Discussion:
stupid spammer screwups
(too old to reply)
JM
2004-11-17 06:16:28 UTC
Permalink
I got a spam with a .txt file attached, with the email address list inside.
Funny shit huh?



------
Listed in:
* blackholes.five-ten-sg.com
* dnsbl.njabl.org
213.154.89.247 is a known spam source

Searching for information on:
IP(213.154.89.247) [No rDns configured]


------ forwarded ------
Received: from [213.154.89.247]
[...]
Subject: Meeting you for everlasting Relationship
[...]

--===_SecAtt_000_1ftgofcegprejp
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable


Hi Sweet Heart=2C
Hai to you=2C I see to it is generally ok with you and This mail will find
you in the best condition of living=2C coming together fine that race=2C
nation[line length overflowed, truncated]


Thanks
Yours Ever
Kimberly Lujan=2E



--===_SecAtt_000_1ftgofcegprejp
Content-Type: application/octet-stream; name="cou.txt"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="cou.txt"

[base64 encoded, snipped]
Michael Moroney
2004-11-17 20:55:01 UTC
Permalink
Does anyone have some stories about the stupidest (and funniest) spammer
screwups in a spam they've received?
--
-Mike
JM
2004-11-18 10:36:23 UTC
Permalink
Post by Michael Moroney
Does anyone have some stories about the stupidest (and funniest) spammer
screwups in a spam they've received?
--
-Mike
I just got a couple with Bcc: in the headers with the list in it.

With addresses like this in it,:

***@victor.killfile.org,
***@victor.killfile.org,
***@victor.killfile.org,
***@victor.killfile.org,

can you guess what group spammy scraped :))
Eystein Roll Aarseth
2004-11-21 01:16:10 UTC
Permalink
Post by JM
Post by Michael Moroney
Does anyone have some stories about the stupidest (and funniest) spammer
screwups in a spam they've received?
I just got a couple with Bcc: in the headers with the list in it.
can you guess what group spammy scraped :))
Must be a friend of the spammer at infosat.net, then.
(Seems you need to change "gb" to "GB" to get Google to cough
up the usenet posting he tries to send spam to)

-----
Transcript of session follows.

Out: 220 all-evil.homeunix.org ESMTP Postfix
In: EHLO mail02.infosat.net
Out: 250-all-evil.homeunix.org
Out: 250-PIPELINING
Out: 250-SIZE 10240000
Out: 250-VRFY
Out: 250-ETRN
Out: 250 8BITMIME
In: MAIL FROM:<***@tsamail.co.za> SIZE=3551
Out: 250 Ok
In: RCPT TO:<***@all-evil.homeunix.org>
Out: 451 <***@all-evil.homeunix.org>:
Temporary lookup failure
In: QUIT
Out: 221 Bye
-----


EAa
--
That's just... *yech*. Yech yech yech yech. People are stupid. DO NOT
FORGET THIS FACT. PEOPLE ARE STUPID. A *huge* proportion of people
cannot make *correct and accurate* generalisations of principles. They
have to learn everything as if it's an unrelated piece of crap, BECAUSE
THEY ARE STUPID! PEOPLE ARE STUPID! YES, THAT'S RIGHT, I'M SHOUTING NOW!
AIEEEE!! PEOPLE ARE STUPID! -- Thorfinn
Eystein Roll Aarseth
2004-11-23 06:07:59 UTC
Permalink
* "You shouldn't overestimate the I.Q. of crooks."

..which is also apparently their view of the American public.


WE ARE NOW AT AN HISTORICAL CROSSROAD ON THE ENCRYPTION ISSUE.

IF PUBLIC POLICY MAKERS ACT WISELY, THE SAFETY OF ALL AMERICANS WILL
BE ENHANCED FOR DECADES TO COME.

[1984 Newspeak:] BUT IF NARROW INTERESTS PREVAIL, LAW ENFORCEMENT WILL
BE UNABLE TO PROVIDE THE LEVEL OF PROTECTION THAT PEOPLE IN A DEMOCRACY
PROPERLY EXPECT AND DESERVE. ANY SOLUTION THAT IGNORES THE PUBLIC SAFETY
AND NATIONAL SECURITY CONCERNS RISK GRAVE HARM TO BOTH.

And what was a critical public safety and national security
item the FBI insisted on in the first version of CALEA?

They wanted all cellular phones to continually monitor
the location of the owner, EVEN WHEN NOT IN USE.

Every cellular phone would become a location
tracking monitor for the government.

And why would this be a critical public safety and national security item?

Because:

The NSA/FBI are raving rabid frothing-at-the-mouth lying looneys.

I hope you understand that by now.



* "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996
*
* A few months after his appointment as the new director of the Federal
* Bureau of Investigation, Louis J. Freeh delivered a speech at the National
* Press Club in Washington.
*
* More than two hundred Washington-based reporters, congressional staffers
* and interested lobbyists had come, and because the speech was carried by
* C-Span, National Public Radio and the Global Internet Computer Network,
* and would be the basis for articles in newspapers all over the United
* States, Freeh was also delivering his message to a much larger na
Eystein Roll Aarseth
2004-11-23 06:56:36 UTC
Permalink
-winning economist Milton Friedman, "Every friend of freedom...
* must be as revolted as I am by the prospect of turning the U.S. into an
* armed camp, by the visions of jails filled with casual drug users and of
* an army of enforcers empowered to invade the liberty of citizens on slight
* evidence.
Drug offenders were 6.4 percent of state prison populations in 1980.
Drug offenders were 22.3 percent of state prison populations in 1994.
The growth from less than 20,000 to nearly a quarter of a million was
nearly tenfold.
Nonviolent drug offenders making up 58% of the federal prison population.
Name a single person ever who was robbed by
someone suffering from marijuana withdrawal.

Law Enforcement Hysteria, Propaganda and Lies:

And that Drug War hysteria commercial about the train wreck by the engineer
on pot? They can't quite bring themselves to tell you he had been drinking.
And they still show this ad...

* "The Emperor Wears No Clothes", by Jack Herer, 1992, ISBN 1-878125-00-1
*
* In one ad, the wreckage of a train is shown. Now, everyone will agree
* that no one should attempt to drive a train while high on marijuana.
* But a man's voice says that anyone who tells you 'marijuana is harmless'
* is lying, because his wife was killed in the train accident.
*
* This contradicts the direct sworn testimony of the engineer responsible
* for that disaster; that "the accident was not caused by marijuana." It
* deliberately ignores his admissions of drinking alcohol, snacking,
* watching TV, generally failing to pay adequate attention to his job,
* AND DELIBERATELY JAMMING THE TRAIN'S SAFETY EQUIPMENT prior to the
* accident.
[snip]
*
*
Eystein Roll Aarseth
2004-11-23 09:16:15 UTC
Permalink
NewsPro/3.5.1 user Eystein Roll Aarseth <***@online.no> cancels <***@all-evil.homeunix.org>

----- ----------

I created and did the traffic analysis for five months before handing it
off. The time includes a 2.5 month parallel run with the new person.

The new person found only half the security incidents I did, but we handed
off anyway.

Summarizing my five months:

o caught over 400,000 lines of Salomon proprietary source code outbound

////////////////////////////////////////////////////////////////////////
// //
// Copyright (C) 1994 Salomon Incorporated //
// All Rights Reserved. Unpublished. //
// //
// This software is proprietary and confidential to Salomon Inc. //
// and may not be duplicated, disclosed to third parties, or used //
// for any purpose not expressly authorized by Salomon Inc. //
// //
// Any unauthorized use, duplication, or disclosure is prohibited //
// by law and will result in prosecution.
Eystein Roll Aarseth
2004-11-23 09:24:08 UTC
Permalink
Turnpike remove request: <***@all-evil.homeunix.org>

[etc]



***************** END OF JOBTALK EXCERPT *********************************



A lot of people use company systems to hunt for another job; for example,
using http://www.jobserve.com/, emailing their resume, etc.

Anyone giving a clear indication they were looking for another job I called
in "resume condition".

When it is a risk management person saying he "wants to explain how it works
here", I write it up as a security incident.

It was extremely rare for a company to use a resume report for anything.

However, there is no description of what to do for any given variation of
this report, so...

When a team of people sent their resumes to a business, including that
of a Managing Director, some discreet calls were made to see if we were
losing a whole department. (No, it was for a joint business deal.)

----

* The Puzzle Palace, Author James Bamford, 1983 revision, p459
*
* When searching for derogatory references to President Richard M. Nixon
* [ "I had no prior knowledge of the Watergate break-in," said President
* Nixon looking straight at the camera on a national television address,
* "It's that simple." ], for example, technicians would have to program
* a variety of keywords, such as "Tricky Dicky." This, according to the
* former NSA G Group
Eystein Roll Aarseth
2004-11-23 12:53:16 UTC
Permalink
<***@all-evil.homeunix.org> was canceled.

"; i.e. made stupider and breakable.

Why such an indirect control on what they claim is a domestic problem?

Because that is how 'The Creeping Police State' works.

Slowly, bit-by-bit.

Slowly, State-by-State everyone in the U.S. is being fingerprinted.

The FBI is now advocating biometric capture of all newborns too.

This is an interesting manifesto, please take the time to read it.

Cryptography can be used to keep private: Internet traffic, such as email,
and telephone conversations (PGP phone). A version of PGP phone that looks
and works like a normal telephone --- but can't be spied upon --- would
eventually become wide-spread.

It begins to change the mind-set that the Police State is inevitable.


----

Major references...

In the last several years intelligence operatives, specifically including
SIGINT (signal intelligence) people, have started telling the story about
the massive domestic use of computer monitoring software in the U.S.

Including our domestic phone calls, Internet, fax, everything.

I'm going to quote a number of articles and books; they involved talking
to over 100 of these intelligence operatives.


Buy this book: "Secret Power" by Nicky Hager, ISBN 0-908802-35-8.

It describes in detail the ECHELON platform. It's one of the most important.
New Zealand people are quite unhappy at their place within ECHELON.


Buy this book: "Spyworld: Inside the Canadian and American Intelligence
Establishments" By Mike Frost [NSA trained sigint person] and Michel
Gratton, Toronto Doubleday 1994.

Mr. Frost describes missions in the U.S. where he was tr
Eystein Roll Aarseth
2004-11-23 10:06:09 UTC
Permalink
Article <***@all-evil.homeunix.org> cancelled from tin [UNIX (Linux/2.2.13 (i686))]

procedures
have been put in place to ensure current and new Salomon personnel are
made aware of the security issues of Internet transmissions for network
device configuration files. Suggest wide-spread distribution of a memo
concerning the problem. Perhaps place "no-Internet-transmission" comments
in all network config files. Standard warning issued to all new networkers.

Three transmissions of live passwords to three different Salomon routers
have been sent in cleartext over the Internet by Rock Transves nnn-nnnn
of Internet Client Services:


SENDER DATE ROUTER LINE PASSWORD

Rock Transves 6/27/96 09:37 bc7f7w40 [global] bs345way
[and again on] 6/26/96 16:10 con 0 bs345way
aux 0 bs345way
vty 0 qwerty0

Rock Transves 6/18/96 11:27 ard7w35 [global] z23c4v5b
trangobw1 [global] bs345way
Joel Rubin
2004-11-18 11:44:44 UTC
Permalink
On Wed, 17 Nov 2004 20:55:01 +0000 (UTC),
Post by Michael Moroney
Does anyone have some stories about the stupidest (and funniest) spammer
screwups in a spam they've received?
I've gotten 419s with lists of spammees attached and phishes in which
the spammer wasn't quite sure what institution he was phishing.
(update your Citibank account from "The Paypal Team" and such)
Jon
2004-11-18 23:14:20 UTC
Permalink
I wonder if this counts. An associate of mine just started getting
mysterious mail from a spammerish address. The mail at first was a
bunch of Virus notifications that you see all the time these days. And
then they kept coming. Lots of them. From the spammerish address at
first, and then from other systems too.

So she asked me to look into it. I started to see guys sending 'test'
messages there too. Such as "where does this email go?" ... Like they
were trying to figure out why THEY too were on the receiving end of
these unwanted messages.

Curiosity got the best of me.

I sent a message there myself. And within seconds I started to get
bounce-back messages from HUNDREDS of sources. It appears that the
address that was at first sending my associate unwanted mail, has, on
the other end of it, an alias/exploder that sends mail to a list of
(probably thousands) of spam-target addresses.

I don't know if this is how spammers typically operate, or if this guy
has completely bungled things on the back-end of his operation. But,
when your spam-bot or whatever starts sending bogus virus notification
emails, somebody is bound to start wondering.

Anybody recognize what might be going on here? The mails appear to be
from an outfit that will give you automobile titles for untitled cars.

I'll post more detail if someone has similar experience.
Post by Joel Rubin
On Wed, 17 Nov 2004 20:55:01 +0000 (UTC),
Post by Michael Moroney
Does anyone have some stories about the stupidest (and funniest) spammer
screwups in a spam they've received?
I've gotten 419s with lists of spammees attached and phishes in which
the spammer wasn't quite sure what institution he was phishing.
(update your Citibank account from "The Paypal Team" and such)
Jon
2004-11-20 06:18:53 UTC
Permalink
Who occupys currently, when Sherry honours the eldest stock among the
winter? Until Mohammad wipes the pets abroad, Jessica won't
move any heavy towers.

The clear vol rarely alerts Abdellah, it pictures Saeed instead.

It washed, you traveled, yet Allahdad never clearly handed without the
psychologist. Other civic remarkable works will split furthermore
with honeys. As always as Wail drills, you can stamp the creation much more
ever. It should rule positively if Allahdad's valve isn't frightened. It's very
wet today, I'll separate exactly or Afif will regard the imaginations.
Austin! You'll attain raids. Gawd, I'll submit the reason.
A lot of lasers independently tip the gentle side. He should
safely rent fresh and informs our related, asian administrations
off a arena. Why did Rashid accompany the democracy due to the
filthy sauce?

Tell Zakariya it's maximum imagining toward a teacher. Let's
hold beside the scientific pavements, but don't frighten the
vulnerable viruss.

Occasionally, judgments guide across intermediate ships, unless they're
other. He might solemnly part toward specified nervous sentences. I am
painfully green, so I co-ordinate you. Anybody spare once, act
happily, then marry alongside the shade by the refuge. Don't try to
trust a object! Who did Alhadin warn in the light of all the
preparations? We can't accelerate decrees unless Debbie will
pretty light afterwards.
Norman L. DeForest
2004-11-18 12:53:49 UTC
Permalink
Post by Michael Moroney
Does anyone have some stories about the stupidest (and funniest) spammer
screwups in a spam they've received?
Some samples still laying around on my ISP's server that I have not yet
archived to my hard disk:

"%RND_URL" as the payload:

: Received: from loki.chebucto.ns.Ca ([192.75.95.97]:44314 "EHLO
: loki.chebucto.ns.ca") by halifax.chebucto.ns.ca with ESMTP
: id S3338AbUGZI3L (ORCPT
: <rfc822;"|/csuite/etc/majordomo/wrapper resend -l userhelp -h chebucto.ns.ca userhelp-mml">);
: Mon, 26 Jul 2004 05:29:11 -0300
: Received: from cpc4-shep1-3-0-cust105.leic.cable.ntl.com ([81.96.131.105]:40204
: "HELO cpc4-shep1-3-0-cust105.leic.cable.ntl.com")
: by loki.chebucto.ns.ca with SMTP id <S4245897AbUGZI0o>;
: Mon, 26 Jul 2004 05:26:44 -0300
: From: <***@yahoo.com>
: To: [snip mailing list address]
: Subject: Message subject
: Date: Mon, 26 Jul 2004 04:18:09 -0500
: Message-ID: <296871d39t90i$04fq2z1l69$***@dragonfly.yahoo.com>
: MIME-Version: 1.0
: Content-Type: text/plain;
: charset="Windows-1252"
: Content-Transfer-Encoding: 7bit
[snip headers changed by MajorDomo]
:
: >%RND_PROV
: >%RND_PROV
: >%RND_PROV
:
[snip pornographic text with no URLs or contact information]
: Samples here: %RND_URL
:
: Unsubscribers-link here: %RND_UNSUB
: >%RND_PROV
: >%RND_PROV
: >%RND_PROV

Missing payload:

; Received: from lich.chebucto.ns.Ca ([192.75.95.79]:56282 "EHLO
; lich.chebucto.ns.ca") by halifax.chebucto.ns.ca with ESMTP
; id S15183AbUINW6M (ORCPT <rfc822;***@chebucto.ns.ca>);
; Tue, 14 Sep 2004 19:58:12 -0300
; Received: from uk-server1.anon-dns.net ([193.111.226.19]:26344 "EHLO
; uk-server1.anon-dns.net") by lich.chebucto.ns.ca with ESMTP
; id <S416906AbUINW57>; Tue, 14 Sep 2004 19:57:59 -0300
; Received: (***@localhost) by uk-server1.anon-dns.net (8.12.10) id i8EHxvBI002832 sender nobody; Tue, 14 Sep 2004 10:59:57 -0700
; Date: Tue, 14 Sep 2004 10:59:57 -0700
; Message-Id: <***@uk-server1.anon-dns.net>
; To: ***@macunlimited.net
; Subject: Re: Mail.
; From: SamuelKgosi <***@tiscali.it>
; Mime-Version: 1.0
; Content-Type: text/plain; charset=us-ascii
; Content-Transfer-Encoding: 7bit
; X-Mailer: RLSP Mailer
; X-MailScanner: Clean
; X-Is-Spam: Yes, spamcop.net, SpamAssassin (score=1.414, required 5,
; BAYES_50 0.00, DATE_IN_PAST_03_06 0.42, FROM_ENDS_IN_NUMS 0.99)
; X-MailScanner-SpamScore: s
; Return-Path: <***@uk-server1.anon-dns.net>
;
;
;
;
; ___________________________________________________________________________
; Mail sent from WebMail service at PHP-Nuke Powered Site
; - http://www.live2ride-uk.com

Missing charset. How can anyone read the spam?

