From: quasi on 21 Apr 2008 23:22 society. The 'arousal filter' Stafford Beer and his cyberneticians set up was effectively keyword monitoring of traffic. When you use keywords to either select or exclude traffic, each step is a 'filter' step. If you make it past all the filters, a human then reviews the results to see if it calls for action. "arousal filter" Mr. Beer was trying to help the economy by massive real-time monitoring of factories and companies and banks, and thus help the people of Chile. * "Brain of the Firm", Stafford Beer, 1986, ISBN 0 471 27687 1 * * Twenty-four hours a day, messages were flowing in non-stop. This instantly * posed an enormous problem in handling the inundation of information. * * Two of the senior cyberneticians organized a filtration system. The feedback was not simply machine throughput rates, but also---via the central computer---a system 'through which anyone could consult anyone else'. I used keyword monitoring to filter "information" from "noise" in Salomon's HUGE email traffic. What I did, of course, was small potatoes; what Stafford Beer did was a serious cybernetic attempt to control an entire nation's economy. In order for him to do that, he needed to set up a (cybernetic) monitoring infrastructure. The nation's banks, factories and industrial companies. It would have given Allende maximum control over the nations industrial infrastructure, real-time monitoring of everything. Everything had a computer monitoring it. * "The Future of War - Power, Technology, and American World Dominance in * the 21st Century", by George & Meredith Friedman, 1996, ISBN 0-517-70403-X * * McNamara's revolution built on an idea that was central to operations * research and propounded by many nuclear strategists, that war was not * methodologically distinguishable from economics. The process whereby you * analyzed, managed, and controlled an economy was not essentially different * from the way you managed a war, except
From: S.C.Sprong on 21 Apr 2008 22:53 * we would have some capacity to access that medical record. * * We need to go beyond the narrow conceptualization of the smart card * and really use some of the technology that's out there. * * California Governor Pete Wilson has actively stumped for a National I.D. * Card system, using the straw man of California's pervasive immigration * problem. California Senators Diane Feinstein and Barbara Boxer support * it too. The latest proposal is to mandate I.D. cards for all school * children under the Goals 2000 national education program. Another plan * by the U.S. Labor Department would have required it for all users of a * National Job Training and Employment database. * * George Orwell, in 1984, his classic novel of Big Brother and a coming * totalitarian state, observed that very few people are awake and alert * to the machinations and manipulations of the controllers. Thus, the * people, as a whole, fall victim to a colossal conspiracy out of ignorance * and because of apathy and denial of reality: * * The people could be made to accept the most flagrant violations of * reality, because they never fully grasped the enormity of what was * demanded of them, and were not sufficiently interested in public * events to notice what was happening. [ By Walter Cronkite: "Orwell's '1984'---Nearing?", NYT, June 5 1983 In our world, where a Vietnam village can be destroyed so it can be saved; where the President names the latest thing in nuclear missiles "Peacekeeper"---in such a world, can the Orwellian vision be very far away? Big Brother's ears have plugs in them right now (or they are, by law, supposed to), at least on the domestic telephone and cable traffic. But the National Security Agency's ability to monitor microwave transmissions, to scoop out of the air VAST numbers of communications, including telephone con
From: S.C.Sprong on 21 Apr 2008 23:38 actual or intended publication of such source code. */ > > ...followed by another email with a subset of the same source, > slightly modified, and the proprietary header stripped out. > > I hope it didn't flow past AT&T's ISP connections... [snip] ********** end excerpt from 'Corruption at Salomon Brothers' ********** This transfer of proprietary source code that USED to be owned by AT&T did not even qualify for action. Salomon legal stated Salomon has a lower obligation for third-party copyrights than they did for software they contracted for themselves, like Sybase. Salomon didn't have a UNIX source license, so obviously the employee had gotten it elsewhere. In the following statistic, it was the only non-Salomon source code. We went from zero monitoring of Internet email traffic to... > On 3/21/96 we had our first security incident report. > > By 3/26/96 we had an astonishing 38,000 lines of proprietary source code > outbound. > > We were mentally unprepared. Figuratively we were pulling our hair out > wondering when the madness would stop. > > It never did. As I said, the results of keyword monitoring were s
From: S.C.Sprong on 21 Apr 2008 21:56 to the managers of the * plant concerned. What are 'arousal filter' and 'homeostatic loops'? The scope of Cybernetics is, in a word, awesome. A cyberneticist can talk from atoms to cells to nervous systems, to management of a company, country, world, solar system. Whether an organism is mechanical, biological or social, it requires a feedback mechanism to survive. Your nervous system does some amazing things to fight off infections. It creates custom anti-bodies to attack foreign microbes. Custom living cells created through a system of feedback to spot that there was a problem, analysis of the problem, action on the problem. This is a life-sustaining feedback 'homeostatic' loop. [bracket comments are mine] When Stafford Beer says Cyberstride needed to filter 'homeostatic loops': * "The Human Use of Human Beings - Cybernetics and Society" * by Norbert Wiener, 1954, pre-ISBN * * The process [such as that employed by our nervous system] by which we * living beings resist the general stream of corruption and decay is * known as homeostasis. Stayin' alive, stayin' alive... So, "statistical filtration for all homeostatic loops" means one is checking on the health of the monitored system. The cybernetician uses the same language for feedback of weapons systems (picking out a submarine from the background noise of the ocean) as they do for describing human life, as they do for the political organization of a country. Like I said, an awesome scope. Norbert Wiener even came up with a physics-based description of how life is formed by information. Check it out. Hang in there too, it's worth it. * "Platform for Change", by Stafford Beer, 1978, ISBN 0 471 06189 1 * * The term 'entropy' began life as a subtle measure of energy flow. * * When something hotter is systemically bound to something cooler, the * greater energy of the hotter stuff migrates---inexorably migrates--- * into
From: S.C.Sprong on 21 Apr 2008 21:28
and unbreakable encryption, available world-wide. CISPES - Committee in Solidarity with the People of El Salvador "Ultra-secret" agencies: NSA - U.S. National Security Agency GCHQ - British Government Communications Headquarters CSE - Canada's Communications Security Establishment DSD - Australian Defense Signals Directorate GCSB - New Zealand's Government Communications Security Bureau ****************************************************************************** Main() ---- Using mainly publicly available material, here is my documentation of: o Part 1: Massive Domestic Spying via NSA ECHELON This is highly detailed documentation of NSA spying. This spying is illegal, massive, and domestic. The documentation is comprehensive, especially since it is now brought together in this one section. o Part 2: On Monitoring and Being Monitored In this section, I describe the capabilities of ECHELON keyword monitoring. A detailed example --- how to use keywords to pick out conversations of interest --- is given. I also put forth a case of what it means to be monitored heavily by the government. o Part 3: 1984 Means a Constant State of War The politics of war, and the Orwellian tactics employed by by the U.S. Government to control its citizens. o Part 4: Why unlimited cryptography must be legislated NOW In additional to the reasons given in the previous sections, the 'debate' reasons constantly given by the government are reviewed and debunked. And our nation's experts say it will hurt security. The GAO says the same thing. o Part 5: There is no part five. o Part 6: Louis Freeh & The Creep |