-Caveat Lector-   <A HREF="http://www.ctrl.org/">
</A> -Cui Bono?-

from:
http://www.newsmakingnews.com/
Click Here: <A HREF="http://www.newsmakingnews.com/">NewsMakingNews</A>
-----
    NEWSMAKINGNEWS                                                         ©NE
WSMAKINGNEWS® Unless Otherwise Specified
       February 1, 2000


MaeBrussell
Mae Returns!
Brussellsprouts

BioWarfare
West Nile

Children     DoYouKnow?
ALAMEDA COUNTY MAFIA          OnTheDock















------------------------------------------------------------------------
    CIA INQUIRY OF ITS TOP DIRECTOR STALLED AT THE TOP, REPORT
SAYS             Click to read.
 NEWSMAKINGNEWS HEARS FROM HACKER HEAVEN!
HACKER HEAVEN AT THE CIA!  FORMER CIA DIRECTOR DEUTCH LETS IT ALL HANG OUT!
Ex CIA Director Deutch used unsecured, unclassified computers at the office
and at his home, even after he left the CIA.  Deutch deleted files when the
CIA'S investigation began.
    HACKER HEAVEN–SO TECHNICALLY EASY! "According to the report, Mr. Deutch
used unclassified Macintosh computers for classified work throughout his
tenure as director." Deutch used unclassified Mac’s at home and at the CIA
office. An inductive tap on Deutch’s power line, at his home, could pick up
what Deutch typed. The signals to Deutch’s monitor could be amplified and
received. These computers were not secured by CIA security.  Hacker’s Delight!
HACKER HEAVEN–THE TARGET DELETES AND SHUTS UP! "The inspector general's
report discloses that just three days after Mr. Deutch learned that his
computer practices were under review, he deleted more than 1,000 classified
files from his personal computers. The report also says that Mr. Deutch
declined to be interviewed by the CIA.'s security officials." When learning
his computer practices were under review, Deutch just deleted classified
files from his computers, and shut up. Can it ever be determined what he
deleted? And whether that deleted data was compromised or hacked? The Hackers
are sleeping soundly tonight.
HACKER HEAVEN FOR THOSE WHO LIKE TO EXAMINE THE GOODS AT THE TOP SUCH AS
"PRESIDENTIALLY APPROVED COVERT ACTION PROGRAMS" AND THE DCI’S PERSONAL
DIARIES! "Among the 17,000 pages of documents discovered in files on the
computers were top-secret and "code-word" files about a wide range of CIA.
activities, including presidentially approved covert action programs. The
documents also included 26 volumes detailing his daily activities in his
nearly two years as director and his previous time at the Pentagon." A HACKER
IS ONLY AS GOOD AS WHAT HE HACKS! WHAT A LOAD! (No use asking what President
and what covert action was in the top-secret and code-word files! Was this
load DEUTCH’S insurance policy? Against what?)
HACKER HEAVEN–TOP LEVEL CIA COMPUTER OFFICIALS OPENED THE DOOR, THUS WERE
SUFFICIENTLY ASLEEP AT THE SWITCH! "Eventually, Mr. Deutch was told by the
computer official that he could keep the computers if he continued to work
for the CIA. as a consultant or contractor. Mr. Deutch then quickly arranged
through Mr. O'Neill to obtain a no-fee consulting contract with the CIA. The
terms called for him to retain three CIA. computers. The inspector general's
report indicates that the purpose of the contract was to allow Mr. Deutch to
keep his computers." Who is Mr. O’Neill? Later O’Neill refused to turn over
the four portable computer cards that contained files from Deutch’s
computers. O’Neill kept the cards in his office safe. Mr. O'Neill rebuffed
requests to turn the four cards over to the security staff, according to the
report. In an interview, Mr. O'Neill declined to comment on the handling of
the cards. A security official complained to Ms. Slatkin that Mr. O'Neill
"was dragging his feet," and that his refusal to turn the cards over "made it
look like a cover-up." At the same time, Mr. O'Neill said, he, Mr. Tenet and
Ms. Slatkin held a series of discussions "over a period of several weeks"
