t byfield on Sun, 2 Apr 2000 17:37:09 +0200 (CEST)

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

<nettime> fwd: Cryptome Update 1 April 2000

----- Forwarded

Date: Sun, 02 Apr 2000 08:22:35 -0400
To: Cryptome Update <update@cryptome.org>
From: Cryptome Update <update@cryptome.org>
Subject: Cryptome Update 1 April 2000

Cryptome Update - 25 March/1 April 2000


DVD-CCA v. 521- Demand Letter to Cryptome, April 1, 2000



ECHELON News - 1 April 2000, April 1, 2000

"Amid this mass of information of all kinds, it is here that we 
come to the thing that most worries Washington's and London's 
European partners. That is, the blow dealt by Echelon, and 
specifically by the English-speaking countries most involved in 
this system, to inter-allied solidarity. Nobody questions the 
pressing need to use every available means to combat the 
organized crime, terrorism, dugs trafficking, money laundering, 
and proliferation of mass destruction weapons engaged in by 
unscrupulous states or wealthy mafia groups. But Echelon 
extends well beyond that. In the European Parliament, the 
Fifteen feel uncomfortable about this intelligence hierarchy, 
and for the present the only response they have managed to find 
is to ask -- without any hope of success -- to join "The Club." 
All the more so inasmuch as Echelon is spreading and expanding. 
Those who have retired, or resigned, from its service are under 
increasing pressure to make their expertise available to 
private, very private, interests. To cite just a few examples, 
political movements, companies, business circles, banks, and 
consultancy firms regard these former agents as the goldmine 
that will provide them with the "moles" of the future." 
-- Jacques Isnard, Le Monde



ECHELON Reports from Denmark, April 1, 2000

Former Canadian Security Establishment member describes Echelon
procedures and targets.



Electronic and Info Tech Accessibility Rule, March 31, 2000

"The Architectural and Transportation Barriers Compliance Board 
(Access Board) proposes accessibility standards for electronic 
and information technology covered by section 508 of the 
Rehabilitation Act Amendments of 1998. Section 508 requires the 
Access Board to publish standards setting forth a definition of 
electronic and information technology and the technical and 
functional performance criteria necessary for accessibility for 
such technology. Section 508 requires that when Federal 
agencies develop, procure, maintain, or use electronic and 
information technology, they shall ensure that the electronic 
and information technology allows Federal employees with 
disabilities to have access to and use of information and data 
that is comparable to the access to and use of information and 
data by Federal employees who are not individuals with 
disabilities, unless an undue burden would be imposed on the 
agency. Section 508 also requires that individuals with 
disabilities, who are members of the public seeking information 
or services from a Federal agency, have access to and use of 
information and data that is comparable to that provided to the 
public who are not individuals with disabilities, unless an 
undue burden would be imposed on the agency."
-- Architectural and Transportation Barriers Compliance Board



FCC Inquiry on Software Defined Radio, March 31, 2000

"This document requests comments on "software defined radio", 
which the Commission believes could have wide range implications 
for radio technology and our regulatory policies. Software 
defined radios have the potential to change the way users can 
communicate across traditional services and to promote efficient 
use of spectrum. The Commission believes that software defined 
radios could significantly affect a number of Commission 
functions, including spectrum allocation, spectrum assignment, 

and equipment approval. The purpose of this inquiry is to 
gather information on the state of software defined radio 
technology, interoperability issues, spectrum efficiency issues, 
equipment authorization processes, and other relevant issues."
-- Federal Communications Commission



ECHELON News - 30 March 2000, March 30, 2000

"Today, European Commissioner Erkki Liikanen, responsible for 
Enterprise and Information Society, made a very blurry statement 
on Echelon. The commision was asked by the European Parliament if 
they could confirm the existence of Echelon, as described in the 
report of Duncan Campell. Mister Liikanen responded by stating 
first that the Commission has no competence on intelligence 
matters. It's the sole responsibility of the member states. The 
commissioner stated the Commission had sought clarification from 
the United Kingdom on Echelon. In a letter, received from the 
United Kingdom, it says according to commissioner Likanen, 
British intelligence services work within a legal framework which 
sets out explicitly the purposes for which interception may be 
authorised, namely national security, safeguarding the nation's 
economic well-being and the prevention and detection of serious 
crime.Commissioner Liikanen also mentioned a lettre from the 
United States government, it received a day before. According 
to Liikanen, the United States says its intelligence community 
is not engaged in industrial espionage and do not collect 
proprietary, technical or financial information for the benefit 
of private firms." -- Jelle van Buuren