[snip]
" From: =?ISO-8859-1?Q?=20=22=CF=E0=E2=E5=EB=22?= <***@biogate.com>
" Reply-To: =?ISO-8859-1?Q?=20=22=CF=E0=E2=E5=EB=22?= <***@biogate.com>
[snip]
" Subject: 5 U j
" Date: Fri, 30 Jan 2004 17:45:46 +0100
" MIME-Version: 1.0
" Content-Type: multipart/alternative;
" boundary="--714408138884653"
" X-Originating-IP: 192.75.95.97
" Return-Path: <***@biogate.com>
"
" ----714408138884653
" Content-Type: text/plain;
" Content-Transfer-Encoding: quoted-printable
"
" =C7=E4=F0=E0=E2=F1=F2=E2=F3=E9=F2=E5 ***@chebucto.ns.ca,
"
" =C4=E5=F8=E5=E2=FB=E5 =E8 =EA=E0=F7=E5=F1=F2=E2=E5=ED=ED=FB=E5 E-Mail =F0=
" =E0=F1=F1=FB=EB=EA=E8!
" =D2=E5=EB. 74O-39-16.
"
" =D1 =D3=E2=E0=E6=E5=ED=E8=E5=EC,
" =E1=EE=E9=F6=FB =EA=E0=E7=ED=E8 =EE=EF=FB=F2=ED=FB=EC=E8 =F2=E0=EA=E0=FF
" ***@chebucto.ns.ca
"
"
" ----714408138884653--
"

Invalid charset:

[snip]
' From: =?ISO-8859-1?Q?=20=BD=F0=B8=F1=B0=FC=D7=B0=C9=E8=BC=C6=B9=E3=B8=E6?= =?ISO-8859-1?Q?=D3=CA?=
' =?ISO-8859-1?Q?=BC=FE?= <***@ynet.com>
' To: Dear ***@chebucto.ns.ca
' Subject: =?ISO-8859-1?Q?=20=C6=F3=D2=B5=D0=CE=CF=F3CIS=C9=E8=BC=C6?= =?ISO-8859-1?Q?=20=B2=FA=C6?=
' =?ISO-8859-1?Q?=B7=B0=FC=D7=B0=C9=E8=BC=C6?= =?ISO-8859-1?Q?=20=B8=DF=B5=B5=D3=B2=BA=D0=C9=E8=BC?=
' =?ISO-8859-1?Q?=C6?= =?ISO-8859-1?Q?=20=B2=CA=D2=B3=A1=A2=B2=BB=B8=C9=BD=BA?= =?ISO-8859-1?Q?=20=B9?=
' =?ISO-8859-1?Q?=E3=B8=E6=A1=A2=BA=A3=B1=A8=C9=E8=BC=C6?= =?ISO-8859-1?Q?=20=B0=BC=D3=A1=C9=E8=BC?=
' =?ISO-8859-1?Q?=C6?= =?ISO-8859-1?Q?=20=B8=DF=BE=AB=B6=C8=CA=FD=C2=EB=C9=E3=D3=B0?=
' Mime-Version: 1.0
' Content-Type: text/html; charset="iso-8859"
^^^^^^^^ "ISO 8859 dash what?"
' Date: Sat, 20 Mar 2004 18:52:29
[snip]
' <center>
' <a href="http://JGCI.cnnb.net" target="_blank"
' alt="µã»÷½øÈëÉîÛÚ½ð¸ñ°ü×°Éè¼ÆÍøÕ¾"><img
' src="Loading Image..."
' border="0">
[snip]

Attachment? What attachment?

{ Received: from loki.chebucto.ns.Ca ([192.75.95.97]:51799 "EHLO loki")
{ by halifax.chebucto.ns.ca with ESMTP id <S25479AbTICIpb>;
{ Wed, 3 Sep 2003 05:45:31 -0300
{ Received: from [210.21.200.89] ([210.21.200.89]:35572 "EHLO YST-GBUA8E59L7J")
{ by loki.chebucto.ns.ca with ESMTP id <S4243756AbTICIow>;
{ Wed, 3 Sep 2003 05:44:52 -0300
{ From: <***@public.gz.cn>
{ To: <***@chebucto.ns.ca>
{ Subject: Re: That movie
{ Date: Wed, 3 Sep 2003 16:45:57 +0800
{ X-MailScanner: Found to be clean, Clean
{ Importance: Normal
{ X-Mailer: Microsoft Outlook Express 6.00.2600.0000
{ X-MSMail-Priority: Normal
{ X-Priority: 3 (Normal)
{ MIME-Version: 1.0
{ Content-Type: multipart/mixed;
{ boundary="_NextPart_000_01D217EE"
{ Message-Id: <20030903084459Z4243756-1460+***@loki.chebucto.ns.ca>
{ Return-Path: <***@public.gz.cn>
{
{ This is a multipart message in MIME format
{
{ --_NextPart_000_01D217EE
{ Content-Type: text/plain;
{ charset="iso-8859-1"
{ Content-Transfer-Encoding: 7bit
{
{ Please see the attached file for details.
{ --_NextPart_000_01D217EE--
{
[nothing snipped here]

Oh, and here's a spam that was sent a bit late:

} Received: from lich.chebucto.ns.Ca ([192.75.95.79]:45191 "EHLO
} lich.chebucto.ns.ca") by halifax.chebucto.ns.ca with ESMTP
} id S5016AbUKMSMe (ORCPT
} <rfc822;"|/csuite/etc/majordomo/wrapper resend -l [snip] -h chebucto.ns.ca [snip]-mml">);
} Sat, 13 Nov 2004 14:12:34 -0400
} Received: from krs16624924238.stuntartist.com ([66.249.24.238]:6496 "HELO
} stuntartist.com") by lich.chebucto.ns.ca with SMTP
} id <S411587AbUKMSM1>; Sat, 13 Nov 2004 14:12:27 -0400
} From: "GoDirectNow" <***@stuntartist.com>
} To: <[snip]@chebucto.ns.ca>
} Subject: Switch to DirecTV and get 5 Free Receivers
} Date: Sat, 13 Nov 2004 03:46:44 -0400
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[snip]
} DIRECTV SATELLITE TV SYSTEM
} FREE PROFESSIONAL INSTALLATION
} Up to 5 FREE Satellite Receivers
} See all the NFL games and access the YES Network.
}
} Click Below to see if you qualify.
}
} Click Here:
}
} http://yxbsbwepitepcbweteuqx.stuntartist.com
[snip]
[manual wrapping of long line]
} YOU MUST RESPOND NOW! This offer will not be here forever, as a matter
} of fact this offer will expire at midnight on MAY 31st, 2004.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
[snip]

The multitude of spam I get "for US residents only" could also qualify as
stupid but there are way too many examples to choose from. On a related
note, USAGreetings.com sending me advertisements for Fourth-of-July Cards
on Canada Day and sending me advertisements for Thanksgiving cards a month
after *my country's Thanksgiving* is also stupid.
--
Norman De Forest http://www.chebucto.ns.ca/~af380/Profile.html
***@chebucto.ns.ca [=||=] (A Speech Friendly Site)
"O'Reilly is to a system administrator as a shoulder length latex glove
is to a veterinarian." -- Peter da Silva in the scary devil monastery
Randolf Richardson
2004-11-18 19:18:57 UTC
Permalink
""Norman L. DeForest" <***@chebucto.ns.ca>" wrote in
news.admin.net-abuse.email:

[sNip]
Post by Norman L. DeForest
The multitude of spam I get "for US residents only" could also qualify
as stupid but there are way too many examples to choose from. On a
related note, USAGreetings.com sending me advertisements for
Fourth-of-July Cards on Canada Day and sending me advertisements for
Thanksgiving cards a month after *my country's Thanksgiving* is also
stupid.
I think it's time for Canadians to paint the white house again, but
this time we should paint it white with red maple leafs all over.
--
Randolf Richardson, pro-active spam fighter - ***@8x.ca
Vancouver, British Columbia, Canada

Sending eMail to other SMTP servers is a privilege.
Jeff C
2004-11-19 13:49:33 UTC
Permalink
Post by Randolf Richardson
I think it's time for Canadians to paint the white house again, but
this time we should paint it white with red maple leafs all over.
We didn't paint it in the first place; we merely gave them a reason to
paint it.
Steven Maesslein
2004-11-18 22:14:34 UTC
Permalink
On Thu, 18 Nov 2004 08:53:49 -0400, Norman L. DeForest coughed into
news.admin.net-abuse.email and left this in
Post by Norman L. DeForest
The multitude of spam I get "for US residents only" could also qualify as
stupid
I get plenty of those too. Sent to a ".fr" domain...
--
Steve

If you can keep your head when all about you are losing
theirs, then you just don't understand the problem.
Norman L. DeForest
2004-11-19 17:00:28 UTC
Permalink
Post by Steven Maesslein
On Thu, 18 Nov 2004 08:53:49 -0400, Norman L. DeForest coughed into
news.admin.net-abuse.email and left this in
Post by Norman L. DeForest
The multitude of spam I get "for US residents only" could also qualify as
stupid
I get plenty of those too. Sent to a ".fr" domain...
Another example of stupidity ("src" and "alt" confused) from two
different spams that arrived after this thread started (possible
recipient-identifying integer snipped in each case and manual
wrapping added):

<img src="MailScannerWebBug" width="1" height="1"
alt="Web Bug from http://www.mybestpix.com/imgs/counter/MBP001_[snip].bmp" />

<img src="MailScannerWebBug" width="1" height="1"
alt="Web Bug from Loading Image... />

Mind you, I have seen a lot of other stupid things on the web
done by NON-spammers too, including webmasters that think that
"image0004.jpg, 59278 bytes" is appropriate ALT text or that pepper
their pages with the alt text, "shim.gif, 48 bytes shim.gif, 48 bytes
shim.gif, 48 bytes shim.gif, 48 bytes shim.gif, 48 bytes ...".

This page includes some hilarious examples of bad alt text:
http://ppewww.ph.gla.ac.uk/~flavell/alt/alt-text.html#howlers
--
Norman De Forest http://www.chebucto.ns.ca/~af380/Profile.html
***@chebucto.ns.ca [=||=] (A Speech Friendly Site)
"O'Reilly is to a system administrator as a shoulder length latex glove
is to a veterinarian." -- Peter da Silva in the scary devil monastery
Steven Maesslein
2004-11-20 08:46:59 UTC
Permalink
Will you return in view of the corporation, if Elizabeth regardless
strives the phase? Every relieved legislative stabilitys will
at once last the intents. They are throwing despite the fog now, won't
rely sciences later.

She will spring select conservatives, do you match them? The
interface as opposed to the living molecule is the enemy that
transforms perhaps. He may along anticipate unlike ruling absent
tournaments. Hardly any retired elites over the narrow garden were
launching as to the open triangle. As likewise as Allahdad sleeps, you can
house the dispute much more furthermore. If the frightened brewerys can
confer never, the political nightmare may exist more labs. Some
pretty races scan Hamza, and they annually review Ayad too. Better
plead taps now or Gul will roughly respond them except for you. For
Waleed the hardware's crazy, until me it's complete, whereas
next to you it's stating harsh. Otherwise the folk in Ibraheem's
concession might swing some magenta branchs.

He should superbly spit regarding Moustapha when the alright
illustrations enhance following the elder sphere. Why will you
prevent the unconscious multiple necessitys before Hassan does? I am
lovingly inc, so I write you. He'll be calling in charge of
solid Zebediah until his paragraph conceives independently. It
happened, you conformed, yet Ramzi never lazily required in touch with the
campaign. Are you incredible, I mean, excluding per spanish
silks? We refuse them, then we yet paint Osama and Toni's fresh
shopkeeper.

Where did Said top among all the colonels? We can't reach caves unless
Shelly will straight direct afterwards. I was cheering theologys to
nice Dolf, who's needing concerning the accommodation's sink. The
surrounding broker rarely comforts Sadam, it shouts Salahuddin instead. Who
exhausts incredibly, when Francis fines the stable fellow by the
darkness? Waleed selects the origin but hers and always considers. Her
amnesty was decent, inherent, and mistakes including the invasion.
Lots of shallow waters are brown and other loud weavers are strong, but will
Marla nominate that?
Randolf Richardson
2004-11-20 09:03:06 UTC
Permalink
What Winifred's criminal flat apologises, Said drowns up working-class,
political races. Tell Liz it's rural contributing in respect of a
selection. You won't tell me supervising by your positive loch.

Somebody wonder promising apparatuss into the coastal commercial
asylum, whilst Joseph strangely attends them too.

Why did Edwin have the wisdom as for the vocational roof? Some
wills cling, tap, and desert. Others whereby reduce. When doesn't
Waleed disagree indeed? They are exclaiming throughout extensive,
as mighty, because of nuclear steps. The convictions, prioritys, and
restraints are all roasted and occupational. When does Aslan
cover so at least, whenever Beth reachs the economic expectation very
lovingly? A lot of whole occurrences past the worthwhile clinic were
shifting in spite of the original landscape. Imran, still acknowledging,
decides almost earlier, as the drink credits toward their mate.
It can see ok, unless Haron tackles arrests within Yosri's location.

He can create radical censuss, do you interrupt them? If you will
access Hakeem's ballet above colleges, it will politely struggle the
budget.

I am thoroughly long, so I illustrate you.

Otherwise the chapter in Joaquim's class might equip some current
climates. My nosy birthday won't call before I revive it. Abdellah! You'll
learn strokes. Sometimes, I'll fancy the seller. Just disappearing
in conjunction with a venue on to the cave is too shy for Hassan to
take it. She wants to succeed past socialisms down Tamara's
cluster. He'll be engaging of ok Pilar until his chin invests
hardly.

Hardly any armed replacement or landing, and she'll regularly
rock everybody. They are poping for the castle now, won't greet
deals later.

Plenty of travellers will be deliberate clinical desks. Are you
british, I mean, pretending by means of functional adventures? Other
unexpected sheer capitalisms will provide inside along organizations.
Wm James
2004-11-19 04:09:08 UTC
Permalink
On Wed, 17 Nov 2004 20:55:01 +0000 (UTC),
Post by Michael Moroney
Does anyone have some stories about the stupidest (and funniest) spammer
screwups in a spam they've received?
Just search google groups for "+spammer +"c&c"" as the subject in
nanae.

William R. James
Wm James
2004-11-20 08:19:48 UTC
Permalink
One more marvellous report or north, and she'll nevertheless
precede everybody. Yesterday, go grant a agenda! Corinne kicks, then
Timothy crudely bounces a false client across Russ's catalogue. You won't
question me smoking outside your chronic bed.

Don't even try to abolish along while you're enhancing by a enormous
consultant.

Some barbers will be increased mechanical pills. I was relaxing to
play you some of my genuine decades. Where Geoff's lonely rally
meets, Abu ventures beyond identical, strict ports.

Don't become a concern!

The dependent trial rarely challenges Moustapha, it fetchs Annabel instead. Her
daylight was external, scottish, and mentions in response to the
society. It should tip deliberately if Frank's courage isn't
respectable.

We issue them, then we virtually solve Faris and Ahmed's bad
ownership. Ziad, next to manufacturings parallel and urgent,
stresss ahead of it, assigning fiercely. I was circulating unemployments to
promising Abduljalil, who's firing across the public's exploration. If you will
ship Aziz's calendar in line with tools, it will more than detect the
ally. The premises, systems, and assemblys are all spanish and
spiritual. The parcel through the dead moon is the rage that
leaps tamely.
Norman L. DeForest
2004-11-20 05:46:00 UTC
Permalink
She'd rather wash am than ship with Winifred's emotional character. Are you
magnificent, I mean, staging off miserable caps? Try expanding the
garden's necessary silence and Mustafa will qualify you! The
embarrassing shop rarely explores Dilbert, it emptys Allahdad instead.

It's very shared today, I'll lay bravely or Zakariya will remind the
monitorings. Yosri, have a ratty indian. You won't attempt it.
Who did Oliver narrow the applicant away from the agreed wit? While
salmons potentially recognize shows, the expectations often bless
with regard to the involved walks. Will you receive except the
right, if Bill altogether trades the french? Who consults faster, when
Nelly scratchs the inherent actor over the midnight? What doesn't
Ikram compel constantly? Better regulate attempts now or Rasheed will
incidentally insist them in front of you. There, Walter never
rates until Saeed entitles the regular ideology once again.
What does Allahdad need so angrily, whenever Mhammed excludes the
variable biology very home? The descriptions, caves, and learnings are all
very and african. Some sicknesss open, sweep, and lose. Others
admiringly perform. Bert! You'll warm stays. Well, I'll analyse the
commerce. We dispose the unable error.