about the need to protect the privacy of the material found on the computers.
Mr. Deutch refused to be interviewed by the security staff, and senior CIA.
officials allowed him to avoid being questioned, according to the report.
Eventually, Ms. Slatkin, Mr. O'Neill and Mr. Deutch agreed to allow one
security officer to review all the computer files gathered from Mr. Deutch's
home. The four portable computer cards were finally turned over, but only
after they had been held by Mr. O'Neill for about three weeks, the report
states.
HACKER HEAVEN–THE CIA WASHES ITS HANDS OF THE INVESTIGATION! "Without an
interview of Mr. Deutch, the CIA.'s security unit "washed its hands" of the
investigation, according to one security official interviewed by the
inspector general's office. The security unit did finally write a report on
the Deutch case, in the summer of 1997, but the report sat in the security
office without further action." A Hacker may feel the world is a but a dream
when dealing with such a well-washed group!
HACKER HEAVEN-JANET RENO AND THE FBI NEVER GOT THEIR HANDS ON THIS ONE! The
CIA didn’t immediately report the this matter to the Department of Justice
and waited until the Independent Counsel statute expired, so that the statute
would not apply to the Deutch case.
HACKER HEAVEN–NOTHING LIKE BACKING IN THROUGH THE DCI’S ON-LINE BANKING! "With
in days of announcing he was leaving, Mr. Deutch talked with a top computer
services official at the CIA. and told him that he wanted to keep the
CIA.-owned Macintosh computers in his home after he left the government. Mr.
Deutch explained that he wanted them because he was using them for his
personal banking." Deutch used government- owned equipment for personal use,
such as on-line banking. How convenient that the computer with the classified
files was used for on-line banking, so that those who hacked into the
one-line banking could back into Deutch’s Mac’s and look around. (A nasty
detail– use of government equipment for personal use is the crime of
conversion.)
HACKER HEAVEN–HIS OWN GUYS ARE MORE FEARSOME THAN HACKERS! Deutch claims he
didn’t want a secure PC installed in his house, and wouldn’t allow CIA
security personnel to have access to it, because he feared fellow CIA
employees "would see what he was working on."  Was Deutch  more worried about
his fellow-CIA agents, than all the hackers out there on the world wide web?
Maybe he had a point! Or was Deutch filing some dirt that he didn’t want the
CIA to read.
HACKER HEAVEN–THE COMPROMISED COMPUTERS WERE NOT IMMEDIATELY SECURED! The CIA
security did not take immediate possession of Deutch’s unsecured computers,
and all equipment including drives, discs and cards and hold them in a secure
facility to determine what classified files had been compromised?  Not doing
so, the CIA gave anyone with access, a chance to get away with it, and gave
Deutch some time to hit the delete button (which he did.)
HACKER HEAVEN–UNSECURED SERVERS WERE USED! "He also found that Mr. Deutch had
been accessing the Internet with the same computers, through unsecured
services. He had Internet access through America Online, Citibank's personal
banking Web site and a Defense Department service." The services were
unsecured–just an open invitation!
HACKER’S HEAVEN-"NEED TO KNOW" WAS A TRIFLE! Who gave the order (documents,
please?) that Deutch had a "need to know" which justified his storing
classified data on his computer after he left the CIA? When handling
classified data, no one is permitted to establish his own "need to know."
THE ULTIMATE TOTALLY BLISSFUL HACKER HEAVEN AT THE CIA! WHETHER THE HACKER
(OR HIS COUNTRY) ACTUALLY DID HACK  IS UNCERTAIN! "The inspector general
found that there was no evidence that the classified material on Mr. Deutch's
computers was obtained by another country, although there was no way to be
certain."

