-Caveat Lector- FIDNET http://www.zolatimes.com/V3.33/fidnet.htm Another Step Closer to Orwell's Nightmare by Don Lobo Tiggre While the public remains fascinated with such important matters as another death in the Kennedy family and another shooting spree (which, some cynics have observed, just happened to take place during New Hampshire Senator Bob Smith�s filibuster in the gun- grabbing debates*), another story is getting far less attention than it deserves: FIDNET. Remember ECHELON? Well, FIDNET is a new U.S. government electronic data collection program that, coupled with existing spy systems like ECHELON, could push government threats to electronic privacy to new heights and bring us one giant step closer to Orwell�s nightmare. What is FIDNET? Right now, it�s just a Clinton Administration proposal�yes, those noble idealists in Washington are just full of ideas for protecting us from ourselves. FIDNET stands for Federal Intrusion Detection Network, and it�s no surprise that the Administration�s National Security Council (NSC) would come up with such an idea in the wake of all the hacker attacks on U.S. government web sites. The plan�not yet released to the public but leaked on-line by Wayne Madsen of the Intelligence Newsletter, and subsequently covered by the New York Times, Wired, and other news outlets�calls for one software system to watch activity on non- military government networks and a separate system to track the banking, telecommunications and transportation industries. A host of new monitoring agencies with a whole new can of alphabet soup names and acronyms is also called for, all under direction of the FBI. Data would be gathered at the National Infrastructure Protection Center (NIPC), an interagency facility operated by the FBI, beginning no later than the year 2003. This is necessary because terrorists and hackers are plotting evil things, the NCS assures us. Jeffrey Hunker, the NCS "Director of Information Protection" warns, "A number of nations that are hostile to the [US] and several well-financed terrorist groups, and quite arguably a number of organized crime groups, are systematically developing capabilities to attack US information systems. That's something both new and frightening." But it�s not just government computers Big Brother is worried about. Several private sector "industry leaders" (lobbyists from quasi-private telecommunications associations: Harris Miller, president of the Information Technology Association, Matthew Flanigan, president of the Telecommunications Industry Association, Roy Neel, president of the U.S. Telephone Association, and Stephen Katz, vice president for information security at Citigroup) are named in the plan, as is only fitting, since the idea is to protect the national economy, as well as "vital infrastructure". The NSC, White House spokesman Joe Lockhart said, wants "to see if we can work cooperatively with [private industry] to figure out if we can help them." The president, he said, "is committed to doing what we need to do to protect our infrastructure, while at the same time balancing the need for privacy." Fortunately, privacy advocates from many different places on the political spectrum are quite skeptical and are raising a fuss. Even some members of Congress have seized the opportunity to criticize the White House plan. The proposed "monitoring" power is too dangerous, too subject to abuse, and cannot be justified even for seemingly benign goal of protecting private (and government!) computer networks. It also goes farther than ever before toward the automated collection of private information with out any due process: robotic rights violation. Republican Senator Conrad Burns of Montana said that law enforcement agencies should have to get court orders to monitor computer lines (just as they once had to in order to monitor voice communications). "This administration has no respect for privacy. I find that very disturbing," he said. Even a Democrat, Ron Wyden of Oregon, agreed with Burns in saying that the White House proposal is "ill-conceived". Protection from Government Peeping Toms House Majority Leader Dick Armey released a startling statement in which he urged the administration to encourage the proliferation of powerful encryption instead of making secret plans to create new bureaucracies: "I am deeply concerned about reports that the Administration is trying to set up a new Washington bureaucracy to protect the private sector from hackers and computer terrorists. What we really need is protection from government Peeping Toms�. Their plan raises the Orwellian possibility that unscrupulous government bureaucrats could one day use such a system to read our personal e-mail. Let's not undermine the American people's confidence in the security of their most personal communications. Allowing individuals and private industry to use the strongest possible encryption is a more effective way of ensuring privacy from outside hackers." As refreshing as Armey�s statement is, posturing by Republicans who couldn�t even get enough votes to oust a president who was caught with his hand in the�, er�, cookie jar isn�t likely to instill much fear in the White House or cause The Murderer-of- Yugoslavian-Civilians-In-Chief to back off. What might have a chance of working is a massive groundswell of protest such as that which followed the breaking of the "Know Your Customer" snooping plan. Journalists, third parties, and political activists of all stripes should raise hell over this, and demand that the administration scrap the Big Brother approach to "helping" at once. Due to some internal wrangling among various law enforcement agencies, civil libertarians may have time to organize such a protest. According to Wayne Madsen, who first broke the story: "The plan has been withheld from public distribution pending a decision by the National Security Council (NSC) and Richard Clarke, the national coordinator for security, infrastructure protection and counter-terrorism, on whether to eliminate references to protection of the global information infrastructure. The NSC is believed to feel that references to a coordinated effort to protect international information infrastructures could run counter to the plans of the NSA and CIA to conduct offensive information warfare." While the information about the plans of the NSA and CIA to "conduct offensive information warfare" (against whom, one wonders) is hardly reassuring, it does suggest that efforts to organize opposition are not too late. With the congressional attention already given to the matter, funding and energy may even be forthcoming from those who would like to see the president damaged politically. If handled correctly, this situation could result in an even bigger set-back for the administration than the defeat of the Know Your Customer plan, and perhaps awaken even more American bullfrogs to how close the water they sleep in is to boiling. Clinton Gets to Kill FOIAs Another interesting Madsen revelation, for those who think that the water is merely warm and comfortable, is that the plan "calls for a White House-sponsored review of the Freedom of Information Act (FOIA) to consider changes to prevent certain information shared by the private sector with the government from being released as a result of FOIA requests." And if there can be any doubts about how serious the FBI, the Department Of Justice, and the Administration are about making sure they have a Big Brother screen in every home, consider the recent FBI action against a small telecommunications company from Canada. According to the National Post, TMI Communications, Inc., wants to sell satellite telephone service to customers in the U.S., but its bid to get a license has been blocked by "the FBI, the major U.S. government departments, and ultimately the White House � with nothing less than the integrity of America's national security at stake." Why? Because, "new U.S. wiretap laws demand the FBI be able to listen to all kinds of telephone calls, including ones on satellite telephones." The problem is that the FBI can�t simply tap Canadian phones, and apparently there�s no way they can tell which TMI customers might be calling from within the United States. Remember ECHELON, dear frogs, and that the FBI listens to all kinds of telephone calls already�now they want unlimited access to your Internet communications. That water is pretty near to boiling, and when it does boil, it will be too late to jump out. If FIDNET is to be stopped, it must be stopped now. *The gunman also killed his family with a hammer. Anyone want to take bets that the gun-grabbers will use the tragedy for their own ends, but won�t propose banning hammers, not even the dreaded semi-automatic assault hammers and fully-automatic "roof- sweeper" nail guns? Don Lobo Tiggre is the author of Y2K: The Millennium Bug, a suspenseful thriller. Tiggre can be found at the Liberty Round Table. -30- from The Laissez Faire City Times, Vol 3, No 33, August 23, 1999 Kathleen "You can't let one million Englishmen rule one hundred million Indians with terror if the one hundred million wouldn't allow it". - Gandhi DECLARATION & DISCLAIMER ========== CTRL is a discussion and informational exchange list. Proselyzting propagandic screeds are not allowed. Substance�not soapboxing! These are sordid matters and 'conspiracy theory', with its many half-truths, misdirections and outright frauds is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRL gives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credeence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://home.ease.lsoft.com/archives/CTRL.html http:[EMAIL PROTECTED]/ ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om
