Posted on 11/24/2001 8:32:51 PM PST by OKCSubmariner
The FBI is developing a kind of trojan horse software that they can use to intercept voice-over-net communications. Presently, they can tap phones, and they can capture computer keystrokes, but they can't listen in to voice communications over the net. Enter the "Magic Lantern".
It's part of a wider FBI project called "Cyber Knight." Cyber Knight would allow investigators to secretly install over the Internet powerful eavesdropping software that records every keystroke on a person's computer, according to people familiar with the effort. Magic Lantern would let them listen in to voice over data communications.
Magic Lantern could be installed over the Internet by tricking a person into double-clicking an e-mail attachment or by exploiting some of the same weaknesses in popular commercial software that allow hackers to break into computers. That is what a "Trojan Horse" is.
Criminals, Terrorists and Foreign Spies
At least one antivirus software company, McAfee Corp., contacted the FBI on Wednesday to ensure its software wouldn't inadvertently detect the bureau's snooping software and alert a criminal suspect. The FBI software could be used with a court order against criminals, terrorists or foreign spies.
Who would qualify? According to a flyer issued by the FBI, someone who fits a terrorist profile would include "Doomsday Cult-Type Groups".
Fitting The Profile
The FBI identifies what it calls "Super Patriots" and describes as "'defenders' of the US Constitution against federal government and UN" as being among those who fit the terrorist profile. That is where this gets scary. I fit the profile. I am a fundamentalist. I believe we are living in the last days. I am a patriot who believes in the Constitution. I believe the UN is the forerunner of the global government of antichrist.
It Couldn't Happen Here
The Apostle John describes the government under antichrist. He says it will be global. [Rev 13:8] It will derive its power from control of a global economy. [Rev 13:17] It will slaughter all those who believe in Jesus. [Rev 13:7]. It will practice a form of counterfeit Christianity [Rev 13:11] that Paul describes as 'having a form of godliness but denying the power thereof' [2 Timothy 3:5].
The United States is not the whole world. It is actually only a tiny part of it, representing less than 5% of the global population. But America has always served as a benchmark for individual liberty and a restrainer of those who would steal that liberty.
A Christian Nation, Despite the Naysayers
Despite what the liberals say, America is and has always been a nation that functions under Christian principles, even when called by a different name. Less now than at its foundation, but still, America remains the most Christian nation on the face of the earth.
Even if it falls far short of what it could be, it is still head and shoulders above any other on that score. Most Americans reading John's description of one world under antichrist dismiss it as something that 'can't happen here'. And it couldn't, even a decade ago.
What It All Means
America has steadily been eroding those elements of our freedoms that would have presented a stumbling block to the antichrist. The reasons sound noble enough. Eliminating terror and terror networks worldwide is a noble cause. It seems right. "There is a way which seemeth right unto a man, but the end thereof are the ways of death," wrote Solomon under the inspiration of the Holy Spirit in Proverbs 14:12. And that same Spirit felt that one fact important enough to repeat in Proverbs 16:25.
The Evolution of America
This is America -- still the freest nation the world has ever known. But it is evolving, forced into compromising those freedoms by circumstances beyond its control. That evolution is embodied by such things as the Operation CyberKnight, Operation Magic Lantern, Project Echelon, Project Carnivore, the Inslaw Project and others.
A Tracked Society
Those projects are transforming us into a tracked society. A society in which membership in the 'wrong' group, adherence to the 'wrong' values, belief in the 'wrong' theology can mean social death. How close is it? Consider what would happen if your social security account was closed. Without a Social Security number, you couldn't work, have a bank account, get a mortgage, or even rent an apartment. You couldn't earn a living. In short, you would be socially dead.
The Specter of Social Death
Membership in the wrong group today -- in America! -- can easily result in social death. Under antichrist, John says membership in the wrong group -- those who do not join his system symbolized by accepting a "mark" become socially dead. "And that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name." [Rev 13:17]. It couldn't happen here only a decade ago. For 1900 years it couldn't happen anywhere.
John was writing under the inspiration of the Holy Spirit of God Who knew it would happen everywhere, one day, in a single generation, somewhere in time. This generation. It isn't here yet. But it is fast approaching. You'd have to be blind to not see it coming. If it is this close, the Rapture of the Church is even closer. Where do you stand with Jesus? Time is running out. Click on the Salvation? link at the bottom of the page to find out more.
Suggest you brush up your reading comprehension skillz.
