| t byfield on Sun, 2 Apr 2000 17:37:09 +0200 (CEST) |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
| <nettime> fwd: Cryptome Update 1 April 2000 |
----- Forwarded
Date: Sun, 02 Apr 2000 08:22:35 -0400
To: Cryptome Update <update@cryptome.org>
From: Cryptome Update <update@cryptome.org>
Subject: Cryptome Update 1 April 2000
Cryptome Update - 25 March/1 April 2000
-----------------------------------------------------------------
DVD-CCA v. 521- Demand Letter to Cryptome, April 1, 2000
http://cryptome.org/dvd-v-521-dl.htm
-----------------------------------------------------------------
ECHELON News - 1 April 2000, April 1, 2000
"Amid this mass of information of all kinds, it is here that we
come to the thing that most worries Washington's and London's
European partners. That is, the blow dealt by Echelon, and
specifically by the English-speaking countries most involved in
this system, to inter-allied solidarity. Nobody questions the
pressing need to use every available means to combat the
organized crime, terrorism, dugs trafficking, money laundering,
and proliferation of mass destruction weapons engaged in by
unscrupulous states or wealthy mafia groups. But Echelon
extends well beyond that. In the European Parliament, the
Fifteen feel uncomfortable about this intelligence hierarchy,
and for the present the only response they have managed to find
is to ask -- without any hope of success -- to join "The Club."
All the more so inasmuch as Echelon is spreading and expanding.
Those who have retired, or resigned, from its service are under
increasing pressure to make their expertise available to
private, very private, interests. To cite just a few examples,
political movements, companies, business circles, banks, and
consultancy firms regard these former agents as the goldmine
that will provide them with the "moles" of the future."
-- Jacques Isnard, Le Monde
http://cryptome.org/echelon040100.htm
-----------------------------------------------------------------
ECHELON Reports from Denmark, April 1, 2000
Former Canadian Security Establishment member describes Echelon
procedures and targets.
http://cryptome.org/echelon-eb2.htm
-----------------------------------------------------------------
Electronic and Info Tech Accessibility Rule, March 31, 2000
"The Architectural and Transportation Barriers Compliance Board
(Access Board) proposes accessibility standards for electronic
and information technology covered by section 508 of the
Rehabilitation Act Amendments of 1998. Section 508 requires the
Access Board to publish standards setting forth a definition of
electronic and information technology and the technical and
functional performance criteria necessary for accessibility for
such technology. Section 508 requires that when Federal
agencies develop, procure, maintain, or use electronic and
information technology, they shall ensure that the electronic
and information technology allows Federal employees with
disabilities to have access to and use of information and data
that is comparable to the access to and use of information and
data by Federal employees who are not individuals with
disabilities, unless an undue burden would be imposed on the
agency. Section 508 also requires that individuals with
disabilities, who are members of the public seeking information
or services from a Federal agency, have access to and use of
information and data that is comparable to that provided to the
public who are not individuals with disabilities, unless an
undue burden would be imposed on the agency."
-- Architectural and Transportation Barriers Compliance Board
http://cryptome.org/atbcb033100.txt
-----------------------------------------------------------------
FCC Inquiry on Software Defined Radio, March 31, 2000
"This document requests comments on "software defined radio",
which the Commission believes could have wide range implications
for radio technology and our regulatory policies. Software
defined radios have the potential to change the way users can
communicate across traditional services and to promote efficient
use of spectrum. The Commission believes that software defined
radios could significantly affect a number of Commission
functions, including spectrum allocation, spectrum assignment,
and equipment approval. The purpose of this inquiry is to
gather information on the state of software defined radio
technology, interoperability issues, spectrum efficiency issues,
equipment authorization processes, and other relevant issues."
-- Federal Communications Commission
http://cryptome.org/fcc033100.txt
-----------------------------------------------------------------
ECHELON News - 30 March 2000, March 30, 2000
"Today, European Commissioner Erkki Liikanen, responsible for
Enterprise and Information Society, made a very blurry statement
on Echelon. The commision was asked by the European Parliament if
they could confirm the existence of Echelon, as described in the
report of Duncan Campell. Mister Liikanen responded by stating
first that the Commission has no competence on intelligence
matters. It's the sole responsibility of the member states. The
commissioner stated the Commission had sought clarification from
the United Kingdom on Echelon. In a letter, received from the
United Kingdom, it says according to commissioner Likanen,
British intelligence services work within a legal framework which
sets out explicitly the purposes for which interception may be
authorised, namely national security, safeguarding the nation's
economic well-being and the prevention and detection of serious
crime.Commissioner Liikanen also mentioned a lettre from the
United States government, it received a day before. According
to Liikanen, the United States says its intelligence community
is not engaged in industrial espionage and do not collect
proprietary, technical or financial information for the benefit
of private firms." -- Jelle van Buuren
http://cryptome.org/echelon033000.htm
-----------------------------------------------------------------
Senators Leahy, Kyl on Cyber Crime, March 30, 2000
"Encryption helps prevent cyber crime. That is why, for years, I
have advocated and sponsored legislation to encourage the
widespread use of strong encryption. Encryption is an important
