From: tchow on 18 Apr 2008 23:06 in Texas and will soon be nation-wide. * "Fingerprints Used to Cut Welfare Fraud", by Sandra Blakeslee * The New York Times, April 6 1992 * * Los Angelos is the first county in the nation to install an automatic * fingerprint-identification system for ferreting out welfare cheats. * * "We can deliver services faster too," said Eddy Tanaka, director of the * Los Angelos County Department of Public Social Services. * * "We will not share the fingerprints with the police or any other government * agency." * * Intrigued by Los Angelos County's program, the New York Legislature * authorized an identical fingerprint program. # "Proposal Links Fingerprint Plan and Albany's Medicaid Help" # By James C. McKinley Jr, The New York Times, 1994? # # Mayor Rudolph W. Giuliani and the majority leader of the State Senate # have agreed to a plan linking Medicaid with a plan to fingerprint welfare # recipients. # # Later in the day Mr. Giuliani said he would favor allowing law-enforcement # agencies access to the fingerprint records of welfare recipients. # # "You wouldn't want any criminals getting welfare." So, we'll fingerprint welfare recipients like criminals? Instead of asking f
From: tchow on 18 Apr 2008 20:46 Under the Reagan executive order, the NSA can now, apparently, be authorized to lend its full support - analysts as well as computers - to "any department or agency" in the federal government and, "when lives are endangered," even to local police departments. [ Yea billions of dollars a year military SIGINT support technology... oh so invisible in its great mass. A total blurring of the lines between Military and civilian control of the domestic population. ] P475-477: Like an ever-widening sinkhole, the NSA's surveillance technology will continue to expand, quietly pulling in more and more communications and gradually eliminating more and more privacy. If there are defenses to such technotyranny, it would appear, at least from past experience, that they will not come from Congress. Rather, they will most likely come from academe and industry in the form of secure cryptographic applications to private and commercial telecommunications equipment. The same technology that is used against free speech can be used to protect it, for without protection the future may be grim. Senator Frank Church, chairman of the Senate Intelligence commit
From: Pubkeybreaker on 18 Apr 2008 21:30 "The Rise of the Computer State", David Burnham, 1984, ISBN 0-394-72375-9 "A Chilling Account of the Computer's Threat to Society" FYI note: this document's opening quote is from this book. P122: For the last three decades the NSA has been a frequent and secret participant in regulatory matters before the Federal Communications Commission, where important decisions are made that directly affect the structure of the telephone company, the use of radio airwaves and the operation of communication satellites. ] P317: 1962. Now, for the first time, NSA had begun turning its massive ear inward toward its own citizens. With no laws or legislative charter to block its path, the ear continued to turn. P319: The Secret Service, the CIA, the FBI and the DIA submitted entries for the NSA's watch list. The names on the various watch lists ranged from members of radical political groups to celebrities to ordinary citizens involved in protest against their government. Included were such well-known figures as Jane Fonda, Joan Baez, Dr. Benjamin Spock, Dr. Martin Luther King Jr., the Reverand Ralph Abernathy, Black Panther leader Eldridge Cleaver, and Chicago Seven defendants Abbie Hoffman and David T. Dellinger. A frightening side effect of the watch list program was the tendency of most lists to grow, expanding far beyond their original intent. This multiplier effect was caused by the inclusion of names of people who came in contact with those persons and organizations already on the lists. Because of the NSA's vacuum cleaner approach to intelligence collection --- whereby it sucks into its system the maximum amount of telecommunications and then filters it through an enormous screen of "trigger words" --- analysts end up reviewing telephone calls, telegrams, and telex messages to and from thousands of innocent persons having little or nothing to do with the actual
From: S.C.Sprong on 18 Apr 2008 22:34 "Dole Calls for Wider Military Role in Fighting Drugs" # By Katherine Q. Seelye, The New York Times, August 26, 1996 # # "I want the Military to expand its use of technology, including # reconnaissance and satellites and area surveillance and listening # posts...and call the National Guard to move in," said Presidential # candidate Bob Dole. # # "In the Dole Administration, we're going to return to what works. We're # going to replace the President's inattention to dangerous drugs with a # clear and forceful policy of zero tolerance." # # "That's ZERO TOLERANCE." # # "ZERO TOLERANCE for drug smugglers. ZERO TOLERANCE for drug pushers. # ZERO TOLERANCE for drugs in the workplace and drugs in school. And # ZERO TOLERANCE for illegal drugs, period." # # "ZERO! ZERO! ZERO!" # # "We will REDOUBLE our efforts to put drug criminals behind bars." # # "We will only appoint judges who will throw them in jail." Thank Gawd he didn't become President. * July Fourth, 1997, C-SPAN Congressional Television * * Mark Klaas, father of 12-year-old Polly Klaas, who was murdered by a * repeat-offender that was paroled from prison, said in support of prevention * programs: "Building more prisons to fight crime is like building more * cemeteries to fight the spread of AIDS. It's a bad quick fix. Police * chiefs across the country support [me] this 4 to 1. Unfortunately, Congress * can't act "soft" on crime, and is abo
From: quasi on 18 Apr 2008 20:55
networks of spy stations and spy satellites which can intercept communications anywhere on the planet. P18 Over the last 10 years a lot has been heard in New Zealand about the dangers of 'bureaucratic capture', about senior officials controlling their ministers rather than the other way around. The area of government activity described in this book is the ultimate example of bureaucratic capture. Politicians, whom the public has presumed will be monitoring the intelligence organizations on their behalf, have been systematically denied the information required to do that job. If a democratic society wants to control its secret agencies, it is essential that the public and politicians have the information and the will to do so. P113 Good encryption systems, such as PGP, developed privately by American Phil Zimmerman, are publicly available, although they are still used only by relatively few people in the know. The UKUSA agencies have been attempting to curb the spread of this technology, which is a major threat to their influence, so far without enough success to stop it. It remains to be seen how much the public can find a technological answer to maintaining privacy in a world with systems like ECHELON. *** end of 'Secret Power' excerpt ****************************************************************************** Throughout the Cold War, the United States government pounded into us again and again how Russia and China were evil because they monitored and controlled the political expression of their people, had sham laws and sham court |