-Caveat Lector-

this is robert kemp...ring a bell? JED?  instigator?

HACK THE DOMINANT MINDSET, I SAY

wondered what exactly, THESE days, is going on with that...i read some so-called interview with you and thought i heard you say something to the effect that you had been there at the inception of JED (Jam Echelon Day) number one...i really don't recall you there i must admit - could you refresh memory? i DO remember the help of chuck0 and rdom and grant bayley..many thanks to http://wiretapped.net

i have many readers and they will anxiously await your response:

http://indymedia.org

http://www.memes.org

http://www.synearth.net

http://groups.yahoo.com/group/psy-op/

 

and what about the accusations of Wired as NSA front?  james glave certainly did NOT cooperate with the will of the group...and his pal broncbuster threatened me in an email in no uncertain terms..and he is/was supposedly from 2600.com - and linda thompson? pleeeze!

~~~~~

~I garnered governmental attention by fathering a
stunt commonly known as Jam Echelon Day. Cooked up in
the fall of 1999, it was a largely publicity oriented
campaign designed to shed some light on a system of
electronic surveillance that had gone on unchecked,
indeed even unrecognized for too long. Since it is
harder for someone to get information from you that
you wish kept secret if you know that they are there,
we dove headlong into it and by "we" I mean myself and
Grant Bayley - HTML designer for the original JED
website at wiretapped.net. Of course, after its
launch, the world took over spreading the word. Six
months or so later, Echelon was detailed on Sixty
Minutes having gone from being a nutty conspiracy
theory to knowledge in the public domain. It is the
kind of thing that will get you on the shit list of
the powerful.~

The original campaign
http://serendipity.magnet.ch/cia/bz1.html

The village voice on the event: an article based on a
by-phone interview i conducted with Sarah Ferguson
under the name of robert kemp
http://www.villagevoice.com/issues/9942/ferguson.php

~This accomplished another thing that I consider
important: the spreading of some revolutionary memes
or paradigms. Firstly, some people became acquainted,
for the first time, with the notion that two people
who were not among the "powerful" could spark a global
movement. Secondly, that the campaign was taken up
globally in several languages said to the world, "We
can be one."

Needless to say, these paradigms are the enemy of
social control. We made the National Security Agency
look bad and in the ensuing three years I would be
subject to an insidious variety of psychological
operations designed to destabilize and discredit.
Various manner of confusing techniques would be used
after a few months of having operatives "befriend" me
in order to discover what made me tick. By getting an
idea of my belief system it would become easier to
undo my "uppitiness." I would be targeted for
"re-education."

A program designed to track down corporate critics
called Cybersleuth would enable such entities to track
me for such purposes. The ability to pin-point the
geographical precision your detractors was used as one
of E-watch's selling points in the marketing of this
program. I would later read that the CIA used the
term "re-education" to mean, quite literally,
brainwashing.~

Cybersleuth
http://www.ewatch.com/pop_sleuth.html

Tracking so-called "perpetrators" is also part of the
service, says eWatch National Product Manager Ted
Skinner. That's done by "using a variety of methods,
such as following leads found in postings and Web
sites, working with ISPs, involving law enforcement,
conducting virtual stings and other tactics," he says.
http://www.businessweek.com/bwdaily/dnflash/july2000/nf00707g.htm

~Also see the below links.~

Local activists under government and corporate
surveillance
http://groups.yahoo.com/group/psy-op/message/267

~There is a man named James Glave that writes for
Wired magazine and it was wired that first picked up
our campaign. James Glave was on the Hacktivism list
during all discussions of the planned event so he was
in on all of the information from the get go. Yet,
when he wrote the article for Wired, entitled 'Hackers
Ascend Upper Echelon,' the text contained grossly
innacurate information. For one, the event was said
to have been initiated by Linda Thompson's American
Justice Federation, a right-wing tank of people that I
would come, over the years, to know as fame-starved
and unscrupulous. Linda Thompson was not on the list
nor was she involved in any way. Also, the date of
the event was misrepresented as October 18, 1999
instead of October 21 as per the globally distributed
alert. This was designed, in my opinion, to have the
following effects:

1. By attributing the event to the AJF and associating
it with Linda Thompson, it would be sneered at, even
laughed at as just another right-wing paranoia push.

2. By claiming the date as October 18 instead of
October 21, confusion would be wrought taking steam
out of the campaign.

3. With the date switch, the side sought-after affect
of Jam Echelon Day which was that, in case it DID
create logistical problems for the NSA's computers
this would allow for organizers of the NEXT DAY'S Stop
Police Brutality Day to plan with less spooky
oversight.~

Hackers Ascend Upper Echelon
http://www.wired.com/news/politics/0,1283,31726,00.html

~What I would later find out is that Wired magazine
employs a significant amount of ex-NSA employees.~

MASSIVE DISINFO CAMPAIGN UNDERWAY RE: JAM ECHELON DAY
Robert Kemp ([EMAIL PROTECTED])
Thu, 07 Oct 1999 13:38:01 EDT
http://aspin.asu.edu/hpn/archives/Oct99/0045.html

~The above link refers to the disinformation campaign
that I speak of. In response to the dissemination of
this second alert, James Glave's cronie
[EMAIL PROTECTED]  would email me and threaten me,
albeit vaguely. Over the next three years I would
have some twenty email accounts hacked into, have
passwords changed, etc.

Considering that the NSA is the world's largest
employer of mathemeticians and that the NSA is the
premier governmental surveillance outfit - AND that
the internet WAS devised by the Department of Defense,
it is no surprise that I would be easily tracked over
the next three years of travelling and "worked on."
Perhaps I should have taken heed early in the
campaign. After posting the alert to about fifty
newsgroups, I arrived at a newsgroup entitled NSA-info
(if I recall correctly). As the newsgroup's window
popped up on my screen I noticed that someone had
posted something entitled 'Echelon' just two minutes
prior to my own arrival at the newsgroup. "How
serendipitous," I thought. All the text read was
"Listening..."

Not serendipitous but contrived.

more at http://groups.yahoo.com/group/psy-op/message/10758

