back to front page
******************************************************************************

            An Indictment of the U.S. Government and U.S. Politics


                           Cryptography Manifesto
                           ----------------------
                              By guy@panix.com
                              7/4/97-L version

  
          "The law does not allow me to testify on any aspect of the
           National Security Agency, even to the Senate Intelligence
           Committee" ---General Allen, Director of the NSA, 1975
  

          "You bastards!" ---guy


******************************************************************************
 
       This is about much more than just cryptography. It is also about
       everyone in the U.S.A. being fingerprinted for a defacto national
       ID card, about massive illegal domestic spying by the NSA, about
       the Military being in control of key politicians, about always
       being in a state of war, and about cybernetic control of society.

******************************************************************************


             Part 1: Massive Domestic Spying via NSA ECHELON
             ---- -  ------- -------- ------ --- --- -------

                     o The NSA Admits
                     o Secret Court
                     o Wild Conspiracy Theory
                     o Over the Top
                     o BAM-BAM-BAM
                     o Australian ECHELON Spotted
                     o New Zealand: Unhappy Campers


             Part 2: On Monitoring and Being Monitored
             ---- -  -- ---------- --- ----- ---------

                     o On Monitoring
                        - Driver's Seat
                        - Five Months Statistics
                        - The FBI Investigations
                        - I Can See What You Are Thinking
                        - Why I Monitor
                     o On Being Monitored


             Part 3: 1984 Means a Constant State of War
             ---- -  ---- ----- - -------- ----- -- ---

                     War #1  -  Drugs
                     War #2  -  Guns
                     War #3  -  Child Pornography
                     War #4  -  Terrorism
                     War #5  -  Hackers


             Part 4: Why unlimited cryptography must be legislated NOW
             ---- -  --- --------- ------------ ---- -- ---------- ---

                     o Key Recovery Means No Cryptography
                     o Key Recovery Isn't Even Feasible
                     o Government Steamroller
                     o Feds' Wacky Pro-GAK Logic
                       - Business Will Demand It
                       - To Safeguard Your Privacy


             Part 5: There is no part five
             ---- -  ----- -- -- ---- ----

             Part 6: Louis Freeh & The Creeping Police State
             ---- -  ----- -----   --- -------- ------ -----

                     o Louis Freeh
                     o National ID Card
                     o Worldwide Banking and Phone Monitoring
                     o Cybernetic Control of Society
                     o Conclusions


******************************************************************************


    ECHELON is NSA's world-wide surveillance network and associated software.

    DICTIONARY - Keyword searching with exclusion logic software.

    ORATORY - Speech recognition. Think of it as speech-to-text software.
              Subject to DICTIONARY searches.

    CALEA   - A 1994 law ("Communications Assistance to Law Enforcement Act")
              to force a massive reworking of the U.S. telephone infra-
              structure so that the government can intrinsically wiretap it.
              Also called the FBI Digital Telephony Act. It is a domestic
              extension of ECHELON.

    GAK     - Government Access [to cryptographic] Keys. Any cryptography
              product with GAK has been compromised so the government can
              read it.

    SIGINT  - Signals Intelligence = NSA = electronic snooping

    Key Recovery - See GAK.

    C-SPAN  - Two cable channels dedicated to broadcasting both houses of
              Congress and other U.S. governmental functions.

    DEA    -  U.S. Drug Enforcement Administration
    DIA    -  U.S. Pentagon Defense Intelligence Agency
    DIA    -  U.S. Drug Interdiction Agency (older)

    FBI    -  U.S. Federal Bureau of Investigation

    BATF   -  U.S. Bureau of Alcohol, Tobacco, and Firearms

    UKUSA  -  pronounced 'you-koo-za' - a secret wartime treaty that says
              member nations can spy on each others population without
              warrants or limits, and that this can be shared with the
              spied-on country's SIGINT agency.

    PGP    -  Free and unbreakable encryption, available world-wide.

    CISPES -  Committee in Solidarity with the People of El Salvador


    "Ultra-secret" agencies:

    NSA    - U.S. National Security Agency

    GCHQ   - British Government Communications Headquarters

    CSE    - Canada's Communications Security Establishment

    DSD    - Australian Defense Signals Directorate

    GCSB   - New Zealand's Government Communications Security Bureau



******************************************************************************

                                 Main()
                                 ----


Using mainly publicly available material, here is my documentation of:


    o Part 1: Massive Domestic Spying via NSA ECHELON

              This is highly detailed documentation of NSA spying.
              This spying is illegal, massive, and domestic.
              The documentation is comprehensive, especially since
              it is now brought together in this one section.
 
    o Part 2: On Monitoring and Being Monitored

              In this section, I describe the capabilities of ECHELON
              keyword monitoring. A detailed example --- how to use
              keywords to pick out conversations of interest --- is given.
              I also put forth a case of what it means to be monitored
              heavily by the government.

    o Part 3: 1984 Means a Constant State of War

              The politics of war, and the Orwellian tactics employed by
              by the U.S. Government to control its citizens.

    o Part 4: Why unlimited cryptography must be legislated NOW

              In additional to the reasons given in the previous sections,
              the 'debate' reasons constantly given by the government
              are reviewed and debunked. And our nation's experts say it
              will hurt security. The GAO says the same thing.

    o Part 5: There is no part five.
              
    o Part 6: Louis Freeh & The Creeping Police State

              Basically, Louis Freeh is the anti-Christ leading us to Hell.
              National ID cards are effectively being implemented without
              needing to issue cards. The U.S. Government is trying to
              monitor all phone calls and banking transactions, and have
              all equipment worldwide designed for their monitoring. They
              are bent on controlling the world to the point of there being
              no crime left on the planet. Of course, democracy destroyed
              is the direct result.