Or the "Christian Identity" kooks. I was talking about real Christians.
The FBI will let the American people know what's going on. Hahahaha. LOL! Click here Or better yet, click the photo:
FBI software cracks encryption wall - Magic Lantern part of new Enhanced Carnivore Project
The FBI is laughing, especially with the name.
FBI Is Building a 'Magic Lantern' Stop Carnivore
Alan McDonald, a senior executive with the Federal Bureau of Investigation, says that "extremist" positions on electronic encryption are a threat to normal law enforcement and are elitist and nondemocratic. Insisting that the United States had remained true to the Constitution and to a system of ordered liberties, McDonald says: "When people don't know much about electronic surveillance, they are fearful of it. But when they know Congress passed laws and the Supreme Court reviewed them and that there are numerous constraints and procedures, then it makes sense to them. It seems rational and balanced." (TechWire 25 Sep 97)
FBI software would allow Net eavesdropping
FBI and "White Knight Hackers"
"Espionage: How Washington Booby-Trapped All the World's Computers"
FBI turns tables on Russian hackers - Agents break into overseas computers to gather evidence
FBI runs Trojan horse
"The discovery comes only weeks after the Bureau made a motion to suppress evidence about the use of similar technology in the recent US versus Nicodemo Scarfo case. The FBI claimed that releasing information about the technology would jeopardise current as well as future investigations."
FBI wants to keep technology secret
"The FBI is trying to keep secret technical details of a keystroke-logging program it used to catch a Mob loan shark. A mandate from a New Jersey judge calling for a report "detailing how the key logger device functions", by 31 August, has been claimed by the US government to be so sensitive that if revealed, "national security" could be at risk.
The FBI is now seeking to invoke the Classified Information Procedures Act (CIPA), so that details are not supplied." CIPA
Govt. Invokes National Security Law In Mob Hacking Case
National Homeland Security Initiated Two Years Ago
EXECUTIVE ORDER 13083 - Effective Date May 14, 1998
eo13083
EXECUTIVE EO 13083
ORDER Effective Date May 14, 1998
_______________________________________________________________________
Responsible Office: Z\ Office of Policy and Plans
Subject: Federalism
By the authority vested in me as President by the Constitution and the laws of the United States of America, and in order to guarantee the division of governmental responsibilities, embodied in the Constitution, between the Federal Government and the States that was intended by the Framers and application of those principles by the Executive departments and agencies in the formulation and implementation of policies, it is hereby ordered as follows:
Section 1. Definitions. For purposes of this order:
(a) ìStateî or ìStatesî refer to the States of the United States of America, individually or
collectively, and, where relevant, to State governments, including units of local government and other political subdivisions established by the States.
(b) ìPolicies that have federalism implicationsî refers to Federal regulations, proposed
legislation, and other policy statements or actions that have substantial, direct effects on the States or on the relationship, or the distribution of power and responsibilities, between the Federal Government and the States.
(c) ìAgencyî means any authority of the United States that is an ìagencyî under 44 U.S.C.
3502(l), other than those considered to be independent regulatory agencies, as defined in 44
U.S.C. 3502(5).
Sec. 2. Fundamental Federalism Participles In formulating and implementing policies that have federalism implications, agencies shall be guided by the following fundamental federalism principles:
(a) The structure of government established by the Constitution is premised upon a system
of checks and balances.
(b) The Constitution created a Federal Government of supreme, but limited, powers. The
sovereign powers not granted to the Federal Government are reserved to the people or to the
States, unless prohibited to the States by the Constitution.
(c) Federalism reflects the principle that dividing power between the Federal Government
and the States serves to protect individual liberty. Preserving State authority provides an essential balance to the power of the Federal Government, while preserving the supremacy of Federal law provides an essential balance to the power of the States.
(d) The people of the States are at liberty, subject only to the limitations in the Constitution
itself or in Federal law, to define the moral, political, and legal character of their lives.
(e) Our constitutional system encourages a healthy diversity in the public policies adopted
by the people of the several States according to their own conditions, needs, and desires. States and local governments are often uniquely situated to discern the sentiments of the people and to govern accordingly.
(f) Effective public policy is often achieved when there is competition among the several
States in the fashioning of different approaches to public policy issues. The search for enlightened public policy is often furthered when individual States and local governments are free to experiment with a variety of approaches to public issues. Uniform, national approaches to public policy problems can inhibit the creation of effective solutions to those problems.
