From: Risto Lankinen on
: From: guy(a)panix.com [updated here 5/25/97]
: Subject: Re: Threaten U.S. Domestic ECHELON
: Newsgroups: alt.cypherpunks,talk.politics.crypto,comp.org.eff.talk
: Organization: NYC, Third Planet From the Sun
:
: This is a heavily annotated book.
:
: Massive domestic spying by the NSA.
:
: Including our phone calls.
:
: * "The Secret War Against the Jews"
: * Authors: John Loftus and Mark Aarons
: * ISBN 0-312-11057-X, 1994
: *
: * In 1943 this resulted in the Britain-USA (Brusa) agreement to merge
: * the Communications Intelligence (COMINT) agencies of both governments.
: *
: * One of the little-known features of Brusa was that President Roosevelt
: * agreed that the two governments could spy on each others' citizens,
: * without search warrants, by establishing "listening posts" on each
: * others' territory.
[snip]
: *
: * According to several of the "old spies" who worked in Communications
: * Intelligence, the NSA headquarters is also the chief British espionage
: * base in the United States. The presence of British wiretappers at the
: * keyboards of American eavesdropping computers is a closely guarded
: * secret, one that very few people in the intelligence community have
: * been aware of, but it is true.
: *
: * An American historian, David Kahn, first stumbled onto a corner of
: * the British connection in 1966, while writing his book The Codebreakers.
: *
: * One indication of just how sensitive this information is considered on
: * both sides of the Atlantic is the fact that Kahn's publishers in New
: * York and London were put under enormous pressure to censor a great deal
: * of the book. In the main, Kahn simply revealed the existence of the
: * liaison relationship, but when he wrote that the NSA and its British
: * equivalent, the Government Communications Headquarters, "exchange
: * personnel on a temporary basis", he had come too close to revealing


From: Risto Lankinen on
Service
ordering the harassment: luckily the reporter recorded his conversation.

CPSR [Computer Professionals for Social Responsibility] and Marc Rotenberg
of EPIC [Electronic Privacy Information Center] began FOIA [U.S. Freedom
of Information Act] proceedings to find out about this incident.

The case raises significant issues of freedom of speech and assembly,
privacy and government accountability.

In response to an FOIA asking why this happened, the Secret Service
responded: "We are sure no one knows why we had the meeting disrupted".

They have made a mockery of FOIA.

This mockery of FOIA is still being litigated by EPIC.

An intentional illegal government surveillance program...it just never stops.

Marc Rotenberg has gotten the Secret Service to admit in court that this was
done to "investigate hacking into a company's telephone switch."

Since when did the "investigative" techniques used by the Secret Service
become valid for use in the United States? Going up to a bunch of mall
patrons and DEMANDING IDENTIFICATION from them and searching them?

How exactly was this supposed to further investigate a switch hacking?

For extended details of this governmental persecution of the politically
incorrect, see http://www.2600.com.


******************************************************************************


Secret Service: Vile Persecution of Ed Cummings
------ ------- ---- ----------- -- -- --------

Source material from http://www.2600.com, by someone calling themselves
"Emmanuel Goldstein", which in the book '1984' was known as the Hated Enemy
of the People.

2600, "The Hacker's Qu


From: tchow on
Senate Democrats are preparing legislation
: that requires universities and other groups
: receiving Federal grants to make their
: communication networks snoopable by the
: government, The Netly News has learned. The
: draft also includes penalties for "unauthorized
: breaking of another's encryption codes," and
: restrictions on importing encryption products.
:
: At a Democratic leadership press briefing,
: Sen. Bob Kerrey (D-Neb.) yesterday said his bill
: slightly relaxed export rules in exchange for
: greater federal control over crypto imports. But
: what he appears to be truly aiming for is a
: full-scale assault on your right to use whatever
: encryption software you want in your own home.
: [snip]
:
: It's diabolical. Researchers already have to
: comply with a legion of rules to qualify for grants.
: Kerrey's proposed bill, called "The Secure Public
: Network Act," would add yet another provision to
: the fine print. It requires that "all encryption
: software purchased with federal funds shall be
: software based on a system of key recovery" and
: "all encrypted networks established with the use
: of federal funds shall use encryption based on a
: system of key recovery." Key recovery, or key
: escrow, technology enables law-enforceme


From: Pubkeybreaker on
'll fingerprint welfare recipients like criminals? Instead of asking
for utility bills and leases in their name to prove residency?

Other states are following suit...Pennsylvania, Florida...


* "A Test for Welfare Fraud Is Expanded to Families"
* By Esther B. Fein, The New York Times, 11/11/95
*
* New York State is sharply increasing the number of people it electronically
* fingerprints to detect welfare fraud past the 285,000 single adult program
* to more than 453,000 recipients of Aid to Families with Dependent Children.
*
* Of the 220,193 people electronically fingerprinted as of Nov. 9, only 146
* were found to have registered for duplicate benefits. New York State
* officials said they didn't expect to find many cases of fraud. [What???]
* "We are just using a new tool to help comply with Federal regulations
* prohibiting us from giving duplicate benefits."
*
* The program is costing the state $10 million a year.

One big evil eye, done with biometrics...control FAR BEYOND anything that
could be implemented with a social security number.

It's for our best interests...

* "Suffolk Medical Examiner Urges Fingerprinting Law"
* By John T. McQuiston, The New York Times, 8/20/1996
*
* Putting motorists' fingerprints on NY driver's licenses, as is done in
* California, would help identify disaster victims, the Suffolk Medical
* Examiner told a committee of the County Legislature about his work on
* the crash of TWA Flight 800.
*
* "The victims from California were the fastest and easiest to identify,"
* the Medical Examiner, Dr. Charles V. Wetli, said, "because the fingerprint
* of their right thumb was on their driver's license."
*
* "It was a night


From: Phil Carmody on
the dangers
of 'bureaucratic capture', about senior officials controlling their ministers
rather than the other way around. The area of government activity described
in this book is the ultimate example of bureaucratic capture.

Politicians, whom the public has presumed will be monitoring the intelligence
organizations on their behalf, have been systematically denied the information
required to do that job.

If a democratic society wants to control its secret agencies, it is essential
that the public and politicians have the information and the will to do so.


P113
Good encryption systems, such as PGP, developed privately by American Phil
Zimmerman, are publicly available, although they are still used only by
relatively few people in the know.

The UKUSA agencies have been attempting to curb the spread of this technology,
which is a major threat to their influence, so far without enough success to
stop it.

It remains to be seen how much the public can find a technological answer to
maintaining privacy in a world with systems like ECHELON.


*** end of 'Secret Power' excerpt



******************************************************************************


Throughout the Cold War, the United States government pounded into us again
and again how Russia and China were evil because they monitored and controlled
the pol