http://www.worldnetdaily.com/bluesky_smith/19990202_xcsof_clintons_s.shtml

President Clinton has waged an information war against America.
Data accumulated inside the White House has taken prisoners,
destroyed lives and provided valuable bounty for criminals.  The
war is designed to limit freedoms and control political
opponents.

Recent examples such as Kathleen Wiley and Monica Lewinsky are
lurid tips of the White House iceberg.  The most fertile ground
for information exploited by Clinton is the data stored inside
law enforcement computers such as the FBI.

The FBI's NCIC system (National Criminal Information Center) is
a network of computers erected by the all states that is tied to
a central FBI network.  It is the Federal law enforcement
Internet.

NCIC is a valuable tool to capture real criminals.  NCIC was
used to identify the vehicle in the New York towers bombing.  It
was NCIC that tipped Oklahoma police to hold Timothy McVey as a
possible suspect in the Oklahoma city bombing.  NCIC is used to
check your status whenever a local police officer pulls you over
on the road.

However, this system also has a long history of abuse.  It has
been used by an ex-police officer to stalk and kill his battered
wife.  It has been used by drug gangs to identify and murder
anti-narcotics undercover agents.

NCIC has also been used for political crimes.  Each and every
one of the over 900 files held by the Clinton White House
started with a check of the FBI NCIC data base.  According to
the FBI, the White House inquired for information from the FBI
on over 22,000 people during 1993 and 1994.

There is open evidence the FBI computers were abused by Clinton.
In June 1996, Lisa Wetzl, former White House Intern under Craig
Livingstone, testified during the Senate hearings that the very
first task performed for White House reviews was a NCIC check.

In 1996, Howard Shapiro, then General Counsel for the FBI, went
to the White House to recover some of the hundreds of files
taken by Clinton operatives Craig Livingstone and Anthony
Marceca.  According Shaprio's deposition there was the following
exchange:

"Q.  The list of names were in two boxes is that correct?"

"A.  Yes.  The -- the documents referred to in the list of names
were in two boxes."

"Q.  And the third box contained what kind of documents that you
determined were not FBI files?"

"A.  For instance -- and it would seem to comport with what's on
this first page -- various computer runs, various documents.  It
took us a while, and I'm -- I'm not sure I was ever advised in
detail what it was.  I was advised that I didn't need to worry
about it was because it wasn't FBI information.  It was like
NCIC computer checks and things like that."

The legal counsel for the FBI had no law enforcement experience.
Mr. Shapiro did not know NCIC computer information is FBI
property so he left the boxes of computer information at the
White House.  They have never been recovered.

In August 1996, I received a letter from the Dept. of Justice.,
Margaret R. Owens - Unit Chief Office of Public and
Congressional Affairs.  Ms. Owens wrote "Unfortunately, the
process of dealing with White House requests for file
information was not managed as it should have been.  You may be
assured that all steps necessary to correct the deficiency have
been taken and that the FBI will be more vigilant in the
future."

However, the Clinton administration has little zeal for being
"vigilant".  There are no federal laws against government
officials who abuse the NCIC system and President Clinton wants
to keep it that way.

Government employees who are caught can be charged with a local
misdemeanor at best.  In response to this lack-of-teeth in the
law, Senator Gregg (R-NH) proposed legislation in 1997 to make
abuse of NCIC data files a felony.  Clinton opposed Gregg's bill
and had it defeated by Democrats in the Senate.

While giving his political operatives clear fields to run
rampant inside Federal computer files, Clinton has strived to
accumulate more data for abuse.  President Clinton made cynical
use of the victims from the TWA-800 disaster to propose a whole
new series of laws to combat terrorism, including expanding the
FBI NCIC system to track the movements of every flying citizen.

According to the FBI and NTSB investigation, the TWA-800 crash
was not caused by a terrorist bomb or enemy missile but by a
faulty design in the central fuel tank.

Many more lives could be saved by hiring more FAA inspectors
than by spending millions assuming that every flying citizen
might be a "trans-national" terrorist.  More lives can be saved
with proper safety inspections made on the airplane than by
inspecting the personal lives of the passengers boarding the
plane.

The entire Clinton approach to law enforcement has been designed
to limit freedom and obtain more power for Federal forces.  The
"pro" law enforcement stance of the Democrat President silenced
left-wing privacy advocates in the Democratic party and drew the
applause of traditional Republicans.

Privacy advocates and right wing police supporters should learn
that President Clinton makes the policy not to fight crime but
for pure political power.  The only difference between a
Communist police state and a Nazi police state is which boot -
right or left - is on your neck.  The Clinton compromise is both
boots on your neck.