------------------------------------------------------------------------
FROM "LEGAL LOOPHOLES GALORE!"®
THE MITNICK ULTIMATE EVIDENTIARY LOOPHOLE
Here Ye! Here Ye! There is a new law of evidence known as The Mitnick
Ultimate Evidentiary Loophole: Kevin Mitnick, famed "hacker", recently
released from prison, teaches the old dogs of law new tricks! "First, strong
encrypt your file (the alleged spoils of your crime), so that when the feds
seize it, they can't read it. Then claim the Fifth Amendment when the
government asks you to decrypt it. Next, politely, request a copy of your own
encrypted file. The feds won't give a copy of your own file to you because it
could be "dangerous" and they can't read it and you won't decrypt it. Next,
file a motion to dismiss the charges, claiming violations of the Brady rule
and Due Process. When the feds withhold exculpatory evidence and physical
evidence necessary to provide a defense, i.e. the encrypted file, a fair
trial cannot be obtained. Last, remind the court that the Fifth Amendment is
an absolute privilege unless immunity from prosecution is granted. Thus, no
decryption is required per the Fifth Amendment, yet no fair trial can be had.
A mere esoteric loophole in the law, Your Honor!" (Mitnick's Caveat: Don't
forget your own decryption key lodged in your own brain only!) Thus, Mitnick
got a get out of jail fast ticket.
Excerpt of source:
"The heart of the government lawyer's argument was that it would be wrong to
return to Mitnick his encrypted files because they could contain the spoils
of his crimes -- secret information that he illegally acquired from the
companies whose computers he hacked into -- or something even more dangerous.
In considering the matter, Judge Phaelzer said that it was "clever" of
Mitnick to have encrypted the files in such a way that the government could
not use them in its own case but Mitnick could access them if given a copy.
The judge said that if Mitnick would "tell the government how to read" the
files, then the government would turn over the files in decrypted form.
Mitnick's lawyers immediately objected to this condition on the grounds that
it would force him to waive his Fifth Amendment right against
self-incrimination to obtain evidence he needed and that he had a legal right
to see. The judge rejected this point and affirmed her ruling to deny
Mitnick's access to the files. Alan B. Davidson, a staff lawyer who follows
encryption developments for the Center for Democracy and Technology, a civil
liberties group, said he believed the Mitnick encryption dispute is a
precursor to a coming battle in Congress. As part of a compromise announced
this fall by the Clinton administration that loosened export restrictions on
strong encryption software, the administration has committed to sending a
bill to Congress laying out rules for when the government can get access to
encryption keys, Davidson said. "We are anxiously awaiting the
administration's new bill, which will open up a huge debate," he said."
Source: (c) Cyberlaw Journal, Wrinkle in Mitnick Case Hints at Encryption Batt
les to Come,  by Carl Kaplan (c) January 28, 2000. http://www.nytimes.com/libr
ary/tech/00/01/cyber/cyberlaw/28law.html

------------------------------------------------------------------------
LOCKERBIE PAM AM 103 COVER-UP IS BLOWN Read how heads will roll when the case
before the Scottish judges unravels.  Note the role of the former FBI agent
and (former Bush crony) Oliver Buck Revell.  Read and weep! This trial,
revealing the real George H.W. Bush, will knock George W. Bush out of the
race!

------------------------------------------------------------------------
FRED LEE CRISMAN (From UFO's and Maurer Island, to the JFK assassination,
Crisman haunts our history. NewsMakingNews calls for a heads up!  Time to
solve this strange and history making mystery!     Click here to get up to
speed!
E-MAIL NEW DATA!

