1/9/11 and historical wiretaps

Lee @ Royal Gardens lee at royalgardens.us
Wed Mar 23 13:53:18 PDT 2011


Pre for oBSama.com documentary.

(200)1-09-11 or 1911 simplified to "9/11" in the American system was a
manifestation of a turf war between the us treasury secret service,
department of justice including dea and FBI, oss derivatives, and military
dia defense intelligence agency and factions like disa. Though the troubled
situation was existing previously and most parties already involved, it
became structured in the context known to history when a number of small
children were exploited as newspaper carriers.
During the 1980s through to a set of legal clarifications in the late 1990s,
child labour such as newspaper delivery by children under legal working age
was considered child exploitation and illegal under both federal and
international law. In this prominent historical case, the children serving
as newspaper delivery in a quaint neighbourhood were being used to finance
hobby projects such as a network of bbs systems which they ran entirely
themselves. as these communication systems expended their influence in the
dawn of the technological revolution, they were used for automatic
distribution of public interest content and electronic media and became the
primary conduit between eastern new York and northern Europe due to cleaner
telephone lines more direct in both directions. by 1993 and 1994, these
children were subject of heated political disputes contrasting their
benevolent educational activities financed by illicit child labour
exploitation with trans-national automatic distribution of public interest
content and its frequent payload of age-restricted material and shareware
license generators. with international distribution of significant volumes
of data, some of which could easily have come from controlled sources, this
hobby project financed by newspaper delivery drew the attention of most
federal authorities and related international parties. by 1994, the doj FBI
espionage division, treasury secret service, military intelligence including
dia (and Cia for foreign data), us customs for the trans-border transfer of
content, even the us dea drug enforcement administration for the
distribution of "cracks" (and coordination thereof in a small urban
environment) were all involved. the children, still pre-teen, simply
continued their highly regarded activities and provided a large percentage
of the intellectual content and shareware traffic between Europe and eastern
usa. A specific legal situation generated conflict between a majority of the
legal and investigating parties as us secret service was obligated to defend
the exploited children against corrupt practices of the department of
justice which would have led to further direct exploit and customs and
military were also at odds due to strife and inconsistent policy. as
military interests trump civilian, the defense intelligence agency activated
a special unit to track information leaks and distribution mechanisms
including these kids' bbs by active participation. in contradiction, USSS
ncmec and doj amongst others contradicted the dod and NATO interests by
bringing the situation of the exploited children to the UN as both a
security and policy issue. the modern internet was only starting to develop
at this time, sponsored mainly by the American institution which saw a
potential for global propaganda distribution, and various factions of the us
dept of commerce and defense intelligence agency chose to encourage consumer
use of computer devices and found case models such as these to be ideal
templates. as the military dealt with the transition between centrally
managed data systems and these new console devices entities such as Disa
defense information systems agency and others encouraged making use of
public sector communication noise to obscure the the transport of data for
ic (nefarious intelligence) purposes. they selected to sponsor various
mechanisms of distribution including bbs and early internet systems in
specific high relevance regions and also maneuvered to take over
distribution logistics including software and electronic media distributors
and primary sources such as the shareware and "warez" originators. since dia
also manages foreign espionage against the united states and its interests,
this further generated rifts between military and counter-espionage
authorities such as the FBI and us customs. by 1996 or 1997, internet based
information distribution originators were the primary unique source of data
and the dominant traffic proved to be the widespread distribution of games.
as "intelligence" entities tend to avoid trackable modes of communication,
the us military defense intelligence agency dia took over control and
operation of the primary and most widespread distributor of consumer
content, the "warez" group Razor1911.

as the parties involved evolved, the scope of the control and coordination
structures were more clear, fully managed by the contrasting policy and
interests of commerce and governing entities and related antagonistic
interests of military intelligence.

the scope of Razor1911 as a global intelligence front for a plethora of
countries and organizations was vast on paper but concise and limited in
context. Razor1911, based originally in Sweden and then controlled by the
American dia and NATO, served as a primary cornerstone for information
propagation to a global audience and even provided the opportunity for
competing intelligence factions to use their own distribution originators
such as DOD "Drink or Die" and many others, all closely related.

in the same context as the exploited children were used for content
distribution, these patsy fronts exploited the best interests of the
international community to ensure that the opportunity was maintained to use
these distribution channels for specific propaganda or hidden messages.

[[
The small countries of Connecticut, Sweden, Norway, and related institutions
like the confederate militias were selected as primary players as their
histories and political claims are closely interrelated.
]]

the over abundance of watching parties, any modernized country or commercial
intelligence faction, provided not only a wiretap on each of thousands of
contacted devices (especially an American fisa "entity" tap order) but
layers of both semi-legal and illegal wiretaps for anyone interested and
even wiretaps on wiretaps which sold everything to black market as well.

one of these taps, actually a cable modem circuit used since 1996 and never
taken out of the "test service" mode, constantly reported all data on wire
to over 40 countries and hundreds of minor police entities which then
redistributed their illicit gains for profit. in June of 2001, a laptop
device owned by travellers insurance company connected to this cable modem's
wireless accesspoint for an intense work-at-home debate about a commercial
insurance account. the client was the world trade center complex in new York
city including the twin towers brought to public attention in 2001.09.11.

the world trade center buildings, especially the twin towers, were a
prominent and significant concern for the insurance company -- having had
damage to the foundation from a car bomb in 1993 and a subway repair project
-- the buildings were in need of significant repair. though built after epa
orders against such, the twin towers used significant amounts of compressed
asbestos cement (white crystal powder) and could not be repaired without
"bagging" the entire building and complex. Alternate options included trying
to dismantle the WTC towers which would have been a severe blow to American
ego, letting it stand and hope for the best, or illegally repair without
full protocol given the size of the project. if the WTC towers were left
alone, a fracture or failure of the foundation would have caused a 3 block
radius of nyc to be obliterated with unpredictable domino cascade results
for adjacent buildings as the towers fell over.  The best option was
controlled demolition; the most severe blow to the American psyche possible.

the year 2000 calendar audits for technological devices, known as y2k
popularly, discovered some severe problems in a wide diversity of legacy
electronic systems including the fly-by-wire autopilot system required in
all commercial jets since the early 1970s. one primary factor was that a set
of flight control systems which typically handle routine aircraft control
but also provide a system so that norad and other radar systems can help
prevent mid-air collisions by slightly adjusting their course and to control
evasive maneuvers of the civilian jet in the remote case of an unguided heat
seeking missile targeting the passenger aircraft. because this later fact
was deemed sensitive and classified, an uproar in the auditing community
brought attention to both the clock problems in the autopilot system and the
presence of the override circuit. more importantly in 1999 and 2000,
techniques to generate the override control signals were demonstrated using
a retail laptop or pda with a simple radio and even a module was submitted
to the "Microsoft flight simulator" community website to demonstrate the
remote control of commercial jets in the simulator -- the encryption used on
the norad signal and autopilot radio circuit was antiquated and easily
determined with the computer.

[jumping out of an elevator in the fbi 101:]





More information about the cypherpunks-legacy mailing list