From: Pubkeybreaker on
in view of a
* possibly necessary surveillance activity. All the new systems have
* to have the capability to place all individuals under surveillance.
*
HA Unfortunately, initial contacts with various consortia...has met with
HA the most diverse reactions, ranging from great willingness to
HA cooperate on the one hand, to an almost total refusal even to discuss
HA the question.
*
* It is very urgent for governments and/or legislative institutions to
* make the new consortia aware of their duties. The government will
* also have to create new regulations for international cooperation
* so that the necessary surveillance will be able to operate.


# "Made in America?", Wired Magazine, June 1997
#
# Japan's Justice Ministry is rallying support for an anticrime bill that
# would give police extensive wiretap powers---a major departure given the
# country's constitutional guarantees for "secrecy of any means of communi-
# cations." According to activist Toshimaru Ogura, Japanese cops are
# modeling their proposals on US wiretap law, specifically the 1994
# Communications Assistance for Law Enforcement Act (CALEA). The NSA helped
# sculpt CALEA's language, which begs the question: Is Japan's wiretap bill
# another one of the NSA's covert operations?


* "The End of Ordinary Money, Part I", by J. Orlin Grabbe
* http://www.aci.net/kalliste
*
* The Federal Deposit Insurance Corporation (FDIC) is the government
* corporation that insures deposits at U.S. member banks. The FDIC
* improvement act of 1991 required the FDIC to study the costs and
* feasibility of tracking every bank deposit in the U.S.
*
* The notion was it was necessary to compute bank deposit insurance
* requirements in real time.
*
* Not everyone thought this was a good idea. The American Bankers'
* Association noted it was inconceivable that such data would "be
* used


From: Risto Lankinen on
Speech recognition. Think of it as speech-to-text software.
Subject to DICTIONARY searches.

CALEA - A 1994 law ("Communications Assistance to Law Enforcement Act")
to force a massive reworking of the U.S. telephone infra-
structure so that the government can intrinsically wiretap it.
Also called the FBI Digital Telephony Act. It is a domestic
extension of ECHELON.

GAK - Government Access [to cryptographic] Keys. Any cryptography
product with GAK has been compromised so the government can
read it.

SIGINT - Signals Intelligence = NSA = electronic snooping

Key Recovery - See GAK.

C-SPAN - Two cable channels dedicated to broadcasting both houses of
Congress and other U.S. governmental functions.

DEA - U.S. Drug Enforcement Administration
DIA - U.S. Pentagon Defense Intelligence Agency
DIA - U.S. Drug Interdiction Agency (older)

FBI - U.S. Federal Bureau of Investigation

BATF - U.S. Bureau of Alcohol, Tobacco, and Firearms

UKUSA - pronounced 'you-koo-za' - a secret wartime treaty that says
member nations can spy on each others population without
warrants or


From: Pubkeybreaker on
search through these masses of messages for ones of interest.

The intercept stations take in millions of messages intended for the
legitimate earth stations served by the satellite and then use computers
to search for pre-programmed addresses and keywords.

In this way they select out manageable numbers (hundreds or thousands) of
messages to be searched through and read by the intelligence analysis staff.

Many people are vaguely aware that a lot of spying occurs, maybe even on them,
but how do we judge if it is ubiquitous or not a worry at all? Is someone
listening every time we pick up the telephone? Are all Internet or fax
messages being pored over continuously by shadowy figures somewhere in a
windowless building? There is almost never any solid information with which
to judge what is realistic concern and what is silly paranoia.

What follows explains as precisely as possible - and for the first time in
public - how the worldwide system works, just how immense and powerful it is
and what it can and cannot do. The electronic spies are not ubiquitous, but
the paranoia is not unfounded.

The global system has a highly secret codename - ECHELON.

The intelligence agencies will be shocked to see it named and described for
the first time in print.

Each station in the ECHELON network has computers that automatically search
through millions of intercepted messages for ones containing pre-programmed
keywords or fax, telex and email addresses. Every word of every message is
automatically searched: they do not need your specific telephone number or
Internet address on the list.

All the different computers in the network are known, within the UKUSA
agencies, as the ECHELON Dictionaries.



From: tchow on
Is Termed a Hoax."
* By Stephen Labaton, The New York Times, April 23, 1995
*
* Responding to a question about whether Washington should review its
* readiness to combat domestic terrorism [the first arrest in the OKC
* bombing had just been made], the President sought to reassure the
* public that the Government was already making great efforts to do so.
*
* Groping for a specific illustration, he appeared to think twice about
* describing the incident, but then went ahead.
*
* There's been a lot of activity that the public does not see, most of
* which I should not comment on, but let me give you one specific example,"
* he said.
*
* "There was one incident with which I was INTIMATELY FAMILIAR, which
* involved a quick and secret deployment of a major United States effort
* of F.B.I.," and emergency, health and Army forces.
*
* "Because we had A TIP OF A POSSIBLE TERRORIST INCIDENT which, thank
* goodness, did not materialize," the President added.
*
* However, the F.B.I. later stated it was investigating it as a hoax threat.
* A Justice Department spokesman said it was "completely inaccurate" to
* describe the incident as anything other than a hoax.

And how did the President, who said he was 'intimately familiar' with the
incident, come to believe that it was an [informer] tip about a possible
threat, and not an anonymous hoax threat?

The American people are not the only ones the NSA/FBI lie to...

Notice how secrecy keeps playing a major part in all this...J


From: Pubkeybreaker on
people are awake and alert
* to the machinations and manipulations of the controllers. Thus, the
* people, as a whole, fall victim to a colossal conspiracy out of ignorance
* and because of apathy and denial of reality:
*
* The people could be made to accept the most flagrant violations of
* reality, because they never fully grasped the enormity of what was
* demanded of them, and were not sufficiently interested in public
* events to notice what was happening.
[
By Walter Cronkite: "Orwell's '1984'---Nearing?", NYT, June 5 1983

In our world, where a Vietnam village can be destroyed so it can be
saved; where the President names the latest thing in nuclear missiles
"Peacekeeper"---in such a world, can the Orwellian vision be very far
away?

Big Brother's ears have plugs in them right now (or they are, by law,
supposed to), at least on the domestic telephone and cable traffic.

But the National Security Agency's ability to monitor microwave
transmissions, to scoop out of the air VAST numbers of communications,
including telephone conversations, store them in computers, play them
back later, has a truly frightening potential for abuse.

George Orwell issued a warning.

He told us that freedom is too much taken for granted, that it needs to
be carefully watched and protected. His last word on the subject was a
plea to his readers: "Don't let it happen. It depends on you."
]
*
* The National Security Agency's Project L.U.C.I.D., with all its
* technological wizardry, is a future, planetary dictator's dream---and a
* Christian and national patriot's nightmare. Someday, the Holy Bible
* prophesies, that planetary dictator will emerge on the scene, lusting
*