From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: fc93282e063ac1b03b827f12cd9f93fa96cda4e8a1dcd65189b717c02a6c1ccf
Message ID: <1.5.4.32.19970224020944.006e1e44@pop.pipeline.com>
Reply To: N/A
UTC Datetime: 1997-02-24 02:16:09 UTC
Raw Date: Sun, 23 Feb 1997 18:16:09 -0800 (PST)
From: John Young <jya@pipeline.com>
Date: Sun, 23 Feb 1997 18:16:09 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: CIA Lie
Message-ID: <1.5.4.32.19970224020944.006e1e44@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
After eying the disingenuous CIA letter to Greg, it may be
worth eying disingenuous USG laws on electronic surveillance,
most of which ostensibly apply to foreign targets but may catch
US citizens in the global sweep, say, as on Cypherpunks --
keep at it, Greg.
We've put some of them on our site today, as listed at:
http://jya.com/crypto.htm
fis.htm Foreign Intelligence Surveillance (108K)
50usc402a.txt Coordination of Counterintelligence
50usc438.txt Access to Classified Information
18usc794.txt Espionage and Censorship
18usc2511.txt Electronic Communications Intercepts
18usc2709.txt Electronic Records Access
15usc1681u.txt Disclosures to FBI for Counterintelligence
12usc3414.txt Right to Financial Privacy
For details not fully revelatory of the CIA's operations, see
50USC413 et seq., by searching the United States Code at:
http://www.access.gpo.gov/su_docs/aces/aaces002.html
Return to February 1997
Return to “John Young <jya@pipeline.com>”
1997-02-24 (Sun, 23 Feb 1997 18:16:09 -0800 (PST)) - Re: CIA Lie - John Young <jya@pipeline.com>