From: fortune.bruce on
the Internet and other data networks
of interest.
[snip]


Mini-recap:

o The countries sharing intelligence: US, UK, Canada, Australia,
New Zealand

o Massive domestic spying by the NSA, using an Orwellian "1984"
technology to search all communications using computers, including
domestic phone calls, via keyword searches.

o Circumvention of domestic spy laws via friendly "foreign" agents

******************************************************************************




Wow.


How chilling to think the military has set up
a real-life domestic Orwellian spy apparatus.

Used repeatedly for political purposes.


ECHELON has almost no Military purpose left:
Russia is practically part of NATO now.

We must start dismantling ECHELON before it is too late.


6/3/97: Barnes & Noble informs me his book is no longer
available, and that my order is cancelled.


******************************************************************************

BAM-BAM-BAM
--- --- ---

Let's pause to take a look back at the first and still classic expose of NSA.

: The Puzzle Palace
: Inside the National Security Agency,
: America's most secret intelligence organization
: Author James Bamford, 1983 revision, ISBN 0-14-00.6748-5

Page numbers are from the above 1983 release.

Ready?


P171-172: David Kahn, in a transatlantic phone call, reluctantly agreed to
delete a handful of paragraphs dealing with the most sensitive subject of
all: NSA's relationship with its supersecret British partner, GCHQ. "The
two agencies exchange personnel on a temporary basis... A similar but much
smaller liaison program is maintained with Canada and Australia."


P399: After


From: quasi on
The principal underlying both
* was the doctrine of efficiency: maximizing the benefits received from the
* efforts and expenditures---a cost benefit analysis.


Cyberneticians hope to use their capabilities for the
betterment of the human race, of which they are a part.

They are not naive when it comes to the government and politics, either.

* "The Rise of the Computer State", David Burnham, 1984
*
* Norbert Wiener, the MIT professor who is generally credited with being
* one of the principal minds behind the development of the computer,
* refused to take research money from the Pentagon because he was
* convinced it would corrupt his research and undermine his independence.

When Stafford Beer monitored factories and banks to give the government
the necessary tools to govern the economy effectively, he chose to
monitor national infrastructure of the industrial variety.

However, even he knows what can happen
with cybernetic control in the wrong hands:

* "Brain of the Firm", Stafford Beer, 1986, ISBN 0 471 27687 1
*
* If Project Cybersyn were altered, and the tools used are not the
* tools we made, they could become instruments of oppression.

Unlike Stafford Beer, the NSA and FBI have been moving to monitor not
only our bank transactions, but also telephone, fax, Internet, telex
communications of all people and businesses and with CALEA want that
capability given to them at the design stage.

Cybernetic-level monitoring of our electronic s


From: JSH on
-9763, caq(a)igc.org, http://mediafilter.org/caq

Article: "Second Thoughts from the Second Oldest Profession.
Inside the US-Canada Spyworld."
By Mike Frost

[ Pictured is him on two of his Canadian security IDs ]

I was a spy. For almost two decades, I spied for Canada's Communications
Security Establishment (CSE), the most secret and least known branch of
National Defense. But although my paycheck came from the Canadian government,
more often than not, my orders, assignments, and much of my training ---
like those of many other CSE operators --- came from the National Security
Agency (NSA) in Fort Meade, Maryland.

Over the twelve years I spied for CSE, it became increasingly to resemble
the NSA. Both specialize in providing secure communications and signals
intelligence (SIGINT); both operated for years with little public knowledge
or legislative oversight until they were exposed by the media.
[snip]

Despite the similarities, CSE is treated more like a subsidiary than an
equal partner. US military and economic clout, as well as NSA's vastly
superior technical capabilities and near unlimited funds, allow Washington
to dominate.

And while CSE has only a $200-300 million dollar budget, NSA has an
estimated annual budget of almost $4 billion.

But the relationship is not without mutual benefits. CSE, NSA, and Britain's
Government Communications Headquarters (GCHQ) use each other's facilities
and personnel to spy on friend and foe alike and, more alarmingly, to
circumvent domestic laws and spy on their own populations.
[snip]

I either participated in or had direct knowledge of operations in which
CSE operated alone or joined with NSA or GCHQ to:

o intercept communications in other countries from the confines of
Canadian embassies around the world with the knowledge of the
ambassador;

o aid politicians, political parties, or factions in an allied country



From: Phil Carmody on
And when the judiciary found out about NSA monitoring U.S. citizens'
overseas telephone calls without a warrant: they approved the loss
of our Fourth Amendment rights.

Giving Presidential Directives the same force of law as the Constitution.

Congress has lost it too.

* The New York Times, undated
*
* The House is not expected to vote on the search-and-seizure bill until
* at least Wednesday. But tonight the Republicans defeated a Democratic
* amendment that SIMPLY REITERATED THE WORDS OF THE FOURTH AMENDMENT OF
* THE UNITED STATES CONSTITUTION.
*
* The vote was 303 to 121.
*
* The Democrats were trying to portray the Republicans as wanting to
* eliminate the constitutional protection against unlawful searches.
*
* Indeed, they cornered the Republicans into saying that the measure
* containing the Fourth Amendment would gut the seizure bill.

Just what is it going to take to restore the U.S. Constitution?

Unlimited unregulated cryptography legislation is a beginning baby-step.

Otherwise it might take another civil war. The NSA will not let go quietly.

Sound over-the-top?


From: Gage on
War
o Physical and psychological terror to
control targeted individuals and groups

The constant state of War is used by politicians to
control us little people. As it was in the book 1984.


Did you know the U.S. has been in a state of Drug War since the 1960s?

This section of the manifesto is about constantly beating the Drum of War...


* "1984", author George Orwell, 1949, ISBN 0-679-41739-7
*
* Winston could not definitely remember a time when his country had not
* been at war...war had literally been continuous, though strictly speaking
* it had not always been the same war.
*
* The enemy of the moment always represented absolute evil.


* "Taking Control - Politics in the Information Age"
* Authors Morely Winograd & Dudley Buffa, 1996, ISBN 0-8050-4489-2
*
* From Richard Nixon's law and order campaign in 1968 to George Bush's
* infamous Willie Horton ad in 1988, Republicans have attempted to define
* their differences with Democrats by a no-nonsense position on crime and
* criminals.
*
* It helped Republicans win the presidency, and it also gave them the
* tool by which to control the Democratic majorities in Congress that
* might allow their opponents to label them as soft on crime.
*
* No Democrat, except those in overwhelmingly Democratic districts, could
* afford to cast any votes in Congress that might allow their opponents
* to label them soft on crime.

A constant state of law enforcement hysteria.


The absolute pinnacle of War terminology was the phrase "Zero Tolerance".

We will monitor and prosecute mercilessly with m