circuits, which are interconnected with the national
microwave telephone system owned by AT&T. Other specialists testified to
the same thing: purely domestic intercepts.
P223: "Technical know-how" for microwave communications intercept was
aided by William Baker, head of AT&T's Bell Laboratories and at the
same time an important member of the very secret NSA Scientific Advisory
Board. After all, it was Bell Labs under Baker that, to a great extent,
developed and perfected the very system that the NSA hoped to penetrate.
[
"The Rise of the Computer State", David Burnham, 1984, ISBN 0-394-72375-9
"A Chilling Account of the Computer's Threat to Society"
FYI note: this document's opening quote is from this book.
P122: For the last three decades the NSA has been a frequent and secret
participant in regulatory matters before the Federal Communications
Commission, where important decisions are made that directly affect
the structure of the telephone company, the use of radio airwaves and
the operation of communication satellites.
]
P317: 1962. Now, for the first time, NSA had begun turning its massive ear
inward toward its own citizens. With no laws or legislative charter to
block its path, the ear continued to turn.
P319: The Secret Service, the CIA, the FBI and the DIA submitted entries
for the NSA's watch list.
The names on the various watch lists ranged from members of radical political
groups to celebrities to ordinary citizens involved in protest against their
government.
Included were such well-known figures as Jane Fonda, Joan Baez, Dr. Benjamin
Spock, Dr. Martin Luther King Jr., the Reverand Ralph Abernathy, Black
Panther leader Eldridge Cleaver, and Chicago Seven defendants Abbie Hoffman
and David T. Dellinger.
A frightening side effect of the watch list program was the tendency of most
lists to grow,
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 0.4.8
qb8aPcoZkS/KKbhpl5pxCXsEMmc1vnu9iZslNI3ZtbGUZwhcZafMm0vA+ZOaI92s
1tyraKrrukwz0V3CyOJ6MdTjLnOIYN+moX8HzGToBB53FsrihXCQOlC6km2Uw4ZZ
9m81++MDswMJHEli8BZ9+dLR+WBtRqOhmZLcxRxN1WNMGtivc9J9sujrstVlqZBI
GJ10qTgmmjdQMHbKfRynJST5f7JboifnVpnk3v==
=G2QO
-----END PGP SIGNATURE-----
* cemeteries to fight the spread of AIDS. It's a bad quick fix. Police
* chiefs across the country support [me] this 4 to 1. Unfortunately, Congress
* can't act "soft" on crime, and is about to pass a very bad bill on
* juvenile crime."
More bizarre distortions in our social fabric due to Zero Tolerance:
6/10/97 MSNBC: California: a ten-year-old girl who reported a classmate
for having a joint was also suspended by the principal, under the school's
Zero Tolerance for drugs policy. Her offense: handling the joint to see if
the other student was kidding her before reporting the other student. The
principal said "too bad, that's what 'Zero Tolerance' means". The little
girl and her mother are shocked. [I am not making these up!!!!!]
6/18/97 NBC News Channel 4 NYC: A career teacher is forced to resign because
she thought her student was kidding about having a baggie of pot. Students
and parents are stunned. The teacher said she believed her students had better
sense than that, and since she inspected it and it smelled like oregano she
was sure they were kidding her. Students and their parents protest, the school
board asks her back, but she says no, she is too disgusted at her treatment.
Zero Tolerance victims, falling into the abyss.
State troopers really know their "business":
: Robert Fitches, a 22 year-old said in his Federal lawsuit that he was
: humiliated when state troopers ordered him to drop his pants during a
: drug search along Interstate 15 in Davis County.
: Source: Salt Lake City Tribune 7/8/95
Maybe this is an accurate analogy of why dragnet-monitoring is wrong:
: The Sheraton Boston Hotel was discovered videotaping employees changing
: clothes in locker rooms. The 1991 surveillance caught employees using
: drugs, Sheraton said. Source: Senate Labor Committee on Employment, 6/93
If you s
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 7.6.2
cBs3g4XxCse6Cbc5VOuB74mc3O6dA/9Gl/TjIoWmqwsEVBpptogG2liCU8poshZ0
LIIZHx3HJGcz0AmB/6Acr0VWgsxH2kHshqhUehMdB9K8n2hpwXf/KZcBzppgkQPT
kEdg3eLUWQlzUEzP4GF2PhKOijDzt6ydyzfpoI9Sqo86DxX+Z9JQDGPPy7rWXKtX
oNQUXwYayxwyBGXgugismlGZeHNqG5KrJn==
=XRjm
-----END PGP SIGNATURE-----
case, the vendor Informix requested (and received) another copy
of the code "because I lost the previous copy".
Two emails between the pair are enclosed.
[snip]
*********************************
:Size: 846077, Dated: Jul 3 17:52
:Sender: sara@sbixxx [sara xxxxxxxxxx XXX-NJ]
:Recipient: xxx...@roguewave.com [Dennis xxxxxxx]
:Subject: Re: (Fwd) Re: (Fwd) rw...
**** UUencoding, Filename='rw4.tar.Z'
Hi Dennis,
The last patch didn't help, here's some other code that will also
trigger the bug.
This code doesn't compile for other reasons but we need to get the
Rougeview issue resolved.
Could you ask xxxx to look this over?
