From: quasi on 18 Apr 2008 18:50 has absolutely no need for the Digital Telephony Act except to give them their own access terminals and PRETEND there is a firewall between what the Military is doing versus what the FBI is doing. Of course, to monitor phone calls at full capacity, the FBI will need to use Military surveillance software. We've come a long way from requiring a person to listen to the first minute of conversation to even decide whether the person could continue to monitor. It's a brave new world now. We're there. Surprise. ****************************************************************************** Australian ECHELON Spotted ---------- ------- ------- * http://www.texemarrs.com, Living Truth Ministries 800/234-9673 Texe Marrs and his organization are big on the "Anti-Christ" aspects of all the technology the UKUSA governments have deployed to monitor people. I am just glad he knows the Beast when he sees it, that it is Evil (without the people involved necessarily being evil in intent: agreed!) and that unless we do something soon, it will be too late: Earth will become Hell. His book-jacket bio: Texe Marrs was a career U.S. Air Force officer (retired). He commanded communications-electronics and engineering units around the globe. * "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5 * * Appendix 2: World Surveillance Headquarters * * The report that follows, originally entitled "National Surveillance", was * written
From: Risto Lankinen on 18 Apr 2008 21:45 of EPIC [Electronic Privacy Information Center] began FOIA [U.S. Freedom of Information Act] proceedings to find out about this incident. The case raises significant issues of freedom of speech and assembly, privacy and government accountability. In response to an FOIA asking why this happened, the Secret Service responded: "We are sure no one knows why we had the meeting disrupted". They have made a mockery of FOIA. This mockery of FOIA is still being litigated by EPIC. An intentional illegal government surveillance program...it just never stops. Marc Rotenberg has gotten the Secret Service to admit in court that this was done to "investigate hacking into a company's telephone switch." Since when did the "investigative" techniques used by the Secret Service become valid for use in the United States? Going up to a bunch of mall patrons and DEMANDING IDENTIFICATION from them and searching them? How exactly was this supposed to further investigate a switch hacking? For extended details of this governmental persecution of the politically incorrect, see http://www.2600.com. ****************************************************************************** Secret Service: Vile Persecution of Ed Cummings ------ ------- ---- ----------- -- -- -------- Source material from http://www.2600.com, by someone calling themselves "Emmanuel Goldstein", which in the book '1984' was known as the Hated Enemy of the People. 2600, "The Hacker's Quarterly", is unhappy about what the Secret Service did to one
From: JSH on 18 Apr 2008 18:33 proudly waving it like a small * American flag. * * Only it wasn't a flag; it was a "health security card"---his slick * name for a national identity card. Under his plan a new National * Health Board would establish "national, unique identifier numbers" * for every single one of us. * * Fortunately, President Bill Clinton's healthcare scam never made it * into law. Sadly, few of the complainers were upset about the potential * for abuse by Big Brother. * * Shortly after being elected, one Clinton advisor promoting the biochip * 'mark' is Dr. Mary Jane England, a member of Hillary Clinton's ill-fated * socialized, national healthcare initiative. Addressing a conference * sponsored by computer giant IBM [IBM's Lotus division takes hand biometrics * of employees who use their childcare facilities] in Palm Springs, * California, in 1994, England not only endorsed the proposed mandatory * national I.D. smart card, but went one scary step further: * * The smart card is a wonderful idea, but even better would be the * capacity to not have a card, and I call it "a chip in your ear," * that would actually access your medical records, so that no matter * where you were, even if you came into an emergency room unconscious, * we would have some capacity to access that medical record. * * We need to go beyond the narrow conceptualization of the smart card * and really use some of the technology that's out there. * * California Governor Pete Wilson has actively stumped for a National I.D. * Card system, using the straw man of California's pervasive immigration * problem. California Senators Diane Feinstein
From: Rotwang on 18 Apr 2008 18:32 it was desperately needed during World War II, the U.S. Dept. of War went for it gung-ho, rightfully. Signals intelligence (SIGINT) is the first step...the NSA grew out of these wartime operations research efforts. To seek out information from noise, then act on the information. Target accuracy for precision high altitude bombing requires a complex feedback mechanism to control deployment (pre-GPS WW II). * My dad: * * Norden bombsights revolutionized aerial bombing. * * They were so accurate we stopped putting explosives * in the bombs and just aimed for people. Communications, Command and Control. The above wasn't really the best example of OR, but I did get to quote my dad again. ;-) * "The Future of War - Power, Technology, and American World Dominance in * the 21st Century", by George & Meredith Friedman, 1996, ISBN 0-517-70403-X * * A discipline named operations research had begun to develop prior to World * War II that aspired to use quantitative methodologies to develop a science * of management. [snip] * * For the physicists and mathematicians of the Rand Corporation, the * intuitions of common sense were utterly insufficient as a guide to * management. Mathematical precision was necessary, and operations * research promised to supply that precision. [snip] * * It had not jumped from the management of particular, limited areas of * warfare to the structuring of entire campaigns and wars. Operations * research had not penetrated to the very marrow of conventional warfare, * that is, not until an attempt was made in 1961 to revolutionize the idea * of war. This was done by an industrialist named Robert McNamara, who had * been president at Ford M
From: Gage on 18 Apr 2008 18:36
there were no formal controls over who could be targeted; junior staff were able to feed in target names to be searched for by the computers without any check of their authorization to do so. None of this is surprising and it is likely to be insignificant compared with official abuse of the system. The capabilities of the ECHELON system are so great, and the secrecy surrounding it makes it so impervious to democratic oversite, that the temptation to use it for questionable projects seems irresistible. In June 1992 a group of current 'highly placed intelligence operatives' from the British GCHQ spoke to the paper Observer: 'We feel we can no longer remain silent regarding that which we regard to be gross malpractice and negligence within the establishment in which we operate.' They gave as examples GCHQ interception of three charitable organizations, including Amnesty International and Christian Aid. As the Observer reported: "At any time GCHQ is able to home in on their communications for a routine target request," the GCHQ source said. In this case of phone taps the procedure is known as Mantis. With the telexes this is called Mayfly. By keying in a code relating to Third World aid, the source was able to demonstrate telex 'fixes' on the three organizations. We can then sift through those communications further by selecting keywords to search for. Without actually naming it, this was a fairly precise description of how the ECHELON Dictionary system works. Note that it was being used for telephone calls. Again, what was not revealed in the publicity was that this is a UKUSA-wide system. The design of the ECHELON system means that the interception of these organizations could have occurred anywhere in the network, at any station where the GCHQ had requested that the four digit code covering the necessary keywords and exclusion logi |