a lawful peaceful public meeting at the Pentagon City Mall on November 6, 1992. The meeting was busted up by mall police for no apparent reason. Identification was demanded from everyone. Bags were searched. It's the 1990s now. The harassment was publicized by 2600, and a reporter talked to the head of the mall's security: he let slip that the Secret Service ordered them to harass 2600's lawful peaceful public meeting. That was definitely news. The mall security manager then denied what he said about Secret Service ordering the harassment: luckily the reporter recorded his conversation. CPSR [Computer Professionals for Social Responsibility] and Marc Rotenberg of EPIC [Electronic Privacy Information Center] began FOIA [U.S. Freedom of Information Act] proceedings to find out about this incident. The case raises significant issues of freedom of speech and assembly, privacy and government accountability. In response to an FOIA asking why this ha
From: tchow on 18 Apr 2008 23:29 of the surprised children: "How cheesy of our government!" NSA's ECHELON goes beyond any system Americans would EVER approve. That's why we weren't asked. If the full scope of ECHELON had been made public and debated in Congress and passed: civil war would have broken out. The CALEA bill was suddenly brought to a quick vote on the last day of Congress' session. Congress should be ashamed of itself. Have you NO IDEA what is at stake? We ARE at a crossroads. Passage of pro-crypto legislation is an important first step for backing away from the abyss of having every single aspect of our lives --- including our telephone calls --- monitored by computer for the UKUSA International Secret Government. Even the Prime Minister of New Zealand wasn't told about it. Even the director of the NSA wasn't told about it, until after a year [ Puzzle Palace, p333 ] of UKUSA deciding if he was "one of them". And, as documented in the books I've been referencing, when the director of the NSA knows about it and testifies before Congress, UKUSA not only lies about their activities, they also do so with impunity. A Secret Government? : The Puzzle Palace, Author James Bamford, 1983 revision, p206 : : Bypassing not only the Joint Chiefs but even the secretaries of the : branches of the armed forces, the NSCID devolves incredible authority : and responsibility on the NSA director, giving him, at least where : SIGINT is concerned, his own Army, Navy, Marines, and Air Force. Let's just say lots of secrecy, Military power, Military and civilian pers
From: Gerry Myerson on 18 Apr 2008 23:15 linked to Medicare. * In fact, the Department of Health used Social Security's computer * facilities there until their own were completed. * * A small, but highly significant, part of the building is, in fact, * occupied by Telecom. This is the part that contains the networking * junctions for the optical-fiber lines leased by the banks for their * "Electronic Funds Transfer System" (EFTS). ALL financial transactions * for the banks pass through there via subsidiary company, "Funds * Transfers Services Pty Ltd." (FTS) * The New York Times INTERNATIONAL Wednesday, May 21, 1997 * by Clyde H. Farnsworth, Woomera, Australia. * * As Darth Vader's Death Star is blown to bits in the newly remastered "Star * Wars" at the local theater, the audience of Australian and American Air * Force personnel, and squadrons of their children, lets out a whoop. As the * lights go on, everyone is beaming. * [snip] * * Pine Gap employs nearly 1,000 people, mainly from the CIA and the U.S. * National Reconnaissance Office. * * It is the ground station for a U.S. satellite network that intercepts * telephone, radio, data links and other communications around the world. Worldwide telephone interception. ******************
From: Tim Smith on 18 Apr 2008 22:02 have to : comply with a legion of rules to qualify for grants. : Kerrey's proposed bill, called "The Secure Public : Network Act," would add yet another provision to : the fine print. It requires that "all encryption : software purchased with federal funds shall be : software based on a system of key recovery" and : "all encrypted networks established with the use : of federal funds shall use encryption based on a : system of key recovery." Key recovery, or key : escrow, technology enables law-enforcement : officials to obtain copies of the mathematical keys : needed to decipher messages. In other words, : someone else keeps a copy of your secret key : -- and some proposed bills say that the cops : may not even need a search warrant to seize it. : [snip] : : What about the penalties for "unauthorized : breaking of another's encryption codes?" That : would criminalize cryptanalysis, the way to verify : the security of encryption software you buy. "The : only way to know the strength of a cipher is : cryptanalysis," says Marc Briceno, a : cryptography guru at Community ConneXion. : : Then there's Kerrey's statement saying "there : will be" restrictions on what encryption products : you're permitted to buy from overseas firms. This : contradicts Justice Department official Michael : Vatis, who told me at a conference this year that : the Clinton administration did not want import : controls. Though Cabe Franklin, spokesperson :
From: Risto Lankinen on 18 Apr 2008 20:25
Federal Bureau of Investigation Before the Senate Judiciary Committee June 4, 1997 THE ISSUES YOU AND THE OTHER MEMBERS RAISE ARE CRITICAL AND IMMEDIATE. MANY GO TO THE CORE OF THE FBI AND OUR ABILITY TO PROTECT THE AMERICAN PEOPLE. TO ADDRESS THESE VITAL ISSUES --- SERIOUS CRIME, TERRORISM AND ESPIONAGE --- THE FBI MUST BE AND IS A DYNAMIC INSTITUTION ANTICIPATING OR REACTING TO NEW TECHNOLOGY. PERHAPS UNLIKE ANY TIME IN OUR HISTORY, THE NATURE OF CRIME AND TERRORISM IS EVOLVING AT AN UNPRECEDENTED PACE. TERRORISM, BOTH INTERNATIONAL AND DOMESTIC THREATENS US LIKE NEVER BEFORE. * "The End of Ordinary Money, Part I", by J. Orlin Grabbe * * Ironically, the World Trade Center was subsequently bombed by a group * that was already under FBI surveillance. Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum War War War War War War War War War War War War War War War THE MARVELS OF THE INTERNET CAN BE USED FOR EVIL AGAINST CHILDREN. CHILDREN CONTINUE TO FALL PREY TO VIOLENT ABDUCTORS OR PEDOPHILES WHO NOW COME INTO HOMES OVER MODEMS AND TELEPHONE LINES. THE NEED FOR THE RIGHT INVESTIGATIVE TOOLS IS IMMEDIATE. * The FBI arrests hundreds for child pornography despite unbreakable * cryptography being available free worldwide for years. Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Drum D |