[CTRL] Privacy Row in the Skies

2003-12-10 Thread William Shannon
-Caveat Lector-
http://www.thetruthseeker.co.uk/article.asp?ID=1327



Privacy Row in the Skies
Gordon Thomas 

President Bush and the European Union are on a head-on collision course over Washingtons plan to introduce the largest surveillance system ever used on civilian populations. The American Civil Liberties Union has called it a surveillance monster that will not make anyone safer. 

It could have a serious effect on tourism to America. It could see airlines that co-operate with the system facing huge penalties from the European Union. But those airlines who refuse to bow to Washingtons demands will be denied landing rights at all US airports. 

Last week, as President Bush flew to and from Baghdad on Air Force One in a slick publicity stunt for footage to enhance his coming election video, he broke some of the very laws he now wants to enforce. 

Air Force One did not identify itself as it sneaked out of Andrews Air Force Base. The President did not say he was on board. Or where he was going. 

In doing so, he broke the spirit  if not the proposed law  of the Computer Assisted Passenger Pre-Screening System, CAPPS-II. 
This is the updated version of a system introduced in 1996 after TWA flight 800 went down over Long Island Sound, killing 250. 
Before it was learned that the tragedy was noting to do with terrorism, the Clinton Administration had rushed through CAPPS-I. 

It was supposed to single out potential terrorists by vetting them before they boarded flights. Fliers who bought one-way tickets, checked in without tickets or paid in cash for flights were flagged as potential threats. 

But now, prompted by Bush, Homeland Security wants to introduce in the New Year, CAPPS-II, that goes far beyond the original scheme. 

Each airline bringing a passenger to the United States must supply Homeland Security with the name, address, date of birth, home and office telephone number and occupation of each traveller. 

There will be no exceptions. Even babies must be logged. Details of a childs school must be provided. 

The information will be fed into state-of-the-art computers at Homeland Securitys Transportation Division. 

Each detail will be checked with data-mining software to cross-reference that information with computerised records already stored. 

These would contain details of previous flights a passenger has made  along with where and how long he or she stayed in the United States. Any change in marital status will be noted. 

The data will then be processed by more computers to determine the level of security risk to the United States any passenger poses. 
This information will be supplemented by a passengers on board food preference, who he travelled with in the past, who he is currently flying with. Details of how, where and when a ticket was purchased, by credit card or cash, will be stored for years. 

For this to work, a huge amount of private information will be needed on each person. But of the 39 separate items of information that the US wants on each traveller, only 19 are permitted to be disclosed under European Union privacy laws, said Paris based airline industry analyst, Peter Densor. 

Colin Wallace, a former British intelligence surveillance operative, said that CAPPS-II is a further step to what the state does in the name of protecting the individual. There is something sinister in what Homeland Security is proposing. The results of such surveillance can reshape, reform, or at least control, the thinking and behaviour of any individual. Such surveillance is liberated from any legal or moral obligations. 

The fact is that the US has nothing like the data-protection legislation which exists in Europe and it is very likely that intimate information on private citizens would be sold on from company to company, predicted Peter Somer, adviser to Britains Trade and Industry Department. 

Kevin Warwick, professor of Cybernetics at Englands University of Reading, says that what CAPPS-II will do is to further ensure that surveillance will eventually totally control us. There are already far too many government bodies who are privy to our secrets. They are the watchers. We are the watched. 

A major problem with CAPPS-II  which will trigger confrontation with Washington  is that the European Community want it to have as minimum an independent appeals procedure. 

A spokesman for the EU said: If the systems indicate you are a high-risk passenger due to fault information held on computer, or the checks didnt source enough information on you, then you could end up on a no-fly list forever. 

The supporters of CAPPS-II  led by Israel  say that civil liberties have to be traded for security. 

But Richard Tomlinson, a former MI6 officer said, that argument is knocked on the head by identity theft. For a few hundred dollars a false ID can be obtained. It is relatively easy for a determined terrorist to create a safe passenger profile with easily available documents; credit cards and driving 

[CTRL] Privacy Alert for YAHOO + groups users

2003-01-09 Thread Steve Wingate
-Caveat Lector-

--- Forwarded message follows ---
To: [EMAIL PROTECTED]
From:   [EMAIL PROTECTED]
Date sent:  Wed, 8 Jan 2003 14:53:05 EST
Subject:!b_a_Act: Privacy Alert for YAHOO + groups users


Yahoo is now using something called Web Beacons to track Yahoo
Group users around the net and see what you're doing - similar to
cookies. Take a look at their updated privacy statement:

http://privacy.yahoo.com/privacy/us/pixels/details.html

About half-way down the page, in the section Outside the Yahoo!
Network, you'll see a little click here link that will let you
opt-out of their new method of snooping. I recommend doing this. Once
you have clicked that link, you are opted out. Notice the Success
message at the top of the next page. Be careful, because on that
page there is a Cancel Opt-out button that, if clicked, will *undo*
the opt-out.You are now done, and will receive less junk mail.


If you want to prevent Yahoo from spamming you or selling your
personal information, you can ALSO update your account preferences at
this address  Which will show you as opted out if you performed the
funcion at the beginning of this email.

http://subscribe.yahoo.com/showaccount

Yahoo Group users may want to check this out.

Yahoo users please note - new cyber snooping measures in place

Anyone who is in a Yahoo group needs to read this.

Yahoo may be taking advantage of the new Homeland Security measures
set up for ISPs to Monitor the netAt least for now Yahoo has
an Opt Out of their Web Beacons Trackers.

This has been posted (note that you must opt out on every browser
you use with Yahoo):

--

--- End of forwarded message ---
--
Steve Wingate
ANOMALOUS IMAGES AND UFO FILES
http://www.anomalous-images.com

A HREF=http://www.ctrl.org/;www.ctrl.org/A
DECLARATION  DISCLAIMER
==
CTRL is a discussion  informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of
[EMAIL PROTECTED]/A

http:[EMAIL PROTECTED]/
 A HREF=http:[EMAIL PROTECTED]/;ctrl/A

To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om



Re: [CTRL] Privacy Not

2001-08-01 Thread Andrew Hennessey

-Caveat Lector-

please enlighten me c
I really want to know, to understand,
to see how I have been failing you and make amends
by passing your test 

with love and best wishes,

andrew
www.planetxorg.com


- Original Message -
From: c. [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Wednesday, August 01, 2001 7:02 AM
Subject: Re: [CTRL] Privacy Not


 -Caveat Lector-

 - Original Message -
 From: Andrew Hennessey [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Sent: Tuesday, July 31, 2001 10:14 PM
 Subject: Re: [CTRL] Privacy Not


  -Caveat Lector-
 
  you came up with an original word


 no i didn't. 'twas a simple test to assess your understanding of the
subject
 you speak so authoritively. unsurprisingly, you fail.

 A HREF=http://www.ctrl.org/;www.ctrl.org/A
 DECLARATION  DISCLAIMER
 ==
 CTRL is a discussion  informational exchange list. Proselytizing
propagandic
 screeds are unwelcomed. Substance-not soap-boxing-please!  These are
 sordid matters and 'conspiracy theory'-with its many half-truths, mis-
 directions and outright frauds-is used politically by different groups
with
 major and minor effects spread throughout the spectrum of time and
thought.
 That being said, CTRLgives no endorsement to the validity of posts, and
 always suggests to readers; be wary of what you read. CTRL gives no
 credence to Holocaust denial and nazi's need not apply.

 Let us please be civil and as always, Caveat Lector.
 
 Archives Available at:
 http://peach.ease.lsoft.com/archives/ctrl.html
  A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of
 [EMAIL PROTECTED]/A

 http:[EMAIL PROTECTED]/
  A HREF=http:[EMAIL PROTECTED]/;ctrl/A
 
 To subscribe to Conspiracy Theory Research List[CTRL] send email:
 SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

 To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
 SIGNOFF CTRL [to:] [EMAIL PROTECTED]

 Om


A HREF=http://www.ctrl.org/;www.ctrl.org/A
DECLARATION  DISCLAIMER
==
CTRL is a discussion  informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of
[EMAIL PROTECTED]/A

http:[EMAIL PROTECTED]/
 A HREF=http:[EMAIL PROTECTED]/;ctrl/A

To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om



Re: [CTRL] Privacy Not

2001-08-01 Thread c.