Thanks,
sara
:begin 600 rw4.tar.Z
*********************************
# of
lines filename
----- --------
54 4x.env
139 LocalRules
344 LoginDlg.cc
65 LoginDlg.h
221 MacroRules
87 Makefile
619 OASYSMain.cc
175 OASYSMain.h
79 SubApp.cc
51 SubApp.h
54 gui_main.cc
33 gui_main.h
42 lib_inc
647 sbOfLogin.cc
113 sbOfLogin.h
0 sun4_4
22 version.txt
0 lib_inc/*.h
128 lib_inc/AccountBalance.h
22 lib_inc/AccountBalanceTest.h
59 lib_inc/AccrlInptTb.h
86 lib_inc/ArrClasT.h
[snip of 247 lines]
38696 total
********** end excerpt from 'Corruption at Salomon Brothers' **********
Another major category of security incidents are what I've named:
o Dumb-and-Dumber
********** begin excerpt from 'Corruption at Salomon Brothers' **********
> Date: Thu, 23 May 96 11:52:04 EDT
> From: guy
> To: vivian [Salomon lawyer to whom I reported]
> Subject: Snarf: Two Redhots May 21/22 1996
> Cc: mon_c
>
> Vivian,
>
> Redhot #1)
>
> :
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 2.3.7
4jhQASY274821j4Epe0Bc8026KmdVy1TZRn4bGcVjK4zZk2Wm0XZPLEAZbptcbvE
UsUCXR18trpjKlPKEBUjc9ORPPsebWTzXFC8m6ZIYhw2t8OQNXb0mvRbsEccIuie
g0C6vlTnP4hvUYuI9sFBrPUqK8rE5/lQnguvsalyH9asYZoWDpQ93TvEs6PJJrO/
Zt9Ao2q+Sq8nRQCO9QQKRgZrtK9bCHkqmjJEZF+1zJ==
=JNCA
-----END PGP SIGNATURE-----
enemy of the moment always represented absolute evil.
* "Taking Control - Politics in the Information Age"
* Authors Morely Winograd & Dudley Buffa, 1996, ISBN 0-8050-4489-2
*
* From Richard Nixon's law and order campaign in 1968 to George Bush's
* infamous Willie Horton ad in 1988, Republicans have attempted to define
* their differences with Democrats by a no-nonsense position on crime and
* criminals.
*
* It helped Republicans win the presidency, and it also gave them the
* tool by which to control the Democratic majorities in Congress that
* might allow their opponents to label them as soft on crime.
*
* No Democrat, except those in overwhelmingly Democratic districts, could
* afford to cast any votes in Congress that might allow their opponents
* to label them soft on crime.
A constant state of law enforcement hysteria.
The absolute pinnacle of War terminology was the phrase "Zero Tolerance".
We will monitor and prosecute mercilessly with mandatory minimums because
letting even one criminal not be caught means you are soft on crime.
Everyone is potentially guilty. We need a Police State to combat crime.
* USA Today, undated: HOME GARDEN RAIDS: Federal drug agents want to
* raid indoor home gardens in search of marijuana plants. The DEA has
* subpoenaed Florida garden centers to turn over records showing who
* has bought items like fluorescent lamps and plant food. [What???]
* CBS News, Dan Rather reporting. See this camera on a building at the
* mall? It's aimed at this lighting store's customers, recording them
* and the licenses on their cars. Little old lady:
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 8.4.2
qMZPmPFXTCos5EivDReRKj7j8ZIQ6rX6yyGrLjdhcawtTaMy2PVSBKyPYqwFgA1C
O9FcJNwmsWEEvBb/MxmowtMEoRhEGkY9L62RniTQ4CxbXonnerQud5klgg5n5g1r
swJgpfnVgnFpzFkOF2Eufg+rrjBn2PS6bRSGxMlVWMTgLHhQWnMK1Gb/L5n5fUJo
xONDNfAL4wKWIM==
=Ndi/
-----END PGP SIGNATURE-----
is the most important tool to come along for privacy in
communications ever; it uses the power of computer software to shield
us from endlessly intrusive government computer monitoring.
These categories of War are the big lie (propaganda technique) used by law
enforcement to discredit any and all privacy concerns. These are the reasons
why we can't use cryptography to give us the beginnings of privacy from the
Government.
That the dangers of it protecting someone involved in these activities
outweighs right to privacy of everyone else in the United States.
That our communications must be compromised by Government "Key Recovery".
What a bunch of hooey.
******************************************************************************
War #1 - Drugs
--- -- -----
* The New York Times
*
* December 7 1995. A&E Investigative Reports "Seized by the Law" draws
* attention to a recent embellishment of the criminal law that permits
* Federal agents and the state and local police to confiscate cash and
* property on the suspicion that their owners are involved in drug
* trafficking.
*
* Just suspicion.
*
* No arrest or indictment, much less conviction, is required.
The Dark Ages in America.
* And the fact that most of the proceeds stay with
* the police may be a temptation to confiscation.
Naw, that would never happen.
----
-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.9.8
wb4AJV9nnfutjKLth9E64ouAvG26jLC8Zb7vHBWPRgwgCvae01sZZUA7zyXulIq7
56KIaSQjDJa+MH1p3RdKjytevocK0PW93ETd8dLRwzmqB/s5TDm3L42UbaQ85fcn
J4PHQJIybMwNFZ1PC26KLFQ8n377PBqLQCM683j+4Xe4RCJVYerw6REKPwL4cRmd
cTfu5smt0Sk5xu+MOyWkvwLxRZKMADfdwUQH+w==
=q+Ss
-----END PGP SIGNATURE-----