Item   Synopsis
Refrence

AN APPRAISAL OF TECHNOLOGIES 
OF POLITICAL CONTROL 

Framework of this report.


Bibliography of "An Appraisal of the Technologies of Political Control" 
 

Interception Capabilities 2000
 Follow up by Duncan Campbell on
AN APPRAISAL OF TECHNOLOGIES 
OF POLITICAL CONTROL 

   Introduction to Personal Authentication
Personal authentication is a process whereby a person first registers as that person and thereafter provides evidence as and when required to
confirm that he or she is that person. The act of registration that has just been referred to is carried out with a particular purpose in mind. The act
of personal authentication is similarly carried out with a particular purpose in mind (generally the same purpose as the act of the registration).
There is no such thing as personal authentication carried out for some vague, generalized purpose. 

 

EXPOSING THE GLOBAL SURVEILLANCE SYSTEM 

For 40 years, New Zealand's largest intelligence agency, the Government Communications Security Bureau (GCSB) the nation's equivalent of
the US National Security Agency (NSA) had been helping its Western allies to spy on countries throughout the Pacific region, without the
knowledge of the New Zealand public or many of its highest elected officials. What the NSA did not know is that by the late 1980s, various
intelligence staff had decided these activities had been too secret for too long, and were providing me with interviews and documents exposing
New Zealand's intelligence activities. Eventually, more than 50 people who work or have worked in intelligence and related fields agreed to be
interviewed.



 
 

Using phones as remote controlled bugging devices.

A report, dated, 6 January 1998, titled; "An Appraisal of Technologies of Political Control" has been sent to the European parliament 'Civil
Liberties and Interior Committee.' It comes from the European parliaments department for 'Scientific and Technological Option Assessment
(STOA).

One chapter in the report warns about how an ISDN phone can be turned into a bugging device. But the claim is not backed up by any reference
to the CCITT - recommendations. This chapter in the report can therefore not be verified. Other researcher can use my notes on how far i got into
tracking the references of this claim. 


 


Links regarding MKULTRA
THE OVERALL PURPOSE OF MKULTRA WAS THE DEVELOPMENT OF PSYCHOLOGICAL WARFARE WEAPONS AND TACTICS.
AN IMPORTANT SUB-AREA WAS CONCENTRATION CAMP PRACTICES. There are many articles beyond those posted on this
site. Call up a major search engine like http://www.yahoo.com and enter "MKULTRA" into the search field. 



 

Infowar Links
There's a lot of stuff out there on the Net about Infowar and Infosec. Here's a few places to go.
Raytheon Company  Historical Background 
Raytheon Company was founded in Cambridge, Mass., as the American Appliance Company in 1922, a pivotal time in American history. The
first decade of modernism, the 1920s saw the advent of automobiles, radios and refrigerators. 

 

Links Industry

Links to various companies involved in creating the technologies mentioned in the
above mentioned report.

 

THE EMERGENCE OF NEW SUB-LETHAL ALTERNATIVES TO LANDMINES
In the presentation which follows, I intend to examine the current technical status of emerging replacement mine technologies, including weapons based on kinetic energy, blunt impact munitions; radio
frequency weapons (which interfere with the brains own electrical activity); chemical irritants; ...
Nando Lauria - Dreaming of you