-Caveat Lector-

from alt.conspiracy
-----
As always, Caveat Lector.
Om
K
-----
<A HREF="aol://5863:126/alt.conspiracy:482328">REPORT - HOW THE INTERNET IS
BEING CONTROLLED</A>
--[3]--

APPENDIX B: White House Statement on PDD-62 and PDD-63 THE WHITE
HOUSE

Office of the Press Secretary

For Immediate Release May 22, 1998


SUMMARY OF PRESIDENTIAL DECISION

DIRECTIVES 62 and 63

President Clinton today ordered the strengthening of the nation's
defenses against emerging unconventional threats to the United
States: terrorist acts, use of weapons of mass destruction,
assaults on our critical infrastructures and cyber-attacks.

The Combating Terrorism directive (PDD-62) highlights the growing
threat of unconventional attacks against the United States. It
details a new and more systematic approach to fighting terrorism by
bringing a program management approach to U.S. counter-terrorism
efforts.

The directive also establishes the office of the National
Coordinator for Security, Infrastructure Protection and Counter-
Terrorism which will oversee a broad variety of relevant policies
and programs including areas such as counter-terrorism, protection
of critical infrastructure, preparedness and consequence management
for weapons of mass destruction.

The Critical Infrastructure Protection directive (PDD-63) calls for
a national effort to assure the security of the increasingly
vulnerable and interconnected infrastructures of the United States.
Such infrastructures include telecommunications, banking and
finance, energy, transportation, and essential government services.
The directive requires immediate federal government action
including risk assessment and planning to reduce exposure to
attack. It stresses the critical importance of cooperation between
the government and the private sector by linking designated
agencies with private sector representatives.

APPENDIX C: Members of PCCIP

The government members of the PCCIP clearly represented
intelligence and law enforcement interests. They included:

 o  Peter H. Daly, U.S. Treasury, Senior Advisor in the Office of the
Assistant Secretary for Management and Chief Financial Officer. Daly's
portfolio includes responsibility for electronic money policy issues as they
affect law enforcement.

 o  John C. Davis, National Security Agency, Director of the National Computer
Security Center. Davis served in various positions during a 34-year career at
NSA, including Deputy Chief of the INFOSEC Operations and Technical Support
Group, Deputy Chief of the Research and Technology Group, Chief of the
Microelectronics Office, and Chief of the Office of Computer and Processing
Technology in the Research and Engineering Organization.

 o  Thomas J. Falvey, Department of Transportation (DOT), Office of the
Secretary, Office of Intelligence and Security. Falvey is the DOT's National
Security Advisor in the Office of Intelligence and Security and the
department's expert on transportation infrastructure protection and assurance
and information warfare.

 o  Brenton C. Greene, Department of Defense (DOD), Office of the Under
Secretary of Defense for Policy, Director for Infrastructure Policy. Greene, a
former U.S. nuclear submarine commander, led the DOD staff element responsible
for developing policy, plans, programs and procedures for infrastructure
assurance policy and information warfare.

 o  David A. Jones, Department of Energy (DOE), Office of Safeguards and
Security, Director, Policy, Standards and Analysis Division. At DOE Jones was
responsible for developing, promulgating and analyzing DOE-wide safeguards and
security policy, procedures and standards, including physical security,
information security, personnel security, nuclear materials control and
accountability, and the Design Basis Threat.

 o  William B. Joyce, Central Intelligence Agency (CIA). Joyce joined the
Central Intelligence Agency in 1972 and has served in a number of supervisory
and management positions overseas and in Washington. He specializes in the
collection and processing of foreign open source intelligence.

 o  Stevan D. Mitchell, Department of Justice. Mitchell is a trial attorney
with the Criminal Division's Computer Crime Unit where has litigated cases,
conducted investigations, drafted legislative proposals, and participated in
international efforts to curb illegal uses of advanced technology, presumably
including encryption technology.

 o  Dr. Irwin M. Pikus, Department of Commerce, Bureau of Export
Administration. Dr. Pikus worked in the Bureau of Export Administration where
he directed an office that collects and analyzes information dealing with
foreign technology comparable to the advanced technologies whose exports are
controlled by the United States. This presumably includes encryption
technology.

 o  Dr. John R. Powers, Federal Emergency Management Agency, Senior Policy
Advisor for Strategic Planning. Dr. Powers developed a policy framework for an
integrated emergency response capability and helped change the approach to
both mobilization and civil defense within the civil sector. FEMA is
authorized to assume extra-constitutional powers in the event of a national
emergency. Therefore, it has often been referred to as "the secret
government."

 o  Susan Simens, Federal Bureau of Investigation (FBI). Simens is a
Supervisory Special Agent with the Federal Bureau of Investigations. During
her 18 years with the Bureau, she has been assigned to matters involving
national security, including management of the FBI's computer espionage
program.

