t byfield on Sun, 2 Apr 2000 17:37:09 +0200 (CEST) |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
<nettime> fwd: Cryptome Update 1 April 2000 |
----- Forwarded Date: Sun, 02 Apr 2000 08:22:35 -0400 To: Cryptome Update <[email protected]> From: Cryptome Update <[email protected]> Subject: Cryptome Update 1 April 2000 Cryptome Update - 25 March/1 April 2000 ----------------------------------------------------------------- DVD-CCA v. 521- Demand Letter to Cryptome, April 1, 2000 http://cryptome.org/dvd-v-521-dl.htm ----------------------------------------------------------------- ECHELON News - 1 April 2000, April 1, 2000 "Amid this mass of information of all kinds, it is here that we come to the thing that most worries Washington's and London's European partners. That is, the blow dealt by Echelon, and specifically by the English-speaking countries most involved in this system, to inter-allied solidarity. Nobody questions the pressing need to use every available means to combat the organized crime, terrorism, dugs trafficking, money laundering, and proliferation of mass destruction weapons engaged in by unscrupulous states or wealthy mafia groups. But Echelon extends well beyond that. In the European Parliament, the Fifteen feel uncomfortable about this intelligence hierarchy, and for the present the only response they have managed to find is to ask -- without any hope of success -- to join "The Club." All the more so inasmuch as Echelon is spreading and expanding. Those who have retired, or resigned, from its service are under increasing pressure to make their expertise available to private, very private, interests. To cite just a few examples, political movements, companies, business circles, banks, and consultancy firms regard these former agents as the goldmine that will provide them with the "moles" of the future." -- Jacques Isnard, Le Monde http://cryptome.org/echelon040100.htm ----------------------------------------------------------------- ECHELON Reports from Denmark, April 1, 2000 Former Canadian Security Establishment member describes Echelon procedures and targets. http://cryptome.org/echelon-eb2.htm ----------------------------------------------------------------- Electronic and Info Tech Accessibility Rule, March 31, 2000 "The Architectural and Transportation Barriers Compliance Board (Access Board) proposes accessibility standards for electronic and information technology covered by section 508 of the Rehabilitation Act Amendments of 1998. Section 508 requires the Access Board to publish standards setting forth a definition of electronic and information technology and the technical and functional performance criteria necessary for accessibility for such technology. Section 508 requires that when Federal agencies develop, procure, maintain, or use electronic and information technology, they shall ensure that the electronic and information technology allows Federal employees with disabilities to have access to and use of information and data that is comparable to the access to and use of information and data by Federal employees who are not individuals with disabilities, unless an undue burden would be imposed on the agency. Section 508 also requires that individuals with disabilities, who are members of the public seeking information or services from a Federal agency, have access to and use of information and data that is comparable to that provided to the public who are not individuals with disabilities, unless an undue burden would be imposed on the agency." -- Architectural and Transportation Barriers Compliance Board http://cryptome.org/atbcb033100.txt ----------------------------------------------------------------- FCC Inquiry on Software Defined Radio, March 31, 2000 "This document requests comments on "software defined radio", which the Commission believes could have wide range implications for radio technology and our regulatory policies. Software defined radios have the potential to change the way users can communicate across traditional services and to promote efficient use of spectrum. The Commission believes that software defined radios could significantly affect a number of Commission functions, including spectrum allocation, spectrum assignment, and equipment approval. The purpose of this inquiry is to gather information on the state of software defined radio technology, interoperability issues, spectrum efficiency issues, equipment authorization processes, and other relevant issues." -- Federal Communications Commission http://cryptome.org/fcc033100.txt ----------------------------------------------------------------- ECHELON News - 30 March 2000, March 30, 2000 "Today, European Commissioner Erkki Liikanen, responsible for Enterprise and Information Society, made a very blurry statement on Echelon. The commision was asked by the European Parliament if they could confirm the existence of Echelon, as described in the report of Duncan Campell. Mister Liikanen responded by stating first that the Commission has no competence on intelligence matters. It's the sole responsibility of the member states. The commissioner stated the Commission had sought clarification from the United Kingdom on Echelon. In a letter, received from the United Kingdom, it says according to commissioner Likanen, British intelligence services work within a legal framework which sets out explicitly the purposes for which interception may be authorised, namely national security, safeguarding the nation's economic well-being and the prevention and detection of serious crime.Commissioner Liikanen also mentioned a lettre from the United States government, it received a day before. According to Liikanen, the United States says its intelligence community is not engaged in industrial espionage and do not collect proprietary, technical or financial information for the benefit of private firms." -- Jelle van Buuren http://cryptome.org/echelon033000.htm ----------------------------------------------------------------- Senators Leahy, Kyl on Cyber Crime, March 30, 2000 "Encryption helps prevent cyber crime. That is why, for years, I have advocated and sponsored legislation to encourage the widespread use of strong encryption. Encryption is an important tool in our arsenal to