From: Phil Carmody on 18 Apr 2008 20:32 now * countersuing the agency. * * Recapitulated briefly, Sturges, who's based in San Francisco, has for * years been photographing young people whose families practice nudity. * * He's done so with his subjects' permission, as well as that of their * parents, who often appear in the photographs along with their offspring. * Rejecting the use of standard model releases, with their blanket * permissions, the photographer chooses instead to request approval * from his subjects for each and every exhibition and publication * of each and every image --- an exemplary scrupulousness. * * Then, in 1990, alerted to the "questionable" content of some of his * images by a local processing lab, the FBI arrested Joe Semien, Sturge's * assistant, invaded the photographer's San Francisco studio without a * warrant, and seized all his prints, negatives, records, and equipment; * thereafter, without arresting Sturges, or even charging him with * anything, they refused to return his property and did everything * possible to destroy him personally and professionally by branding * him a child pornographer On September 15, 1991, The New York Times reported that the Feds took the case to a grand jury after 17 months, and they immediately threw it out. And that "this was unusual because only the prosecution's evidence is presented to a grand jury and they generally return indictments at the Government's request". Excerpt from 'TO: A Journal of Poetry, Prose + the Visual Arts', Summer 1992: * Jock
From: Risto Lankinen on 18 Apr 2008 20:30 Australia o Massive domestic spying by the NSA, using an Orwellian "1984" technology to search all communications using computers, including domestic phone calls. o Circumvention of domestic spy laws via friendly "foreign" agents. ****************************************************************************** But could that be true? Could such a massive disregard for the Constitution have taken place under the cheesy logic said to be used by the Military? NSA is Military, headed by a uniformed officer. Could it possibly be true? It's some over-the-top conspiracy theory, right? ****************************************************************************** Over the Top ---- --- --- I haven't received the "Spyworld: Inside the Canadian and American Intelligence Establishments" book by Mike Frost yet. So for now I'll quote from his article in CAQ, an issue entitled "The New Age of Surveillance". Covert Action Quarterly, Winter 1996-97, Number 59 1500 Massachusetts Ave. NW #732 Washington, DC 20005 202/331-9763, caq(a)igc.org, http://mediafilter.org/caq Article: "Second Thoughts from the Second Oldest Profession. Inside the US-Canada Spyworld." By Mike Frost [ Pictured is him on two of his Canadian security IDs ] I was a spy. For almost two decades, I spied for Canada's Communications Security Establishment (CSE), the most secret and least known branch of National Defense. But although my paycheck came from the Canadian government, more often than not, my orders, assignments, and much of my training --- like those of many other CSE operators --- came from the National Security Agency (NSA) in Fort Meade, Maryland. Over the twelve years I spied for CSE, it became increasingly to resemble the NSA. Both specialize in providing secure communications and signa
From: quasi on 18 Apr 2008 18:12 card solution using biometric data. * * The innovations of this technology can benefit banking and financial * institutions, national welfare, benefits and immigration programs. In * recent contracts, technology from Fingerscan has replaced traditional * password systems at the White House and at the U.S. Strategic Air Command. * * Fingerscan, an Identix company, provides biometric identification in * the form of a three dimensional scan of a fingerprint, captured when a * finger is held against a Fingerscan device, a self-contained terminal * that stores finger records, keeps a log of transactions and interacts * with other devices. * * The terminal works by mapping, recording and storing data contained in * a 3-D scan of various dimensions of the entire finger - including skin * patterns and reflections and blood flow - for subsequent comparison. Oh my gawd, a Universal Biometric Card! What losers are getting one? * Sandia and Coms21, currently engaged in an agreement to support the * People's Republic of China's driver license and national ID card * program, have partnered to create a fraud-proof solution for on-the-spot * positive identification of card bearers. * * This combination features Sandia's personalization printing and encoding * technologies that add photos and encode chips onto smart ID cards. * * Coms21's hand-held smart card readers then provide portable
From: Risto Lankinen on 18 Apr 2008 17:47 Clinton signed Presidential Decision Directive * No. 14, shifting U.S. anti-drug efforts away from intercepting cocaine as * it passed through Mexico and the Caribbean, and, instead, attacking the * drug supply at its sources in Colombia, Bolivia and Peru. The President himself ordered them to stop checking!!! This is in the same leadership vein as Reagan declaring himself a "Contra". And why did President Clinton change strategy? He didn't have much choice. The Mexicans didn't want to work with us anymore. We greatly pissed them off. U.S. law enforcement literally knows no limits. * The United States subsequently arranged for a Mexican doctor involved * in a murder, Humberto Alvarez Machain, to be kidnapped from Mexico and * spirited to the United States to stand trial. * * The abduction outraged the Mexican government. * * When the U.S. Supreme Court upheld the legality of the kidnapping in * June 1992, Mexico temporarily suspended its participation in joint * anti-narcotics operations with the United States. * * Then Mexico adopted its Mexicanization policy a year later [keep American * drug enforcement out of Mexico], and the State Department said that the * abduction was directly to blame for Mexico's increased concerns about * national sovereignty. Of course, that's no reason not to check our U.S. borders. We never learn: # "CIA Suspect's Prosperous Clan Reacts Angrily to Arrest
From: Pubkeybreaker on 18 Apr 2008 21:38
rules in exchange for : greater federal control over crypto imports. But : what he appears to be truly aiming for is a : full-scale assault on your right to use whatever : encryption software you want in your own home. : [snip] : : It's diabolical. Researchers already have to : comply with a legion of rules to qualify for grants. : Kerrey's proposed bill, called "The Secure Public : Network Act," would add yet another provision to : the fine print. It requires that "all encryption : software purchased with federal funds shall be : software based on a system of key recovery" and : "all encrypted networks established with the use : of federal funds shall use encryption based on a : system of key recovery." Key recovery, or key : escrow, technology enables law-enforcement : officials to obtain copies of the mathematical keys : needed to decipher messages. In other words, : someone else keeps a copy of your secret key : -- and some proposed bills say that the cops : may not even need a search warrant to seize it. : [snip] : : What about the penalties for "unauthorized : breaking of another's encryption codes?" That : would criminalize cryptanalysis, the way to verify : the security of encryption software you buy. "The : only way to know the strength of a cipher is : cryptanalysis," says Marc Briceno, a : cryptography guru at Community ConneXion. : : Then there's Kerrey's statement saying "there : will be" restrictions on what encryption products : you're permitted to buy from overseas firms. This : contradicts Justice Department official Michael : Vatis, who |