-Caveat Lector-

i cannot illuminate you andrew. only you can do that.

not so much a test as an assessment.

can't you see the fnords? i mean, really? your writing is full of them...

c.

www.boohoo.demon.co.uk/pageone.htm

- Original Message -
From: Andrew Hennessey [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Wednesday, August 01, 2001 4:15 PM
Subject: Re: [CTRL] Privacy Not


 -Caveat Lector-

 please enlighten me c
 I really want to know, to understand,
 to see how I have been failing you and make amends
 by passing your test 

 with love and best wishes,

 andrew
 www.planetxorg.com


 - Original Message -
 From: c. [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Sent: Wednesday, August 01, 2001 7:02 AM
 Subject: Re: [CTRL] Privacy Not


  -Caveat Lector-
 
  - Original Message -
  From: Andrew Hennessey [EMAIL PROTECTED]
  To: [EMAIL PROTECTED]
  Sent: Tuesday, July 31, 2001 10:14 PM
  Subject: Re: [CTRL] Privacy Not
 
 
   -Caveat Lector-
  
   you came up with an original word
 
 
  no i didn't. 'twas a simple test to assess your understanding of the
 subject
  you speak so authoritively. unsurprisingly, you fail.
 
  A HREF=http://www.ctrl.org/;www.ctrl.org/A
  DECLARATION  DISCLAIMER
  ==
  CTRL is a discussion  informational exchange list. Proselytizing
 propagandic
  screeds are unwelcomed. Substance-not soap-boxing-please!  These are
  sordid matters and 'conspiracy theory'-with its many half-truths, mis-
  directions and outright frauds-is used politically by different groups
 with
  major and minor effects spread throughout the spectrum of time and
 thought.
  That being said, CTRLgives no endorsement to the validity of posts, and
  always suggests to readers; be wary of what you read. CTRL gives no
  credence to Holocaust denial and nazi's need not apply.
 
  Let us please be civil and as always, Caveat Lector.
  
  Archives Available at:
  http://peach.ease.lsoft.com/archives/ctrl.html
   A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of
  [EMAIL PROTECTED]/A
 
  http:[EMAIL PROTECTED]/
   A HREF=http:[EMAIL PROTECTED]/;ctrl/A
  
  To subscribe to Conspiracy Theory Research List[CTRL] send email:
  SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]
 
  To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
  SIGNOFF CTRL [to:] [EMAIL PROTECTED]
 
  Om
 

 A HREF=http://www.ctrl.org/;www.ctrl.org/A
 DECLARATION  DISCLAIMER
 ==
 CTRL is a discussion  informational exchange list. Proselytizing
propagandic
 screeds are unwelcomed. Substancenot soap-boxingplease!  These are
 sordid matters and 'conspiracy theory'with its many half-truths, mis-
 directions and outright fraudsis used politically by different groups with
 major and minor effects spread throughout the spectrum of time and
thought.
 That being said, CTRLgives no endorsement to the validity of posts, and
 always suggests to readers; be wary of what you read. CTRL gives no
 credence to Holocaust denial and nazi's need not apply.

 Let us please be civil and as always, Caveat Lector.
 
 Archives Available at:
 http://peach.ease.lsoft.com/archives/ctrl.html
  A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of
 [EMAIL PROTECTED]/A

 http:[EMAIL PROTECTED]/
  A HREF=http:[EMAIL PROTECTED]/;ctrl/A
 
 To subscribe to Conspiracy Theory Research List[CTRL] send email:
 SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

 To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
 SIGNOFF CTRL [to:] [EMAIL PROTECTED]

 Om

A HREF=http://www.ctrl.org/;www.ctrl.org/A
DECLARATION  DISCLAIMER
==
CTRL is a discussion  informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of
[EMAIL PROTECTED]/A

http:[EMAIL PROTECTED]/
 A HREF=http:[EMAIL PROTECTED]/;ctrl/A

To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe

Re: [CTRL] Privacy Not

2001-08-01 Thread tribalzidane

-Caveat Lector-

On Tue, 31 Jul 2001 20:23:53 +0100, Andrew Hennessey [EMAIL PROTECTED]
posted article 005201c119f6$566b3400$d0e928c3@elessar, which said:

 unfortunately this list is a bit of a playground for retired CIA etc who
 are trying to make a bit of pocketmoney - so the key wouldn't be safe

 also - I'm pretty sure the government/NSA has the ability to strip down
 PGP by now - its the first thing i would ask ET for - computer capacity
 like that.

Possibly so.  Phil Zimmermann, of course, still claims that it would take
supercomputers several months to crack the code, but after I heard about
that new computer that was built to run atmospheric simulations, I'm
starting to wonder what actually defines a supercomputer.  Compared to my
old TRS-80 Color Computer with 16k of RAM, this Athlon 1200 MHz with 256
megs of RAM is a supercomputer.  Over in Europe, Sun Microsystems built a
computer with the RAM that equates to 11,000 CD-ROM's.  Nearly 7 Terabytes
of RAM, that is.  This computer is going to be used to try to figure out
exactly what happened in the process of evolution.

As for this atmospheric meteorlogical simulator, I don't remember how much
RAM it has -- I think they said 11 Terabytes, or they packed enough CPU's in
it to make it run at a clock speed of 11 Terahertz.  I watch TechTV all the
time, so when I see the report again, I'll respond here and update the
thread.

Anyway, seems like with a computer that fast, it wouldn't take very long to
crack a PGP key.  And I think all these new versions of PGP probaby have a
master key held by the government.  I remember a few years back, the
government was S concerned about people encrypting the e-mail they were
probably reading left and right, so they came up with this plan to have all
PGP users private keys held in escrow and with a court order, the FBI and
other law enforcement agencies could use a warrant to obtain a copy of your
private key and decrypt your e-mails.  Needless to say, privacy advocates
and PGP users were in an uproar.

Now notice that recently they relaxed the laws against exporting encryption
technologies outside the United States.  Why?  I imagine that not only do
they now have all our private keys, not even held in escrow, but sitting on
their hard drives so they can access our e-mail without probably cause, but
they also have a computer fast enough to crack PGP encryption keys in a
matter of minutes.

Phil Zimmermann says that we can always increase the encryption strength of
our keys, which is a lot easier and cheaper to do than building a more
powerful computer to crack it.  But even in 1994 we had 2048-bit keys, and
maybe even earlier. Nowadays the most I've heard of is 4096-bit keys.  In
1993 about the fastest consumer-grade PC you could buy was something like a
Pentium 60 and maybe a Pentium 75.  Now you can get a Pentium IV running at
1800 MHz.  We should be using at LEAST 131,072-bit keys to keep the same
relative strength of encryption that we had back then.  But while computer
speeds have increased nearly 20-fold, our PGP keys are only twice as strong.

Yep... it's been cracked.  Privacy is an illusion.

Damaeus

A HREF=http://www.ctrl.org/;www.ctrl.org/A
DECLARATION  DISCLAIMER
==
CTRL is a discussion  informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of
[EMAIL PROTECTED]/A

http:[EMAIL PROTECTED]/
 A HREF=http:[EMAIL PROTECTED]/;ctrl/A

To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om



[CTRL] Privacy Not

2001-07-31 Thread tribalzidane

-Caveat Lector-

Perhaps with all the concerns about wiretaps, e-mail snooping and the like,
this might be a nice place to encourage the use of PGP encryption.  It would
be kind of like sticking our e-mails in a lockbox that only we can open.
Only thing is... how do we know an informant is not among us.  I dunno...
Maybe it's not even worth trying.  It's not like we're conspiring to
overthrow the government or anything.  We're just discussing things that the
government would probably prefer that we not even know about.

Thing is, though, if enough people use PGP, the government would spend so
much time straining their computers to crack the codes of e-mails that it
might make e-mail snooping something that's not worth doing anymore.

Might cause a mess, though... Does the list get a PGP key?  Do we all share
our keys with each other?  Plus we'd have to type in a passphrase for every
e-mail.  But is it any more inconvenient than opening an envelope?

Damaeus

A HREF=http://www.ctrl.org/;www.ctrl.org/A
DECLARATION  DISCLAIMER
==
CTRL is a discussion  informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of
[EMAIL PROTECTED]/A

http:[EMAIL PROTECTED]/
 A HREF=http:[EMAIL PROTECTED]/;ctrl/A

To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om



Re: [CTRL] Privacy Not

2001-07-31 Thread kl

-Caveat Lector-

On 31 Jul 2001, at 10:50, [EMAIL PROTECTED] wrote:

 -Caveat Lector-

 Perhaps with all the concerns about wiretaps, e-mail snooping and the like,
 this might be a nice place to encourage the use of PGP encryption.  It
 would be kind of like sticking our e-mails in a lockbox that only we can
 open. Only thing is... how do we know an informant is not among us.  I
 dunno... Maybe it's not even worth trying.  It's not like we're conspiring
 to overthrow the government or anything.  We're just discussing things that
 the government would probably prefer that we not even know about.

