cypherpunks-legacy
Threads by month
- ----- 2025 -----
- January
- ----- 2024 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2023 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2022 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2021 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2020 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2019 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2018 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2017 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2016 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2015 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2014 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2013 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2012 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2011 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2010 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2009 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2008 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2007 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2006 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2005 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2004 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2003 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2002 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2001 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 2000 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1999 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1998 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1997 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1996 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1995 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1994 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1993 -----
- December
- November
- October
- September
- August
- July
- June
- May
- April
- March
- February
- January
- ----- 1992 -----
- December
- November
- October
- September
December 2003
- 8635 participants
- 56359 discussions
From: believer(a)telepath.com
Subject: IP: New Surveillance Face Mapping System
Date: Tue, 06 Oct 1998 08:54:09 -0500
To: believer(a)telepath.com
Source: The London Independent
U.K. Section
http://www.independent.co.uk/
New spy system to 'map' suspects
By Jason Bennetto, Crimes Correspondent
A REVOLUTIONARY surveillance system that
allows the police to automatically identify the
faces of wanted criminals and suspects in seconds
is to be tested on the streets of Britain for the first
time.
The "facial mapping" computer will be used to
catch muggers, burglars and shoplifters, but it is
expected to be extended to target other cases
including wanted killers, terrorists and missing
children. The Football Association is also
interested in using the technology to help pick out
known hooligans at matches.
The system, known as Mandrake, is to be tested
by Scotland Yard and Newham borough council
in a six-month trial in east London, starting next
week.
A computer data base of faces of offenders will
be compared with film taken by local authority
surveillance cameras in shopping centres, streets
and housing estates. The computer automatically
"matches" the faces of suspects and triggers an
alarm, warning the operator who then contacts
the police.
More than 1,000 images can be examined per
second. It automatically ignores beards and
moustaches so offenders cannot hide under
disguises.
Photo-fit images can also be included on the data
base but tests show they are less accurate than
photographs.
The system was criticised yesterday by the civil
rights organisation Liberty, which said it could fall
foul of human rights and data protection
legislation.
However the developers of Mandrake, the police
and local councils, believe the system could
revolutionise CCTV and, if it proves successful, is
likely to be used nation-wide.
Facial recognition systems are already used in
Texas to stop sham marriages and on the
Mexican border to prevent illegal immigration.
Under the trial, Scotland Yard is providing
dozens of photographs of wanted offenders, often
taken by surveillance cameras in shops and
banks. It will also supply pictures of convicted
criminals, mostly for offences such as street
robbery, burglary, and repeat shoplifting.
The images will be placed on the computer which
measures dozens of key facial characteristics,
such as the eye shape and size. The computer
then scans all the faces picked out on CCTV and
will sound an alarm if it makes a match.
The picture of suspect and the person they
supposedly resemble then automatically appear
on the CCTV operator's screen along with a
secret code number. The police are then sent the
pictures and the number via computer.
The product, which has been developed by
Software and Systems International in Slough,
west of London, can be used to catch criminals
on the run or missing persons. More
controversially, it can also be used to track
suspects who the police believe may commit
offences.
In future the police, customs, and immigration
officers could use it at ports to identify known
terrorists, smugglers and other criminals
attempting to enter the country.
A Scotland Yard spokesman said the system had
an 80 per cent "hit" rate. On the question of civil
liberties, he argued: "If you are innocent you have
nothing to worry about." It has been tested at
Watford football ground, but the poor quality of
the surveillance equipment made it difficult for the
computer to make matches.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------
**********************************************
To subscribe or unsubscribe, email:
majordomo(a)majordomo.pobox.com
with the message:
(un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************
1
0
From: believer(a)telepath.com
Subject: IP: Worth Reading: Fwd from Gary North: Y2K
Date: Mon, 05 Oct 1998 09:46:30 -0500
To: believer(a)telepath.com
Forwarded from Gary North:
-------------------
By now you know my concern over the Year 2000 Problem: the
collapse of the division of labor. As Leonard Read wrote in "I,
Pencil," no one knows how to make a pencil. It's too
complicated: cut wood, carbon, paint, rubber, metal. A pencil
can exist only because the division of labor exists. But if a
pencil is too difficult to make, what about replacement parts for
a dam? What about an automobile?
But could this really happen? Wrong question: How will this
not happen? There is not one compliant bank on earth, not one
compliant public utility, not one compliant industry. Yet we
have only 15 months to go. And in between now and then,
worldwide panic will hit, making code-correction very difficult.
Also, the latest estimate of embedded chips is 70 billion. The
latest estimated failure rate for embedded systems is 10% to 20%.
All of our management systems rely on mainframe computers.
The people who ran the pre-computer management systems in 1965
have been fired or have retired. The knowledge they had went
with them. They were replaced by digital idiot savants. These
idiot savants are not flexible. Dustin Hoffman's character in
Rainman was a model of flexibility compared to a computer.
Computers do exactly what they were programmed to do. They do
not listen to reason. They do not hear your screams. Their
attitude is best expressed by Rhett Butler as he walked away from
Scarlett for the last time.
Look ahead. It's Friday, January 14, 2000. You are
standing in front of a bank teller. You have stood in line for
three hours. There is a line of 200 people behind you. You have
your bank statement from last month. It says you have $4,517.22
in your checking account. But your checks have all bounced:
"Account closed." Every account is automatically closed after
two years of no activity, and your account had no activity from
1/1/1900 (00) to 1/1/1902 (02). Now you want your bounced checks
cleared. The teller says, "I'm sorry. Our computer shows the
account is closed." "Well, then, re-open it." "Are you making a
deposit?" "No." "Then I can't re-open it." Problem: you now
have no money. The account is closed. Your printed records are
for last month. Maybe you spent all that money on Christmas.
She has no idea. "I am not authorized to give you cash." (Well,
maybe $200, by government decree.) What are you going to do? It
will take many months to fix this for every depositor on earth.
The banks will not survive for weeks.
She has no authority to veto the computer. Nobody does.
There is no alternative management system in place that will
enable a bank's employees to fix the accounts and clear all
checks and credit card transactions. All banks must stop
accepting checks and credit card accounts until there is a way to
clear the accounts. There is no way. Their management systems
must be redesigned to go back to 1965, all over the world: a
paper and ink system. But there is no time to do this. This
would take years even if all the banks stayed up. But they will
all go down. Any bank that is forced out of the capital markets
for a week will go bankrupt -- two weeks, for sure. But if they
are all out of the capital markets, there will be no capital
markets. That means Western civilization will shut down:
"Account closed."
"Our computer is down." These four words may kill you.
Literally. If you do not have financial reserves that are not
electronic, these four words will strip you of your ability to
buy and sell. And not just you: everyone. The division of labor
will collapse.
How will society produce a pencil? Or repair parts for a
power generation plant?
Think ahead. Sit down with a pen and paper. (It's good
practice for the future.) Think of every situation in which your
life would be disrupted by the words, "Our computer is down." If
you could not get your immediate problem solved because of these
for words, for just 60 consecutive days, what would happen to
you? Think this through.
Which local systems are threatened? Here is a preliminary
list: banks, paychecks, supermarkets, drug stores (all
prescriptions on computer), the water/sewer company, the electric
utility, telephone service. If you lack imagination here, rent
The Trigger Effect.
Now let's move outward toward local emergency institutions.
Think of the another missing 9 and two more 1's: 9-1-1. The
police, the fire department, hospitals, ambulances. The phones
may or may not be down, but 911 switchboards are only rarely
compliant today.
Now let's move farther outward into the world of capital:
money market fund, mutual fund, pension fund, bond fund,
insurance, second mortgages, Social Security, Medicare, Medicaid,
IRS refunds. You just lost your retirement money. If your home
burns down, you'll not get a replacement unless you have gold
coins or cash to buy a used one. If you die, your wife will get
nothing that isn't close at hand, i.e., in hand.
"Our computer is down." This phrase will serve nicely as an
epitaph for our civilization. Only if the computers don't go
down, and also don't make bad calculations, can the West avoid
this epitaph. But if they are not fixed, they will go down or go
nuts.
A BILLION LIVES LOST, IF THINGS GO FAIRLY WELL
I have been writing for over a year on this with all the
skill I have. I simply cannot get it across to all of you, or
even to most of you. I am never at a loss for words, but I am at
a loss for persuasion. I have been unable to persuade the vast
majority of my readers, after almost two years, that if the
division of labor collapses, we will lose millions of lives. Joe
Boivin, who was the y2k director for Canada's Imperial Bank and
Commerce until he quit, estimates that a billion people will die
in 2000. He limits his discussion to the third world. I think
we could lose half a billion in the urban West.
Unthinkable? All right, show me how any large city will
survive if the power goes off for 60 days, all railroad
deliveries of grain and coal stop, all gasoline station pumps
shut down, and there are no banks. Go on. I'm serious. Sit
down and outline a scenario that will keep an urban population
alive without mainframe computers.
The army? There are 120 U.S. cities that the government has
targeted as vulnerable to cyberwarfare. There are 1.4 million
people in the entire U.S. military. Few have any training for
riot control and food delivery. The government cannot provide
such training without creating a panic. The military is
dependent on the civilian communications system. How will 1.4
million untrained military personnel -- including the Navy --
police a destitute population of 60 million urban residents, not
counting the suburbs? That's 11,666 people per city. But the
large cities will get the lion's share. What about where you
live? The bands of arsonists and rioters are loose in your city.
What will your police do? I'll tell you: they will stay home if
they are not being paid. And if the banks are down, they will
not be paid.
I know what you're thinking. "They just can't let this
happen." What can "they" do to stop it? The United States is
short 500,000 to 700,000 mainframe programmers.