(g) Policies of the Federal Government should recognize the responsibility of-and should
encourage opportunities for-States, local governments, private associations, neighborhoods,
families, and individuals to achieve personal, social, environmental, and economic objectives
through cooperative effort.
Sec. 3. Federalism Policymaking Criteria. In addition to adhering to the fundamental federalism principles set forth in section 2 of this order, agencies shall adhere, to the extent permitted by law, to the following criteria when formulating and implementing policies that have federalism implications:
(a) There should be strict adherence to constitutional principles. Agencies should closely
examine the constitutional and statutory authority supporting any Federal action that would limit
the policymaking discretion of States and local governments, and should carefully assess the
necessity for such action.
(b) Agencies may limit the policymaking discretion of States and local governments only
after determining that there is constitutional and legal authority for the action.
(c) With respect to Federal statutes and regulations administered by States and local
governments, the Federal Government should grant States and local governments the maximum administrative discretion Possible. Any Federal oversight of such State and local administration should not unnecessarily intrude on State and local discretion.
(d) It is important to recognize the distinction between matters of national or multi-state
scope (which may justify Federal action) and matters that are merely common to the States (which may not justify Federal action because individual States, acting individually or together, may effectively deal with them). Matters of national or multi-state scope that justify Federal action may arise in a variety of circumstances, including.
(1) When the matter to be addressed by Federal action occurs interstate as opposed to being contained within one Stateís boundaries.
(2) When the source of the matter to be addressed occurs in a State different from the State (or States) where a significant amount of the harm occurs.
(3) When there is a need for uniform national standards.
(4) When decentralization increases the costs of government thus imposing additional
burdens on the taxpayer.
(5) When States have not adequately protected individual rights and liberties.
(6) When States would be reluctant to impose necessary regulations because of fears that
regulated business activity will relocate to other States.
(7) When placing regulatory authority at the State or local level would undermine regulatory
goals because high costs or demands for specialized expertise will effectively place the regulatory matter beyond the resources of State authorities.
(8) When the matter relates to Federally owned or managed property or natural resources,
trust obligations, or international obligations.
(9) When the matter to be regulated significantly or uniquely affects Indian tribal
governments.
Sec. 4. Consultation. (a) Each agency shall have an effective process to permit elected officials and other representatives of State and local governments to provide meaningful and timely input in the development of regulatory policies that have federalism implications.
(b) To the extent practicable and permitted by law, no agency shall promulgate any
regulation that is not required by statute, that has federalism implications, and that imposes
substantial direct compliance costs on States and local governments, unless:
(1) funds necessary to pay the direct costs incurred by the State or local government in
complying with the regulation are provided by the Federal Government; or
(2) the agency, prior to the formal promulgation of the regulation,
(A) in a separately identified portion of the preamble to the regulation as it is to be issued in
the Federal Register, provides to the Director of the Office of Management and Budget a
description of the extent of the agencyís prior consultation with representatives of affected States and local governments, a summary of the nature of their concerns, and the agencyís position supporting the need to issue the regulation; and
(B) makes available to the Director of the Office of Management and Budget any written
communications submitted to the agency by States or local governments.
Sec. 5. Increasing Flexibility for State and Local Waivers. (a) Agencies shall review the
processes under which States and local governments apply for waivers of statutory and regulatory requirements and take appropriate steps to streamline those processes.
(b) Each agency shall, to the extent practicable and permitted by law, consider any
application by a State or local government for a waiver of statutory or regulatory requirements in connection with any program administered by that agency with a general view toward increasing opportunities for utilizing flexible policy approaches at the State or local level in cases in which the proposed waiver is consistent with applicable Federal policy objectives and is otherwise appropriate.
(c) Each agency shall, to the extent practicable and permitted by law, render a decision upon a complete application for a waiver within 120 days of receipt of such application by the agency. If the application for a waiver is not granted, the agency shall provide the applicant with timely written notice of the decision and the reasons therefor.
(d) This section applies only to statutory or regulatory requirements that are discretionary
and subject to waiver by the agency.
Sec. 6. Independent Agencies. Independent regulatory agencies are encouraged to comply with the provisions of this order.
Sec. 7. General Provisions. (a) This order is intended only to improve the internal management of the executive branch and is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or equity by a party against the United States, its agencies or instrumentalities, its officers or employees, or any other person.
(b) This order shall supplement but not supersede the requirements contained in Executive
Order 12866 (ìRegulatory Planning and Reviewî), Executive Order 12988 (ìCivil justice
Reformî), and OMB Circular A-19.
