From: Phil Carmody on
71 basis/include/Customization.h
[large snip here]
131 basis/include/Date.h
77 basis/include/DateEntryPad.h
54 basis/include/DateIOField.h
33 basis/include/DefaultButton.h
63 basis/include/DocLayout.h
1144 basis/lib/base/basis_ios.cc
398 basis/lib/base/AmountFormat.cc
157 basis/lib/base/TemplateField.cc
136 basis/lib/base/AssocArry.cc
18184 total


His last day was XXXXXX 1996.

His new job and responsibilities:

> Project management of a new XXXXX project is what I'll be
> doing at XXXXX XXXXX (a bank from <country> ranked in the top 20).
> I'll start by consulting ($$/hour plus 1.5*OT) for TTTTTTTT.
> After that we talk about them invoking their right-to-hire clause.
> I might make VP. The project is great inasmuch as I'm starting it
> from scratch; it's not only not burdened by legacy code, but I
> can even pick the hardware. I'm "up" but also worried about the
> responsibility.
>
> The application is X risk analysis and XX for investors. It connects
> to a front end for a trading system.
>
> I put a lot of working into talking my new boss into me giving the
> normal 2 weeks notice at Salomon (they wanted me yesterday), because
> my current project is nearing a critical point. But my Salomon boss
> said just do a handoff now and leave.
>
> I am upset. I was trying to be professional.


Boy, email is one cheap detective!

Anyway, that seems the full scoop.

---guy

********** end excerpt from 'Corruption at Salomon Brothers' **********



Notice my 'Boy, email is one cheap detective!' observation; Legal had talked
about hiring a private investigator prior to that.

The "perp" not only named his new job, he gave his full job description,
pay rates, and his per


From: tchow on
".

There is absolutely no doubt whatsoever that Netscape and other companies
--- the U.S. is a world leading producer of software technology --- are
having their products outlawed for world-wide distribution because of
ECHELON.

Ubiquitous full-strength crypto --- in all our email products and web
browsers --- would immediately begin to lessen ECHELON's ability to
spy in such a massive dragnet fashion.

There is an ugly implication to ECHELON being the reason Netscape and company
are being held hostage by the NSA.

"Only with a court authorized warrant..." --- Louis Freeh, FBI Director

Louis Freeh is lying.


******************************************************************************

Key Recovery Isn't Even Feasible
--- -------- ----- ---- --------

http://www.epic.org

Distinguished cryptographers and computer scientists have released a new
report, "The Risks of Key Recovery, Key Escrow, and Trusted Third-Party
Encryption."

The report follows an earlier r


From: Pubkeybreaker on
but
> which later turned out not to be.
>
> For some reason they feel COMPELLED TO MENTION THIS AT EACH HEARING as
> if C4 had actually been found when in fact the substance was something
> dentists use: DENTURE MOLD (the owner of the house was a dentist).
>
> The Secret Service specifically complained about his affiliation with
> 2600 Magazine (not a secret and not a reason to label someone a criminal).
[
The Secret Service is apparently unaware that 2600 magazine is the
world's preeminent above-ground hacker zine, subscribed to by members
of security departments all over Wall Street (at the least).

It is filled with fascinating information, highly useful for securing
one's systems. Here's a random sample factoid from 2600: although
on-site company switches are commonly programmed to block '900' number
calls, there is a hole in the programming logic that always lets '555'
exchange numbers through. ("Information wants to be free") Companies
that advertise 900 numbers take advantage of this.

For example, even though you can't dial most 900 numbers, you can
still call numbers like USA Today's 1-900-555-5555, which are
specifically chosen to get around the 900 programming restrictions.

Oh yeah: I remember another one that triggered fi


From: David Bernier on
Security Agency is actively involved in the
! design [of Key Recovery cryptography], the agency will have the
! technical ability to decipher the messages.
!
! Walter G. Deeley, NSA deputy director for communications security
! said, "Another important safeguard to the privacy of communications
! was the continuous review of NSA's activities by the Senate and House
! intelligence committees."

Congressional oversite in real-time was non-existent.


Remember Ronald "I am a Contra" Reagan?

# U.S. Department of Justice, Federal Bureau of Investigation, March 13, 1987
#
# Dear [Guy],
#
# Your letter of February 25th in which you inquired about the
# association between Mr. Frank Varelli and the FBI has been received.
#
# An internal FBI inquiry is currently ongoing into the activities of
# an Agent associated with Mr. Varelli who left the FBI following an earlier
# administrative inquiry. For that reason, it would be premature at this
# point to respond to any questions concerning the matter.
#
# Sincerely,
#
# William M. Baker
# Assistant Director
# Office of Congressional and Public Affairs
#
# Bicentennial of the United States Constitution (1787-1987)


* [NJ] The Star-Ledger, Friday, January 29, 1988
*
* The documents, released Wednesday, showed that the original target of the
* FBI probe was CISPES, but th


From: Phil Carmody on
the best interests of the ever-paranoid Militia.

I mean the ever-paranoid Military.


******************************************************************************

Feds' Wacky Pro-GAK Logic
---- ----- --- --- -----

Here are a couple of the wacky reasons they give for everyone wanting GAK.


o Business Will Demand It

They say setting up a GAK infrastructure will form a defacto standard for
interchange of public encryption keys, which business need for
interoperability of the various cryptography products.

Noone has clamored for crackable crypto to be the driving force
behind such a standard.

It's a very silly thing for them to assert.

* "Clinton's Encryption Plan Fits Law and Market"
* Letters to the Editor, Mickey Kantor, U.S. Secretary of Commerce, 10/9/96
*
* Many companies are eager to market Key Recovery [compromised] products.

Exact same deal:
Here are the actual comments on Key Recovery's predecessor, Key Escrow:

: Charles R. Smith, master of FOIA, SOFTWAR, http://www.us.net/softwar
:
# "It is essential that the end-user's rights to and expectations
# of personal privacy be met by this technology. Multi-national
# companies are faced with strong privacy laws in many countries,
# some of which are far stricter than U.S. policy. Conversely,
# many countries blatantly disregard personal privacy, and might
# not respect our personal rights and business needs. Because of
#