From: Phil Carmody on
*
* The order came from the Ministry of Public Security.
*
* Network users have been warned not to harm national security, or to
* disseminate pornography.

Well, there's a new way to control Internet users: require them to identify
themselves, no doubt your U.S.-created National ID Card will be required for
access. That ought to stop pornography: identify each and every user.

# "The Great Firewall of China", by Geremie R. Barme & Sang Ye, Wired, 6/97
#
# Xia Hong, China InfoHighway's PR man: "The Internet has been an important
# technical innovator, but we need to add another element, and that is
# control. The new generation of information superhighway needs a traffic
# control center. It needs highway patrols; USERS WILL REQUIRE DRIVER'S
# LICENSES. THESE ARE THE BASIC REQUIREMENTS FOR ANY CONTROLLED ENVIRONMENT."

In dissenting on the unconstitutionality of the CDA, which attempted to censor
the Internet, Supreme Court Justice O'Connor, together with the Chief Justice,
said CDA will be legal as soon as:

"it becomes technologically feasible...to check a person's [Internet]
driver's license...the prospects for the eventual zoning of the Internet
appear promising..."

My WebTV has a slot for reading a smart card!

Well, noone would ever put up with a Universal Biometric Card in the U.S.!

Right?

* Recent agreements announced by Sandia include contracts for the
* issuance o


From: Chip Eastham on
case for many many years, I feel confident
* ...we have sufficient authority," Freeh told a Senate Committee.
*
* William Safire, the conservative New York Times columnist with libertarian
* leanings, was appalled, asking if there wasn't anyone in the government
* who remembered how the FBI played the game in the bad old days?
*
* "To the applause of voters fearful of terrorism," Safire wrote, "the pro-
* activists declare their intention to prevent crime. This would be followed
* by surveillance of suspect groups by using new technology, the infiltra-
* tion of political movements deemed radical or violence prone; and the
* stretching of guidelines put in place 20 years ago to restrain yesterday's
* zealots."

Fear, loathing, hysteria, and a massive misdirection of resources:

* At about the same time that the FBI agent was knocking on Mrs. Bernard's
* door, the bureau had 21,000 allegations of savings and loan fraud it was
* unable to investigate, and at least 2,400 inactive financial crime inves-
* tigations awaiting consideration. In the San Diego area, for example,
* lack of available agents meant the FBI would not even consider investi-
* gating bank fraud cases unless they involved losses of at least one
* million dollars.


******************************************************************************

War #5 - Hackers



From: Christian Siebert on
than that, and since she inspected it and it smelled like oregano she
was sure they were kidding her. Students and their parents protest, the school
board asks her back, but she says no, she is too disgusted at her treatment.

Zero Tolerance victims, falling into the abyss.


State troopers really know their "business":

: Robert Fitches, a 22 year-old said in his Federal lawsuit that he was
: humiliated when state troopers ordered him to drop his pants during a
: drug search along Interstate 15 in Davis County.
: Source: Salt Lake City Tribune 7/8/95

Maybe this is an accurate analogy of why dragnet-monitoring is wrong:

: The Sheraton Boston Hotel was discovered videotaping employees changing
: clothes in locker rooms. The 1991 surveillance caught employees using
: drugs, Sheraton said. Source: Senate Labor Committee on Employment, 6/93

If you strip us naked you will detect more crime, but also, you strip
individuals naked without specific individuals being suspected of a crime.

Dragnet monitoring should not be the American way.

Unrestricted cryptography must be made legal now,
so we are no longer naked to ECHELON monitoring.
It will be a beginning.


: Privacy Journal's War Stories (75 pages, $21.50) is available from
: PRIVACY JOURNAL, P.O. Box 28577, Providence RI 02908, 401/274-7861,
: electronic mail: 5101719(a)mcimail.com.
:
: Beverly Folmsbee of Pittsfield Massachusetts, who was not suspected
: of any drug use, left her job after declining to take a "degrading"
: urinalysis test at her company, then known as Tech Tool Grinding &
: Supply Inc.
:
: It required disrobing, donning a hospital gown, and submitting to
: bodily inspection by a medical s


From: fortune.bruce on
been the result of the NSA's unquenchable thirst for ever bigger, ever
* faster machines on which to collect, collate, and cross-reference data
* on hundreds of millions of honest, law-abiding, and totally unsuspecting
* individuals. And not only in America, but in many other countries as
* well. Including, as we shall see, Australia.

[
"The Rise of the Computer State", David Burnham, 1984

p134: ...the technical advances that were occurring did so not entirely
by chance. The computers' ability to acquire, organize, store and
retrieve huge amounts of data was an essential factor leading to the
broad definition of intelligence that was fostered by the National
Security Agency and its godfather, the National Security Council.

Computer research was supported by NSA in a major way by secret research
dollars. Thomas C. Reed, Director of the Pentagon's Telecommunications,
Command and Control System, referring to domestic intercity telephone
microwave radio trunks, said in 1975, "Modern computer techniques make
it possible to sort through that traffic and find target conversations
easily."

p126-127: Since the wiretap law barred the Bureau of Narcotics and
Dangerous Drugs from installing a tap on New York City's Grand Central
Station pay phones, bureau head John Ingersoll asked the NSA for help.

Within a few months the spy agency was sorting through all the
conversations it was already acquiring for general intelligence
purposes.

Of course, the technicians were required to acquire, monitor, and
discard a large number of calls made by people with no connection
with the cocaine business in South American cities.

But so pleased was Mr. Ingersoll with the tips he was getting from the
dragnet monitoring that he u


From: Phil Carmody on
the NSA has stated it needs no warrants and doesn't even consider
the legality of purely domestic wiretaps.

* The Puzzle Palace, Author James Bamford, 1983 revision
*
* P229: "There's your smoking pistol right here." Watters says it is tied
* into the local telephone company circuits, which are interconnected with
* the national microwave telephone system owned by AT&T. Other specialists
* testified to the same thing: purely domestic intercepts.

I would say a MINIMUM of 100 million purely domestic U.S. conversations
are run through NSA keyword monitoring each year.


And who is listening to all our court authorized conversations?

* "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996
*
* Under a little-noticed section of a 1986 law, Congress dropped the
* requirement that only the FBI's high-priced Special Agents could
* listen to the tapes. The FBI now hires low-cost clerks for what must
* be extremely tedious work.

An army of low-cost clerks are listening to our private conversations?

I feel sick.

----

Conclusion: Louis Freeh is a manipulative liar.

Louis Freeh is a Scary Man with the morals of a styrofoam cup.


******************************************************************************

National ID Card
-------- -- ----

* C-SPAN Congressional Television: outside coming down the Senate building's
* steps, Senator Biden with Senator Simpson in tow proclaims: "What's wrong
* with a National ID Card? It's the same tired old arguments against it."

As if sane people shouldn't be paranoid about a National ID Card.

* "New Rules Mean Job-Hunters Need Proof of Identity", The New York Times
*
* Passports, driver's licenses, Social Security cards or birth certificates
* will be allowed to serve as identity papers.
*
* A 1982 proposal to catch illegal aliens by giving American workers
* "counterfeit-pro