------------------------------------------------------------------------
THAT OLD ALAMEDA COUNTY MAFIA STYLE!
EDWIN MEESE, III HOLDS BACK ONE-HALF MILLION DOLLARS, AS TRUSTEE OF THE
RONALD REAGAN CAMPAIGN COMMITTEE FUND!
HELLO, EDWIN MEESE, III! REAGAN IS NOT GOING TO RUN FOR OFFICE AGAIN, OWES NO
DEBTS, AND DOESN’T EVEN KNOW YOU’RE HOLDING THE MONEY! FOR WHOM, WAS MEESE REA
LLY HOLDING THIS BAG?
Former Attorney General Edwin Meese III admitted on 1/29/00 that the Ronald
Reagan presidential committee continues to operate with a fund of
approximately $500,000 in the bank. Meese is a trustee of the Reagan campaign
committee, which conducts no activity except to pay Bay Buchanan, its
treasurer, annual consultant fees and expenses. ($45,715.00 was paid to
Buchanan through the 90's.) Bay Buchanan is the sister of presidential
candidate Pat Buchanan and manages his campaign.
Reagan’s family didn’t know about the fund and committee’s operation until
the Associated Press brought it to their attention. Reagan’s chief of staff,
Joanne Drake stated that the Reagans want the money to go to the Reagan
Library. Reagan hasn’t run for office since 1984 and is totally disabled by
Alzheimer’s disease. Since 1984 the funds have been sitting in the bank
collecting interest except for the payments of several thousands of dollars
per year to Bay Buchanan.
Meese said the campaign committee trustees decided to put the money in
long-term investments until they could decide where leftover funds should go.
``The money was invested pending a decision on what to do with it,'' Meese
said.  According to AP reporter, Jonathan D. Salant, Meese also said the
balance would be liquidated when the committee could redeem the long-term,
higher-interest notes that the money is invested in.  "At some point it will
go to the Reagan library."
The George Bush Campaign committees of 1988 and 1992 are closed. The Clinton
campaign committee of 1992, the Dukakis committee of 1988 and the Mondale
committee of 1984 are also closed. Keeping a campaign committee open this
long is unprecedented unless the campaign must still raise money to pay off
debts. The Reagan campaign owes no debts.
Between Jan. 1, 1997, and Sept. 30, 1999, the Reagan committee  received
$42,180 in dividends and interest. The committee paid out $31,942, with
$17,766, or 56 percent, going to Bay Buchanan.  Most of the remainder was
paid to the IRS.
Federal law allow the committees to give the money to other federal
candidates or political action committees, refund it to contributors or
donate it to charitable or educational institutions. Reagan’s 1980
presidential committee donated funds remaining after the campaign to
Republican candidates and Reagan’s political action committee, Citizens for
the Republic.
NEWSMAKINGNEWS asks,  "Edwin Meese, III, why are you holding a half-million
back? Don’t you care about the Reagan Library? Why didn’t you inform Reagan’s
family about the fund? OR, DO YOU, EDWIN MEESE III, HAVE A CANDIDATE IN MIND,
TO WHOM YOU WANT TO GIVE THE MONEY? COULD THAT BE PAT BUCHANAN, YOUR
TREASURER’S BROTHER? IF NOT, DID YOU HAVE SOME OTHER SNEAKY OCTOBER SURPRISE
IN MIND?
Source: Jonathan D. Salant, Associated Press writer 1/28/00
http://www.infobeat.com/stories/cgi/story.cgi?id=2563711381_159
For more Alameda County Mafia tricks, click ON THE DOCK!

------------------------------------------------------------------------
VIJAY REDDY RELEASED ON $500,000 BAIL.
Today, 1/28/00, Magistrate Judge Brazil released Vijay Reddy, son of
Lakireddy Reddy on One Half Million Dollars bail.
Vijay Reddy faces one count of violation of 8 US Codes section
1324(a)(1)(A)(iv) and 18 U.S.C. Section 2. "Between on or about April 2, 1999
and January 14, 2000, in the Northern District of California and elsewhere,
the defendant VIJAY KUMAR LAKIREDDY did encourage and induce aliens to come
into, enter and reside in the United States..... Penalty: up to 5 years’
incarceration, a term of supervised release of 3 years, a fine of $250,000,
and a $100 penalty assessment."