 Thing is, though, if enough people use PGP, the government would spend so
 much time straining their computers to crack the codes of e-mails that it
 might make e-mail snooping something that's not worth doing anymore.

 Might cause a mess, though... Does the list get a PGP key?  Do we all share
 our keys with each other?  Plus we'd have to type in a passphrase for every
 e-mail.  But is it any more inconvenient than opening an envelope?

 Damaeus


The only way this would work would be for the list to share it's private
key with every member, which would pretty much defeat the purpose of
a private key.  The snoops could get the key by subscribing to the list.


--
Best wishes

   Woolybooger for the day:
(3) These rights and freedoms may in no case be exercised contrary to
the purposes and principles of the United Nations.
-Article 29, Universal Declaration of Human Rights Adopted and
proclaimed by General Assembly resolution 217 A (III) of 10 December
1948.

A HREF=http://www.ctrl.org/;www.ctrl.org/A
DECLARATION  DISCLAIMER
==
CTRL is a discussion  informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of
[EMAIL PROTECTED]/A

http:[EMAIL PROTECTED]/
 A HREF=http:[EMAIL PROTECTED]/;ctrl/A

To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om



Re: [CTRL] Privacy Not

2001-07-31 Thread Andrew Hennessey

-Caveat Lector-

unfortunately this list is a bit of a playground for
retired CIA etc who are trying to make a bit of
pocketmoney - so the key wouldn't be safe

also - I'm pretty sure the government/NSA has
the ability to strip down PGP by now - its the
first thing i would ask ET for - computer capacity like
that.

andrew
- Original Message -
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Tuesday, July 31, 2001 4:50 PM
Subject: [CTRL] Privacy Not


 -Caveat Lector-

 Perhaps with all the concerns about wiretaps, e-mail snooping and the
like,
 this might be a nice place to encourage the use of PGP encryption.  It
would
 be kind of like sticking our e-mails in a lockbox that only we can open.
 Only thing is... how do we know an informant is not among us.  I
dunno...
 Maybe it's not even worth trying.  It's not like we're conspiring to
 overthrow the government or anything.  We're just discussing things that
the
 government would probably prefer that we not even know about.

 Thing is, though, if enough people use PGP, the government would spend so
 much time straining their computers to crack the codes of e-mails that it
 might make e-mail snooping something that's not worth doing anymore.

 Might cause a mess, though... Does the list get a PGP key?  Do we all
share
 our keys with each other?  Plus we'd have to type in a passphrase for
every
 e-mail.  But is it any more inconvenient than opening an envelope?

 Damaeus

 A HREF=http://www.ctrl.org/;www.ctrl.org/A
 DECLARATION  DISCLAIMER
 ==
 CTRL is a discussion  informational exchange list. Proselytizing
propagandic
 screeds are unwelcomed. Substance-not soap-boxing-please!  These are
 sordid matters and 'conspiracy theory'-with its many half-truths, mis-
 directions and outright frauds-is used politically by different groups
with
 major and minor effects spread throughout the spectrum of time and
thought.
 That being said, CTRLgives no endorsement to the validity of posts, and
 always suggests to readers; be wary of what you read. CTRL gives no
 credence to Holocaust denial and nazi's need not apply.

 Let us please be civil and as always, Caveat Lector.
 
 Archives Available at:
 http://peach.ease.lsoft.com/archives/ctrl.html
  A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of
 [EMAIL PROTECTED]/A

 http:[EMAIL PROTECTED]/
  A HREF=http:[EMAIL PROTECTED]/;ctrl/A
 
 To subscribe to Conspiracy Theory Research List[CTRL] send email:
 SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

 To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
 SIGNOFF CTRL [to:] [EMAIL PROTECTED]

 Om


A HREF=http://www.ctrl.org/;www.ctrl.org/A
DECLARATION  DISCLAIMER
==
CTRL is a discussion  informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of
[EMAIL PROTECTED]/A

http:[EMAIL PROTECTED]/
 A HREF=http:[EMAIL PROTECTED]/;ctrl/A

To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om



Re: [CTRL] Privacy Not

2001-07-31 Thread c.

-Caveat Lector-

- Original Message -
From: Andrew Hennessey [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Tuesday, July 31, 2001 8:23 PM
Subject: Re: [CTRL] Privacy Not


 -Caveat Lector-

 unfortunately fnord this fnord list fnord is fnord a fnord bit fnord of
fnord a fnord playground
 fnord for fnord retired fnord CIA fnord etc fnord who fnord are fnord
trying fnord to
 fnord make fnord a fnord bit fnord of fnord pocketmoney fnord - so fnord
the fnord key
 fnord wouldn't fnord be fnord safe

 also fnord - I'm fnord pretty fnord sure fnord the fnord government/NSA
fnord has fnord
 the fnord ability fnord to fnord strip fnord down fnord PGP fnord by fnord
fnord now - its
 fnord the fnord
 first  fnord thing fnord i fnord would fnord ask fnord ET fnord for
fnord - computer
 fnord capacity fnord like
 that.

A HREF=http://www.ctrl.org/;www.ctrl.org/A
DECLARATION  DISCLAIMER
==
CTRL is a discussion  informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of
[EMAIL PROTECTED]/A

http:[EMAIL PROTECTED]/
 A HREF=http:[EMAIL PROTECTED]/;ctrl/A

To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om



Re: [CTRL] Privacy Not

2001-07-31 Thread Andrew Hennessey

-Caveat Lector-

you came up with an original word - amazing -
all you have to do now is get a few more and
make a sentence - and before you know it -
you may have expressed an original idea
in terms of a paragraph -
I would watch trying not to repeat the same idea
too often though - folks might get the wrong idea :)

andrew

- Original Message -
From: c. [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Tuesday, July 31, 2001 8:46 PM
Subject: Re: [CTRL] Privacy Not


 -Caveat Lector-

 - Original Message -
 From: Andrew Hennessey [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Sent: Tuesday, July 31, 2001 8:23 PM
 Subject: Re: [CTRL] Privacy Not


  -Caveat Lector-
 
  unfortunately fnord this fnord list fnord is fnord a fnord bit fnord of
 fnord a fnord playground
  fnord for fnord retired fnord CIA fnord etc fnord who fnord are fnord
 trying fnord to
  fnord make fnord a fnord bit fnord of fnord pocketmoney fnord - so fnord
 the fnord key
  fnord wouldn't fnord be fnord safe
 
  also fnord - I'm fnord pretty fnord sure fnord the fnord government/NSA
 fnord has fnord
  the fnord ability fnord to fnord strip fnord down fnord PGP fnord by
fnord
 fnord now - its
  fnord the fnord
  first  fnord thing fnord i fnord would fnord ask fnord ET fnord for
 fnord - computer
  fnord capacity fnord like
  that.

 A HREF=http://www.ctrl.org/;www.ctrl.org/A
 DECLARATION  DISCLAIMER
 ==
 CTRL is a discussion  informational exchange list. Proselytizing
propagandic
 screeds are unwelcomed. Substance-not soap-boxing-please!  These are
 sordid matters and 'conspiracy theory'-with its many half-truths, mis-
 directions and outright frauds-is used politically by different groups
with
 major and minor effects spread throughout the spectrum of time and
thought.
 That being said, CTRLgives no endorsement to the validity of posts, and
 always suggests to readers; be wary of what you read. CTRL gives no
 credence to Holocaust denial and nazi's need not apply.

 Let us please be civil and as always, Caveat Lector.
 
 Archives Available at:
 http://peach.ease.lsoft.com/archives/ctrl.html
  A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of
 [EMAIL PROTECTED]/A

 http:[EMAIL PROTECTED]/
  A HREF=http:[EMAIL PROTECTED]/;ctrl/A
 
 To subscribe to Conspiracy Theory Research List[CTRL] send email:
 SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

 To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
 SIGNOFF CTRL [to:] [EMAIL PROTECTED]

 Om


A HREF=http://www.ctrl.org/;www.ctrl.org/A
DECLARATION  DISCLAIMER
==
CTRL is a discussion  informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of
[EMAIL PROTECTED]/A

http:[EMAIL PROTECTED]/
 A HREF=http:[EMAIL PROTECTED]/;ctrl/A

To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om



Re: [CTRL] Privacy Not

2001-07-31 Thread c.