tool in our arsenal to protect the security of our computer
information and networks. The Administration made enormous
progress when it issued new regulations relaxing export controls
on strong encryption. Of course, encryption technology cannot be
the sole source of protection for our critical computer networks
and computer-based infrastructure, but we need to make sure the
government is encouraging -- and not restraining -- the use of
strong encryption and other technical solutions to protecting
our computer systems." -- Senator Patrick Leahy
http://cryptome.org/leahy-kyl.htm
-----------------------------------------------------------------
Holum and House Debate Export Controls, March 30, 2000
http://cryptome.org/jdh032800.htm
-----------------------------------------------------------------
Federal Information Security: Actions Needed to Address Widespread,
March 29, 2000
"Our recent audit findings in this area present a disturbing
picture of the state of computer security practices at individual
agencies. Our work--and the work of other audit entities--has
demonstrated that many agencies' critical operations and processes
are at serious risk of disruption because of weak security
practices." -- Jack Brock, GAO,
http://cryptome.org/ai00135t.htm
-----------------------------------------------------------------
Electronic Snoopers Plunder Our Rights, March 28, 2000
"A much more important point flows from Mr. Woolsey's forthright
acknowledgment of spying on U.S. allies. Whether or not detecting
bribery is the true motive, the occasions in which a foreign
company behaves corruptly can be uncovered only if its
communications are routinely under surveillance, including when
it acts lawfully. These communications are tracked by means of
intercepting the world's communications arteries, which also
carry the private messages of U.S. business and those of the
citizens of every nation. Such surveillance is both highly
secret and quite lawless. Yes, Mr. Woolsey, the French do it
too. And the Russians. And the Chinese. But whichever government
is doing the snooping, it amounts to a frontal attack on
privacy and constitutional rights." -- Duncan Campbell
http://cryptome.org/echelon-news.htm
-----------------------------------------------------------------
European Parliament: Inquiry on Echelon, March 29, 2000
"The Green/EFA Group in the European Parliament presented today a
list of 172 signatures of Members of European Parliament of all
political groups, supporting the establishment of a Parliamentary
Inquiry Committee on Echelon. This means there are enough
signatures for an official demand on an inquiry on Echelon, an
espionage system operated by the US, the UK and other countries.
The existence of Echelon was revealed in the STOA-Reports.
According to parliamentary rules, a quarter of the total number
of members of parliament (which equals 157 members) is required
for a demand on an inquiry." -- Jelle van Buuren
http://cryptome.org/echelon-news.htm#EP
-----------------------------------------------------------------
BXA Fines Computer Exporter, March 29, 2000
http://cryptome.org/bxa032700.htm
-----------------------------------------------------------------
DoD Secret Meets, March 29, 2000
http://cryptome.org/dod032900.txt
-----------------------------------------------------------------
Matthew Skala on Microsystems Settlement, March 27, 2000
http://cryptome.org/skala.htm
-----------------------------------------------------------------
Second British Spy Laptop Lost, March 27, 2000
http://cryptome.org/mi6-laptop.htm
-----------------------------------------------------------------
O f f s i t e
-----------------------------------------------------------------
Air Force Intel Denies Red Cross Spying, April 1, 2000
"The US Air Force's AIA does not deny the 544th gathers
intelligence on NGOs; but it does not admit to it either. What AIA
says is that the briefing slide, which was used to explain to
businesspeople what the 544th does, does not indicate the agency
spies on NGOs or the Red Cross. "[T]he slide in no way, shape or
form identifies NGOs as intelligence targets," says Maj. Joe
Mecadon, Public Affairs Director at AIA headquarters, Kelly AFB,
San Antonio, Texas. The slide couldn't have meant what the
Ekstra Bladet says it means, says Mecadon. "[A]ny information
related to specific intelligence targets, sources or methods
is classified, so information of that type is deliberately
excluded from unclassified materials." "
-- David Ruppe. ABC News
http://abcnews.go.com/sections/world/DailyNews/spying000331.html
-----------------------------------------------------------------
EU Council to Eye UK USA Economic Spying, March 31, 2000
http://www.newsunlimited.co.uk/international/story/0,3604,154255,00.html
-----------------------------------------------------------------
No Final Agreement on Convention on Mutual Assistance in Criminal
Matters, March 28, 2000
"The European Council on Justice and Home Affairs on Monday didn't
reach final agreement on the controversial Convention on Mutual
Assistance in Criminal Matters. However, they reached agreement on
the articles that make it possible to intercept subjects on the
national territory of another Member State without seeking the
technical assistance of the latter. Luxembourg blocked a final
decision, because it wants to hold its banking secrecy out of
the Convention." -- Jelle van Buuren,
http://www.heise.de/tp/english/special/enfo/6691/1.html
-----------------------------------------------------------------
Space Imagery and Foreign Policy, March 29, 2000
http://www.heise.de/tp/english/special/info/6694/1.html
-----------------------------------------------------------------
-----------------------------------------------------------------
Cryptome Update by E-mail
Sub: Blank e-mail to list@cryptome.org
Unsub: Blank e-mail to unlist@cryptome.org
http://cryptome.org
-----------------------------------------------------------------
----- Backwarded
# distributed via <nettime>: no commercial use without permission
# <nettime> is a moderated mailing list for net criticism,
# collaborative text filtering and cultural politics of the nets
# more info: majordomo@bbs.thing.net and "info nettime-l" in the msg body
# archive: http://www.nettime.org contact: nettime@bbs.thing.net