~~~~~

From:  "brother smiley" <[EMAIL PROTECTED]>
Date:  Mon Jun 3, 2002  9:09 pm
Subject:  Magic Lantern and recent worms



>From: MichaelP <[EMAIL PROTECTED]>
>To: undisclosed-recipients:;
>Subject: Magic Lantern and recent worms
>Date: Fri, 31 May 2002 10:05:28 -0500 (CDT)
>Received: from [128.206.49.181] by hotmail.com (3.2) with ESMTP id MHotMailBEC41C3300094004311C80CE31B551160; Sun, 02 Jun 2002 19:15:16 -0700
>Received: from localhost (lists@localhost)by chumbly.math.missouri.edu (8.9.1a/8.9.1) with SMTP id VAA1447696for <[EMAIL PROTECTED]>; Sun, 2 Jun 2002 21:15:15 -0500 (CDT)
>Received: by chumbly.math.missouri.edu (bulk_mailer v1.9); Sun, 2 Jun 2002 21:15:15 -0500
>From [EMAIL PROTECTED] Sun, 02 Jun 2002 19:16:16 -0700
>Organization: ?
>Article: 139461
>Message-ID: <[EMAIL PROTECTED]>
>
>It's worth meditating on the question of whether the recent "worm"
>epidemic is independent of the "Magic Lantern" scheme.
> I havn't been pointed to anything recent that's specific on the subject,
>and I havn't, myself, been receiving any signs
>of infection other than that some spam schemes seem to be posting to open
>lists and accusing the list-owners of spreading the worm.
>
>Cheers
>MichaelP
>
>================================
>
> http://www.wired.com/news/conflict/0,2100,48648,00.html
>
>'Lantern' Backdoor Flap Rages
> By Declan McCullagh
> 8:25 a.m. Nov. 27, 2001 PST
>
> WASHINGTON -- Network Associates has been snared in a web of
>accusations over whether it will place backdoors for the U.S. government
>in its security software.
>
>Since Network Associates (NETA) makes popular security products, including
>McAfee anti-virus software and Pretty Good Privacy encryption software,
>reports of a special arrangement with the U.S. government have drawn
>protests and threats of a boycott.
>
>The flap started last week, when news reports began to appear about an FBI
>project code-named "Magic Lantern." Details are sketchy, but Magic Lantern
>reportedly works by masquerading as an innocent e-mail attachment that
>will insert FBI spyware inside your computer.
>
>In the past, the FBI has said publicly that agents have been flummoxed by
>suspects using encryption, something that software such as Magic Lantern
>could circumvent by secretly recording a passphrase and secret encryption
>key, then forwarding the confidential data to the feds.
>
>An Associated Press article then reported that "at least one antivirus
>software company, McAfee Corp., contacted the FBI ... to ensure its
>software wouldn't inadvertently detect the bureau's snooping software and
>alert a criminal suspect."
>
>Condemnation from security mavens was quick and fierce. Columnist Brett
>Glass echoed the Slashdot crowd when he said: "Network Associates has
>shown that it is willing to compromise its integrity by selling
>intentionally faulty products. For this reason, it is no longer
>appropriate or wise for those concerned about the security of their
>networks, systems or confidential data to use them."
>
>Other security mavens pointed to free software projects such as
>openvirus.org as more trustworthy alternatives to Network Associates'
>McAfee anti-virus products, and GPG as a replacement for Network
>Associates' PGP encryption software.
>
>The criticism raised a well-known point in security circles: Security
>software, including PGP and anti-virus products ware, is either looking
>out for your interests or those of the government. It can't do both.
>
>But on Monday, Network Associates denied contacting the FBI.
>
>In a statement released late in the day, a spokeswoman for the company
>made four points:
> "1. Network Associates/McAfee.com Corporation has not contacted the FBI,
>nor has the FBI contacted NAI/McAfee.com Corp. regarding Magic Lantern.
> 2. We do not expect the FBI to contact Network Associates/McAfee.com
>Corporation regarding Magic Lantern."
> 3. Network Associates/McAfee.com Corp. is not going to speculate on
>Magic Lantern as it's (sic) existence has not even been confirmed by the
>FBI or any government agency.
> 4. Network Associates/McAfee.com Corporation does and will continue to
>comply with any and all U.S. laws and legislation."
>
>Sharp-eyed critics pointed to the narrowness of Network Associates'
>denial: It did not rule out the possibility of conversations with the
>White House, the Justice Department or even conversations with the FBI