-Caveat Lector-

- Original Message -
From: Andrew Hennessey [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Tuesday, July 31, 2001 10:14 PM
Subject: Re: [CTRL] Privacy Not


 -Caveat Lector-

 you came up with an original word


no i didn't. 'twas a simple test to assess your understanding of the subject
you speak so authoritively. unsurprisingly, you fail.

A HREF=http://www.ctrl.org/;www.ctrl.org/A
DECLARATION  DISCLAIMER
==
CTRL is a discussion  informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of
[EMAIL PROTECTED]/A

http:[EMAIL PROTECTED]/
 A HREF=http:[EMAIL PROTECTED]/;ctrl/A

To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om



[CTRL] Privacy Matters! Read, learn, pass on (fwd)

2001-07-27 Thread Yardbird

-Caveat Lector-

Weekly Update for 7/26/01
COALITION FOR CONSTITUTIONAL LIBERTIES
Volume 5, Number 18
Brought to you by the Center for Technology Policy of the Free Congress
Foundation
Lisa S. Dean, Director, Center for Technology Policy
(mailto:[EMAIL PROTECTED] mailto:[EMAIL PROTECTED] )
J. Bradley Jansen, Deputy Director, Center for Technology Policy
(mailto:[EMAIL PROTECTED] mailto:[EMAIL PROTECTED] )
Hannah H. Woody, Coalition Coordinator (mailto:[EMAIL PROTECTED]
mailto:[EMAIL PROTECTED] )
phone: (202) 546-3000
fax: (202) 544-2819
http://www.FreeCongress.org http://www.FreeCongress.org
THIS WEEK:

* INTERNATIONAL DEVELOPMENT OR CORPORATE WELFARE?
By J. Bradley Jansen, Deputy Director, Center of Technology Policy, Free
Congress Foundation
The Free Congress Commentary, From the Endangered Liberties Television
Program
www.freecongress.org/press/offpress/010723.BJfcc.htm
http://www.freecongress.org/press/offpress/010723.BJfcc.htm

* DEAN: COLORADO SHOWS CITIZENS PROTECTING THEIR PRIVACY WORKS
Press Release, Free Congress Foundation, July 19, 2001
www.freecongress.org/press/releases/010719.htm
http://www.freecongress.org/press/releases/010724.htm

* JANSEN: OUR CURRENCY SHOULD NOT CARRY TRACKING CHIPS
Press Release, Free Congress Foundation, July 23, 2001
www.freecongress.org/press/releases/010724.htm
http://www.freecongress.org/press/releases/010724.htm

* GOVERNMENT HAS ITS EYE ON YOUR MONEY
By Robyn E. Blumner, St. Petersburg Times, July 22, 2001
http://www.sptimes.com/News/072201/Columns/Government_has_its_ey.shtml
http://www.sptimes.com/News/072201/Columns/Government_has_its_ey.shtml

* CITY COUNCIL DEADLOCKS ON FACE SCANNING
By Geoff Dutton, The Tampa Tribune, July 20, 2001
http://tampatrib.com/FloridaMetro/MGAJW6WCDPC.html
http://tampatrib.com/FloridaMetro/MGAJW6WCDPC.html

* JUSTICE DEPARTMENT GETS A 'PRIVACY CZAR'
By Jerry Seper, Washington Times, July 25, 2001
http://asp.washtimes.com/printarticle.asp?action=printArticleID=20010725-23
http://asp.washtimes.com/printarticle.asp?action=printArticleID=20010725-2
3

* HOUSE PLACES REPORTING REQUIREMENT ON CYBERSNOOPING SYSTEM
The Office of the House Majority Leader, July 23, 2001
http://www.freedom.gov/library/technology/carnivorereport.asp
http://www.freedom.gov/library/technology/carnivorereport.asp

* DISTRICT GETS OK ON RED LIGHT CAMERAS
By Daniel F. Drummond, THE WASHINGTON TIMES, July 25, 2001
http://washtimes.com/metro/20010725-91340800.htm
http://washtimes.com/metro/20010725-91340800.htm

* CHASING THE RUNAWAY TAX SLAVES
By Paul Craig Roberts, The Washington Times, July 25, 2001
http://www.washtimes.com/commentary/roberts.htm
http://www.washtimes.com/commentary/roberts.htm




INTERNATIONAL DEVELOPMENT OR CORPORATE WELFARE?
By J. Bradley Jansen, Deputy Director, Center of Technology Policy, Free
Congress Foundation
The Free Congress Commentary, From the Endangered Liberties Television
Program
www.freecongress.org/press/offpress/010723.BJfcc.htm
http://www.freecongress.org/press/offpress/010723.BJfcc.htm

President Bush recently proposed some changes at the World Bank.  The World
Bank and the International Monetary Fund have come under severe criticism.
There is a broad consensus among conservatives, libertarians and
progressives that the system is broken and needs to be fixed.

The Bush administration is filled with Bretton Woods skeptics.  Economic
advisor Larry Lindsey vocally opposed the latest quota increase for the IMF.
Kenneth Dam, the number two man at the Treasury Department behind Secretary
Paul O'Neill wrote in a 1998 book with former secretary of State George
Shultz, that the bailouts mainly benefited wealthy investors and said that
the interventionist policies only makes things worse.  They can say to
themselves, 'Heads I win, tails you lose,' Dam and Shultz wrote.

John Taylor, a former economics professor at Stanford University, is
Treasury's undersecretary for international affairs..  He has even advocated
abolishing the IMF. He agrees with Dam that bailout actions serve to prop up
reckless investing.   No one confuses the Bush team as apologists of the
left on this issue.

However, many on the left are critical of the IMF and the World Bank too.
It was the IMF that assembled the high-profile multibillion dollar rescue
packages that were meant to rescue foreign creditors even as local banks,
finance companies, and corporations were told to bite the bullet by
accepting bankruptcy, argues Walden Bello, [Is Bush Bad News for the World
Bank?, Focus on the Global South, January 2001].

It was after all mostly young progressives protesting in the streets against
the IMF and World Bank.  Their anger was mostly fueled by a coalition of
progressives that came together in 50 Years is Enough: the Case Against the
World Bank and the International Monetary Fund.

A less pedestrian criticism came from the Meltzer Commission in February of
2000. It reported that 80 per cent of World Bank resources are devoted not
to the poorest developing 

[CTRL] Privacy and guilt

2001-04-30 Thread Johannes Schmidt IV

-Caveat Lector-

It's the classic 'Let's put a spy camera in everyone's bedroom'. What are you doing in 
there that you're so guilty about, that you object? Anyone who objects is obviously 
involved in some sort of deviant, illegal behaviour.

A HREF=http://www.ctrl.org/;www.ctrl.org/A
DECLARATION  DISCLAIMER
==
CTRL is a discussion  informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of
[EMAIL PROTECTED]/A

http:[EMAIL PROTECTED]/
 A HREF=http:[EMAIL PROTECTED]/;ctrl/A

To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om



[CTRL] Privacy blitz is coming.you lost.

2001-04-06 Thread tnohava


 http://www.msnbc.com/news/554838.asp
WASHINGTON, April 4 —  The privacy war is over — you lost. Now it’s all
about survival. In the next few months tens of thousands of businesses will
send consumers billions of so-called “privacy notices.” Disguised as
garden-variety junk mail, these notices — required by a new law — hold the
keys to stopping the wholesale flood of your personal information onto the
free market.

 SOME PEOPLE WILL get 20 or more of these privacy notices as
required by the newly enacted Gramm-Leech-Bliley Act, according to financial
law expert Rick Fischer, who testified before a congressional privacy
hearing this week.
   Fischer’s written testimony outlined the broad reach of the Act,
noting that it mandates that banks, retailers issuing credit cards, money
transmitters, check cashers, mortgage brokers, real-estate settlement
services, appraisers, tax preparations services and online companies that
offer aggregation, funds transfer or payment services send out notices to
all their customers to inform them about the types of personal information
being collected, how it’s being used and to whom it will be sold.
   Your mission, should you actually be able to tell a privacy notice
from the weekly dry cleaning discount offer, is to decipher all the legalese
printed in really small type and
allsquishedtogetherlikethismakingitevenhardertoread. Having completed that
task, you then have to follow exacting instructions on how to properly
inform the company that you don’t want them to sell every scrap of your
personal information, which they’ve been collecting from you for the last
three decades.

