From: tchow on
in Texas and will soon be nation-wide.


* "Fingerprints Used to Cut Welfare Fraud", by Sandra Blakeslee
* The New York Times, April 6 1992
*
* Los Angelos is the first county in the nation to install an automatic
* fingerprint-identification system for ferreting out welfare cheats.
*
* "We can deliver services faster too," said Eddy Tanaka, director of the
* Los Angelos County Department of Public Social Services.
*
* "We will not share the fingerprints with the police or any other government
* agency."
*
* Intrigued by Los Angelos County's program, the New York Legislature
* authorized an identical fingerprint program.


# "Proposal Links Fingerprint Plan and Albany's Medicaid Help"
# By James C. McKinley Jr, The New York Times, 1994?
#
# Mayor Rudolph W. Giuliani and the majority leader of the State Senate
# have agreed to a plan linking Medicaid with a plan to fingerprint welfare
# recipients.
#
# Later in the day Mr. Giuliani said he would favor allowing law-enforcement
# agencies access to the fingerprint records of welfare recipients.
#
# "You wouldn't want any criminals getting welfare."

So, we'll fingerprint welfare recipients like criminals? Instead of asking
f


From: tchow on
Under the Reagan executive order, the NSA can now, apparently, be
authorized to lend its full support - analysts as well as computers - to
"any department or agency" in the federal government and, "when lives are
endangered," even to local police departments.

[ Yea billions of dollars a year military SIGINT support technology...
oh so invisible in its great mass.

A total blurring of the lines between Military
and civilian control of the domestic population.
]


P475-477: Like an ever-widening sinkhole, the NSA's surveillance technology
will continue to expand, quietly pulling in more and more communications and
gradually eliminating more and more privacy.

If there are defenses to such technotyranny, it would appear, at least from
past experience, that they will not come from Congress.

Rather, they will most likely come from academe and industry in the form of
secure cryptographic applications to private and commercial telecommunications
equipment.

The same technology that is used against free speech can be used
to protect it, for without protection the future may be grim.


Senator Frank Church, chairman of the Senate Intelligence commit


From: Pubkeybreaker on
"The Rise of the Computer State", David Burnham, 1984, ISBN 0-394-72375-9
"A Chilling Account of the Computer's Threat to Society"
FYI note: this document's opening quote is from this book.

P122: For the last three decades the NSA has been a frequent and secret
participant in regulatory matters before the Federal Communications
Commission, where important decisions are made that directly affect
the structure of the telephone company, the use of radio airwaves and
the operation of communication satellites.
]

P317: 1962. Now, for the first time, NSA had begun turning its massive ear
inward toward its own citizens. With no laws or legislative charter to
block its path, the ear continued to turn.


P319: The Secret Service, the CIA, the FBI and the DIA submitted entries
for the NSA's watch list.

The names on the various watch lists ranged from members of radical political
groups to celebrities to ordinary citizens involved in protest against their
government.

Included were such well-known figures as Jane Fonda, Joan Baez, Dr. Benjamin
Spock, Dr. Martin Luther King Jr., the Reverand Ralph Abernathy, Black
Panther leader Eldridge Cleaver, and Chicago Seven defendants Abbie Hoffman
and David T. Dellinger.

A frightening side effect of the watch list program was the tendency of most
lists to grow, expanding far beyond their original intent. This multiplier
effect was caused by the inclusion of names of people who came in contact
with those persons and organizations already on the lists.

Because of the NSA's vacuum cleaner approach to intelligence collection ---
whereby it sucks into its system the maximum amount of telecommunications and
then filters it through an enormous screen of "trigger words" --- analysts end
up reviewing telephone calls, telegrams, and telex messages to and from
thousands of innocent persons having little or nothing to do with the actual



From: S.C.Sprong on
"Dole Calls for Wider Military Role in Fighting Drugs"
# By Katherine Q. Seelye, The New York Times, August 26, 1996
#
# "I want the Military to expand its use of technology, including
# reconnaissance and satellites and area surveillance and listening
# posts...and call the National Guard to move in," said Presidential
# candidate Bob Dole.
#
# "In the Dole Administration, we're going to return to what works. We're
# going to replace the President's inattention to dangerous drugs with a
# clear and forceful policy of zero tolerance."
#
# "That's ZERO TOLERANCE."
#
# "ZERO TOLERANCE for drug smugglers. ZERO TOLERANCE for drug pushers.
# ZERO TOLERANCE for drugs in the workplace and drugs in school. And
# ZERO TOLERANCE for illegal drugs, period."
#
# "ZERO! ZERO! ZERO!"
#
# "We will REDOUBLE our efforts to put drug criminals behind bars."
#
# "We will only appoint judges who will throw them in jail."

Thank Gawd he didn't become President.

* July Fourth, 1997, C-SPAN Congressional Television
*
* Mark Klaas, father of 12-year-old Polly Klaas, who was murdered by a
* repeat-offender that was paroled from prison, said in support of prevention
* programs: "Building more prisons to fight crime is like building more
* cemeteries to fight the spread of AIDS. It's a bad quick fix. Police
* chiefs across the country support [me] this 4 to 1. Unfortunately, Congress
* can't act "soft" on crime, and is abo


From: quasi on
networks of spy stations and spy
satellites which can intercept communications anywhere on the planet.


P18
Over the last 10 years a lot has been heard in New Zealand about the dangers
of 'bureaucratic capture', about senior officials controlling their ministers
rather than the other way around. The area of government activity described
in this book is the ultimate example of bureaucratic capture.

Politicians, whom the public has presumed will be monitoring the intelligence
organizations on their behalf, have been systematically denied the information
required to do that job.

If a democratic society wants to control its secret agencies, it is essential
that the public and politicians have the information and the will to do so.


P113
Good encryption systems, such as PGP, developed privately by American Phil
Zimmerman, are publicly available, although they are still used only by
relatively few people in the know.

The UKUSA agencies have been attempting to curb the spread of this technology,
which is a major threat to their influence, so far without enough success to
stop it.

It remains to be seen how much the public can find a technological answer to
maintaining privacy in a world with systems like ECHELON.


*** end of 'Secret Power' excerpt



******************************************************************************


Throughout the Cold War, the United States government pounded into us again
and again how Russia and China were evil because they monitored and controlled
the political expression of their people, had sham laws and sham court