Some of the members representing the private sector also had close links with
the military and intelligence communities, including the PCCIP chairman.
Robert Marsh currently serves as the chairman of the board of CAE Electronics,
Inc. and Comverse Government Systems Corporation, two companies with close
links to the Pentagon and intelligence agencies. He is also a trustee of the
MITRE Corporation, a government think tank that is under contract to the CIA,
NSA, and the military services. From 1989-1991, Marsh served as the first
chairman of Thiokol Corporation, another Pentagon contractor.

Others having similar links include:

 o  Merritt Adams, American Telephone & Telegraph (AT&T). Adams is
an international telecommunications consultant specializing in
electronic surveillance.

 o  Dr. William J. Harris, Texas Transportation Institute. While
Associate Director of the Texas Transportation Institute from 1985
to 1995, Dr. Harris contributed to development of a major program
in intelligent transportation systems. He also spent a number of
years with the Battelle Memorial Institute, a think tank with
contracts with numerous military agencies.

The PCCIP's Steering Committee was composed of a similar cadre of
members representing law enforcement, the military, and
intelligence. They included General Marsh, along with:

 o  Attorney General Janet Reno.

 o  John J. Hamre, Deputy Secretary of Defense (from 1978 to 1984,
he served in the Congressional Budget Office, rising to the
position of Deputy Assistant Director for National Security and
International Affairs).

 o  General Donald Kerrick, Deputy Assistant to the President for
National Security Affairs (he previously served as the Director for
Operations for the Defense Intelligence Agency and in 1994 and
1995, he served on the White House National Security Council as
Director of European Affairs).

 o  Don Gips, Representative from the Office of the Vice President
(he had previously served a three-year tenure as the FCC's Deputy
Chief of the Office of Plans and Policy and later as Chief of the
FCC's International Bureau. Before working at the FCC, Mr. Gips
held the position of Engagement Manager at McKinsey & Company, an
international consulting firm).

The PCCIP Advisory Committee was also packed with a number of
members close to the military, law enforcement and intelligence
communities. They included the two co-chairs:

 o  Former Senator Sam Nunn, of Georgia, a senior partner in the
Atlanta law firm of King & Spalding. Nunn was elected to the United
States Senate from Georgia in 1972 and served for four terms. He
served as chairman of the Senate Armed Services Committee and the
Permanent Subcommittee on Investigations. Nunn also served on the
Senate's Intelligence Committee. He serves on the boards of the
Center for Strategic and International Studies (a think tank for
the intelligence community and State Department) and General
Electric.

 o  Jamie S. Gorelick, Vice Chair of Fannie Mae. Gorelick
previously served as Deputy Attorney General at the Department of
Justice where she championed escrowed encryption and wider
surveillance capabilities for the FBI. She was also General Counsel
for the Department of Defense.

Other Advisory Committee members representing the military-
intelligence complex include:

 o  Robert L. Baxter, Senior Vice President with the Bechtel Group,
Inc. and President of the Bechtel Civil Company (BCIV). Bechtel is
a privately-owned corporation that has been linked to numerous
covert activities abroad, involving U.S. intelligence agencies.

 o  Joseph Holmes, Corporate Vice President and the group executive
for EDS Technology and Engineering Group. Holmes has been with EDS
since 1968, when it was under the management of H. Ross Perot. EDS
has been associated with the provision of computer services to a
number of foreign intelligence and police agencies, including the
Shah of Iran's SAVAK. In recent times, EDS is at the forefront of
providing advanced technology national identification card systems
to various countries.