protect the security of our computer information and networks. The Administration made enormous progress when it issued new regulations relaxing export controls on strong encryption. Of course, encryption technology cannot be the sole source of protection for our critical computer networks and computer-based infrastructure, but we need to make sure the government is encouraging -- and not restraining -- the use of strong encryption and other technical solutions to protecting our computer systems." -- Senator Patrick Leahy http://cryptome.org/leahy-kyl.htm ----------------------------------------------------------------- Holum and House Debate Export Controls, March 30, 2000 http://cryptome.org/jdh032800.htm ----------------------------------------------------------------- Federal Information Security: Actions Needed to Address Widespread, March 29, 2000 "Our recent audit findings in this area present a disturbing picture of the state of computer security practices at individual agencies. Our work--and the work of other audit entities--has demonstrated that many agencies' critical operations and processes are at serious risk of disruption because of weak security practices." -- Jack Brock, GAO, http://cryptome.org/ai00135t.htm ----------------------------------------------------------------- Electronic Snoopers Plunder Our Rights, March 28, 2000 "A much more important point flows from Mr. Woolsey's forthright acknowledgment of spying on U.S. allies. Whether or not detecting bribery is the true motive, the occasions in which a foreign company behaves corruptly can be uncovered only if its communications are routinely under surveillance, including when it acts lawfully. These communications are tracked by means of intercepting the world's communications arteries, which also carry the private messages of U.S. business and those of the citizens of every nation. Such surveillance is both highly secret and quite lawless. Yes, Mr. Woolsey, the French do it too. And the Russians. And the Chinese. But whichever government is doing the snooping, it amounts to a frontal attack on privacy and constitutional rights." -- Duncan Campbell http://cryptome.org/echelon-news.htm ----------------------------------------------------------------- European Parliament: Inquiry on Echelon, March 29, 2000 "The Green/EFA Group in the European Parliament presented today a list of 172 signatures of Members of European Parliament of all political groups, supporting the establishment of a Parliamentary Inquiry Committee on Echelon. This means there are enough signatures for an official demand on an inquiry on Echelon, an espionage system operated by the US, the UK and other countries. The existence of Echelon was revealed in the STOA-Reports. According to parliamentary rules, a quarter of the total number of members of parliament (which equals 157 members) is required for a demand on an inquiry." -- Jelle van Buuren http://cryptome.org/echelon-news.htm#EP ----------------------------------------------------------------- BXA Fines Computer Exporter, March 29, 2000 http://cryptome.org/bxa032700.htm ----------------------------------------------------------------- DoD Secret Meets, March 29, 2000 http://cryptome.org/dod032900.txt ----------------------------------------------------------------- Matthew Skala on Microsystems Settlement, March 27, 2000 http://cryptome.org/skala.htm ----------------------------------------------------------------- Second British Spy Laptop Lost, March 27, 2000 http://cryptome.org/mi6-laptop.htm ----------------------------------------------------------------- O f f s i t e ----------------------------------------------------------------- Air Force Intel Denies Red Cross Spying, April 1, 2000 "The US Air Force's AIA does not deny the 544th gathers intelligence on NGOs; but it does not admit to it either. What AIA says is that the briefing slide, which was used to explain to businesspeople what the 544th does, does not indicate the agency spies on NGOs or the Red Cross. "[T]he slide in no way, shape or form identifies NGOs as intelligence targets," says Maj. Joe Mecadon, Public Affairs Director at AIA headquarters, Kelly AFB, San Antonio, Texas. The slide couldn't have meant what the Ekstra Bladet says it means, says Mecadon. "[A]ny information related to specific intelligence targets, sources or methods is classified, so information of that type is deliberately excluded from unclassified materials." " -- David Ruppe. ABC News http://abcnews.go.com/sections/world/DailyNews/spying000331.html ----------------------------------------------------------------- EU Council to Eye UK USA Economic Spying, March 31, 2000 http://www.newsunlimited.co.uk/international/story/0,3604,154255,00.html ----------------------------------------------------------------- No Final Agreement on Convention on Mutual Assistance in Criminal Matters, March 28, 2000 "The European Council on Justice and Home Affairs on Monday didn't reach final agreement on the controversial Convention on Mutual Assistance in Criminal Matters. However, they reached agreement on the articles that make it possible to intercept subjects on the national territory of another Member State without seeking the technical assistance of the latter. Luxembourg blocked a final decision, because it wants to hold its banking secrecy out of the Convention." -- Jelle van Buuren, http://www.heise.de/tp/english/special/enfo/6691/1.html ----------------------------------------------------------------- Space Imagery and Foreign Policy, March 29, 2000 http://www.heise.de/tp/english/special/info/6694/1.html ----------------------------------------------------------------- ----------------------------------------------------------------- Cryptome Update by E-mail Sub: Blank e-mail to [email protected] Unsub: Blank e-mail to [email protected] http://cryptome.org ----------------------------------------------------------------- ----- Backwarded # distributed via <nettime>: no commercial use without permission # <nettime> is a moderated mailing list for net criticism, # collaborative text filtering and cultural politics of the nets # more info: [email protected] and "info nettime-l" in the msg body # archive: http://www.nettime.org contact: [email protected]