From: Risto Lankinen on 18 Apr 2008 21:56 saved; where the President names the latest thing in nuclear missiles "Peacekeeper"---in such a world, can the Orwellian vision be very far away? Big Brother's ears have plugs in them right now (or they are, by law, supposed to), at least on the domestic telephone and cable traffic. But the National Security Agency's ability to monitor microwave transmissions, to scoop out of the air VAST numbers of communications, including telephone conversations, store them in computers, play them back later, has a truly frightening potential for abuse. George Orwell issued a warning. He told us that freedom is too much taken for granted, that it needs to be carefully watched and protected. His last word on the subject was a plea to his readers: "Don't let it happen. It depends on you." ] * * The National Security Agency's Project L.U.C.I.D., with all its * technological wizardry, is a future, planetary dictator's dream---and a * Christian and national patriot's nightmare. Someday, the Holy Bible * prophesies, that planetary dictator will emerge on the scene, lusting * for bloo
From: Risto Lankinen on 18 Apr 2008 21:20 company's and are to be used only for work > purposes. And that they are subject to inspection. You signed it. > > Salomon's goes further by stating the firm's computer systems may be > audited and that they have the right to do so even if you have put > personal information on the system. > > After the first couple of months of security incidents at Salomon, > they began issuing global email broadcasts saying that a new security > package "Internet Risk Management: email facility" had been installed, > and that Internet email traffic was actively being monitored. > > They did so again and again. > > I think they sent out a memo to everyone too. > > Security incidents NEVER stopped. > > Major violations occurred again and again and again and again... > > I have come to realize that the number of security incidents a firm > has is not related to how often they warn their employees not to send > proprietary/confidential information out via email. > > The number of security incidents is a function of the number of employees. > > If you are a big computer-based firm (banks, brokerage, insurance etc), > then you are guaranteed to have a huge amount of proprietary/confidential > files flowing out of your Internet connection via email. > > Even if you tell them again and again that it is monitored and they will > be fired for misuse. > > Even if you fire people. > > Even if you prosecute them. > > It appears to be just like the general population and regular crime. > > All sites' management expressed confidence that repeated warnings and > firings would soon stop the proprietary/confidential transfers. > > It turned out to be li
From: Risto Lankinen on 18 Apr 2008 19:41 him." * * Mr. Ruhnke further complained that the judge revealed Mr. Feuer's name * in court papers while he was still making motions to dismiss the case, * to protect the girl. Parents charged with child pornography for taking photos of their children. Thought Police. ---- We netizens are rightfully paranoid of the American government, because it has no scruples. What the FBI did to photographer Jock Sturges was criminal. Excerpt from 'TO: A Journal of Poetry, Prose + the Visual Arts', Summer 1992: * Hounded by the Federal Bureau of Investigation in a bizarre witch-hunt * at an expense to the taxpayers of over a million dollars, Sturges had * survived an attempt to destroy his life and his work and was now * countersuing the agency. * * Recapitulated briefly, Sturges, who's based in San Francisco, has for * years been photographing young people whose families practice nudity. * * He's done so with his subjects' permission, as well as that of their * parents, who often appear in the photographs along with their offspring. * Rejecting the use of standard model releases, with their blanket * permissions, the photographer chooses instead to request approval * from his subjects for each and every exhibition and publication * of each and every image --- an exemplary scrupulousness. * * Then, in 1990, alerted to the "questionable" content of some of his * images by a local processing lab, the FBI arrested Joe Semien, Sturge's * assistant, invaded the photographer's San Francisco studio without a * warrant, and seized all his prints, negatives, records,
From: quasi on 18 Apr 2008 20:48 powers over all of us. Internet signature in alt.activism.militia... In 1794, James Madison pointed out "the old trick of turning every contingency into a resource for accumulating force in the government." ---- I don't know any terrorists or foreign agents. But the government seems to know plenty of people who are terrorists. : The New York Times, 2/10/87 : "Is This America?", by Anthony Lewis : : She is 22 years old, a student in San Diego, California. She was born : in Ramallah, in the West Bank, came to this country at the age of 3. : : She is an American citizen, of Palestinian origins. : : In her own words: : * I was studying, alone at the school library, on the night of Jan 28. * At about 8:30 a large man, 6 feet tall, came up and shoved a paper in * front of me. It said 'subpoena' and had my name on it. He flashed what * looked like a badge and said 'We want you to come with us.' * * He had a gun in a holster at his waist. * * He took my left arm and handcuffed me to his right arm. * * Another man --- he also showed a gun --- came over and grabbed me * roughly by the right arm. They took me out to a dark burgundy car, * cuffed my hands in front of me and shoved me into the back seat. * * We drove for some time wh
From: Dik T. Winter on 18 Apr 2008 20:07
that which we regard to be gross malpractice and negligence within the establishment in which we operate.' They gave as examples GCHQ interception of three charitable organizations, including Amnesty International and Christian Aid. As the Observer reported: "At any time GCHQ is able to home in on their communications for a routine target request," the GCHQ source said. In this case of phone taps the procedure is known as Mantis. With the telexes this is called Mayfly. By keying in a code relating to Third World aid, the source was able to demonstrate telex 'fixes' on the three organizations. We can then sift through those communications further by selecting keywords to search for. Without actually naming it, this was a fairly precise description of how the ECHELON Dictionary system works. Note that it was being used for telephone calls. Again, what was not revealed in the publicity was that this is a UKUSA-wide system. The design of the ECHELON system means that the interception of these organizations could have occurred anywhere in the network, at any station where the GCHQ had requested that the four digit code covering the necessary keywords and exclusion logic for Third World aid be placed. P54 In a further misuse of ECHELON, a former intelligence employee revealed that Prime Minister Margaret Thatcher had personally ordered interception of the Lonrho company, owners of the Observer newspaper, after that newspaper published a series of articles in 1989 exposing events surrounding a multi- billion dollar British arms deal with Saudi Arabia. The newspaper said the deal had been pushed strongly by Mrs. Thatcher, and it was alleged that massive bribes were made to middlemen, including her son, Mark, who was said to have received a 10 million Pound commission. The former employee of the British Joint Intelligence Committee, Robin Robison, broke his indoctrination |