From: Tim Smith on 18 Apr 2008 21:24 and the proprietary header stripped out. > > I hope it didn't flow past AT&T's ISP connections... [snip] ********** end excerpt from 'Corruption at Salomon Brothers' ********** This transfer of proprietary source code that USED to be owned by AT&T did not even qualify for action. Salomon legal stated Salomon has a lower obligation for third-party copyrights than they did for software they contracted for themselves, like Sybase. Salomon didn't have a UNIX source license, so obviously the employee had gotten it elsewhere. In the following statistic, it was the only non-Salomon source code. We went from zero monitoring of Internet email traffic to... > On 3/21/96 we had our first security incident report. > > By 3/26/96 we had an astonishing 38,000 lines of proprietary source code > outbound. > > We were mentally unprepared. Figuratively we were pulling our hair out > wondering when the madness would stop. > > It never did. As I said, the results of keyword monitoring were stunning. If you look up computer security literature and read up on security incidents, you'll notice none are more articulate about inside-employee incidents other than to describe the people as "disgruntled employees". Wrong. I'll go over some of the major categories of incidents I encountered. Keyword monitoring is abstract to most people; these results show how powerful the technique is. Here are two from the category: o People innocently trying to get work done. This usuall
From: Pubkeybreaker on 18 Apr 2008 20:18 takes-us-into-the-abyss domestic spy bill. It is for the FBI to simultaneously monitor HUGE amounts of our phone calls. And when the judiciary found out about NSA monitoring U.S. citizens' overseas telephone calls without a warrant: they approved the loss of our Fourth Amendment rights. Giving Presidential Directives the same force of law as the Constitution. Congress has lost it too. * The New York Times, undated * * The House is not expected to vote on the search-and-seizure bill until * at least Wednesday. But tonight the Republicans defeated a Democratic * amendment that SIMPLY REITERATED THE WORDS OF THE FOURTH AMENDMENT OF * THE UNITED STATES CONSTITUTION. * * The vote was 303 to 121. * * The Democrats were trying to portray the Republicans as wanting to * eliminate the constitutional protection against unlawful searches. * * Indeed, they cornered the Republicans into saying that the measure * containing the Fourth Amendment would gut the seizure bill. Just what is it going to take to restore the U.S. Constitution? Unlimited unregulated cryptography legislation is a beginning baby-step. Otherwise it might take another civil war. The NSA will not let go quietly. Sound over-the-top? Wait until you understand the massive surveillance system that our government has put in place, just how powerful it is, and how they've used it repeatedly to control lawful peaceful politic
From: Risto Lankinen on 18 Apr 2008 20:11 own training courses, teaching them the special procedures and regulations governing the production of signals intelligence reports for the UKUSA network. It is at these courses where the analysts are told about the UKUSA agreement, which is described by senior staff as the 'foundation stone' of all the arrangements with the 'partner' agencies. P110 The GCSB introduces the new trainees to the world of codebreaking by advising them to read two of the greatest exposes of signals intelligence: James Bamford's 'The Puzzle Palace' and David Kahn's 'The Code Breakers'. P22 In 1984, Glen Singleton of the NSA was formally appointed GCSB's Deputy Director of Policy and Plans. Having an American inside the GCSB serving as a foreign liaison officer would be one thing: allowing an officer from another country to direct policy and planning seems extraordinary. [ Unless you think of the NSA as the New World Order. ] P28-29 Intelsat 7s can carry 90,000 individual phone or fax circuits at once. All 'written' messages are currently exploited by the GCSB.
From: Rotwang on 18 Apr 2008 21:57 " Haven't I heard bad dialogue like this on Mystery Science Theater 3000? It is simply another in an endless series of requests for funding, for misuse of our tax money. ---- Louis Freeh's FBI: * "FBI Scare Tactics", By Richard Moran, The New York Times, 1996 * * When the FBI reported that serious crime declined for the fourth year * in a row, it was still making the statistics sound worse than they * actually were. * * That's because Government tends to exaggerate the violent nature of crime. * * According to the Justice Department's Bureau of Justice Statistics, less * than a third of the 6.6 million violent crimes committed in the U.S in 1992 * resulted in injury; most of the victims suffered only minor cuts, scratches * or bruises. * * About 20 percent of them needed minor medical care; 7 percent went to * emergency rooms. Only 1 percent of the victims were hurt seriously enough * to require hospitalization. * * The incongruity arises because of the way the law defines violent crime. * * For example, aggravated assault is defined as either intentionally causing * serious bodily harm or using a weapon to threaten or attempt to cause * bodily harm. * * Fortunately, most aggravated assault victims fall into the last category; * most victims are never touched by the offender. * * The same held true for armed robbery. Only 3 percent required medical * treatment. Less than half of armed robbers displayed guns, and those * who did were LESS LIKELY TO INJURE VICTIMS than robbers who didn't show * guns. * * The FBI has a tendency to worry people unnecessarily, even when it has * good news. For example, last year the FBI announced that 53 percent of * all homicides were by strangers, and that for the
From: JSH on 18 Apr 2008 20:06
and open a new era of cooperation between U.S. agencies. It will draw # it's information from many different sources. It can respond to spoken # commands and display SATELLITE SURVEILLANCE PHOTOS. [What??? NRO!!!] # # The system lists suspect's names and stores data on their cars, travel, # businesses, phones, FAMILY RELATIONS, meetings, assets and places they # frequent. The system WILL TRY TO PREDICT THEIR NEXT MOVE. * "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5 * * Congressman Neal Smith (Iowa), in his local constituent newsletter, * discussing the subject of handgun control, boasted: * * The Subcommittee on Appropriations which I chair had been actively * pursuing an effective solution to this problem...but the program we * are implementing will take time [i.e. rolling out fingerprinting to * all citizens receiving government benefits, like driver's licenses, * Medicaid, Welfare]. The solution to screening people...is to have * a National [Identification] Center computerized so that local law * enforcement offices can instantly access information from all states. * * In other words, all states would supply information to the National * [Identification] Center, and the Center will have a positive * identification system which will identify any applicant... * * That Congressman Neal Smith's unconstitutional "final solution" to gun * control and other "crime" issues---a National Identification Center--- * is not just |