>about a product with identical capabilities that was not called Magic
>Lantern. Network Associates also did not pledge to reject future pleas
>from the FBI done in the absence of legislation making backdoors
>mandatory.
>
>In an e-mail, Network Associates was asked to clarify with this question:
>"Can you assure ... that Network Associates/McAfee has not had any contact
>with any law enforcement or intelligence agencies or other government
>entities including Congress or the White House about Magic Lantern or a
>product with capabilities it is reported to have?"
>
>Tony Thompson, a spokesman for the company, replied: "You are correct.
>We have not."
>
>Thompson also rejected the possibility of any conversations with the
>government between Network Associates or other anti-virus vendors taking
>place informally through trade associations in Washington.
>
>For his part, Ted Bridis, a veteran reporter for the Associated Press,
>says he stands by his story from last week that reported the link between
>the FBI and Network Associates.
>
>Bridis wrote in an e-mail message Monday afternoon, "I stand by my
>reporting for the AP. This information came from a senior company officer.
>I won't identify this person in this post because I've been unable to
>reach this person by phone or e-mail since the flap erupted."
>
>"I can't resolve what McAfee told me last week and today's contradictory
>statement except to note the critical public response against McAfee that
>emerged over the holiday weekend," Bridis added.
>
>In a well-documented incident that was tried in court in New Jersey, the
>FBI sneaked into an alleged mobster's office to implant PGP
>password-sniffing software in his Windows computer. Since that approach
>requires physical breaking and entering, FBI agents seem to want to be
>able to bypass encryption without leaving their desks.
>
> The feds have worked with technology companies in the past to insert
>backdoors for surveillance and eavesdropping.
>
>To gain an export license, IBM's Lotus subsidiary weakened the encryption
>used in its Lotus Notes program so the U.S. government could readily
>penetrate it. (All versions of Notes use 64-bit keys, but export versions
>of Notes gave a portion of the key to the U.S. government, allowing
>federal agencies to decode Notes-encrypted files in real-time.)
>
>In his 1982 book The Puzzle Palace, author James Bamford recounted how the
>National Security Agency's predecessor coerced Western Union, RCA, and ITT
>Communications to turn over telegraph traffic to the feds in 1945.
>
>"Cooperation may be expected for the complete intercept coverage of this
>material," an internal agency memo said.
>
>ITT and RCA gave the government full access, while Western Union limited
>the number of messages it handed over. The arrangement, according to
>Bamford, lasted at least two decades.
>
>In 1995, The Baltimore Sun reported that for decades the NSA had rigged
>the encryption products of Crypto, a Swiss firm, so U.S. eavesdroppers
>could easily break their codes.
>
>The six-part story, based on interviews with former employees and company
>documents, said Crypto sold its security products to some 12 countries,
>including prime U.S. intelligence targets such as Iran, Iraq, Libya and
>Yugoslavia. Crypto disputed the allegation.
>
>====================================

no offense.

um - i just joined your politech list...hope you don't mind: http://www.politechbot.com

 

 



xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

DARPA is "soliciting innovative proposals to (1) determine whether genetically-determined odortypes can be used to identify specific individuals, and if so (2) to develop the science and enabling technology for detecting and identifying specific individuals by such odortypes." See DARPA's presolicitation notice for the "Odortype Detection Program," December 13, here.



Do you Yahoo!?
<A HREF="">www.ctrl.org</A> DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substance—not soap-boxing—please! These are sordid matters and 'conspiracy theory'—with its many half-truths, mis- directions and outright frauds—is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html <A HREF="">Archives of [EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/ <A HREF="">ctrl</A> ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om Yahoo! Mail Plus - Powerful. Affordable. Sign up now

Reply via email to