From: Pubkeybreaker on 18 Apr 2008 20:11 carry it at all times. It's all about surveillance and control. This section is about the National ID Card, plus deployment of a mix of surveillance and control techniques for tracking people. In California a few years back the police kept hassling a black man who liked to walk around at night to think. Unfortunately, he wasn't white, but liked to walk around white neighborhoods. [Anyone with detailed info email me.] He didn't carry id with him: the police arrested him on suspicion of being a burglar or somesuch. The California Supreme Court threw out the arrest. Not carrying ID was a primary part of the police complaint. It is impossible for the government to issue a National ID Card without its use eventually becoming required. That is simply how it goes with new tools for the government. See how the uses of the Social Security number have grown, wildly beyond what the government ever said it would be used for? # Privacy Journal, By Robert Ellis Smith, October 1986 issue # # Tax reform bill HR 3838 requires effective January 1988 that any taxpayer # claiming a dependent five years or older have a Social Security number. # # This is to prevent divorced parents from simultaneously claiming the # same child. # # The requirement means that, for the first time, large numbers of children # who have not reached employment age will need Social Security numbers. # # Its use has been expanding the past fifteen years by regulations under # the Bank Secrecy Act, requiring all bank account holders to be enumerated, # and by the Deficit Reduction Act of 1984 and subsequent legislation # requiring children who receive public assistance to be enumerat
From: Pubkeybreaker on 18 Apr 2008 20:20 warrant is issued, the parents are arrested, and : the child is put into custody of Child Welfare workers. # "The Feds Under Our Beds", By James Bovard, The New York Times, 9/6/1995 # # The Justice Department confiscated the home of an elderly Cuban-American # couple in Miami after the couple was arrested for playing host to a weekly # poker game for family and friends. * "Nynex Mistake Brings Scholarship Offer", NYT, 4/26/1995 * * Walter Ray Hill, 18, was arrested and jailed for two days based solely on * his phone number being used for a hoax bomb threat. * * Nynex eventually realized one of its employees transposed a number when * tracing the call. [Ever see Terry Gilliam's movie Brazil?] * * A Nynex spokesman said today that they were offering to pay his complete * four-year tutition bill, and that the offer was unconditional. In Washington, D.C., police aggressively hassle motorists to give them permission to search their vehicles. On C-SPAN, U.S. Attorney Eric Holder further states that if a member of the car makes "furtive gestures" the police may search the car. Question: If sweating at the airport can get you a deep probing anal search by a manly security guard, what "furtive gesture" will get your car searched when the police stop you and shine a flashlight in your face? Answer: Blinking. Point: They are almost not bothering to pretend. Law enforcement hysteria. The Miranda ruling by the 1966 Supreme Court requires the police inform criminal suspects of their legal rights before questioning them. It is classical poetry, even when recited by Dragnet's Joe Friday. * Justice Department report: "Excerpt From the Report to Meese", NYT, 1/22/87 *
From: Pubkeybreaker on 18 Apr 2008 20:37 saying that a new security > package "Internet Risk Management: email facility" had been installed, > and that Internet email traffic was actively being monitored. > > They did so again and again. > > I think they sent out a memo to everyone too. > > Security incidents NEVER stopped. > > Major violations occurred again and again and again and again... > > I have come to realize that the number of security incidents a firm > has is not related to how often they warn their employees not to send > proprietary/confidential information out via email. > > The number of security incidents is a function of the number of employees. > > If you are a big computer-based firm (banks, brokerage, insurance etc), > then you are guaranteed to have a huge amount of proprietary/confidential > files flowing out of your Internet connection via email. > > Even if you tell them again and again that it is monitored and they will > be fired for misuse. > > Even if you fire people. > > Even if you prosecute them. > > It appears to be just like the general population and regular crime. > > All sites' management expressed confidence that repeated warnings and > firings would soon stop the proprietary/confidential transfers. > > It turned out to be like saying if we have a slew of laws against > crime and throw many people in prison, crime will soon stop. > > Well, it sounded reasonable when the managers said it a
From: Risto Lankinen on 18 Apr 2008 20:11 's wrong * with a National ID Card? It's the same tired old arguments against it." As if sane people shouldn't be paranoid about a National ID Card. * "New Rules Mean Job-Hunters Need Proof of Identity", The New York Times * * Passports, driver's licenses, Social Security cards or birth certificates * will be allowed to serve as identity papers. * * A 1982 proposal to catch illegal aliens by giving American workers * "counterfeit-proof" identity cards was hooted off the boards as a * threat to individual liberty. How bad would a National ID Card be? Bad. Real bad. You would be required to carry it at all times. It's all about surveillance and control. This section is about the National ID Card, plus deployment of a mix of surveillance and control techniques for tracking people. In California a few years back the police kept hassling a black man who liked to walk around at night to think. Unfortunately, he wasn't white, but liked to walk around white neighborhoods. [Anyone with detailed info email me.] He didn't carry id with him: the police arrested him on suspicion of being a burglar or somesuch. The California Supreme Court threw out the arrest. Not carrying ID was a primary part of the police complaint. It is impossible for the government to issue a National ID Card without its use eventually becoming required. That is simply how it goes with new tools for the government. See how the uses of the Social Security number have grown, wildly beyond what the government ever said it would be used for? # Privacy Journal, By Robert Ellis Smith, October 1986 issue # # Tax reform bill HR 3838 requires effective January 1988 that any taxpayer # claiming a dependent five years or older have a Social Security number. # # This is to prevent divorced parents from simultaneously claiming the # same child. # # The requirement means that, for the first time, large numbers of children
From: Pubkeybreaker on 19 Apr 2008 00:01
* * Cyberstride, the suite of computer programs needed to provide * statistical filtration for all homeostatic loops at all levels * of recursion, and provide alerts via an 'arousal filter'. * * Checo, the model of the Chilean economy, with simulation capacity. * * Opsroom, a new environment for decision, and dependent for its * existence on the existence of the other three. * * Cybernet was a system whereby every single factory in the country, * contained within the nationalized social economy, could be in * communication with a computer. * * The intention of Cybernet was to make computer power available to the * workers' committees in every factory. * * How could this be done? * * The basic idea was that crucial indices of performance in every plant * should be transmitted daily to the computers, where they would be * processed and examined for any kind of important signal that they * contained. If there was any sort of warning implied by these data, * then an alerting signal would be sent back to the managers of the * plant concerned. What are 'arousal filter' and 'homeostatic loops'? The scope of Cybernetics is, in a word, awesome. A cyberneticist can talk from atoms to cells to nervous systems, to management of a company, country, world, solar system. Whether an organism is mechanical, biological or social, it requires a feedback mechanism to survive. Your nervous system does some amazing things to fight off infections. It creates custom anti-bodies to attack foreign microbes. Custom living cells created through a system of feedback to spot that there was a problem, analysis of the problem, action on the problem. This is a life-sustaining feedback 'homeostatic' loop. [bracket comments are mine] When Stafford Beer says Cyberstride needed to filter 'homeostatic loops': * "The Human Use of Hum |