Roberto Vacca wrote The Coming Dark Age in 1973. He did not
forecast y2k. If he had, the book would have been far more
persuasive. His point was that our technology has extended
beyond what we can understand. I was not impressed because that
is true of the free market at all times. This is the genius of
the free market. No one understands all of the interconnections,
yet we prosper. So, I dismissed the book's thesis. What I did
not see, and he did not see, was y2k. We have transferred to
digital idiot savants all authority to make decisions that men
found either too boring or too complex to make. We removed this
decision-making authority from people and delegated it to
machines.
FROM ANALOGICAL TO DIGITAL AND BACK
It's time to talk theology. Cornelius Van Til argued that
men must think God's thoughts after Him -- analogically. God is
a person. He's also three persons. We are persons. Our
universe reflects God's personality. We don't live in an
impersonal world. The biblical doctrine of the creation forces
us to accept the doctrine of cosmic personalism.
Modern computers do not think. They count. But modern man
since the Renaissance has believed that number, not God's written
revelation, is the touchstone of truth. He has believed that
mankind's inability to comprehend (surround mentally) the
infinitely complex universe can be compensated for. Man can use
numerical formulas to substitute for omniscience. He can take a
shortcut to omniscience. He can develop numerical formulas that
allow him to control the external world, which is controlled by
number. Why a capacity of the mind -- numerical coherence --
should also control the external realm is a great mystery. In
fact, as Nobel Prize physicist Eugene Wigner said in a 1960
essay, the effectiveness of number in science is unreasonable.
But it does work within creation's limits.
Men have sought numerical shortcuts to cosmic knowledge and
cosmic power. They have found many shortcuts, and on these
shortcuts modern science rests. But then, in the 1950's,
programmers took another shortcut -- a digital shortcut. They
saved two holes out of 80 in IBM punch cards. This seemingly
minor shortcut has brought society to the brink of destruction.
We are not lemmings rushing to destruction. We are sheep being
driven toward a cliff by idiot savants, to whom we have delegated
control over our affairs.
Man worships science and its shortcuts. He worships the
creations made by his own hands and mind. We will soon find
that such idolatry is always deadly. Modern man thinks he has
shoved God out of the universe. He has used Darwinism and a
theory of vast cosmic impersonal time to remove Him from man's
newly acquired domain. Natural selection has replaced God's
purpose. Cosmic time has replaced the six-day creation. But now
we face the institutional monstrosity of the digital
impersonalism of the idiot savants. Computers can count. Can
they ever count! But the dates they use after '99 will be wrong.
WHAT WILL YOU DO?
You should now have a list of services and goods that will
no longer be provided if the computers go down. It's a long
list. You need a second list. What items must you buy now that
can substitute for these lost services? You can't afford to buy
them all. There will be a panic to buy such goods next year. It
has already begun (e.g., Chinese diesel generators). Where will
you get the fuel for a generator? Electricity for a well pump?
Propane for a cook stove? Heat in the winter? Think of Montreal
last January.
But will the computers go down? Senator Robert Bennett said
it well on July 14 at a National Press Club speech. If 2000 were
the next day, this civilization might collapse. But, he said,
we can save it between July 15 and Jan. 1, 2000. To which I
reply: How? What is being done, worldwide, to avoid the death of
the computers? Not just in the U.S. -- worldwide? Almost
nothing. There are not enough skilled programmers.
I suppose you get tired of reading about this. I am surely
tired of writing it. But until I can no longer mail this
newsletter, or until all the computers are fixed in late 1999, I
will continue to nag you . . . not to death -- to life. As it
stands today, if tomorrow were 2000, we would see the end of
this civilization in 60 days. If you think I'm wrong, jot down
those life-support systems that are 2000- compliant today. It's
an empty list. How will we get from empty to fixed, worldwide,
in the next 15 months? This is not a trick question. It's a
life-and-death question. Do you have an answer and a contingency
plan? Don't wait for leadership on this matter. Leaders are in
y2k denial. You must lead. If you won't, who will? You are
responsible for you. What will you do? How soon?
Sincerely,
Gary North
**********************************************
To subscribe or unsubscribe, email:
majordomo(a)majordomo.pobox.com
with the message:
(un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************
1
0
18 Dec '03
From: "A.C." <angie(a)computerhut.net>
Subject: IP: Y2K- a futurist view: Society not resilient enough to withstand
Date: Sun, 04 Oct 1998 21:26:27 -0700
To: ignition-point(a)majordomo.pobox.com
change + 2 more related articles.
Sender: owner-ignition-point(a)majordomo.pobox.com
Precedence: list
Reply-To: "A.C." <angie(a)computerhut.net>
"However, he warns that our present economic and institutional=20
structures have milked communities and individuals of their=20
resilience to handle major and abrupt change such as Y2K may unleash."
>>
>
>Watershed for life as we know it
>By JOHN MACLEAY
>29 Sep '98
>
>ROBERT Theobald is a futurist who sees the year 2000 computer glitch=20
>as a potential watershed for global civilisation.=20
>
>Theobald, a British-born economist based in the US, says the year=20
>2000 - or Y2K - computer bug will have as big an impact on the global=20
>economy as the oil shocks of the 1970s.=20
>
>On a more sobering note, Y2K is already shaping up as the biggest=20
>technological fix in history. It will cost the US alone at least=20
>$US600 billion ($1034 billion) and possibly $US1 trillion - double=20
>what it spent on the Vietnam War when adjusted for inflation.=20
>
>Theobald, who for 37 years has advocated the need for change to a=20
>more sustainable economy, says Y2K just might be that catalyst, given=20
>the "inertia" of the current system.=20
>
>But he says that how Y2K will change our lives will depend largely on=20
>the degree to which governments and individuals prepare themselves=20
>between now and December 31 next year.=20
>
>"For me, Y2K is only the beginning of the shocks that are going to=20
>come as we begin to realise that technology does not resolve all of=20
>our problems," Theobald says.=20
>
>Theobald, who is in Australia to promote his latest book, Reworking=20
>Success, says that if handled successfully, Y2K could lead to a more=20
>decentralised economy and political decision-making process.=20
>
>However, he warns that our present economic and institutional=20
>structures have milked communities and individuals of their=20
>resilience to handle major and abrupt change such as Y2K may unleash.=20
>
>
>Theobald says community resilience will determine whether Y2K is=20
>treated as a natural disaster or whether it will be seen as another=20
>technological blunder by those above.=20
>
>Theobald's big fear is that large-scale anger caused by Y2K=20
>disruptions could lead to a breakdown in social order, especially in=20
>the larger US cities, which will be the hardest areas to organise for=20
>Y2K at a neighbourhood and sub-neighbourhood level.=20
>
>"I believe the core issue on (handling) this Y2K thing is to start at=20
>the sub-neighbourhood level so that you can say you know who will=20
>need things.=20
>
>"If we don't do anything, the chances of a major breakdown in public=20
>order, which has already been seen in Indonesia and elsewhere around=20
>the world in one way or another, is a very real threat.=20
>
>"And without far more intelligence being put in to handle this, I'd=20
>say a global slump is a very real possibility, and a significant=20
>collapse is not off the cards either."=20
>
>However, while Theobald canvasses the dark side of the millennium=20
>glitch, he also dissociates himself from the so-called cyber-
>survivalists. These are people, mostly in the US, who are prepared to=20
>ride out the Y2K bug by stocking food and hiding away in isolation.=20
>
>Theobald has been putting his words into action by working closely=20
>with his local neighbourhood in Spokane, Washington State, on Y2K=20
>preparedness.=20
>
>His efforts were recognised last year by the Institute for Social=20
>Innovation in Britain, which awarded him a prize.=20
>
>The institute's other recipient was former computer programmer Paloma=20
>O'Reilly, founder of the Cassandra Project, a community-based Y2K=20
>preparedness group that has been examining and preparing for self-
>sufficiency in all areas that could be millennium-glitch affected,=20
>including power, water and food distribution.=20
>
>"What we do as individuals, as societies and communities over the=20
>next few months will make an enormous difference to how serious Y2K=20
>becomes," says Theobald.=20
>
>"This is a fairly established position. I'm one person among many.=20
>
>"When you consider the very well established companies and the=20
>enormous sums of money being spent on this, what I say is not out of=20
>the ordinary.=20
>
>"But what disturbs most is that the dominant message in our culture=20
>at the moment is not about Y2K preparedness."=20
---------------------------------------------------------------------
Boston Top Stories
Spotlight Boston October 2, 1998 =A0=20
Texas city stages test of `Y2K' doomsday effects=20
By Chris Newton/Associated Press=20
A cold front was icing streets and causing power outages. A riot at a=20
prison outside town was using up valuable police resources. To make=20
matters worse, the 911 emergency system was broken.
The nightmare scene didn't really happen, but Lubbock officials=20
imagined it did Wednesday as part of a test of how the city could=20
react if, as many fear, computers driving vital public systems fail=20
to recognize the year 2000.
The west Texas city of more than 180,000 people didn't test any=20
equipment but rather conducted a drill to see how city personnel=20
responded to mock crises. It was called the first such citywide=20
simulation of the problem in the nation.
City manager Bob Cass, scheduled to testify about the experience=20
Friday before a U.S. Senate committee, said the clear lesson was that=20
cities risk being blindsided if they don't work on contingency plans=20
for the worst-case ``Y2K'' scenario.
``This is the one disaster that we know exactly when it could occur,=20
but it's also the one disaster that we have no idea how bad it will=20
be,'' Cass said. ``One thing that sticks out in my mind is that there=20
is the potential for so many things to go wrong all at once.''
