From: Phil Carmody on
information that would expose a crime, reveal lying to
Congress, uncover fraud or stop abuses. They could do
so without approval from their superiors and without
fear of reprisal. They could only pass on information
to appropriate members -- for example, CIA information
would have to go to the Intelligence Committee.

But the White House said it would veto the entire bill
over that provision. In a written statement, it said
the whistle-blower measure would usurp "the president's
constitutional authority to protect national security
and other privileged information."


National security means keeping Congress dumbed-down:

* "Secret Pentagon Intelligence Unit is Disclosed"
* By Raymond Bonner, The New York Times, May 11, 1983
*
* Because the Pentagon was dissatisfied with the intelligence it was getting
* from the CIA, the new unit 'Army Intelligence Support Activity' was set up.
*
* It is suspected that the secret group was used to get around Congressional
* limits of 55 m


From: bitsplit on
suspected of a crime.

Dragnet monitoring should not be the American way.

Unrestricted cryptography must be made legal now,
so we are no longer naked to ECHELON monitoring.
It will be a beginning.


: Privacy Journal's War Stories (75 pages, $21.50) is available from
: PRIVACY JOURNAL, P.O. Box 28577, Providence RI 02908, 401/274-7861,
: electronic mail: 5101719(a)mcimail.com.
:
: Beverly Folmsbee of Pittsfield Massachusetts, who was not suspected
: of any drug use, left her job after declining to take a "degrading"
: urinalysis test at her company, then known as Tech Tool Grinding &
: Supply Inc.
:
: It required disrobing, donning a hospital gown, and submitting to
: bodily inspection by a medical staff person.
:
: But the highest court in the state said that the testing was legitimate.
: Source: Folmsbee v.Tech Tool Grinding & Supply Inc., 417 Mass. 338, 630
: N.E. 2d 586 (1994).


It is totally urinating what the politicians and
courts have allowed in the name of the Drug War.


: Privacy Journal's War Stories, By Attorney Robert Ellis Smith
:
: Burlingame, CA, 1990: A flight attendant suffered medical complications
: because of Federal requirements that compel drug-monitors to have
: employees drink water until they can provide a urine sample. The 40-year-
: old woman was unable to urinate in a random drug test. She drank three
: quarts of water and even vomited some of it but could not urinate in the
: noisy crowded test site. She became ill at home and a doctor diagnosed
: her condition as "water intoxication." The lack of privacy inhibits
: 25 percent of people from urinating, surveys show [JAMA 1/2/91].


Drug testing doesn't even work. Could there be a
more important use for it than public safety?

It made no difference to the drunk and sleepy subway motorman in the
spectacular underground smash-up at the Union Square Station in NYC.
Even if he had a


From: Matthew T. Russotto on
intercepted
# through electronic surveillance, and noncompliance with these
# procedures shall not provide the basis for any motion to
# suppress or other objection to the introduction of electronic
# surveillance evidence lawfully acquired.'
#
# "Leaving users with no recourse will discourage use of the
# system and is a tacit acceptance of unscrupulous government
# behavior."
# - Jim Hickstein - TERADYNE
#
# "Wiretap subjects must be notified within 30 days after the
# operation is completed. If they are innocent, the government
# buys them new equipment to replace that which was compromised
# (per Lynn McNulty)... Nothing forces agents to 'forget' a key
# and stop using it."
#
# "Placing all keys in a central location will invite foreign
# intelligence services to either (a) impose similar requirements
# in their own nations, and/or (b) seek access to keys held by
# U.S. escrow agents, through legal or illegal means. American
# business has well-publicized problems with industrial espionage
# by other nations."
# - Michael B. Packer, Managing Director - Bankers Trust Company



o To Safeguard Your Privacy

* "Clinton's Encryption Plan Fits Law and Market"
* Letters to the Editor, Mickey Kantor, U.S. Secretary of Commerce, 10/9/96
*
* Users may need a "spare key" to recover information that is lost or
* otherwise inaccessible, in much the same way that we give a trusted
* neighbor a spare key to our house...and the U.S. will have that key.

The government says in case you lose you own decryption key,
they will be there to save the day with their LE key. (Key Recovery
has a 'Law Enforcement' key, which is a SECOND key to de


From: Pubkeybreaker on
best
example of OR, but I did get to quote my dad again. ;-)

* "The Future of War - Power, Technology, and American World Dominance in
* the 21st Century", by George & Meredith Friedman, 1996, ISBN 0-517-70403-X
*
* A discipline named operations research had begun to develop prior to World
* War II that aspired to use quantitative methodologies to develop a science
* of management. [snip]
*
* For the physicists and mathematicians of the Rand Corporation, the
* intuitions of common sense were utterly insufficient as a guide to
* management. Mathematical precision was necessary, and operations
* research promised to supply that precision. [snip]
*
* It had not jumped from the management of particular, limited areas of
* warfare to the structuring of entire campaigns and wars. Operations
* research had not penetrated to the very marrow of conventional warfare,
* that is, not until an attempt was made in 1961 to revolutionize the idea
* of war. This was done by an industrialist named Robert McNamara, who had
* been president at Ford Motor Company.


Stafford Beer is a British cybernetician, and a 'research philosopher'.

In 1970, a Dr. Salvador Allende became president of Chile.

He was a democratically elected Marxist, with 37% of the vote.

Allende immediately embarked on a massive nationalization of
the banks and major companies/industries in Chile.

In 1971, Stafford Beer began a project for Allende
to put the Chilean economy under cybernetic control.

As far as I know, this is the only documented instance


From: JSH on
informs me his book is no longer
available, and that my order is cancelled.


******************************************************************************

BAM-BAM-BAM
--- --- ---

Let's pause to take a look back at the first and still classic expose of NSA.

: The Puzzle Palace
: Inside the National Security Agency,
: America's most secret intelligence organization
: Author James Bamford, 1983 revision, ISBN 0-14-00.6748-5

Page numbers are from the above 1983 release.

Ready?


P171-172: David Kahn, in a transatlantic phone call, reluctantly agreed to
delete a handful of paragraphs dealing with the most sensitive subject of
all: NSA's relationship with its supersecret British partner, GCHQ. "The
two agencies exchange personnel on a temporary basis... A similar but much
smaller liaison program is maintained with Canada and Australia."


P399: After two years of compromising and negotiating, the BRUSA Agreement
was supplemented in 1947 by the five-power UKUSA Agreement, which,
according to one report, established the United States as a first party
to the treaty, and Britain, Canada, and Australia-New Zealand as second
parties.


P391: ...quite likely the most secret agreement ever entered into by the
English-speaking world. Signed in 1947 and known as the UKUSA Agreement,
it brought together under a single umbrella the SIGINT organizations of
the Unit