The big brother


Shot cuts
2.

3.

4.

5.

6.

7.

8.
  The FBI maintains fingerprint records and computer files on more than 50 million American adults.Proposals now call for DNA genetic indentification.Each cell in your body contains DNA genetic identification.Each cell in your body contains DNA that is absolutely unique to your body.It is the most accurate identification system to date.Current proposals call for the automatic DNA testing of all soldiers and prisoners.A universal DNA system would provide a future dictator with the technology to find anyone who resisted their plans.Government agencies worldwide possess sophisticated surveillance equipment that can record your phone conversations without directly tapping into your phone.The NSA and it's sister agencies in other western countries now monitor every single phone call,fax,and e-mail in the world.Even secret coded transmissions of foreign governments are routinely monitored by American Intelligence.These signals are downloaded to a group of Cray IV(Super Computers) that completes an instantaneous word analysis.The "Dictionary"  computer program listens for specific words from a list of three hundred selected key words.These words:may include,assassinate,coke,drugs,nuclear or any of several key words the computer would select a call for human monitoring.

The FBI recently appealed to phone companies to alter their new optical cable system that will carry thousands of
phone calls on a tiny fiber the size of a human hair.The FBI was concerned that new advanced technology might
interfere with their existing ability to easily monitor everyone's phone call.Currently,negotiations are underway
to insure that the FBI and other intelligence agencies will still be able to listen in on your phone calls at will.

Computer records around the world contain a staggering amount of information on every public citizen.In 1990 the US
General Accounting Office discovered that 910 major computer databases contained billions of files on private citizens.The FBI,CIA,NSA possess sophisticated technology capable of secretly accessing any of this data without
a trace.A high speed computer program can quickly search various possible combinations,or a hacker may simply
guess the password and access the most sophisticated computer network.It would amaze you to know how easy it is for a computer professional to access your files holding the most intimate details of your life.

In July,1993,MacWorld magazine investigated the privacy of your computer records.Two workers,from their home computers with a telephone modem accessing legal public databases,input the names and addresses of their subjects.Seventy-five minutes later later they were able retrieve their subjects birth date,social security number,home address,driver records,marriage records,real estate owned,civil court filings,vehicle owned,loans,etc.

Obviously a private investigator or government agency,with greater expertise could access allot more.The buying
and selling of information is now a huge business.The fact is that your privacy no longer exists for anyone in the Western world anymore.The International Police Organization provides a massive police computerized information
network connecting over 158 national police forces throughout the world to track down drug dealers and terrorists.

The devastating drug epidemic continues to ravage the citizens and famlies of our country.However,the greatest
cost of the war on drugs are own loss of liberties and freedom to the growing demands for police totalitarian
methods to fight the drug war.In pursuit of drug dealers our legislators have passed laws that seriously erode
the basic liberties our country was founded upon.The U.S. Surpreme Court ruled in 1990 that police can arbitrarily
 stop cars without a search warrant at roadblocks without cause to search for possible drugs or drunk drivers.Wide
ranging search warrants and intrusive wire tapping are increasingly common as the drug war escalates.

The United States Bill of Rights promises that the citizen will be protected against arbitrary intrusion from government agencies.The U.S. Constitution states:"The right of the people to be secure in their persons,houses,
papers,and effects,against unreasonable searches and seizures shall not be violated."

While honest citizens applaud the efforts to catch drug dealers,they themselves are in danger of losing their civil liberties and freedom that we all cherish and which this great nation was founded upon.

I myself,a hacker or a crooked police agency could post a photo, in lets say a child pornography net newsgroup,mask the <message I.D.> and put your e-mail address on it to make it look like YOU posted it! Then the police can come crashing into your house,arrest you,and throw you in jail,confiscate your property.In today's society,it is true that YOUR GUILTY UNTIL PROVEN INNOCENT.It will go on your record,plus the expensive cost of defending yourself.The State has all the resources it needs at the tax payers expense where the accused must rely on his own financial resources to defend himself.

What astounds me that hackers have recently hacked into the CIA and the Department of Justice Web Sites.In 1998 a teenager was able to hack into the Pentagon.Now the government wants to increase their capabilities to spy on citizens but can't even protect their own systems.This should scare every American as the dawn of Big Brother is here to stay!