 The key phrase to look for among these piles of paragraphs is “opt
out.” Because unless you proactively “opt out” or “willingly choose to not
participate,” these companies can sell anything and everything they know
about you unless you tell them not to.
   “Financial and medical records, what you buy, where you shop, your
genetic code, are all exposed in a privacy free-for all,” Frank Torres,
legislative counsel for Consumers Union, told a congressional hearing on
privacy recently. “Complete strangers can, for a price, have access to your
most intimate secrets.”

IT’S ALL SPIT IN THE WIND
   Now, corporate America is wearing this privacy information blitz like
a badge of honor. Its representatives have already testified before Congress
about the great and detailed steps they’ve taken to ensure that consumers
get the all the information they are entitled, by law, to have.
   Corporate America is spitting in our collective face and trying to
sell us on the fact that it’s as fresh as an April rain shower.

   “Failure to pay attention to these privacy notices may result in
sensitive financial data being sold to other companies for marketing and
other purposes,” warns Tena Friery, research director for the Privacy Rights
Clearinghouse.
   But the barrage of paper and the vagueness of the language make it
darn near impossible for anyone to easily make sense of what is taking
place.
   “The notices may actually be telling consumers ‘we can sell
information about your income, debt level, payment history, bankruptcies,
hospitalizations and much more — unless you tell us we can’t,’” Friery said.

The brutal truth about the fallout of the privacy war is that no
part of our lives is left untouched by data collection activities. And it’s
not that all data collection efforts are inherently evil — some are
downright convenient. But convenience is no excuse for the wholesale rape
and pillage of personal information by corporate America.
   There should be a basic right of data ownership in the U.S. and there
simply isn’t. Privacy laws have been built over a century bit-by-bit,
stitched together in a crazy quilt fabric of confusing laws.
   “This means that consumers have lost control over the ability to be
left alone,” Torres told Congress. “Often, consumers have no choice in
whether or not information is collected and no choice in how it is used.
Today, any information provided by a consumer for one reason, such as
getting a loan at a bank, can be used for any other purposes with virtually
no restrictions.”

  So you and I are left with having to buck the increasing trend of
information collection and dissemination. We have to cover our own butts
because no one else will. Trouble is, even when we make the effort, there
are few strong privacy laws in our collective quiver.
   For all the promise of the “opt-out” provision now codified by
Gramm-Leech-Bliley Act, there are enough loopholes in the law — put there by
industry lobbyists when the bill was being written — that the protections
are almost useless.
   “Unfortunately these opt-outs, in reality, will do little or nothing
to prevent the sharing of your information with others,” Torres says.
   The main reason is: Although you can opt out of having a particular
company sell your 

[CTRL] privacy links

2000-07-25 Thread Oscar

http://www.silicon.com/bin/bladerunner?30REQEVENT=REQAUTH=2104614001REQSUB=REQINT1=38711

http://www.wired.com/news/politics/0,1283,37718,00.html

http://www.businessweek.com/bwdaily/dnflash/july2000/nf00707g.htm

http://www.ewatch.com/pop_sleuth.html

http://www.thestandard.com/

http://www.sjmercury.com/svtech/news/top/docs/email071800.htm

http://www.washingtonpost.com/wp-dyn/articles/A57330-2000Jul17.html

http://www.usatoday.com/life/cyber/tech/cti236.htm

http://www.silicon.com/bin/bladerunner?30REQEVENT=REQAUTH=2104614001REQSUB=REQINT1=38715

http://www.dfn.org/


*** NOTICE: In accordance with Title 17 U.S.C. Section 107, this material
is distributed without profit to those who have expressed a prior interest
in receiving the included information for research and educational
purposes. Feel free to distribute widely but PLEASE acknowledge the
source. ***

http://www.angelfire.com/mi/smilinks/thirdeye.html

A HREF="http://www.ctrl.org/"www.ctrl.org/A
DECLARATION  DISCLAIMER
==
CTRL is a discussion  informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 A HREF="http://peach.ease.lsoft.com/archives/ctrl.html"Archives of
[EMAIL PROTECTED]/A

http:[EMAIL PROTECTED]/
 A HREF="http:[EMAIL PROTECTED]/"ctrl/A

To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om



[CTRL] Privacy groups protest FBI email scanner

2000-07-12 Thread Shane A. Saylor, Eccentric Bard

Privacy groups protest FBI email scanner
By The Associated Press
Special to CNET News.com
July 12, 2000, 5:55 a.m. PT
WASHINGTON--Civil liberties and privacy groups railed against a new system
designed to allow law enforcement agents to intercept and analyze huge
amounts of email in connection with an investigation.

The system, dubbed "Carnivore," was first hinted at April 6 in testimony to
a House subcommittee. Now the FBI has it in use.


• Get the "Big Picture"
• Related News
• Message Boards


When Carnivore is placed with an Internet service provider, it scans all
incoming and outgoing emails for messages associated with the target of a
criminal probe.

In a letter addressed to two members of the House subcommittee that deals
with Fourth Amendment search-and-seizure issues, the American Civil
Liberties Union (ACLU) argued that the system breaches the ISP's rights and
the rights of all its customers by reading both sender and recipient
addresses, as well as subject lines of emails, to decide whether to make a
copy of the entire message.

Further, while the system is plugged into the ISP's systems, it is
controlled solely by the law enforcement agency. In a traditional wiretap,
the tap is physically placed and maintained by the telephone company.

"Carnivore is roughly equivalent to a wiretap capable of accessing the
contents of the conversations of all of the phone company's customers, with
the 'assurance' that the FBI will record only conversations of the specified
target," read the letter. "This 'trust us, we are the government' approach
is the antithesis of the procedures required under our wiretapping laws."

Barry Steinhardt, associate director of the ACLU, said citizens shouldn't
trust that such a sweeping data tap will only be used against criminal
suspects. And even then, he said, the data mined by Carnivore, particularly
subject lines, is intrusive.

"Law enforcement should be prohibited from installing any device that allows
them to intercept communications from persons other than the target,"
Steinhardt said in an interview. "When conducting these kinds of
investigations, the information should be restricted to only addressing
information."

A representative for Rep. Charles T. Canady (R-Fla.), who heads the
Constitution subcommittee, said the congressman had no immediate comment on
the letter.

In testimony to Canady's subcommittee, Robert Corn-Revere, a lawyer at the
law firm of Hogan  Hartson here, said he represented an ISP that refused to
install the Carnivore system. He said the provider was placed in an "awkward
position" because the company feared suits from customers unhappy with the
government looking into all its email.

"It was acknowledged (by the government) that Carnivore would enable remote
access to the ISP's network and would be under the exclusive control of
government agents," Corn-Revere added.

He told the committee that current law is insufficient to deal with
Carnivore's potential and that the ISP lost its court battle partly because
telephone laws are stretched to cover the Internet.

Corn-Revere would not reveal the name of his client, which lost the case. He
said the FBI has been using Carnivore since early this year.

James X. Dempsey, senior staff counsel at the Center for Democracy and
Technology, said the main problem with Carnivore is its mystery.

"The FBI is placing a black box inside the computer network of an ISP,"
Dempsey said. "Not even the ISP knows exactly what that gizmo is doing."

But Dempsey said that ISPs contributed to the problem by saying current
technology does not allow them to sort out exactly what the government is
entitled to get under a search warrant. The carriers complained that they
had to give everything to the FBI.

"The service providers said they didn't know how to comply with court
orders," Dempsey said. "By taking that position, they have hurt themselves,
putting themselves into a box."

Marcus Thomas, who heads the FBI's Cyber Technology Section, told The Wall
Street Journal that the bureau has about 20 Carnivore systems, which are PCs
with proprietary software. He said Carnivore meets current wiretapping laws
but is designed to keep up with the Internet.

"This is just a specialized sniffer," Thomas told the Journal, which first
reported details about Carnivore.

Encrypted email, done with an email-encoding program such as PGP (Pretty
Good Privacy), still stays in code on Carnivore, and it's up to agents to
decode it.

Dempsey has a possible solution to the problem, though one that's probably
unlikely: Show everyone what it does and how it does it, allowing ISPs to
install the software themselves.

"The FBI should make this gizmo an open-source product," he said. "Then the
secret is gone."

Copyright © 2000 Associated Press. All rights reserved. This material may
not be published, broadcast, rewritten, or redistributed.