Some computer scientists fear the Y2K bug could cause water systems=20
to shut down, traffic lights to go haywire or life-support systems to=20
fail. When a Chrysler plant ran a Y2K test on a computer system, it=20
was discovered that security doors were stuck closed.
The Lubbock experiment coupled such effects with mock emergencies=20
that would make for an extra-busy night at the police department.
``Our simulation took into account things like slick roads and=20
traffic accidents that would be standard fare for New Year's Eve,''=20
Cass said.
The test was essentially a role-playing game.
Exactly what or when the ``disasters'' would occur was kept secret=20
until the drills started Wednesday evening. The only thing announced=20
was a four-hour window, starting at 5 p.m., when anything could=20
happen.
Test conductors sent e-mail messages to city officials notifying them=20
of mock natural disasters or failed systems. Emergency officials,=20
including police, fire and utility workers, then had to react. A=20
system was set up to judge response times.
At emergency management headquarters, officials frantically practiced=20
deploying police officers to deal with problems and posted red flags=20
on a giant city map to highlight emergency areas.
The illusion was made complete with reporters summoned for ``news=20
conferences'' and mock reports from a National Weather Service=20
official.
As the drill began, officials were told the city's 911 emergency=20
system had failed. Officials quickly switched over to a county system=20
and broadcast two new police and fire department emergency numbers on=20
television.
Cass said city workers improvised well when unexpected problems arose.
``We pulled together and acted like a team,'' he said. ``A lot of=20
these agencies aren't used to dealing with each other like they had=20
to tonight.''
Mayor Windy Sitton said the test revealed that Lubbock needs to study=20
how to better respond to natural gas shortages. When fake gas outages=20
left hundreds of homes without heat, officials had to devise a plan=20
to set up shelters in the parts of town that still had power.
------------------------------------------------------------------
The Kansas City Star=20
Y2k
Nervous world seeks ways to exterminate the year 2000 bug
By DAVID HAYES and FINN BULLERS - Staff Writers
Date: 09/26/98 22:15
Marilyn Allison has spent the last three years making sure computers=20
at Blue Cross and Blue Shield of Kansas City don't fail after the=20
ball drops on New Year's Eve 1999.=20
Allison is confident Blue Cross has the problem well in hand. And she=20
thinks most of Kansas City does, too.=20
But she still is planning to sock away enough food, water, cash and=20
firewood to last a couple of weeks in case everything does go haywire=20
on Jan. 1, 2000.=20
There's the rub of the year 2000 bug, a glitch that could cause some=20
computers, machinery, medical equipment, utilities and VCRs to quit=20
working, or spit out bad information, when the 1900s become the 2000s.
Nobody really knows what's going to happen.=20
The problem stems from computer systems and billions of embedded=20
computer chips that might read the "00" in a computer program as 1900=20
rather than 2000.=20
Edward Yardeni, one of the nation's leading economists, forecasts a=20
70 percent chance of global recession because of the bug. Another=20
leading forecaster, David Wyss, chief economist for Standard & Poor's,
doesn't expect significant disruption. He even contends the=20
resulting fallout might be fun -- if we keep a sense of humor about=20
it.=20
But everyone acknowledges something is coming down the tracks, said=20
Leon Kappelman, a university professor and author who is spending=20
much of his time these days talking about the year 2000 problem.=20
"The uncertainty is whether it's a locomotive or a bicycle,"=20
Kappelman said. "And it's difficult to get definitive evidence."=20
Until now there hasn't been much information to rely on. Some credit=20
cards with "00" expiration dates have been rejected. A 104-year-old=20
Minnesota woman was invited to report to kindergarten, and a computer=20
docked an Olathe couple $17,800 for insurance premiums.=20
But those are just scattered hints of the trouble to come. The real=20
warning lies in our growing reliance on vast networks of technology --
a single misfire in the wrong place can sabotage lives in far-flung=20
places.=20
For example, when just one satellite malfunctioned in May, millions=20
of pagers and automated teller machines went out for two days. An ice=20
storm in eastern Canada knocked out part of the country's power grid=20
and shut off power to millions of people for more than a week.=20
Think if all of that -- and more -- happened on one day: Jan. 1, 2000,
a Saturday.=20
American businesses rely on computers to do almost everything. They=20
run huge manufacturing machines, answer telephones, pay employees and=20
control alarm systems.=20
Federal government computers track airliners, generate Social=20
Security checks, and control satellites in space and missiles on the=20
ground. Cities use computers to run traffic lights and dispatch=20
police officers.=20
Utilities use them to operate water and sewage systems. Grocery=20
stores use them to keep track of stock and place orders.=20
Even more important than the software that runs those computers are=20
the tiny, embedded computer chips buried in the guts of technological=20
gadgets, heavy machinery, airliners and even granddad's pacemaker.=20
There are 40 billion of the chips, most of them hard or impossible to=20
test, said Dave Hall, an expert with the CABA Corp. in Oak Brook, Ill.
=20
Estimates vary on how many of those chips will fail. Hall says 1=20
percent. Others say failures could go as high as 10 percent -- and=20
even higher in some medical equipment.=20
Even a 1 percent failure rate means 400 million chips would fail.=20
Kappelman, the University of North Texas professor, thinks the=20
interrelationships between all those elements will cause serious=20
disruptions.=20
For instance, it's unlikely that America's electric utilities will be=20
caught unprepared on the last New Year's Eve of the 1900s. In fact,=20
an industry report released last week said utility problems seemed to=20
be fewer -- and easier to fix -- than expected.=20
But if only a few plants shut down on Jan. 1, 2000, the strain on the=20
rest of the power grid could trip a cascading failure that causes=20
widespread brownouts or blackouts.=20
"This will change the way we see the world," Kappelman said. "We'll=20
see our dependence on technology in a whole new way."=20
The fix is in?=20
Even if embedded chips are hard to check, the software problem=20
shouldn't seem too difficult to fix -- on the surface, at least.=20
For decades, computers have been programmed to recognize dates using=20
six digits: today's date is 09/27/98. When the calendar rolls over at=20
midnight on New Year's Eve 1999, computers that haven't been taught=20
differently will see the year as 1900 or some other date entirely. If=20
they work at all.=20
So solve the problem. Add a couple of numbers to the programming code.
No big deal, right?=20
It's become a very big deal. For Sprint Corp., that small fix means=20
programmers must pore over 80 million lines of code. The fix will=20
take two years.=20
Big business thinks the problem is so significant that fixing it has=20
become a big business.=20
Sprint Corp. is spending $200 million on year 2000 repairs; Hallmark=20
Cards, $25 million; Blue Cross in Kansas City, $25 million; UMB Bank,=20
$22 million; Yellow Corp., $17 million. Johnson County taxpayers will=20
pay $17.2 million to fix that county's year 2000 problems.=20
All told, the fix in the Kansas City area will easily top the $400=20
million mark. Worldwide, the total is estimated at $300 billion to=20
$600 billion.
Entire companies have sprouted just to deal with the year 2000 bug.=20
More than 140 public companies, ranging from Acceler8 Technology to=20
Zmax Corp., are touting their solutions.=20
Where there's a problem, there's a lawyer. Law firms have established=20
special teams just to handle potential litigation from the year 2000=20
problem.=20
Companies that cater to survivalists are hawking canned or dried food=20
and survival gear to those with year 2000 angst.=20
That type of hype is spreading across the Internet on hundreds of=20
year 2000 Web sites. A few of the most radical year 2000 worriers=20
already have moved to rural areas to get away from what they think=20
will be urban chaos when the lights go out and the food supply chain=20
breaks down.=20
Cynthia Ratcliffe of Pleasant Valley, a disabled former office worker,
can't afford to move. But she's worried.=20
"I'm figuring at least six months of everything being messed up,"=20
said Ratcliffe, who's stocking up on canned food and kerosene lamps.=20
She's worried that those who have prepared will become targets for=20
those who haven't.=20
"I'm contemplating whether I should get some 2-by-4s to put bars over=20
the doors and windows," Ratcliffe said. "I'm trying to decide whether=20
I should buy a weapon."=20
One expert sees self-interest driving much of the panic.=20
Consultants benefit from the year 2000 fear that helps pay their=20
skyrocketing fees, said Nicholas Zvegintzov, president of Software=20
Management Network of New York and a programmer for 35 years.=20
Politicians also benefit from a puffed-up problem they can fix=20
without much effort.=20
"Unfortunately, there's no political clout in common sense,"=20
Zvegintzov said.=20
Sen. Bob Bennett, a Utah Republican who coordinates the Senate's year=20
2000 efforts, isn't doing anything to add to the national calm.=20
In a July 15 speech to the National Press Club in Washington, Bennett=20
told journalists to expect electrical brownouts and regional=20
blackouts. He predicts some banks will go bankrupt and some water=20
systems will break down.=20
Such alarm might actually be good, said Heidi Hooper, year 2000=20
director for the Information Technology Association of America. She=20
said the general public could use a serious wake-up call.=20
"These huge Fortune 100 companies are spending, collectively,=20
billions and billions of dollars. I don't think that's hype," she=20
said. "They are not going to spend that money for no reason. They=20
know, bottom line, that if they are going to make money they have to=20
stay in business."=20
But for some businesses to stay afloat, other businesses will have to=20
drown, she said.=20
"What we need, unfortunately, is examples of failures," Hooper said.=20
"That's going to start soon enough in 1999. And the private sector is=20
not going to share that information, so it's going to have to be up=20
to the federal government to step in."=20
But the federal government is in no shape to provide leadership.=20
Overall, one congressman gave the federal government a "D" on its=20
most recent year 2000 preparedness report card, up from the "F" it=20
received in June.=20
"This is not a grade you take home to your parents," said Rep. Steve=20
Horn, a California Republican and chairman of the House subcommittee=20
on government management of information and technology.=20
Horn predicts the government will not be able to fix a substantial=20
number of "mission critical" systems by 2000. And the price tag to=20
fix the 24 governmental departments surveyed is $6.3 billion, up $1=20
billion from the estimate given by the Office of Management and=20
Budget.=20
"The executive branch has a deadline that cannot be extended," Horn=20
said. "There is no margin for error."=20
Closer to home, Kansas City is requiring all city departments to=20
submit contingency plans by October for dealing with the year 2000=20
problem.=20
What to look for: Will traffic lights work? Will prisoners be=20
released early if a computer mistakenly thinks an inmate has been=20
jailed for more than 100 years? Will fire trucks start, and what is=20
the backup plan if they don't?=20
"You don't want to overreact, and we're not," said John Franklin,=20
assistant city manager. "But there is a real issue here for public=20
managers that's kind of scary."=20
Elsewhere, Water District No. 1 of Johnson County will spend $1.56=20
million to fix 4,109 computer programs and 701,021 lines of code by=20
the end of next summer. The district says the job is 75 percent=20
complete, and General Manager Byron Johnson said he was confident the=20
district would be prepared.=20
But experts aren't prepared to declare victory.=20
"My whole theme from day one is we need answers," said Yardeni, the=20
Yale economist and managing director of Deutsche Bank Securities.=20
"I'm not trying to foment panic. I'm not trying to create revolution.=20
But you have to be a naive optimist to think things are going to be=20
pretty relaxed Jan. 1, 2000."=20
**********************************************
To subscribe or unsubscribe, email:
majordomo(a)majordomo.pobox.com
with the message:
(un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************
1
0
From: roundtable <roundtable(a)geocities.com>
Subject: IP: "Big Brother" Watches "Big Brother"
Date: Mon, 5 Oct 1998 16:30:20 -0400
To: ignition-point(a)majordomo.pobox.com
On Tuesday April 28, 1998 COUNCIL ON FOREIGN RELATIONS MEMBER Senate
=46inance Committee Chairman William Roth, sited several incidents describin=
g
mistreatment by the criminal investigation division of the IRS.