American Online who works with the police on the tracking of people who send child pornography online are they
themselves the biggest source in the world for such perverted actions.Go to any AOL member chat room and 90%
of the activity include the trading/sending of pornography,cyber-sex,phone sex.Over 90% of the spam e-mail I get on my AOL account are e-mails dealing with porn sites,scams,swapping/sending pornography.AOL claims they are
trying to stop this activity but spammers know that most AOL members are new to the Internet and are easy targets
for such illegal activity.

I feel police agencies who confiscate your property on such raids,have your property sold in which it goes into their pockets,which I feel, will motivate them more to pursue these activities and increase such activities as described above.  

Up

NSA Reads Europes E-Mail/Phone/Fax and Big Brother is Watching You Too! Codename ECHELON

The National Security Agency world wide surveillance of e-mail,fax,phone and other communications have outraged the European Parliment.NSA's global surveillance agency,codenamed Echelon reads and monitors communications worldwide.The European Parliament has been in an uproar since the release of a report named AN APPRAISAL OF  TECHNOLOGY OF POLITICAL CONTROL.Europe intends to investigate this and reveal to the public that will redden faces throughout the US Intelligence Community.The NSA is equipped with powerful artificial intelligence capabilities  .Echelon intercepts electronic messages and extracts certain keywords ranging from nuclear to assassination using selected keyword searches.Within Europe as well as The United States,all e-mail,telephone,and fax transmissions are routinely monitored and intercepted by the NSA Echelon technology.Virtually every nation in the world is in the grasp of this Big Brother monitoring.The Norwegians have called for an inquiry as well as the Dutch,Italian,and British.

Up 

Camera Survellence By Big Brother

Now local authorities through out the world have installed tiny camera's on lampposts,rooftops,telephone poles,and street signs to survey citizens movements,traffic violations, moving left to right observing every thing in sight.These cameras report their public observations directly to the police and government spy agencies.The cameras report to these agencies,where security officers and government  agents scan for infractions against public order-or perhaps against a established way of free thought and speech which they deem harmful to society or national security.

The cameras are here with Big Brother watching your every movement and hearing your voice and scanning your mail and your computer.The trend began in Britain a decade ago,in a town called King's Lynn, where sixty remote controlled cameras were installed to scan known "trouble spots" reporting directly to the police department.The resulted decrease in crime exceeded the police's expectations;in or near the zones crime dropped to 1/7 of its formal rate and the cameras paid for themselves in a few months due to the savings in patrol cost.Today over 300,000 of these surveillance cameras are in place in Britain transmitting 24 hours a day to authorites.Polls report that citizens support these new devices but they are not aware they will in fact come back to invade their pirvacy.British civil libertarian John Wadham and others have denounced this type of snoop technology,claiming,"It could used be for other purposes and of course be abused."

In the United States the City of Baltimore put police cameras to work scanning all 106 downtown intersections.In 1997
New York City began its own program to set up 24 hour surveillance devices in Central Park alone,plus subways and
other public places.As in Baltimore and New York City,the ultimate question and fear is who will ultimately control these devices?AGEMA Systems of Syracuse New York has sold many police departments imaging devices that can peer into houses from the street,discriminating the heat given off by indoor marijuana growers and the heat of persons moving within their own homes.In 1995,Admiral William A. Owens,then vice chairman of The Joint Chiefs of Staff,described a sensor system: a pilot less drone,equipped to provide air born surveillance to soldiers on the fields that can fit into the palm of your hand.As with the streetlight surveillance cameras and the choices we make regarding future information networks-how will they be controlled and who will control them?These decisions will shape the future of our children and generations to come,if we make it that far.

Could any person order up a search program,using sophisticated pattern recognition software to scan a throng of citizens and zero in a specific individual? If a system were implanted through out the world it is true allot of fugitives would be caught and brought to justice,but in the same since every law abiding citizens freedom of privacy and anonymity will be lost forever.When our forefather Thomas Jefferson prescribed a revolution every few decades,he was speaking not only politically but also about the constant need to remain flexible and to adapt to changing times,to innovate as needed,but at the same time keep those freedoms,privacy,and Amendment Rights we hold and cherish so dearly today.The Freedom of Information Act (FOIA) which was passed so that citizens may inquire what records,the government has on individuals has some authorities dragging their feet and acting with hostility when a person requires such information.Authorities may feel its it cites national security,and sometime use noncompliance to the FOIA Act to justify their resistance in handing out information when a citizen requests it.

