From: Pubkeybreaker on
The politics of war, and the Orwellian tactics employed by
by the U.S. Government to control its citizens.

o Part 4: Why unlimited cryptography must be legislated NOW

In additional to the reasons given in the previous sections,
the 'debate' reasons constantly given by the government
are reviewed and debunked. And our nation's experts say it
will hurt security. The GAO says the same thing.

o Part 5: There is no part five.

o Part 6: Louis Freeh & The Creeping Police State

Basically, Louis Freeh is the anti-Christ leading us to Hell.
National ID cards are effectively being implemented without
needing to issue cards. The U.S. Government is trying to
monitor all phone calls and banking transactions, and have
all equipment worldwide designed for their monitoring. They
are bent on controlling the world to the point of there being
no crime left on the planet. Of course, democracy destroyed
is the direct result.


----


This publication advocates five major items:

o Passage of ProCode/SAFE legislation, allowing U.S. companies to
export unlimited stre


From: Chip Eastham on
if the FBI one day is no longer able to conduct
* court-approved electronic surveillance."

Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang
Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum
War War War War War War War War War War War War War War War


WE ARE NOW AT AN HISTORICAL CROSSROAD ON THE ENCRYPTION ISSUE.

THE SAFETY OF ALL AMERICANS [is at stake].

ANY SOLUTION THAT IGNORES THE PUBLIC SAFETY AND
NATIONAL SECURITY CONCERNS RISK GRAVE HARM TO BOTH.

Louis Freeh is lying.

* "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996
*
* The FBI attributes to wiretaps less than three percent of all judgements.
* Thus the FBI assertion that electronic surveillance is essential to
* investigating crime and nabbing spies and terrorists cannot be taken
* at face value.

Monitoree John DeLorean sends his regards.

Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang
Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum
War War War War War War War War War War War War War War War


It is ECHELON that they are trying to protect.

If the FBI targets you, they can get all your phone conversations BEFORE
they are encrypted, and can get your password to access your private
cryptography key.

* "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996
* "Keeping Track of the American People: The Unblinking Eye and Giant Ear"
*
* About six times a week, fifty-two weeks a year, a team of highly trained
* FBI agents secretly breaks into a house, office, or warehouse somewhere in
* the United States.
*
* The agents are members of the bureau's Surreptitious Entry Program, and
* their usual mission is to plant a hidden microphone or camera without
* tipping off the people who occupy the


From: Tim Smith on
will result in substantial sacrifices in security and greatly increased costs
to the end-user."


http://www.crypto.com/key_study/report.shtml

The Risks of Key Recovery, Key Escrow,
and Trusted Third-Party Encryption

Hal Abelson[1]
Ross Anderson[2]
Steven M. Bellovin[3]
Josh Benaloh[4]
Matt Blaze[5]
Whitfield Diffie[6]
John Gilmore[7]
Peter G. Neumann[8]
Ronald L. Rivest[9]
Jeffrey I. Schiller[10]
Bruce Schneier[11]

Final Report -- 27 May 1997[12]

Executive Summary

A variety of ``key recovery,'' ``key escrow,'' and ``trusted third-party''
encryption requirements have been suggested in recent years by government
agencies seeking to conduct covert surveillance within the changing environ-
ments brought about by new technologies. This report examines the fundamental
properties of these requirements and attempts to outline the technical risks,
costs, and implications


From: S.C.Sprong on
IBM [IBM's Lotus division takes hand biometrics
* of employees who use their childcare facilities] in Palm Springs,
* California, in 1994, England not only endorsed the proposed mandatory
* national I.D. smart card, but went one scary step further:
*
* The smart card is a wonderful idea, but even better would be the
* capacity to not have a card, and I call it "a chip in your ear,"
* that would actually access your medical records, so that no matter
* where you were, even if you came into an emergency room unconscious,
* we would have some capacity to access that medical record.
*
* We need to go beyond the narrow conceptualization of the smart card
* and really use some of the technology that's out there.
*
* California Governor Pete Wilson has actively stumped for a National I.D.
* Card system, using the straw man of California's pervasive immigration
* problem. California Senators Diane Feinstein and Barbara Boxer support
* it too. The latest proposal is to mandate I.D. cards for all school
* children under the Goals 2000 national education program. Another plan
* by the U.S. Labor Department would have required it for all users of a
* National Job Training and


From: David Bernier on
quote is from this book.

P122: For the last three decades the NSA has been a frequent and secret
participant in regulatory matters before the Federal Communications
Commission, where important decisions are made that directly affect
the structure of the telephone company, the use of radio airwaves and
the operation of communication satellites.
]

P317: 1962. Now, for the first time, NSA had begun turning its massive ear
inward toward its own citizens. With no laws or legislative charter to
block its path, the ear continued to turn.


P319: The Secret Service, the CIA, the FBI and the DIA submitted entries
for the NSA's watch list.

The names on the various watch lists ranged from members of radical political
groups to celebrities to ordinary citizens involved in protest against their
government.

Included were such well-known figures as Jane Fonda, Joan Baez, Dr. Benjamin
Spock, Dr. Martin Luther King Jr., the Reverand Ralph Abernathy, Black
Panther leader Eldridge Cleaver, and Chicago Seven defendants Abbie Hoffman
and David T. Dellinger.

A frightening side effect of the watch list program was the tendency of most
lists to grow, expanding far beyond their original intent. This multiplier
effect was caused by the inclusion of names of people who came in contact