The same day The Treasury Department announced that former CIA and FBI
chief COUNCIL ON FOREIGN RELATIONS MEMBER William Webster would head up a
special investigation of the IRS's criminal investigation division.
Sunday May 4, 1998 on the CBS show Face the Nation, COUNCIL ON FOREIGN
RELATIONS MEMBER Senator Daniel Patrick Moynihan said "The IRS is not out
of control, it's just not under control," "There is no management system."
"The criminal division (of the IRS) got out of control. That SWAT team
breaking into businesses with body armor and automatic weapons - now what's
that?" asked Moynihan. "That is no way to behave with taxpayers. We can get
this under control and will."
COUNCIL ON FOREIGN RELATIONS MEMBER Moynihan expressed confidence in
Congress and the agency's new director, COUNCIL ON FOREIGN RELATIONS MEMBER
Charles O. Rossotti, to create such a system and give it a face that is
friendlier to the public than the aggressive, arm-twisting "Big Brother"
described by taxpayers at Senate Finance Committee hearings held the week
of April 28th, and in September 1997.
COUNCIL ON FOREIGN RELATIONS MEMBER Charles O. Rossotti may be able to give
the system a friendly face The problem is the friendly face will do
little more than hide the same "Big Brother" tactics. Wiretaps may be one
of those tactics.
Some insight into how COUNCIL ON FOREIGN RELATIONS MEMBER William Webster
thinks, is found in the USA Today article that follows. The article is
about a record number of "Big Brother" wiretaps in the US. The excuse for
the wiretaps "is a stepped-up federal response to increased terrorist
activity on American soil. Opponents argue that the process endangers the
very liberties it seeks to protect."
COUNCIL ON FOREIGN RELATIONS MEMBER William Webster, head of the
investigative team looking into "Big Brother" IRS abuses, is a proponent of
increased "Big Brother" wiretaps who believes,
"This issue is where the rubber hits the road," said [COUNCIL ON
=46OREIGN RELATIONS MEMBER] William Webster, who headed the FBI in 1978 when
the law allowing the secret wiretaps was passed. "It's where we try to
balance the concept of our liberty against what has to be done to protect
it."
The USA Today article follows:
>Hunt for terrorists brings about record rise in U.S. wiretaps
>By Richard Willing / USA TODAY [ October 5, 1998]
>>[ http://detnews.com:80/1998/nation/9810/04/10040083.htm ]
>
>WASHINGTON -- Federal judges operating in secret courts are authorizing
>unprecedented numbers of wiretaps and clandestine searches aimed at spies
>and terrorists in the United States, Justice Department records show.
>
> During the past three years, an average of 760 wiretaps and searches a
>year were carried out, a 38-percent increase from the 550 a year from
>1990-94.
>
> Federal judges have authorized a yearly average of 463 ordinary wiretaps
>since 1990 in drug, organized crime and other criminal cases.
>
> Part of the growth in surveillance is attributed to an increase in
>espionage and terrorist activities in the country.
>
> "There's a greater quantity of the folks who are potentially problematic
>out there," said Jamie Gorelick, who as deputy attorney general from
>1994-97 helped review wiretap applications.
>
> Proponents say the surveillance reflects a stepped-up federal response to
>increased terrorist activity on American soil.
>
> Opponents argue that the process endangers the very liberties it seeks to
>protect.
>
> "This issue is where the rubber hits the road," said [COUNCIL ON FOREIGN
>RELATIONS MEMBER] William Webster, who headed the FBI in 1978 when the law
>allowing the secret wiretaps was passed. "It's where we try to balance the
>concept of our liberty against what has to be done to protect it."
>
> The wiretaps, which are applied for by the Justice Department under the
>Foreign Intelligence Surveillance Act and carried out by the FBI and
>National Security Agency, have received their greatest use yet under
>President Clinton and Atty. Gen. Janet Reno.
>
> Since 1995, Foreign Intelligence Surveillance Act courts also have
>authorized searches of the homes, cars, computers and other property of
>suspected spies. In its two decades, those courts have approved 11,950
>applications and turned down one request.
>
> Generally, defense lawyers can challenge the basis for authorizing a
>wiretap. But supporting information for wiretaps authorized by those
>courts is sealed for national security reasons.
>
> "It legitimizes what would appear to be contrary to constitutional
>protections," said Steven Aftergood, privacy specialist at the Federation
>of American Scientists. "It's a challenge to the foundation of American
>liberties."
>
>Opponents also say the government is using the wiretaps to replace
>conventional criminal searches, which must meet a higher legal standard.
>
> "There's a growing addiction to the use of the secret court as an
>alternative to more conventional investigative means," said Jonathan
>Turley, law professor at George Washington University in Washington, D.C.
>
> The wiretaps are meant to develop intelligence, not to help make criminal
>cases. But the wiretap information was used to secure guilty pleas from
>CIA turncoats Aldrich Ames in 1994 and Harold Nicolson in 1997.
>
> How the surveillance act works
>
> * The Foreign Intelligence Surveillance Act of 1978 created a special
>secret court for authorizing wiretaps on suspected spies.
> * The court was intended by Congress as a check against the power of
>presidents, who until 1978 had authorized wiretaps and warrantless
>searches in the name of national security.
> * The law requires the Justice Department, and usually the FBI or the
>National Security Agency, to show a judge that the target is a foreign
>government or agent engaging in "clandestine intelligence gathering
>activities" or terrorism.
roundtable
___
Visit the Roundtable Web Page: http://www.geocities.com/CapitolHill/2807
Title-50 War and National Defense =A7 783 states - "It shall be unlawful for
any person knowingly to combine, conspire, or agree with any other person
to perform any act which would substantially contribute to the
establishment within the United States of a totalitarian dictatorship, the
direction and control of which is to be vested in, or exercised by or under
the domination of control of, any foreign government."
The Council on Foreign Relations are in violation of Title-50 War and
National Defense =A7 783. The Council on Foreign Relations has unlawfully an=
d
knowingly combined, conspired, and agreed to substantially contribute to
the establishment of one world order under the totalitarian dictatorship,
the direction and the control of members of Council on Foreign Relations,
the Royal Institute of International Affairs, and members of their branch
organizations in various nations throughout the world. That is
totalitarianism on a global scale.
____
Visit the Roundtable Web Page: http://www.geocities.com/CapitolHill/2807
E-mail: roundtable(a)mail.geocities.com
read on-line: Psychological Operations In Guerrilla Warfare ( The CIA's
Nicaragua Manual); The Secret Team by Fletcher Prouty; The NAFTA PSYOP;
Nitze's Not-Sees; & More
visit: U.S. Army War College - Meet Henry L. Stimson and Elihu Root
Professors of Military Studies
**********************************************
To subscribe or unsubscribe, email:
majordomo(a)majordomo.pobox.com
with the message:
(un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************
1
0
From: believer(a)telepath.com
Subject: IP: "The Internet 1998: The end of the beginning"
Date: Tue, 06 Oct 1998 05:57:25 -0500
To: believer(a)telepath.com
Source: Business Today
http://www.businesstoday.com/techpages/wsj2100598.htm
BT EXCLUSIVE: The Internet 1998: The end of the beginning
by Bill Burke/BusinessToday staff
The Internet is not going away, but it is about to undergo a facelift.
With the demand for faster, more reliable data communications access
growing, some technology pundits are predicting the death of the Internet.
