From: fortune.bruce on 18 Apr 2008 20:45 the Internet and other data networks of interest. [snip] Mini-recap: o The countries sharing intelligence: US, UK, Canada, Australia, New Zealand o Massive domestic spying by the NSA, using an Orwellian "1984" technology to search all communications using computers, including domestic phone calls, via keyword searches. o Circumvention of domestic spy laws via friendly "foreign" agents ****************************************************************************** Wow. How chilling to think the military has set up a real-life domestic Orwellian spy apparatus. Used repeatedly for political purposes. ECHELON has almost no Military purpose left: Russia is practically part of NATO now. We must start dismantling ECHELON before it is too late. 6/3/97: Barnes & Noble informs me his book is no longer available, and that my order is cancelled. ****************************************************************************** BAM-BAM-BAM --- --- --- Let's pause to take a look back at the first and still classic expose of NSA. : The Puzzle Palace : Inside the National Security Agency, : America's most secret intelligence organization : Author James Bamford, 1983 revision, ISBN 0-14-00.6748-5 Page numbers are from the above 1983 release. Ready? P171-172: David Kahn, in a transatlantic phone call, reluctantly agreed to delete a handful of paragraphs dealing with the most sensitive subject of all: NSA's relationship with its supersecret British partner, GCHQ. "The two agencies exchange personnel on a temporary basis... A similar but much smaller liaison program is maintained with Canada and Australia." P399: After
From: quasi on 18 Apr 2008 22:15 The principal underlying both * was the doctrine of efficiency: maximizing the benefits received from the * efforts and expenditures---a cost benefit analysis. Cyberneticians hope to use their capabilities for the betterment of the human race, of which they are a part. They are not naive when it comes to the government and politics, either. * "The Rise of the Computer State", David Burnham, 1984 * * Norbert Wiener, the MIT professor who is generally credited with being * one of the principal minds behind the development of the computer, * refused to take research money from the Pentagon because he was * convinced it would corrupt his research and undermine his independence. When Stafford Beer monitored factories and banks to give the government the necessary tools to govern the economy effectively, he chose to monitor national infrastructure of the industrial variety. However, even he knows what can happen with cybernetic control in the wrong hands: * "Brain of the Firm", Stafford Beer, 1986, ISBN 0 471 27687 1 * * If Project Cybersyn were altered, and the tools used are not the * tools we made, they could become instruments of oppression. Unlike Stafford Beer, the NSA and FBI have been moving to monitor not only our bank transactions, but also telephone, fax, Internet, telex communications of all people and businesses and with CALEA want that capability given to them at the design stage. Cybernetic-level monitoring of our electronic s
From: JSH on 18 Apr 2008 23:09 -9763, caq(a)igc.org, http://mediafilter.org/caq Article: "Second Thoughts from the Second Oldest Profession. Inside the US-Canada Spyworld." By Mike Frost [ Pictured is him on two of his Canadian security IDs ] I was a spy. For almost two decades, I spied for Canada's Communications Security Establishment (CSE), the most secret and least known branch of National Defense. But although my paycheck came from the Canadian government, more often than not, my orders, assignments, and much of my training --- like those of many other CSE operators --- came from the National Security Agency (NSA) in Fort Meade, Maryland. Over the twelve years I spied for CSE, it became increasingly to resemble the NSA. Both specialize in providing secure communications and signals intelligence (SIGINT); both operated for years with little public knowledge or legislative oversight until they were exposed by the media. [snip] Despite the similarities, CSE is treated more like a subsidiary than an equal partner. US military and economic clout, as well as NSA's vastly superior technical capabilities and near unlimited funds, allow Washington to dominate. And while CSE has only a $200-300 million dollar budget, NSA has an estimated annual budget of almost $4 billion. But the relationship is not without mutual benefits. CSE, NSA, and Britain's Government Communications Headquarters (GCHQ) use each other's facilities and personnel to spy on friend and foe alike and, more alarmingly, to circumvent domestic laws and spy on their own populations. [snip] I either participated in or had direct knowledge of operations in which CSE operated alone or joined with NSA or GCHQ to: o intercept communications in other countries from the confines of Canadian embassies around the world with the knowledge of the ambassador; o aid politicians, political parties, or factions in an allied country
From: Phil Carmody on 18 Apr 2008 20:23 And when the judiciary found out about NSA monitoring U.S. citizens' overseas telephone calls without a warrant: they approved the loss of our Fourth Amendment rights. Giving Presidential Directives the same force of law as the Constitution. Congress has lost it too. * The New York Times, undated * * The House is not expected to vote on the search-and-seizure bill until * at least Wednesday. But tonight the Republicans defeated a Democratic * amendment that SIMPLY REITERATED THE WORDS OF THE FOURTH AMENDMENT OF * THE UNITED STATES CONSTITUTION. * * The vote was 303 to 121. * * The Democrats were trying to portray the Republicans as wanting to * eliminate the constitutional protection against unlawful searches. * * Indeed, they cornered the Republicans into saying that the measure * containing the Fourth Amendment would gut the seizure bill. Just what is it going to take to restore the U.S. Constitution? Unlimited unregulated cryptography legislation is a beginning baby-step. Otherwise it might take another civil war. The NSA will not let go quietly. Sound over-the-top?
From: Gage on 18 Apr 2008 22:11
War o Physical and psychological terror to control targeted individuals and groups The constant state of War is used by politicians to control us little people. As it was in the book 1984. Did you know the U.S. has been in a state of Drug War since the 1960s? This section of the manifesto is about constantly beating the Drum of War... * "1984", author George Orwell, 1949, ISBN 0-679-41739-7 * * Winston could not definitely remember a time when his country had not * been at war...war had literally been continuous, though strictly speaking * it had not always been the same war. * * The enemy of the moment always represented absolute evil. * "Taking Control - Politics in the Information Age" * Authors Morely Winograd & Dudley Buffa, 1996, ISBN 0-8050-4489-2 * * From Richard Nixon's law and order campaign in 1968 to George Bush's * infamous Willie Horton ad in 1988, Republicans have attempted to define * their differences with Democrats by a no-nonsense position on crime and * criminals. * * It helped Republicans win the presidency, and it also gave them the * tool by which to control the Democratic majorities in Congress that * might allow their opponents to label them as soft on crime. * * No Democrat, except those in overwhelmingly Democratic districts, could * afford to cast any votes in Congress that might allow their opponents * to label them soft on crime. A constant state of law enforcement hysteria. The absolute pinnacle of War terminology was the phrase "Zero Tolerance". We will monitor and prosecute mercilessly with m |