From: quasi on
has absolutely no need for the Digital Telephony Act except
to give them their own access terminals and PRETEND there is a firewall
between what the Military is doing versus what the FBI is doing.

Of course, to monitor phone calls at full capacity,
the FBI will need to use Military surveillance software.

We've come a long way from requiring a person to listen to the first minute
of conversation to even decide whether the person could continue to monitor.

It's a brave new world now.


We're there.


Surprise.



******************************************************************************


Australian ECHELON Spotted
---------- ------- -------

* http://www.texemarrs.com, Living Truth Ministries 800/234-9673

Texe Marrs and his organization are big on the "Anti-Christ" aspects of all
the technology the UKUSA governments have deployed to monitor people.

I am just glad he knows the Beast when he sees it, that it is Evil (without
the people involved necessarily being evil in intent: agreed!) and that
unless we do something soon, it will be too late: Earth will become Hell.

His book-jacket bio: Texe Marrs was a career U.S. Air Force officer (retired).
He commanded communications-electronics and engineering units around the globe.

* "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5
*
* Appendix 2: World Surveillance Headquarters
*
* The report that follows, originally entitled "National Surveillance", was
* written


From: Risto Lankinen on
of EPIC [Electronic Privacy Information Center] began FOIA [U.S. Freedom
of Information Act] proceedings to find out about this incident.

The case raises significant issues of freedom of speech and assembly,
privacy and government accountability.

In response to an FOIA asking why this happened, the Secret Service
responded: "We are sure no one knows why we had the meeting disrupted".

They have made a mockery of FOIA.

This mockery of FOIA is still being litigated by EPIC.

An intentional illegal government surveillance program...it just never stops.

Marc Rotenberg has gotten the Secret Service to admit in court that this was
done to "investigate hacking into a company's telephone switch."

Since when did the "investigative" techniques used by the Secret Service
become valid for use in the United States? Going up to a bunch of mall
patrons and DEMANDING IDENTIFICATION from them and searching them?

How exactly was this supposed to further investigate a switch hacking?

For extended details of this governmental persecution of the politically
incorrect, see http://www.2600.com.


******************************************************************************


Secret Service: Vile Persecution of Ed Cummings
------ ------- ---- ----------- -- -- --------

Source material from http://www.2600.com, by someone calling themselves
"Emmanuel Goldstein", which in the book '1984' was known as the Hated Enemy
of the People.

2600, "The Hacker's Quarterly", is unhappy about what the Secret Service
did to one


From: JSH on
proudly waving it like a small
* American flag.
*
* Only it wasn't a flag; it was a "health security card"---his slick
* name for a national identity card. Under his plan a new National
* Health Board would establish "national, unique identifier numbers"
* for every single one of us.
*
* Fortunately, President Bill Clinton's healthcare scam never made it
* into law. Sadly, few of the complainers were upset about the potential
* for abuse by Big Brother.
*
* Shortly after being elected, one Clinton advisor promoting the biochip
* 'mark' is Dr. Mary Jane England, a member of Hillary Clinton's ill-fated
* socialized, national healthcare initiative. Addressing a conference
* sponsored by computer giant IBM [IBM's Lotus division takes hand biometrics
* of employees who use their childcare facilities] in Palm Springs,
* California, in 1994, England not only endorsed the proposed mandatory
* national I.D. smart card, but went one scary step further:
*
* The smart card is a wonderful idea, but even better would be the
* capacity to not have a card, and I call it "a chip in your ear,"
* that would actually access your medical records, so that no matter
* where you were, even if you came into an emergency room unconscious,
* we would have some capacity to access that medical record.
*
* We need to go beyond the narrow conceptualization of the smart card
* and really use some of the technology that's out there.
*
* California Governor Pete Wilson has actively stumped for a National I.D.
* Card system, using the straw man of California's pervasive immigration
* problem. California Senators Diane Feinstein


From: Rotwang on
it was desperately needed during World War II, the U.S. Dept.
of War went for it gung-ho, rightfully. Signals intelligence (SIGINT) is the
first step...the NSA grew out of these wartime operations research efforts.

To seek out information from noise, then act on the information.

Target accuracy for precision high altitude bombing requires
a complex feedback mechanism to control deployment (pre-GPS WW II).

* My dad:
*
* Norden bombsights revolutionized aerial bombing.
*
* They were so accurate we stopped putting explosives
* in the bombs and just aimed for people.

Communications, Command and Control. The above wasn't really the best
example of OR, but I did get to quote my dad again. ;-)

* "The Future of War - Power, Technology, and American World Dominance in
* the 21st Century", by George & Meredith Friedman, 1996, ISBN 0-517-70403-X
*
* A discipline named operations research had begun to develop prior to World
* War II that aspired to use quantitative methodologies to develop a science
* of management. [snip]
*
* For the physicists and mathematicians of the Rand Corporation, the
* intuitions of common sense were utterly insufficient as a guide to
* management. Mathematical precision was necessary, and operations
* research promised to supply that precision. [snip]
*
* It had not jumped from the management of particular, limited areas of
* warfare to the structuring of entire campaigns and wars. Operations
* research had not penetrated to the very marrow of conventional warfare,
* that is, not until an attempt was made in 1961 to revolutionize the idea
* of war. This was done by an industrialist named Robert McNamara, who had
* been president at Ford M


From: Gage on
there were no formal controls over who
could be targeted; junior staff were able to feed in target names to be
searched for by the computers without any check of their authorization to
do so.

None of this is surprising and it is likely to be insignificant compared with
official abuse of the system.

The capabilities of the ECHELON system are so great, and the secrecy
surrounding it makes it so impervious to democratic oversite, that the
temptation to use it for questionable projects seems irresistible.


In June 1992 a group of current 'highly placed intelligence operatives' from
the British GCHQ spoke to the paper Observer: 'We feel we can no longer remain
silent regarding that which we regard to be gross malpractice and negligence
within the establishment in which we operate.'

They gave as examples GCHQ interception of three charitable organizations,
including Amnesty International and Christian Aid. As the Observer reported:

"At any time GCHQ is able to home in on their communications for a
routine target request," the GCHQ source said. In this case of phone
taps the procedure is known as Mantis. With the telexes this is
called Mayfly. By keying in a code relating to Third World aid, the
source was able to demonstrate telex 'fixes' on the three organizations.

We can then sift through those communications further by selecting
keywords to search for.

Without actually naming it, this was a fairly precise description of how
the ECHELON Dictionary system works.

Note that it was being used for telephone calls.

Again, what was not revealed in the publicity was that this is a UKUSA-wide
system. The design of the ECHELON system means that the interception of
these organizations could have occurred anywhere in the network, at any
station where the GCHQ had requested that the four digit code covering the
necessary keywords and exclusion logi