The same pattern can be seen in the local work place where managers can monitor and spy on their employees,tracking every keystroke,timing each phone call,reading their employees e-mail and even monitor the time they use going to the restroom.Managers justify these measures as improving employee productivity but others plainly see it has a violation of basic human rights and privacy.In the future the good news will be that 100% of all crimes may or will be solved,but the bad news is 100% of the population are criminals themselves in one form or another including the police themselves who do the monitoring.

More than 1,500 employees of the U.S. Internal Revenue Service have been investigated since 1989 for using
government computers to snoop through tax returns of freinds,enemies,their neighbors ,celebrities and so on without
permission.President Clinton signed the Taxpayers Browsing Act,threatening up to a year in jail for anyone convicted of the abuse of such informarion.The government is helping to develop new data-bases aimed at
helping states enforce their own laws-to find parents who depart and abandon child support payments,to catch fugitives from the law,checking on the backgrounds of gun purchases under the Brady Law,to track sexual
predators or convicted child molesters and so on.These are all good acts,but certain federal workers,who are corrupt as the criminals they are tracking down,will also use it to watch your every movement.J.Edger Hoover,head of the FBI for decades was notorious at using information to blackmail citizens,and even presidents themselves as he had access to all data-bases on individuals.The J.Edger Hoover's of the government are alive and well today.

Thomas Jefferson's original draft of the Declaration of Independence used the phrase,"life,liberty and property." Under the influence of Ben Franklin it was changed to"life,liberty,and the pursuit of happiness."Why the change?Among other reasons it may have been there was no consensus among the founders that property should be enshrined as a fundamental right.To be sure,most of them were property owners themselves.But,the Fourth Amendment was signed into the Constitution:The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

The debate between freedom of speech and censorship continues today in conflicts over public policy issues exemplified by the Communications Decency ACT (CDA).Passed in 1996 by the Republican dominated congress and signed by President Clinton,this legislation established criminal penalties for posting indecent material over the Internet in which ways children might access it.When the CDA was argued before the United States Supreme Court,one aspect in dispute was whether Internet based carriers such as America Online should be viewed as common carriers of,which are not responsible for content,or whether their role is more that of a publisher answerable if some client uses AOL services to send porn or spam through their service to pander or commit libel.I myself have a AOL account and 90% of the e-mail I receive has porn related sites,scams and other obscene material.Before the Supreme Court rendered its decision on the CDA,Deputy Solicitor General Seth Waxman held that adults may access any kind of material they wish,even if offensive to others.Attorney Bruce Bruce Ennis conceded that parents should install supervisory software that prohibits minors from accessing adult sights.The Supreme Court,in 1997,threw out the CDA,basically agreeing with federal appeals court Judge Dalzell who stated,"The Internet may fairly regarded as a never-ending world wide conversation.The Government may not,through the CDA,interrupt that conversation.The Internet deserves the highest protection from government intrusion."

Up

Big Brother's One World Money

"Numbers can be a better form of cash than paper." said David Chaum of the DigiCash Corporation, who defined ecash as the digital equivalent of cash.You can withdraw digital coins from your Internet bank account and store them on your hard disk.Former Citibank chairman Walter Wriston shares the same vision but moves his idea to a higher plain,the debit card or smart cards.Wriston said in late 1996,referring to chip bearing cards that would contain a persons account information and handle secure transactions for its owner instantly.A form of secrecy and encryption will be essential for the near future One World Money System.A system that will track everything you buy and will be open to prying eyes of government agencies,or sophisticated hackers with the expertise to crack any code.Powerful types of encrypted passwords called digital signatures must be developed that correctly identify the identities of those involved.In other words, its far to early to be sure any secure encryption can be created and work as planned,but the NEW WORLD MONEY is coming non the less.The Utah Digital Signature Act of 1996 states there is a legal presumption that the person who uses a particular digital signature is the owner,regardless if the owner's password was stolen or acquired by the individual agencies who keep track of such electronic information.It has long been believed by the IRS and our own
government that if every citizen were honest by paying their tax owed,our national debt would disappear in one year.
I find this a fairy tale and just a further excuse for agencies to monitor their citizens on what they buy,make,and spend
and invade our privacy

