-Caveat Lector- from alt.politics.org.cia ----- As always, Caveat Lector. Om K ----- <A HREF="aol://5863:126/alt.politics.org.cia:40552">Intelink: the secret internet</A> ----- Subject: Intelink: the secret internet From: "Allen L. Barker" <[EMAIL PROTECTED]> Date: Sun, Dec 6, 1998 11:15 PM Message-id: <[EMAIL PROTECTED]> The _Washington Post_ reported on the US government's secret internet system Intelink on Dec. 1: http://search.washingtonpost.com/wp- srv/WPlate/1998-12/01/038l-120198-idx.html An excerpt: Switched on in late 1994, the network is now used regularly by 50,000 analysts, operatives, military officers and policymakers with top-secret security clearances at 100 different sites. They can click on the latest satellite imagery from the National Imagery and Mapping Agency (NIMA), search the network for communications intercepts from the National Security Agency (NSA) and chat electronically with analysts of various stripes about the latest terrorist threats and military maneuvers. I wonder what sort of accountability there is against the misuse (or at least the misuse against official or unofficial policy) of a secret communication system like this. Hey I'm monitoring these guys under surveillance and you wouldn't believe... What if we got together and... I think so-and-so is a terrorist, harass her... Of course the secret internet would not be anything like the public internet stripped of any and all public accountability.... -- Allen L. Barker http://www.cs.virginia.edu/~alb ===== Subject: Re: Intelink: the secret internet From: [EMAIL PROTECTED] (Allen Thomson) Date: Tue, Dec 8, 1998 8:07 AM Message-id: <[EMAIL PROTECTED]> > >I'd expect a greater level of accountability on such a system, with extreme >safeguards in place for the protection of classfied information. It would, >perhaps, be a means for those authorized access, to exchange classified >information ranging from confidential through super-double secret special, >in accomplishing their daily duties, however mundane they may be. > >That's just a guess though. I am not implying, in any way, that I have, or >have ever had, access to such a system, if indeed one truly exists. It does exist, your understanding is correct, and there is a book about it, complete with a CD-ROM showing (unclassified, one assumes) examples of traffic. From amazon.com: --------------------------------------------------------------- Top Secret Intranet : The Story of Intelink : How U.S. Intelligence Built the Largest, Most Secure Network (Goldfarb Series) by Frederick Thomas Martin Paperback - 400 pages Bk&Cd Rom edition (October 1998) Prentice Hall Computer Books; ISBN: 0130808989 About the Author FREDRICK THOMAS MARTIN began his career with the U.S. Intelligence Community in 1960 on the front lines as a linguist and intelligence analyst in the Middle East. He currently serves as the Deputy Director of the Information Services Group of the National Security Agency. He also chairs that agency's Standards Executive Steering Group, and represents NSA within the Intelligence Community on the ----- Aloha, He'Ping, Om, Shalom, Salaam. Em Hotep, Peace Be, Omnia Bona Bonis, All My Relations. Adieu, Adios, Aloha. Amen. Roads End Kris DECLARATION & DISCLAIMER ========== CTRL is a discussion and informational exchange list. Proselyzting propagandic screeds are not allowed. Substance—not soapboxing! These are sordid matters and 'conspiracy theory', with its many half-truths, misdirections and outright frauds is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRL gives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credeence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om