(c) Executive Order 12612 of October 26, 1987, and Executive Order 12875 of October 26,
1993, are revoked.
(d) The consultation and waiver provisions in sections 4 and 5 of this order shall
complement the Executive order entitled, ìConsultation and Coordination with Indian Tribal
Governments,î being issued on this day.
(e) This order shall be effective 90 days after the date of this order.
William J. Clinton
/s/
THE WHITE HOUSE,
May 14, 1998.
Presidential Decision Directive #62 'COMBATING TERRORISM' - (PDD 62)
Presidential Decision Directive #63 - 'Critical Infrastructure Protection' - (PDD 63
Side-by-side Comparison: Reagan EO 12612 / Clinton EO 13083
George W. Bush Is "Moving On."
"We are the only ones who know what is good for the country, and we are the only ones who can do anything about it."
FBI Special Agent Joseph G. Deegan in 1977 - Source
Notice also, that the FBI is too stupid to know that this is a CONSTITUTIONAL REPUBLIC, not a Democracy. Actually, we both know that's not true. They are highly skilled, and "purposely" destroying the CONSTITUTIONAL REPUBLIC, helping to facilitate a DEMOCRACY(mob rule), to usher in the One World Government to kill, steal and destroy. Isn't it enlightening knowing that there are mobs of people on this site that have never been happier thinking that "things" have never been better? LOL! Wait until the boot catches up with them. They think they'll have to be doing something wrong to feel the boot. LOL!
They Know Not What They Do
"In a democracy in general, we can't have the police everywhere," said Michael Vatis, director of the FBI's National Infrastructure Protection Center, which guards against computer attacks by terrorists, foreign agents and teen hackers."
"A Republic, If You Can Keep It"
"to provide a cure for the evils under which the United States labored; that in tracing these evils to their origin every man had found it in the turbulence and trials of democracy...."
Edmund Randolph - May 31, 1787
"The evils we experience flow from the excess of democracy. The people do not want [that is, do not lack] virtue; but are the dupes of pretended patriots."
Elbridge Gerry - 1787
"It had been observed that a pure democracy if it were practicable would be the most perfect government. Experience had proved that no position is more false than this. The ancient democracies in which the people themselves deliberated never possessed one good feature of government. Their very character was tyranny; their figure deformity."
Alexander Hamilton - June 21, 1788
"We are a Republican Government. Real liberty is never found in despotism or in the extremes of Democracy."
Alexander Hamilton
"Remember, Democracy never lasts long. It soon wastes, exhausts and murders itself! There never was a democracy that did not commit suicide."
Samuel Adams
"
democracies have ever been spectacles of turbulence and contention; have ever been found incompatible with personal security, or the rights of property; and have in general been as short in their lives as they have been violent in their deaths."
James Madison
Madison and Hamilton and Jay and their compatriots of the convention prepared and adopted a constitution in which they nowhere even mentioned the word democracy, not because they were not familiar with such a form of government, but because they were. The word democracy had not occurred in the Declaration of Independence, and does not appear in the constitution of a single one of our fifty states which constitutions are derived mainly from the thinking of the Founding Fathers of the Republic for the same reason. They knew all about democracies, and if they had wanted one for themselves and their posterity, they would have founded one.
Antivirus firms: FBI loophole is out of line
Reuters
December 11, 2001
Antivirus software vendors said Monday they don't want to create a loophole in their security products to let the FBI or other government agencies use a virus to eavesdrop on the computer communications of suspected criminals.
Under a project code-named "Magic Lantern," the U.S. Federal Bureau of Investigation is creating an e-mail-borne virus or Trojan horse that hides itself on the computer and captures all keystrokes made, including passwords that could be used to read encrypted mail.
Despite subsequent reports to the contrary, officials at Symantec and Network Associates said they had no intention of voluntarily modifying their products to satisfy the FBI. Spokesmen at two other computer security companies, Japan-based Trend Micro and the U.S. subsidiary of U.K.-based Sophos made similar statements.
All four antivirus companies said they had not contacted or been contacted by the U.S. government on the matter.
The FBI declined to confirm or deny the report about "Magic Lantern," when it was first published by MSNBC and a spokesman was not available for comment Monday.
"We're in the business of providing a virus-free environment for our users and we're not going to do anything to compromise that security," said Tony Thompson of Network Associates.
"Symantec's first priority is to protect our customers from malicious and illegal attacks," Symantec Chief Executive John W. Thompson said in a statement. "We have no intention of creating or leaving a hole in our software that might compromise that security."
