From: Pubkeybreaker on 18 Apr 2008 21:39 The politics of war, and the Orwellian tactics employed by by the U.S. Government to control its citizens. o Part 4: Why unlimited cryptography must be legislated NOW In additional to the reasons given in the previous sections, the 'debate' reasons constantly given by the government are reviewed and debunked. And our nation's experts say it will hurt security. The GAO says the same thing. o Part 5: There is no part five. o Part 6: Louis Freeh & The Creeping Police State Basically, Louis Freeh is the anti-Christ leading us to Hell. National ID cards are effectively being implemented without needing to issue cards. The U.S. Government is trying to monitor all phone calls and banking transactions, and have all equipment worldwide designed for their monitoring. They are bent on controlling the world to the point of there being no crime left on the planet. Of course, democracy destroyed is the direct result. ---- This publication advocates five major items: o Passage of ProCode/SAFE legislation, allowing U.S. companies to export unlimited stre
From: Chip Eastham on 18 Apr 2008 19:37 if the FBI one day is no longer able to conduct * court-approved electronic surveillance." Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum War War War War War War War War War War War War War War War WE ARE NOW AT AN HISTORICAL CROSSROAD ON THE ENCRYPTION ISSUE. THE SAFETY OF ALL AMERICANS [is at stake]. ANY SOLUTION THAT IGNORES THE PUBLIC SAFETY AND NATIONAL SECURITY CONCERNS RISK GRAVE HARM TO BOTH. Louis Freeh is lying. * "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996 * * The FBI attributes to wiretaps less than three percent of all judgements. * Thus the FBI assertion that electronic surveillance is essential to * investigating crime and nabbing spies and terrorists cannot be taken * at face value. Monitoree John DeLorean sends his regards. Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum War War War War War War War War War War War War War War War It is ECHELON that they are trying to protect. If the FBI targets you, they can get all your phone conversations BEFORE they are encrypted, and can get your password to access your private cryptography key. * "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996 * "Keeping Track of the American People: The Unblinking Eye and Giant Ear" * * About six times a week, fifty-two weeks a year, a team of highly trained * FBI agents secretly breaks into a house, office, or warehouse somewhere in * the United States. * * The agents are members of the bureau's Surreptitious Entry Program, and * their usual mission is to plant a hidden microphone or camera without * tipping off the people who occupy the
From: Tim Smith on 18 Apr 2008 18:57 will result in substantial sacrifices in security and greatly increased costs to the end-user." http://www.crypto.com/key_study/report.shtml The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption Hal Abelson[1] Ross Anderson[2] Steven M. Bellovin[3] Josh Benaloh[4] Matt Blaze[5] Whitfield Diffie[6] John Gilmore[7] Peter G. Neumann[8] Ronald L. Rivest[9] Jeffrey I. Schiller[10] Bruce Schneier[11] Final Report -- 27 May 1997[12] Executive Summary A variety of ``key recovery,'' ``key escrow,'' and ``trusted third-party'' encryption requirements have been suggested in recent years by government agencies seeking to conduct covert surveillance within the changing environ- ments brought about by new technologies. This report examines the fundamental properties of these requirements and attempts to outline the technical risks, costs, and implications
From: S.C.Sprong on 18 Apr 2008 20:04 IBM [IBM's Lotus division takes hand biometrics * of employees who use their childcare facilities] in Palm Springs, * California, in 1994, England not only endorsed the proposed mandatory * national I.D. smart card, but went one scary step further: * * The smart card is a wonderful idea, but even better would be the * capacity to not have a card, and I call it "a chip in your ear," * that would actually access your medical records, so that no matter * where you were, even if you came into an emergency room unconscious, * we would have some capacity to access that medical record. * * We need to go beyond the narrow conceptualization of the smart card * and really use some of the technology that's out there. * * California Governor Pete Wilson has actively stumped for a National I.D. * Card system, using the straw man of California's pervasive immigration * problem. California Senators Diane Feinstein and Barbara Boxer support * it too. The latest proposal is to mandate I.D. cards for all school * children under the Goals 2000 national education program. Another plan * by the U.S. Labor Department would have required it for all users of a * National Job Training and
From: David Bernier on 18 Apr 2008 20:38
quote is from this book. P122: For the last three decades the NSA has been a frequent and secret participant in regulatory matters before the Federal Communications Commission, where important decisions are made that directly affect the structure of the telephone company, the use of radio airwaves and the operation of communication satellites. ] P317: 1962. Now, for the first time, NSA had begun turning its massive ear inward toward its own citizens. With no laws or legislative charter to block its path, the ear continued to turn. P319: The Secret Service, the CIA, the FBI and the DIA submitted entries for the NSA's watch list. The names on the various watch lists ranged from members of radical political groups to celebrities to ordinary citizens involved in protest against their government. Included were such well-known figures as Jane Fonda, Joan Baez, Dr. Benjamin Spock, Dr. Martin Luther King Jr., the Reverand Ralph Abernathy, Black Panther leader Eldridge Cleaver, and Chicago Seven defendants Abbie Hoffman and David T. Dellinger. A frightening side effect of the watch list program was the tendency of most lists to grow, expanding far beyond their original intent. This multiplier effect was caused by the inclusion of names of people who came in contact |