--
Everything on this earth has a purpose, and every disease an herb to
cure it, and every person a 

[CTRL] Privacy commissioner reveals government database

2000-05-17 Thread Kris Millegan

from:
http://www.canoe.ca/CNEWSTopNews/government_may16.html
Click Here: A HREF="http://www.canoe.ca/CNEWSTopNews/government_may16.html"G
overnment database tantamount to a citizen pro…/A
-
Privacy commissioner reveals government database
By NAHLAH AYED-- The Canadian Press

 OTTAWA (CP) -- There's a massive government database that tracks the lives
of ordinary Canadians -- a Big Brother that wasn't supposed to exist, the
federal privacy commissioner revealed Tuesday.

 Bruce Phillips sounded an alarm bell in his annual report to Parliament,
warning Canadians that the Human Resources Department database is "tantamount
to a citizen profile" and vulnerable to misuse.

 The "extraordinarily detailed database" holds a dossier on almost every
person in Canada with as many as 2,000 pieces of information about each
person's education, marital status, ethnic origin, mobility, disabilities,
income tax, employment and social assistance history.
Concerns raised by privacy commissioner
-- Existence of federal government computer database with as many as 2,000
pieces of information about each Canadian.

 -- Government should be cautious about releasing confidential data from 1906
and 1911 census records because it could diminish confidence in government
promises.

 -- An updated Privacy Act, which applies to the federal public sector, is
needed. The act hasn't been revised for 20 years and is not as rigorous as
the new bill that applies to the private sector.

 -- Commissioner disappointed the government rejected a recommendation from a
Commons committee to put in law who may use information from a person's
Social Insurance Number and for what purposes.

 -- Commissioner expressed concern numerous projects to collect, share and
use personal health information are proceeding without action on promises to
protect the privacy of patients.



 It's all in a single, permanent database that tracks Canadians from cradle
to grave.

 "Successive privacy commissioners have assured Canadians that there was no
single federal government file or profile about them," Phillips said in his
report.

 "We were wrong -- or not right enough for comfort."

 The information on 33.7 million people, dead and alive, is taken from income
tax returns, child tax benefits, immigration and welfare files, the National
Training Program, Canadian Job Strategy, employment services, employment
insurance, job records and the social insurance master file.

 The only government department which regularly gathers such comprehensive
information -- Statistics Canada -- operates under strict laws with penalties
for those who misuse information.

 There are no similar laws regulating the use of the Human Resources database
and that "poses significant risks to our privacy," said Phillips.

 The database is "always open to misuse or abuse unless there are legislated,
legal restraints on its use," he said in an interview.

 While the Privacy Act allows collecting personal information for research,
this database raises concerns because it's so comprehensive.

 If the information was divided up, there would be "lower risk of
indiscriminate collection, unrelated uses and improper disclosures," Phillips
said in the report.

 The department, which has been attacked for months in the Commons for
mismanaging grants, says it's not breaking the law and it relies on staff
professionalism to prevent misuse of the database, created in 1985 and
continually updated.

 "All the information is secure, it's encrypted," said Human Resources
Minister Jane Stewart. The data is used to ensure government programs are
working, she said.

 Phillips is recommending a fixed shelf-life for data, penalties for misuse,
strict control on collection and legislative changes to set out the research
mandate of the database.

 Pippa Lawson of the Public Interest Advocacy Centre is worried that personal
information could be sold.

 "History has shown governments can go off the rails," she said in an
interview.

 "There's a huge market out there for personal information, for marketing
purposes in particular. We've already seen municipal and provincial
governments selling databases."

 Earlier this year, reports indicated Ontario's Transportation Ministry sold
personal information to private companies.

 A research database could also "be retrieved in unforeseen ways -- by
disabilities or ethnic origin, for example -- to the detriment of individual
rights," said Phillips, who noted the information is never purged.

 "Without an end, the temptation is to subject everyone to unrelenting
information surveillance. This database needs limits."

 The database is virtually invisible, although it's on a government database
list and the Human Resources Web site.


Copyright © 2000, Canoe Limited Partnership. All rights reserved.

A HREF="http://www.ctrl.org/"www.ctrl.org/A
DECLARATION  DISCLAIMER
==
CTRL is a discussion  informational exchange list. Proselytizing propagandic
screeds are 

Re: [CTRL] Privacy

2000-02-05 Thread Theodor Parada, MD

-Caveat Lector-   A HREF="http://www.ctrl.org/"
/A -Cui Bono?-

Now this may seem paranoid, but all my encrypted email is being held
up or diverted by the server or other's. I've been monitoring this
and have sent blind cross copies of the entire PGP encrypted messages
and its been taking over 24 hours to receive them, if not longer.
I'd be interested in hearing if anyone else is having the same type
of problem.

A HREF="http://www.ctrl.org/"www.ctrl.org/A
DECLARATION  DISCLAIMER
==
CTRL is a discussion  informational exchange list. Proselytizing propagandic
screeds are not allowed. Substance—not soap-boxing!  These are sordid matters
and 'conspiracy theory'—with its many half-truths, misdirections and outright
frauds—is used politically by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/

To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om



[CTRL] PRIVACY Forum

1999-12-02 Thread Bill Kingsbury

 -Caveat Lector-

 From: PRIVACY Forum [EMAIL PROTECTED]
 To:   [EMAIL PROTECTED]
 Date: Tue, 30 Nov 1999
 Subj: PRIVACY Forum Digest V08 #17

 PRIVACY Forum Digest - Tuesday, 30 November 1999 - Vol 08, Issue 17

 (http://www.vortex.com/privacy/priv.08.17)

  Moderated by Lauren Weinstein ([EMAIL PROTECTED])
Vortex Technology, Woodland Hills, CA, U.S.A.
   http://www.vortex.com

 CONTENTS

  -- Animated Cursors Silently Collecting User Browsing Data
  (Lauren Weinstein; PRIVACY Forum Moderator)

  -- Big Brother Wants Your Medical Records (Dawn Richardson)

  -- Group formed to oppose supermarket "loyalty" cards
  (Katherine Albrecht)

 ---

 From: [EMAIL PROTECTED] (Lauren Weinstein; PRIVACY Forum Moderator)
 Date: Tue, 30 Nov 99 12:32 PST
 Subject: Animated Cursors Silently Collecting User Browsing Data


 Greetings.  The "Spies in Your Software" saga continues onward,
 as analysis of various software's network activities in various
 quarters continue to reveal new (but unfortunately not really
 unexpected) surprises.

 In the latest chapter, users of the popular Comet Systems' animated
 cursors (for Microsoft Windows systems) have learned that the
 cursors (reportedly in use by many millions of persons) have
 silently been feeding information concerning the sites they visit
 back to Comet for the firm's analysis and use.  Unlike the more
 common situations where Global Identifiers and related data are
 passed only to the particular server to which a user connects,
 in this case the information is being fed back to Comet itself,
 whenever the user visits any of the many 10's of 1000's of
 affiliated sites.  The vast array of sites involved include many
 oriented towards children, as well as popular comic-strip sites
 (such as "Dilbert" and others).

 I spoke at length today with Comet's marketing director, who
 defended their practices.  He contends that the information
 collected is "anonymous" since they do not collect names, e-mail
 addresses, or other personally-identifiable information, and that
 the information they do collect is maintained only in aggregate
 form for their paying clients, and is purged of other data before
 distribution to those clients.  He stated that he feels concerns
 about *possible* abuse of collected data in the future (say, after
 an acquisition, or other policy change) are purely theoretical and
 are not realistic.

 One of my main concerns is that it would not seem obvious to most
 users that an animated cursor should or would be sending *any*
 information back to a central point.  His reaction to my suggestion
 that the software clearly inform users that there would be
 information flowing back to Comet was fascinating.  He expressed
 the opinion that there was no need for this since the information
 was "anonymous"--and that since most people just "click through"
 license agreements anyway without reading them, there wasn't any
 point to bothering people with lots of stuff to read through before
 installation.  He also suggested that forcing vendors or sites to
 provide such information on a routine basis would create a "police
 state" (his exact words) environment.  He did however agree that
 the lack of regulation creates a situation where each company has
 to make these determinations on their own, and admitted that it
 would be a lot easier if it were clearly spelled out what they
 could or couldn't do.

 In response to the current furor, Comet has posted a new privacy
 policy, with links that appear on the main download pages for the
 cursors and at other points.  However, they have chosen not to
 provide information on those pages to clue people in to the fact
 that there is anything about the cursors which might relate
 specifically to privacy concerns, so how many people will choose to
 read the privacy links is unclear.  Also, depending on Javascript
 and browser security settings (*particularly* of concern with
 Microsoft Internet Explorer), it is possible that the cursors might
 be downloaded automatically without the user ever seeing the
 privacy link information.

