From: Pubkeybreaker on 18 Apr 2008 20:41 of all newborns too. This is an interesting manifesto, please take the time to read it. Cryptography can be used to keep private: Internet traffic, such as email, and telephone conversations (PGP phone). A version of PGP phone that looks and works like a normal telephone --- but can't be spied upon --- would eventually become wide-spread. It begins to change the mind-set that the Police State is inevitable. ---- Major references... In the last several years intelligence operatives, specifically including SIGINT (signal intelligence) people, have started telling the story about the massive domestic use of computer monitoring software in the U.S. Including our domestic phone calls, Internet, fax, everything. I'm going to quote a number of articles and books; they involved talking to over 100 of these intelligence operatives. Buy this book: "Secret Power" by Nicky Hager, ISBN 0-908802-35-8. It describes in detail the ECHELON platform. It's one of the most important. New Zealand people are quite unhappy at their place within ECHELON. Buy this book: "Spyworld: Inside the Canadian and American Intelligence Establishments" By Mike Frost [NSA trained sigint person] and Michel Gratton, Toronto Doubleday 1994. Mr. Frost describes missions in the U.S. where he was trained by the NSA to handle domestic jobs that would be illegal for the NSA. These books are quite damning, in a heavily documented way. This is an AMAZINGLY COMPREHENSIVE BOOK: buy it! "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996 Buy this book: "The Secret War Against the Jews", Authors: John Loftus and Mark Aarons, ISBN 0-312-11057-X, 1994. Don't let the title throw you: the authors spoke with a great many intelligence people, and cleverly probed NSA/CIA/FBI by submitting items for publication approval, and when they censored something... Bingo. Because of the Catch-22 situation, the NSA gave up
From: Nick Wedd on 18 Apr 2008 20:04 that would bounce * off a satellite and be picked up by police on a computer-screen map." * * The syringe implantable biochip * * Which brings us to what is undoubtedly the most fearsome potential threat * in the surveillance arsenal -- one that should raise the hairs on the neck * of even the most trusting techno-child of the nineties. It is the * implantable biochip transponder. * * When implanted under the skin of the subject, the biochip will emit low * frequency FM radio waves that can travel great distances e.g., some miles * up into space to an orbiting satellite. The transmission would provide * information on the exact location of the "chipee": his latitude, longitude * and elevation to within a few feet anywhere on the planet. * * The April 2nd, 1989 Marin Independent Journal discussed the theory of * biochip implants in humans. Tim Willard, the then- executive officer of * the World Future Society and managing editor of its monthly magazine. * * The Futurist, noted that with a little refinement, the microchip could be * used in a number of human applications. He stated: "Conceivably, a number * could be assigned at birth and go with a person throughout life." * * The article continued: "Most likely, he added, it woud be implanted on * the back of the right or left hand for convenience, `so that it would * be easy to scan....It could be used as a universal identification card * that would replace credit cards, passports, that sort of thing. At the * checkout stand at a supermarket, you would simply pass your hand over * a scanner and your bank account would automatically be debited." There it is again: people talking about assigning everyone a biometric identifying number at birth. ---- # Privacy Journal, By Robert Ellis Smith, June 1994 issue # # The Hughes Aircraft Company is selling a tiny transpond
From: Dik T. Winter on 18 Apr 2008 19:10 a dozen rebels that he had planned a # 1985 attack in El Salvador in which SIX AMERICANS and seven others were # killed, newly released Government reports show. It doesn't matter to our government if Americans get killed. Whatever the president wants, he gets. FISA is yet another dagger shredding the U.S. Constitution. : The Washington Post Magazine, June 23 1996 : "Government surveillance, terrorism and the U.S. Constitution" : from Main Justice, by Jim McGee and Brian Duffy, 1996, ISBN 0-684-81135-9 : : The internal Justice Department FISA watchdog was Mary Lawton: it took : her two years before saying the investigations into CISPES & Co should : be shut down. : : On the day after Thanksgiving in 1993, not quite a month after Mary Lawton : died, Richard Scruggs decided it was time to go through her office on the : sixth floor of Main Justice. : : The deeper Scruggs got into the FISA files, the more uneasy he grew. : : Reading the FISA applications in Lawton's files, Scruggs began finding : errors. The volume of FISA cases was so heavy that the lawyers could spend : only so much time on each one. : : "The review process to prevent factual and legal errors was virtually : nonexistent," Scruggs recalled. : : In high school, Mary Lawton had won a debate about
From: Risto Lankinen on 18 Apr 2008 18:48 the long list of abuses of the 1960s and 1970s. But four years later President Ronald Reagan scrapped the Carter order and broadened considerably the power of the spy agencies to operate domestically. P473: Under the Reagan executive order, the NSA can now, apparently, be authorized to lend its full support - analysts as well as computers - to "any department or agency" in the federal government and, "when lives are endangered," even to local police departments. [ Yea billions of dollars a year military SIGINT support technology... oh so invisible in its great mass. A total blurring of the lines between Military and civilian control of the domestic population. ] P475-477: Like an ever-widening sinkhole, the NSA's surveillance technology will continue to expand, quietly pulling in more and more communications and gradually eliminating more and more privacy. If there are defenses to such technotyranny, it would appear, at least from past experience, that they will not come from Congress. Rather, they will most likely come from academe and industry in the form of secure cryptographic applications to private and commercial telecommunications equipment. The same technology that is used against free speech can be used to protect it, for without protection the future may
From: Pubkeybreaker on 18 Apr 2008 21:27
is measured by video license plate recognition or * radio transponders. Video recognition of the license plate if no transponder!!! DAMN. I hope the government doesn't have any massive deployment of this technology in mind. * SECRETARY OF TRANSPORTATION FEDERICO PENA * TRANSPORTATION RESEARCH BOARD * WASHINGTON, D.C. * January 10, 1996 * * * So, today I'm setting a national goal: To build an Intelligent * Transportation Infrastructure across the United States... * * I want 75 of our largest metropolitan areas outfitted with a complete * Intelligent Transportation Infrastructure in 10 years. And let us make a * similar commitment to upgrading technology in 450 other communities, our * rural roads, and interstates, as the need warrants... * * The vehicles of the future, whether cars, planes, or trains, will have * state-of-the-art communications systems. We must ensure that our roads * and highways and transit systems are able to keep pace with them. * * Today, I'm announcing the award of five contracts to standards development * organizations to begin fast tracking the development of those standards. * They are: AASHTO, IEEE, ITE, ASTM, and SAE. [So the standards of hardware * and information are interchangeable and global.] Yep. # Subject: ---> Big Bro and the Intelligent Transportation System <--- # From: 99(a)spies.com (Extremely Ri |