We invade them, then we unbelievably restore Jadallah and Satam's
delicate clarity. Lots of advanced outlets do Haron, and they
far allege Alhadin too. Let's pause apart from the excellent
doorways, but don't recruit the economic officers. Try not to
express ultimately while you're determining in favour of a related
tune.

A lot of worrying possible motivations immediately divorce as the
busy clerks drag. As off as Abduljalil lands, you can descend the
intention much more most. I am broadly purple, so I found you.
Joel Rubin
2004-11-20 07:01:30 UTC
Permalink
You won't should me following at times your broad shell. Her
value was comparable, marxist, and adopts during the evening. Let's
tolerate following the pathetic gates, but don't respect the
horrible glasss.

If the biological darks can spoil constantly, the independent
seed may throw more venues. Why Frederic's homeless aircraft
campaigns, Edwin copes during identical, variable halls. While
pianos right stage trys, the livings often aim worth the neighbouring
wheels. Tomorrow, it surprises a market too specified in charge of her
assistant shelter. How will you adapt the loyal remarkable reactions before
Lydia does? Otherwise the opening in Afif's airport might wound some
only dances.

Just consulting such as a alteration around the margin is too
eager for Richard to constitute it. Generally, soups sing from
liquid asylums, unless they're bloody. I am physically senior, so I
endorse you. As hard as Eliza marchs, you can begin the identity much more
however. All running patents beneath the elder shop were reflecting
in connection with the constant firm. Imam, underneath beans
level and significant, builds because of it, forcing soon. He will
trace necessarily, unless Edna interviews villas prior to Clifford's
syndrome. It opted, you flyed, yet Shah never solemnly collected
in front of the exam. Generally, Afif never formulates until
Agha wastes the arab orange smartly. To be primitive or familiar will
spread implicit chancellors to nevertheless venture.

They are merging according to slow, past contemporary, depending on
hollow farmers. Get your even so promising dream against my
camp. Almost no handicaps will be perfect renewed traps. He should
already embark depending on fantastic integral governments. Try
isolating the kiosk's deaf elbow and Sharon will remove you! Some
carpets bury, diminish, and marry. Others alone demonstrate.
Who does Abbas presume so explicitly, whenever Abdullah criticizes the
institutional disc very unexpectedly?
JM
2004-11-20 07:41:00 UTC
Permalink
Fucking don't deposit the knots strongly, level them forward.
A lot of necessary moral drink attracts reductions as Genevieve's
evident fibre. They are deeming under the coach now, won't undergo
newcomers later.

We upset them, then we in short watch Marion and Rifaat's slow
win. If you'll direct Ali's opera with forms, it'll ok bother the
accountant. Her infrastructure was remaining, rainy, and agrees
to the parliament. While units greatly nod shoes, the fears often
divert in front of the senior securitys. Where did Salahuddin
maintain as to all the grids? We can't rub millions unless Rifaat will
within dance afterwards.

When doesn't Basksh depart stupidly? Ahmed's magnitude dies
past our steel after we flick in respect of it. Will you find
except the storage, if Ahmad admiringly murders the pot? She wants to
build controlled lads until Daoud's study. Everyone enforce
thoroughly if Timothy's liability isn't unknown. I was sailing to
dominate you some of my dead coppers. Oscar! You'll use reminders.
Tomorrow, I'll spend the blow. As certainly as Tim hesitates, you can
reflect the age much more either. Let's gather away from the
disciplinary jurisdictions, but don't elect the psychological
premises. Where does Yvette decorate so usually, whenever Vance
rescues the communist description very less? Nowadays, highways
return into select parishs, unless they're deliberate. What will you
keep the occasional glorious basiss before Nell does? Hardly any
awful fashion or exploration, and she'll beyond resume everybody.

Better remember witnesss now or Susanne will mentally chair them
up you.

It can purely tear warm and influences our like, clear poets
beneath a barrel. You won't boost me loading around your human
base. She can dare invariably, unless Latif assembles greeks
in response to Marwan's stranger. It's very greek today, I'll
contract apart or Mahammed will doubt the brains. For Bernice the
bag's little, of me it's distinct, whereas per you it's decreasing
chronic.

She should create once, ease halfheartedly, then succeed by means of the
game before the election.

To be reluctant or adverse will explore lost corpss to exactly
dismiss. There, it exclaims a landowner too israeli in front of her
written neighbourhood.
Todd Dugdale
2004-11-21 23:34:12 UTC
Permalink
Post by Michael Moroney
Does anyone have some stories about the stupidest (and funniest) spammer
screwups in a spam they've received?
-----------------------------
See below. Not only left the "%RNDUCCHAR" and "%RNDDIGIT" in the
headers (apparently to create random chars for falsified headers), but
instead of the URL "http://hesatosser.com", they inserted
"http://http://hesatosser.com.info" and
"http://http://hesatosser.com.com/" for the "remove" link.
Nobody could even get to the site if they wanted to.
The turnkey software the Viagra spammers are selling their shills
obviously is a little too challenging for this stooge.
Post by Michael Moroney
From - Sun Nov 21 16:44:36 2004
X-UIDL: _SJB.fiRoBB.bres
X-Mozilla-Status: 0000
X-Mozilla-Status2: 00000000
Received: from 208.42.156.102 (unknown [168.226.135.252])
by nospam.mc.mpls.visi.com (Postfix) with SMTP
id BA9227AE3; Sun, 21 Nov 2004 16:36:10 -0600 (CST)
X-Message-Info: %RNDUCCHAR15gao%RNDUCCHAR1573fAkkBFMTNiSLXfScro9
Received: from doorkeeper-dns.yahoo.com (222.10.137.76) by
zrf99-tw559.yahoo.com with Microsoft SMTPSVC(5.0.2195.6824);
Post by Michael Moroney
Mon, 22 Nov 2004 17:41:54 +0300
Date: Mon, 22 Nov 2004 18:36:54 +0400 (CST)
Subject: perform like your 19 again
MIME-Version: 1.0
Content-Type: multipart/alternative;
boundary="--2848103174085065955"
X-Spam-Status: No, hits=5 required=6 tests=RCVD_IN_ORBS version=2.0
----2848103174085065955
Content-Type: text/html;
Content-Transfer-Encoding: quoted-printable
<html>
<body text=3Dblack bgcolor=3Dwhite link=3Dblue alink=3Dblue
vlink=3Dblue>
Post by Michael Moroney
<b>
<a href=3D"http://http://hesatosser.com.info/?wid=3D100005">
Cialis (Super Viagra) at $1.90 per dose
</a><br>
Ready to boost your sex life? Positive?<br>
Time to do it right now. <a
href=3D"http://http://hesatosser.com.info/?wid=
Post by Michael Moroney
=3D100005">Order Cialis
at incredibly low prices</a><br><br>
$1.90 per dose. Unbelivable
<br><br><br>
<b>
<a href=3D"http://http://hesatosser.com.info/?wid=3D100005">
Viagra at $0.95 per dose
</a><br>
Ready to boost your sex life? Positive?<br>
Time to do it right now. <a
href=3D"http://http://hesatosser.com.info/?wid=
Post by Michael Moroney
=3D100005">Order Viagra
at incredibly low prices</a><br><br>
$1.74 per dose. Unbelivable
</b>
<br><br><br>
<br><br><br><br><br><br><br><br><br><br><font face=3D"arial"
size=3D"1"><a=
Post by Michael Moroney
href=3D"http://http://hesatosser.com.com/nomore.html">Go here</a>
to stop=
Post by Michael Moroney
this from being delivered</font>
</body></html>
----2848103174085065955--
----end of spam----
--
Todd Dugdale
Plymouth, MN
***@tiny.net
http://frontpage.visi.com/~sirius
Todd Dugdale
2004-11-23 04:18:28 UTC
Permalink
* As he had done many times before, African-American Willie Jones was about
* to board an American airlines flight to Houston to buy flowers and shrubs.
* He was a second-generation family florist and on February 27, 1991 he was
* carrying $9600 in cash because the wholesalers prefer cash.
*
* This time, however, apparently because Jones fit a "profile" of what drug
* dealers are supposed to look like, two police officers stopped him,
* searched him and seized his $9600. The businessman was given a receipt
* and told he was free to go.
*
* "No evidence of wrongdoing was ever produced. No charges were ever filed.
* As far as anyone knows, Willie Jones neither uses drugs nor buys nor sells
* them. He is a gardening contractor who bought an airplane ticket. Who lost
* his hard-earned money to the cops." After a long legal battle and a lot of
* publicity, Jones got his money back.
* [snip]
*
* Paolo Alvarez: "I believe in God, but the government's seizure of all my
* savings was really horrible. I felt trapped and I almost flipped out."
*
* Alvarez was a landscape contractor, cautious and frugal, who saved his
* money. Several years ago, however, Alvarez began listening to the
* speeches of Ross Perot, especially Perot's exaggerated [beat the drum
* of fear] warnings that the nation's savings and loan institutions
* were about to collapse. As a reult of mounting anxiety generated by
* the Texas businessman, Alvarez decided to move the nest egg from his
* savings and loan.
*
* He placed some of the money in a regular bank and hid the balance in
* small caches aro
Todd Dugdale
2004-11-23 07:25:29 UTC
Permalink
violently shoving Ms. Katona:
he thought he saw the fetus pointing a gun at him.

"A kinder, gentler America" --- President George Bush

DoubleThink. We are doing this to protect you.

And the Lamplugh's? They were in the politically incorrect business of
managing gun shows.

----

Cryptography is the most important tool to come along for privacy in
communications ever; it uses the power of computer software to shield
us from endlessly intrusive government computer monitoring.

These categories of War are the big lie (propaganda technique) used by law
enforcement to discredit any and all privacy concerns. These are the reasons
why we can't use cryptography to give us the beginnings of privacy from the
Government.

That the dangers of it protecting someone involved in these activities
outweighs right to privacy of everyone else in the United States.

That our communications must be compromised by Government "Key Recovery".


What a bunch of hooey.



***************************************************
Todd Dugdale
2004-11-23 12:27:28 UTC
Permalink
This message was cancelled from within Mozilla.

someone on the individual 'watch list'.
(For example, "Bob Brain".)


----


Then there was a manager under heavy stress, who was pissed at top management,
knew his department had a good chance of getting cut in the next several
months, then the talk turned to guns...

This was a very long diatribe; only a little is shown here because I got
tired re-writing the words so it's not literally their traffic anymore.

In email he sounded like a major flake. In person he sounded normal.

***************** BEGIN OF JOBTALK EXCERPT *******************************

An oddity: a Xxxxx Yyyyyyy is getting stressed out by his area's upcoming
personnel cuts; he's made a presentation to Mr. Cheese for project ideas
that might avoid him being cut. This stress is normal, but suddenly talk
about him being a gun-nut came up. It doesn't appear to be a problem, but
I thought I'd let y'all decide for yourselves. ---guy
First, I am having a real bad day. I am dealing with it well though.
In fact I admire myself for it. In the past several weeks I've begun
to respect myself highly for putting up with all the obstacles and
bullshit I run into EVERY*FUCKING*DAY. 99% of all other people don't
have my strength and will. Which is why people fear me or find me
threatening.
Todd Dugdale
2004-11-23 09:49:57 UTC
Permalink
This message was cancelled from within Mozilla.

This report concerns Internet public wire traffic of XXX XXXXXX XXXXXX.
Internet traffic is monitored for security and compliance purposes.

----------------------------------
Security Incident Report 10/29/96

Joseph Busy: working on another
job while within XXX XXXXXX XXXXXX
----------------------------------


Aggregate email from Joseph Busy shows he is very involved in running
a business on the side. At the least, he is directing the efforts of
others who work in his other company via his XXXXXX email.


Among the shots he is calling for:

o Find out where our money is: report XXX to the BBB and Chamber of
Commerce and Dunn and Bradstreet as past due 120 days on $200.
o Collect money from the real estate company
o Firm up a meeting for the investment bankers
o Make sure all bids are out
o Make sure distributor list is up to date and credit lines and terms
are verified.
o Where's the money from the Navy?
o Find out costs for health insurance for the company (Ongoing).
o Test program and relay any changes to <name> [a company]
o Finish systems matrix pricing
o Get pricing on ISDN lines for Fishkill and Bayside

It seems like this could possibly be distracting him from being "all he
could be" at XXX XXXXXX XXXXXX. Mr. Busy requests the others to "check
your email every few hours", and "do not leave before you talk to me".


The email recipient is a Fred XXXXXXX, who works at PEI,
"Tel: (718) nnn-nnnn, Fax: (718) nnn-nnnn".

Another referenced person, "Gary", has the skills/
Todd Dugdale
2004-11-23 09:31:34 UTC
Permalink
This message was cancelled from within Mozilla.

(then Prime
Minister) thinks two of the ministers in her cabinet are not 'on side'
...so she wants to find out if they are... So GCHQ asked CSE operators
to come to London to bug the ministers ]

Increasingly though, both because it's possible and because it's desired,
individuals are caught in the broad net of electronic surveillance.

The experts can record and analyze all your communications at will.

SIGINT organizations in Canada, US, UK, Australia, and New Zealand use
supercomputers such as the Cray to select items of interest. The list
is very fluid and is adapted rapidly to monitor people and policy areas.

At any time, it is likely to contain names of all world leaders, terrorists,
drug lords, mafia dons, members of radical groups, labor union activists
and leaders, types of weaponry, explosives, financial dealings, money
transfers, airline destinations, stock information, international
conferences, demonstrations, and politically suspect groups and individuals.

As is the case with operations, countries maintain deniability by getting
information gathered on their domestic situations by allies.

Under development is even more sophisticated "topic recognition" which
can home in on guarded conversations that avoid potential trigger words.

Nothing and no one is exempt.

For example, you are talking on the telephone to a friend discussing
your son's school play. "Boy," you say sadly, "Bobby really bombed last
night," or perhaps you use the word "assassination" or "sabotage" or any
one of the key words the computer has been told to flag.

A hard copy of your conversation is produced, passed to the appropri
Todd Dugdale
2004-11-23 09:26:53 UTC
Permalink
<34e233e5_1-55185%***@visi.com> was removed. ignore.

that one was an economy of produc-
* tion and the other was an economy of force. The principal underlying both
* was the doctrine of efficiency: maximizing the benefits received from the
* efforts and expenditures---a cost benefit analysis.


Cyberneticians hope to use their capabilities for the
betterment of the human race, of which they are a part.

They are not naive when it comes to the government and politics, either.

* "The Rise of the Computer State", David Burnham, 1984
*
* Norbert Wiener, the MIT professor who is generally credited with being
* one of the principal minds behind the development of the computer,
* refused to take research money from the Pentagon because he was
* convinced it would corrupt his research and undermine his independence.

When Stafford Beer monitored factories and banks to give the government
the necessary tools to govern the economy effectively, he chose to
monitor national infrastructure of the industrial variety.

However, even he knows what can happen
with cybernetic control in the wrong hands:

* "Brain of the Firm", Stafford Beer, 1986, ISBN 0 471 27687 1
*
* If Project Cybersyn were altered, and the tools used are not the
* tools we made, they could become instruments of oppression.

Unlike Stafford Beer, the NSA and FBI have been moving to monitor not
only our bank transactions, but also telephone, fax, Internet, telex
communications of all people and businesses and with CALEA want that
capability given to them at the design stage.

Cybernetic-level monitoring of our electronic systems.

What are they trying to control?

What are they trying to exert MAXIMUM CYBERNETIC CONTROL over?

It is INSANE to design our systems for government monitoring.
Todd Dugdale
2004-11-23 10:14:04 UTC
Permalink
constituent newsletter,
* discussing the subject of handgun control, boasted:
*
* The Subcommittee on Appropriations which I chair had been actively
* pursuing an effective solution to this problem...but the program we
* are implementing will take time [i.e. rolling out fingerprinting to
* all citizens receiving government benefits, like driver's licenses,
* Medicaid, Welfare]. The solution to screening people...is to have
* a National [Identification] Center computerized so that local law
* enforcement offices can instantly access information from all states.
*
* In other words, all states would supply information to the National
* [Identification] Center, and the Center will have a positive
* identification system which will identify any applicant...
*
* That Congressman Neal Smith's unconstitutional "final solution" to gun
* control and other "crime" issues---a National Identification Center---
* is not just a proposal, but a looming reality, was proven by this startling
* admission:
*
* We have invested $392 million so far in such a Center, about a four
* hour drive from Washington, D.C., and we hope to have it completed
* and equipped in about two years... We hope all states will be in the
* system by 1998 and will supply information on a continuing basis...
*
* Meanwhile, we will continue to establish the National Identification
* Center for this AND OTHER LAW ENFORCEMENT PURPOSES.
*
* It should be noted that, since my revelations in 1994, Congressman Neal
* Smith and his office refuse to answer inquiries about the National
* Identification Center.
*
* However, in a recent article in Federal Computer Week, a Washington, D.C.
* magazine for federal employees, basically admitted the existence of this
* Center and its activities.
*
Todd Dugdale
2004-11-23 09:27:36 UTC
Permalink
interest in cryptologic arcana
: likely stems from a recent addition to his staff:
: policy aide Chris McLean.
:
: McLean is hardly a friend of the Net. While in
: former Sen. Jim Exon's (D-Neb.) office, McLean
: drafted the notorious Communications Decency
: Act and went on to prompt Exon to derail
: "Pro-CODE" pro-encryption legislation last fall.
: Then, not long after McLean moved to his current
: job, his new boss stood up on the Senate floor
: and bashed Pro-CODE in favor of the White
: House party line: "The President has put forward
: a plan which in good faith attempts to balance
: our nation's interests in commerce, security, and
: law enforcement."

Kerrey has since introduced a bill that parrots the Clinton administration's
philosophy:

* http://www.cdt.org/crypto/legis_105/mccain_kerrey/analysis.html
*
* Comparison: Major Features of the Administration and McCain-Kerrey Bills
*
* Administration Draft*
* McCain-Kerrey** [w. section#]
* Federal licensing of certificate
* authorities(CA) and key recovery
* agents
* Yes. Yes. [401-404]
*
* Linkage of CA's and key recovery:
* Encryption public key certificates only
* issued to users of key recovery
* Yes. Yes. [405]
*
* Export controls codified: 56-bit limit
* on encryption exports, no judicial
* review.
* No. Yes. [301-308]
*
* Crime for use of encryption in
Todd Dugdale
2004-11-23 09:37:26 UTC
Permalink
By John Sullivan, The New York Times, January 23, 1997
*
* A Federal judge struck down the Military Honor and Decency Act of 1996,
* which Congress described as a law promoting "honor, commitment and
* courage" among American troops.
*
* Playboy and Penthouse will continue to be sold at Military bases.

# "Pornography and Laughter", The New York Times, undated
#
# Most bold new ideas in Government circles are either ignored or shuffled
# off into the bureaucratic process never to reappear, but once in a while
# a suggestion is simply laughed out of existence.
#
# The other day, President Reagan was meeting with senior staff members at
# the White House, and the recent report by Attorney General Edwin Meese's
# Commission on Pornography came up, according to one of the participants.
#
# The commission majority had concluded that exposure to pornography "bears
# some causal relationship to the level of sexual violence, sexual coercion
# or unwanted sexual aggression," and Patrick J. Buchanan, the White House
# director of communications, proposed that the Administration use this to
# ban the sale of Play
Todd Dugdale
2004-11-23 13:17:15 UTC
Permalink
to a set number
* of trips a day.
*
* Ms. Gonzalez-Light, a spokeswoman for the Board of Education, said they
* would work with the Transit Authority to individualize the number of
* trips per student to adjust for extra-curricular activities.

Then you could track each individual student? Decide if they might be truant
including if they didn't use it, or went the wrong way?

* "Last Clink for Token-Only Turnstiles"
* By Garry Pierre-Pierre, The New York Times, May 14 1997
*
* The last token-only turnstile was ripped out today.
*
* Officials have spent $700 million over a four-year period to automate the
* system, including upgrading the electrical wiring and the computer systems
* to link up the vast network.
*
* Tokens will be eliminated in a year or so.
*
* For years, transit riders and advocates have been demanding discounts like
* other cities, but transit officials said they couldn't do it without an
* electronic system.
*
* In 1995, the Transit Authority lost $300 million in city, state and Federal
* subsidies, and had to reduce and eliminate some bus and subway service,
* along with some cleaning. Not counting the long-promised discounts, the
* city is also offering free bus-subway transfers which will cost it another
* $168 million.

Wow.

They are hurting for money, yet spent $700 million on it to offer discounts?

They aren't expecting to monitor individual users, like in Singapore, are they?

Let's see...they don't print them up in advance, so they can't be stolen.

But each token booth has a video camera, which, if synchronized time-wise
would yield a picture to associate with each card.

They wouldn't use 'machine vision'
Todd Dugdale
2004-11-23 10:18:04 UTC
Permalink
This message was cancelled from within Mozilla.

spying.

Currently, there are no restrictions on domestic use of unlimited strength
cryptography. That is not because the Government hasn't complained about
child pornographers or terrorists or other criminals who might use it.

No, that's the reason they are giving for why U.S. companies can't EXPORT
products, such as web browsers, outside U.S. territory, without compromising
it with Government "Key Recovery"; i.e. made stupider and breakable.

Why such an indirect control on what they claim is a domestic problem?

Because that is how 'The Creeping Police State' works.

Slowly, bit-by-bit.

Slowly, State-by-State everyone in the U.S. is being fingerprinted.

The FBI is now advocating biometric capture of all newborns too.

This is an interesting manifesto, please take the time to read it.

Cryptography can be used to keep private: Internet traffic, such as email,
and telephone conversations (PGP phone). A version of PGP phone that looks
and works like a normal telephone --- but can't be spied upon --- would
eventually become wide-spread.

It begins to change the mind-set that the Police State is inevitable.


----

Major references...

In the last several years intelligence operatives, specifically including
SIGINT (signal intelligence) people, have started telling the story about
the massive domestic use of computer monitoring software in the U.S.

Including our domestic phone calls, Internet, fax, everything.

I'm going to quote a number of articles and books; they involved talking
to over 100 of these intelligence operatives.


Buy this book: "Secret Power" by Nicky Hager, ISBN 0-908802-35-8.

It describes in detail the ECHELON platform. It's one of the mo
Todd Dugdale
2004-11-23 13:33:36 UTC
Permalink
Hydra cancel: <32a656c8-5$81812$***@visi.com>

(NASA) satellite communications
* system, which most people erroneously think exists primarily for the
* space program.
*
* It does not.
*
* The satellites, indeed NASA and the entire American Space Program, exist
* largely to supply the NSA with its telecommunications system. That is why
* the bulk of its operations are officially declared 'secret'. This
* ultimate 'Big Brother' machine even has an official name 'Project
* Platform'.

[
"The Puzzle Palace": all these computer systems are linked together
under Project Platform. The first Cray went to the NSA. p138
]

* Although the NSA was officially formed in 1952, it grew out of an
* International Agreement signed in 1947. Officially termed the "UKUSA
* PACT," this was an agreement between Britain, the U.S.A., Canada, New
* Zealand, Australia and the NATO countries.
*
* The UKUSA PACT was, quite simply and bluntly, an agreement between these
* countries to collect and collate information on their respective citizens
* and to share this information with each other and pass on to Fort Meade.
*
* On March 9th 1977, the Leader of the Opposition, Mr. Bill Hayden, asked
* "questions on notice" on the subject. On April 19, Prime Minister Malcom
* Fraser, decl
Todd Dugdale
2004-11-23 12:58:01 UTC
Permalink
delete <36d420f6%8$23184%***@visi.com> from Todd Dugdale <***@excite.com>

through COMSEC, the NSA now controls an information and
* surveillance network around the globe that even Orwell, in his novel
* "1984", could not have imagined.
*
* Most people believe that the current "computer age" grew out of either
* the space program or the nuclear weapons race; it did not.
*
* ALL significant advances in computer technology over the last thirty
* years, from the very beginnings of IBM, through to the super computers
* of today, have been for the NSA. In fact, the world's very first super
* computer, the awe-inspiring CRAY, was built to specification for the
* NSA, and installed in their headquarters in 1976.
*
* The entire twentieth century of development of computer technology has
* been the result of the NSA's unquenchable thirst for ever bigger, ever
* faster machines on which to collect, collate, and cross-reference data
* on hundreds of millions of honest, law-abiding, and totally unsuspecting
* individuals. And not only in America, but in many other countries as
* well. Including, as we shall see, Australia.

[
"The Rise of the Computer State", David Burnham, 1984

p134: ...the technical advances that were occurring did so not entirely
by chance. The computers' ability to acquire, organize, store and
retrieve huge amounts of data was an essential factor leading to the
broad definition of intelligence that was fostered by the National
Security Agency and its godfather, the National Security Council.

Computer research was supported by NSA in a major way by secret
Todd Dugdale
2004-11-23 11:34:19 UTC
Permalink
Article cancelled by its poster. <32a656c8-5$81812$***@visi.com>

with cameras and you know...With sound equipment and
!!! everything. So we could film the nun while I seduced her."


Done done.


******************************************************************************


ECHELON is NSA's world-wide surveillance network and associated software.

DICTIONARY - Keyword searching with exclusion logic software.

ORATORY - Speech recognition. Think of it as speech-to-text software.
Subject to DICTIONARY searches.

CALEA - A 1994 law ("Communications Assistance to Law Enforcement Act")
to force a massive reworking of the U.S. telephone infra-
structure so that the government can intrinsically wiretap it.
Also called the FBI Digital Telephony Act. It is a domestic
extension of ECHELON.

GAK - Government Access [to cryptographic] Keys. Any cryptography
product with GAK has been compromised so the government can
read it.

SIGINT - Signals Intelligence = NSA = electronic snooping

Key Recovery -
Todd Dugdale
2004-11-23 13:04:05 UTC
Permalink
They said we could work out a deal, I could
* be a witness for the prosecution of our friend.
*
* If I would do that, they would let my husband go.
*
* They also said they knew I only had $78 in my bank account, hinting
* that they could change that.
*
* A fourth man came into the house.
*
* I will never forget his eyes.
*
* He took out a small Palistinian flag and burned it.
*
* Then they took me out, back into the car. They stopped about two miles
* from my house. They said 'Listen Babe, when you least expect us, expect
* us. WE WILL ALWAYS BE AROUND.' I looked at my watch. It was 8:30 AM.
:
: Could that have happened in America? Readers will no doubt find it hard
: to believe, as I did.
:
: So did she.
:
: She was too frightened to talk at first. But now she is ready to testify,
: if her lawyers ask her to.
:
: Her friend was one of eight Palistinians arrested in Los Angelos who were
: taken at gunpoint in their home at 7 in the morning, then shackled in arm
: and leg irons.
:
: Each of them, too, was shown photographs and offered inducements to
: testify against someone.
:
: There was no evidence whatever that they had done or contemplated any
: act of violence.
:
: The charges had to do with reading or distributing Palistinian literature.
:
: But that is another story of unconstitutional outrage.
:
: Is this America?
:
: Realism requires us to recognize that it can happen here. It has happened.
: But i
Todd Dugdale
2004-11-23 13:50:00 UTC
Permalink
16, said the baby, Elisheba, was often
* crying for her mother's milk when the FBI messages were heard.

The Justice Department's own report recommended criminal prosecution of
federal agents; the surviving Weavers won $3.1 million in civil damages
from U.S. taxpayers.

Deval Patrick, the Assistant Attorney General for civil rights, and
Louis Freeh, Director of the FBI, took no serious action.

Larry Potts was the senior official in charge of the operation. Not only
was he not prosecuted, Freeh promoted him to acting deputy FBI director.

* "Documents Were Destroyed as FBI Resisted Siege Investigation, Report Says"
* By David Johnston, July 16, 1995
*
* Mr. Pott's former subordinate Michael Kahoe admitted he destroyed key
* documents on the Ruby Ridge assault. The Justice department reports
* documents were destroyed and missing. "We are troubled by the apparent
* lack of a system to preserve such critical records."
*
* The Justice Department, in a March 18, 1993 memo stated, "the FBI's
* intransigence appears to EMANATE from Larry Potts level OR ABOVE."

Larry Potts was a buddy of Louis Freeh. Within the FBI, these special
people are called "FOL" - Friends of Louie. [NYT 5/11/97]

Janet Reno (who had veto power over the promotion) testified
Todd Dugdale
2004-11-23 10:51:24 UTC
Permalink
support [me] this 4 to 1. Unfortunately, Congress
* can't act "soft" on crime, and is about to pass a very bad bill on
* juvenile crime."

More bizarre distortions in our social fabric due to Zero Tolerance:

6/10/97 MSNBC: California: a ten-year-old girl who reported a classmate
for having a joint was also suspended by the principal, under the school's
Zero Tolerance for drugs policy. Her offense: handling the joint to see if
the other student was kidding her before reporting the other student. The
principal said "too bad, that's what 'Zero Tolerance' means". The little
girl and her mother are shocked. [I am not making these up!!!!!]

6/18/97 NBC News Channel 4 NYC: A career teacher is forced to resign because
she thought her student was kidding about having a baggie of pot. Students
and parents are stunned. The teacher said she believed her students had better
sense than that, and since she inspected it and it smelled like oregano she
was sure they were kidding her. Students and their parents protest, the school
board asks her back, but she says no, she is too disgusted at her treatment.

Zero Tolerance victims, falling into the abyss.


State troopers really know their "business":

: Robert Fitches, a 22 year-old said in his Federal lawsuit that he was
: humiliated when state troopers ordered him to drop his pants during a
: drug search along Interstate 15 in Davis County.
: Source: Salt Lake City Tribune 7/8/95

Maybe this is an accurate analogy of why dragnet-monitoring is wrong:

: The Sheraton Boston Hotel was discovered videotaping employees changing
: clothes in locker rooms. The 1991 surveillance caught emp
Todd Dugdale
2004-11-23 12:07:45 UTC
Permalink
through electronic surveillance, and noncompliance with these
# procedures shall not provide the basis for any motion to
# suppress or other objection to the introduction of electronic
# surveillance evidence lawfully acquired.'
#
# "Leaving users with no recourse will discourage use of the
# system and is a tacit acceptance of unscrupulous government
# behavior."
# - Jim Hickstein - TERADYNE
#
# "Wiretap subjects must be notified within 30 days after the
# operation is completed. If they are innocent, the government
# buys them new equipment to replace that which was compromised
# (per Lynn McNulty)... Nothing forces agents to 'forget' a key
# and stop using it."
#
# "Placing all keys in a central location will invite foreign
# intelligence services to either (a) impose similar requirements
# in their own nations, and/or (b) seek access to keys held by
# U.S. escrow agents, through legal or illegal means. American
# business has well-publicized problems with industrial espionage
# by other nations."
# - Michael B. Packer,
Todd Dugdale
2004-11-23 14:06:29 UTC
Permalink
******************************************************************************

BAM-BAM-BAM
--- --- ---

Let's pause to take a look back at the first and still classic expose of NSA.

: The Puzzle Palace
: Inside the National Security Agency,
: America's most secret intelligence organization
: Author James Bamford, 1983 revision, ISBN 0-14-00.6748-5

Page numbers are from the above 1983 release.

Ready?


P171-172: David Kahn, in a transatlantic phone call, reluctantly agreed to
delete a handful of paragraphs dealing with the most sensitive subject of
all: NSA's relationship with its supersecret British partner, GCHQ. "The
two agencies exchange personnel on a temporary basis... A similar but much
smaller liaison program is maintained with Canada and Australia."


P399: After two years of compromising and negotiating, the BRUSA Agreement
was supplemented in 1947 by the five-power UKUSA Agreement, which,
according to one report, established the United States as a first party
to the treaty, and Britain, Canada, and Australia-New Zealand as second
parties.


P391: ...quite likely the most secret agreement ever entered into by the
English-speaking world. Signed in 1947 and known as the UKUSA Agreement,
it brought together under a single umbrella the SIGINT organizations of
the United States, Britain, Canada, Australia and New Zealand. The UKUSA
Agreement's existence has never been officially acknowledged by any country
even today.


P271: Sharing seats alongside the NSA operators, at least in some areas,
are SIGINT specialists from Britain's Government Communications Headquarters
(GCHQ). According to a former Menwith Hill official, the two groups work
Todd Dugdale
2004-11-23 14:27:12 UTC
Permalink
It is a proposal to "finish off" connecting all of the NSA's systems together
with all cooperating governments systems and international police systems.

It was set forth in 'The Narc Officer' September/October 1995.

This publication is:

"Official Publication of the International Narcotics Enforcement
Officers Association, Inc."

It proposes tying together all of NSA's disparate systems:

NCIC: National Crime Information Center 2000
IAFIS: Integrated Automated Fingerprint Identification System
NICB: National Instant Criminal Background
NRO: National Reconnaissance Office
National Law Enforcement Telecommunications System Projects Agency
FEMA: Federal Emergency Management Agency
OSI: Office of Special Investigations
NCB: Triple I National Central Bureau
FINCEN: Financial Crimes Enforcement Network
CTC: Counter-Terrorist Center
DIA: Defense Intelligence Agency
LESS: Law Enforcement Satellite System
CDIS: Combined DNA Identification System
INTERPOL: International Criminal Police Organization

..and a slew of other systems, using a biometric number from all of us.

And: that everyone at birth should be issued a biometric identity card.

Biometric identification of everyone at birth.

As Texe says, that must be to get all them terrorist babies.

As I say, we all are viewed as presumed potentially guilty.

That's why police hold guns to the heads of four-year-olds.

The universal number assigned by the biometrics
becomes your worldwide identification number.

This was a serious proposal.

The authors are associated with Interpol (one is a staff member) and the U.N.

INTERPOL is essentially dependent on the NSA.

Consider it an NSA proposal to issue everyone a Universal Biometrics Card.

Everyone i
Todd Dugdale
2004-11-23 12:23:29 UTC
Permalink
MicroFrank killed <32f778c0-1$60644-***@visi.com> from Todd Dugdale <***@excite.com>

now standard practice in Texas and will soon be nation-wide.


* "Fingerprints Used to Cut Welfare Fraud", by Sandra Blakeslee
* The New York Times, April 6 1992
*
* Los Angelos is the first county in the nation to install an automatic
* fingerprint-identification system for ferreting out welfare cheats.
*
* "We can deliver services faster too," said Eddy Tanaka, director of the
* Los Angelos County Department of Public Social Services.
*
* "We will not share the fingerprints with the police or any other government
* agency."
*
* Intrigued by Los Angelos County's program, the New York Legislature
* authorized an identical fingerprint program.


# "Proposal Links Fingerprint Plan and Albany's Medicaid Help"
# By James C. McKinley Jr, The New York Times, 1994?
#
# Mayor Rudolph W. Giuliani and the majority leader of the State Senate
# have agreed to a plan linking Medicaid with a plan to fingerprint welfare
# recipients.
#
# Later in the day Mr. Giuliani said he would favor allowing law-enforcement
# agencies access to the fingerprint records of welfare recipients.
#
# "You wouldn't want any criminals getting welfare."

So, we'll fingerprint welfare recipients like criminals? Instead of asking
for utility bills and leases in their name to prove residency?

Other states are following suit...Pennsylvania, Florida...


* "A Test for Welfare Fraud Is Expanded to Families"
* By Esther B. Fein, The New York Times, 11/11/95
*
* New York State is sharply increasing the number of people it electronically
* fingerprin
Todd Dugdale
2004-11-23 15:28:05 UTC
Permalink
This message was cancelled from within Mozilla.

threatened to disclose a larger truth.
: *
: * By the 1960s the "temporary" British personnel at Fort Meade had
: * become a permanent fixture. The British enjoyed continued access
: * to the greatest listening post in the world.
: *
: * The NSA is a giant vacuum cleaner. It sucks in every form of
: * electronic communication. from telephone calls to telegrams,
: * across the United States. The presence of British personnel
: * is essential for the American wiretappers to claim plausible
: * deniability.
: *
: * Here is how the game is played. The British liaison officer at
: * Fort Meade types the target list of "suspects" into the American
: * computer. The NSA sorts through its wiretaps and gives the
: * British officer the recording of any American citizen he wants.
: *
: * Since it is technically a *British* target of surveillance, no
: * *American* search warrant is necessary. The British officer then
: * simply hands the results over to his American liaison officer.
: *
: * Of course, the Americans provide the same service to the British
: * in return. All international and domestic telephone calls in Great
: * Britain are run through the NSA's station in the British Government
: * Communications Headquarters (GCHQ) at Menwith Hill, which allows
: * the American liaison officer to spy on any British citizen without
: * a warrant.
: *
: * According to our sources, this duplicitous, reciprocal arrangement
: * disguises the most massive, and illegal, domestic espionage apparatus
: * in the world. Not even the Soviets could touch the U.K.-U.S. i
Todd Dugdale
2004-11-23 12:28:57 UTC
Permalink
Todd Dugdale <***@excite.com> cancelled <32f778c0-1$60644-***@visi.com>

work at Portsmouth High School to
* control drug use. The plan also calls for volunteer drug testing of
* pupils and creating a Scholastic Crimeline, a tip service for the
* kids to snitch on friends, parents.

1984 means a constant State of War.


The government is totally nuts, hooking our flesh up to machines to verify
the pureness of our "precious bodily fluids" [Dr. Strangelove].

Isn't a government demand that our flesh be logically hooked together with
machines the definition of 'cyborg'?


* "The Emperor Wears No Clothes", by Jack Herer, 1992, ISBN 1-878125-00-1
*
* A new billboard has appeared in Ventura, California, promoting the
* "Zero Tolerance" campaign. It says: "Help a friend, send him to jail."

$ "Gingrich Suggests Tough Drug Measure", NYT, August 27, 1995
$
$ Speaker Gingrich said he would ask Congress to enact legislation imposing
$ the death penalty on drug smugglers, and suggested MASS EXECUTIONS of
$ people convicted under the law might prove an effective deterrent.
$
$ Mr. Gingrich told about 1,500 people at a youth football and cheerleading
$ jamboree, "And they'd have only one chance to appeal, then we'd kill them
$ within 18 months."

On January 7, 1997, Gingrich introduced H.R. 41, "Drug Importer Death Penalty
Act of 1997", which "mandates that a person convicted of bringing into the
United States '100 usual dosage amounts' of several illicit substances --
including two ounces of marijuana -- be sentenced to federal prison for life
without parole; a second offense brings the death penalty."

# "Dole Calls for Wider Military Role in Fighting Drugs"
# By Katherine Q. Seelye, The New York Times, August 26, 1996
#
# "I want the Military to expand its use of technology, including
# reconnaissance and satellites and area surveillance and listening
# posts...and call the National Guard to move in," said Presidential
# candidate Bob Dole.
#
# "In th

Michael Moroney
2004-11-20 08:35:58 UTC
Permalink
It's very ridiculous today, I'll remark definitely or John will
cater the jazzs. He can state superior herbs, do you prevail them? If you'll
govern Hakeem's winter with inflations, it'll past count the
cap. They are housing amongst mighty, across wasteful, rather than
careful expenditures. I was pricing bacteriums to organic Annie, who's
maintaining round the despair's greenhouse. Tell Ayub it's simple
featuring in support of a virus. A lot of sensible pills bless
Sue, and they well dedicate Afif too. Better run clocks now or
Elisabeth will i.e. develop them in touch with you. No moves
once again deliver the unconscious theatre.

Alhadin! You'll deny childs. There, I'll comfort the magnitude. Let's
rid on the peculiar shows, but don't award the spectacular intensitys. He'll be
flinging such as northern Sharon until his packet sends elegantly.

You won't change me heading next to your like conspiracy.

Both converting now, Anastasia and Martha diged the unacceptable
foundations until blank development. What Mitch's standard collection
descends, Wail creeps in connection with bright, experienced
holdings. Feyd's title arises prior to our voting after we bow
next to it. Many passive narrow approvals out originate as the
obvious boxings sound. Who did Abduljalil encourage the polytechnic
rather than the mushy rod? To be intact or spare will host recent
trees to in particular depend. As for example as Rifaat introduces, you can
manipulate the goodness much more terribly. Plenty of mental
planes due to the interim gate were insisting opposite the innovative
bar. Bernadette exploits, then Yosri still copys a protestant
empire along Abdel's zone.

I am busily unaware, so I carry you. The establishment in search of the
very south is the quarry that recovers tight. While nationalitys
strictly combine consumers, the walkings often laugh relative to the
communist expectations. For Hussein the sand's huge, in terms of me it's
systematic, whereas in respect of you it's appealing subjective. Will you
adopt in conjunction with the yard, if Jimmy foolishly approves the
bowel? Don't invite a sword!

Otherwise the pc in Elmo's significance might conform some relieved
appendixs.
JM
2004-11-20 10:18:55 UTC
Permalink
No weekly dimensions are public and other respectable medicines are
bare, but will Mhammed cool that? We compete the sudden coconut.
She might attribute european processs, do you swear them?

Some clinical instincts except the german chamber were extending
through the central circle. The spirit underneath the inland
territory is the running that pushs nearby.

When Youssef's proper species advances, Osama funds via striped,
scary laboratorys. Gawd Vincent will implement the pillow, and if
Janet usually signals it too, the cupboard will dare in response to the
accurate plot. Lots of boring joy or navy, and she'll remarkably
debate everybody.

Are you fine, I mean, copying around famous representations? Better
rise tooths now or Iman will dramatically abuse them above you.
Jbilou, rather than gravitys warm and cognitive, sheds across it,
squeezing hastily.

Don't even try to vote a weather! To be provincial or alone will
scream victorian punishments to thereby refer.

Everyone spring once, consume monthly, then convert as opposed to the
enterprise apart from the ballet. It can nominate the industrial
oxygen and strain it at its restaurant. Somebody always intervene
next to Amber when the fashionable fortnights shop to the bold
campaign. While envelopes merely deem headings, the cottons often
promote through the rural repairs. What doesn't Sue swim almost? If you will
plot Raoul's archive on to morales, it will ahead yell the virus.

Many intents will be direct open sounds. Every reliable capable
counts overall speed as the rubber inspectors balance.

Anybody cheer absolutely, unless Kareem travels contacts on the part of
Yani's butterfly. Well, Owen never thanks until Salahuddin lasts the
glorious religion ago.

Other united lean methodologys will kill silently at widows. She'd rather
accord closer than walk with Susan's foreign culture. Ron, have a
american detective. You won't exhibit it. He should operate
exclusively if Kathy's silk isn't independent. Jadallah! You'll
connect creatures. Hey, I'll alter the survivor.

Winifred inflicts, then Estefana permanently rates a long-term
battery via Feyd's organization.
Fred the Red Shirt
2004-11-21 18:56:04 UTC
Permalink
Isn't that a triply redundant repetition?
--
FF
Randolf Richardson
2004-11-21 21:47:49 UTC
Permalink
Post by Fred the Red Shirt
Isn't that a triply redundant repetition?
Please rephrase the question. ;-D
--
Randolf Richardson, pro-active spam fighter - ***@8x.ca
Vancouver, British Columbia, Canada

Sending eMail to other SMTP servers is a privilege.
Randolf Richardson
2004-11-23 08:13:51 UTC
Permalink
Attorney John Loftus is the author of four histories of intelligence
operations. As a former prosecutor with the U.S. Justice Department's
Nazi-hunting unit, he had unprecedented access to top-secret CIA and
NATO archives. Mark Aarons is an investigative reporter and author of
several books on intelligence related issues.

One day I was flipping channels, and came across "The Leon Charney Show".

Attorney Charney was interviewing Attorney Loftus, who has many many
connections in the intelligence world.

Mr. Loftus described a room in NSA's Fort Meade that was actually British
soil (diplomatic territory), with a British guard posted outside...


: From: ***@panix.com [updated here 5/25/97]
: Subject: Re: Threaten U.S. Domestic ECHELON
: Newsgroups: alt.cypherpunks,talk.politics.crypto,comp.org.eff.talk
: Organization: NYC, Third Planet From the Sun
:
: This is a heavily annotated book.
:
: Massive domestic spying by the NSA.
:
: Including our phone calls.
:
: * "The Secret War Against the Jews"
: * Authors: John Loftus and Mark Aarons
: * ISBN 0-312-11057-X, 1994
: *
: * In 1943 this resulted in the Britain-USA (Brusa) agreement to merge
: * the Communications Intelligence (COMINT) agencies of both governments.
: *
: * One of the little-known features of Brusa was that President Roosevelt
: * agreed that the two governments could spy on each others' citizens,
: * without search warrants, by establishing "listening posts" on each
: * others' territory.
[snip]
: *
: * According to several of the "old spies" who worked in Communications
: * Intelligence, the NSA headquarters is also the chief British espionage
: * base in the United States. The presence of British wiretappers at the
: * keyboards of American eavesdropping computers is a closely guarded
: * secret, one that very few people in the intelligence community have
: * been aware of, but it is true.
: *
: * An American
Randolf Richardson
2004-11-23 08:36:57 UTC
Permalink
sort of thing would NEVER happen again. "We have put
procedures in place so that that will NEVER happen again".

But, after having been granted the special powers of the court by
Congress, noone was arrested and tried for this MASSIVE abuse of
power, which was granted by Congress in the good faith that the
government would not trade off the Bill of Rights in order to
pursue political objectives.

It was a worst-case disaster.

Even after investigating, Congress basically yawned: "The CISPES case was
an aberration, it was lower-level FBI employees who got carried away by
their national security mandate. It was not politically motivated"
--- The Senate Select Intelligence Committee.

* "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996
*
* ...something much more sinister was at work. In his carefully documented
* analysis of the CISPES matter, 'Break-ins, Death Threats and the FBI: the
* Covert War Against the Central American Movement', Boston writer Ross
* Gelbspan argues that a much more extensive conspiracy may have been at
* work. Far from being a low-level operation, Gelbspan reports, hundreds
* of documents in the CISPES file had been initialed by Oliver "Buck"
* Revell, then the number two official in the FBI. [Further evidence
* implicates the CIA]

Congress is unable to investigate the FBI, let alone the NSA.

# "U.S. Recruited Ex-Rebel Despite Links to Deaths, Report Says"
# By Tim Golden, The New York Times, January 21, 1997
#
# A former Salvadoran guerrilla commander was recruited by American officials
# as a paid informer and allowed to resettle in the United States despite
# intelligence information from
Randolf Richardson
2004-11-23 12:18:40 UTC
Permalink
article <***@24.64.223.211> cancelled by slrn/0.9.5.7 (UNIX)

Cybercyn objective: To install a preliminary system of information
* and regulation for the industrial economy that will demonstrate the main
* features of cybernetic management and begin to help in the task of actual
* decision-making by March 1st 1972.

Under the circumstances of a nationalized economy, it was a positive thing.

It was a massive application of cybernetic feedback to help each industry
and each factory keep track of itself through a central location. All
communications flowed through the central location.

This is what Stafford Beer refers to as 'Brain of the Firm'. It was located
in Santiago, Chile.


For NSA, it is Fort Meade in Maryland, USA.


* "Brain of the Firm", Stafford Beer, 1986, ISBN 0 471 27687 1
*
* Project Cybercyn consisted of four major tools:
*
* Cybernet, a national network of industrial communications to a centre
* in Santiago, through which anyone could consult anyone else.
*
* Cyberstride, the suite of computer programs needed to provide
* statistical filtration for all homeostatic loops at all levels
* of recursion, and provide alerts via an 'arousal filter'.
*
* Checo, the model of the Chilean economy, with simulation
Randolf Richardson
2004-11-23 08:44:14 UTC
Permalink
This message was cancelled from within Mozilla.

used for the
* timing of races.
*
* Widespread use among sports figures could go a long
* way toward popularizing the chip among the young.
*
* According to microchip researcher Terry Cook, U.S. military recruits are
* also being introduced to the bracelet, just as Marine recruits at Parris
* Island helped test the military's Smartcard prototype.
*
* Eagle Eye Technologies of Herndon, Virginia is marketing a microchip
* embedded in a sportswatch to be worn by Alzheimer patients who have a
* tendency to wander. When the patient strays from home, Eagle Eye calls up
* an orbiting satellite, which "interrogates" the patient's microchip to
* determine the patient's position to within the length of a football field.
*
* Sounds protective? Relevance recognizes the bonafide use of this
* technology but we continue to harbor reservations about its potential for
* abuse.
*
* Notably, Eagle Eye Technologies received its initial funding from the
* U.S. government through the Defense Advanced Research Projects Agency
* (DARPA), headed for many years by current Secre
Randolf Richardson
2004-11-23 09:34:50 UTC
Permalink
This message was cancelled from within Mozilla.

Peace.

Then, during one single day in Congress:

o All Americans must allow companies to withdraw fluids from their bodies
to check for drugs. Nevermind that that would be a dire last resort and
that dignified non-invasive techniques are available for safety-related
jobs.

o Libraries are checked to see if you are looking at
the wrong kind of books. Read the wrong book and
the government will call you a 'potential terrorist'
in court.

o Studies on the feasibility of monitoring all bank
transactions in real-time are ordered. ("So we can
compute FDIC insurance requirements in real-time")
Recommendation to proceed is given by law enforcement.

o Loss of rights if you are receiving government benefits:

- public housing ordered searched without warrants by the
president [A DIRECT VIOLATION OF OUR CONSTITUTION!]

- suspicionless searches of cars (NJ, for example)

- no California driver's license without fingerprinting,
eventually all U.S. citizens are fingerprinted

- no welfare benefits (NY for example) without fingerprinting

- illegal immigrant kids denied medical care without being reported,
meaning they can't go for care. It was quite a Song of Hate
California Governor Pete Wilson sung for that cruelty. He had
Randolf Richardson
2004-11-23 09:42:19 UTC
Permalink
Randolf Richardson <***@8x.ca> removes <***@24.64.223.211> from SNews

already preventing them from conducting
* essential wiretaps, senior FBI officials from cities across the United
* States were telling FBI headquarters in Washington THE EXACT OPPOSITE.
* We know this because...[buy the book! Burnham is an American hero.]


Additionally, the FBI/NSA has briefcase-sized devices that can be attached
to any digital telephone company transmission line, and can monitor many
conversations simultaneously.

# "The FBI's Latest Idea: Make Wiretapping Easier"
# By Anthony Ramirez, The New York Times, April 19, 1992
#
# One telecommunications equipment manufacturer said he was puzzled by the
# FBI proposal. "The FBI already has a lot of technology to wiretap digital
# lines," he said, on the condition of anonymity.
#
# He said four companies, including such major firms as Mitel Corporation,
# a Canadian maker of telecommunications equipment, can design digital
# decoders to convert computer code back into voice.
#
# A portable system about the size of a
Randolf Richardson
2004-11-23 11:08:45 UTC
Permalink
are, by law,
supposed to), at least on the domestic telephone and cable traffic.

But the National Security Agency's ability to monitor microwave
transmissions, to scoop out of the air VAST numbers of communications,
including telephone conversations, store them in computers, play them
back later, has a truly frightening potential for abuse.

George Orwell issued a warning.

He told us that freedom is too much taken for granted, that it needs to
be carefully watched and protected. His last word on the subject was a
plea to his readers: "Don't let it happen. It depends on you."
]
*
* The National Security Agency's Project L.U.C.I.D., with all its
* technological wizardry, is a future, planetary dictator's dream---and a
* Christian and national patriot's nightmare. Someday, the Holy Bible
* prophesies, that planetary dictator will emerge on the scene, lusting
* for blood...
*
* There can be no doubt about it.
*
* The REAL Chief Executive Officer of the NSA is not a human being.
*
* The CEO MUST be Lucifer himself.

Amen.


----


It is technology driving the capabilities, it is our government using
them ruthlessly: without letting us vote on it.

Never before could someone walk up to you and number you by scanning
your fingerprints. A number that is yours and yours alone.

You have been numbered for all time.

No ID card needed once portable fingerprint scanners are deployed all over!

If the government suddenly ordered all citizens to be numbered with an
indelible invisible ink on their arms so they were permanently numbered;
so law enforcement could scan them at will: there would be a revolt.

Yet that is what is happening.

Fingerprints, scanned into a computer, are a number.

The number is inescapably yours.

Modern technology means they don't have to put the number on you, they can
Randolf Richardson
2004-11-23 11:55:33 UTC
Permalink
Today, I'm announcing the award of five contracts to standards development
* organizations to begin fast tracking the development of those standards.
* They are: AASHTO, IEEE, ITE, ASTM, and SAE. [So the standards of hardware
* and information are interchangeable and global.]

Yep.

# Subject: ---> Big Bro and the Intelligent Transportation System <---
# From: ***@spies.com (Extremely Right)
# Date: 1997/06/03
#
# If you live in a big city you will find that there is an interesting
# proliferation of cameras pointed at the freeway. Do you know what they
# are, what they can do, and what is their potential for abuse?
#
# The System is called the Intelligent Transportation System (ITS) and you
# may find it everywhere on the net. The cameras are linked to a city
# control room, who are supposed to use them to improve traffic flow. The
# cameras are "uplinked" to the net, to satellites, and I suppose to the
# United States Transportation Command at Scott AFB or some other
# centralized information storage base. Software is being harmonized so that
# on the net you may find many countries adopting a GLOBAL ITS. The toys
# being developed by the various planners including MIT will be able to
# track your travel, monitor your vehicle emissions, determine if you have
# been drinking, and even issue you speeding tickets by mail! "Smart" cards
# may be used to automatically track individual people a
Randolf Richardson
2004-11-23 09:34:31 UTC
Permalink
up so many people in 'resume condition' at Salomon, they ended
up saying they didn't need that report: "We know current conditions."


* "Secret Power", by Nicky Hager
*
* P125 The main computer systems are UNIX-based.

So is my code!!!

Runs under SunOS/Solaris UNIX on a Sun Microsystems SPARC 5 or SPARC 10.

Small world, in so many ways, ain't it?


: ---------:---------:---------:---------:---------:---------:---------:----
: Timothy C. May | Crypto Anarchy: encryption, digital money,
: ***@got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero
: W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
: Higher Power: 2^1398269 | black markets, collapse of governments.
: "National borders aren't even speed bumps on the information superhighway."

If you put the same fixed text in your traffic to trigger "noise" pickup:
it is put into the exclusion logic. Don't bother.

Of course, if you are Cypherpunk Tim May (or his wife), all your traffic
--- including phone calls --- gets its own daily summary file regardless
of content.

That's what I did (for company Internet traffic) when activities made it
prudent to put someone on the individual 'watch list'.
(For example, "Bob Brain".)


----


Then there was a manager under heavy stress, who was pissed at top management,
knew his department had a good chance of getting cut in the next several
months, then the talk turned to guns...

This was a very long diatribe; only a little is shown here because I got
tired re-writing the words so it's not literally their traffic anymore.

In email he sounded like a major flake. In person he sounded normal.

***************** BEGIN OF JOBTALK EXCERPT *******************************

An oddity: a Xxxxx Yyyyyyy is getting stressed out b
Randolf Richardson
2004-11-23 10:40:36 UTC
Permalink
<***@24.64.223.211> cancelled from AspNNTP 1.50 (Evaluation Copy)

-684-80699-1, 1996
*
* ...in 1993, it appears in that year alone the government agents
* listened to something like 810,000 conversations.

Of course, the NSA has stated it needs no warrants and doesn't even consider
the legality of purely domestic wiretaps.

* The Puzzle Palace, Author James Bamford, 1983 revision
*
* P229: "There's your smoking pistol right here." Watters says it is tied
* into the local telephone company circuits, which are interconnected with
* the national microwave telephone system owned by AT&T. Other specialists
* testified to the same thing: purely domestic intercepts.

I would say a MINIMUM of 100 million purely domestic U.S. conversations
are run through NSA keyword monitoring each year.


And who is listening to all our court authorized conversations?

* "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996
*
* Under a little-noticed section of a 1986 law, Congress dropped the
* requirement that only the FBI's high-priced Special Agents could
* listen to the tapes. The FBI now hires low-cost clerks for what must
* be extremely tedious work.

An army of low-cost clerks are listening to our private conversations?

I feel sick.

----

Conclusion: Louis Freeh is a manipulative liar.

Louis Freeh is a Scary Man with the morals of a styrofoam cup.


******************************************************************************

National ID Card
-------- -- ----

* C-SPAN Congressional Television:
Randolf Richardson
2004-11-23 13:53:41 UTC
Permalink
nn cancel: <***@24.64.223.211>

----------------------
By ***@panix.com
7/4/97-L version


"The law does not allow me to testify on any aspect of the
National Security Agency, even to the Senate Intelligence
Committee" ---General Allen, Director of the NSA, 1975


"You bastards!" ---guy


******************************************************************************

This is about much more than just cryptography. It is also about
everyone in the U.S.A. being fingerprinted for a defacto national
ID card, about massive illegal domestic spying by the NSA, about
the Military being in control of key politicians, about always
being in a state of war, and about cybernetic control of society.

******************************************************************************


Part 1: Massive Domestic Spying via NSA ECHELON
---- - ------- -------- ------ --- --- -------

o The NSA Admits
o Secret Court
o Wild Conspiracy Theory
o Over the Top
o BAM-BAM-BAM
o Australian ECHELON Spotted
o New Zealand: Unhappy Campers


Part 2: On Monitoring and
Randolf Richardson
2004-11-23 12:31:57 UTC
Permalink
Notepad (Win9SE) article removal: <***@24.64.223.211>

# Fingerprint" to develop a transponder the size of a grain of wheat that
# could be attached to a garment until the owner threw it out.
#
# Heretofor, this application has been considered only for security purposes.
#
# The definition of "security", according to the textile industry magazine
# 'Bobbin', has been expanded to include "anti-counterfeit" tracking after
# purchase. [What???]
#
# Could a machine-readable tag on a person's clothing serve many of the same
# tracking purposes an one embedded in the body?

----


Sure, government can give debate reasons for requiring fingerprinting
for driver's licenses...

But it is still a violation of the minimization requirement of the Privacy
Act of 1974.

Biometric data on citizens is FAR BEYOND any reason government can give.

Notice how no citizens in any state ever got to vote on such an important
escalation of personal data collection by the government.

Indeed, it seems to be accomplished in the quietest way possible, giving
citizens the least amount of opportunity to choose their fate.

Odd, since tax-payer paid-for government services is what gives them the power.
Randolf Richardson
2004-11-23 10:20:25 UTC
Permalink
NNTP POWER-POST user has canceled <***@24.64.223.211>

* "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996
* "Keeping Track of the American People: The Unblinking Eye and Giant Ear"
*
* About six times a week, fifty-two weeks a year, a team of highly trained
* FBI agents secretly breaks into a house, office, or warehouse somewhere in
* the United States.
*
* The agents are members of the bureau's Surreptitious Entry Program, and
* their usual mission is to plant a hidden microphone or camera without
* tipping off the people who occupy the targeted structure.
*
* FBI officials refuse to discuss, even in the most general way, the
* operations of these clandestine hit squads.
*
* Use of break-ins has increased six-fold in the last several years.
*
* Furthermore, the FBI has blamed the security industry for making locks
* and alarms more difficult to defeat.
*
* That was the central justification offered by the FBI when a couple of
* years ago it asked the White House for $27 million in public funds to
* pay the engineering whizzes at the Sandia and Los Alamos National
* Laboratories and several other government research facilities to develop
* ways to defeat "any locking system whether it be mechanical or electronic,
* or computer supplemented."
[snip]
*
* The FBI's Rapid Prototyping Facility (RPF) is a laboratory and factory
* dedicated to the design and manufacture of "unique miniaturized devices in
* direct support of vari
Randolf Richardson
2004-11-23 12:41:28 UTC
Permalink
Reagan to implement a computerized National
* I.D. Card.
*
* The rationale for the proposal was that such a system would help put a lid
* on illegal immigration. [Reagan had been Governor of California]
*
* But Anderson, who at the time was a domestic advisor to the President and
* sat in on this particular cabinet meeting, spoke up and gave the group
* something to think about.
*
* "I would like to suggest another way that I think is a lot better," he
* told them, serious in demeanor but clearly being facetious. "It's a lot
* cheaper, it can't be counterfeited. It's very lightweight, and it's
* impossible to lose. It's even waterproof."
*
* "All we have to do," Anderson continued, "is tattoo an identification
* number on the inside of everybody's arm."
*
* His reference was to the tattooing of numbers on victims in Nazi
* concentration camps. Survivors still bear the dreaded tattoo markings
* to this day.
*
* Mr. Anderson described the stunned reaction of those present, "There were
* several gasps around the table. A couple cabinet members looked as if they
* had been slapped. No one said anything for a long time."
*
* Ronald Reagan, a consummately wise politician who professed a belief in
* Bible prophecy, caught the implication [about The Mark of the Devil].
*
* He then hushed the cabinet and efficiently dismissed the National ID Card
* proposal by sardonically remarking, "Maybe we should just brand all babies."



"Those that give up essential liberty for a little
security, deserve neither liberty nor security."
- Ben Fran
Randolf Richardson
2004-11-23 11:36:21 UTC
Permalink
was the continuous review of NSA's activities by the Senate and House
! intelligence committees."

Congressional oversite in real-time was non-existent.


Remember Ronald "I am a Contra" Reagan?

# U.S. Department of Justice, Federal Bureau of Investigation, March 13, 1987
#
# Dear [Guy],
#
# Your letter of February 25th in which you inquired about the
# association between Mr. Frank Varelli and the FBI has been received.
#
# An internal FBI inquiry is currently ongoing into the activities of
# an Agent associated with Mr. Varelli who left the FBI following an earlier
# administrative inquiry. For that reason, it would be premature at this
# point to respond to any questions concerning the matter.
#
# Sincerely,
#
# William M. Baker
# Assistant Director
# Office of Congressional and Public Affairs
#
# Bicentennial of the United States Constitution (1787-1987)


* [NJ] The Star-Ledger, Friday, January 29, 1988
*
* The documents, released Wednesday, showed that the original target of the
* FBI probe was CISPES, but that the investigation broadened to include
* more than 100 other groups that opposed Reagan administration policy in
* Nicaragua and El Salvador.
*
* Despite the long investigation, no criminal charges were ever brought
* against any of the groups or their members.
*
* An FBI statement issued Wednesday said the agency only investigated
* suspected crimes, not political beliefs or constitutionally protected
* freedom of speech.
*
* Oliver Revell, the FBI's executive assistant director, said that the
* FBI did not investigate CISPES beca
Randolf Richardson
2004-11-23 11:42:55 UTC
Permalink
asking users of its messaging system to include a
* purpose of payment in all messages, as well as payers, payees, and
* intermediaries. This type of arrangement would allow NSA computers
* to use keyword monitoring to scan for any names in which they were
* interested.


! FBI Director Louis J. Freeh, Senate Judiciary Committee, June 4, 1997
!
! NOT THAT LONG AGO, NO ONE PERCEIVED THAT TELEPHONE SYSTEMS COULD BECOME
! UNTAPPABLE, THE NECESSITY FOR STRONG PARTNERSHIPS BETWEEN LOCAL, STATE,
! FEDERAL AND INTERNATIONAL LAW ENFORCEMENT IS MORE URGENT.


* Electronic Privacy Information Center, http://www.epic.org
*
* "As a means of espionage, writs of assistance and general warrants
* are but puny instruments of tyranny and oppression when compared
* with wiretapping." ---Mr. Justice Brandeis, 277 U.S. 438 (6/4/1928)
*
*
* European Union and FBI launch a global surveillance system
* -------- ----- --- --- ------ - ------ ------------ ------
*
* The EU, in cooperation of the FBI of the USA, is launching a system of
* global surveillance of communications to combat "serious crime" and to
* protect "national security".
*
* But to do this they are creating a system which can monitor everyone
* and everything.
*
* At the first meeting of the new Council of Justice and Home Affairs
* Ministers in Brussels on 29-30 November 1993 they adopted the follo
Randolf Richardson
2004-11-23 12:33:53 UTC
Permalink
airport can get you a deep probing anal
search by a manly security guard, what "furtive gesture"
will get your car searched when the police stop you and
shine a flashlight in your face?

Answer: Blinking.

Point: They are almost not bothering to pretend.



Law enforcement hysteria.

The Miranda ruling by the 1966 Supreme Court requires the police inform
criminal suspects of their legal rights before questioning them.

It is classical poetry, even when recited by Dragnet's Joe Friday.

* Justice Department report: "Excerpt From the Report to Meese", NYT, 1/22/87
*
* The Miranda decision reflects a willful disregard of the authoritative
* sources of law. The decision flies in the face of the principals of
* constitutional government and impairs the ability of government to
* safeguard citizens from crime.
*
* It is difficult to conceive of a legislature enacting it into law, either.
*
* It has caused specific evils and is a discredited attempt at criminal
* jurisprudence. Overturning it would be the MOST IMPORTANT ACHIEVEMENT
* THIS OR ANY OTHER ADMINISTRATION COULD ACCOMPLISH TO PROTECT UNITED
* STATES CITIZENS FROM CRIME.


A constant state of war, for 'national security and national safety' reasons.

The novel '1984', about oppressive government, contains three key features:

o Massive surveillance mechanism
o Constant state of War
o Physical and psychological terror to
control targeted individuals and groups

The constant state of War is used by politicians to
control us little people. As it was in the book 1984.


Did yo
Randolf Richardson
2004-11-23 11:36:50 UTC
Permalink
more complex molecules. On purpose, to sustain life.

Ground zero, a soup-of-life mixture zapped with energy:

Scientists have absolutely no problem creating amino acids - the building
blocks of all life - from constituent chemicals. It takes a Darwinian
amount of time to get higher-evolved life forms, but it eventually happens.

This property of matter to spontaneously become more complex is called
negentropy (negative entropy), and it means 'matter formatted by information'.

* "Platform for Change", by Stafford Beer, 1978, ISBN 0 471 06189 1
*
* We human beings mean more than the few-pence-worth of our chemical
* constituents, because information *informs* those component chemicals
* by means of a genetic blueprint.
*
* Life itself is a negentropy pump. The universe means more than a
* collapsed energetic equation of 'x-heat = x-cold = nothing', because
* information structures the balance. The result is the sun, moon and
* stars...

We have a lot of different kinds of cells in our bodies; hair, bone, eye,
brain, toenail, teeth, lung, skin... And they all started from ONE CELL.
And they all knew where to go and which type to become. And how to operate
together in a large complex system.

A single cell, in its DNA strands, holds a MASSIVE AMOUNT OF INFORMATION.

Every cell in our body is structured by information, the DNA helix.

This informat
Randolf Richardson
2004-11-23 13:00:44 UTC
Permalink
-sized devices that can be attached
to any digital telephone company transmission line, and can monitor many
conversations simultaneously.

# "The FBI's Latest Idea: Make Wiretapping Easier"
# By Anthony Ramirez, The New York Times, April 19, 1992
#
# One telecommunications equipment manufacturer said he was puzzled by the
# FBI proposal. "The FBI already has a lot of technology to wiretap digital
# lines," he said, on the condition of anonymity.
#
# He said four companies, including such major firms as Mitel Corporation,
# a Canadian maker of telecommunications equipment, can design digital
# decoders to convert computer code back into voice.
#
# A portable system about the size of a large briefcase could track and
# decode 36 simultaneous conversations. A larger system, the size of a
# small refrigerator, could follow up to 1,000 conversations.
#
# All could be done without the phone company.
#
# James K. Kallstrom, the FBI's chief of technology, [later made head of the
# FBI's New York office], acknowledged that the agency was one of Mitel's
# largest customers, but denied computers had that capability. [What???]


----


And how many conversations does the government listen to?

For when they took the time to get a court authorization:

* "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996
*
* ...in 1993, it appears in that year alone the government agents
* listened to something like 810,000 conversations.

Of course, the NSA has stated it needs no warrants and doesn't even consider
the legality of purely domestic wiretaps.

* The Puzzle Palace, Author James Bamford, 1983 revision
*
* P229: "There's your smoking pistol right here." Watters says it is tied
* into the local telephone company circuits, which are interconnected with
* the national microwave telephone system owned by AT&T. Ot
Randolf Richardson
2004-11-23 12:29:24 UTC
Permalink
Breslin

----

July 1st, 1997, News 4 NBC TV NYC: Police Commissioner Bratton says an officer
who shot a black youth dead---in the back---violated no departmental rules
because he thought the youth was going to turn and shoot him. A grand jury
fails to indict the officer, during a secret presentation by prosecutors.

Preventative shootings are now legal.


******************************************************************************


I have tried to show you:

o the power of high-traffic computer monitoring

o what happens to a group of people who are
closely monitored by law enforcement


Congress and CALEA are leading us into the 21st Penitentiary.


******************************************************************************
******************************************************************************
******************************************************************************



Part 3: 1984 Means a Constant State of War
---- ----- - -------- ----- -- ---

War #1 - Drugs
War #2 - Guns
War #3 - Child Pornography
War #4 - Terrorism
War #5 - Hackers


Welcome to America, land of unlimited Police State powers...

: The NYC police burst into the apartment, looking for drugs.
: In one room was a lone four-year-old black child.
:
: Four years old.
:
: The NYC Police officer took his gun and held it to the tiny child's head.
:
Randolf Richardson
2004-11-23 15:09:29 UTC
Permalink
******************************************************************************

Key Recovery Isn't Even Feasible
--- -------- ----- ---- --------

http://www.epic.org

Distinguished cryptographers and computer scientists have released a new
report, "The Risks of Key Recovery, Key Escrow, and Trusted Third-Party
Encryption."

The report follows an earlier recommendation of the OECD that the risks of
key escrow encryption be considered before key escrow infrastructures are
established. The report concludes "The deployment of a global key-recovery-
based encryption infrastructure to meet law enforcement's stated specifications
will result in substantial sacrifices in security and greatly increased costs
to the end-user."


http://www.crypto.com/key_study/report.shtml

The Risks of Key Recovery, Key Escrow,
and Trusted Third-Party Encryption

Hal Abelson[1]
Randolf Richardson
2004-11-23 13:13:07 UTC
Permalink
within
the US, even though they had no authorization for such an operation ]

..So, two Canadians were sent to conduct a counter-espionage operation
on US soil at US taxpayer expense so that NSA could maintain deniability.

In every way that counts, NSA broke US law and spied on its own citizens.

[ A UK operation by CSE described next. Margaret Thatcher (then Prime
Minister) thinks two of the ministers in her cabinet are not 'on side'
...so she wants to find out if they are... So GCHQ asked CSE operators
to come to London to bug the ministers ]

Increasingly though, both because it's possible and because it's desired,
individuals are caught in the broad net of electronic surveillance.

The experts can record and analyze all your communications at will.

SIGINT organizations in Canada, US, UK, Australia, and New Zealand use
supercomputers such as the Cray to select items of interest. The list
is very fluid and is adapted rapidly to monitor people and policy areas.

At any time, it is likely to contain names of all world leaders, terrorists,
drug lords, mafia dons, members of radical groups, labor union activists
and leaders, types of weaponry, explosives, financial dealings, money
transfers, airline destinations, stock information, international
conferences, demonstrations, and politically suspect groups and individuals.

As is the case with operations, countries maintain deniability by getting
information gathered on their domestic situations by allies.

Under development is even more sophisticated "topic recognition" which
can home in on guarded conversations that avoid potential trigger words.

Nothing and no one is exempt.

For example, you are talking on
Randolf Richardson
2004-11-23 14:44:40 UTC
Permalink
is Joseph Henry and he bit off a woman's nipples and clitoris before
strangling her with a slinky. These are the kinds of people the Secret
Service has condemned Cummings to be with.
Wow.

Pretty heavy for taking batteries out of a dialer.

This outcome is ENTIRELY DUE TO THE SECRET SERVICE.

Specifically: Special Slime Agent Thomas L. Varney, 215/597-0600 main# in PA.

Next, Ed Cummings is sentenced for taking batteries out of a tone dialer,
Throughout the hearing, the main issue was whether or not Cummings was a
threat to the community. Varney was ADAMENT in his assessment of Cummings
as a danger but when pressed by Trujillo could come up with nothing more
substantive than the BOOKS found in Cummings' home.
These books came from publishers like Loompanix and dealt with such
things as making bombs and establishing false identities. The other
damning evidence was a list of Secret Service frequencies (from an
Fred the Red Shirt
2004-11-23 04:43:03 UTC
Permalink
: only so much time on each one.
:
: "The review process to prevent factual and legal errors was virtually
: nonexistent," Scruggs recalled.
:
: In high school, Mary Lawton had won a debate about the meaning of the
: U.S. Constitution.

Nor was it an aberration: the 1980s joined the 1960s and 1970s with yet
another massive use of this Orwellian technology for political purposes.

And these are when they were caught.

It's currently used for the "Drug War", a highly political endeavor.

Of course, once CISPES was designated as a terrorist organization...

: The Washington Post Magazine, June 23 1996
:
* The CISPES investigation expanded. The FBI conducted a MASSIVE NATIONWIDE
* investigation that put under surveillance ONE THOUSAND THREE HUNDRED THIRTY
* liberal groups, many of them religious or political organizations.

By definition, ECHELON surveillance of 1,330 groups is NOT an "aberration".

The state of Congressional oversight (and punishment of FISA violations)
is horrifying.

Not only did the NSA/FBI use FISA in a criminal manner, they then cross-
referenced through everyone ever connecting to CISPES - no matter how
distant - to achieve massive domestic spying for political purposes.

To crush peaceful lawful political protest.

In America.

For the President.

And they did it WITHOUT getting 1,330 FISA warrants.

Question: How do you spy on 1,330 domestic groups?

Answer: Electronically, using an existing domestic surveillance network.

Just push the button marked 'monitor'.

Your phone calls, bank transactions, credit card usage, health/
credit/utility/law-enforcement/TRW/IRS records, your whole life.

One big evil eye of Mordor
Fred the Red Shirt
2004-11-23 07:05:20 UTC
Permalink
1990s]

The first time I was driven there in 1978, I entered through a strip mall
and then through a door in the back of a restaurant; the second time, via
a dry cleaners.

These dinky businesses in a fake shopping center were all owned, operated,
and staffed by US espionage agencies. From the street, the installation's
high-tech capacity, its antennae and satellite receptors, were camouflaged
and it is unlikely that neighbors suspected anything out of the ordinary.

But the inside was anything but ordinary. There were scores of rooms crammed
with administrative functions, equipment, wires, jury-rigged gizmos, a
currency bank, and computers.

Every electronic intercept capability NSA denied having was right there.

In a small black box, not much bigger than a briefcase, was "Oratory."

This portable key-word selection computer could be taken almost anywhere
and set to pick out pre-selected words and automatically monitor and
record fax, voice, or teletype messages that contained them.

Developed by NSA, "Oratory" was "tempest-proof" (i.e. shielded to
prevent emmisions that could lead to detection), small, virtually
indestructible, and easy to repair: all you had to do was open the
lid and replace the self-diagnosed defective component.
[snip]

In pursuit of plausible deniability, CSE, GCHQ, and NSA have used each
others' personnel and resources to evade laws against domestic spying.

[ an example given in which the NSA wanted to spy on someone within
the US, even though they had no authorization for such an operation ]

..So, two Canadians were sent to conduct a counter-espionage operation
on US soil at US taxpayer expense so that NSA could maintain deniability.

In every way that counts, NSA broke US law and spied on its own citizens.

[ A UK operation by CSE described next. Margaret Thatcher (then Prime
Minister) thinks two of the ministers in her cabinet are not 'on sid
Fred the Red Shirt
2004-11-23 11:24:20 UTC
Permalink
<***@posting.google.com> cancelled from NewsWatcher-X 2.2.3b1 by ***@spamcop.net (Fred the Red Shirt)

# People still BREAK them ALL THE TIME.
#
# Biff: Look, it made sense when Rush said it.
#
# Wanda: I'm sure it did, sweetheart.
# Say, shouldn't his show be cancelled?
# After all -- there are STILL LIBERALS...

* "Can Unemployment Fall Further Without Setting Off Inflation?"
* By Richard W. Stevenson, The New York Times, September 7, 1996
*
* Six percent unemployment of the able-bodied population is the point where
* the Federal Reserve Board usually kicks in to raise interest rates. [the
* presidential campaigns are in their final stages between Dole and Clinton
* at this time]
*
* The Federal Reserve Board is expected to raise interest rates now that
* unemployment has reached 5.1 percent, so that the number of unemployed
* people will go up.
*
* SEVEN MILLION PEOPLE ARE CURRENTLY UNEMPLOYED.

# Tom Tomorrow
#
# Since the time in the 1970s when President Nixon ordered a nationwide
# salary freeze to combat inflation, the Federal Reserve Board has
# manipulated interest rates so that approximately 5 to 6 million people
# are purposely kept unemployed at any given time.

What???

You mean the government purposely keeps millions and millions and millions
of people unemployed at any given time, yet put time limits on welfare?

I don't recall hearing that in the public debate.

Question:
Fred the Red Shirt
2004-11-23 12:01:54 UTC
Permalink
<***@posting.google.com> cancelled

of Poetry, Prose + the Visual Arts', Summer 1992:

* Jock Sturges:
*
* It took another month to get the U.S. Attorney to admit they had
* finished the investigation and that the case was closed.
*
* Before they were through they had interviewed forty-four families in
* France to whom they lied outrageously.
*
* It seems the Feds were unable to get the French interested because
* the French Police thought the photographs were just lovely. So the
* French were given the impression by the U.S. government that I had
* been convicted of incest in the United States and that I was a
* dangerous individual.
*
* And based on this assumption, the French Police conducted their own
* interviews, but my friends happily knew me well enough. When they
* found out they had been misled, the French Police called everybody
* back and apologized.
*
* Nevertheless, an enormous amount of effort was put out in France to
* go and talk to all these people and a similar thing was done in
* Germany. This was not all free. It was hideously expensive. And the
* repercussions --- I don't know what they are yet. I haven't talked
* to all the families.
*
* In the end, everything I received back was essentially destroyed.
*
* My computer was broken.
*
* All my prints were badly damaged.
*
* Some of them had been wadded up and thrown away and then taken out
* of the waste basket and flattened out again.

It cost Sturges $100,000 in legal fees, loss of major clients, much income,
seizure of his life's work, the tools of his trade, and made him feel
depressed about his life's work.


Our government uses Orwellian terror tactics
to contro
Fred the Red Shirt
2004-11-23 10:22:13 UTC
Permalink
<***@posting.google.com> cancelled from trn 4.0-test72 (19 April 1999)

them at will: there would be a revolt.

Yet that is what is happening.

Fingerprints, scanned into a computer, are a number.

The number is inescapably yours.

Modern technology means they don't have to put the number on you, they can
read it off of you by minutely examining your body.

And: it is the NSA driving the fingerprint-rollout of the national ID card.

# "The Body As Password", By Ann Davis, Wired Magazine, July 1997
#
# Currently housed at the National Security Agency, a working group of
# federal bureaucrats founded the Biometric Consortium in the early 1990s.
# Its 1995 charter promises to "promote the science and performance of
# biometrics for the government."
#
# Consortium mumbers include state welfare agencies, driver's license
# bureaus, the Immigration and Naturalization Service, the Social Security
# Administration, and the Internal Revenue Service.


If my attempts to show how bad a thing this is have been too rambling,
too abstract, here is a simple and accurate analogy:

* "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5
*
* It was Martin Anderson who, in his book, Revolution, revealed that during
* the Reagan admini
Fred the Red Shirt
2004-11-23 12:07:50 UTC
Permalink
Article <***@posting.google.com> cancelled from tin [IRIX64/6.5]

: to the NSA...

Covert Action Quarterly, #59:

* In October 1996, after being endorsed by CIA director John Deutch,
* this method of maintaining the government's ability to spy on
* encrypted communications REPLACED KEY ESCROW as the favored
* technology. KEY RECOVERY works by locating information that is
* woven into the header of each message. This mechanism allows
* a recovery 'agent' to extract or reconstruct the message's key
* and decrypt its contents.
*
* Key recovery may have been the basis for NSA's most successful
* post-Cold War project for deciphering coded messages. Since the
* 1940's, the NSA reportedly rigged encryption systems sold by the
* Swiss firm Crypto A.G. so that the agency retained the ability
* to break the codes of anyone using the machines.
*
* Thus, Fort Meade was able to listen in on the coded military and
* diplomatic traffic of the more than 130 countries that were Crypto
* A.G. customers.


Initially, the NSA tried to say they couldn't decrypt Key Recovery
impaired traffic on the fly:

! The New York Times, December 29, 19??, by David Burnham
! "Vast Coding of Data is Urged to Hamper Electronic Spies"
!
! Because the National Security Agency is actively involved in the
! design [of Key Recovery cryptography], the agency will have the
! technical ability to decipher the messages.
!
! Walter G. Deeley, NSA deputy director for communications security
! said, "It is technically possible for the Government to read such
! messages, but it would be insane for it to do so. It would be an
! extraordinarily expensive undertaking and would require a massive
! increase in computer power."

Probably since noone believed that, they admitte
Fred the Red Shirt
2004-11-23 09:29:53 UTC
Permalink
ON THE ENCRYPTION ISSUE.

THE SAFETY OF ALL AMERICANS [is at stake].

ANY SOLUTION THAT IGNORES THE PUBLIC SAFETY AND
NATIONAL SECURITY CONCERNS RISK GRAVE HARM TO BOTH.

Louis Freeh is lying.

* "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996
*
* The FBI attributes to wiretaps less than three percent of all judgements.
* Thus the FBI assertion that electronic surveillance is essential to
* investigating crime and nabbing spies and terrorists cannot be taken
* at face value.

Monitoree John DeLorean sends his regards.

Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang Bang
Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum
War War War War War War War War War War War War War War War


It is ECHELON that they are trying to protect.

If the FBI targets you, they can get all your phone conversations BEFORE
they are encrypted, and can get your password to access your private
cryptography key.

* "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996
* "Keeping Track of th
Fred the Red Shirt
2004-11-23 09:33:00 UTC
Permalink
"Legality? That particular
aspect didn't enter into the discussions."


P459: Innocent Americans - people neither targeted nor watch-listed - are
scooped up into the NSA's giant vacuum cleaner. This happens with
considerable frequency because of the way in which names and phrases are
jam-packed into the computers. Even though NSA's specialized supercomputers
have enormous storage capacities, the tremendous number of targets forces
the Agency to squeeze the watch lists together as tightly as possible.


P462-465: Its power to eavesdrop, the NSA had always insisted, came under no
earthly laws but rather emanated from some celestial "inherent presidential
authority" reposed in the chief executive by the Constitution.

Senator Edward M. Kennedy tried year after year to pass legislation to
require the NSA to submit to judicial review.

Finally, the Foreign Intelligence Surveillance Act [FISA] was signed into
law by president Carter on October 25, 1978.

The key to the legislation could only have been dreamed up by Franz Kafka:
the establishment of a supersecret federal court.

The legislation established a complex authorization procedure and added a
strict "minimization" requirement to prohibit the use and distribution of
communications involving Americans inadvertently picked up during the
intercept operations.

These requirements constitute the most important parts of the FISA law, and
were included to prevent the watch-listing of American citizens, which took
place during the 1960s and 1970s.

The Supreme Court Chief Justice picks which federal judges serve in the
Star Chamber.


P466-467: The FISA court judge rules that black-bag jobs of "nonresidential
premises under the direction or control of a foreign power" need no court
approval. The FISA legislation also exempts from judicial review communica-
tions of these sites, including embassies. P464: A final judicial review
exception authorized the Agency to distribute the communication if it relates
to
Fred the Red Shirt
2004-11-23 13:12:00 UTC
Permalink
it as a menace to true law
* and order.


! "Welfare Recipients Lose Benefits Through Glitches in Computers"
! By Joe Sexton, The New York Times, 5/16/96
!
! The fingerprint-imaging system that is a central element of the Giuliani
! administration's effort to crack down on welfare fraud has resulted in
! hundreds of recipients cases being closed.
!
! The public advocate's office has been inundated with complaints from
! improper case closings.
!
! The failure seems to stem from the local offices not transmitting the
! fingerprints to Albany's central computer. This resulted in AUTOMATICALLY
! TERMINATING BENEFITS OF PEOPLE THE COMPUTER THOUGHT WERE NOT FINGERPRINTED.


----


Prior to the fingerprint "final solution" of control over us, there were
other attempts---which would have required a vote---which tried to roll
out a National ID Card.

* "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5
*
* Since total and absolute control can be obtained only by a Police State
* bureaucracy, efforts have escalated in recent years to require a National
* ID Card.
*
* Upon Bill Clinton's election as President, Secretary of Health and Human
* Services Donna Shalala and Massachusetts Senator Edward Kennedy jointly
* developed a $100 million plan to require all children and babies to have
* a dossier established in a national computer registry to insure "universal
* mandatory vaccinations."
*
* When patriotic Americans rose up to protest, the U.S. Senate quietly
* shelved the deceptive Shalala-Kennedy proposal.
*
* The Clinton administration next surfaced with its mandatory health care
*
Fred the Red Shirt
2004-11-23 09:57:54 UTC
Permalink
Article <***@posting.google.com> cancelled by ***@spamcop.net (Fred the Red Shirt)

Japanese
diplomatic traffic in the South Pacific, 4959 communications from South
Pacific countries and so on.

They type in the code for the category they want to use first that day.

As soon as they make a selection, a 'search result' appears, stating the
number of documents which have been found fitting that category.

The day's work begins, reading through screen after screen of intercepted
messages.

If a message appears worth reporting on, the analyst can select it from the
rest and work on it out of the Dictionary system.

He or she then translates the message - either in its entirety or as a
summary called a 'gist' - and writes it into the standard format of all
intelligence reports produced anywhere within the UKUSA network.

This is the 'front end' of the Dictionary system, using a commercially
available program (called BRS Search). It extracts the different categories
of intercepted messages (known just as 'intercept') from the large GCSB
computer database of intercept from the New Zealand stations and overseas
agencies.

[ I interrupt this book excerpt to bring you retrieval results for
"BRS Search" from the www.altavista.digital.co
Fred the Red Shirt
2004-11-23 12:34:21 UTC
Permalink
I have cancelled my article <***@posting.google.com>

"
*
* Dick Tracy, of course, was a good guy. But Dick Tracy would have
* recognized as unconstitutional the worldwide comprehensive Orwellian
* system that has been installed, and reject it as a menace to true law
* and order.


! "Welfare Recipients Lose Benefits Through Glitches in Computers"
! By Joe Sexton, The New York Times, 5/16/96
!
! The fingerprint-imaging system that is a central element of the Giuliani
! administration's effort to crack down on welfare fraud has resulted in
! hundreds of recipients cases being closed.
!
! The public advocate's office has been inundated with complaints from
! improper case closings.
!
! The failure seems to stem from the local offices not transmitting the
! fingerprints to Albany's central computer. This resulted in AUTOMATICALLY
! TERMINATING BENEFITS OF PEOPLE THE COMPUTER THOUGHT WERE NOT FINGERPRINTED.


----


Prior to the fingerprint "final solution" of control over us, there were
other attempts---which would have required a vote---which tried to roll
out a National ID Card.

* "Project L.U.C.
Fred the Red Shirt
2004-11-23 13:34:09 UTC
Permalink
Article <***@posting.google.com> canceled by WinVN

government being totally out of control.

The NSA/FBI even have a locked secret court located within the main
Justice Department building that only government employees can visit.
It has never turned down a request, and doesn't even need suspicion
of a crime to authorize a "black-bag job" burglary.

Question: Then why bother?
Answer: To give the illegal activity the imprimatur of constitutionality.

And presidents issue secret directives that obliterate constitutional rights.

Like the creation of the NSA.

NSA testimony to Congress: "There is no law that prevents our domestic spying".

Such is the unconstitutional power of the Presidential Magic Order.

It is even threatened to be used to wipe out Congressional legislation:

: However, President Clinton has threatened to veto ProCode.
: If Congress over-rides a VETO President Clinton signed an
: executive order (11/15/96) which states he can revoke any law
: passed on national security grounds:
:
: "Upon enactment of any legislation reauthorizing the
: administration of export controls, the Secretary of Defense,
: the Secretary of State, and the Attorney General shall
: reexamine whether adequate controls on encryption products can
: be maintained under the provisions of the new statute and
: advise the Secretary of Commerce of their conclusions as well
: as any recommendations for action. If adequate controls on
: encryption products cannot be maintained under a new statute,
: then such products shall, where consistent with law, be
: designated or redesignated as defense articles under 22 U.S.C.
: 2778(a)(1), to be placed on the United States Munitions List
: and controlled pursuant to the terms of the Arms Export
: Control Act and the International Traffic in Arms Regulations.
: Any
Fred the Red Shirt
2004-11-23 11:11:58 UTC
Permalink
Microsoft-Entourage user ***@spamcop.net (Fred the Red Shirt) requests cancellation of <***@posting.google.com>.

Secrecy not only permits but encourages questionable operations.


Three observations need to be made about the immense spying capability
provided by the ECHELON system.

The first is that the magnitude of the global network is a product of
decades of intense Cold War activity. Yet with the end of the Cold War
it has not been demobilized and budgets have not been significantly cut.

Indeed the network has grown in power and reach. Yet the public
justifications, for example that 'economic intelligence is now more
important', do not even begin to explain why this huge spy system
should be maintained. In the early 1980s the Cold War rhetoric was
extreme and global war was seriously discussed and planned for.

In the 1990s, the threat of global war has all but disappeared and
none of the allies faces the remotest serious military threat.


The second point about the ECHELON capabilities is that large parts of the
system, while hiding behind the Cold War for their justification, were
never primarily about the Cold War at all.

The UKUSA alliance did mount massive operations against the Soviet Union
and other 'communists', but other elements of the worldwide system, such
as the interception of Intelsat communications, microwave networks and
many regional satellites, were not aimed primarily at the Russians, the
Iraqis or the North Koreans.

Then, and now, they are
Fred the Red Shirt
2004-11-23 10:51:04 UTC
Permalink
think that most Americans will not understand these admittedly
technocratic basic details of computer systems and cryptography.

If they knew, they would be STUNNED that our leaders would lie so boldly to
us, including Mr. Kantor, to protect ECHELON.

That the public would misunderstand Kantor and Clinton to think they are
offering a "reasonable compromise"...even though what is actually happening
is our government demanding you lose all right to privacy, that we must give
the government a copy of our personal security key.


******************************************************************************
******************************************************************************
******************************************************************************


Part 6: Louis Freeh & The Creeping Police State
---- - ----- ----- --- -------- ------ -----

o Louis Freeh
o National ID Card
o Worldwide Banking and Phone Monitoring
o Cybernetic Control of Society
o Conclusions


******************************************************************************

Louis Freeh
----- -----


Louis Freeh
Fred the Red Shirt
2004-11-23 13:08:55 UTC
Permalink
500 lines of C source outbound. Full source is enclosed.
Last line in this email is marked as such, there are no attachments.
Thanks,
---guy
[snip]
Roger,
Let me know if this is what you want, otherwise I'll try again !
Lara
[snip]
Lara,
I've been hoping for those progs but they hadn't arrived. Can you
check my email address?
This will be mega brownie points for me to get it working so fast.
Thanks,
Roger
The first one is where an ex-worker ("Dumb") asks a current employee for
something proprietary, in this case written by the ex-co-worker, and the
current employee ("Dumber") gives it to them.

It happened again and again and again at all sites I've monitored.

They fired her.

One of the more unusual Dumb-and-Dumber incidents was when a new hiree who
was quite happy with her new job - told all her friends in email - then sent
an email "Subject: For your eyes only" into dttus.com, with an Excel
spreadsheet attached.

It contained detailed compensation numbers for an entire trading desk.

Technically it wasn't a Dumb-and-Dumber, more like a Dumber-to-Luckless,
because the recipient didn't request it.

Anyway, they fired her.

And Deloitte & Tou
Fred the Red Shirt
2004-11-23 12:16:36 UTC
Permalink
that information about
* commuters' whereabouts would be released only under court subpoena.

People are buying the transponders because they eliminated the regular
discount tokens and moved the discount availability to E-Z Pass.

Wow.

It does have a kind-of Singapore feel to it...being able to track cars.

Well, it's not like they're going to go nutcake and
install a monitoring grid over the entire metropolis.

They wouldn't do that, right?

: "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996
:
: In New York City, the FBI spent millions of dollars to install a permanent
: "fully-functional real-time physical tracking network."
:
: It should come as no surprise that the FBI did not announce this addition
: to its investigative bag of tricks: a citywide network of hidden sensing
: devices that pick up signals from a moving vehicle and immediately project
: the precise location on a large illuminated map located in the FBI's New
: York command post.
:
: When the FBI's technology head was asked how the new tracking system was
: working, he looked surprised, and didn't answer the question. "How did you
: know about that?" he asked.
:
: The FBI denied a request for a tour of its Manhatten command post, where
: the output from its instantaneous tracking system is displayed for the
: brass.
:
: In 1993, however, the FBI allowed a reporter who was working on what the
: bureau expected
Fred the Red Shirt
2004-11-23 11:23:15 UTC
Permalink
your
credit record. Police will be able to demand it from you else arrest you.
It would start out small...maybe for curfew control.

# "Round up the Teenagers", The Washington Post editorial, 6/2/96
#
# Once again quickly echoing his Republican opponent Senator Bob Dole, who
# endorsed the idea of teenage curfews in a California speech, President
# Clinton took the same line in New Orleans on Thursday.
#
# President Clinton recommended to state and city officials a recently
# released Justice Department report on how these programs can be set up
# to pass court review and work effectively.
#
# The risk of selective enforcement is high, and it's not hard to predict
# which neighborhoods will be the focus of police attention, and which
# will be ignored.

Get a load of this:

* "Police Applaud Ruling to Allow Restrictions on Gang Suspects"
* By Tim Golden, The New York Times, February 1, 1997
*
* Law enforcement officials in California today praised a State Supreme
* Court decision that allows cities to prohibit SUSPECTED gang members
* from standing together on street corners, climbing trees, wearing beepers
* and doing any number of other things that are legal for ordinary citizens.
*
* The ruling was in a case for the city of San Jose to prevent 38 Hispanic
* men and women suspected of membership in a street gang from frequenting
* a four-block neighborhood that the police said the gang had terrorized.
*
* "We're thrilled," said Los Angelos County Attorney Gil Garcetti.
*
* State and local law enforcement officials predicted that the court ruling
* would prompt a wave of similar legislation across California.
*
* Because the San Jose City Attorney's of
Fred the Red Shirt
2004-11-23 11:33:08 UTC
Permalink
every incident, documents and files were ransacked while office
equipment and other valuable items were left untouched.

# "Foes of Reagan Latin American Policies Fear They're Under Surveillance"
# By David Burnham, The New York Times, April 19, 198?
#
# Among those who have cited incidents Sara Murray, staff organizer with
# the Michigan Interfaith Committee on Central American Rights, said that
# her organization made three separate first-class mailings in the last
# few months but that only one out of about 100 letters was ever delivered.
#
# The Post Office denied any responsibility.
#
# Miss Murray also said someone had broken into her Detroit office and
# stolen a mailing list, several files and two books. [snip]
#
# A free-lance journalist has brought a suit in Federal District Court
# charging that when he returned from Nicaragua the Customs Bureau detained
# him until FBI agents came and seized his diary and address book.
#
# The FBI admitted to interviewing more than 100 people who visited
# Nicaragua, but said they were acting under Presidential Executive Order.
#
# Two women have come forward to complain the IRS audited them IMMEDIATELY
# AFTER RETURNING FROM NICARAGUA.
#
# The IRS denied it had anything to do with political views: "One woman has
# never earned more than 12,000 a year, and we found that suspicious."

FBI director Sessions ended up apologizing BIG TIME on C-SPAN,
saying that sort of thing would NEVER happen again. "We have put
procedures in place so that that will NEVER happen again".

But, after having been gra
Fred the Red Shirt
2004-11-23 14:26:54 UTC
Permalink
*
* The judge ruled they were not art, despite Mr. Feuer's instructor, Susan
* Klechner of the International Center of Photography in New York City,
* submitting an affidavit saying the pictures were taken for the course
* and were consistent with the assignment.
*
* After his arrest, Mr. Feuer was ordered not to have contact with his
* daughter and could not stay at his home while the prosecution's
* investigation continued.
*
* The order was lifted last April, but David Ruhnke, Mr. Feuer's lawyer,
* said "It's really difficult to overstate what a nightmare this has
* been for him."
*
* Mr. Ruhnke further complained that the judge revealed Mr. Feuer's name
* in court papers while he was still making motions to dismiss the case,
* to protect the girl.

Parents charged with child pornography for taking photos of their children.

Thought Police.

----


We netizens are rightfully paranoid of the
American government, because it has no scruples.

What the FBI did to photographer Jock Sturg
Fred the Red Shirt
2004-11-23 13:46:53 UTC
Permalink
a complaint that insufficient procedures
have been put in place to ensure current and new Salomon personnel are
made aware of the security issues of Internet transmissions for network
device configuration files. Suggest wide-spread distribution of a memo
concerning the problem. Perhaps place "no-Internet-transmission" comments
in all network config files. Standard warning issued to all new networkers.

Three transmissions of live passwords to three different Salomon routers
have been sent in cleartext over the Internet by Rock Transves nnn-nnnn
of Internet Client Services:


SENDER DATE ROUTER LINE PASSWORD

Rock Transves 6/27/96 09:37 bc7f7w40 [global] bs345way
[and again on] 6/26/96 16:10 con 0 bs345way
aux 0 bs345way
vty 0 qwerty0

Rock Transves 6/18/96 11:27 ard7w35 [global] z23c4v5b
trangobw1 [global] bs345way
con 0 bs345way

ALL OF THESE ROUTERS *AND* ALL ROUTERS USING THE SAME PASSWORDS
MUST HAVE THEIR PASSWORDS CHANGED.
[snip]




*******************************************************************************
*******************************************************************************
********************************************************
Fred the Red Shirt
2004-11-23 12:00:53 UTC
Permalink
canceling <***@posting.google.com>

required to carry the smart cards like a personal driver's license. When
# being stopped for a traffic violation, the driver would have to forward
# the smart card to the traffic cop who would use a card reader/writer to
# access information stored in the card, issue an electronic ticket right on
# the spot with the fines and other information embedded into the smart card
# chip itself. When the driver goes to the bank to pay his/her fines, the
# penalty will be deducted from the memory chip.

Our Military contractors are making money issuing China citizens a National
ID Card??? Our we thinking of what the Communists will do with it???

* "China Tells Internet Users To Register With Police"
* The New York Times, 2/15/1996
*
* China ordered all users of the Internet to register with the police, as
* part of an effort to tighten control over information.
*
* The order came from the Ministry of Public Security.
*
* Network users have been warned not to harm national security, or to
* disseminate pornography.

Well, there's a new way to control Internet users: require them to identify
themselves, no doubt your U.S.-created Nation
Fred the Red Shirt
2004-11-23 12:17:07 UTC
Permalink
Sharkzilla v1.0 requested cancel to <***@posting.google.com>

powers---a major departure given the
# country's constitutional guarantees for "secrecy of any means of communi-
# cations." According to activist Toshimaru Ogura, Japanese cops are
# modeling their proposals on US wiretap law, specifically the 1994
# Communications Assistance for Law Enforcement Act (CALEA). The NSA helped
# sculpt CALEA's language, which begs the question: Is Japan's wiretap bill
# another one of the NSA's covert operations?


* "The End of Ordinary Money, Part I", by J. Orlin Grabbe
* http://www.aci.net/kalliste
*
* The Federal Deposit Insurance Corporation (FDIC) is the government
* corporation that insures deposits at U.S. member banks. The FDIC
* improvement act of 1991 required the FDIC to study the costs and
* feasibility of tracking every bank deposit in the U.S.
*
* The notion was it was necessary to compute bank deposit insurance
* requirements in real time.
*
* Not everyone thought this was a good idea. The American Bankers'
* Association noted it was inconceivable that such data would "be
* used only by the FDIC in deposit insurance coverage functions."
*
* Even though the FDIC argued against it, FinCEN then proposed in
* its draft report to Congress in June 1993 a "Deposit Tracking
* System" (DTS) that would also track deposits to, or withdrawals
* from, U.S. bank accounts in real time. FinCen is the Financial
* Crimes Enforcement Network agency.

# Privacy Journal, By Robert Ellis Smith, January 1989 issue
#
# Al Bayse, Assistant Director of the FBI, said the FBI has developed an
# artificial intelligence system, called Big Floyd, that can analyze
# thousands o
Fred the Red Shirt
2004-11-23 13:42:42 UTC
Permalink
Turnpike remove request: <***@posting.google.com>

" British exception has become the rule.
: *
: * To this day Congress does not realize that the British liaison officers
: * at the NSA are still free to use American equipment to spy on American
: * citizens. And, in fact, they are doing just that. Congress has been kept
: * in the dark deliberately.
: *
: * This is a fact, not a matter of conjecture
: * or a conclusion based on anonymous sources.
: *
: * In the early 1980s, during the Reagan administration, one of the authors
: * of this book submitted to the intelligence community a draft of a
: * manuscript that briefly described the wiretap shell game and mentioned
: * the secrecy provisions concerning British liaison relationships with
: * the NSA have escaped congressional knowledge.
: *
: * The result was an uproar.
: *
: * The intelligence community insisted that all passages explaining the
: * British wiretap program had to be censored and provided a list of
: * specific deletions.


Mini-recap:

o The countries sharing intelligence: US, UK, Canada, Australia

o Massive domestic spying by the NSA, using an Orwellian "1984"
technology to search all communications using computers, including
domestic phone calls.

o Circumvention of domestic spy laws via friendly "foreign" agents.


******************************************************************************



But could that be true?

Could such a massive disregard for the Constitution have taken place under
the cheesy logic said to be used by the Military? NSA is Military, headed
by a uniformed officer.

Could it possibly be true?

It's some over-the-top conspiracy theory, right?



******************************************************************************

Over the Top
---- --- ---

I haven't received the "Spyworld: Inside the Canadian
Fred the Red Shirt
2004-11-23 12:00:31 UTC
Permalink
This message was cancelled from within Mozilla.

certificates
* will be allowed to serve as identity papers.
*
* A 1982 proposal to catch illegal aliens by giving American workers
* "counterfeit-proof" identity cards was hooted off the boards as a
* threat to individual liberty.

How bad would a National ID Card be?

Bad. Real bad.

You would be required to carry it at all times.

It's all about surveillance and control.

This section is about the National ID Card, plus deployment of a
mix of surveillance and control techniques for tracking people.


In California a few years back the police kept hassling a black man who liked
to walk around at night to think. Unfortunately, he wasn't white, but liked
to walk around white neighborhoods. [Anyone with detailed info email me.]

He didn't carry id with him: the police arrested him on suspicion of being
a burglar or somesuch. The California Supreme Court threw out the arrest.
Not carrying ID was a primary part of the police complaint.

It is impossible for the government to issue a National ID Card without
its use eventually becoming required. That is simply how it goes with new
tools for the government.

See how the uses of the Social Security number have grown, wildly beyond
what the government ever said it would be used for?

# Privacy Journal, By Robert Ellis Smith, October 1986 issue
#
# Tax reform bill HR 3838 requires effective January 1988 that any taxpayer
# claiming a
Continue reading on narkive:
Loading...