------------------------------------------------------------------------
EIGHT QUESTIONS ABOUT THE LAKIREDDY AND VIJAY REDDY CASES? CALLING INS!
CALLING FBI! ARE YOU THERE?
The old inspector has a couple of questions.....
1) What is Jay Construction and with whom are they doing business? The
Affidavit in support of the Criminal Complaint against Vijay Kali Reddy,
signed by Donald B. Henley, Special Agent, INS, filed 1/21/00 in U.S.
District Court states:
"1) On or about February 17, 1998, the Investigations Branch of the
Immigration and Naturalization Service (INS) in San Francisco, California,
received a lead from the Headquarters Investigations Branch of INS, which had
received an anonymous letter. The letter stated that an individual by the
name of Lakireddy Bali REDDY, who resides in Berkeley, CA who is
approximately sixty (60) years old, and owns Pasand Restaurant, and Reddy
Realty, and Jay Construction, was filing fraudulent H-1 (Skilled worker)
visas and H-4 (Dependent) visas for nationals of India, including juveniles,
to come to the U.S. for employment-based non-immigrant visas from India, and
these Indian nationals eventually work at the Pasand Restaurant. I am aware
from this investigation that VIJAY KUMAR LAKIREDDY is Lakireddy Bali REDDY’S
son."
2) WHAT IS ACTIVE TECH SOLUTIONS AND WITH WHOM ARE THEY DOING BUSINESS? WHAT
IS THE LAKIREDDY’S CONNECTION TO THE INS OFFICE IN VIRGINIA?
The January 21, 2000, affidavit, identified in Paragraph 2 above, states:
"8) A check of various state and Federal systems shows that there have been
at least twenty-one (21) applications filed on behalf of Active Tech
Solutions for Temporary Work visas. I have reviewed files from the I.N.S.
Western Adjudication Center, which handles visa applications from the state
of California and elsewhere, and determined that at least nine (9) Petitions
for Non-immigrant workers were submitted on behalf of Active Tech Solutions.
All nine applications were signed by Vijay Kumar LAKIREDDY. (The application
for Venkatesware VEMIREDDY was sent to an INS office in Virginia, so I have
not been able to review his file yet.) The California State Employment
Development Department faxed me a copy of the Wage and Earnings forms (DE6s)
for Active Tech Solutions, which show that, since January 1, 1998 there have
only been one to four employees on the payroll of Active Tech Solutions."
3) WHY IS VIJAY LAKIREDDY CHARGED WITH IMMIGRATION OFFENSES WITHIN THE NARROW
TIME PERIOD OF APRIL 3, 1999 TO JANUARY 14, 2000?
4) WHY WERE NON-CERTIFIED INDIAN INTERPRETERS, SOME OF WHOM KNEW REDDY
PERSONALLY,  INITIALLY USED TO INTERROGATE THE VICTIMS IN THE REDDY CASE?
5) WHY DID THE INS FIND NO WRONGDOING REGARDING LAKIREDDY REDDY IN ITS 1997
INVESTIGATION?
6) WHO WROTE THE ANONYMOUS LETTER WHICH CONVINCED THE INS TO BEGIN A NEW
INVESTIGATION?
7) WHY WERE TWO BERKELEY HIGH SCHOOL STUDENTS THE FIRST TO BREAK THE STORY
AFTER ONE WOMAN DIED OF CARBON MONOXIDE POISONING IN REDDY'S DEFECTIVE
APARTMENT? WAS THE LOCAL PRESS AFRAID TO BREAK IT, COVERING IT UP, PLAYING
POLITICS, OR ASLEEP?
8) WHAT KIND OF INS AGENTS ACTUALLY BELIEVED THAT  REDDY'S COMPANY QUALIFIED
FOR "SKILLED WORKER" VISAS?  WHAT INS AGENTS HANDLED THE PAPERWORK AND
INTERVIEWS?  WERE NO SERIOUS QUESTIONS EVER ASKED?  REDDY'S COMPANIES ARE NOT
HIGH TECH COMPANIES WHICH USUALLY USE SUCH VISAS.
THE OLD INSPECTOR IS CHASING THE MONEY, HONEY!


------------------------------------------------------------------------
A GET OUT OF JAIL FOR CHEAP TICKET FOR LAKIREDDY REDDY! FEDERAL MAGISTRATE
WAYNE D. BRAZIL RELEASES LAKIREDDY REDDY ON 10 MILLION BAIL. DID JUDGE
BRAZIL’S GOOD OLD CONFLICT OF INTEREST AND CORRUPTION INSPIRE BAIL, WHICH TO
REDDY, IS A DROP IN THE BUCKET?  CLICK FOR BREAKING NEWS BEHIND THE BENCH!



------------------------------------------------------------------------
[EMAIL PROTECTED]
-----
Aloha, He'Ping,
Om, Shalom, Salaam.
Em Hotep, Peace Be,
All My Relations.
Omnia Bona Bonis,
Adieu, Adios, Aloha.
Amen.
Roads End

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are not allowed. Substance—not soap-boxing!  These are sordid matters
and 'conspiracy theory'—with its many half-truths, misdirections and outright
frauds—is used politically by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to