One way to justify a power grab was to issue studies supporting
ideas that are alien to America.  For example, the White House
hired the Rand Corporation to do a study of transnational terror
and information warfare.  Somewhere in the study the brains at
Rand forgot the Constitution.

The Rand report states "An important factor is the traditional
change in the government's role as one moves from national
defense through public safety toward things that represent the
public good.  Clearly, the government's perceived role in this
area will have to be balanced against public perceptions of the
loss of civil liberties and the commercial sector's concern
about unwarranted limits on its practices and markets."

The word from Rand...  Capitalists, conservatives,
constitutionalists and liberal privacy lovers beware.  Your
markets and civil liberties are at risk of being sacrificed in
the name of the "public good".

The administration use of propaganda to dehumanize an imaginary
domestic enemy of American citizens included issuing lies and
fiction to itself.  In 1993, the FBI issued a Top Secret report
to President Clinton claiming that mass media computer security
software could be used by criminals and terrorists to block
Federal wiretaps.

The FBI linked every crime imaginable to the need to ban the
mass media PC software.  The FBI report noted that a child
"snuff" film ring was prosecuted using phone wire taps, implying
that more children would be murdered on film unless computer
security software was banned.

The FBI later told Congress the "snuff" story was false.  No
such ring existed.  The Top Secret report was a fiction.

The FBI has claimed in public testimony that the Trade Tower
bombers were caught using wire-taps of their phone.  The fact is
the terrorists were caught using an informant and a video camera
hooked up inside their bomb factory.  No wire-tap information
was produced at their trial.

The FBI has claimed to Congress that mobster John Gotti was
prosecuted with wire taps.  The fact is no wire taps were used
in Gotti's trial because he never used the phone for business.
The FBI caught Gotti with a radio-microphone bug placed inside
his home.

The FBI has sought access to millions of phone lines, claiming a
need to expand wire taps against domestic terrorists and
criminals.  The fact is the FBI has issued on average about a
thousand wire taps a year for the last ten years.  None of the
cases taken to prosecution involved violent terrorism crimes.

Meanwhile, the Democrats and the President claim to favor the
privacy of the little people - such as Monica Lewinsky.  The
White House generated outrage over Linda Tripp and her tapes of
Monica are so false as to be laughable.  Political "Watergate"
like break-ins and illegal third party taping of phone calls
have become the norm under Clinton.

For example, Democrat Congressman McDermott released a tape of
House Speaker Gingrich talking to other Republicans taken from
an illegally monitored cellular phone call.  The Reno led Dept.
of Justice has not prosecuted McDermott.  With Ms. Reno running
the show, don't hold your breath waiting.

Nor is the war just between Democrat and Republican.  Inner
party fist fights are becoming more vicious than the traditional
two party combat.  For example, Senator Charles Robb had to
dismiss two of his staff for illegally taping the phone calls of
Democratic rival Governor Douglas Wilder.  The subject of the
Wilder phone taps was the hot relationship between the single
black Governor and a rich white widow.

The victors and the vanquished litter the new information
battlefield.  Clinton, McDermott and Robb are still in elected
office but Gingrich and Wilder are gone.  Politicians in the
next century who are not electronically literate will find
themselves on the back bench or out of office.

The modern world is full of computer tracking systems.  Each of
us creates an electronic image.  You live in various databases
or radiowaves in the sky as you move about doing business and
living in the modern world.  The use of your own electronic
emissions against you is a form of oppression.  The intent is to
deny your freedom and increase the power of a few.

We must choose not to be tagged, tracked and controlled like
some horrific animal experiment.  We can remain individuals in a
collective modern democracy.  Law and order can be maintained
without having to compromise our liberty.  Justice can be done
to those who abuse the system.

We can free ourselves and the world or enslave it.  Technology
can increase liberties and markets but only if we want it to do
so.  It is up to us to choose the path to tomorrow, electronic
freedom or digital slavery.

================================================================
source document index -

http://www.softwar.net/eprivacy.html

================================================================
1 if by land, 2 if by sea.  Paul Revere - encryption 1775
Charles R. Smith
SOFTWAR         http://www.softwar.net      [EMAIL PROTECTED]
Pcyphered SIGNATURE:
2F7622A280F69F146088617821041C3A79DF06E9F09B2C0E6346256B1188B995
917162EC0FBB4E5797BDEEFD18115F19703BE201EEF8EB343B6B4CF64AACA132
672B10DF69A0A4DB
================================================================
SOFTWAR EMAIL NEWSLETTER                            02/02/99
***  to unsubscribe reply with "unsubscribe" as subject    ***
================================================================



Reply via email to