From: Nick Wedd on
Friday, Cummings' probation officer did an aboutface and told the
> court that he thought Cummings represented a very great danger to the
> community. Outside the courtroom, he and the other local law enforcement
> people crowded around Varney like kids surrounding a rock star. He was
> their hero and maybe one day they would be just like him.

Well, isn't that strange: the Secret Service taking a strong interest in
the probation violation hearing of Ed Cummings for taking batteries out
of a tone dialer.

Not only were they interested, they testified against him!

> HERE WE GO AGAIN
>
> 1/12/96. In addition to the judge, Northampton County probation officer
> Scott Hoke, Secret Service agent Tom Varney, and Haverford Township
> detective John Morris were in attendance. Varney and Morris arrived
> in the same car.
>
> Tom Varney of the Secret Service then told the judge that he believed
> Cummings to be a major threat to society and that he was concerned
> because of the upcoming presidential campaign. It was unclear if he
> was actually implying that Cummings would somehow be a threat to the
> president but the judge and the police listened intently.
>
> This was the first time a Secret Service agent had come to their town.
> Varney continued to describe the threatening items that had been found
> in Cummings' residence: a copy of The Anarchist's Cookbook, publications
> from Loompanix, a mag stripe read head (no electronics) which "could have
> been used" to commit fraud, and material thought to be C4 but later
> proven not to be. However, Varney said, the fact that it could have been
> showed how serious this was. Nobody questioned his logic.

Wow, I'd better throw out my copy of "The Anarchist's Cookbook", eh?.
Oh wait: it would be more fitting if I blew it up.



From: quasi on
crowded around Varney like kids surrounding a rock star. He was
> their hero and maybe one day they would be just like him.

Well, isn't that strange: the Secret Service taking a strong interest in
the probation violation hearing of Ed Cummings for taking batteries out
of a tone dialer.

Not only were they interested, they testified against him!

> HERE WE GO AGAIN
>
> 1/12/96. In addition to the judge, Northampton County probation officer
> Scott Hoke, Secret Service agent Tom Varney, and Haverford Township
> detective John Morris were in attendance. Varney and Morris arrived
> in the same car.
>
> Tom Varney of the Secret Service then told the judge that he believed
> Cummings to be a major threat to society and that he was concerned
> because of the upcoming presidential campaign. It was unclear if he
> was actually implying that Cummings would somehow be a threat to the
> president but the judge and the police listened intently.
>
> This was the first time a Secret Service agent had come to their town.
> Varney continued to describe the threatening items that had been found
> in Cummings' residence: a


From: Risto Lankinen on
-
ments brought about by new technologies. This report examines the fundamental
properties of these requirements and attempts to outline the technical risks,
costs, and implications of deploying systems that provide government access to
encryption keys.

The deployment of key-recovery-based encryption infrastructures to meet law
enforcement's stated specifications will result in substantial sacrifices in
security and greatly increased costs to the end-user. Building the secure
computer-communication infrastructures necessary to provide adequate
technological underpinnings demanded by these requirements would be enormously
complex and is far beyond the experience and current competency of the field.
Even if such infrastructures could be built, the risks and costs of such an
operating environment may ultimately prove unacceptable. In addition, these
infrastructures would generally require extraordinary levels of human
trustworthiness.

These difficulties are a function of the basic government access requirements
proposed for key-recovery encryption systems. They exist regardless of the
design of the recovery systems - whether the systems use private-key crypto-
graphy or public-key cryptography; whether the databases are split with secret-
sharing techniques or maintained in a single hardened secure facility; whether
the recovery services provide private keys, session keys, or merely decrypt
specific data as needed; a


From: JSH on
-312-11057-X, 1994. Don't let the title throw you: the
authors spoke with a great many intelligence people, and cleverly probed
NSA/CIA/FBI by submitting items for publication approval, and when they
censored something... Bingo.

Because of the Catch-22 situation, the NSA gave up trying to censor many
books, since it can be used to confirm questions they would otherwise have
refused to answer.


The other books referenced within are also suggested reading.
I have sometimes edited for brevity the excerpts, especially
my newspaper clippings of stories flying by.

If I have any news story specifics wrong or if you have more details,
please email me.

Later versions of this document can be searched for at dejanews.com.
Or, you can email me, Subject: Requesting Cryptography Manifesto.


----
---- Here comes a large 'reasoned polemic':
----


This is a U.S.-centric message, but keep reading even if you are not in the
U.S.; British, Canadian, Australian and New Zealand citizens are also directly
affected.

This message is about ECHELON, which is an unbelievably huge world-wide
spying apparatus, including the domestic phone calls of many countries.

United States citizens' phone calls are being monitored in a dragnet
fashion not even George Orwell could have imagined.

This was all paid for by U.S.


From: Dik T. Winter on
budget would cause GRAVE DAMAGE to the NATIONAL SECURITY of
* the United States.
*
* $3.1 billion for the CIA
* $10.4 billion for the Army, Navy, Air Force
* and Marines special-operations units
* $13.2 billion for the NSA/NRO/DIA
*
* The only damage done so far is to the
* credibility of those who opposed the measure.

There is no constitutional basis for this
massive loss of Fourth Amendment rights.

It sounds like some wild conspiracy theory, doesn't it?

Yet it exists.




******************************************************************************

Secret Court
------ -----


: The Washington Post Magazine, June 23 1996
: Government surveillance, terrorism and the U.S. Constitution:
: The story of a Washington courtroom no tourist can visit.
: By Jim McGee and Brian Duffy [snipped article excerpts shown here]
: Adapted from the book "Main Justice", 1996, ISBN 0-684-81135-9.
:
* Last year, a secret court in the Justice Department authorized a record
* 697 'national security' wiretaps on American soil, outside normal
* constitutional procedures.
*
* The Foreign Intelligence Surveillance Act, is a 1978 law that permits
* secret buggings and wiretaps of individuals suspected of being agents
* of a hostile foreign government or international terrorist organization
* EVEN WHEN THE TARGET IS NOT SUSPECTED OF COMMITTING ANY CRIME.
*
* The FISA court operates outside the normal constitutional standards for
* searches and seizures. Non-government personnel are not allowed.
* The courts files cannot be publicly reviewed.
*
* The average U.S. citizen might reasonably assume use of this court
* is at the least: unusual.
*
* It is not. In f