From: quasi on
society.

The 'arousal filter' Stafford Beer and his cyberneticians
set up was effectively keyword monitoring of traffic.

When you use keywords to either select or exclude traffic, each step
is a 'filter' step. If you make it past all the filters, a human then
reviews the results to see if it calls for action. "arousal filter"

Mr. Beer was trying to help the economy by massive real-time monitoring
of factories and companies and banks, and thus help the people of Chile.

* "Brain of the Firm", Stafford Beer, 1986, ISBN 0 471 27687 1
*
* Twenty-four hours a day, messages were flowing in non-stop. This instantly
* posed an enormous problem in handling the inundation of information.
*
* Two of the senior cyberneticians organized a filtration system.

The feedback was not simply machine throughput rates, but also---via
the central computer---a system 'through which anyone could consult
anyone else'.

I used keyword monitoring to filter "information" from "noise" in
Salomon's HUGE email traffic. What I did, of course, was small potatoes;
what Stafford Beer did was a serious cybernetic attempt to control an
entire nation's economy.

In order for him to do that, he needed to set
up a (cybernetic) monitoring infrastructure.

The nation's banks, factories and industrial companies.

It would have given Allende maximum control over the nations
industrial infrastructure, real-time monitoring of everything.

Everything had a computer monitoring it.

* "The Future of War - Power, Technology, and American World Dominance in
* the 21st Century", by George & Meredith Friedman, 1996, ISBN 0-517-70403-X
*
* McNamara's revolution built on an idea that was central to operations
* research and propounded by many nuclear strategists, that war was not
* methodologically distinguishable from economics. The process whereby you
* analyzed, managed, and controlled an economy was not essentially different
* from the way you managed a war, except


From: S.C.Sprong on
* we would have some capacity to access that medical record.
*
* We need to go beyond the narrow conceptualization of the smart card
* and really use some of the technology that's out there.
*
* California Governor Pete Wilson has actively stumped for a National I.D.
* Card system, using the straw man of California's pervasive immigration
* problem. California Senators Diane Feinstein and Barbara Boxer support
* it too. The latest proposal is to mandate I.D. cards for all school
* children under the Goals 2000 national education program. Another plan
* by the U.S. Labor Department would have required it for all users of a
* National Job Training and Employment database.
*
* George Orwell, in 1984, his classic novel of Big Brother and a coming
* totalitarian state, observed that very few people are awake and alert
* to the machinations and manipulations of the controllers. Thus, the
* people, as a whole, fall victim to a colossal conspiracy out of ignorance
* and because of apathy and denial of reality:
*
* The people could be made to accept the most flagrant violations of
* reality, because they never fully grasped the enormity of what was
* demanded of them, and were not sufficiently interested in public
* events to notice what was happening.
[
By Walter Cronkite: "Orwell's '1984'---Nearing?", NYT, June 5 1983

In our world, where a Vietnam village can be destroyed so it can be
saved; where the President names the latest thing in nuclear missiles
"Peacekeeper"---in such a world, can the Orwellian vision be very far
away?

Big Brother's ears have plugs in them right now (or they are, by law,
supposed to), at least on the domestic telephone and cable traffic.

But the National Security Agency's ability to monitor microwave
transmissions, to scoop out of the air VAST numbers of communications,
including telephone con


From: S.C.Sprong on
actual or intended publication of such source code. */
>
> ...followed by another email with a subset of the same source,
> slightly modified, and the proprietary header stripped out.
>
> I hope it didn't flow past AT&T's ISP connections...
[snip]

********** end excerpt from 'Corruption at Salomon Brothers' **********


This transfer of proprietary source code that USED to be owned by AT&T
did not even qualify for action. Salomon legal stated Salomon has a lower
obligation for third-party copyrights than they did for software they
contracted for themselves, like Sybase. Salomon didn't have a UNIX source
license, so obviously the employee had gotten it elsewhere.

In the following statistic, it was the only non-Salomon source code.

We went from zero monitoring of Internet email traffic to...

> On 3/21/96 we had our first security incident report.
>
> By 3/26/96 we had an astonishing 38,000 lines of proprietary source code
> outbound.
>
> We were mentally unprepared. Figuratively we were pulling our hair out
> wondering when the madness would stop.
>
> It never did.


As I said, the results of keyword monitoring were s


From: S.C.Sprong on
to the managers of the
* plant concerned.

What are 'arousal filter' and 'homeostatic loops'?


The scope of Cybernetics is, in a word, awesome.

A cyberneticist can talk from atoms to cells to nervous systems, to
management of a company, country, world, solar system.

Whether an organism is mechanical, biological or social, it requires
a feedback mechanism to survive.

Your nervous system does some amazing things to fight off infections.

It creates custom anti-bodies to attack foreign microbes.
Custom living cells created through a system of feedback to spot that
there was a problem, analysis of the problem, action on the problem.

This is a life-sustaining feedback 'homeostatic' loop.

[bracket comments are mine]
When Stafford Beer says Cyberstride needed to filter 'homeostatic loops':

* "The Human Use of Human Beings - Cybernetics and Society"
* by Norbert Wiener, 1954, pre-ISBN
*
* The process [such as that employed by our nervous system] by which we
* living beings resist the general stream of corruption and decay is
* known as homeostasis.

Stayin' alive, stayin' alive...

So, "statistical filtration for all homeostatic loops" means one is checking
on the health of the monitored system.

The cybernetician uses the same language for feedback of weapons systems
(picking out a submarine from the background noise of the ocean) as they
do for describing human life, as they do for the political organization
of a country.

Like I said, an awesome scope.

Norbert Wiener even came up with a physics-based
description of how life is formed by information.

Check it out. Hang in there too, it's worth it.

* "Platform for Change", by Stafford Beer, 1978, ISBN 0 471 06189 1
*
* The term 'entropy' began life as a subtle measure of energy flow.
*
* When something hotter is systemically bound to something cooler, the
* greater energy of the hotter stuff migrates---inexorably migrates---
* into


From: S.C.Sprong on
and unbreakable encryption, available world-wide.

CISPES - Committee in Solidarity with the People of El Salvador


"Ultra-secret" agencies:

NSA - U.S. National Security Agency

GCHQ - British Government Communications Headquarters

CSE - Canada's Communications Security Establishment

DSD - Australian Defense Signals Directorate

GCSB - New Zealand's Government Communications Security Bureau



******************************************************************************

Main()
----


Using mainly publicly available material, here is my documentation of:


o Part 1: Massive Domestic Spying via NSA ECHELON

This is highly detailed documentation of NSA spying.
This spying is illegal, massive, and domestic.
The documentation is comprehensive, especially since
it is now brought together in this one section.

o Part 2: On Monitoring and Being Monitored

In this section, I describe the capabilities of ECHELON
keyword monitoring. A detailed example --- how to use
keywords to pick out conversations of interest --- is given.
I also put forth a case of what it means to be monitored
heavily by the government.

o Part 3: 1984 Means a Constant State of War

The politics of war, and the Orwellian tactics employed by
by the U.S. Government to control its citizens.

o Part 4: Why unlimited cryptography must be legislated NOW

In additional to the reasons given in the previous sections,
the 'debate' reasons constantly given by the government
are reviewed and debunked. And our nation's experts say it
will hurt security. The GAO says the same thing.

o Part 5: There is no part five.

o Part 6: Louis Freeh & The Creep