From: quasi on
solution.

o No restrictions or court authorization necessary for the
police to put a position tracking monitor on your car.

o All your international calls now have a buddy listening in.

o most domestic calls are monitored; millions and millions...

o The police begin deploying Military technology to scan you as they drive
by in their police cars. Military tanks used by the FBI.
Military aircraft purchased by the BATF.

o Billions and billions and billions of dollars are diverted
from children and needy people to pay for it all.

o CALEA: all national infrastructure equipment must be designed
from the ground-up to be spied on by the government.

o Forfeiture laws mean:

- Federal and state officials now have the power to seize your
business, home, bank account, records and personal property,
all without indictment, hearing, or trial.

- Everything you have can be taken away at the whim of one or two
federal or state officials operating in secret

- The loss of basic American constitutional guarantees: due process,
the presumption of innocence, and the right to own and enjoy
private property





From: Christian Siebert on
in the FBI. [Further evidence
* implicates the CIA]

Congress is unable to investigate the FBI, let alone the NSA.

# "U.S. Recruited Ex-Rebel Despite Links to Deaths, Report Says"
# By Tim Golden, The New York Times, January 21, 1997
#
# A former Salvadoran guerrilla commander was recruited by American officials
# as a paid informer and allowed to resettle in the United States despite
# intelligence information from half a dozen rebels that he had planned a
# 1985 attack in El Salvador in which SIX AMERICANS and seven others were
# killed, newly released Government reports show.

It doesn't matter to our government if Americans get killed.

Whatever the president wants, he gets.

FISA is yet another dagger shredding the U.S. Constitution.

: The Washington Post Magazine, June 23 1996
: "Government surveillance, terrorism and the U.S. Constitution"
: from Main Justice, by Jim McGee and Brian Duffy, 1996, ISBN 0-684-81135-9
:
: The internal Justice Department FISA watchdog was Mary Lawton: it took
: her two years before saying the investigations into CISPES & Co should
: be shut down.
:
: On the day after Tha


From: Risto Lankinen on
explosives") by Police Commissioner Gregore Sambor
and Fire Chief William Richmond to open a hole in the building for tear
gas delivery. But Pennsylvania state law was ruled to grant them
personal immunity from Federal civil rights charges because they were
state employees [what???]. The incident occurred in May 1985.

o Waco. CS tear gas attack by the FBI using Army tanks.

The government, across the decades, keeps managing to burn people to death,
rather than bringing them to trial.

Often, tear gas is involved.

----

Randy Weaver at Ruby Ridge.

Persisting, a BATF informant persuaded Weaver, a DECORATED GREEN BERET
VETERAN of Vietnam with NO CRIMINAL RECORD, to sell him two shotguns,
but insisted that Weaver saw the barrels off one-quarter inch short of
the legal limit.

Monitoring him, they knew Mr. Weaver needed money for his family.

Why did the government target Mr. Weaver?

Blackmail.

One of the FBI's favorite activities is spying on political organizations.

They wanted to use him to infiltrate white supremacists groups for the
government. Or face prosecution.

When Weaver refused, he was indicted on guns charges. He was sent two
conflicting court appearance dates. He became paranoid the Government
was out to get him, so he didn't show up. [He was eventually acquitted
of all charges except the original not showing up in court!]

To justify a militaristic retaliation, BATF agents lied to the U.S.
attorney's office. BATF agents claimed that Weaver had a criminal record
and that he was a suspect in several bank robberies.

Both charges were fabrications, even according to BATF Director John Magaw,
who admitted the accusations were "inexcusable" in testimony before C


From: Marshall on
and SAE. [So the standards of hardware
* and information are interchangeable and global.]

Yep.

# Subject: ---> Big Bro and the Intelligent Transportation System <---
# From: 99(a)spies.com (Extremely Right)
# Date: 1997/06/03
#
# If you live in a big city you will find that there is an interesting
# proliferation of cameras pointed at the freeway. Do you know what they
# are, what they can do, and what is their potential for abuse?
#
# The System is called the Intelligent Transportation System (ITS) and you
# may find it everywhere on the net. The cameras are linked to a city
# control room, who are supposed to use them to improve traffic flow. The
# cameras are "uplinked" to the net, to satellites, and I suppose to the
# United States Transportation Command at Scott AFB or some other
# centralized information storage base. Software is being harmonized so that
# on the net you may find many countries adopting a GLOBAL ITS. The toys
# being developed by the various planners including MIT will be able to
# track your travel, monitor your vehicle emissions, determine if you have
# been drinking, and even issue you speeding tickets by mail! "Smart" cards
# may be used to automatically track individual people and deduct tolls or
# bus fares.


* REMARKS PREPARED FOR DELIVERY
* Technology and Privacy in Intelligent Transportation Systems
* http://weber.ucsd.edu/~pagre/cfp-its.html Phil Agre :pagre(a)ucsd.edu
*
* Conference on Computers, Freedom, and Privacy San Francisco, March 1995
*
* Intelligent Transportation Systems (ITS) are being developed in most of
* the industrialized countries. Promoters of such systems envision
* information technology being applied to transportation systems in a
* variety of ways, primarily on public highways. Applications extend from
* wireles


From: JSH on
press briefing,
: Sen. Bob Kerrey (D-Neb.) yesterday said his bill
: slightly relaxed export rules in exchange for
: greater federal control over crypto imports. But
: what he appears to be truly aiming for is a
: full-scale assault on your right to use whatever
: encryption software you want in your own home.
: [snip]
:
: It's diabolical. Researchers already have to
: comply with a legion of rules to qualify for grants.
: Kerrey's proposed bill, called "The Secure Public
: Network Act," would add yet another provision to
: the fine print. It requires that "all encryption
: software purchased with federal funds shall be
: software based on a system of key recovery" and
: "all encrypted networks established with the use
: of federal funds shall use encryption based on a
: system of key recovery." Key recovery, or key
: escrow, technology enables law-enforcement
: officials to obtain copies of the mathematical keys
: needed to decipher messages. In other words,
: someone else keeps a copy of your secret key
: -- and some proposed bills say that the cops
: may not even need a search warrant to seize it.
: [snip]
:
: What about the penalties for "unauthorized
: breaking of another's encryption codes?" That
: would criminalize cryptanalysis, the way to verify
: