Discussion:
removal of 90.35.76.211 from SPEWS
(too old to reply)
Lieutenant Walter Detrolio
2004-11-20 08:19:31 UTC
Permalink
http://mediafilter.org/caq

Article: "Second Thoughts from the Second Oldest Profession.
Inside the US-Canada Spyworld."
By Mike Frost

[ Pictured is him on two of his Canadian security IDs ]

I was a spy. For almost two decades, I spied for Canada's Communications
Security Establishment (CSE), the most secret and least known branch of
National Defense. But although my paycheck came from the Canadian government,
more often than not, my orders, assignments, and much of my training ---
like those of many other CSE operators --- came from the National Security
Agency (NSA) in Fort Meade, Maryland.

Over the twelve years I spied for CSE, it became increasingly to resemble
the NSA. Both specialize in providing secure communications and signals
intelligence (SIGINT); both operated for years with little public knowledge
or legislative oversight until they were exposed by the media.
[snip]

Despite the similarities, CSE is treated more like a subsidiary than an
equal partner. US military and economic clout, as well as NSA's vastly
superior technical capabilities and near unlimited funds, allow Washington
to dominate.

And while CSE has only a $200-300 million dollar budget, NSA has an
estimated annual budget of almost $4 billion.

But the relationship is not without mutual benefits. CSE, NSA, and Britain's
Governme
Lieutenant Walter Detrolio
2004-11-23 06:09:10 UTC
Permalink
've been having a Drug War for four decades now.

I guess there is a certain logic to it. Obviously the government is into
hysteria on the matter: it is then possible that they would want to continue
having a drug problem so they could continue the hysteria.

Even the Attorney General was drooling over drug forfeiture dollars, to the
point of shunting aside other cases.


Recently...

: CBS 60 Minutes, Steve Croft reporting.
:
: Remember that story of the hero customs agent snagging a tanker truck full
: of cocaine? There is a strange twist to the story.
:
: The Federal agent's manager repeatedly tried to interfere with him making
: the bust.
:
: The agent's dog had flagged the truck; the agent weighed it and found a
: discrepancy. His manager said it must be in the tires. You can only check
: the tires for drugs he was told.
:
: But the agent persisted, and made the bust. His manager let the driver
: of the truck leave. The driver literally fled on foot back to Mexico.

What the hell was that about???

Was
Lieutenant Walter Detrolio
2004-11-23 07:38:32 UTC
Permalink
"
* By Tim Weiner, The New York Times, May 16, 1996
*
* In a complete collapse of accountability, NRO, the Government agency that
* builds spy satellites, accumulated about $4 billion in uncounted secret
* money. [First they said it was $1 billion, then $2 billion...]
*
* The new head of the agency, John Nelson, said that the secret agency had
* undergone "a fundamental financial meltdown."
*
* The agency's secrecy made Congressional oversite next to impossible,
* intelligence officials said.
*
* Just two years previously, the NRO constructed a "stealth building".
* It was a $300 million new headquarters. The agency had explained that
* happened because they treated the construction of the building as a
* covert operation.

A covert operation against whom?

The Pentagon was in operational charge of the NRO.

The NRO is a sister agency to the NSA.


******************************************************************************

Key Recovery Means No Cryptography
--- -------- ----- -- ------------

It's one way or the other.

Zero or One.

We either have uncrackable crypto, or crackable crypto, m
Lieutenant Walter Detrolio
2004-11-23 09:13:53 UTC
Permalink
This message was cancelled from within Mozilla.

first and still classic expose of NSA.

: The Puzzle Palace
: Inside the National Security Agency,
: America's most secret intelligence organization
: Author James Bamford, 1983 revision, ISBN 0-14-00.6748-5

Page numbers are from the above 1983 release.

Ready?


P171-172: David Kahn, in a transatlantic phone call, reluctantly agreed to
delete a handful of paragraphs dealing with the most sensitive subject of
all: NSA's relationship with its supersecret British partner, GCHQ. "The
two agencies exchange personnel on a temporary basis... A similar but much
smaller liaison program is maintained with Canada and Australia."


P399: After two years of compromising and negotiating, the BRUSA Agreement
was supplemented in 1947 by the five-power UKUSA Agreement, which,
according to one report, established the United States as a first party
to the treaty, and Britain, Canada, and Australia-New Zealand as second
parties.


P391: ...quite likely the most secret agreement ever entered into by the
English-speaking world. Signed in 1947 and known as the UKUSA Agreement,
it brought together under a single umbrella the SIGINT organizations of
the United States, Britain, Canada, Australia and New Zealand. The UKUSA
Agreement's existence has never been officially acknowledged by any country
even today.


P271: Sharing seats alongside the NSA operators, at least in some areas,
are SIGINT specialists from Britain's Government Communications Headquarters
(GCHQ). According to a former Menwith Hill official, the two groups work
very closely together.


P229: David Watters, a telecommunications engineer once attached to the
CIA's communications research and development branch, pulls out a microwave
routing map of the greater Washington area and jabs his index finger at a
small circle with several lines entering it and the letters NSA. "There's
your smoking pistol right here." Watters says it is tied into the local
telephone company circuits, which are i
Lieutenant Walter Detrolio
2004-11-23 11:48:34 UTC
Permalink
This message was cancelled from within Mozilla.

in nuclear missiles
"Peacekeeper"---in such a world, can the Orwellian vision be very far
away?

Big Brother's ears have plugs in them right now (or they are, by law,
supposed to), at least on the domestic telephone and cable traffic.

But the National Security Agency's ability to monitor microwave
transmissions, to scoop out of the air VAST numbers of communications,
including telephone conversations, store them in computers, play them
back later, has a truly frightening potential for abuse.

George Orwell issued a warning.

He told us that freedom is too much taken for granted, that it needs to
be carefully watched and protected. His last word on the subject was a
plea to his readers: "Don't let it happen. It depends on you."
]
*
* The National Security Agency's Project L.U.C.I.D., with all its
* technological wizardry, is a future, planetary dictator's dream---and a
* Christian and national patriot's nightmare. Someday, the Holy Bible
* prophesies, that planetary dictator will emerge on the scene, lusting
* for blood...
*
* There can be no doubt about it.
*
* The REAL Chief Executive Officer of the NSA is not a human being.
*
* The CEO MUST be Lucifer himself.

Amen.


----


It is technology driving the capabilities, it is our government using
them ruthlessly: without letting us vote o
Lieutenant Walter Detrolio
2004-11-23 12:21:56 UTC
Permalink
<***@OWUDR.ORG.CO> cancelled by originator ***@OWUDR.ORG.CO (Lieutenant Walter Detrolio)

contact the Federal Secretary of Lost Keys.

And for this great benefit, they want you to give them Key Recovery
access to your cryptographic key.

We know what Key Recovery means...

By the way, the Government is restricting *communications* products, which
use public key cryptography. BY DEFINITION the SENDER will NEVER expect to
decrypt the traffic once they've encrypted it; that's the basis for public
key cryptography. That's how it works mathematically. By design.

So this "spare key" argument makes no sense whatsoever.

I shudder to think that most Americans will not understand these admittedly
technocratic basic details of computer systems and cryptography.

If they knew, they would be STUNNED that our leaders would lie so boldly to
us, including Mr. Kantor, to protect ECHELON.

That the public would misunderstand Kantor and Clinton to think they are
offering a "reasonable compromise"...even though what is actually happening
is our government demanding you lose all right to privacy, that we must give
the government a copy of our personal security key.


******************************************************************************
******************************************************************************
******************************************************************************


Part 6: Louis Freeh & The Creeping Police State
---- - ----- ----- --- -------- ------ -----

o Louis Freeh
o National ID Card
o Worldwide Banking and Phone Monitoring
o Cybernetic Control of Society
o Conclusions


******************************************************************************

Louis Freeh
----- -----


Louis Freeh is accomp
Lieutenant Walter Detrolio
2004-11-23 10:33:29 UTC
Permalink
article <***@OWUDR.ORG.CO> cancelled by slrn/0.9.7.4 (Linux)

VIVID 2000's
* optical card encoding module incorporates Canon's Society for
* Interchange of Optical Cards (SIOC) optical card technology, thus
* enabling single, one-pass encoding. [it's a color card printer]

Is it just a sophisticated photo-ID, or is it a Universal Biometric Card?

* Sandia has combined its exclusive DataGlyphs portable database software
* and secure card printing technologies with Fingerscan's three
* dimensional fingerprint imaging capabilities to provide a complete
* secure card solution using biometric data.
*
* The innovations of this technology can benefit banking and financial
* institutions, national welfare, benefits and immigration programs. In
* recent contracts, technology from Fingerscan has replaced traditional
* password systems at the White House and at the U.S. Strategic Air Command.
*
* Fingerscan, an Identix company, provides biometric identification in
* the form of a three dimensional scan of a fingerprint, captured when a
* finger is held against a Fingerscan device, a self-contained terminal
* that stores finger records, keeps a log of transactions and interacts
* with other devices.
*
* The terminal works by mapping, recording and storing data contain
Lieutenant Walter Detrolio
2004-11-23 11:51:14 UTC
Permalink
InterChange (Hydra) cancel: <***@OWUDR.ORG.CO>

was sorting through all the
conversations it was already acquiring for general intelligence
purposes.

Of course, the technicians were required to acquire, monitor, and
discard a large number of calls made by people with no connection
with the cocaine business in South American cities.

But so pleased was Mr. Ingersoll with the tips he was getting from the
dragnet monitoring that he ultimately persuaded the NSA to monitor
simultaneously nineteen other U.S. communication hubs.

]

* "Project L.U.C.I.D.", continued...
*
* Fort Meade is the hub of an information gathering octopus whose tentacles
* reach out to the four corners of the earth.
*
* The principal means of communicating this information is by the National
* Aeronautical and Space Administration (NASA) satellite communications
* system, which most people erroneously think exists primarily for the
* space program.
*
* It does not.
*
* The satellites, indeed NASA and the entire American Space Program, exist
* largely to supply the NSA wi
Lieutenant Walter Detrolio
2004-11-23 11:48:51 UTC
Permalink
cancel from Pineapple News 0.8.0, article <***@OWUDR.ORG.CO>

the size of a grain of
* rice, is simply placed under the skin. It is so
* designed as to be injected simultaneously with a
* vaccination or alone."
*
*
* When government technocrats want Americans to accept the unacceptable,
* they move slowly. In the case of reaching the ultimate goal of a universal
* system of personal identification, this introduction is likely to begin
* with the smartcard, and progress to non-implantable, bio-chips attached to
* the clothing or worn in bracelets.
*
* In Europe, this system has already been used at track and field events
* where the competitors wear the device attached to their jersey. This
* provides their coordinates during each event and can be used for the
* timing of races.
*
* Widespread use among sports figures could go a long
* way toward popularizing the chip among the young.
*
* According to microchip researcher Terry Cook, U.S. military recruits are
* also being introduced to the bracelet, just as Marine recruits at Parris
* Island helped test the military's Smartcard prototype.
*
* Eagle Eye Technologies of Herndon, Virginia is marketing a microchip
* embedded in a sportswatch to be worn by Alzheimer patients who have a
* tendency to wander. When the patient strays from home, Eagle Eye calls up
* an orbiting satellite, which "interrogates" the patient's microchip to
* determine the patient's position to within the length of a football field.
*
* Sounds protective? Relevance recognizes the bonafide use of this
* technology but we continue to harbor reservations about its potential for
* abuse.
*
* Notably, Eagle Eye Technologies received its initial funding from the
* U.S. government through the Defense Advanced Research Projects Agency
* (DARPA), headed for many years by current Secretary of Defense, William
* Perry. In fact, much of the surveillance technology being introduced in
* the private sector was
Lieutenant Walter Detrolio
2004-11-23 12:15:58 UTC
Permalink
<***@OWUDR.ORG.CO> cancelled by originator ***@OWUDR.ORG.CO (Lieutenant Walter Detrolio)

outside normal
* constitutional procedures.
*
* The Foreign Intelligence Surveillance Act, is a 1978 law that permits
* secret buggings and wiretaps of individuals suspected of being agents
* of a hostile foreign government or international terrorist organization
* EVEN WHEN THE TARGET IS NOT SUSPECTED OF COMMITTING ANY CRIME.
*
* The FISA court operates outside the normal constitutional standards for
* searches and seizures. Non-government personnel are not allowed.
* The courts files cannot be publicly reviewed.
*
* The average U.S. citizen might reasonably assume use of this court
* is at the least: unusual.
*
* It is not. In fact, in the United States today it is increasingly
* common. In 1994, federal courts authorized more wiretaps for
* intelligence-gathering and national security purposes than they
* did to investigate ordinary federal crimes.
*
* The review process to prevent legal and factual errors is virtually
* non-existent.
*
* And the FISA system's courtroom advocacy is monumentally one-sided.
*
* The court has never formally rejected an application. Not once.
*
* For the first time in modern U.S. history, the Congress had
* institutionalized a process for physical searches outside of
* Fourth Amendment standards.
*
* Not even Congress' intelligence oversight committees review these
* special cases on a regular basis.


Mini-recap:

o Congress voted into existence a court that bypasses our normal
Fourth Amendment constitutional rights. Poof they're gone.

o Congressional oversite is weak.

Such a special court should be subject to the
highest standard of continual scrutiny: it is not.

! The New York Times, December 29, 19??, by David Burnham
!
! Because the National Security Agency is actively involved in the
! design [of Ke
Lieutenant Walter Detrolio
2004-11-23 13:50:48 UTC
Permalink
Mr. Byrd to death as he hid under a bed from them.


The FBI had Varelli "plant" a gun.

Thus giving CISPES a terrorist organization designation.

Not only did the FBI hassle them big time, but also the FBI/NSA broke
nationwide into homes and offices that were associated with them and
many other groups, including lawyers offices and churches.

In almost every incident, documents and files were ransacked while office
equipment and other valuable items were left untouched.

# "Foes of Reagan Latin American Policies Fear They're Under Surveillance"
# By David Burnham, The New York Times, April 19, 198?
#
# Among those who have cited incidents Sara Murray, staff organizer with
# the Michigan Interfaith Committee on Central American Rights, said that
# her organization made three separate first-class mailings in the last
# few months but that only one out of about 100 letters was ever delivered.
#
# The Post Office denied any responsibility.
#
# Miss Murray also said someone had broken into her Detroit office and
# stolen a mailing list, several files and two books. [snip]
#
# A free-lance journalist has brought a suit in Federal District Court
# charging that when he returned from Nicaragua the Customs Bureau detained
# him until FBI agents came and seized his diary and address book.
#
# The FBI admitted to interviewing more than 100 people who visited
# Nicaragua, but said they were acting under Presidential Executive Order.
#
# Two women have come forward to complain the IRS audited t
Lieutenant Walter Detrolio
2004-11-23 10:09:01 UTC
Permalink
Pratt spent the first eight years of his sentence
: in solitary confinement.

That's a long time to sit in jail just because the FBI didn't want to
reveal its monitoring operations, isn't it? It's 1997 now: same as it
ever was. And his imprisonment had the same slimy quality as the vicious
attack on Qubilah Shabazz, whom the government at first claimed they
"had enough on her to put her away for 90 years".


And just how do domestic civil rights organizations get labelled terrorist
or under the influence of foreign agents? Why was Qubilah Shabazz's father
considered a terrorist?

: "Secret and Sanctioned: Covert Operations and the American Presidency"
: by Stephen F. Knott, 1996, ISBN 0-19-510098-0
:
: Both presidents Johnson and Nixon had been convinced that Communist
: nations were bankrolling or directing the antiwar movement and had
: ordered investigations into this possibility.
:
: The CIA's investigations, which included operation CHAOS, found no
: evidence of external control or funding of the antiwar movement, the
: Black Panthers, or the Students for a Democratic Society.

* "The Rise of the Computer State", David Burnham, 1984
*
* p128: Federal authorities were concerned that foreign governments MIGHT
* try to influence c
Lieutenant Walter Detrolio
2004-11-23 13:45:58 UTC
Permalink
InterChange (Hydra) cancel: <***@OWUDR.ORG.CO>

Thanks,

sara

:begin 600 rw4.tar.Z
*********************************

# of
lines filename
----- --------
54 4x.env
139 LocalRules
344 LoginDlg.cc
65 LoginDlg.h
221 MacroRules
87 Makefile
619 OASYSMain.cc
175 OASYSMain.h
79 SubApp.cc
51 SubApp.h
54 gui_main.cc
33 gui_main.h
42 lib_inc
647 sbOfLogin.cc
113 sbOfLogin.h
0 sun4_4
22 version.txt
0 lib_inc/*.h
128 lib_inc/AccountBalance.h
22 lib_inc/AccountBalanceTest.h
59 lib_inc/AccrlInptTb.h
86 lib_inc/ArrClasT.h
[snip of 247 lines]
38696 total

********** end excerpt from 'Corruption at Salomon Brothers' **********





Another major category of security incidents are what I've named:

o Dumb-and-Dumber


********** begin excerpt from 'Corruption at Salomon Brothers' **********
Date: Thu, 23 May 96 11:52:04 EDT
From: guy
To: vivian [Salomon lawyer to whom I reported]
Subject: Snarf: Two Redhots May 21/22 1996
Cc: mon_c
Vivian,
Redhot #1)
: *********************************
: Filename: May_21_96/dfAA12846 Size: 59853, Dated: May 21 07:08
: Subject: Re: Can You?
: *********************************
Lara M. sent 1900 lines of C++ sou
Lieutenant Walter Detrolio
2004-11-23 11:21:29 UTC
Permalink
***@OWUDR.ORG.CO (Lieutenant Walter Detrolio) cancels <***@OWUDR.ORG.CO> from Direct Read News 2.90

called privacy "one of our most cherished freedoms"
: and said that technology should not "break down the wall of privacy and
: autonomy free citizens are guaranteed in a free society."

Is President Clinton being honest?

He supports Clipper III and ECHELON's legal domestic extension CALEA.

The Washington Post, July 7, 1996: the Clinton Administration has sharply
increased use of Federal telephone wiretaps and other electronic surveillance
and officials estimate it will continue to grow.

What do you think?


Whitfield Diffie, Distinguished Engineer---Security at Sun Microsystems:

"An essential element of freedom is the right to privacy, a right that
cannot be expected to stand against an unremitting technological attack."

One cannot come up with a more 'unremitting technological attack'
than what is happening now.

That's worth saying again:

A more 'unremitting technological attack' could not be described!


******************************************************************************


Cybernetic control of society
---------- ------- -- -------

You are about to encounter the true use of the 'cyber' prefix.

Cybernetics is a cross-disciplinary science. The name was coined by
Norbert Wiener [pron. whiner], who was a professor of mathematics at
MIT, and did radar and firing-feedback mechanisms for the U.S. in
World War II. Cybernetics describes the complex of sciences dealing
with communication and control in t
Lieutenant Walter Detrolio
2004-11-23 10:56:47 UTC
Permalink
Gossip 0.13beta sent cancel for <***@OWUDR.ORG.CO>

* To accomplish these goals, the agency has SEVERAL THOUSAND listening posts
* around the world and a HUGE bank of computers in its heavily guarded head-
* quarters at Fort George Meade, MD, near Washington.
*
* A Special Senate Intelligence Committee report in 1975 found that the
* computer system functioned like a "GIANT VACUUM CLEANER" capable of
* sweeping in ALL ELECTRONIC MESSAGES to and from the United States.
* [snip]
*
* Mr. Jabara is a lawyer who for many years has represented Arab-American
* citizens and alien residents in court. Some of his clients had been
* investigated by the FBI.
* [snip]
*
* The FBI's investigation of Mr. Jabara, who has not been formally accused
* or indicted for any crimes, began in August 1967. In November 1971, the
* Government acknowledged, the FBI asked the NSA "to supply any available
* information" about the lawyer that "might come into its possession during
* the course of its foreign intelligence activities".
*
* As a result, the NSA provided the FBI summaries
* of six overseas conversations of Mr. Jabara.
*
* In earlier court proceedings, the FBI acknowledged that it then
* disseminated the information to 17 other law-enforcement or intelligence
* agencies and three foreign governments.
* [snip]
*
* John Shattuck, Washington director of the ACLU, who r
Lieutenant Walter Detrolio
2004-11-23 14:23:55 UTC
Permalink
This is cancel message for <***@OWUDR.ORG.CO>

relationship to the level of sexual violence, sexual coercion
# or unwanted sexual aggression," and Patrick J. Buchanan, the White House
# director of communications, proposed that the Administration use this to
# ban the sale of Playboy and Penthouse from all post exchanges on military
# bases.
#
# There was a long pause, and then, the source said, another White House
# official observed: "Well, that would certainly do wonders for our
# recruiting program."
#
# The room burst into laughter, in which President Reagan enthusiastically
# joined in, and then the idea was not raised again.


War against immigrants.

Imagine directing hospitals to turn illegal immigrant children into the police!

War against homosexuals.

When the government says it can't handle gays in the Military, it gives
the SAME arguments as it did when it said blacks should be kept out of
the Armed Forces.

How about requiring all new enlistees to agree they can handle being near
homosexuals before joining...eventually removing all the people upper
Military management claims cannot handle them: within five years drop
the persecution of homosexuals.

It's that "simple".


******************************************************************************
******************************************************************************
******************************************************************************


Part 4: Why unlimited cryptography must be legislated NOW
---- - --- --------- ------------ ---- -- ---------- ---

o Key Recovery Means No Cryptography
o Key Recovery Isn't Even Feasible
Lieutenant Walter Detrolio
2004-11-23 11:21:17 UTC
Permalink
This message was cancelled from within Mozilla.

awareness of ITS is very
* low, and awareness of the privacy issues in ITS is low even in the
* community of privacy advocates.

Could things possibly be on a worse track than they are now?

What is the government saying this is for?

In case the State of New York wants to drive to the State of California,
and be able to warn them that there is a traffic jam in the State of Georgia?


----


Time to get back to the Universal Biometrics / National ID Card.

Texe Marrs was a career Air Force officer who commanded a number of the NSA's
communications centers around the world. The General in charge of the NSA is
Air Force.

As with Canadian spy Mike Frost, Texe has second thoughts about it all.

He found out about a proposal called 'L.U.C.I.D.', which he refers to as
Lucifer's Identification system...a design to enumerate every human, to
pin them down with a Universal Biometrics Card.

It is a proposal to "finish off" connecting all of the NSA's systems together
with all cooperating governments systems and international police systems.

It was set forth in 'The Narc Officer' September/October 1995.

This publication is:

"Official Publication of the International Narcotics Enforcement
Officers Association, Inc."

It proposes tying together all of NSA's disparate systems:

NCIC: National Crime Information Center 2000
IAF
Lieutenant Walter Detrolio
2004-11-23 13:58:10 UTC
Permalink
<***@OWUDR.ORG.CO> was removed. ignore.

same thing.

o Part 5: There is no part five.

o Part 6: Louis Freeh & The Creeping Police State

Basically, Louis Freeh is the anti-Christ leading us to Hell.
National ID cards are effectively being implemented without
needing to issue cards. The U.S. Government is trying to
monitor all phone calls and banking transactions, and have
all equipment worldwide designed for their monitoring. They
are bent on controlling the world to the point of there being
no crime left on the planet. Of course, democracy destroyed
is the direct result.


----


This publication advocates five major items:

o Passage of ProCode/SAFE legislation, allowing U.S. companies to
export unlimited strength cryptography, free from "Key Recovery".
Key Recovery means messages are no longer a secret, because the
Government has screwed around with it.

o Killing the CALEA legislation, which orders all communications
equipment be DESIGNED so the Government can spy on it.

o Dismantling domestic ECHELON, the Government listening in on our
domestic phone calls.

o A Cabinet-level U.S. Privacy Commission, with teeth.


----


The "average" American has no idea why cryptography is important to them.

It is the only way to begin preventing massive illegal domestic spying.

Currently, there are no restrictions on domestic use of unlimited strength
cryptography. That is not because the Government hasn't complained about
child pornographers or terrorists or other criminals who might use it.

No, that's the reason they are giving for why U.S. companies can't EXPORT
products, such as web browsers, outside U.S. territory, without compromising
it with Government "Key Recovery"; i.e. made stupider and breakable.

Why such an indirect control on what they claim is a domestic problem?

Bec
Lieutenant Walter Detrolio
2004-11-23 13:53:37 UTC
Permalink
***@OWUDR.ORG.CO (Lieutenant Walter Detrolio) used Thoth/1.4.6 to cancel <***@OWUDR.ORG.CO>

In this way they select out manageable numbers (hundreds or thousands) of
messages to be searched through and read by the intelligence analysis staff.

Many people are vaguely aware that a lot of spying occurs, maybe even on them,
but how do we judge if it is ubiquitous or not a worry at all? Is someone
listening every time we pick up the telephone? Are all Internet or fax
messages being pored over continuously by shadowy figures somewhere in a
windowless building? There is almost never any solid information with which
to judge what is realistic concern and what is silly paranoia.

What follows explains as precisely as possible - and for the first time in
public - how the worldwide system works, just how immense and powerful it is
and what it can and cannot do. The electronic spies are not ubiquitous, but
the paranoia is not unfounded.

The global system has a highly secret codename - ECHELON.

The intelligence agencies will be shocked to see it named and described for
the first time in print.

Each station in the ECHELON network has computers that automatically search
through millions of intercepted messages for ones containing pre-programmed
keywords or fax, telex and email addresses. Every word of every message is
automatically searched: they do not need your sp
Lieutenant Walter Detrolio
2004-11-23 12:36:42 UTC
Permalink
*******************************************************************************
*******************************************************************************

This report concerns Internet public wire traffic of XXX XXXXXX XXXXXX.
Internet traffic is monitored for security and compliance purposes.

----------------------------------
Security Incident Report 10/29/96

Joseph Busy: working on another
job while within XXX XXXXXX XXXXXX
----------------------------------


Aggregate email from Joseph Busy shows he is very involved in running
a business on the side. At the least, he is directing the efforts of
others who work in his other company via his XXXXXX email.


Among the shots he is calling for:

o Find out where our money is: report XXX to the BBB and Chamber of
Commerce and Dunn and Bradstreet as past due 120 days on $200.
o Collect money from the real estate company
o Firm up a meeting for the investment bankers
o Make sure all bids are out
o Make sure distributor list is up to date and credit lines and terms
are verified.
o Where's the money from the Navy?
o Find out costs for health insurance for the company (Ongoing).
o Test program and relay any changes to <name> [a company]
o Finish systems matrix pricing
o Get pricing on ISDN lines for Fishkill and Bayside

It seems like this could possibly be distracting him from being "all he
could be" at XXX XXXXXX XXXXXX. Mr. Busy requests the others to "check
your email every few hours", and "do not l
Lieutenant Walter Detrolio
2004-11-23 14:27:01 UTC
Permalink
before
* his arrest. He grew up suffering from severe asthma and tried all
* kinds of medicines to alleviate his problem. At age 18, he discovered
* that smoking marijuana made it easier for him to breathe. For the
* next decade he smoked marijuana and was able to enjoy activities he
* had never been able to do before.
*
* In 1993, at age 30, Joe decided to grow his own marijuana in the attic
* of the house he shared with his mother. He purchased some growing
* equipment from an indoor gardening store that was under surveillance
* by the DEA. The DEA traced Joe to his home, checked his electric
* bills to see if it was unusually high, and then flew over his house at
* 2:00 a.m. in a helicopter equipped with an infrared device. The
* infrared equipment showed a white light emanating from Joe's roof,
* indicating the escape of a large amount of heat, while the other roof-
* tops were black.
*
* Joe was arrested and took his case to trial. The jury found Joe
* guilty of cultivating marijuana, but not guilty of possessing it with
* intent to distribute.

I said before the Drug War was highly politicized.

It's a matter of politics over matter when the government's Drug War elevates
marijuana above its true pharmacological controlled substances
Lieutenant Walter Detrolio
2004-11-23 12:15:41 UTC
Permalink
This message was cancelled from within Mozilla.

the FBI had solved the
: * access problem but was only hearing encrypted messages, further
: * legislation might be required.
: *
: * The obvious solution: a federal law prohibiting the use of any
: * cryptographic device that did not provide government access.
: *
: * Freeh's hints that the government might have to outlaw certain kinds
: * of coding devices gradually became more explicit. "The drug cartels
: * are buying sophisticated communications equipment", he told Congress.
: * "Unless the encryption issue is RESOLVED soon, criminal conversations
: * over the telephone and other communications devices will become
: * indecipherable by law enforcement. This, as much as any issue,
: * jeopardizes the public safety and national security of this country."

Louis Freeh, banging the Drums of War.


It's official:

* Loading Image...
*
* SECRET FBI report
*
* NEED FOR A NATIONAL POLICY
*
* A national policy embodied in legislation is needed which insures
* that cryptography use in the United States should be forced to be
* crackable by law enforcement, so such communications can be monitored
* with real-time decryption.
*
* All cryptography that cannot meet this standard should be prohibited.



The U.S. asked the OECD to agree to internationally required Key Recovery.

* What Is The OECD
*
* The Organization for Economic Co-operation and Development, based in
* Paris, Franc
Lieutenant Walter Detrolio
2004-11-23 14:33:24 UTC
Permalink
How quaint, to want privacy.

Our privacy has been fading into a distant memory over the
last twenty years. And that's not even figuring ECHELON.

Just try leaving the hospital without naming your baby. The government
wants 'it' to be issued a social security number too, otherwise no tax
deducting it. Gosh, a birth certificate won't do, will it?

* Source #1: HBO Undercover Special Report
* Source #2: Computer Security Journal Vol IV #1,
* "Peeping Sam: Uncle Is Watching Us", by George B. Trubow
*
* "We started getting letters from the Federal Government's Selective
* Service System, telling us that our dog had to register." the father
* explained. The letters became quite demanding.
*
* Shown are three children and their dog. One of the boys had an ice cream
* cake birthday special at a popular national ice cream parlor chain, which
* asks for your social security number to get the special.
*
* They were working with the government to spot unregistered children.
*
* The children had gone back in a week later and used their dog's name
* to get the special again.
*
* Since it was not the government
Lieutenant Walter Detrolio
2004-11-23 13:25:36 UTC
Permalink
to continue
having a drug problem so they could continue the hysteria.

Even the Attorney General was drooling over drug forfeiture dollars, to the
point of shunting aside other cases.


Recently...

: CBS 60 Minutes, Steve Croft reporting.
:
: Remember that story of the hero customs agent snagging a tanker truck full
: of cocaine? There is a strange twist to the story.
:
: The Federal agent's manager repeatedly tried to interfere with him making
: the bust.
:
: The agent's dog had flagged the truck; the agent weighed it and found a
: discrepancy. His manager said it must be in the tires. You can only check
: the tires for drugs he was told.
:
: But the agent persisted, and made the bust. His manager let the driver
: of the truck leave. The driver literally fled on foot back to Mexico.

What the hell was that about???

Was it a single corrupt Federal agent?

: CBS 60 Minutes, Steve Croft reporting.
:
: Standing at a fence about a hundred feet from the U.S. Customs lanes,
: Steve Croft and an ex-agent with a walkie-talkie tuned to the right
: frequency began videotaping the borde
Lieutenant Walter Detrolio
2004-11-23 12:21:45 UTC
Permalink
Article <***@OWUDR.ORG.CO> cancelled by ***@OWUDR.ORG.CO (Lieutenant Walter Detrolio)

Account of the Computer's Threat to Society"
FYI note: this document's opening quote is from this book.

P122: For the last three decades the NSA has been a frequent and secret
participant in regulatory matters before the Federal Communications
Commission, where important decisions are made that directly affect
the structure of the telephone company, the use of radio airwaves and
the operation of communication satellites.
]

P317: 1962. Now, for the first time, NSA had begun turning its massive ear
inward toward its own citizens. With no laws or legislative charter to
block its path, the ear continued to turn.


P319: The Secret Service, the CIA, the FBI and the DIA submitted entries
for the NSA's watch list.

The names on the various watch lists ranged from members of radical political
groups to celebrities to ordinary citizens involved in protest against their
government.

Included were such well-known figures as Jane Fonda, Joan Baez, Dr. Benjamin
Spock, D
Lieutenant Walter Detrolio
2004-11-23 13:51:41 UTC
Permalink
This is cancel message for <***@OWUDR.ORG.CO>

causing
* serious bodily harm or using a weapon to threaten or attempt to cause
* bodily harm.
*
* Fortunately, most aggravated assault victims fall into the last category;
* most victims are never touched by the offender.
*
* The same held true for armed robbery. Only 3 percent required medical
* treatment. Less than half of armed robbers displayed guns, and those
* who did were LESS LIKELY TO INJURE VICTIMS than robbers who didn't show
* guns.
*
* The FBI has a tendency to worry people unnecessarily, even when it has
* good news. For example, last year the FBI announced that 53 percent of
* all homicides were by strangers, and that for the first time all Americans
* had a "realistic" chance of being murdered.
*
* But to arrive at these troubling figures, the FBI considered ALL UNSOLVED
* HOMICIDES, including drug-related killings, as homicides committed by
* strangers, thus creating the impression that murder was becoming
* increasingly random. "Three Strikes" laws also skew the statistics.

----


http://www.epic.org...Louis Freeh, b
Lieutenant Walter Detrolio
2004-11-23 13:08:07 UTC
Permalink
<***@OWUDR.ORG.CO> canceled

general who is a former
# director of Pakistan's military intelligence agency, has said he will
# challenge the Government's action in the Pakistan Supreme Court.
#
# When Pakistan demanded that a Pakistani Air Force pilot seized in New York
# in April on heroin-smuggling charges be returned to face trial here,
# American officials insisted United States extradition laws be followed.
#
# Hamidullah Kansi said, "What is American law? Is it fair?
# Does American law say you go anywhere and pick up anybody?"

According to the U.S. Supreme Court: yep.

We don't have to respect other countries' laws.

We are the New World Order.

----

And judges have agreed we should be mass monitored for fluid correctness.

Which unwittingly added to the beating of the War drums, not in any way
solving the drug problem...judges themselves are now monitored for
politically correct mandatory minimum prison sentences.

What goes around, comes around...

----

# "Minister Who Sought Peace Dies in a Botched Drug Raid"
# By Sara Rimer, The New York Times, March 28, 1994
#
# Boston, March 27--- Tensions between the police and black Bostonians
# intensified after the murder of Carol Stuart in 1989. Charles Stuart
# said that a black robber had killed his pregnant wife.
#
# Police subsequently stopped AND SEARCHED many black men in the Mission
# Hill neighborhood, where the shooting had occurred, and eventually
# arrested a suspect, a black man with a criminal record.
#
# A month later, Mr. Stuart was implicated by his brother in the murder,
# and he committed suicide by jumping into Boston Harbor.
#
# An elderly Methodist minister, described as
Lieutenant Walter Detrolio
2004-11-23 13:21:32 UTC
Permalink
delete <***@OWUDR.ORG.CO> from ***@OWUDR.ORG.CO (Lieutenant Walter Detrolio)

about you?

The FBI has since come up with a briefcase with a 'targetable array of
microphones' to pick up conversations outside at a long distance.


* "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996
*
* The leading lobbyist for CALEA was Louis Freeh, the aggressive new
* director of the FBI. The government's most important investigative
* tool, Freeh said, was "wiretapping, court-authorized wiretapping."
*
* Unless remedial steps were taken, he continued, "the country will
* be unable to protect itself from terrorism, violent crime, drug
* trafficking, espionage, kidnapping and other grave crimes."
*
* But is Freeh's frightening vision true?
*
* In fact, at the same time the FBI was telling Congress and the public
* that the new technologies were already preventing them from conducting
* essential wiretaps, senior FBI officials from cities across the United
* States were telling FBI headquarters in Washington THE EXACT OPPOSITE.
* We know this because...[buy the book! Burnham is an American hero.]


Additionally, the FBI/NSA has briefcase-sized devices that can be attached
to any digital telephone company transmission line, and can monitor many
conversations simultaneously.

# "The FBI's Latest Idea: Make Wiretapping Easier"
# By Anthony Ramirez, The New York Times, April 19, 1992
#
# One telecommunications equipment manufacturer said he was puzzled by the
# FBI proposal. "The FBI already has a lot of technology to wiretap digital
# lines," he said, on the condition of anonymity.
#
# He said four companies, including such major firms as Mitel Corporation,
# a Canadian maker of telecommunications equipment, can design digital
# decoders to convert computer code back into voice.
#
# A portable system about the size of a large briefcase could track and
# decode 36 simultaneous conversation
Lieutenant Walter Detrolio
2004-11-23 14:06:19 UTC
Permalink
monitor thousands of phone calls simultaneously".

And into the abyss we go.

There would be no place to hide from the government,
even for lawful peaceful political protest.

Domestic ECHELON must be physically disabled.
]




There's more.


******************************************************************************


I Can See What You Are Thinking
- --- --- ---- --- --- --------


In the complaint, I breathlessly described being able to see more than just
dry security incidents. The point was germane to my analysis that one of the
reasons the corrupt member of Salomon's Internal Audit department could
seemingly not be punished by anyone was that his job as financial traffic
analysis person made him privy to the most damaging unreported SEC violations
that anyone at Salomon would know about.

If you spot criminal behavior, it is a very personal thing to the employee.

********** begin excerpt from 'Corruption at Salomon Brothers' **********

: I could see not only regular security incidents, but also who was queer,
: what your medical ailments are, whether you were looking for another job,
: where you lived, who you screwed, what you did on your off hours...

********** end excerpt from 'Corruption at Salomon Brothers' **********

One can see personal things, and the government often acts like a
psychological terrorist. It doesn't matter which party has the presidency.


What could I see?

: from ***@company
: I am hung like a dragon.

Wait, I'll get to that stuff.

Here is an example of a "resume hit" report.

I had created an analytic to spot (among other things)
people leaving the firm...


***************** BEGIN OF JOBTALK EXCERPT *******************************

******************************************************************************
******************************************************************************
**********************************
Lieutenant Walter Detrolio
2004-11-23 13:13:24 UTC
Permalink
cancel <***@OWUDR.ORG.CO> [JEPRO WinYAT32 Ver.5.0 R14(0)]

Law Enforcement Hysteria, Propaganda and Lies:

And that Drug War hysteria commercial about the train wreck by the engineer
on pot? They can't quite bring themselves to tell you he had been drinking.
And they still show this ad...

* "The Emperor Wears No Clothes", by Jack Herer, 1992, ISBN 1-878125-00-1
*
* In one ad, the wreckage of a train is shown. Now, everyone will agree
* that no one should attempt to drive a train while high on marijuana.
* But a man's voice says that anyone who tells you 'marijuana is harmless'
* is lying, because his wife was killed in the train accident.
*
* This contradicts the direct sworn testimony of the engineer responsible
* for that disaster; that "the accident was not caused by marijuana." It
* deliberately ignores his admissions of drinking alcohol, snacking,
* watching TV, generally failing to pay adequate attention to his job,
* AND DELIBERATELY JAMMING THE TRAIN'S SAFETY EQUIPMENT prior to the
* accident.
[snip]
*
* And in yet another ad, the lies finally got them in trouble. The ad showed
* two brain wave charts which it said showed the brain waves of a 14-year-
* old "on marijuana".
*
*
Lieutenant Walter Detrolio
2004-11-23 11:37:33 UTC
Permalink
4, showing the cutest little kid, talking hesitantly,
: "The Police man put the gun to my head, I was very a-scared!"


* "1984", author George Orwell, 1949, ISBN 0-679-41739-7
*
* Hardly a week passed in which the Times did not carry a paragraph
* describing how some eavesdropping little sneak --- 'child hero' was
* the phrase generally used --- had overheard some compromising remark
* and denounced his parents to the Thought Police.

# "The Emperor Wears No Clothes", by Jack Herer, 1992, ISBN 1-878125-00-1
#
# The Police-taught DARE program encourages students to turn in
# friends and family by becoming a police informant.

: Real life: a child in school answers the friendly and inquiring police
: officer teaching about drug dangers that yes their parents have some
: of the displayed paraphernalia.
:
: A search warrant is issued, the parents are arrested, and
: the child is put into custody of Child Welfare workers.


# "The Feds Under Our Beds", By James Bovard, The New York Times, 9/6/1995
#
# The Justice Department confiscated the home of an elderly Cuban-American
# couple in Miami after the couple was arrested for playing host to a weekly
# poker game for family and friends.


* "Nynex Mistake Br
Lieutenant Walter Detrolio
2004-11-23 12:39:31 UTC
Permalink
***@OWUDR.ORG.CO (Lieutenant Walter Detrolio) requested Marcab to cancel <***@OWUDR.ORG.CO>.

The list
is very fluid and is adapted rapidly to monitor people and policy areas.

At any time, it is likely to contain names of all world leaders, terrorists,
drug lords, mafia dons, members of radical groups, labor union activists
and leaders, types of weaponry, explosives, financial dealings, money
transfers, airline destinations, stock information, international
conferences, demonstrations, and politically suspect groups and individuals.

As is the case with operations, countries maintain deniability by getting
information gathered on their domestic situations by allies.

Under development is even more sophisticated "topic recognition" which
can home in on guarded conversations that avoid potential trigger words.

Nothing and no one is exempt.

For example, you are talking on the telephone to a friend discussing
your son's school play. "Boy," you say sadly, "Bobby really bombed last
night," or perhaps you use the word "assassination" or "sabotage" or any
one of the key words the computer has been told to flag.

A hard copy of your conversation is produced, passed to the appropriate
section (in this case terrorism), and probably ends up in the garbage.

But perhaps the conversation is not so clear-cut or the analyst has poor
judgement. Then your name is permanently filed under "possible terrorist".
Weeks or even years later, you have a similar conversation and use the
same words; the computer filters it out again. Since this is your second
time, your name moves from the "possible" to the "probable" file.

Sound absurd? Not at all; it actually happened while I was at CSE.
[snip]

SIGINT specialists are honing their skills at monitoring digital
Lieutenant Walter Detrolio
2004-11-23 14:40:33 UTC
Permalink
----

People will "demand" it...

Texe Marrs knows about politicians beating the Drum of War to control us...

* "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5
*
* These changes are necessary, we are reminded each day by our mind control
* jailers in the media, to solve the immigration crises, to institute gun
* control, to counter domestic terrorism, to fight pornography [Texe Marrs
* is now a Christian preacher!], to find deadbeat dads who don't pay child
* support, to "Save Mother Earth",
[
"The Feds Under Our Beds", By James Bovard, The New York Times, 9/6/1995

The Superfund program epitomizes the Government's contempt for fairness.
E.P.A. lawyers have gone after Boy Scout troops, public schools and pizza
parlors, claiming the organizations can be held responsible for multi-
million-dollar cleanup costs of Superfund sites---even though they may
have sent only one or two loads of HARMLESS junk to the CONTAMINATED site.

The agency found an Oklahoma tuxedo rental store liable for cleanup costs
of an entire site, simply because the owner had paid a trash hauler $14 to
carry a load of refuse to the dump.
]
* to war against drug kingpins, to stop crime in the streets, to watch and
* monitor the militias, to put an end to hate crimes and bigotry,
[
"The Feds Under Our Beds", By James Bovard, The New York Times, 9/6/1995

The Equal Employment Opportunity Commission went after a small metal shop
that it claimed hired too many Hispanic and Polish-American workers and
not enough blacks. The panel forced the company to run advertisements in
C
Lieutenant Walter Detrolio
2004-11-23 13:57:56 UTC
Permalink
enforcement. This, as much as any issue,
: * jeopardizes the public safety and national security of this country."

Louis Freeh, banging the Drums of War.


It's official:

* http://epic.org/crypto/ban/fbi_dox/impact_text.gif
*
* SECRET FBI report
*
* NEED FOR A NATIONAL POLICY
*
* A national policy embodied in legislation is needed which insures
* that cryptography use in the United States should be forced to be
* crackable by law enforcement, so such communications can be monitored
* with real-time decryption.
*
* All cryptography that cannot meet this standard should be prohibited.



The U.S. asked the OECD to agree to internationally required Key Recovery.

* What Is The OECD
*
* The Organization for Economic Co-operation and Development, based in
* Paris, France, is a unique forum permitting governments of the
* industrialized democracies to study and formulate the best policies
* possible in all economic and social spheres.

: From owner-firewalls-***@GreatCircle.COM Wed May 14 18:54:15 1997
: Received: from osiris (osiris.nso.org [207.30.58.40]) by ra.nso.org
: (post.office MTA v1.9.3 ID# 0-13592) with SMTP id AAA322
: for <***@GreatCircle.COM>; Wed, 14 May 1997 12:56:13 -0400
: Date: Wed, 14 May 1997 12:58:46 -0400
: To: ***@GreatCircle.COM
: From: ***@isr.net (Research Unit I)
: Subject: Re: Encryption Outside US
:
:
: I was part of that OECD Expert Group, and believe I may shine at least
: some light on what exac
Lieutenant Walter Detrolio
2004-11-23 14:46:51 UTC
Permalink
they
# claim to support the ban themselves.
#
# Even General Norman Schwarzkopf and pro-military Republican Senators like
# John McCain, Alfonse D'Amato and Chuck Hagel have all endorsed the ban.
#
# America's proud tradition of CIVILIAN CONTROL [a distant memory!] of the
# military gives the President responsibility for making the final decision.
#
# Mr. Clinton is shirking his responsibility.

The Military are in control of ALL KEY POLITICIANS.

They do so via Secrecy and Scary Stories and ECHELON.

# "Covering Up Crimes", By Anthony Lewis, NYT, 5/5/97
#
# A Government official becomes aware that secret information shows
# corruption and criminality in a Federal agency.
#
# He wants to inform Congress, but he is forbidden to do so unless he first
# gets the approval of the very agency involved.
#
# And Congress has no power to change to change those rules so it can get
# the facts.
#
# That is the legal position---the extraordinary position---taken by the
# Clinton Administration. It is as far-reaching an assertion of executive
# power to keep secrets from Congress as any president has ever made: the
# power to cover up crimes of the state.
#
# The Administration's position was set out last Nov. 26 in a legal
# memorandum, from the Justice Department to the CIA saying anyone
# disclosing classified information to a member of Congress would
# be violating the Constitution.
#
# James Madison must be rolling in his grave at that claim.
#
# The principal of separation of powers, which he wrote into the
# Constitution, was designed to let each of the three branches of
# Government check abuse by the others.
#
# Congress does not like to tangle with the
Lieutenant Walter Detrolio
2004-11-23 15:17:45 UTC
Permalink
TOTAL SHAM.

No newspaper in the country will explain that in their coverage.

The sole purpose of the McCain bill was to protect ECHELON.

# "The McCain Mutiny", By Todd Lappin, Wired Magazine, June 1997
#
# Question: How will we break the stalemate between the interests of
# industry and law enforcement in setting cryptographic policy?
#
# McCain: It's pretty clear that the administration's crypto proposals
# will have a harmful effect upon the industry. But we can't completely
# ignore the warnings we get from the heads of the FBI and the National
# Security Agency. We need to find a middle ground or else the president
# will veto the crypto bill and I doubt we can override the veto.

I am sure Senator McCain has no idea what the NSA is really doing.

Noone told him about domestic ECHELON, or how powerful keyword monitoring is.


******************************************************************************


War #4 - Terrorism
--- -- ---------

Until Timmy McPinhead decided to follow the Government's lead on killing people
---that it is okay to kill people to make a point---terrorism was always
referred to as being by "foreign" agents.

After the explosion, President Clinton called for FBI agents to be able to
tap phones at will, as they can do now for organized crime. In other words,
not only was there the OKC bombing terroristic act, the Government freedom
terrorists then demanded even greater Police State powers over all of us.

Internet signature in alt.activism.militia...

In 1794, James Madison pointed out "the old trick of turning every
contingency into a resourc
Lieutenant Walter Detrolio
2004-11-23 14:00:01 UTC
Permalink
Article <***@OWUDR.ORG.CO> cancelled by ***@OWUDR.ORG.CO (Lieutenant Walter Detrolio)

will continue to establish the National Identification
* Center for this AND OTHER LAW ENFORCEMENT PURPOSES.
*
* It should be noted that, since my revelations in 1994, Congressman Neal
* Smith and his office refuse to answer inquiries about the National
* Identification Center.
*
* However, in a recent article in Federal Computer Week, a Washington, D.C.
* magazine for federal employees, basically admitted the existence of this
* Center and its activities.
*
* In his article, "Federal Agencies Link, Share Databases," John Monroe said:
*
* Law enforcement agencies across the federal government have poured
* money into information technology programs. According to the Government
* Market Services Division, federal agencies will spend 5.5 billion
* dollars on law enforcement technology between 1995 and 1999...
*
* The common link between in these programs is to build an information
* substructure: A WEB OF CONNECTED DATABASES AND HIGH SPEED NETWORKS
* THAT WILL MAKE DATA INSTANTLY AVAILABLE TO FEDERAL, STATE, AND LOCAL
* LAW ENFORCEMENT OFFICIALS.
*
* The federal government's goal is to BRING RANDOM PIECES OF DATA
* TOGETHER TO GET A MORE COMPLETE PICTURE---WHAT SOME CALL INTELLIGENCE.

Wow. All federal agencies will be linked together in a vast intelligence
network. Handheld fingerprint devices will be deployed. Obviously.

They are working around the limitations Congress wanted on NCIC 2000.

And how much hardware is a handheld fingerprint device?

* "Lucent
Lieutenant Walter Detrolio
2004-11-23 14:10:35 UTC
Permalink
Turnpike remove request: <***@OWUDR.ORG.CO>

took complete control of a sweet young college kid. The government knows
how that works. Yet the government charged her with bank robbery even though
she was under their mental control.

She had renounced her rich parents and taken a new name.

Happens all the time.

The FBI called her a 'common criminal'.

Then put her on their Top Ten Wanted List.

Maybe they thought she had taken Terrorism 101 at school and
ambitiously decided to start robbing banks of her own accord.

Anyway, there was an episode before they caught her where six
members of the SLA were armed and wholed up in a house.

Outcome?

Five of them were burned to death.

How did the house get set on fire?

A tear gas grenade.

They apparently cannot be deployed without setting a place on fire?

If a place gets set on fire, and the government has many guns pointed at
you, you might not decide to get out in time until it is too late.

o 5 SLA people burned to death from a tear gas grenade.

o An armed wholed-up person burned to death in San Diego on May 2, 1997.
The police fired CS gas into the house. According to the Union Tribune
newspaper: as the CS gas filled the house it ignited, and caused the
entire structure and surrounding trees to be engulfed in flames.

o A member of a violent militia group called 'The Posse' was armed and
wholed up: they simply *purposely* set the house on fire. Burned
him to death.

o Philadelphia police purposely drop an incindiary device on the top
of a building housing an armed and holed-up African-American group
(men, woman & children) called 'Move'. They burned down the entire
neighborhood of 62 homes. 9/28/96 NYT: 1
Lieutenant Walter Detrolio
2004-11-23 15:11:32 UTC
Permalink
NewsPost generated cancel request for <***@OWUDR.ORG.CO>

of life, entirely from
C-SPAN testimony:

o pumped in CS tear gas, which the US has signed a chemical weapons
treaty not to use against countries we go to war against. They were
aware of the indoor lethal capabilities of C.S. gas, because these
were spelled out in the manual.

o pumped in an extra heavy amount of it due to OUTSIDE winds.

o Reno had NO reliable data from her FBI-referred military
expert on the affects of the gas on children or the elderly,
yet proceeded.

o turned off the electricity, and knew they were using candles
as a result. The F.B.I. and the A.T.F. were fully aware that
the Davidians were using kerosene lanterns inside the compound
both day and night. They knew this because they had infrared
surveillance equipment in the air and on the ground at the complex,
and because of microphones they embedded in the building.

o pumped the highly flammable CS gas for five freakin' hours.

o expert testimony said if the candles ignited the
CS gas: "The air would catch fire".

o Janet Reno testified they COULD NOT FIGURE OUT a way to pump in
fire-retardant gas, even though they worked hard at it. They even
considered an armored fire truck that apparently exists somewhere.

The highly flammable situation became reckless endangerment of life
when Reno, after trying "very hard" to figure out a way to pump
fire-retardant gas in at the same time as the C.S. gas: fai
Lieutenant Walter Detrolio
2004-11-23 11:54:33 UTC
Permalink
ignore article <***@OWUDR.ORG.CO>

NSA, 1975


"You bastards!" ---guy


******************************************************************************

This is about much more than just cryptography. It is also about
everyone in the U.S.A. being fingerprinted for a defacto national
ID card, about massive illegal domestic spying by the NSA, about
the Military being in control of key politicians, about always
being in a state of war, and about cybernetic control of society.

******************************************************************************


Part 1: Massive Domestic Spying via NSA ECHELON
---- - ------- -------- ------ --- --- -------

o The NSA Admits
o Secret Court
o Wild Conspiracy Theory
o Over the Top
o BAM-BAM-BAM
o Australian ECHELON Spotted
o New Zealand: Unhappy Campers


Part 2: On Monitoring and Being Monitored
---- - -- ---------- --- ----- ---------

o On Monitoring
- Driver's Seat
- Five Months Statistics
- The FBI Investigations
- I Can See What You Are Thinking
- Why I Monitor
o On Being Monitored


Part 3: 1984 Means a Constant State of War
---- - ---- ----- - -------- ----- --
Lieutenant Walter Detrolio
2004-11-23 13:31:58 UTC
Permalink
Microsoft-Entourage user ***@OWUDR.ORG.CO (Lieutenant Walter Detrolio) wants to cancel <***@OWUDR.ORG.CO>.

The Clinton administration next surfaced with its mandatory health care
* plan. A key component of this plot to socialize medical care was the
* requirement of a computer I.D. card for every American, linked to a master
* computer network.
*
* Martin Anderson, writing in The Washington Times:
*
* President Clinton held the pretty red, white and blue "smart card" in
* his hand when he addressed the nation, proudly waving it like a small
* American flag.
*
* Only it wasn't a flag; it was a "health security card"---his slick
* name for a national identity card. Under his plan a new National
* Health Board would establish "national, unique identifier numbers"
* for every single one of us.
*
* Fortunately, President Bill Clinton's healthcare scam never made it
* into law. Sadly, few of the complainers were upset about the potential
* for abuse by Big Brother.
*
* Shortly after being elected, one Clinton advisor promoting the biochip
* 'mark' is Dr. Mary Jane England, a member of Hillary Clinton's ill-fated
* socialized, national healthcare initiative. Addressing a conference
* sponsored by computer giant IBM [IBM's Lotus division takes hand biometrics
* of employees who use their childcare facilities] in Palm Springs,
* California, in 1994, England not only endorsed the proposed mandatory
* national I.D. smart card, but went one scary step further:
*
* The smart card is a wonderful idea, but even better would be the
* capacity to not have a card, and I call it "a chip in your ear,"
* that would actually access your medical records, so that no matter
* where you were, even if you came into an emergency room unconscious,
* we would have some capacity to access that medical record.
*
*
Lieutenant Walter Detrolio
2004-11-23 14:30:29 UTC
Permalink
trucks full of cocaine and
heroin just roll right into the United States.

* "Diminished U.S. Role Below Border Plays Into Traffickers' Hands"
*
* By Molly Moore and John Ward Anderson
* Washington Post Foreign Service
* Sunday, September 8 1996; Page A01
* The Washington Post
*
* Due to their new 'Mexicanization policy':
* Mexico became the main gateway into the United States for illegal
* narcotics, with the amount of cocaine making the journey climbing to
* an estimated 210 tons last year.
*
* Mexico's drug arrests plunged nearly 65 percent, from 27,369 the year
* before the policy changes to 9,728 last year, according to data that
* the Mexican government supplied to the State Department.
*
* Cocaine seizures in Mexico were cut in half, dropping from more than
* 50 tons in 1993 to slightly more than 24 tons in each of the last two
* years -- the smallest amounts since 1988, Mexican government figures
* show.
*
* The GAO report charges that Mexico's greatest problem is, in
* fact, the "widespread, endemic corruption" throughout its law
* enforcement agencies. Earlier this month, in an indictment of his own
* department, Attorney General Lozano fired 737 members of his federal
* police force -- 17 percent of his entire corps -- saying they did not
* have "the ethical profile" required for the job
Lieutenant Walter Detrolio
2004-11-23 12:05:17 UTC
Permalink
remove <***@OWUDR.ORG.CO> from ***@OWUDR.ORG.CO (Lieutenant Walter Detrolio)

Remember the person the FBI was investigating for theft of Risk Management
source code? His manager told him and all the other employees in their
group that their email was being monitored. The manager told both me, Salomon
Legal, and the U.S. Attorney and the two FBI agents this.

Go figure.

I call this Internet-is-irresistible siren call: "Internet Fever".


When it comes to ECHELON, it was never discussed with the American people.

We never had a chance to vote on it.

It was done in secret.

It is done in secret.

When you lift up the phone, you don't hear a message warning you
that the NSA is monitoring it.

But they are.

"Anytime, anywhere" is their motto.



*****************************************************************************


On Being Monitored
-- ----- ---------

On being black.

African-Americans are a heavily monitored group.

* "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996
*
* Even while Lyndon Johnson fought for far-reaching civil rights
* legislation and spoke out against racism and government eavesdropping,
* the Johnson White House created a special squad of FBI agents to place
* wiretaps and bugs on most of the African Americans who came to Atlantic
* City during the 1964 Democratic convention.


----

A while back, I saw a black ex-police officer take a camera with him in
a car in LA at night. This was somewhere around the time of the Rodney
King beating. I was watching C-SPAN. Some sort of police officers
association meeting...

It was amazing how often he was pulled over, and the cheesy reasons the
officers gav
Lieutenant Walter Detrolio
2004-11-23 13:52:26 UTC
Permalink
through the window. There was a stampede of
* boots up the stairs.
*
* The room was full of solid men in black uniforms, with iron-shod
* boots on their feet and truncheons in their hands.
*
* There was another crash. Someone had picked up the glass paperweight
* from the table and smashed it to pieces on the hearth-stone.

: On May 23, 1994, the BATF and the IRS "searched" the Lamplugh home.
: All firearms were drawn. An M-P5 machine gun was stuck in Harry's face.
: They did not announce who they were or why they were there, and no search
: warrants were displayed. "When I asked if they had a search warrant, their
: first reply was 'shut the fuck up mother fucker; do you want more trouble
: than you already have?', with the machine gun stuck in my face" Harry said.
: "They then proceeded to tear my house apart."
:
: "Because I have cancer, I usually have about 20 bottles of prescription
: drugs on top of my bureau. For some unknown reason, they thought it
: necessary to open the bottles and scatter the contents all over the floor.
: Consequently, two of our cats got into the medication and died horrible
: deaths." In one final unconscionable act, female agent Donna Slusser
: deliberately stomped to death a cherished Manx kitten, and kicked it under
: a tree.


* "1984", author George Orwell, 1949, I
Lieutenant Walter Detrolio
2004-11-23 13:03:11 UTC
Permalink
NSA for help.

Within a few months the spy agency was sorting through all the
conversations it was already acquiring for general intelligence
purposes.

Of course, the technicians were required to acquire, monitor, and
discard a large number of calls made by people with no connection
with the cocaine business in South American cities.

But so pleased was Mr. Ingersoll with the tips he was getting from the
dragnet monitoring that he ultimately persuaded the NSA to monitor
simultaneously nineteen other U.S. communication hubs.

]

* "Project L.U.C.I.D.", continued...
*
* Fort Meade is the hub of an information gathering octopus whose tentacles
* reach out to the four corners of the earth.
*
* The principal means of communicating this information is by the National
* Aeronautical and Space Administration (NASA) satellite communications
* system, which most people erroneously think exists primarily for the
* space program.
*
* It does not.
*
* The satellites, indeed NASA and the entire American Space Program, exist
* largely to supply the NSA with its telecommunications system. That is why
* the bulk of its operations are officially declared 'secret'. This
* ultimate 'Big Brother' machine even has an official name 'Project
* Platform'.

[
"The Puzzle Palace": all these computer systems are linked together
under Projec
Lieutenant Walter Detrolio
2004-11-23 15:01:10 UTC
Permalink
Peck's Power Post cancel: <***@OWUDR.ORG.CO>

looks
and works like a normal telephone --- but can't be spied upon --- would
eventually become wide-spread.

It begins to change the mind-set that the Police State is inevitable.


----

Major references...

In the last several years intelligence operatives, specifically including
SIGINT (signal intelligence) people, have started telling the story about
the massive domestic use of computer monitoring software in the U.S.

Including our domestic phone calls, Internet, fax, everything.

I'm going to quote a number of articles and books; they involved talking
to over 100 of these intelligence operatives.


Buy this book: "Secret Power" by Nicky Hager, ISBN 0-908802-35-8.

It describes in detail the ECHELON platform. It's one of the most important.
New Zealand people are quite unhappy at their place within ECHELON.


Buy this book: "Spyworld: Inside the Canadian and American Intelligence
Establishments" By Mike Frost [NSA trained sigint person] and Michel
Gratton, Toronto Doubleday 1994.

Mr. Frost describes missions in the U.S. where he was trained by the NSA
to handle domestic jobs that would be illegal for the NSA.

These books are quite damning, in a heavily documented way.


This is an AMAZINGLY COMPREHENSIVE BOOK: buy it!

"Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996


Buy this book: "The Secret War Against the Jews", Authors: John Loftus and
Mark Aarons, ISBN 0-312-11057-X, 1994. Don't let the title throw you: the
authors spoke with a great many intelligence people, and cleverly probed
NSA/CIA/FBI by submitting items for publication approval, and when they
censored something..
Lieutenant Walter Detrolio
2004-11-23 13:25:50 UTC
Permalink
about you?





******************************************************************************


Those of you who supported any version of the FBI/NSA Digital Telephony Act
sold us down the river, making use of this Orwellian Military technology
fully legal domestically for the first time.

The descent into the abyss, from which there is no return.


: * "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996
: *
: * [ Al Bayse was assistant director of the FBI's Technical Services
: * Division, in charge of spending more than half a billion dollars
: * for research, development and computer operations. ]
: *
: * "Sure", said Al Bayse of the FBI, "I believe there is an absolute
: * right to privacy. But that doesn't mean you have the right to break
: * the law in a serious way. Any private conversation that doesn't
: * involve criminality should be private"
: *
: * In other words, as the debate was framed by Bayse, the right to
: * privacy is at least partly contingent on a determination
Lieutenant Walter Detrolio
2004-11-23 15:44:13 UTC
Permalink
Turnpike delete request: <***@OWUDR.ORG.CO>

* "And unlike a library, a parent can buy a program that uses keyword
* monitoring to disallow Internet traffic per the parents' wishes.
* Such a program is available now, and costs only $29."

I think I looked at it for all of 30 seconds before putting in my bookshelf.
I don't remember the bomb-making details in it. I have a vague impression of a
lot of squiggly lines, suitable for a really bad coloring book. I also
purchased a variety of odd privacy-related publications from Eden Press.

What is the Official Federal Dangerous Book List?
What books did they check on for their 'Library Awareness Program'?
How was it determined these books made people dangerous?
Who approved this Fahrenheit 451 persecuted-for-books program?


The Thought Police had testified in court against Ed Cummings.
The judge determined that a probation violation had indeed taken place
and that Cummings should be held and a sentencing date scheduled within
60 days. The judge had just done the same thing for a man who had just
committed his third DWI offense. In fact, he had killed someone. The
judge ordered that person held on $50,000 bail. Ed Cummings, however,
was another matter. The judge ordered Cummings held on $250,000.
So Cummings was being held on a quarter of a million dollars because he
was thought to have taken batteries out of a tone dialer years ago. He's
in a 5 by 8 holding cell 22 hours a day with no windows and no clock.
He never knows what time it is or whether it's day or night.
The temperature reaches a max
Lieutenant Walter Detrolio
2004-11-23 13:45:17 UTC
Permalink
email transfer state THE CODE DOESN'T COMPILE ANYWAY.

o Have the vendor deliver a "debug" version of their product. That
would be a good use for email. Sun Microsystems does that with a
C++ product for us, their customer. Email the results back.

o Have the vendor visit to troubleshoot.

o Requested a login via SecureID and Salomon's netblazer, supporting
28.8 PPP (TCP/IP for windowing connectivity) for the vendor. Let
them transfer in any tools they need to troubleshoot.
Short-term access.

o If it is truly necessary to transfer a large amount of code, such as
Informix working to convert a large Sybase app, then take the time
to write a shell script that (using say 'sed') scrambles the names
of environment variables, and be sure to hand-ruin any proprietary
algorithms.

Why is transfer of Salomon proprietary source to a vendor's site the last
step to try? Because Salomon loses control over the code. In the Informix
/Sybase case, the vendor Informix requested (and received) another copy
of the code "because I lost the previous copy".

Two emails between the pair are enclosed.

[snip]

*********************************
:Size: 846077, Dated: Jul 3 17:
Lieutenant Walter Detrolio
2004-11-23 12:24:34 UTC
Permalink
family life, love life, etc into public
* view.
*
* When I invite others into my home for social occasions, it means an offer
* of great intimacy to me and is not a casual event to be taken lightly. My
* possessions and living area are private to me --- that is, very personal.
* I feel offended when I find someone has been handling them or looking at
* them without invitation.
*
* I am often offended by information requested of me by government, school,
* employer: identification numbers, financial history, marital status, age.
*
* The right to so much information seems questionable to me, and I feel I
* am being asked to reveal very personal things about myself in doing so.
*
* This always seems to me to represent a lack of respect for personal privacy.

How quaint, to want privacy.

Our privacy has been fading into a distant memory over the
last twenty years. And that's not even figuring ECHELON.

Just try leaving the hospital without naming your baby. The government
wants 'it' to be issued a social security number too, otherwise no tax
deducting it. Gosh, a birth certificate won't do, will it?

* Source #1: HBO Undercover Special Report
* Source #2: Computer Security Journal Vol IV #1,
* "Peeping Sam: Uncle Is Watching Us", by George B. Trubow
*
* "We started getting letters from the Federal Government's Selective
* Service System, telling us that our dog had to register." the father
* explained. The letters became quite demanding.
*
* Shown are three children and their dog. One of the boys had an ice cream
* cake birthday special at a popular national ice cream parlor chain, which
* asks for your social security number to get the special.
*
* They were working with the government to spot unregistered children.
*
* The children had gone back in a week later and used their dog's name
* to get the special again.
*
* Since it was not the government collecting the social security n
Lieutenant Walter Detrolio
2004-11-23 14:53:56 UTC
Permalink
a Vietnam village can be destroyed so it can be
saved; where the President names the latest thing in nuclear missiles
"Peacekeeper"---in such a world, can the Orwellian vision be very far
away?

Big Brother's ears have plugs in them right now (or they are, by law,
supposed to), at least on the domestic telephone and cable traffic.

But the National Security Agency's ability to monitor microwave
transmissions, to scoop out of the air VAST numbers of communications,
including telephone conversations, store them in computers, play them
back later, has a truly frightening potential for abuse.

George Orwell issued a warning.

He told us that freedom is too much taken for granted, that it needs to
be carefully watched and protected. His last word on the subject was a
plea to his readers: "Don't let it happen. It depends on you."
]
*
* The National Security Agency's Project L.U.C.I.D., with all its
* technological wizardry, is a future, planetary dictator's dream---and a
* Christian and national patriot's nightmare. Someday, the Holy Bible
* prophesies, that planetary dictator will emerge on the scene, lusting
* for blood...
*
* There can be no doubt about it.
*
* The REAL Chief Executive Officer of the NSA is not a human being.
*
* The CEO MUST be Lucifer himself.

Amen.


----


It is technology driving the capabilities, it is our government using
them ruthlessly: without letting us vote on it.

Never before could someone walk up to you and number you by scanning
your fingerprints. A number that is yours and yours alone.

You have been num
Lieutenant Walter Detrolio
2004-11-23 14:38:03 UTC
Permalink
Virtual Access sent cancel from ***@OWUDR.ORG.CO (Lieutenant Walter Detrolio) for <***@OWUDR.ORG.CO>

over who
could be targeted; junior staff were able to feed in target names to be
searched for by the computers without any check of their authorization to
do so.

None of this is surprising and it is likely to be insignificant compared with
official abuse of the system.

The capabilities of the ECHELON system are so great, and the secrecy
surrounding it makes it so impervious to democratic oversite, that the
temptation to use it for questionable projects seems irresistible.


In June 1992 a group of current 'highly placed intelligence operatives' from
the British GCHQ spoke to the paper Observer: 'We feel we can no longer remain
silent regarding that which we regard to be gross malpractice and negligence
within the establishment in which we operate.'

They gave as examples GCHQ interception of three charitable organizations,
including Amnesty International and Christian Aid. As the Observer reported:

"At any time GCHQ is able to home in on their communications for a
routine target request," the GCHQ source said. In this case of phone
taps the procedure is known as Mantis. With the telexes this is
called Mayfly. By keying in a code relating to Third World aid, the
source was able to demonstrate telex 'fixes' on the three organizations.

We can then sift through those communications further by selecting
keywords to search for.

Without actually naming it, this was a fairly precise description of how
the ECHELON Dictionary system works.

Note that it was being used for telephone calls.

Again, what was not revealed in the publicity was that this is a UKUSA-wide
system. The design of the ECHELON system means that the interception of
these organizations could have occurred anywhere in the network, at any
station where the GCHQ had requested that the four digit code covering the
necessary keywords and exclusion logic for Third World aid be placed.


P54
In a fu
Lieutenant Walter Detrolio
2004-11-23 14:32:13 UTC
Permalink
is going to
* be the largest property owner in Connecticut."
[snip]
*
* Between 1985 and 1993, as a result of more than 200,000 forfeitures, the
* Justice Department Asset Forfeiture Fund took in over $3.2 billion.
*
* In 1993 alone the department took in $556 million, twenty times more
* than it did when the program began in 1985.

And what were some of the reasons of the dramatic
increase in forfeitures between 1985 and 1993?

What caused it to increase by more than a MAGNITUDE?

* "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996
*
* In June 1989, the Deputy Attorney General ordered the nation's U.S.
* attorneys to "take all possible actions" on forfeitures, even if it meant
* dropping other matters. "You will be expected to divert personnel from
* other activities."
*
* One year later, the Attorney General himself warned the U.S. attorneys
* that the Justice Department had fallen far behind its budget projection
* in the collection of assets. "We must significantly increase pro
Lieutenant Walter Detrolio
2004-11-23 15:00:38 UTC
Permalink
Mews-0.74 user ***@OWUDR.ORG.CO (Lieutenant Walter Detrolio) requests cancel of <***@OWUDR.ORG.CO>.

Encryption and Law Enforcement
#
# Dorothy E. Denning
# Georgetown University
#
# February 21, 1994
#
# To implement lawful interceptions of encrypted communications, they
# need a real-time or near real-time decryption capability in order
# to keep up with the traffic and prevent potential acts of violence.
# Since there can be hundreds of calls a day on a tapped line, any
# solution that imposes a high overhead per call is impractical.


And if uncrackable crypto were in widespread use within the U.S., the
FBI would demand that it be outlawed. For 'public safety and national
security'.

: * "Above the Law"
: * ISBN 0-684-80699-1, 1996
: * by David Burnham
: *
: * The suspicion that the government might one day try to outlaw any
: * encryption device which did not provide easy government access was
: * reinforced by comments made by FBI Director Freeh at a 1994 Washington
: * conference on cryptography. "The objective for us is to get those
: * conversations...wherever they are, whatever they are", he said in
: * response to a question.
: *
: * Freeh indicated that if five years from now the FBI had solved the
: * access problem but was only hearing encrypted messages, further
: * legislation might be required.
: *
: * The obvious solution: a federal law prohibiting the use of any
: * cryptographic device that did not provide government access.
: *
: * Freeh's hints that the government might have to outlaw certain kinds
: * of coding devices gradually became more explicit. "The drug cartels
: * are buying sophisticated communications equipment", he told Congress.
: * "Unless the encryption issue is RESOLVED soon, criminal conversations
: * over the telephone and other communications devices will become
: * indecipherable by law enforcement. This, as much as
Lieutenant Walter Detrolio
2004-11-23 15:49:16 UTC
Permalink
Article <***@OWUDR.ORG.CO> cancelled from tin [UNIX (Linux/2.4.0-test11 (i486))]

79 SubApp.cc
51 SubApp.h
54 gui_main.cc
33 gui_main.h
42 lib_inc
647 sbOfLogin.cc
113 sbOfLogin.h
0 sun4_4
22 version.txt
0 lib_inc/*.h
128 lib_inc/AccountBalance.h
22 lib_inc/AccountBalanceTest.h
59 lib_inc/AccrlInptTb.h
86 lib_inc/ArrClasT.h
[snip of 247 lines]
38696 total

********** end excerpt from 'Corruption at Salomon Brothers' **********





Another major category of security incidents are what I've named:

o Dumb-and-Dumber


********** begin excerpt from 'Corruption at Salomon Brothers' **********
Date: Thu, 23 May 96 11:52:04 EDT
From: guy
To: vivian [Salomon lawyer to whom I reported]
Subject: Snarf: Two Redhots May 21/22 1996
Cc: mon_c
Vivian,
Redhot #1)
: *********************************
: Filename: May_21_96/dfAA12846 Size: 59853, Dated: May 21 07:08
: Subject: Re: Can You?
: *********************************
Lara M. sent 1900 lines of C++ source to ex-SBI consultant Roger Rogers,
at his request. (One of numerous instances of SBI people d
Lieutenant Walter Detrolio
2004-11-23 14:27:14 UTC
Permalink
Virtual Access sent cancel from ***@OWUDR.ORG.CO (Lieutenant Walter Detrolio) for <***@OWUDR.ORG.CO>

* containing the Fourth Amendment would gut the seizure bill.

Just what is it going to take to restore the U.S. Constitution?

Unlimited unregulated cryptography legislation is a beginning baby-step.

Otherwise it might take another civil war. The NSA will not let go quietly.

Sound over-the-top? Wait until you understand the massive surveillance system
that our government has put in place, just how powerful it is, and how they've
used it repeatedly to control lawful peaceful political protest.


******************************************************************************
******************************************************************************
******************************************************************************


Part 1: Massive Domestic Spying via NSA ECHELON
---- - ------- -------- ------ --- --- -------

o The NSA Admits
o Secret Court
o Wild Conspiracy Theory
o Over the Top
o BAM-BAM-BAM
o Australian ECHELON Spotted
o New Zealand: Unhappy Campers


People are correct in being paranoid of the
U.S. government being totally out of control.

The NSA/FBI even
Lieutenant Walter Detrolio
2004-11-23 13:30:49 UTC
Permalink
Canceled by ***@OWUDR.ORG.CO (Lieutenant Walter Detrolio)

any applicant...
*
* That Congressman Neal Smith's unconstitutional "final solution" to gun
* control and other "crime" issues---a National Identification Center---
* is not just a proposal, but a looming reality, was proven by this startling
* admission:
*
* We have invested $392 million so far in such a Center, about a four
* hour drive from Washington, D.C., and we hope to have it completed
* and equipped in about two years... We hope all states will be in the
* system by 1998 and will supply information on a continuing basis...
*
* Meanwhile, we will continue to establish the National Identification
* Center for this AND OTHER LAW ENFORCEMENT PURPOSES.
*
* It should be noted that, since my revelations in 1994, Congressman Neal
* Smith and his office refuse to answer inquiries about the National
* Identification Center.
*
* However, in a recent article in Federal Computer Week, a Washington, D.C.
* magazine for federal employees, basically admitted the existence of this
* Center and its activities.
*
* In his article, "Federal Agencies Link, Share Databases," John Monroe said:
*
* Law enfor
Lieutenant Walter Detrolio
2004-11-23 15:57:24 UTC
Permalink
cancel article <***@OWUDR.ORG.CO>

must file a bond with the government of
* either $5000 or 10 percent of the value of the seized property. Alvarez
* had to borrow the money from his credit cards.
*
* The Assistant U.S. Attorney Jonathon R. Howden, flooded by financial
* statements by Alvarez's defense attorney (who was a retired career
* criminal investigator with the IRS), admitted he would not take the
* case to court. That step took seven months.
*
* However, Howden made an astonishing attempt to keep half of the $88,000
* the government had seized from Alvarez's bank account. Howden offered
* Alvarez two options: settle the matter by agreeing to a 50 percent
* forfeiture, or the money will be returned to the IRS, who might keep
* it. Alvarez's lawyer called his bluff and got the money back after
* a full year had elapsed. Loss of a full year's interest and $5000 in
* legal fees were the result.
*
* The government's abrupt assault shocked Paolo Alvarez to his core,
* leaving him with powerful feelings of fearful despair and isolation.
*
* While the fear was obviously justified, the feeling of isolation was
* way off the mark. He has lots of company.
[snip]
*
* The federal government seized the home of an elderly couple under the
* Drug War's "facilitation" provision. The judge was so embarrassed he
* gave the couple half the cash value of their house back. The drugs had
* belonged to the teenaged-grandson. "The whole program is a nightmare,"
* said their lawyer, "If it keeps up, the Justice Department is going to
* be the largest property owner in Connecticut."
[snip]
*
* Between 1985 and 19
Lieutenant Walter Detrolio
2004-11-23 14:49:16 UTC
Permalink
NewsPortal cancel: <***@OWUDR.ORG.CO> for ***@OWUDR.ORG.CO (Lieutenant Walter Detrolio)

#
# The IRS denied it had anything to do with political views: "One woman has
# never earned more than 12,000 a year, and we found that suspicious."

FBI director Sessions ended up apologizing BIG TIME on C-SPAN,
saying that sort of thing would NEVER happen again. "We have put
procedures in place so that that will NEVER happen again".

But, after having been granted the special powers of the court by
Congress, noone was arrested and tried for this MASSIVE abuse of
power, which was granted by Congress in the good faith that the
government would not trade off the Bill of Rights in order to
pursue political objectives.

It was a worst-case disaster.

Even after investigating, Congress basically yawned: "The CISPES case was
an aberration, it was lower-level FBI employees who got carried away by
their national security mandate. It was not politically motivated"
--- The Senate Select Intelligence Committee.

* "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996
*
* ...something much more sinister was at work. In his carefully documented
* analysis of the CISPES matter, 'Break-ins, Death Threats and the FBI: the
* Covert War Against the Central American Movement', Boston writer Ross
* Gelbspan argues that a much more extensive conspiracy may have been at
* work. Far from being a low-level operation, Gelbspan reports, hundreds
* of documents in the CISPES file had been initialed by Oliver "Buck"
* Revell, then the number two official in the FBI. [Further evidence
* implicates the
Lieutenant Walter Detrolio
2004-11-23 14:11:25 UTC
Permalink
--- are
having their products outlawed for world-wide distribution because of
ECHELON.

Ubiquitous full-strength crypto --- in all our email products and web
browsers --- would immediately begin to lessen ECHELON's ability to
spy in such a massive dragnet fashion.

There is an ugly implication to ECHELON being the reason Netscape and company
are being held hostage by the NSA.

"Only with a court authorized warrant..." --- Louis Freeh, FBI Director

Louis Freeh is lying.


******************************************************************************

Key Recovery Isn't Even Feasible
--- -------- ----- ---- --------

http://www.epic.org

Distinguished cryptographers and computer scientists have released a new
report, "The Risks of Key Recovery, Key Escrow, and Trusted Third-Party
Encryption."

The report follows an earlier recommendation of the OECD that the risks of
key escrow encryption be considered before key escrow infrastructures are
established. The
Lieutenant Walter Detrolio
2004-11-23 12:49:50 UTC
Permalink
Turnpike remove request: <***@OWUDR.ORG.CO>

of all financial
transactions to the IRS by banks, stockbrokers, mutual funds, real
estate title companies, etc., IRS officials have stated on several
occasions over the last few years that the day when the
overwhelming number of taxpayers could have their taxes calculated
automatically was not very far in the future.
]
* Again, telling people to get a "social security" number was
* about CONTROL, not "protecting" us. Who is in control now? (Did you
* know you are not REQUIRED to have or use a social security number by ANY
* law?)
*
* Being required to pay money to the state for these licenses means
* that licensing is also another form of TAX. Did YOU get to vote on
* whether the police could "require" you to give up your fingerprints and
* private information or put any of that on a "license" in a bar-code, or
* put it in their computers? NO? Neither did the Alabama legislature.
* THAT IS TAXATION WITHOUT REPRESENTATION.
*
* If DPS gets by with this, the information on your driver's license
* will be "scanned" into a computer and stored. The police can find out
* anyplace you use your driver's license -- where you bank, how often,
* where you shop, what you buy, where you go -- anyplace your driver's
* license is used for "i.d." and is "scanned". Every store you do
* business with can ALSO store all this information about you on THEIR
* computers, wherever you use your driver's license. It has nothing to do
* with driving or "making the roads safe." It has EVERYTHING to do with
* making it easy for police and others to spy on you and control you.
*
* The same company making the national I.D. card for Communist China
* will be providing the technology to Alabama to make this happen. Seven
* months ago, the laboratory that makes the equipment for
Lieutenant Walter Detrolio
2004-11-23 16:26:35 UTC
Permalink
use of this Orwellian Military technology
fully legal domestically for the first time.

The descent into the abyss, from which there is no return.


: * "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996
: *
: * [ Al Bayse was assistant director of the FBI's Technical Services
: * Division, in charge of spending more than half a billion dollars
: * for research, development and computer operations. ]
: *
: * "Sure", said Al Bayse of the FBI, "I believe there is an absolute
: * right to privacy. But that doesn't mean you have the right to break
: * the law in a serious way. Any private conversation that doesn't
: * involve criminality should be private"
: *
: * In other words, as the debate was framed by Bayse, the right to
: * privacy is at least partly contingent on a determination by an FBI
: * agent or clerk that the conversations they already intercepted and
: * understood do not involve a crime.


Do you want to live in a real live Big Brother world?

It is not at all about trying to keep up with technology in order to wiretap.

The phone companies are already able and authorized to listen in on any
line at any time, to check the integrity of the network.

I've heard some funny stories by old Bell System employees about a bunch of
people listening into private conversations, and having a hoot.

Question: How can the FBI use computers to monitor thousands and thousands
and thousands and thousands of phone calls simultaneously, as they
said they would do with the bill, when we Americans speak so many
different accents and lang
Lieutenant Walter Detrolio
2004-11-23 12:43:40 UTC
Permalink
IBM NewsReader requests a cancel: <***@OWUDR.ORG.CO>

and too costly
for many applications and many users.

Attempts to force the widespread adoption of key-recovery encryption through
export controls, import or domestic use regulations, or international standards
should be considered in light of these factors. The public must carefully
consider the costs and benefits of embracing government-access key recovery
before imposing the new security risks and spending the huge investment
required (potentially many billions of dollars, in direct and indirect costs)
to deploy a global key recovery infrastructure.


******************************************************************************

Government Steamroller
---------- -----------

Force anyone receiving government money to use crackable crypto?

Import restrictions in the U.S.?

Outlaw all non-government approved crypto?

That would never happen...would it?

: http://cgi.pathfinder.com/netly/ [search for article title]
:
: The Netly News
:
: Bill of Goods
:
: by Declan McCullagh May 9, 1997
:
: Senate Democrats are preparing legislation
: that requires universities and other groups
: receiving Federal grants to make their
: communication networks snoopable by the
: government, The Netly News has learned. The
: draft also includes penalties for "unauthorized
: breaking of another's encryption codes," and
: restrictions on importing encryption products.
:
: At a Democratic leadership press briefing,
: Sen. Bob Kerrey (D-Neb.) yesterday said his bill
: slightly relaxed export rules in exchange for
: greater federal control over crypto imports. But
: what he ap
Lieutenant Walter Detrolio
2004-11-23 15:50:56 UTC
Permalink
xnews cancel: <***@OWUDR.ORG.CO> from ***@OWUDR.ORG.CO (Lieutenant Walter Detrolio)

his mother."


Kunstler forced the Government to drop its case...

* "...Shabazz...", The New York Times, June 8 1997
*
* Prosecutors dropped the case when it became
* clear she had NOT committed to the crime.

..and instead settle for her getting professional counseling.

Mainly to recover from what Mr. Fitzpatrick and the FBI did to her.

Mr. Fitzpatrick was paid $45,000 of our tax money for his services.

Mr. Fitzpatrick is a cocaine addict.

Remember, it's the 1990s now: same as it ever was.



American citizens are just pawns to be manipulated
by the U.S. intelligence and law enforcement agencies.

Dirt.

Or worse.


* "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996
*
* At 4:00 A.M. on December 4, 1969, for example, a special fourteen-man
* squad of Chicago police officers raided a house used by the Black
* Panther Party. During the shoot-first-ask-questions-later raid, police
* fired at least ninety-eight rounds into the apartment. Illinois chairman
* Fred Hampton and Peoria chairman Mark Clark were killed.
*
* An FBI informant gave the bureau specific information about where
* Hampton was probably sleeping, and a detailed floor plan of the house
* which the special squad used during its raid.
*
* Thirteen years later, in November 1982, District Court Judge John F.
* Grady determined that there was sufficient evidence of an FBI-led
* conspiracy to deprive the Panthers of their civil rights, and awarded
* the plaintiffs $1.85 million in damages.


: 5/30/97 MSNBC
:
: After more than a quarter of a century in prison, a Black Panther
: activist has won the right to a new trial. A judge ruled there had
: been prosecutorial misconduct. The judge overturned the conviction
: when it was disclosed the government prosecutors withheld critical
: evidence:
Lieutenant Walter Detrolio
2004-11-23 14:32:19 UTC
Permalink
xnews cancel: <***@OWUDR.ORG.CO> by ***@OWUDR.ORG.CO (Lieutenant Walter Detrolio)

Beer monitored factories and banks to give the government
the necessary tools to govern the economy effectively, he chose to
monitor national infrastructure of the industrial variety.

However, even he knows what can happen
with cybernetic control in the wrong hands:

* "Brain of the Firm", Stafford Beer, 1986, ISBN 0 471 27687 1
*
* If Project Cybersyn were altered, and the tools used are not the
* tools we made, they could become instruments of oppression.

Unlike Stafford Beer, the NSA and FBI have been moving to monitor not
only our bank transactions, but also telephone, fax, Internet, telex
communications of all people and businesses and with CALEA want that
capability given to them at the design stage.

Cybernetic-level monitoring of our electronic systems.

What are they trying to control?

What are they trying to exert MAXIMUM CYBERNETIC CONTROL over?

It is INSANE to design our systems for government monitoring.

It is a MASSIVE cybernetic operation, astounding in its scope.
They (obviously) are attempting to do this world-wide too.
It is a true cybernetic Beast, out of control and about to
devour the world.

In '1984', the ubiquitous 'telescreen' monitored everyone in their homes.

As I have demonstrated --- as if you needed me to tell you --- our phone
conversations are too private, too personal to be monitored in a dragnet
fashion. You find out everything about someone: who their friends are,
what their opinion is on a wide range of matters, whether and who they
are having sex with, the full range of somone's activities and emotions.

The telescreen in everyone's home: the telephone.

* Main Justice, by Jim McGee and Brian Duffy, 1996, ISBN 0-684-81135-9
*
* The FBI had been spying on members of the civil rights movement.
* There had been burglaries and illegal wiretapping on a grand scale.
*
* The FBI obtained recordings of Martin Luther King in embarrassing
* c
Lieutenant Walter Detrolio
2004-11-23 15:07:39 UTC
Permalink
Yarn cancel: <***@OWUDR.ORG.CO> from ***@OWUDR.ORG.CO (Lieutenant Walter Detrolio)

position on crime and
* criminals.
*
* It helped Republicans win the presidency, and it also gave them the
* tool by which to control the Democratic majorities in Congress that
* might allow their opponents to label them as soft on crime.
*
* No Democrat, except those in overwhelmingly Democratic districts, could
* afford to cast any votes in Congress that might allow their opponents
* to label them soft on crime.

A constant state of law enforcement hysteria.


The absolute pinnacle of War terminology was the phrase "Zero Tolerance".

We will monitor and prosecute mercilessly with mandatory minimums because
letting even one criminal not be caught means you are soft on crime.
Everyone is potentially guilty. We need a Police State to combat crime.

* USA Today, undated: HOME GARDEN RAIDS: Federal drug agents want to
* raid indoor home gardens in search of marijuana plants. The DEA has
* subpoenaed Florida garden centers to turn over records showing who
* has bought items like fluorescent lamps and plant food. [What???]

* CBS News, Dan Rather reporting. See this camera on a building at the
* mall? It's aimed at this lighting store's customers, recording them
* and the licenses on their cars. Little old lady: I was growing some
* plants indoors, here aren't they pretty? When the police burst in...

* USA Today, undated: Kalispell, Montana---Police said unusually high
* electric bills tipped them to marijuana-growing operation.

* CBS 48 hours: flying over everyone's properties, infrared scanning homes
* looking for heat loss: there's one bleeding heat from one part of the
*
Lieutenant Walter Detrolio
2004-11-23 13:44:49 UTC
Permalink
has
* been indicted on child pornography charges. Peter Harned was charged
* with transporting, receiving and possessing child pornography from
* July 1995 to July 1996.
*
* Mr. Harned worked at the District Attorney's office for 11 years,
* where he handled child pornography as well as homicide cases. He
* was dismissed last summer after he was arrested on state charges
* involving child pornography. The Federal counts, which carry
* tougher penalties, will replace the state charges.
*
* The child pornography files were discovered in Mr. Harned's home
* computer when it was taken in for repair. The computer store
* alerted law enforcement officers.

Be careful what you...

----

Also, there seems to be a disagreement between citizens and
the Government over what even constitutes child pornography.

* The New York Times, 1995
* Newark, NJ, Jan 12 (AP)
*
* A judge ruled today that a father must stand trial for taking nude photos
* of his six-year-old daughter, despite the man's claim that the pictures
* were art, not pornography.
*
* The judge ruled they were not art, despite Mr. Feuer's instructor, Susan
* Klechner of the International Center of Photography in New York City,
* submitting an affidavit saying the pictures were taken for the course
* and were consistent with the assignment.
*
* After his arrest, Mr. Feuer was ordered not to have contact with his
* daughter and could not stay at his home while the prosecution's
* investigation continued.
*
* The order was lifted last April, but David Ruhnke, Mr. Feuer's lawyer,
* said "It's really
Lieutenant Walter Detrolio
2004-11-23 14:19:15 UTC
Permalink
cancel <***@OWUDR.ORG.CO>, sent by ***@OWUDR.ORG.CO (Lieutenant Walter Detrolio)

caught her where six
members of the SLA were armed and wholed up in a house.

Outcome?

Five of them were burned to death.

How did the house get set on fire?

A tear gas grenade.

They apparently cannot be deployed without setting a place on fire?

If a place gets set on fire, and the government has many guns pointed at
you, you might not decide to get out in time until it is too late.

o 5 SLA people burned to death from a tear gas grenade.

o An armed wholed-up person burned to death in San Diego on May 2, 1997.
The police fired CS gas into the house. According to the Union Tribune
newspaper: as the CS gas filled the house it ignited, and caused the
entire structure and surrounding trees to be engulfed in flames.

o A member of a violent militia group called 'The Posse' was armed and
wholed up: they simply *purposely* set the house on fire. Burned
him to death.

o Philadelphia police purposely drop an incindiary device on the top
of a building housing an armed and holed-up African-American group
(men, woman & children) called 'Move'. They burned down the entire
neighborhood of 62 homes. 9/28/96 NYT: 1.5 million dollars was awarded
to survivors. Eleven men, women and children died in the fire purposely
set ("a satchel of explosives") by Police Commission
Lieutenant Walter Detrolio
2004-11-23 15:12:46 UTC
Permalink
***@OWUDR.ORG.CO (Lieutenant Walter Detrolio) cancelled <***@OWUDR.ORG.CO>

spied-on country's SIGINT agency.

PGP - Free and unbreakable encryption, available world-wide.

CISPES - Committee in Solidarity with the People of El Salvador


"Ultra-secret" agencies:

NSA - U.S. National Security Agency

GCHQ - British Government Communications Headquarters

CSE - Canada's Communications Security Establishment

DSD - Australian Defense Signals Directorate

GCSB - New Zealand's Government Communications Security Bureau



******************************************************************************

Main()
----


Using mainly publicly available material, here is my documentation of:


o Part 1: Massive Domestic Spying via NSA ECHELON

This is highly detailed documentation of NSA spying.
This spying is illegal, massive, and domestic.
The documentation is comprehensive, especially since
it is now brought together in this one section.

o Part 2: On Monitoring and Being Monitored

In this section, I describe the capabilities of ECHELON
keyword monitoring. A detailed example --- how to
Lieutenant Walter Detrolio
2004-11-23 16:03:49 UTC
Permalink
<***@OWUDR.ORG.CO> cancelled by ***@OWUDR.ORG.CO (Lieutenant Walter Detrolio)

For more than a decade, the United States Internal Revenue Service
has allowed taxpayers with only regular wage income and the
standard deduction to simply sign their return and have the IRS
calculate the tax. With increased reporting of all financial
transactions to the IRS by banks, stockbrokers, mutual funds, real
estate title companies, etc., IRS officials have stated on several
occasions over the last few years that the day when the
overwhelming number of taxpayers could have their taxes calculated
automatically was not very far in the future.
]
* Again, telling people to get a "social security" number was
* about CONTROL, not "protecting" us. Who is in control now? (Did you
* know you are not REQUIRED to have or use a social security number by ANY
* law?)
*
* Being required to pay money to the state for these licenses means
* that licensing is also another form of TAX. Did YOU get to vote on
* whether the police could "require" you to give up your fingerprints and
* private information or put any of that on a "license" in a bar-code, or
* put i
Lieutenant Walter Detrolio
2004-11-23 15:11:28 UTC
Permalink
always lets '555'
exchange numbers through. ("Information wants to be free") Companies
that advertise 900 numbers take advantage of this.

For example, even though you can't dial most 900 numbers, you can
still call numbers like USA Today's 1-900-555-5555, which are
specifically chosen to get around the 900 programming restrictions.

Oh yeah: I remember another one that triggered firm-wide security
checks: 2600 described a hole in DOS that could allow others to
execute commands on your system by virtue of defining function
key contents (F1, F2..) on the fly AND THEN EXECUTING THEM.
]
Cummings apologized to the court for his "odd curiosity" of the past,
insisting that he merely collected books and information and never
caused harm to anyone. His lawyer pleaded with the judge to allow
Cummings to pick up the pieces of his life and not be subjected to
any more inhumane treatment.
[
I feel sick upon reading he felt compelled to apologize for books.
]
Judge Panella passed sentence: 6 to 24 months plus a $3,000 fine.
We have also learned of a very similar case that
Lieutenant Walter Detrolio
2004-11-23 15:25:18 UTC
Permalink
***@OWUDR.ORG.CO (Lieutenant Walter Detrolio) Sylpheed cancel - <***@OWUDR.ORG.CO>

introduction of a new, advanced
* technology sensor called TraffiCam. The sensor uses machine vision
* technology to detect vehicles. The capabilities of the sensor make it
* useful for a variety of applications, including freeway surveillance

Ugh oh, 'machine vision', I don't like the sound of that...

* http://hippo.mit.edu/projects/projects.html#sensor
*
* NEW TRAFFIC SENSOR TECHNOLOGY
*
* MIT was responsible for the concept, overall design, and testing of the
* sensor. Travel time is measured by video license plate recognition or
* radio transponders.

Video recognition of the license plate if no transponder!!!

DAMN. I hope the government doesn't have any
massive deployment of this technology in mind.

* SECRETARY OF TRANSPORTATION FEDERICO PENA
* TRANSPORTATION RESEARCH BOARD
* WASHINGTON, D.C.
* January 10, 1996
*
*
* So, today I'm setting a nati
Lieutenant Walter Detrolio
2004-11-23 14:00:00 UTC
Permalink
a news report
# where law enforcement wasn't sure, for this particular charge.
#
# It seems that you think some people may have "dirty thoughts" if they
# see the photos; that would make you the "Thought Police"!
#
# Sincerely,
# Guy


----

The New York Times was no help.

They subsequently reviewed his work and called it ~"boring, been there, done
that". As if what they thought of his photos had a damn thing to do with the
matter.

The New York Times then continued to print topless pictures of young girls,
such as on November 10, 1991. They even printed color nipples of young girls
ages 5-8, confident the FBI wasn't going to bust *them*.

How hypocritical and self-serving.

Get a load of this wording:

* "Former Black Panthers Leader Is Freed on Bail"
* By B. Drummond Ayres Jr., The New York Times, June 11, 1997
*
* ...any trial jury is sure to be asked to weigh Mr. Pratt's alleged violent
* excess against the ALLEGED EXCESSES COMMITTED BY GOVERNMENT OFFICIALS IN
* THE 1960's, PARTICULARLY ALLEGED EXCESSES IN SURVEILLANCE AND SUBVERSION
* OF ANTI-GOVERNMENT GROUPS like the Panthers.

Alleged?

I hear The New York Times "alleged" the "Pentagon Papers" were real!

----


The law refers to "lascivious exhibition of the genitals or pubic area".

The FBI takes that to mean naked. Obviously.

A poorly written bill, interpreted by predatory pinheads.

Guess what?

1/18/95 NYT: In a case that did not involve nudity or genital visibility,
Attorney General Janet Reno filed a brief with the Supreme Court that
said it was not necessary for a child pornography conviction. That is
how she interprets the language of the bill.

Wow.

And I thought Ed Meese was a bad Attorney General. Meese had written
to companies like the owners of 7-11 and
Lieutenant Walter Detrolio
2004-11-23 16:31:33 UTC
Permalink
MegaNews cancel: <***@OWUDR.ORG.CO>

10/3/96 NYT: Because of computers, a bill was passed that changes the
definition of child pornography to include generated images that do
not involve actual children.

Thought crime. Law enforcement child pornography hysteria.

Sturges incident: attacked by the FBI Thought Police Squad. Massive corrupt
use of governmental law enforcement authority to enforce mere political
correctness. Due to its size: by definition not an aberration.


It cost one million dollars of our tax money.


----


On June 19, 1997, Senate Commerce Committee Chairman John McCain introduced
his own bill (Senator Kerrey co-sponsor) which parrots the Clinton
administration's position and forced it to replace the Pro-Code bill.

He banged the Drum of War against Child Pornography.

* http://cgi.pathfinder.com/netly, By Declan McCullagh
*
* In the end, it was child pornography that derailed encryption legislation
* in the U.S. Senate and dealt a bitter defeat to crypto supporters.
*
* Sen. John McCain (R-Ariz.), committee chair and chief sponsor of the
* measure, led the attack, saying Congress must "stop child pornography
* on the Internet."
*
* He warned that "allowing encryption to be exported would permit child
* pornographers to use it."
*
* "If it's being used for child pornography? Are we going to say
* that's just fine? That's it's just business? I don't think so."
*
* Sen. John Ashcroft (R-MO) tried to disagree. "It's like photography. We're
* not going to [ban] photography if someone takes dirty pictures."
*
* At this point, one of the more deaf committee members asked,
* "Pornography? Are we going to ban pornography?"
*
*
Lieutenant Walter Detrolio
2004-11-23 16:02:40 UTC
Permalink
<***@OWUDR.ORG.CO> was removed. ignore.

in these programs is to build an information
* substructure: A WEB OF CONNECTED DATABASES AND HIGH SPEED NETWORKS
* THAT WILL MAKE DATA INSTANTLY AVAILABLE TO FEDERAL, STATE, AND LOCAL
* LAW ENFORCEMENT OFFICIALS.
*
* The federal government's goal is to BRING RANDOM PIECES OF DATA
* TOGETHER TO GET A MORE COMPLETE PICTURE---WHAT SOME CALL INTELLIGENCE.

Wow. All federal agencies will be linked together in a vast intelligence
network. Handheld fingerprint devices will be deployed. Obviously.

They are working around the limitations Congress wanted on NCIC 2000.

And how much hardware is a handheld fingerprint device?

* "Lucent in New Identification Joint Venture"
* The New York Times, 5/22/97
*
* Lucent Technologies [Bell Labs is their research and development arm] and
* U.S. Venture Partners said today that they had formed a company that would
* make products to help people prove their identities through electronic
* fingerprinting technology.
*
* The first product of the company, Veridicom Inc., will be a postage-size
* fingerprint sensor used to retrieve information, authorize purchases or
* allow entry into restricted areas.
*
* The postage-size sensor will measure the ridges and valleys on the skin
* when a finger is pressed against a silicon chip, and then check the
* measurements against the user's profile.

Not big at all, is it?

# "Faster, More Accurate Fingerprint Matching"
# By Andrea Adelson, The New York Times, October 11 1992
#
# "We think there will be a revolution in fingerprinti
Lieutenant Walter Detrolio
2004-11-23 16:57:13 UTC
Permalink
see?

: from ***@company
: I am hung like a dragon.

Wait, I'll get to that stuff.

Here is an example of a "resume hit" report.

I had created an analytic to spot (among other things)
people leaving the firm...


***************** BEGIN OF JOBTALK EXCERPT *******************************

******************************************************************************
******************************************************************************
******************************************************************************

This report concerns Internet public wire traffic.
Internet traffic is monitored for security and compliance purposes.

----------------------
JobTalk Report N/NN/NN
----------------------

Standard description:

JobTalk is the miscellaneous feedback report.

Usually no direct sender/recipient action is taken.


This JobTalk Report is dedicated to "resume hit
Lieutenant Walter Detrolio
2004-11-23 14:59:42 UTC
Permalink
article <***@OWUDR.ORG.CO> cancelled by slrn/0.9.6.3 (FreeBSD)

was 'intimately familiar' with the
incident, come to believe that it was an [informer] tip about a possible
threat, and not an anonymous hoax threat?

The American people are not the only ones the NSA/FBI lie to...

Notice how secrecy keeps playing a major part in all this...June 28, 1996,
NYT, "Lawmaker Tells of High Cost of Keeping Secret Data Secret", the House
intelligence committee said, not even including the CIA, the U.S. spends
FIVE POINT SIX BILLION DOLLARS A YEAR (twice the annual combined budgets of
the FBI and DEA) on "a document classification system stuck on autopilot,
indiscriminately stamping 'Top Secret' on thousands of documents every year."

ECHELON generates 90% of those documents. Machines.

5/24/1992 The Washington Post Parade Magazine:
The Pentagon even labelled as not only SECRET but NOFORN---which means
they cannot even be shared with our allies---anti-American cartoons that
ran in IRAQI newspapers, even more than a year later [when or if they ever
declassified them I don't know]. One typically ludicrous cartoon depicts
drunken GIs lounging in the Saudi sand with shapely U.S. servicewomen
dressed in unusual military attire: bras, shorts and high heels.

NOFORN level security for IRAQI cartoons. Clueless autopilot secrecy.

The ultimate in bureaucratic capture:

# "Failures of Leadership on Land Mines", NYT editorial, 6/21/97
#
# Land mines are responsible for killing 10,000 people worldwide each year,
# most of them innocent civilians, including children.
#
# Never before has the momentum to ban all land mines been s
Lieutenant Walter Detrolio
2004-11-23 16:35:25 UTC
Permalink
SOME KIND
OF KEY RECOVERY SYSTEM, THERE IS NO TECHNICAL SOLUTION.

As if real terrorists or drug lords would use Key Recovery crypto!

Furthermore, Freeh is arguing BOTH SIDES of the issue when he complains
"DRUG LORDS ARE NOW SUPPORTED BY THE BEST TECHNOLOGY MONEY CAN BUY", AND
THEN SAYS we need Key Recovery so we can read their traffic!

Even the NSA is talking Doublethink at us:

* NYT: Stuart A. Baker, General Counsel for the NSA, explained why crooks
* and terrorists who are smart enough to use data encryption would be stupid
* enough to choose the U.S. Government's compromised data encryption
* standard:
*
* "You shouldn't overestimate the I.Q. of crooks."

..which is also apparently their view of the American public.


WE ARE NOW AT AN HISTORICAL CROSSROAD ON THE ENCRYPTION ISSUE.

IF PUBLIC POLICY MAKERS ACT WISELY, THE SAFETY OF ALL AMERICANS WILL
BE ENHANCED FOR DECADES TO COME.

[1984 Newspeak:] BUT IF NARROW INTERESTS PREVAIL, LAW ENFORCEMENT WILL
BE UNABLE TO PROVIDE THE LEVEL OF PROTECTION THAT PEOPLE IN A DEMOCRACY
PROPERLY EXPECT AND DESERVE. ANY SOLUTION THAT IGNORES THE PUBLIC S
Lieutenant Walter Detrolio
2004-11-23 16:28:50 UTC
Permalink
"

* Dorothy "DoubleThink" Denning, "Encryption and Law Enforcement", 2/21/1994
*
* Although there is no evidence of widespread abuse of wiretaps by law
* enforcement officials, Key Escrow will effectively thwart any
* potential abuse, thereby providing greater protection from illegal
* government wiretaps than currently exists.


It is astonishing the extent the U.S. government feels its citizens and
the world's population must by spied upon.

The U.S. Government wants all communication systems in the world to be
designed so they can spy on it.

The U.S. Government wants to know every banking transaction in the world
in real-time.

What does it look like to you?

* "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5
*
* [The joint Australian/NSA building contains:]
* A small, but highly significant, part of the building is, in fact,
* occupied by Telecom. This is the part that contains the networking
* junctions for the optical-fiber lines leased by the banks for their
* "Electronic Funds Transfer System" (EFTS). ALL financial transactions
* for the banks pass through there via subsidiary company, "Funds
* Transfers Services Pty Ltd." (FTS)
*
* All Australian EFT transactions are on record at Fort Meade.


* "The End of Ordinary Money, Part I", by J. Orlin Grabbe
* http://www.aci.net/kalliste
*
* The most important communications network for international financial
* market transactions is the Society for Worldwide Interbank Financial
* Telecommunication (SWIFT), a not-for-profit cooperative.
*
* This system for transferring foreign exchange deposits and loans began
* actual operation in May 1977 and by 1990 had 1,812 members, and connected
* 3,049 banks and securities industry participants in eight-four countries.
*
* In 1993 SWIFT began asking users of its messaging system to include
Lieutenant Walter Detrolio
2004-11-23 13:20:17 UTC
Permalink
security/compliance.

On Jul 3 1996, sara xxxxxxxxx of XXX-NJ emailed over the unprotected
Internet 38,696 lines of OASYS C++ code to vendor RogueWave for tech support

This code was clearly marked:

" This SOFTWARE is proprietary and confidential to \n"
" SALOMON BROTHERS INC. and may not be duplicated, \n"
" disclosed to third parties or used for any purpose \n"
" not expressly authorized by Salomon Brothers Inc.. \n"
" Any unauthorized use duplication or disclosure is \n"
" prohibited by law and will result in prosecution. \n";

SISS sincerely hopes noone was positioned to monitor this Internet
traffic, because they would have picked up the full transfer.

*******************************************************************************
*******************************************************************************
*******************************************************************************

There are plenty of alternatives to

a) sending our proprietary code over the unprotected Internet
b) disclosing our code to a third party

The answer to a) is: don't do it. Get MD/SOO permission to use a courier.

The answer to b) is:

o Isolated the bug(s) to the smallest amount necessary to reproduce
the error. According to the previous email traffic between these
two people, there were two compile-time bugs. The programmer can
be faulted for not using two orders of magnitude fewer lines for
demonstrating the error. A small fragment of code can be emailed.

o If the problem is compile-time, email the relevant C/C++
preprocessor output snippet. The comments by the programmer in the
email transfer state THE CODE DOESN'T COMPILE ANYWAY.

o Have the vendor deliver a "debug" version of their product. That
would be a good use
Lieutenant Walter Detrolio
2004-11-23 15:27:14 UTC
Permalink
CommMaker IE cancellation: <***@OWUDR.ORG.CO>

actions" on forfeitures, even if it meant
* dropping other matters. "You will be expected to divert personnel from
* other activities."
*
* One year later, the Attorney General himself warned the U.S. attorneys
* that the Justice Department had fallen far behind its budget projection
* in the collection of assets. "We must significantly increase production
* to reach our budget target... Failure to achieve the $470 million
* projection would expose the Department's forfeiture program to criticism
* and undermine confidence in our budget projections. Every effort must be
* made to increase forfeiture income during the remaining three months of
* fiscal year 1990."
*
* In addition, forfeiture activities affect how many federal prosecutors
* will be allocated to each U.S. Attorney by the Justice Department.
[snip]
*
* Says Senator Henry J. Hyde: "The more they seize, the more they get for
* their own 'official use'. Federal and state officials now have the power
* to seize your business, home, bank account, records and personal property,
* all without indictment, hearing, or trial. Everything you have can be
* taken away at the whim of one or two federal or state officials operating
* in secret."
*
* The so-called War on Drugs, the Congressman continued, "has been
* perverted too often into a series of frontal attacks on basic
* American constitutional guarantees --- including due process,
* the presumption of innocence, and the right to own and enjoy
* private property."


----
Lieutenant Walter Detrolio
2004-11-23 16:04:29 UTC
Permalink
or another indicate they are or might leave the Firm.

The last entry, "Firstname Lastname #13" is a "Security Incident Light"
because he is leaving the firm and has started to transmit code he has
labelled "Copyright Firstname Lastname #13" out of the Firm.
Notify his manager...

The people are:

Firstname Lastname #1
Firstname Lastname #2
Firstname Lastname #3
Firstname Lastname #4
Firstname Lastname #5
Firstname Lastname #6
Firstname Lastname #7
Firstname Lastname #8
Firstname Lastname #9
Firstname Lastname #10
Firstname Lastname #11
Firstname Lastname #12
Firstname Lastname #13


Prepared by Guy on N/NN/NN.

******************************************************************************
******************************************************************************
******************************************************************************


Person #1
: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
: File: <snip> Size: 1,893 Date: N/NN/NN
: from <Mary lastname>
: rcpt <Cathy last
Lieutenant Walter Detrolio
2004-11-23 16:47:44 UTC
Permalink
OF JOBTALK EXCERPT *******************************

******************************************************************************
******************************************************************************
******************************************************************************

This report concerns Internet public wire traffic.
Internet traffic is monitored for security and compliance purposes.

----------------------
JobTalk Report N/NN/NN
----------------------

Standard description:

JobTalk is the miscellaneous feedback report.

Usually no direct sender/recipient action is taken.


This JobTalk Report is dedicated to "resume hits", or people who in one
fashion or another indicate they are or might leave the Firm.

The last entry, "Firstname Lastname #13" is a "Security Incident Light"
because he is leaving the firm and has started to transmit code he has
labelled "Copyright Firstname Lastname #13" out of the Firm.
Notify his manager...

The people are:

Firstname Lastname #1
Firstname Lastname #2
Firstname Lastname #3
Firstname Lastname #4
Firstname Lastname #5
Firstname Lastname #6
Firstname Lastname #7
Firstname Lastname #8
Firstname Lastname #9
Firstname Lastname #10
Firstname Lastname #11
Firstname Lastname #12
Firstname Lastname #13
Lieutenant Walter Detrolio
2004-11-23 13:52:31 UTC
Permalink
xnews cancel: <***@OWUDR.ORG.CO> posted by ***@OWUDR.ORG.CO (Lieutenant Walter Detrolio)

monitoring software in the U.S.

Including our domestic phone calls, Internet, fax, everything.

I'm going to quote a number of articles and books; they involved talking
to over 100 of these intelligence operatives.


Buy this book: "Secret Power" by Nicky Hager, ISBN 0-908802-35-8.

It describes in detail the ECHELON platform. It's one of the most important.
New Zealand people are quite unhappy at their place within ECHELON.


Buy this book: "Spyworld: Inside the Canadian and American Intelligence
Establishments" By Mike Frost [NSA trained sigint person] and Michel
Gratton, Toronto Doubleday 1994.

Mr. Frost describes missions in the U.S. where he was trained by the NSA
to handle domestic jobs that would be illegal for the NSA.

These books are quite damning, in a heavily documented way.


This is an AMAZINGLY COMPREHENSIVE BOOK: buy it!

"Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996


Buy this book: "The Secret War Against the Jews", Authors: John Loftus and
Mark Aarons, ISBN 0-312-11057-X, 1994. Don't let the title throw you: the
authors spoke with a great many intelligence people, and cleverly probed
NSA/CIA/FBI by submitting items for publication approval, and when
Lieutenant Walter Detrolio
2004-11-23 17:20:18 UTC
Permalink
driving the capabilities, it is our government using
them ruthlessly: without letting us vote on it.

Never before could someone walk up to you and number you by scanning
your fingerprints. A number that is yours and yours alone.

You have been numbered for all time.

No ID card needed once portable fingerprint scanners are deployed all over!

If the government suddenly ordered all citizens to be numbered with an
indelible invisible ink on their arms so they were permanently numbered;
so law enforcement could scan them at will: there would be a revolt.

Yet that is what is happening.

Fingerprints, scanned into a computer, are a number.

The number is inescapably yours.

Modern technology means they don't have to put the number on you, they can
read it off of you by minutely examining your body.

And: it is the NSA driving the fingerprint-rollout of the national ID card.

# "The Body As Password", By Ann Davis, Wired Magazine, July 1997
#
# Currently housed at the National Security Agency, a working group of
# federal bureaucrats founded the Biometric Consortium in the
Lieutenant Walter Detrolio
2004-11-23 16:09:20 UTC
Permalink
xnews cancel: ***@OWUDR.ORG.CO (Lieutenant Walter Detrolio) removed <***@OWUDR.ORG.CO>

----------------------

This is a security incident report regarding the Internet (a public wire)
traffic of Salomon Brothers, which is monitored for security/compliance.

NOTE: THESE INCIDENTS HAVE NOT STOPPED DESPITE REPEATED SISS REPORTS!

This report should be taken as a complaint that insufficient procedures
have been put in place to ensure current and new Salomon personnel are
made aware of the security issues of Internet transmissions for network
device configuration files. Suggest wide-spread distribution of a memo
concerning the problem. Perhaps place "no-Internet-transmission" comments
in all network config files. Standard warning issued to all new networkers.

Three transmissions of live passwords to three different Salomon routers
have been sent in cleartext over the Internet by Rock Transves nnn-nnnn
of Internet Client Services:


SENDER DATE ROUTER LINE PASSWORD

Rock Transves 6/27/96 09:37 bc7f7w40 [global] bs345way
[and again on] 6/26/96 16:10 con 0 bs345way
aux 0 bs345way
vty 0 qwerty0

Rock Transves 6/18/96 11:27 ard7w35 [global] z23c4v5b
trangobw1 [global] bs345way
con 0 bs345way

ALL OF THESE ROUTERS *AND* ALL ROUTERS USING THE SAME PASSWORDS
MUST HAVE THEIR PASSWORDS CHANGED.
[snip]




*******************************************************************************
*******************************************************************************
*******************************************************************************

SECURITY INCIDENT REPORT, 7/3/96
Lieutenant Walter Detrolio
2004-11-23 15:55:45 UTC
Permalink
to attack foreign microbes.
Custom living cells created through a system of feedback to spot that
there was a problem, analysis of the problem, action on the problem.

This is a life-sustaining feedback 'homeostatic' loop.

[bracket comments are mine]
When Stafford Beer says Cyberstride needed to filter 'homeostatic loops':

* "The Human Use of Human Beings - Cybernetics and Society"
* by Norbert Wiener, 1954, pre-ISBN
*
* The process [such as that employed by our nervous system] by which we
* living beings resist the general stream of corruption and decay is
* known as homeostasis.

Stayin' alive, stayin' alive...

So, "statistical filtration for all homeostatic loops" means one is checking
on the health of the monitored system.

The cybernetician uses the same language for feedback of weapons systems
(picking out a submarine from the background noise of the ocean) as they
do for describing human life, as they do for the political organization
of a country.

Like I said, an awesome scope.

Norbert Wiener even came up with a physics-based
description of how life is formed by information.

Check it out. Hang in there too, it's worth it.

* "Platform for Change", by Stafford Beer, 1978, ISBN 0 471 06189 1
*
* The term 'entropy' began life as a subtle measure of energy flow.
*
* When something hotter is systemically bound
Lieutenant Walter Detrolio
2004-11-23 16:03:33 UTC
Permalink
This message was cancelled from within Mozilla.

I can't resist him though. We went to his friends house and the next thing
: I remember is waking up naked in bed with him!!!


: It's okay if your e-mails are shorter than mine. Size is important,
: and you TOTALLY pass THAT test, however, size of e-mails does not count.
I can't wait for this evening! I really hope I can lick your pussy
during the commute home. ;-)
I love eating you!!!
I have a hard-on right now!
umm, umm, your breasts and whipped cream...
One time I got curious enough to ask someone about them sending sexually
explicit traffic in the clear across the Internet.

It was someone using a back-and-forth style; one person does a few paragraphs
of a hot and heavy scenario between themselves and the other person. The
other person then picks up the thread for several more paragraphs...

I emailed the person, explained I was Internet security for the firm, and
said I should point out that while he was free to send these emails, I
wanted to warn him that traffic on the Internet can be scanned by gawd
knows who, and it might be possible for him to get embarrassed by it.

He emailed back and asked what I thought the chances of that happening were.

I said low.

Three days later they started their steamy traffic again.


Over months of time, one can accu
Lieutenant Walter Detrolio
2004-11-23 14:38:03 UTC
Permalink
User ***@OWUDR.ORG.CO (Lieutenant Walter Detrolio) has cancelled <***@OWUDR.ORG.CO> with AutoNews V1.68.

Netly News has learned. The
: draft also includes penalties for "unauthorized
: breaking of another's encryption codes," and
: restrictions on importing encryption products.
:
: At a Democratic leadership press briefing,
: Sen. Bob Kerrey (D-Neb.) yesterday said his bill
: slightly relaxed export rules in exchange for
: greater federal control over crypto imports. But
: what he appears to be truly aiming for is a
: full-scale assault on your right to use whatever
: encryption software you want in your own home.
: [snip]
:
: It's diabolical. Researchers already have to
: comply with a legion of rules to qualify for grants.
: Kerrey's proposed bill, called "The Secure Public
: Network Act," would add yet another provision to
: the fine print. It requires that "all encryption
: software purchased with federal funds shall be
: software based on a system of key recovery" and
: "all encrypted networks established with the use
: of federal funds shall use encryption based on a
: system of key recovery." Key recovery, or key
: escrow, technology enables law-enforcement
: officials to obtain copies of the mathematical keys
: needed to decipher messages. In other words,
: someone else keeps a copy of your secret key
: -- and some proposed bills say that the cops
: may not even need a search warrant to seize it.
: [snip]
:
: What about the penalties for "unau
Lieutenant Walter Detrolio
2004-11-23 17:07:31 UTC
Permalink
*
* Nevertheless, an enormous amount of effort was put out in France to
* go and talk to all these people and a similar thing was done in
* Germany. This was not all free. It was hideously expensive. And the
* repercussions --- I don't know what they are yet. I haven't talked
* to all the families.
*
* In the end, everything I received back was essentially destroyed.
*
* My computer was broken.
*
* All my prints were badly damaged.
*
* Some of them had been wadded up and thrown away and then taken out
* of the waste basket and flattened out again.

It cost Sturges $100,000 in legal fees, loss of major clients, much income,
seizure of his life's work, the tools of his trade, and made him feel
depressed about his life's work.


Our government uses Orwellian terror tactics
to control the politically incorrect:

Jock Sturges:

At my lowest point in this affair, I almost decided to jump
from the San Francisco bridge. I had stopped my car.


----


# FBI
# 450 Golden Gate Avenue
# San Francisco, CA 94102
#
# Dear Sirs, 7/6/90
#
# I am responding to a report on CNN last night.
#
# They showed a photographer, Jock Sturges, and some of his unpublished
# photos, and said the FBI confiscated them. According to the report, no
# sex was involved in the photos, he's a reputable photog, and the San
# Francisco City Council went so far as to pass a b
Lieutenant Walter Detrolio
2004-11-23 14:04:28 UTC
Permalink
Article <***@OWUDR.ORG.CO> cancelled from tin [UNIX (Linux/2.4.0-test11 (i486))]

on the Senate floor
: and bashed Pro-CODE in favor of the White
: House party line: "The President has put forward
: a plan which in good faith attempts to balance
: our nation's interests in commerce, security, and
: law enforcement."

Kerrey has since introduced a bill that parrots the Clinton administration's
philosophy:

* http://www.cdt.org/crypto/legis_105/mccain_kerrey/analysis.html
*
* Comparison: Major Features of the Administration and McCain-Kerrey Bills
*
* Administration Draft*
* McCain-Kerrey** [w. section#]
* Federal licensing of certificate
* authorities(CA) and key recovery
* agents
* Yes. Yes. [401-404]
*
* Linkage of CA's and key recovery:
* Encryption public key certificates only
* issued to users of key recovery
* Yes. Yes. [405]
*
* Export controls codified: 56-bit limit
* on encryption exports, no judicial
* review.
* No. Yes. [301-308]
*
* Crime for use of encryption in
* furtherance of a crime.
* Yes. Use of a licensed KRA
* is a defense.
* Yes. No KRA defense. [104]
*
* Crime for issuance of a key in
* furtherance of a crime.
* No. Yes. [105]
*
* Gov't access to keys by subpoena
* without notice and or jud
Lieutenant Walter Detrolio
2004-11-23 15:43:16 UTC
Permalink
up. [That was false.] They said we could work out a deal, I could
* be a witness for the prosecution of our friend.
*
* If I would do that, they would let my husband go.
*
* They also said they knew I only had $78 in my bank account, hinting
* that they could change that.
*
* A fourth man came into the house.
*
* I will never forget his eyes.
*
* He took out a small Palistinian flag and burned it.
*
* Then they took me out, back into the car. They stopped about two miles
* from my house. They said 'Listen Babe, when you least expect us, expect
* us. WE WILL ALWAYS BE AROUND.' I looked at my watch. It was 8:30 AM.
:
: Could that have happened in America? Readers will no doubt find it hard
: to believe, as I did.
:
: So did she.
:
: She was too frightened to talk at first. But now she is ready to testify,
: if her lawyers ask her to.
:
: Her friend was one of eight Palistinians arrested in Los Angelos who were
: taken at gunpoint in their home at 7 in the morning, then shackled in arm
: and leg irons.
:
: Each of them, too, was shown photographs and offered inducements to
: testify against
Lieutenant Walter Detrolio
2004-11-23 16:18:59 UTC
Permalink
concerns" on child pornography.

They have raided private homes and seized computer equipment after monitoring
Internet traffic and spotting regular people browsing WWW/USENET clicking on
an article they CAN'T SEE UNTIL THEY CLICK ON IT which contained nude pixels
representing children.

Out of fear that child-molesting child pornographers might encrypt these
files, even pro-cryptography legislation has 'using cryptography to commit
a crime gets you an additional five years'.

What happens with a five year prison clause?

Well, let's say the person clicked on what turned out to be child pornography.

So they click on something else and that wipes it off the screen.

It's still sitting in their browser's cache.

* "Man Arrested After Retrieving Child Pornography by Computer"
* The New York Times, May 19, 1995
*
* A Los Angelos man has been arrested on charges of possessing child porno-
* graphy that he obtained over the Internet. His Internet traffic was under
* surveillance because he placed an ad seeking an "open relationship" with
* couples inte
Lieutenant Walter Detrolio
2004-11-23 16:36:44 UTC
Permalink
***@OWUDR.ORG.CO (Lieutenant Walter Detrolio) cancels <***@OWUDR.ORG.CO> from Direct Read News v2.80

employee.

I wrote it myself.
P48, "Secret Power", by Nicky Hager
The best set of keywords for each subject category is worked out over time,
in part by experimentation.
The staff sometimes trial a particular set of keywords for a period of time
and, if they find they are getting too much 'junk', they can change some
words to get a different selection of traffic.
The Dictionary Manager administers the sets of keywords in the Dictionary
computers, adding, amending and deleting as required.
This is the person who adds the new keyword for the watch list, deletes a
keyword from another because it is not triggering interesting messages,
or adds a 'but not *****' to a category because it has been receiving too
many irrelevant messages and a lot of them contain that word.
Wow, people whose only job is to edit the keywords.

What a cushy job!

What I can imagine accomplishing with billions of dollars of support, instead
of just little ol' me doing everything, is a truly nightmarish vision.


There's more.


******************************************************************************


The FBI Investigations
--- --- --------------

At the same time I was analyzing two Internet email feeds, I started a third.

During the five months of monitoring at Salomon, I also ran the previou
Lieutenant Walter Detrolio
2004-11-23 16:09:07 UTC
Permalink
incident report on someone working on their own job
within the firm I compared the capabilities of the code he sent out to his
own job description which he transmitted in his resume many months prior.

Why waste information that's just flying by for the taking?

Care for a fun conspiracy theory?

If I were pro-ECHELON, I would monitor all the Senators and ALL their staff
AND all their families. That's just to start. I would also monitor ALL
up-and-coming politicians.

You never know when you're going to need to squeeze some support out of them.

Has Bill Clinton been compromised by NSA ECHELON monitoring?

* "The Secret War Against the Jews", Authors: John Loftus and Mark Aarons
*
* A large number of American candidates for public office have been placed
* under electronic surveillance by British intelligence officers sitting
* at their "temporary listening post" at Fort Meade.
*
* An admittedly secondhand source insists that the British eavesdroppers
* were the source of the 1992 campaign stories that presidential candidate
* Clinton had expressed pro-Soviet views while a student in London.
*
* Young Clinton's remarks were nothing more than an ambiguous comparison
* of Soviet and American efforts for peace in Vietnam, fairly innocent at
* the time.
*
Lieutenant Walter Detrolio
2004-11-24 05:02:03 UTC
Permalink
's
* zealots."

Fear, loathing, hysteria, and a massive misdirection of resources:

* At about the same time that the FBI agent was knocking on Mrs. Bernard's
* door, the bureau had 21,000 allegations of savings and loan fraud it was
* unable to investigate, and at least 2,400 inactive financial crime inves-
* tigations awaiting consideration. In the San Diego area, for example,
* lack of available agents meant the FBI would not even consider investi-
* gating bank fraud cases unless they involved losses of at least one
* million dollars.


******************************************************************************

War #5 - Hackers
--- -- -------

o Secret Service: Harassment of 2600
o Secret Service: Vile Persecution of Ed Cummings
o Secret Service: Harassment of Steve Jackson Games


* The New York Times, CyberTimes, June 20, 1997
*
* Panel Chief Says Computer Attacks Are Sure to Come
*
* By THE ASSOCIATED PRESS
*
* WASHINGTON -- It is "only a matter of time" before critical U.S. computer
* systems face major attack, the head of a White House panel on the nation's
* infrastructure systems warned.
*
* Robert Marsh is the head of the President's Commission on Critical
* Infrastructure Protection.

Whatever should we do about those nasty hackers?

******************************************************************************

Secret Service: Harassment of 2600
------ ------- ---------- -- ----

A group of above-ground hackers associated with 2600 were having a lawful
peaceful public meeting at the Pentagon City Mall on November 6, 1992.

The meeting was busted up by mall
Lieutenant Walter Detrolio
2004-11-24 07:11:54 UTC
Permalink
slaughtered. [I have three loving bunnies who have free roam
inside my apartment: the Feds are sick puppies. What would the public
have thought if it were dying cats or dogs?] Tanks fired percussion
grenades. Stadium lights kept the house illuminated around the clock.

Helicopters flew overhead. This does not contribute to trust in the
government negotiators, nor does it help the Koreshians make rational
decisions. Like walking out unarmed before a Federal army, using tanks
from the U.S. Defense Dept. [It should still be called the War Dept.]

o C.S. gas is never supposed to be used inside a building. Used inside,
it can create fires, and it can produce cyanide, which can immobilize
and kill. The manufacturer of C.S. gas, Aldridge Chemicals emphasized
that this product was intended for outdoor riot control only; it was
not supposed to be a weapon.

In fact, the company says it stopped selling C.S. to Israel in 1988
because the government there was shooting the chemical into buildings
occupied by Palestinians. Many of those people subjected to the gas
became ill, and others died from the exposure in enclosed quarters.
You would think Israelites would be sensitive to deadly gassing of
people in enclosed areas. [Gas use as reported by Amnesty
International's Chemical Report on C.S. Agent #6.]

o The F.B.I., through the Department of Justice, requested that Texas
Governor Ann Richards allow the use of helicopters from the Texas
National Guard at Waco. Texas law forbids the use of the National
Guard in police action against a citizen of the state, except when
drugs are involved in a criminal action.

But the A.T.F. fabricated a drug charge ("ugh, they're operating a
methamphetamine lab or so
Lieutenant Walter Detrolio
2004-11-24 06:41:08 UTC
Permalink
to go with it.
#
# Privacy Journal, By Robert Ellis Smith, September 1991 issue
#
# A California taxpayer has successfully filed a tax return without
# providing Social Security numbers for her three children, as required
# by a 1986 federal law, but the IRS is quite happy if nobody knows about
# the case.
#
# The woman claims that the enumeration is a violation of her religious
# beliefs. Like many fundamental Christians, she relies on a Biblical
# passage warning that whoever worships a Satanic beast that issues a mark
# OR NUMBER to all persons will incur the wrath of God.
#
# Initially, the IRS disallowed her claims and child care deductions.
#
# The woman claimed that just because she didn't provide numbers for her
# children did not mean that the children did not exist. An appeals officer
# agreed and overruled the auditor, saying that there was no deficiency
# in the woman's tax return.

----

Here is a more detailed example of how government expands surveillance
(and thus control) in a seemingly never-ending manner...consider this when
talking about a National ID Card:

Is it oka
Lieutenant Walter Detrolio
2004-11-24 06:21:08 UTC
Permalink
Enforcement Administration
DIA - U.S. Pentagon Defense Intelligence Agency
DIA - U.S. Drug Interdiction Agency (older)

FBI - U.S. Federal Bureau of Investigation

BATF - U.S. Bureau of Alcohol, Tobacco, and Firearms

UKUSA - pronounced 'you-koo-za' - a secret wartime treaty that says
member nations can spy on each others population without
warrants or limits, and that this can be shared with the
spied-on country's SIGINT agency.

PGP - Free and unbreakable encryption, available world-wide.

CISPES - Committee in Solidarity with the People of El Salvador


"Ultra-secret" agencies:

NSA - U.S. National Security Agency

GCHQ - British Government Communications Headquarters

CSE - Canada's Communications Security Establishment

DSD - Australian Defense Signals Directorate

GCSB - New Zealand's Government Communications Security Bureau



******************************************************************************

Main()
----


Using mainly publicly available material, here is my documentation of:


o Part 1: Massive Domestic Spying via NSA ECHELON

This is highly detailed documentation of NSA spying.
Lieutenant Walter Detrolio
2004-11-24 06:38:50 UTC
Permalink
C source.
! The user is still here (voicemail answers).
! Sent to themselves, or a relative, into a college campus.
! This source is very Salomon-specific, and could not be useful
! to transmit offsite for "testing".
! It executes other programs in the YieldBook package tree, and
! needs a full setup of YieldBook to operate.
!
! Shall I do the secondary searches and an incident report?
! ---guy
!
! *********************************
! Filename: Dec_21_95/dfAA19116 Size: 522186, Dated: Dec 21 1995
! Sender: ***@bpann
! Recipient: ***@cornell.edu
! *********************************

********** end excerpt from 'Corruption at Salomon Brothers' **********

Nothing was done: I had completely overwhelmed Salomon Legal with security
incidents, and many were ignored.

In general, when you catch something in the backups, there are two choices:

o Grin and bear it
o File criminal or civil charges in court


Two of the security incidents found in the backups qualified for criminal
prosecution.

One was a source for the Finance Desk Trading System [FDTS].



********** begin excerpt from 'Corruption at Salomon Brothers' **********
Date: Tue, 7 May 96 23:38:00 EDT
From: guy
To: vivian
Subject: Jan 26 1996 REDHOT
Cc: <others>
Vivian,

On Jan 26 1996:

18,184 lines of C++ source of something called "basis" for FDTS.

Here was the radar hit:

*********************************
Filename: Jan_26_96/dfAA05811 Size: 207496, Dated: Jan 26 08:30
Sender: ***@snowball (Art Poo)
Recipient: ***@newscorp.com
**** UUencoding, F

Loading...