Up

FBI Want's More Intrusion Into Your Privacy

FBI director-designate Louis Freech described how his agency perceived a looming danger and predicted,"The country will be unable to protect itself against terroism,violent crime,drug lords,and other criminal dangers."Freech conceded that the old fashion analog telephone,carried on easily tapped copper wires, is rapidly coming to an end.As ever more telephone and data traffic goes digital, especially via fiber optics and multi-branched switching systems,the technology of disguising communications under a static haze of encryption has Freech and the FBI worried.In the government's view,technology promises to change the rules of daily life,making electronic privacy so secure that even the FBI won't be able to eavesdrop on suspected criminals or even honest citizens."The Clinton administration stated it was not trying to prevent private or commercial encryption,but instead propose a standard of coding technology that would still let the FBI meet the needs of the Justice Department.Armed with a court order,the FBI might retrieve the encryption codes to a given scrambler to eavesdrop on suspected criminals in life or death situations.This is how all laws begin,but eventually the FBI down the road will use the old " probable cause " to invade citizens privacy.A computational plan,like any other,looks great on paper,yet be in fact be riddled with hidden flaws that will only be exposed after assaults by relentless police agencies proving that Big Brother has fooled the people,and again trampled upon their privacy and numerous Amendment and Civil Rights violations that are vanishing day by day,which we all cherish so much, and which our great nation was founded upon.Early in the Cold War,faced with with dire competition from a ruthless communist Russia,the United States rang with calls to clamp down in the name of national security-to restrict press coverage,conceal the defense budget,restrict citizen's movements,intern dissidents,and take on a policy of "Better Safe Than Sorry." To the surprise of many,one of the fiercest cold warriors,physicist and H-Bomb convertor Edward Teller,help lead a persuasive campaign against this strategy of safety through obscurity.Americans are learning all to many blunders and betrayals in secret during the cold war by U.S. officials,from deceptive nuclear testing and careless disposal of nuclear waste,the Watergate scandal,President Kennedy's assanination,The Bay of Pigs fiasco to even the illnesses suffered by soldiers during the Iraq war.As we have seen,such concealed schemes are natural products of human ego when drunk with the position of power.The Justice Departmentwants to be able to determine the location of a cell phone caller within a 1/2 second and determine whether the user has sent or received voice mail or made conference calls and other electronic transmissions.All these capabilities are available and some have already been used in Switerland.The deputy director in charge of the FBI's New York City office said,"The privacy people say we shouldn't have this information,but the notion that we in law enforcement should be able to take advantage of this technology is a crazy notion.".

The bottom line is that Big Brother has infiltrated our privacy and want's to monitor every individuals privacy.Yes,its true that that they capture many criminals,but in the same process,they have the capabilities to monitor your every movement.The selling of individual information is now a huge business.But who will monitor the monitors?Im not anti-government but Im against officials hiding behind their badges,authority to engage in criminal activity themselves.The box of pandora has been opened and the eventual outcome will be the marking and monitoring of everyone on earth,just as prophesied in Revelation.The War of Armageddon is in the making and there is no turning back.  