 o  Charles R. Lee, Chairman and the Chief Executive Officer of GTE
Corporation. Lee also serves on the board of United Technologies
Corp., a large defense contractor, and is the chairman of the
President's National Security Telecommunications Advisory Committee
(NSTAC).

 o  Norman Mineta, Senior Vice President and Managing Director of
Transportation Systems and Services at Lockheed Martin. Lockheed
Martin is one of the largest Pentagon contractors. A former Mayor
of San Jose, California, Mineta was elected to the U.S. House of
Representatives in 1974, where he served for 21 years.

 o  Mort Topfer, Vice-Chairman of Dell Computer Corporation. Topfer
served as Corporate Executive Vice President of Motorola, Inc., and
President of Motorola's Land Mobile Products Sector. Topfer also
spent a number of years with RCA Laboratories. Both Motorola and
RCA developed systems supporting the signals intelligence (SIGINT)
and communications intelligence (COMINT) missions of the NSA.

Full biographies available at:
http://www.pccip.gov/staff_bios.html>http://www.pccip.gov/staff_bios.html

In addition, the Principals Committee that was established by
Section 2 of Executive Order 13010 to review Commission reports or
recommendations before submission to the President, also had a
preponderance of those involved with law enforcement and
intelligence. The Principals Committee includes:

 o  Secretary of Defense

 o  Attorney General

 o  Secretary of the Treasury

 o  Secretary of Commerce

 o  Secretary of Transportation

 o  Secretary of Energy

 o  Director of Central Intelligence

 o  Director of the Office of Management and Budget

 o  Director of the Federal Emergency Management Agency

 o  Assistant to the President for National Security Affairs

 o  Assistant to the Vice President for National Security Affairs

 o  Assistant to the President for Economic Policy and Director of
the National Economic Council

 o  Assistant to the President and Director of the Office of
Science and Technology Policy

Also available from the EPIC Bookstore http://www.epic.org/bookstore/

Cryptography and Liberty: An International Survey of Encryption
Policy (EPIC 1998)

A comprehensive review of the cryptography policies of virtually
every national and territorial jurisdiction in the world was
undertaken by the Electronic Privacy Information Center on behalf
of the Global Internet Liberty Campaign. Controls on domestic use,
import, and export are covered in the survey.

EPIC Cryptography and Privacy Sourcebooks (EPIC, 1995,1996, 1998)

The EPIC Cryptography and Privacy Sourcebooks are the definitive
resources for government documents, court decisions, and
legislation related to encryption policy, wiretapping, and privacy
online. The 1995, 1996 and 1998 editions are still available.

The Electronic Privacy Papers: Documents on the Battle for Privacy
in the Age of Surveillance

Edited by Bruce Schneier and David Banisar (John Wiley & Sons 1997)

The Electronic Privacy Papers offers readers a close look at
regulatory and technical issues, including: The economic and
political rational for digital wire tapping and surveillance; The
legal claims for government surveillance; Government strategies for
soliciting cooperation from telephone companies and equipment
manufacturers; and Policies government might pursue in the future.
The Electronic Privacy Papers includes excerpts from the House
Judiciary Committee report on the digital telephony bill, the FBI's
wish list for electronic surveillance, U.S. cryptography policy
statement from the White House, and many other government
documents.

Electronic Privacy Information Center
666 Pennsylvania Avenue S.E.
Suite 301
Washington, D.C. 20003

 - - - - -

How long will sites like FreeRepublic last under such policies as
those outlined in the report above?

Posted by: moshe <[EMAIL PROTECTED]> 1/25/99 09:45:09 PST

 - - - - -

Source of the above and more news and discussion:
http://www.freerepublic.com/

Click on the  "Latest on Clinton" link at
http://www.flex.com/~jai
-----
Aloha, He'Ping,
Om, Shalom, Salaam.
Em Hotep, Peace Be,
Omnia Bona Bonis,
All My Relations.
Adieu, Adios, Aloha.
Amen.
Roads End
Kris

DECLARATION & DISCLAIMER
==========
CTRL is a discussion and informational exchange list. Proselyzting propagandic
screeds are not allowed. Substance—not soapboxing!  These are sordid matters
and 'conspiracy theory', with its many half-truths, misdirections and outright
frauds is used politically  by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credeence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to