Radio took 38 years to reach an audience of 50 million people, according to
Sprint CEO William T. Esrey. The Internet has taken only four years to
reach that same audience. Despite that growth, it has reached critical mass
and is due flare out in the near future, he said.
"The Internet is going away," Esrey said. "The Internet will be replaced
with other networks."
But according to a panel at the Wall Street Journal Technology Summit this
morning, that demise is being prematurely reported.
"One of the beauties of the Internet is that it can change in several
places simultaneously," said Robert Metcalfe, vice president of Technology,
International Data Group. "There are five or 10 next generation Internets
coming."
However, there are threats to the growth of the new Net. The first 25 years
of the Internet has been characterized by governmental subsidies and
community cooperation. Recently, the financial payoff has led to heretofore
unseen posturing and political infighting -- something that could threaten
the development of future networks, according to John M. McQuillan,
president of McQuillan Consulting.
Add in new technologies, however, and the next generation begins to take
shape.
"I think where we are with the Internet where we were 100 years ago with
electricity," said Paul R. Gudonis, president of GTE Internetworking.
"We're still in the early stages of this."
Gudonis said the Internet is about to become more applications-based,
forcing businesses to re-think their approach.
"Business is going through an adoption cycle," he said. "Now we're seeing
the second coming of re-engineering."
Changes will come in how corporations go about prospecting, learning how to
sell, and "totally revamping how they actually do business."
As a result, companies are preparing for the next incarnation, building a
massive new backbone for each new network, and preparing for, among other
things, streaming video.
"Everybody's getting ready for video," Gudonis said. "Everybody's going to
go camera crazy, I think."
But the bottom line is that capitalism has met the Net, and it will not be
the same.
"Where we are, is at the end of the beginning of the Internet," McQuillan
said.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------
**********************************************
To subscribe or unsubscribe, email:
majordomo(a)majordomo.pobox.com
with the message:
(un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************
1
0
From: "ama-gi ISPI" <offshore(a)email.msn.com>
Subject: IP: ISPI Clips 5.15:Privacy Conference Announcement
Date: Mon, 5 Oct 1998 00:53:20 -0700
To: <Undisclosed.Recipients(a)majordomo.pobox.com>
ISPI Clips 5.15:Privacy Conference Announcement
News & Info from the Institute for the Study of Privacy Issues (ISPI)
Monday October 5, 1998
ISPI4Privacy(a)ama-gi.com
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This From: ACLU of Wisconsin (Press Release)
acluwicmd(a)aol.com
Privacy Conference Announcement
ACLU of Wisconsin Data Privacy Project announces a privacy
conference on November 13, 1998 in Milwaukee, Wisconsin. The
conference is co-sponsored by University of Wisconsin-Milwaukee
Institute of World Affairs. The event features keynote addresses by
Spiros Simitis, principal author of the “EU Directive on Data Protection”
and Stefan Walz, privacy commissioner for the German state of Bremen.
Registration information may be obtained from Carole Doeppers,
Director, Wisconsin Data Privacy Project, 122 State Street, Suite 407,
Madison, WI 53703. Or contact her by phone (608-250-1769),
fax (608-258-9854) or e-mail <acluwicmd(a)aol.com>.
“Data Privacy in the Global Age”,
Friday, November 13, 1998,
Italian Conference Center, Milwaukee
Registration Fee: $175
Limited number of scholarships available upon request
Conference lodging:
Astor Hotel 1-800-242-0355 (in state)
1-800-558-0200 (outside Wisconsin)
Conference Program: November 13
Welcome and Introductions
Keynote Address:
”The EU Directive: Its Impact on Electronic Commerce with Third Countries”
Dr. Spiros Simitis, principal author of the “EU Directive on Data
Protection
Concurrent Sessions:
“The Internet: New Frontiers for Privacy and the Law”
Moderator:
Andrea Schneider,
Professor, Marquette University School of Law
Panelists:
Fred Cate, Author and Professor,
Indiana University School of Law
Timothy Muth, Attorney and Chair,
Milwaukee Bar AssociationÂ’s Technology Committee
“A New Electronic Bill of Rights: Good or Bad for Business?”
Moderator:
David Luce, Professor Emeritus,
UW-Milwaukee Philosophy Department
Panelists:
Evan Hendricks, Editor/Publisher, Privacy Times
Paola Benassi, Operations Manager, TRUSTe
Luncheon
Afternoon Keynote Address:
“The German Approach to Data Protection”
Dr. Stefan Walz, Privacy Commissioner, German State of Bremen
Concurrent Workshops:
“Trade-off of Values: Freedom of Information vs. Information Privacy”
Moderator:
Len Levine, Professor,
UW-Milwaukee Computer Science Department
Panelists:
Marty Kaiser, Editor, Milwaukee Journal-Sentinel
James Friedman, Legal Counsel, Wisconsin FOI Council
Don Gemberling, Director, Information & Policy
Division.
Minnesota Department of Administration
Charles Sykes, Author and Radio Talk-Show Host
“Developing Your Own Fair Information Practices: Balancing Commercial and
Consumer Rights”
Moderator:
David Flaherty, Commissioner,
Office of Information and Privacy, British Columbia
Discussants:
Patrick Sullivan, Partner, PricewaterhouseCoopers LLP
James OÂ’Brien, Vice President, Sun Tzu Security Ltd.
Reception
--------------------------------NOTICE:------------------------------
ISPI Clips are news & opinion articles on privacy issues from
all points of view; they are clipped from local, national and international
newspapers, journals and magazines, etc. Inclusion as an ISPI Clip
does not necessarily reflect an endorsement of the content or opinion
by ISPI. In compliance with Title 17 U.S.C. section 107, this material is
distributed free without profit or payment for non-profit research
and educational purposes only.
---------------------------------------------------------------------------
ISPI Clips is a FREE e-mail service from the "Institute for the Study
of Privacy Issues" (ISPI). To receive "ISPI Clips" on a regular bases
(up to 3 - 8 clips per day) send the following message "Please
enter [Your Name] into the ISPI Clips list: [Your e-mail address]" to:
ISPIClips(a)ama-gi.com .
The Institute for the Study of Privacy Issues (ISPI) is a small
contributor-funded organization based in Victoria, British Columbia
(Canada). ISPI operates on a not-for-profit basis, accepts no
government funding and takes a global perspective.
ISPI's mandate is to conduct & promote interdisciplinary research
into electronic, personal and financial privacy with a view toward
helping ordinary people understand the degree of privacy they have
with respect to government, industry and each other and to likewise
inform them about techniques to enhance their privacy.
But, none of this can be accomplished without your kind and
generous financial support. If you value in the ISPI Clips service or if
you are concerned about the erosion of your privacy in general, won't
you please help us continue this important work by becoming an "ISPI
Clips Supporter" or by taking out an institute Membership?
We gratefully accept all contributions:
Less than $60 ISPI Clips Supporter
$60 - $99 Primary ISPI Membership (1 year)
$100 - $300 Senior ISPI Membership (2 years)
More than $300 Executive Council Membership (life)
Your ISPI "membership" contribution entitles you to receive "The ISPI
Privacy Reporter" (our bi-monthly 12 page hard-copy newsletter in
multi-contributor format) for the duration of your membership.
For a contribution form with postal instructions please send the following
message "ISPI Contribution Form" to ISPI4Privacy(a)ama-gi.com .
We maintain a strict privacy policy. Any information you divulge to ISPI
is kept in strict confidence. It will not be sold, lent or given away to
any third party.
**********************************************
To subscribe or unsubscribe, email:
majordomo(a)majordomo.pobox.com
with the message:
(un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************
1
0
From: believer(a)telepath.com
Subject: IP: Did EU Scuttle Echelon Debate?
Date: Tue, 06 Oct 1998 09:25:41 -0500
To: believer(a)telepath.com
Source: Wired
http://www.wired.com/news/news/politics/story/15429.html
Did EU Scuttle Echelon Debate?
By Niall McKay
5:15 p.m.5.Oct.98.PDT
The European Parliament has swept aside
concerns about alleged surveillance and spying
activities conducted in the region by the US
government, a representative for Europe's Green
Party said Monday.
Specifically, the EU allegedly scuttled
parliamentary debate late last month concerning
the Echelon surveillance system. Echelon is a
near-mythical intelligence network operated in
part by the National Security Agency.
"The whole discussion was completely brushed
over," Green Party member of European
Parliament Patricia McKenna said.
The US government has refused even to
acknowledge Echelon's existence. But since
1988, investigative journalists and privacy
watchdogs have uncovered details of a secret,
powerful system that can allegedly intercept any
and all communications within Europe.
According to scores of reports online and in
newspapers, Echelon can intercept, record, and
translate any electronic communication --
telephone, data, cellular, fax, email, telex -- sent
anywhere in the world.
The alleged system has only recently come
under the scrutiny of the European Parliament,
which has grown concerned about EU
government and private sector secrets falling into
US hands.
The debate fizzled mysteriously, said McKenna,
who suggested that the Parliament is reluctant
to probe the matter fully for fear of jeopardizing
relations between the EU and the United States.
"Basically they didn't want to rock the boat," she
said.
Furthermore, she said the debate was held two
days ahead of schedule, hindering preparations
for the discussion by European Members of
Parliament.
While the NSA has never officially recognized
Echelon's existence, it has been the subject of
heated debates in Europe following a preliminary
report by the Scientific and Technical Options
Assessment, a committee advising the
parliament on technical matters.
On 19 September, the Parliament debated both
the EU's relationship with the United States and
the existence and uses of Echelon.
The Green Party believes the resolution to defer
its decision on Echelon, pending further
investigation, was influenced by pressure from
the US government, which has tried to keep the
system secret.