 Comet has also posted instructions regarding removal of the cursors
 from your system.  The main information is at:

http://www.cometsystems.com/download/cleaner.shtml

 Microsoft IE users would need to take some additional steps
 detailed at:

http://download.cometsystems.com/no_nag/nonag.asp

 to avoid having sites continue to bug them about downloading the
 cursors. Unfortunately and ironically, you apparently must have
 cookies enabled to activate this latter function, so you may want
 to think twice before using it.

 The saga continues...

 --Lauren--
 [EMAIL PROTECTED]
 Lauren Weinstein
 Moderator, PRIVACY Forum - http://www.vortex.com
 Co-Founder, PFIR: People for Internet Responsibility -
 http://www.pfir.org
 Member, ACM 

[CTRL] Privacy advocates warn about Internet proposal

1999-10-13 Thread Joe Feck

 -Caveat Lector-

Privacy advocates warn about Internet proposal
Serial number of each PC would go with every parcel of data


By Ted Bridis
ASSOCIATED PRESS

October 12, 1999


WASHINGTON -- Engineers designing a new way to send information across the
Internet want to include a unique serial number from each personal computer
within every parcel of data, an idea that privacy advocates fear could lead
to tracing of senders' identities.

Critics warn that, if adopted, the move could strip away a measure of
anonymity and security enjoyed by tens of millions of home computer users who
dial into America Online Inc. and other Internet providers over traditional
telephone lines.

The issue also illustrates the danger of the unintended consequences from
arcane design decisions aimed at ensuring the Internet's stability into the
21st century.

The proposal by the Internet Engineering Task Force, an international
standards body, would include the serial number for each computer's network
connection hardware as part of its expanded new Internet protocol address.

These "IP" addresses, planted within e-mails and all other information
flowing across the Internet, must be unique to distinguish each computer on
the global network and to guide the billions of bits and bytes flowing among
them.

The task force's top engineers acknowledge some implications for online
privacy, but, "I think the privacy concerns are overrated," said Fred Baker,
the task force's chairman.

But some privacy experts said they were appalled that engineers would
consider the idea. The new address proposal, called "IPv6," would not become
widely used for years but ultimately would affect every Internet user.

Critics warned that commercial Internet sites, which already routinely record
IP addresses, could begin to correlate these embedded serial numbers against
a consumer's name, address and other personal details, from clothing size to
political affiliation.

The task force itself will ultimately decide whether to include the
identifying numbers in the new IP addresses. The timing on that decision is
unclear.

Baker said the task force is also envisioning ways to configure Internet
devices manually so addresses won't contain the sensitive numbers.

"Those folks concerned about the privacy issue could use this (alternate)
technique," said Thomas Narten, an IBM software engineer working with the
task force.

Most home computer users are assigned a different IP address each time they
connect to the Internet through a telephone line, which affords some extra
security and anonymity. It's akin to a person using a different phone number
every day to shield his identity and avoid prank phone calls.

But under the task force's proposal, a portion of even those somewhat
randomly assigned addresses could include the consumer's unique serial number
-- and that information would be stamped on every piece of information sent
from his computer.

"I'm just winding the tape forward here five years, when we all say, 'Oh, my
God!' " said Richard L. Smith of Brookline, Mass., a security expert who was
among the first to question the plan.

The danger worsens, critics warn, as Internet sites begin to share
information about their customers: A consumer visiting a Web site for the
first time could be identified by his computer's serial number that had been
recorded at another site.





Copyright 1999 Union-Tribune Publishing Co.

DECLARATION  DISCLAIMER
==
CTRL is a discussion and informational exchange list. Proselyzting propagandic
screeds are not allowed. Substance—not soapboxing!  These are sordid matters
and 'conspiracy theory', with its many half-truths, misdirections and outright
frauds is used politically  by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credeence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/

To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om



[CTRL] Privacy Flaky - Stop Tests

1999-09-24 Thread Ric Carter

 -Caveat Lector-

http://news.excite.com/news/r/990924/15/news-health-research

Colorado Medical Research Center Told To Halt Tests

Updated 3:13 PM ET September 24, 1999

DENVER (Reuters) - The government, concerned about how records and data are
kept, has ordered Colorado's top medical research university to stop its
federally funded clinical tests, putting a halt to thousands of studies on
everything from weight loss to diabetes prevention, university officials
said Friday.

The University of Colorado Health Sciences Center, one of the largest
medical research recipients in the United States, said audits by the U.S.
Food and Drug Administration found problems in bookkeeping, reporting and
database practices that did not meet federal standards.

It said the issues were not related to patient safety. The health sciences
center receives about $100 million a year in research funding and has about
3,200 ongoing research studies.

The university said changes were implemented after an audit, but not to the
FDA's satisfaction.

"The university is cooperating fully in resolving these concerns," said
James Shore, chancellor of the University of Colorado Health Sciences
Center.

The university said the FDA placed the restrictions on the activities of the
Colorado Multiple Institutional Review Board, which is responsible for
reviewing and approving protocols and maintaining detailed records.

On Sept. 21 the FDA ordered the health sciences center to suspend enrollment
of new patients into research using drugs or devices regulated by the FDA.

The next day the restrictions were broadened to not enrolling new patients
into studies funded by the federal government.

Thursday the federal government's Office of Protection from Research Risk
(OPRR) suggested suspending all studies until the matter is cleared up.

The research group then decided to halt all clinical studies, even ones
funded by pharmaceutical companies.

DECLARATION  DISCLAIMER
==
CTRL is a discussion and informational exchange list. Proselyzting propagandic
screeds are not allowed. Substance—not soapboxing!  These are sordid matters
and 'conspiracy theory', with its many half-truths, misdirections and outright
frauds is used politically  by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credeence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/

To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om



[CTRL] Privacy is Not Doomed

1999-09-10 Thread Tatman, Robert

 -Caveat Lector-

http://www.techreview.com/articles/oct99/dertouzos.htm
Michael Dertouzos * The People's Computer
Privacy is Not Doomed
I almost fell out of my chair when the politicians asked the technologists
to solve the privacy issue!
The china at the electronic-spy agency's dining room was exquisite, as was
the meal. Ron Rivest, inventor of the RSA approach to public cryptography,
and I were having lunch with the National Security Agency's director, Bobby
Inman. We were trying to impress on him that the forthcoming growth of the
Information Marketplace would create severe privacy problems and the agency
should extend the role of cryptography from ensuring secure communications
within the U.S. government (and breakable ones outside it) to protecting the
privacy of U.S. citizens and organizations, with approaches like RSA. The
admiral didn't believe us-our claims of a widely interconnected civilian
world in the '90s sounded like pie in the sky. Twenty-five years later, in
April 1999, at the other extreme, The Economist proclaimed on its cover "The
End of Privacy."
Under-reaction then! Over-reaction now!
No doubt, the technologies of information can be used to attack our privacy.
But they can also be used to protect it. For example, if we agreed that
everyone using the Internet did so under the RSA regime of creating and
using their own public and private keys, we would end up with secure
communications and files and the ability to digitally sign contracts and
checks as effectively as we do now by hand. This high level of personal
privacy would, however, preclude governments from legally tapping a
suspect's private data and would also prevent anonymity-thereby angering
Right and Left simultaneously. If we don't like this outcome, we have
technologies on hand to establish nearly any desired blend of personal
privacy, anonymity and governmental intervention.
Such cryptographic approaches would not stop companies with which you do
business from selling personal data you give them, corrupting it, or
tracking Web sites you frequent. Not to worry. There is technology around to
handle these problems, as well: A scheme called P3P, developed by the World
Wide Web Consortium, places software within your browser and in the Web
sites of vendors. In a P3P personal profile, which you write once, you
specify the personal information you are willing to give away along with
what others are allowed to do with it. A similar script in the vendor's
software identifies the personal information the vendor requires and its
planned disposition. These two pieces of software "shake hands" prior to
every business transaction and allow it to proceed only if both privacy
declarations are satisfied. In a variation of this scheme, governments can
introduce absolute privacy policies, by requiring, for example, a minimal
level of privacy in the P3P profile of every citizen.
These examples accurately suggest that we have enough technology around to
provide nearly any level of privacy we want. But what do we want? In the
United States, consumers have become accustomed to treating privacy as a
tradable commodity-we don't mind giving some of it away to get the goods and
services we desire. Vendors are pushing for this approach because they are
moving away from mass marketing to one-on-one selling, and are therefore
anxious to build intimate knowledge of individual interests and habits.
To most non-Americans, however, privacy is not a tradable commodity but an
inalienable right that must be guaranteed and protected, especially in the
case of minors. The European Union, flexing its muscle, recently threatened
to forbid its citizenry from doing electronic commerce with organizations
(read U.S.) that do not meet a minimal threshold of absolute privacy
guarantees. They have since backed down and gone to committee, as they and
their American partners search for common ground. Last February at the World
Economic Forum in Davos, Switzerland, a few industrialists tried to
establish a voluntary code under which vendors would give you, upon request,
all personal information they have on you, explain what they plan to do with
it, and correct it if asked. Adoption of this code seemed a small and
achievable step, but it failed to pass. The American vendors saw it as an
expensive and difficult proposition to implement, and a potential leak of
their marketing approaches to adversaries.
Clearly, we disagree about the kind of privacy we want. And we don't seem
serious enough about reaching agreement-at that same meeting in Davos, I
almost fell out of my chair when several world leaders asked the
technologists present to "go figure out a solution to the privacy problems
you brought upon us!" This abrogation of what should be a central
responsibility of politicians and legislators must stop.
Let's not surrender our privacy to the big lie of technological
inevitability. Let us, instead, augment the debates of privacy specialists,
with a far broader discussion 

