From: Nick Wedd on 18 Apr 2008 19:09 Friday, Cummings' probation officer did an aboutface and told the > court that he thought Cummings represented a very great danger to the > community. Outside the courtroom, he and the other local law enforcement > people crowded around Varney like kids surrounding a rock star. He was > their hero and maybe one day they would be just like him. Well, isn't that strange: the Secret Service taking a strong interest in the probation violation hearing of Ed Cummings for taking batteries out of a tone dialer. Not only were they interested, they testified against him! > HERE WE GO AGAIN > > 1/12/96. In addition to the judge, Northampton County probation officer > Scott Hoke, Secret Service agent Tom Varney, and Haverford Township > detective John Morris were in attendance. Varney and Morris arrived > in the same car. > > Tom Varney of the Secret Service then told the judge that he believed > Cummings to be a major threat to society and that he was concerned > because of the upcoming presidential campaign. It was unclear if he > was actually implying that Cummings would somehow be a threat to the > president but the judge and the police listened intently. > > This was the first time a Secret Service agent had come to their town. > Varney continued to describe the threatening items that had been found > in Cummings' residence: a copy of The Anarchist's Cookbook, publications > from Loompanix, a mag stripe read head (no electronics) which "could have > been used" to commit fraud, and material thought to be C4 but later > proven not to be. However, Varney said, the fact that it could have been > showed how serious this was. Nobody questioned his logic. Wow, I'd better throw out my copy of "The Anarchist's Cookbook", eh?. Oh wait: it would be more fitting if I blew it up.
From: quasi on 18 Apr 2008 19:03 crowded around Varney like kids surrounding a rock star. He was > their hero and maybe one day they would be just like him. Well, isn't that strange: the Secret Service taking a strong interest in the probation violation hearing of Ed Cummings for taking batteries out of a tone dialer. Not only were they interested, they testified against him! > HERE WE GO AGAIN > > 1/12/96. In addition to the judge, Northampton County probation officer > Scott Hoke, Secret Service agent Tom Varney, and Haverford Township > detective John Morris were in attendance. Varney and Morris arrived > in the same car. > > Tom Varney of the Secret Service then told the judge that he believed > Cummings to be a major threat to society and that he was concerned > because of the upcoming presidential campaign. It was unclear if he > was actually implying that Cummings would somehow be a threat to the > president but the judge and the police listened intently. > > This was the first time a Secret Service agent had come to their town. > Varney continued to describe the threatening items that had been found > in Cummings' residence: a
From: Risto Lankinen on 18 Apr 2008 21:36 - ments brought about by new technologies. This report examines the fundamental properties of these requirements and attempts to outline the technical risks, costs, and implications of deploying systems that provide government access to encryption keys. The deployment of key-recovery-based encryption infrastructures to meet law enforcement's stated specifications will result in substantial sacrifices in security and greatly increased costs to the end-user. Building the secure computer-communication infrastructures necessary to provide adequate technological underpinnings demanded by these requirements would be enormously complex and is far beyond the experience and current competency of the field. Even if such infrastructures could be built, the risks and costs of such an operating environment may ultimately prove unacceptable. In addition, these infrastructures would generally require extraordinary levels of human trustworthiness. These difficulties are a function of the basic government access requirements proposed for key-recovery encryption systems. They exist regardless of the design of the recovery systems - whether the systems use private-key crypto- graphy or public-key cryptography; whether the databases are split with secret- sharing techniques or maintained in a single hardened secure facility; whether the recovery services provide private keys, session keys, or merely decrypt specific data as needed; a
From: JSH on 18 Apr 2008 20:39 -312-11057-X, 1994. Don't let the title throw you: the authors spoke with a great many intelligence people, and cleverly probed NSA/CIA/FBI by submitting items for publication approval, and when they censored something... Bingo. Because of the Catch-22 situation, the NSA gave up trying to censor many books, since it can be used to confirm questions they would otherwise have refused to answer. The other books referenced within are also suggested reading. I have sometimes edited for brevity the excerpts, especially my newspaper clippings of stories flying by. If I have any news story specifics wrong or if you have more details, please email me. Later versions of this document can be searched for at dejanews.com. Or, you can email me, Subject: Requesting Cryptography Manifesto. ---- ---- Here comes a large 'reasoned polemic': ---- This is a U.S.-centric message, but keep reading even if you are not in the U.S.; British, Canadian, Australian and New Zealand citizens are also directly affected. This message is about ECHELON, which is an unbelievably huge world-wide spying apparatus, including the domestic phone calls of many countries. United States citizens' phone calls are being monitored in a dragnet fashion not even George Orwell could have imagined. This was all paid for by U.S.
From: Dik T. Winter on 18 Apr 2008 17:59
budget would cause GRAVE DAMAGE to the NATIONAL SECURITY of * the United States. * * $3.1 billion for the CIA * $10.4 billion for the Army, Navy, Air Force * and Marines special-operations units * $13.2 billion for the NSA/NRO/DIA * * The only damage done so far is to the * credibility of those who opposed the measure. There is no constitutional basis for this massive loss of Fourth Amendment rights. It sounds like some wild conspiracy theory, doesn't it? Yet it exists. ****************************************************************************** Secret Court ------ ----- : The Washington Post Magazine, June 23 1996 : Government surveillance, terrorism and the U.S. Constitution: : The story of a Washington courtroom no tourist can visit. : By Jim McGee and Brian Duffy [snipped article excerpts shown here] : Adapted from the book "Main Justice", 1996, ISBN 0-684-81135-9. : * Last year, a secret court in the Justice Department authorized a record * 697 'national security' wiretaps on American soil, outside normal * constitutional procedures. * * The Foreign Intelligence Surveillance Act, is a 1978 law that permits * secret buggings and wiretaps of individuals suspected of being agents * of a hostile foreign government or international terrorist organization * EVEN WHEN THE TARGET IS NOT SUSPECTED OF COMMITTING ANY CRIME. * * The FISA court operates outside the normal constitutional standards for * searches and seizures. Non-government personnel are not allowed. * The courts files cannot be publicly reviewed. * * The average U.S. citizen might reasonably assume use of this court * is at the least: unusual. * * It is not. In f |