Glyn Ford, a member of the European
Parliament for the British Labor Party and a
director of STOA, missed the debate because of
the schedule change but does not share the
Green Party's view.
"There is not enough information on Echelon,
beyond its existence, to debate the matter fully,"
said Ford.
According to Ford, the Omega Foundation, a
British human rights organization, compiled the
first report on Echelon for the Parliament
committee.
"It is very likely that Omega will be
commissioned again," Ford said. "But this time I
believe the EU will require direct input from the
NSA."
Simon Davies, the director of the privacy
watchdog group Privacy International sees the
debate as a major civil rights victory.
"It's unheard of for a parliament to openly debate
national security issues," said Davies. "This
debate fires a warning shot across the bows of
the NSA."
Echelon is said to be principally operated by the
National Security Agency and its UK equivalent,
the Government Communications Headquarters.
It reportedly also relies on cooperation with other
intelligence agencies in Canada, Australia, and
New Zealand.
"These spy systems were seen as a necessary
part of international security during the cold
war," said Ford. "But there is no military reason
for spying on Russia now unless they (NSA)
want to listen to the sound of the proto-capitalist
economy collapsing."
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------
**********************************************
To subscribe or unsubscribe, email:
majordomo(a)majordomo.pobox.com
with the message:
(un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************
1
0
From: believer(a)telepath.com
Subject: IP: Heavy Leonid meteor shower threatens communications
Date: Tue, 06 Oct 1998 06:11:35 -0500
To: believer(a)telepath.com
Source: San Francisco Examiner
http://www.examiner.com/981004/1004meteor.shtml
Heavy Leonid meteor shower threatens communications
Annual light show biggest in 32 years
By Keay Davidson
EXAMINER SCIENCE WRITER
A spectacular meteor storm will ignite the heavens in mid-November,
possibly "sandblasting" satellites and threatening everyday services from
cell phones to TV shows to data communications.
The last great meteor barrage came in 1966, when space satellites were far
less common - and far less essential to everyday life. Back then, thousands
of meteors per minute shot across the North American sky.
Today, the skies are jammed with satellites that aid in weather
forecasting, relay data communications and TV signals, and enable military
surveillance.
The world's satellite network is a juicy target for the blistering
celestial rain.
Although the meteors are smaller than grains of sand, they travel
tremendously fast - more than 40 miles per second, equivalent to a
10-second flight from San Francisco to Los Angeles. As a result, they could
knock out or disrupt some satellites' delicate electronics.
"This meteoroid storm will be the largest such threat ever experienced by
our critical orbiting satellite constellations," William H. Ailor, director
of the Center for Orbital and Reentry Debris Studies at the Aerospace Corp.
in El Segundo, Los Angeles County, told the House Science Committee on May 21.
The 1966 storm appeared over continental North America, but this year's
main aerial assault will be visible from Japan, China, the Philippines and
other parts of east Asia, and possibly Hawaii. The meteors are debris from
a comet, Tempel-Tuttle.
Scientists from NASA's Ames Research Center in Mountain View hope to study
the shower from aircraft flying out of Okinawa, says Ames principal
investigator Peter Jenniskens. They hope to broadcast live TV images of the
shower over the World Wide Web.
The "Leonid" meteor shower is so named because the meteors appear to
emanate from the direction of the constellation Leo. Actually, the shower
is a cloud of rocky particles orbiting the sun.
Annual event
Earth crosses the cloud's path every Nov. 17 and 18. At that time, amateur
astronomers enjoy seeing the "Leonids" zip across the sky, sometimes
several per minute.
But every 30-plus years, our planet crosses a particularly dense part of
the Leonid cloud. So the "shower" becomes a "storm," with up to 40 meteors
per second and sometimes 50,000 per hour.
Although very tiny, the particles move so fast that the friction with
Earth's atmosphere will cause them to burn and glow. Visible from hundreds
of miles away, they will make the sky look like fireworks.
NASA plans to turn the Hubble Space Telescope away from the storm so
meteors that hit the giant orbital telescope will miss its super-delicate
mirror, says NASA spokesman Don Savage.
"NASA is taking (the shower) seriously," Savage said. "We have been
assessing what we need to do to ensure our satellites in Earth orbit are
going to be operated in a safe manner during this meteor shower."
Other satellites might be temporarily re-oriented so that they present the
narrowest "cross section" - the smallest target.
"We are concerned, and we have been in meetings and making plans concerning
the Leonid shower," said U.S. Army Maj. Mike Birmingham, a spokesman for
the U.S. Space Command in Colorado, which monitors
American military and spy satellites.
In his congressional testimony, Ailor said that "because of the very high
speed of the particles - they will be moving at speeds of over... 155,000
mph - the storm poses an even greater and somewhat unknown threat."
Most particles tiny
"Fortunately, most of the particles... are very small, smaller than the
diameter of a human hair, and won't survive passage through the Earth's
atmosphere," Ailor said. "Our satellites, however, are (in space and) not
protected by the atmosphere, so they will be 'sandblasted' by very small
particles traveling more than 100 times faster than a bullet.
"At these speeds, even a tiny particle can cause damage or electrical
problems," Ailor said. "While major holes and physical damage to solar
panels and structures are very unlikely, impacts of small particles will
create an electrically charged plasma which can induce electrical shorts
and failures in sensitive electronic components."
Last month, an immense wave of radiation from a neutron star washed over
Earth, causing at least two scientific satellites to shut down to protect
their electronics.
Astronomers said the star, in a constellation about 20,000 light-years
away, had unleashed enough energy to power civilization for a
billion-billion years. But by the time the radiation found its way across
the cosmos and through the atmosphere, it was no stronger than a typical
dental X-ray, scientists said.
No conflict with space missions
The upcoming meteor shower is not expected to conflict with scheduled space
missions.
The first components of the international space station - a kind of village
in space - aren't planned for launch until late November and December,
after the shower, Savage said.
U.S. Sen. John Glenn, an Ohio Democrat and former astronaut, is scheduled
to rocket into orbit on the space shuttle Oct. 29, returning before the
Leonid shower.
Armed with sensitive monitors, Jenniskens' colleagues will study the
meteors' "spectra" - frequencies of light that reveal the particles'
chemical composition - through portholes in the roof of a plane. Scientists
will also
study the particles' effects on atmospheric chemistry, such as the ozone
layer that shields us from cancer-causing solar radiation.
The scientists hope to measure the particle stream, which may be as dense
as one extremely small particle every 10 square meters. If so, then every
satellite in the sky may get hit, Jenniskens say.
Jenniskens' project - involving some 30 scientists and two aircraft - is
funded by NASA, the U.S. Air Force and the National Center for Atmospheric
Research in Boulder, Colo.
He hopes to transmit high-resolution TV images of the incoming meteors via
TV or the Web across a 30-degree field of sky.
More information on the project is available on the Internet at
www-space.arc.nasa.gov/~leonid/.
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------
**********************************************
To subscribe or unsubscribe, email:
majordomo(a)majordomo.pobox.com
with the message:
(un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************
1
0
From: believer(a)telepath.com
Subject: IP: Spycam City: The surveillance society: part one
Date: Tue, 06 Oct 1998 06:18:00 -0500
To: believer(a)telepath.com
Source: Village Voice
http://www.villagevoice.com/ink/news/40aboal.shtml
Spycam City: The surveillance society: part one
by Mark Boal
Cameras stare as you browse at Barnes and
Noble or rent a video at Blockbuster. They record
the way you handle the merchandise at Macy's or
how you glide to the music at the Union Square
Virgin Megastore. Grab a latte at Starbucks,
brunch on borscht at Veselka, or savor a martini at
the Union Bar: cameras are watching every sip you
take. Peering from skyscrapers with lenses that can
count the buttons on a blouse three miles away,
they watch every move you make.
Even Rudy likes to watch.After testing reaction to
the monitoring of parks, public pools, and subway
platforms, the city is quietly expanding a pilot
program on buses. Cameras indistinguishable from
lampposts have advanced from the perimeter of
Washington Square into the heart of the park.
They're already hidden at some bus stops and
intersections to snag speeders and parking perps.
More are on the way.
The Housing Authority is rushing to put
bulletproof cameras in corridors throughout city
projects.
At P.S. 83 in the Bronx, covert cameras cover
the schoolyard; six other Bronx schools will soon
follow suit.
Even university students are under watch, as
activists at City College realized last June when
they found a camera hidden in the smoke detector
outside their meeting room. The administration had
put it there.
Two local jails--Valhalla and Dutchess
County--are adding cameras to their guards'
helmets to go along with the ones in the visiting
rooms and some cells.
With little public awareness and no debate, the
scaffolding of mass surveillance is taking shape."it's
all about balancing a sense of security against an
invasion of privacy," Rudolph Giuliani insists. But
the furtive encroachment of surveillance is Norman
Siegel's latest lost cause. "I feel like Paul Revere,
shouting 'The cameras are coming, the cameras are
coming.' " says the New York Civil Liberties
Union's executive director.
All summer, a crew of NYCLU volunteers
scoured Manhattan on a mission to pinpoint every
street-level camera. Next month, Siegel will unveil
their findings: a map showing that cameras have
become as ubiquitous as streetlights. It's impossible
to say how many lenses are trained on the streets
of New York, but in one eight-block radius, the
NYCLU found over 300 in plain sight. And as one
volunteer acknowledges, "There are tons of hidden
cameras we didn't catch."
That's because it's routine in the security trade to
buttress visible cameras with hidden ones, "so
everything's covered and it doesn't look like a
fortress," as one consultant says. These spycams
scan unseen in tinted domes, from behind mirrors,
or through openings the size of a pinhole. Under
the joystick command of a distant operator, they're
capable of zooming in or spinning 360 degrees in
less than a second. If you listen to the people who
install them, cameras are as common and elusive as
shadows. But does anybody really care?
