From: Phil Carmody on 18 Apr 2008 21:24 information that would expose a crime, reveal lying to Congress, uncover fraud or stop abuses. They could do so without approval from their superiors and without fear of reprisal. They could only pass on information to appropriate members -- for example, CIA information would have to go to the Intelligence Committee. But the White House said it would veto the entire bill over that provision. In a written statement, it said the whistle-blower measure would usurp "the president's constitutional authority to protect national security and other privileged information." National security means keeping Congress dumbed-down: * "Secret Pentagon Intelligence Unit is Disclosed" * By Raymond Bonner, The New York Times, May 11, 1983 * * Because the Pentagon was dissatisfied with the intelligence it was getting * from the CIA, the new unit 'Army Intelligence Support Activity' was set up. * * It is suspected that the secret group was used to get around Congressional * limits of 55 m
From: bitsplit on 18 Apr 2008 23:17 suspected of a crime. Dragnet monitoring should not be the American way. Unrestricted cryptography must be made legal now, so we are no longer naked to ECHELON monitoring. It will be a beginning. : Privacy Journal's War Stories (75 pages, $21.50) is available from : PRIVACY JOURNAL, P.O. Box 28577, Providence RI 02908, 401/274-7861, : electronic mail: 5101719(a)mcimail.com. : : Beverly Folmsbee of Pittsfield Massachusetts, who was not suspected : of any drug use, left her job after declining to take a "degrading" : urinalysis test at her company, then known as Tech Tool Grinding & : Supply Inc. : : It required disrobing, donning a hospital gown, and submitting to : bodily inspection by a medical staff person. : : But the highest court in the state said that the testing was legitimate. : Source: Folmsbee v.Tech Tool Grinding & Supply Inc., 417 Mass. 338, 630 : N.E. 2d 586 (1994). It is totally urinating what the politicians and courts have allowed in the name of the Drug War. : Privacy Journal's War Stories, By Attorney Robert Ellis Smith : : Burlingame, CA, 1990: A flight attendant suffered medical complications : because of Federal requirements that compel drug-monitors to have : employees drink water until they can provide a urine sample. The 40-year- : old woman was unable to urinate in a random drug test. She drank three : quarts of water and even vomited some of it but could not urinate in the : noisy crowded test site. She became ill at home and a doctor diagnosed : her condition as "water intoxication." The lack of privacy inhibits : 25 percent of people from urinating, surveys show [JAMA 1/2/91]. Drug testing doesn't even work. Could there be a more important use for it than public safety? It made no difference to the drunk and sleepy subway motorman in the spectacular underground smash-up at the Union Square Station in NYC. Even if he had a
From: Matthew T. Russotto on 19 Apr 2008 00:13 intercepted # through electronic surveillance, and noncompliance with these # procedures shall not provide the basis for any motion to # suppress or other objection to the introduction of electronic # surveillance evidence lawfully acquired.' # # "Leaving users with no recourse will discourage use of the # system and is a tacit acceptance of unscrupulous government # behavior." # - Jim Hickstein - TERADYNE # # "Wiretap subjects must be notified within 30 days after the # operation is completed. If they are innocent, the government # buys them new equipment to replace that which was compromised # (per Lynn McNulty)... Nothing forces agents to 'forget' a key # and stop using it." # # "Placing all keys in a central location will invite foreign # intelligence services to either (a) impose similar requirements # in their own nations, and/or (b) seek access to keys held by # U.S. escrow agents, through legal or illegal means. American # business has well-publicized problems with industrial espionage # by other nations." # - Michael B. Packer, Managing Director - Bankers Trust Company o To Safeguard Your Privacy * "Clinton's Encryption Plan Fits Law and Market" * Letters to the Editor, Mickey Kantor, U.S. Secretary of Commerce, 10/9/96 * * Users may need a "spare key" to recover information that is lost or * otherwise inaccessible, in much the same way that we give a trusted * neighbor a spare key to our house...and the U.S. will have that key. The government says in case you lose you own decryption key, they will be there to save the day with their LE key. (Key Recovery has a 'Law Enforcement' key, which is a SECOND key to de
From: Pubkeybreaker on 18 Apr 2008 21:37 best example of OR, but I did get to quote my dad again. ;-) * "The Future of War - Power, Technology, and American World Dominance in * the 21st Century", by George & Meredith Friedman, 1996, ISBN 0-517-70403-X * * A discipline named operations research had begun to develop prior to World * War II that aspired to use quantitative methodologies to develop a science * of management. [snip] * * For the physicists and mathematicians of the Rand Corporation, the * intuitions of common sense were utterly insufficient as a guide to * management. Mathematical precision was necessary, and operations * research promised to supply that precision. [snip] * * It had not jumped from the management of particular, limited areas of * warfare to the structuring of entire campaigns and wars. Operations * research had not penetrated to the very marrow of conventional warfare, * that is, not until an attempt was made in 1961 to revolutionize the idea * of war. This was done by an industrialist named Robert McNamara, who had * been president at Ford Motor Company. Stafford Beer is a British cybernetician, and a 'research philosopher'. In 1970, a Dr. Salvador Allende became president of Chile. He was a democratically elected Marxist, with 37% of the vote. Allende immediately embarked on a massive nationalization of the banks and major companies/industries in Chile. In 1971, Stafford Beer began a project for Allende to put the Chilean economy under cybernetic control. As far as I know, this is the only documented instance
From: JSH on 18 Apr 2008 21:07
informs me his book is no longer available, and that my order is cancelled. ****************************************************************************** BAM-BAM-BAM --- --- --- Let's pause to take a look back at the first and still classic expose of NSA. : The Puzzle Palace : Inside the National Security Agency, : America's most secret intelligence organization : Author James Bamford, 1983 revision, ISBN 0-14-00.6748-5 Page numbers are from the above 1983 release. Ready? P171-172: David Kahn, in a transatlantic phone call, reluctantly agreed to delete a handful of paragraphs dealing with the most sensitive subject of all: NSA's relationship with its supersecret British partner, GCHQ. "The two agencies exchange personnel on a temporary basis... A similar but much smaller liaison program is maintained with Canada and Australia." P399: After two years of compromising and negotiating, the BRUSA Agreement was supplemented in 1947 by the five-power UKUSA Agreement, which, according to one report, established the United States as a first party to the treaty, and Britain, Canada, and Australia-New Zealand as second parties. P391: ...quite likely the most secret agreement ever entered into by the English-speaking world. Signed in 1947 and known as the UKUSA Agreement, it brought together under a single umbrella the SIGINT organizations of the Unit |