If antivirus vendors were to leave a hole for an FBI-created Trojan horse program, malicious hackers would try to exploit the hole too, experts said.
"If you leave the weakness for the FBI, you leave it for everybody," said Fred Cohen, an independent security expert and digital forensics professor at the University of New Haven.
From the industry perspective, leaving a hole in antivirus software would erode public confidence and damage the reputation of the vendor, sending customers to competing companies, the vendors said.
The government would have to convince all antivirus vendors to cooperate or the plan wouldn't work, since those not cooperating would have a market advantage and since they all share information, a Symantec spokeswoman said.
"The thought that you would be able to convince the industry as a whole to do this is kind of naive," she said.
Symantec and Networks Associates, both of which have investments in China, would not jeopardize their footings in that market, said Rob Rosenberger, editor of Vmyths.com, a Web site that debunks virus hoaxes.
"If (the Chinese) thought that the company was a tool of the CIA, China would stop using those products in critical environments," Rosenberger said. "It is in the best interest of antivirus vendors not to heed the call of the FBI."
"We always try to cooperate with the authorities when it's appropriate. Having said that, our No. 1 goal is to protect our customers," said Barbara Woolf of Trend Micro. "I've heard reports that the government is upset this got out and is going back to the drawing board."
Appeasing the U.S. government would be difficult for vendors that have parent companies and customers outside the United States, they said.
"If the laws of the land were to change to permit this kind of activity, then we would abide by the law," said David Hughes, president of Sophos' U.S. subsidiary.
But "how would a vendor provide protection for customers outside of the specific jurisdiction?" Hughes said. "If we were to do this for the U.S. government we'd also have to do it for the government of any other nation that would want to do something similar."
The fact that the USG has types from the Bush administration (Mueller especially is pushing this along with AShcroft) that even tried to get these Antvirus manufactureres to do this is an outrage that shows a world government enslavement attempt for contol and to eliminate our privacy and freedoms without adequate safeguards.
And this administration and Democrats and Repubs of like mind will keep trying until they succeed, until they find an antivirus manufacturer who will put the loophole in (a corrupt elected official like Hilary or Schumer may even start a business themselves providing loopholes for the FBI) even if it means the USG putting the other reputable manufactureres out of business by lawsuits and repressive legislation.
THe USG will use the same tactics to get what they want as they are using trying to compel/sue/destroy/replace gun manufacturers.
The spirit of AntiChrist is now on the world stage and in the minds of many of our deluded publicly elected officials and FBI and DOJ bureaucrats. They care not about unalienable, God given rights or the Constitution (Ooops, does this mean that the FBI will now put me and anyone else who shares my concerns on the FBI's super Patriot hit list because we would dare verbally defend our Constitutional rights against oppression and world government mind sets???).
Sure sounds like humanism to me.
FREEH SAYS RUSSIAN MAFIA POSES NO THREAT
Thank goodness the FBI is watching out for us. Hehehehe.
Whatever you do don't defend the constitution, THEN YOU'RE A THREAT TO THE FBI.
"Defending Our Constitution"
PGP Phone uses a voice encryption similar to the encryption the popular PGP mail program uses. Also available are portable scramblers for use on any phone, they come in pairs.
So far all the hysteria is from the liberals, with some echos on the right(mostly concern for abuse of a future admin.) The liberals are frothing at the mouth over this now. That has to make you wonder, what are they afraid of?
Are we to trust bureaucrats in the the government who say what they are doing is alright because they tell us they are in the government and know what is best??
When you tell us that what they have been doing has not hurt us, it does not help. In fact your reasoning makes the conduct of those in government look worse to me.
It is much worse than you want us to believe because they did not tell us they were snopping on all of us innocent civilians (presumed guitly until proven innocent by their corrupt definition??)and more importantly THEY DID NOT ASK OUR PERMISSION in violation of the Constitution and our unalienable, God given rights of privacy.
From the Holy Bible: The AntiChrist will destroy wonderfully by means of (false) peace.
Do not follow the fake reasoning and the promised false peace of the AntiChrist that lulls into a false sense of security because his system says it listens to everything we say to protect us (the false system says) from ourselves.
I pray at Christmas, God's Peace will be with you and in your heart.
I better not forget my driver's license.
I believe this Operation Magic Lantern is operational now and is capable of overseeing about 1/5 of the world's electronic communications...I read that recently...have to run..
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.