No New York law regulates surveillance (except
to require cameras at ATM machines). Statutes
that prohibit taping private conversations have
been outpaced by video technology. Your words
can't be recorded without your consent, but you
can be videotaped in any public place. And you
don't own your image (except for commercial
purposes).
It took the Supreme Court some 90 years to apply
the Fourth Amendment's privacy protection to the
telephone. Before a landmark 1967 case, it was
legal to bug a phone booth. When legislators finally
reined in wiretapping in 1968, video was a speck
on the horizon, and cameras were excluded from
the law. Now Congress is inundated with privacy
bills, but few survive the combined resistance of
manufacturers, service providers, law enforcement,
and the media.
In 1991 and 1993, proposals to limit surveillance
were killed in committee by a lobby of 12,500
companies. Testifying against rules that would have
required companies to notify their workers--and
customers--of cameras, Barry Fineran of the
National Association of Manufacturers called
"random and periodic silent monitoring a very
important management tool." This alliance backs its
rhetoric with cash. During the 1996 Congressional
campaign, finance and insurance companies alone
invested $23 million in their antiprivacy agenda.
And so the cameras keep rolling.
It's clear that surveillance makes many people feel
safer. But researchers disagree about its value as a
crime deterrent.The consensus is that cameras can
curb spontaneous crimes like vandalism, but are
less effective in stopping more calculated felonies.
Though spycams are in banks and convenience
stores, robberies at these places are staples of the
police blotter. Hardcore crooks learn to work
around surveillance: witness the masked bandit.
And many cameras that promise security are only
checked occasionally; their real purpose is not to
stop a crime in progress, but to catch perps after
the fact. Those reassuring cameras on subway
platforms are there to make sure the trains run on
time.
It's telling that the camera quotient is increasing in
the midst of a dramatic decline in crime.Clearly the
spread of surveillance has less to do with
lawlessness than with order. "Just don't do anything
wrong," advises the smiling cop monitoring the
hidden cameras in Washington Square, "and you
have nothing to worry about."
But Americans are worried. Last year, 92 percent
of respondents told a Harris-Westin poll they were
"concerned" about threats to privacy, the highest
level since the poll began in the late '70s. Despite
this concern, there's been little research into the
effects of living in an omnivideo environment.
Surveillance scholarship was hip in the '60s and
'70s, but academic interest has dropped noticeably
in the past 20 years. In the neocon '90s, the
nation's preeminent criminologist, James Q.
Wilson, says he "never studied the subject [of
security cameras] or talked to anyone who has."
One reason for this apathy is the academy's
dependence on government money. "Federal
funding does not encourage this kind of research,"
says sociologist Gary Marx, one of the few
authorities on surveillance. "The Justice
Department just wants to know about crime
control. It's bucks for cops." In fact, Justice money
is lavished, not on research but on surveillance
hardware.
In this investigative void, a plucky new industry has
sprung up. Sales of security cameras alone will
total an estimated $5.7 billion by 2002. Cameras
are now an integral part of new construction, along
with sprinklers and smoke detectors. But the
strongest sign that monitoring has gone mainstream
is the plan by a security trade association to
incorporate surveillance into the MBA curriculum.
Budding businessmen are interested in cameras
because they are a cheap way to control
wandering merchandise and shield against liability.
Fast-food chains like McDonald's protect
themselves from litigious customers with hidden
camerasthat can catch someone planting a rat tail in
the McNuggets. Surveillance also helps managers
track workers' productivity, not to mention
paper-clip larceny and xerox abuse. Though most
employers prefer to scan phone calls and count
keystrokes, it's legal in New York (and all but
three states) for bosses to place hidden cameras in
locker rooms and even bathrooms.
A 1996 study of workplace monitoring calculates
that, by the year 2000, at least 40 million American
workers will be subject to reconnaissance;
currently, 85 percent of them are women, because
they are more likely to work in customer service
and data entry, where monitoring is commonplace.
But that's changing as white-shoe firms like J.P.
Morganput cameras in the corridors.
Meanwhile, in the public sector, New York City
transit workers can expect scrutiny for "suspected
malingering and other misuse of sick leave [by]
confidential investigators using video surveillance,"
according to a confidential MTA memo. Though
the police would need a warrant to gather such
information, employers don't."When most
Americans go to work in the morning," says Lewis
Maltby of the ACLU, "they might as well be going
to a foreign country, because they are equally
beyond the reach of the Constitution."
New York is hardly the only spy city. More than
60 American urban centers use closed-circuit
television in public places. In Baltimore, police
cameras guard downtown intersections. In San
Francisco, tiny cameras have been purchased for
every car of the subway system. In Los Angeles,
the camera capital of America, some shopping
malls have central surveillance towers, and to the
north in Redwood City, the streets are lined with
parabolic microphones. Even in rustic Waynesville,
Ohio, the village manager is proud of the cameras
that monitor the annual Sauerkraut Festival.
America is fast becoming what Gary Marx calls "a
surveillance society," where the boundary between
the private and the public dissolves in adigital haze.
"The new surveillance goes beyond merely
invading privacy . . . to making irrelevant many of
the constraints that protected privacy," Marx
writes in Undercover: Police Surveillance in
America. For example, mass monitoring allows
police to eliminate cumbersome court hearings and
warrants. Immediately after a crime, cops check
cameras in the vicinity that may have captured the
perp on tape.
So, as surveillance expands, it has the effect of
enlarging the reach of the police. Once it becomes
possible to bank all these images, and to call them
up by physical typology, it will be feasible to set up
an electronic sentry system giving police access to
every citizen's comings and goings.
This apparatus isn't limited to cameras. Recent
mass-transit innovations, such as the MetroCard,
are also potential surveillance devices. A
MetroCard's magnetic strip stores the location of
the turnstile where it was last swiped. In the future,
Norman Siegel predicts, it will be possible for
police to round up suspects using this data. E-Z
Passes already monitor speeding, since they
register the time when drivers enter
tollbooths.Once transportation credits and bank
accounts are linked in "smart cards" (as is now the
case in Washington, D.C.), new surveillance vistas
will open to marketers and G-men alike.
Already the FBI clamors for the means to monitor
any cell-phone call. Meanwhile other government
agencies are developing schemes of their own. The
Department of Transportation has proposed a rule
that would encode state drivers' licenses, allowing
them to double as national identity cards.
Europeans know all about internal passports, but
not even the East German Stazi could observe the
entire population at a keystroke. "What the secret
police could only dream of," says privacy expert
David Banisar, "is rapidly becoming a reality in the
free world."
What's more, spy cams are getting smaller and
cheaper all the time. "A lens that used to be 14
inches long can now literally be the size of my
fingernail," says Gregg Graison of the spy shop
Qüark. Such devices are designed to be hidden in
everything from smoke detectors to neckties.
Qüark specializes in souping up stuffed animals for
use in monitoring nannies. A favorite hiding place is
Barney's foot.
These devices reflect the growing presence of
military hardware in civilian life. The Defense
Department's gifts to retail include night-vision
lenses developed during the Vietnam War and now
being used to track pedestrians on 14th Street. A
hundred bucks at a computer store already buys
face-recognition software that was classified six
years ago, which means that stored images can be
called up according to biometric fingerprints. "It's
all about archiving," says John Jay College
criminologist Robert McCrie. And in the digital
age, the zip drive is the limit.
The template for storing and retrieving images is
Citibank's futuristic monitoring center in Midtown
(this reporter was asked not to reveal the location),
where 84 PCs flash images in near-real time from
every branch in the city and beyond. Every day
over a quarter of a million metro New Yorkers
pass under these lenses. When the bank upgrades
to digital in the next year or so, each image will be
recorded and archived for 45 days.
What alarms civil libertarians is that "no one knows
what happens to the tapes once they are recorded,
or what people are doing with them," as Norman
Siegel says. In fact, mass surveillance has created a
new kind of abuse. Last summer, a police sergeant
in Brooklyn blew the whistle on her fellow officers
for improper use of their cameras. "They were
taking pictures of civilian women in the area," says
the policewoman's attorney, Jeffrey Goldberg,
"from breast shots to the backside."
But you don't need a badge to spy, as plaintiffs
around the country are discovering:
At a Neiman-Marcus store in California, a
female worker discovered a hidden camera in the
ceiling of her changing room that was being
monitored by male colleagues. At the Sheraton
Boston Hotel, a union president invited a comrade
to view a videotape of himself in his underwear.
The hotel was monitoring its workers' changing
rooms.
In Maryland, a 17-year-old lifeguard was
videotaped changing into her bathing suit by her
supervisor at the county swimming pool. Elsewhere
in that state, a couple discovered that a neighbor
had installed two cameras behind bathroom heating
ducts and had monitored them for six months.
On Long Island, a couple discovered a pinhole
camera watching the bedroom of their rented
apartment. It had been planted by the owner. In
Manhattan, a landlord taped a tenant having sex
with his girlfriend in the hallway, and presented it
along with a suggestion that the tenant vacate the
premises. He did.
In this laissez-faire environment, whoever
possesses your image is free to distribute it. And
just as images of Bill Clinton leading a young
woman into his private alcove ended up on Fox
News, so can your most private moments if they
are deemed newsworthy--as one Santa Monica
woman learned to her horror when footage of her
lying pinned inside a crashed car, begging to know
if her children had died, ended up as infotainment.
The paramedic, as it turns out, was wired.