[CTRL] Privacy?

1999-08-01 Thread Alamaine Ratliff

 -Caveat Lector-

 Here Comes The Beast! Clinton OKs massive attack on privacy


 (Source: New York, NYT-07-27-99 2104EDT)

 No. 128,  2 - 8 August 1999

 If you thought "Know your customer" was dead, wait until you read
 the following article. The Federal Government, with William
 Jefferson Blythe "I Did Not Have Sex With THAT Woman!" Clinton
 wants to access your bank accounts, corporate networks, and
 gather information that it has no business knowing. And all in
 the interests of "national security."

 The plan was created in response to a presidential directive in
 May 1998 requiring the executive branch to review the
 vulnerabilities of the federal government's computer systems in
 order to become a "model of information and security.'' In a
 cover letter to the draft plan Clinton writes, "A concerted
 attack on the computers of any one of our key economic sectors or
 governmental agencies could have catastrophic effects.'' But the
 plan strikes at the heart of a growing controversy over how to
 protect the nation's computer systems while also protecting civil
 liberties — particularly since it would put a new and powerful
 tool into the hands of the FBI.

 Increasingly, data flowing over the Internet is becoming a vital
 tool for law enforcement, and civil liberties experts said law
 enforcement agencies would be under great temptation to expand
 the use of the information in pursuit of suspected criminals.
 "The report clearly recognizes the civil liberties
 implications,'' said James X. Dempsey, staff counsel for the
 Center for Democracy and Technology, a Washington civil liberties
 group, "But it brushes them away.'' (Read that: ignores civil
 liberties) The draft plan states:

 "As access to relevant networks is premised on 'consent' of the
 user to allow session monitoring, the collection of certain data
 identified as anomalous activity or a suspicious event would not
 be considered a privacy issue.''

 Dempsey conceded the legal validity of the point, but said there
 was tremendous potential for abuse. "My main concern is that
 Fidnet is an ill-defined monitoring system of potentially broad
 sweep,'' he said. "It seems to place monitoring and surveillance
 at the center of the government's response to a problem that is
 not well suited to such measures.''

 The federal government is making a concerted effort to insure
 that civil liberties and privacy rights are not violated by the
 plan, Hunker said. He said that data gathered from non-government
 computer networks will be collected separately from the
 FBI-controlled monitoring system at a separate location within a
 General Services Administration building. He said that was done
 to keep non-government data at arm's length from law enforcement.


 The plan also has drawn concern from civil libertarians because
 it blends civilian and military functions in protecting the
 nation's computer networks. The report notes that there is
 already a Department of Defense "contingent'' working at the
 FBI's infrastructure protection center to integrate intelligence,
 counterintelligence and law enforcement efforts in protecting
 Pentagon computers.

 "The fight over this could make the fight over encryption look
 like nothing,'' said Mary Culnan, an professor at Georgetown
 University who served on a presidential commission whose work led
 to the May 1998 directive on infrastructure protection. "The
 conceptual problem is that there are people running this program
 who don't understand how citizens feel about privacy in
 cyberspace.''

 The government has been discussing the proposal widely with a
 number of industry security committees and associations in recent
 months. Several industry executives said there is still
 reluctance on the part of industry to directly share information
 on computer intrusions with law enforcement. "They want to
 control the decision-making process,'' said Mark Rasch, vice
 president and general counsel of Global Integrity, a company in
 Reston, Va., that coordinates computer security for the financial
 services industries.

 One potential problem in carrying out the government's plan is
 that intrusion-detection software technology is still immature,
 industry executives said. "The commercial intrusion detection
 systems are not ready for prime time,'' said Peter Neumann, a
 computer scientist at SRI International in Menlo Park, Calif.,
 and a pioneer in the field of intrusion detection systems.

 Current systems tend to generate false alarms and thus require
 many skilled operators. But a significant portion of the $1.4
 billion the Clinton administration has requested for computer
 security for fiscal year 2000 is intended to be spent on
 research, and government officials said they were hopeful that
 the planned effort would be able to rely on automated detection
 technologies and on artificial intelligence capabilities.

 For several years computer security specialists have used
 software variously known as 

[CTRL] PRIVACY IN THE INFORMATION AGE

1999-05-19 Thread Carl Amedio

 -Caveat Lector-

PRIVACY IN THE INFORMATION AGE

The right of privacy has been a major distinction between
democracies and dictatorships.  But those who hold privacy in
high regard have seen their rights slowly eroded for decades --
and now the process could swiftly accelerate in the era of high
tech.

   o   A single company -- Acxiom Corp. in Conway, Ark. -- has a
   database combining public and consumer information that
   covers 95 percent of American households.

   o   A 1997 survey of 900 large companies by the American
   Management Association found that nearly two-thirds
   admitted to some form of electronic surveillance of their
   employees.

   o   Intelligence agencies from America, Canada, Britain,
   Australia and New Zealand jointly monitor all
   international satellite-telecommunications traffic via a
   system called "Echelon" which can pick specific words or
   phrases from hundreds of thousands of messages.

   o   Tiny microphones can record whispered conversations across
   the street or monitor them via the normally imperceptible
   vibrations of window glass.

Among the dangers lurks the occasional benefit.  In a few years'
time, supermarkets could check the contents of customers'
refrigerators -- compiling a shopping list as they run out of
edibles.

Is privacy a thing of the past?  Legal experts reply that while
privacy statutes exist in the U.S. and other countries, courts
have found it almost impossible to pin down a precise legal
definition of it and privacy lawsuits hardly ever succeed.

The answer may be to rely on market solutions.  Already some
companies are developing devices to thwart snoops -- such as
firms that forward e-mail stripped of any identifying
information.

Source: "The Surveillance Society," Economist, May 1, 1999.

For more on Business Issues
http://www.ncpa.org/pd/law/mcc/index4a.html

DECLARATION  DISCLAIMER
==
CTRL is a discussion and informational exchange list. Proselyzting propagandic
screeds are not allowed. Substance—not soapboxing!  These are sordid matters
and 'conspiracy theory', with its many half-truths, misdirections and outright
frauds is used politically  by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credeence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/

To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om



[CTRL] Privacy Hack on Pentium III

1999-02-23 Thread Bill Kingsbury

 -Caveat Lector-

 Privacy Hack on Pentium III

 by Leander Kahney

 A German computer magazine claims to have found a way to
 hack the controversial serial number in the forthcoming
 Pentium III chip.

 Computer Technology, or c't, says that contrary to Intel's
 claims, the identifying Processor serial number in the
 Pentium III can be secretly turned on and off without the
 user's knowledge by a small software program.

 Intel included the number in the chip to provide a secure
 identifier for e-commerce and help system administrators
 keep track of large networks.

 Read the whole story at:

 http://www.wired.com/news/news/technology/story/18078.html

DECLARATION  DISCLAIMER
==
CTRL is a discussion and informational exchange list. Proselyzting propagandic
screeds are not allowed. Substance—not soapboxing!  These are sordid matters
and 'conspiracy theory', with its many half-truths, misdirections and outright
frauds is used politically  by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credeence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.

Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/

To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om