Up

Big Brother Satellite Goes Down

When PanAmSat's Galaxy IV satellite when down on May 19,1998 by rotating out of posistion,it caused chaos in American business that most Americans didn't even realize the impact of one satellite's dysfunction; could have on their daily lives and business.At least eight of the ten biggest paging companies relied on the Galaxy IV transmissions to supply their service.Hospitals,police departments,gas stations,stores and other companies services were disrupted.Drivers at Chevron's 5,400 gas stations had to rely on cash or go inside the station to pay by credit cards.How could the repositioning of one satellite do so much damage is because only a few choice satellites currently provide service for North America and maintaining a permanent back up system would be financially expensive.In essence,they have all their eggs in one basket.Above the earth,only eight out of some 200 commercial satellites in orbit are the CHOICE satellites that provide the transmissions of data that American business rely on.The fallout was particularly hard for the nation's broadcasters.Galaxy IV is the primary satellite for used by CBS,UPN,and WB television and radio network communications.The woes of Galaxy IV could be just a forerunner of things to come.Space scientists are warning that the world's satellite system face a double threat of cosmic showers between now and the year 2001:A meteor shower that peaks every 33 years,and the peak of the Sun's 11 year activity cycle.First there is the threat of the Leonid meteor shower.Last years Leonid showers,which come about the same time each year as Earth orbits the sun,did some minor damage to some spacecraft that orbit our earth.At least one global satellite sustained a number of hits from grain size particles.The Leonid showers,which also be heavy in November 1999,are probably the biggest threat to orbiting satellites that we have seen in many years.Some sun scientists say they think our sun is due for an unusual hot peak,with a greater than normal number of days in which the sun sends waves of radiation and charged particles,which can can damage satellites in several ways.Also,the year 2000 problem looms even a bigger scenario as satellites must communicate with computers on earth to transmit electronic transmissions of data.

Up

Hack~Attack

The Pentagon,which sends at least of its 85% of communications over commercial telephone lines,is vunerable,as are most government agencies and private business interprises.About a dozen nations have information-warfare program software including,Libya,Iraq,Iran,and of course,The United States.Foreign intelligence services routinely break into American public and government computers,mapping their power-grids to find weak links or back doors to access information.Intrusions into government computers are detected only 10% of the time.The Pentagon is hacked into 250,000 times a year;some 500 of these intrusions are deemed serious.It easy to MASK the true identify of the hackers whom are seeking information on our government or even YOU! Most hackers are just teenagers or nerds"which should scare you more" playing a cat and mouse game.Hacker groups routinely hold competitions to see who can hack into the most secret systems.NASA is a favorite target.A German hacker club called CHAOS offered a $25,000 bounty to anyone who could tap into mission control systems.The truth is,when teenagers can access our national security systems,how much does a more expertise hacker accessed?Whether it be the government or YOUR personnal files.

Up 

You Have to Keep Big Brother in Line

MSNBC Washington spokesman Brock Meeks stated;"When it comes to making policy decisions about cyberspace,
The United States Congress makes confessed unabomber Ted Kazynski look like the poster boy for Mental Health
Week." in his article of the July,98 issue of Internet Computing."They pass a law trying to regulate content on the Internet-the so called Communications Decency Act-only to see the Supreme Court strike it down as unconstitutional.
And like a dog returning to it's own vomit,they resurrect a similar bill,this time vowing it will pass with constitutional
muster" Brock writes:There is no better example than the current attempt to pass legislation banning Internet gambling under The Internet Gaming Prohibition Act.(S. 474,H.R. 2380).The bill makes it a crime to post odds online or tips on how to,"beat the book".Information,in it's rawest forms,is outlawed.The Internet gambling ban is unenforceable on it's face.It all comes down to education.If you want government to keep their hands off your business,you have to get involved.Make NOISE.Get to Washington and let your members of Congress see your face,and do it on a regular basis.

Laura DiDio in Computer World June 8 ,1998 magazine writes about how privacy advocates and law enforcement will go head-to-head over the export of encryption technology.Senators Patrick Leahy and John Ashcroft hope their E-Privacy Act Bill will pass and will present it before the current session of Congress ends in August,1998.The current limit for encryption products are 56-bit keys and the new Bill proposed would allow selling any products of any strenght including 128 and 256 bit keys. At heart of the debate is FBI Director Louis Freeh.The government fears if it can't decode any state-of-the-art cryptography,that terrorists would benifit.But U.S. businesses and privacy groups contend that giving the government the keys to access everything jeapordizes the privacy of every citizen and business.Ed Gillespie,executive director of the ACP,said the standard limit the government wants to impose, 40-bit key-is easily hacked by even teenagers.Gillespie added that the future of electronic commerce relies on industry and citizens feeling safe that their records,tax returns,and medical information won't be accessed by the government or by hackers.

Up