----
This publication advocates five major items: o Passage of ProCode/SAFE legislation, allowing U.S. companies to export unlimited strength cryptography, free from "Key Recovery". Key Recovery means messages are no longer a secret, because the Government has screwed around with it. o Killing the CALEA legislation, which orders all communications equipment be DESIGNED so the Government can spy on it. o Dismantling domestic ECHELON, the Government listening in on our domestic phone calls. o A Cabinet-level U.S. Privacy Commission, with teeth. ---- The "average" American has no idea why cryptography is important to them. It is the only way to begin preventing massive illegal domestic spying. Currently, there are no restrictions on domestic use of unlimited strength cryptography. That is not because the Government hasn't complained about child pornographers or terrorists or other criminals who might use it. No, that's the reason they are giving for why U.S. companies can't EXPORT products, such as web browsers, outside U.S. territory, without compromising it with Government "Key Recovery"; i.e. made stupider and breakable. Why such an indirect control on what they claim is a domestic problem? Because that is how 'The Creeping Police State' works. Slowly, bit-by-bit. Slowly, State-by-State everyone in the U.S. is being fingerprinted. The FBI is now advocating biometric capture of all newborns too. This is an interesting manifesto, please take the time to read it. Cryptography can be used to keep private: Internet traffic, such as email, and telephone conversations (PGP phone). A version of PGP phone that looks and works like a normal telephone --- but can't be spied upon --- would eventually become wide-spread. It begins to change the mind-set that the Police State is inevitable. ---- Major references... In the last several years intelligence operatives, specifically including SIGINT (signal intelligence) people, have started telling the story about the massive domestic use of computer monitoring software in the U.S. Including our domestic phone calls, Internet, fax, everything. I'm going to quote a number of articles and books; they involved talking to over 100 of these intelligence operatives. Buy this book: "Secret Power" by Nicky Hager, ISBN 0-908802-35-8. It describes in detail the ECHELON platform. It's one of the most important. New Zealand people are quite unhappy at their place within ECHELON. Buy this book: "Spyworld: Inside the Canadian and American Intelligence Establishments" By Mike Frost [NSA trained sigint person] and Michel Gratton, Toronto Doubleday 1994. Mr. Frost describes missions in the U.S. where he was trained by the NSA to handle domestic jobs that would be illegal for the NSA. These books are quite damning, in a heavily documented way. This is an AMAZINGLY COMPREHENSIVE BOOK: buy it! "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996 Buy this book: "The Secret War Against the Jews", Authors: John Loftus and Mark Aarons, ISBN 0-312-11057-X, 1994. Don't let the title throw you: the authors spoke with a great many intelligence people, and cleverly probed NSA/CIA/FBI by submitting items for publication approval, and when they censored something... Bingo. Because of the Catch-22 situation, the NSA gave up trying to censor many books, since it can be used to confirm questions they would otherwise have refused to answer. The other books referenced within are also suggested reading. I have sometimes edited for brevity the excerpts, especially my newspaper clippings of stories flying by. If I have any news story specifics wrong or if you have more details, please email me. Later versions of this document can be searched for at dejanews.com. Or, you can email me, Subject: Requesting Cryptography Manifesto. ---- ---- Here comes a large 'reasoned polemic': ---- This is a U.S.-centric message, but keep reading even if you are not in the U.S.; British, Canadian, Australian and New Zealand citizens are also directly affected. This message is about ECHELON, which is an unbelievably huge world-wide spying apparatus, including the domestic phone calls of many countries. United States citizens' phone calls are being monitored in a dragnet fashion not even George Orwell could have imagined. This was all paid for by U.S. taxpayers. Built in secret. Not debated. The CALEA legislation is a shameful takes-us-into-the-abyss domestic spy bill. It is for the FBI to simultaneously monitor HUGE amounts of our phone calls. And when the judiciary found out about NSA monitoring U.S. citizens' overseas telephone calls without a warrant: they approved the loss of our Fourth Amendment rights. Giving Presidential Directives the same force of law as the Constitution. Congress has lost it too. * The New York Times, undated * * The House is not expected to vote on the search-and-seizure bill until * at least Wednesday. But tonight the Republicans defeated a Democratic * amendment that SIMPLY REITERATED THE WORDS OF THE FOURTH AMENDMENT OF * THE UNITED STATES CONSTITUTION. * * The vote was 303 to 121. * * The Democrats were trying to portray the Republicans as wanting to * eliminate the constitutional protection against unlawful searches. * * Indeed, they cornered the Republicans into saying that the measure * containing the Fourth Amendment would gut the seizure bill. Just what is it going to take to restore the U.S. Constitution? Unlimited unregulated cryptography legislation is a beginning baby-step. Otherwise it might take another civil war. The NSA will not let go quietly. Sound over-the-top? Wait until you understand the massive surveillance system that our government has put in place, just how powerful it is, and how they've used it repeatedly to control lawful peaceful political protest.