Maybe somebody ought to send that quote as a singing telegram to Cheeney, or Bush, or....... Mueller so they get a Hint where the secret passwords that were used to pass on a threat might have come from.
The White House Phone System Boondoggle - The Clinton administration may have broken the law FR
Reno ignored 'Big Brother' FBI: Justice dropped ball on Hillary's secret database
Webb Hubbell and Big Brother (WHODB)
Whistle-Blower Stuns White House
Charles Wilbourne Miller - Arkancide
Why Red China Targeted the Clinton White House
"The safe room holding the keys is what Charlie Smith, president of Virginia-based Softwar Co. and a critic of Clipper, calls the "Mission: Impossible" room, with the big mainframe computer, stacks of classified data, secret radio frequencies and wired alarm systems. "It's a highly classified library with guards," Smith says. "The clipper or key recovery as it is currently being called was supposed to protect government secrets. Instead, they have built an electronic version of Pearl Harbor and put it neatly in one little row where one guy can walk in and then walk out with it."
There also are others involved in Clinton fund-raising to whom congressional committees are anxious to pose questions about interest in secret U.S. technology. Ira Sockowitz, a Clinton administration lawyer, admitted during a deposition with Judicial Watch, a Washington-based watchdog group pursuing the Clipper documents in relation to Huang's activities at Commerce, that he walked out of the Commerce Department with CIA, NSC and NSA classified files on encryption or decoding software, spy satellites, China, Russia and other countries. Sockowitz, who had a top-secret clearance, was appointed by Clinton to serve as a special legal counsel in Commerce. He says he simply was transferring the files to his new post at the Small Business Administration, where he became deputy administrator in the spring of 1996. The records removed contain some 2,800 pages, including a classified report called "A Study of the International Market for Computer Software With Encryption."
Sockowitz, now a Washington consultant, claims he never met Huang, although the two men worked together on the Asian Pacific American Working Group -the principal unit in the DNC responsible for raising about $7 million in campaign contributions in the Asian communities during 1996 - much of it returned because of questionable origins.
How spooky does it get? An odd link to this story is that the NSA chose Arkansas-based Systematics on Sept. 14, 1990, to construct the "Mission: Impossible" room called the Secured Compartmentalized Information Facility, or SCIF, in Fort Gillem, Ga., according to an unclassified NSA memo. At that time Systematics was run by Jackson Stephens who, along with Mochtar Riady and James Riady controlled Lippo's Worthen bank, which gave Clinton a multimillion-dollar loan to get through the 1992 presidential election. The same Lippo Group, which later dumped Worthen, is linked to China Resources, a front for Chinese military-intelligence operations, say U.S. defense intelligence sources.
The concern of the U.S. intelligence community is whether Chinese agents penetrated the SCIF. An NSA staffer notes that the Chinese once managed to bug the Russian Embassy in Beijing, and that if they built the SCIF "they could do a lot of things there."
The White House "Big Brother" Data Base & How Jackson Stephens Precipitated a Banking Crisis
JACKSON STEPHENS: Out-Sourcing Big Brother - Systematics - AllTel - Acxiom