Senators Leahy, Kyl on Cyber Crime, March 30, 2000

"Encryption helps prevent cyber crime. That is why, for years, I 
have advocated and sponsored legislation to encourage the 
widespread use of strong encryption. Encryption is an important 
tool in our arsenal to protect the security of our computer 
information and networks. The Administration made enormous 
progress when it issued new regulations relaxing export controls 
on strong encryption. Of course, encryption technology cannot be 
the sole source of protection for our critical computer networks 
and computer-based infrastructure, but we need to make sure the 
government is encouraging -- and not restraining -- the use of 
strong encryption and other technical solutions to protecting
our computer systems." -- Senator Patrick Leahy



Holum and House Debate Export Controls, March 30, 2000



Federal Information Security: Actions Needed to Address Widespread,
March 29, 2000

"Our recent audit findings in this area present a disturbing 
picture of the state of computer security practices at individual 
agencies. Our work--and the work of other audit entities--has 
demonstrated that many agencies' critical operations and processes 
are at serious risk of disruption because of weak security 
practices." -- Jack Brock, GAO, 



Electronic Snoopers Plunder Our Rights, March 28, 2000

"A much more important point flows from Mr. Woolsey's forthright
acknowledgment of spying on U.S. allies. Whether or not detecting 
bribery is the true motive, the occasions in which a foreign 
company behaves corruptly can be uncovered only if its 
communications are routinely under surveillance, including when 
it acts lawfully. These communications are tracked by means of 
intercepting the world's communications arteries, which also 
carry the private messages of U.S. business and those of the 
citizens of every nation. Such surveillance is both highly 

secret and quite lawless. Yes, Mr. Woolsey, the French do it 
too. And the Russians. And the Chinese. But whichever government 
is doing the snooping, it amounts to a frontal attack on 
privacy and constitutional rights." -- Duncan Campbell



European Parliament: Inquiry on Echelon, March 29, 2000

"The Green/EFA Group in the European Parliament presented today a 
list of 172 signatures of Members of European Parliament of all 
political groups, supporting the establishment of a Parliamentary 
Inquiry Committee on Echelon. This means there are enough 
signatures for an official demand on an inquiry on Echelon, an 
espionage system operated by the US, the UK and other countries. 
The existence of Echelon was revealed in the STOA-Reports. 
According to  parliamentary rules, a quarter of the total number 
of members of parliament (which equals 157 members) is required 
for a demand on an inquiry." -- Jelle van Buuren



BXA Fines Computer Exporter, March 29, 2000



DoD Secret Meets, March 29, 2000



Matthew Skala on Microsystems Settlement, March 27, 2000



Second British Spy Laptop Lost, March 27, 2000



O f f s i t e

Air Force Intel Denies Red Cross Spying, April 1, 2000

"The US Air Force's AIA does not deny the 544th gathers 
intelligence on NGOs; but it does not admit to it either. What AIA 
says is that the briefing slide, which was used to explain to 
businesspeople what the 544th does, does not indicate the agency 
spies on NGOs or the Red Cross. "[T]he slide in no way, shape or 
form identifies NGOs as intelligence targets," says Maj. Joe 
Mecadon, Public Affairs Director at AIA headquarters, Kelly AFB, 
San Antonio, Texas. The slide couldn't have meant what the 
Ekstra Bladet says it means, says Mecadon. "[A]ny information 
related to specific intelligence targets, sources or methods 
is classified, so information of that type is deliberately 
excluded from unclassified materials." " 
-- David Ruppe. ABC News



EU Council to Eye UK USA Economic Spying, March 31, 2000



No Final Agreement on Convention on Mutual Assistance in Criminal 
Matters, March 28, 2000

"The European Council on Justice and Home Affairs on Monday didn't 
reach final agreement on the controversial Convention on Mutual 
Assistance in Criminal Matters. However, they reached agreement on 
the articles that make it possible to intercept subjects on the 
national territory of another Member State without seeking the 
technical assistance of the latter. Luxembourg blocked a final 
decision, because it wants to hold its banking secrecy out of 
the Convention." -- Jelle van Buuren,



Space Imagery and Foreign Policy, March 29, 2000



Cryptome Update by E-mail

Sub:   Blank e-mail to list@cryptome.org
Unsub: Blank e-mail to unlist@cryptome.org



----- Backwarded

#  distributed via <nettime>: no commercial use without permission
#  <nettime> is a moderated mailing list for net criticism,
#  collaborative text filtering and cultural politics of the nets
#  more info: majordomo@bbs.thing.net and "info nettime-l" in the msg body
#  archive: http://www.nettime.org contact: nettime@bbs.thing.net