From: Pubkeybreaker on 18 Apr 2008 23:10 a LEVEL HIGHER THAN AT ANY TIME DURING THE COLD WAR. 1984 means a constant State of War. Here's a new war: "cyberwar". # "Head of CIA Plans Center To Protect Federal Computers" # By Tim Weiner, The New York Times, 6/26/96 # # John Deutch, Director of the CIA, is building a "cyberwar" center in the NSA. # # Mr. Deutch said cyberwar could become a 21st-century national security threat # second only to nuclear, biological and chemical weapons. # # "The electron," Mr. Deutch warned, "is the ultimate precision-guided weapon." Haven't I heard bad dialogue like this on Mystery Science Theater 3000? It is simply another in an endless series of requests for funding, for misuse of our tax money. ---- Louis Freeh's FBI: * "FBI Scare Tactics", By Richard Moran, The New York Times, 1996 * * When the FBI reported that serious crime declined for the fourth year * in a row, it was still making the statistics sound worse than they * actually were. * * That's because Government tends to exaggerate the violent nature of crime. * * According to the Justice Department's Bureau of Justice Statistics, less * than a third of the 6.6 million violent crimes committed in the U.S in 1992 * resulted in injury; most of the victims suffered only minor cuts, scratches * or bruises. * * About 20 percent of them needed minor medical care; 7 percent went to * emergency rooms. Only 1 percent of the victims were hurt seriously enough * to require hospitalization. * * The incongruity arises because of the way the law defines violent crime. * * For example, aggravated assault is defined as either intentionally causing * serious bodily harm or using a weapon to threaten or attempt to cause * bodily harm. * * Fortunately, most aggravated assault victims fall into the last category; * most victims are never touched by the offender. * * The same held true for armed robbery. Only 3 percent required medical *
From: JSH on 18 Apr 2008 21:57 about the meaning of the : U.S. Constitution. Nor was it an aberration: the 1980s joined the 1960s and 1970s with yet another massive use of this Orwellian technology for political purposes. And these are when they were caught. It's currently used for the "Drug War", a highly political endeavor. Of course, once CISPES was designated as a terrorist organization... : The Washington Post Magazine, June 23 1996 : * The CISPES investigation expanded. The FBI conducted a MASSIVE NATIONWIDE * investigation that put under surveillance ONE THOUSAND THREE HUNDRED THIRTY * liberal groups, many of them religious or political organizations. By definition, ECHELON surveillance of 1,330 groups is NOT an "aberration". The state of Congressional oversight (and punishment of FISA violations) is horrifying. Not only did the NSA/FBI use FISA in a criminal manner, they then cross- referenced through everyone ever connecting to CISPES - no matter how distant - to achieve massive domestic spying for political purposes. To crush peaceful lawful political protest. In America. For the President. And they did it WITHOUT getting 1,330 FISA warrants. Question: How do you spy on 1,330 domestic groups? Answer: Electronically, using an existing domestic surveillance network. Just pus
From: Rotwang on 18 Apr 2008 21:34 the Alabama legislature. * THAT IS TAXATION WITHOUT REPRESENTATION. * * If DPS gets by with this, the information on your driver's license * will be "scanned" into a computer and stored. The police can find out * anyplace you use your driver's license -- where you bank, how often, * where you shop, what you buy, where you go -- anyplace your driver's * license is used for "i.d." and is "scanned". Every store you do * business with can ALSO store all this information about you on THEIR * computers, wherever you use your driver's license. It has nothing to do * with driving or "making the roads safe." It has EVERYTHING to do with * making it easy for police and others to spy on you and control you. * * The same company making the national I.D. card for Communist China * will be providing the technology to Alabama to make this happen. Seven * months ago, the laboratory that makes the equipment for the * fingerprinting, barcoding and scanning, brazenly announced it has a * contract with the State of Alabama, and only recently, has the WHOLE * truth, about DPS's plan to require the fingerprinting, barcoding, and * scanning come out. * * They claim to be "accepting public comments" about this until July * 8th! BE PUBLIC AND COMMENT!!! This is the main way our Federal Government is rolling out the National ID Card, using a Universal Biometric Card: driver's licenses. Divide and Conquer, state by state. It is the beginning of the end. Don't think the biometric driver's licenses are the exact equivalent of a National ID Card? Check out this phrasing from an unimplemented law: # Privacy Journal, By Robert Ellis Smith, October 1983 issue # # Senator Bob Dole wants the government to conduct a three-year study to # unify federal and local requirements for personal identity. # # The bill, S1706, would amend the Federal False Id Act of 1982, to require # a comprehensive identity scheme for the U
From: Risto Lankinen on 18 Apr 2008 22:20 Wow. All federal agencies will be linked together in a vast intelligence network. Handheld fingerprint devices will be deployed. Obviously. They are working around the limitations Congress wanted on NCIC 2000. And how much hardware is a handheld fingerprint device? * "Lucent in New Identification Joint Venture" * The New York Times, 5/22/97 * * Lucent Technologies [Bell Labs is their research and development arm] and * U.S. Venture Partners said today that they had formed a company that would * make products to help people prove their identities through electronic * fingerprinting technology. * * The first product of the company, Veridicom Inc., will be a postage-size * fingerprint sensor used to retrieve information, authorize purchases or * allow entry into restricted areas. * * The postage-size sensor will measure the ridges and valleys on the skin * when a finger is pressed against a silicon chip, and then check the * measurements against the user's profile. Not big at all, is it? # "Faster, More Accurat
From: JSH on 18 Apr 2008 22:30
of the Member States of the Union will be # conveyed to the third countries which attended the FBI meeting in # Quantico and were mentioned in the memorandum approved by the Ministers # at their meeting in Copenhagen (Sweden, Norway, Finland [countries # applying for accession to the European Communities], the USA and # Canada), in order to avoid a discussion based solely on the # requirements of the FBI; # # 3) approves for practical reasons the extension to Hong Kong, Australia # and New Zealand (which attended the FBI seminar) of the decision on # co-operation with third countries which was taken at the Ministerial # meeting in Copenhagen' [ The whole world, not just EU...Canada, Australia, New Zealand, Hong Kong... ] # 4) hereby decides that informal talks with the above-named countries may # be envisaged: to that end the Presidency and the expert group might, # for example, organize a meeting with those third countries to exchange # information. * * * Further memorandums state: * * There is a need to introduce international interception standards * and "norms" for the telecommunications industry for carrying out * interception orders in order to fight organized crime and for the * protection of national security. * * Interception of telecommunications should reach all the way down * to the design stage of the equipment. * * The next generation of satellite-based telecommunications systems * should be able to "tag" each individual subscriber in view of a * possibly necessary surveillance activity. All the new systems have * to have the capability to place all individuals under surveillance. * HA Unfortunately, initial contacts with various consortia...has met with HA the most diverse reactions, ranging from great willingness to HA cooperate on the one hand, to an almost total refusal even |