The harvest from hidden cameras can also end up
on the Internet, via the many Web sites that offer
pics of women caught unaware. There are hidden
toilet cams, gynocams, and even the intrepid
dildocam. Though some of these images are clearly
staged, others are real.Their popularity suggests
that whatever the rationale, surveillance cameras
resonate with our desire to gaze and be gazed
upon. As J.G. Ballard, author of the sci-fi classic
Crash, putsit, these candid-camera moments "plug
into us like piglets into a sow's teat, raising the
significance of the commonplace to almost
planetary dimensions. In their gaze, we expose
everything and reveal nothing." But exposure can
be a means to an end. "Once the new surveillance
systems become institutionalized and taken for
granted in a democratic society," warns Gary
Marx, they can be "used against those with the
'wrong' political beliefs; against racial, ethnic, or
religious minorities; and against those with lifestyles
that offend the majority."
Earlier this month, New York police taped large
portions of the Million Youth March in Harlem.In
the ensuing furor over whether the tapes accurately
portrayed the police response to a rowdy activist,
a more basic issue went unaddressed. Social
psychologists say that taping political events can
affect a participant's self-image, since being
surveilled is unconsciously associated with
criminality. Ordinary citizens shy away from politics
when they see activists subjected to scrutiny. As
this footage is splayed across the nightly news,
everyone gets the meta-message: hang with
dissenters and you'll end up in a police video.
But even ordinary life is altered by surveillance
creep. Once cameras reach a critical mass, they
create what the sociologist Erving Goffman called,
"a total institution," instilling barely perceptible
feelings of self-consciousness. This process
operates below the surface of everyday
awareness, gradually eroding the anonymity people
expect in cities. Deprived of public privacy, most
people behave in ways that make them
indistinguishable: you're less likely to kiss on a park
bench if you know it will be on film. Over the long
run, mass monitoring works like peer pressure,
breeding conformity without seeming to.
Communications professor Carl Botan
documented these effects in a 1996 study of
workplace surveillance. Employees who knew they
were being surveilled reported higher levels of
uncertainty than their co-workers: they were more
distrustful of bosses, their self-esteem suffered, and
they became less likely to communicate. The result
was "a distressed work force."
The anxiety of being watched by an unseen eye is
so acute that the 18th-century philosopher Jeremy
Bentham made it the basis of his plan for a humane
prison, in which inmates were to be controlled by
the knowledge that they might be under
observation. Bentham called this instrument of
ambiguity the Panopticon.
Ever since then, the power of the watcher over the
watched has been a focal point of thinking about
social control. The philosopher Michel Foucault
regarded the panoptic force as an organizing
feature of complex societies. Surveillance, Foucault
concluded, is the modern way of achieving social
coherence--but at a heavy cost to individuality.
Spycams are the latest incarnation of this impulse.
Welcome to the New Improved
Panopticon.Twenty-five years ago, Mayor John V.
Lindsay installed cameras in Times Square. But he
took them down after 18 months because they
only led to 10 arrests--causing The New York
Times to call this experiment "the longest-running
flop on the Great White Way." No such ridicule
has greeted Giuliani's far more ambitious
surveillance plans and his cheeky assertion that
"you don't have an expectation of privacy in public
spaces."
It's a brave new world, but very different from the
ones imagined by Aldous Huxley and George
Orwell. Nineteen Eighty Four taught us to be
alert to the black-booted tyrant. The Truman
Show updates this Orwellian model as the saga of
an ordinary man whose life is controlled by an
omniscient "creator," a TV producer who orders
the 5000 cameras surrounding his star to zoom in
or pull back for the perfect shot.
As inheritors of Orwell's vision, we are unable to
grasp the soft tyranny of today's surveillance
society, where authority is so diffuse it's
discreet.There is no Big Brother in Spycam City.
Only thousands of watchers--a ragtag army as
likely to include your neighbor as your boss or the
police. In 1998, anybody could be watching you.
This is the first of a three-part series.
Part Two: Behold Jennifer, the Surveillance
Celebrity
Additional reporting: Emily Wax. Research:
Michael Kolber
-----------------------
NOTE: In accordance with Title 17 U.S.C. section 107, this material is
distributed without profit or payment to those who have expressed a prior
interest in receiving this information for non-profit research and
educational purposes only. For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml
-----------------------
**********************************************
To subscribe or unsubscribe, email:
majordomo(a)majordomo.pobox.com
with the message:
(un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************
1
0
From: Bridget973(a)aol.com
Subject: IP: Fwd: [Spooks] CIA needs spies. Care to join?
Date: Tue, 6 Oct 1998 19:10:31 EDT
To: ignition-point(a)majordomo.pobox.com
Subject: [Spooks] CIA needs spies. Care to join?
Date: Mon, 05 Oct 1998 22:48:59 -0500
From: Bob Margolis <rttyman(a)wwa.com>
To: Spooks <spooks(a)qth.net>
>From the Christian Science Monitor--OCT 5
Cheers,
Bob Margolis
===========
Help Wanted
The blonde - a cross between TV's ``La Femme Nikita'' and a
Washington lawyer - grins knowingly out of the glossy pages of an
international news magazine.
``Do you have what it takes?'' asks the bold advertising line just
over her shoulder, paid for by the Directorate of Operations (DO), the
clandestine service of the Central Intelligence Agency.
``Did you see that one?'' CIA Director George Tenet asks
enthusiastically of the ad. ``We worked on another one that says, 'If
you ever liked taking apart your radio and putting it back together,
we might have a job for you.'''
Blame the tight labor market, budget cuts, or low morale fueled by
post-cold-war mission confusion, but the ad in London's The Economist
illustrates an acute problem the CIA no longer wants to keep secret:
It's fast running out of spies.
To counter the flight of experienced operatives trained in
skullduggery, the agency has embarked on the most aggressive
recruiting drive in its five-decade history. If it can't bolster the
number of case officers, experts say, the CIA runs the risk of being
caught flat-footed, as with India's nuclear tests this spring, which
caught the agency - and thus the United States - unawares.
``We anticipate the current program will rebuild the
operations-officer cadre by more than 30 percent over the next seven
years,'' says CIA spokeswoman Anya Guilsher. Augmenting a national
media campaign is the college-campus recruitment program that has been
under way for years.
But while the agency used to actively recruit at 120 colleges, it
is now concentrating its efforts at half that number, pinpointing
universities with strong computer and technical programs and those
with large numbers of minorities.
In addition to the fresh crop of college graduates, the worldly
wise are also encouraged to apply.
``We are also looking for people with international experience,
languages, business experience. You are not necessarily going to get
someone like that right out of college,'' says Ms. Guilsher. Congress
is pumping a classified amount of money into the recruitment effort.
The DO began experiencing sharp losses in personnel nearly seven
years ago, after the fall of the Soviet Union. By last year, the
number of people leaving the agency exceeded fresh recruits by 3 or 4
to 1.
Insiders cite a number of reasons for the departures, including
overall mission drift and the way the CIA has handled spy scandals,
including mole Aldrich Ames, who funneled secrets to Moscow from 1985
until his arrest in 1994.
Such demoralizing headlines underscore the agency's need for fresh
recruits as Tenet seeks to reform the CIA. The current hiring drive
was already in the planning stages when the CIA's failure to detect
India's nuclear tests last spring solidified recruiting resolve from
Capitol Hill to the CIA's suburban headquarters in McLean, Va.
``If you had the right number of people in the field doing the
right thing, the failure wouldn't have occurred,'' says a
congressional source familiar with agency operations.
Intelligence observers estimate total agency employees at just over
16,000. One estimate places the total number of case workers in the
field at less than 1,000. ``My guess is most Americans would overguess
by 10- to 20-fold the numbers out there spying [for the CIA],'' the
source says.
It'S not just the manner in which the recruitment calls are sounded
that is changing.
The agency is also overhauling the way it handles would-be spies.
In the past, applicants could expect to wait more than a year and a
half as their application crawled through the hiring bureaucracy.
In today's tight labor market, many applicants were simply walking
away, signing on to higher-paying jobs in the private sector.
Today, a CIA contact is assigned to answer applicants' questions,
and the agency claims the hiring period has been compressed to six to
eight months. ``We're overhauling our entire recruitment system,''
says Tenet.
Still, the agency is constricted by government pay scales -
starting pay for a professional trainee is $30,000, about $5,000 less
than what the average college graduate received this year.
What a CIA job can provide is the cachet of being a CIA agent - the
lure of being in the know on world affairs. The agency also recruits
using a rarely discussed theme these days: patriotism.
``Patriotism is not a word used much anymore ... but there are
still people who learn about the CIA's mission and understand that it
really does have an important purpose and function and want to work in
the agency,'' says Ronald Kessler, author of ``Inside the CIA.''
Once in, today's trainees receive a more intensive, highly
technical education than in the past. ``You can't collect
[intelligence] in rocket science if you don't know about rocket
science,'' says a congressional source. Today, a case officer in the
field receives an average of one to three years of training.
Part of the need for greater numbers is sparked by the reopening of
an undisclosed number of stations in former East Bloc countries, which
were closed in the early 1990s.
The CIA says the reopenings are not necessarily to spy on former
cold-war adversaries, but rather to monitor a region now transformed
into a crossroads for weapons for hire.
---
Submissions should be sent to spooks(a)qth.net
To unsubscribe, send "unsubscribe spooks" to majordomo(a)qth.net
--
bridget973(a)aol.com
Black Helicopters on the Horizon:
http://members.xoom.com/bridget973
**********************************************
To subscribe or unsubscribe, email:
majordomo(a)majordomo.pobox.com
with the message:
(un)subscribe ignition-point email@address
**********************************************
www.telepath.com/believer
**********************************************
1
0