From: quasi on
orally with counterparties by
: the end of trade date by checking to AAAA. All trades where AAAA and EEEE
: require
[final snip]

It was a LONG "Salomon Internal Audit Division" document, highly detailed,
including historical background info.

This document could be damaging in the wrong hands.

This looked like a Dumb-and-Dumber category transfer.

********** end excerpt from 'Corruption at Salomon Brothers' **********


******************************************************************************


Five Months Statistics
---- ------ ----------


Okay, I think I've shown you enough security incidents
for you to determine that this is a real thing.

That I am not "full of hooey".

Here is a summary of what I accomplished at Salomon while keyword monitoring.



********** begin excerpt from 'Corruption at Salomon Brothers' **********

Thread: Five Months Statistics
---- ------ ----------

I created and did the traffic analysis for five months before handing it
off. The time includes a 2.5 month parallel run with the new person.

The new person found only half the security incidents I did, but we handed
off anyway.

Summarizing my five months:

o caught over 400,000 lines of Salomon proprietary source code outbound

////////////////////////////////////////////////////////////////////////
// //
//


From: fortune.bruce on
and an executive order that was designed more to
protect the intelligence community from citizens than citizens from the
agencies. In addition, because it is an executive order, it can be changed
at any time at the whim of a President, without so much as a nod toward
Congress.

P471: On January 24, 1978, President Jimmy Carter issued an executive order
imposing detailed restrictions on the nation's intelligence community. The
order was designed to prevent the long list of abuses of the 1960s and 1970s.

But four years later President Ronald Reagan scrapped the Carter order and
broadened considerably the power of the spy agencies to operate domestically.

P473: Under the Reagan executive order, the NSA can now, apparently, be
authorized to lend its full support - analysts as well as computers - to
"any department or agency" in the federal government and, "when lives are
endangered," even to local police departments.

[ Yea billions of dollars a year military SIGINT support technology...
oh so invisible in its great mass.

A total blurring of the lines between Military
and civilian control of the domestic population.
]


P475-477: Like an ever-widening sinkhole, the NSA's surveillance technology
will continue to expand, quietly pulling in more and more communications and
grad


From: fortune.bruce on
* embedded in a sportswatch to be worn by Alzheimer patients who have a
* tendency to wander. When the patient strays from home, Eagle Eye calls up
* an orbiting satellite, which "interrogates" the patient's microchip to
* determine the patient's position to within the length of a football field.
*
* Sounds protective? Relevance recognizes the bonafide use of this
* technology but we continue to harbor reservations about its potential for
* abuse.
*
* Notably, Eagle Eye Technologies received its initial funding from the
* U.S. government through the Defense Advanced Research Projects Agency
* (DARPA), headed for many years by current Secretary of Defense, William
* Perry. In fact, much of the surveillance technology being introduced in
* the private sector was fostered, funded and even directed by government
* agencies.
*
* Once the utility of tracking Alzheimer's patients was demonstrated, it was
* inevitable that someone would consider applications in children. As
* kidnappings and murders of children gain a higher media profile, we are
* likely to hear calls for the use of child tracking devices. The proposed
* panacea could someday be the implantable microchip.
*
* Incredibly, someone was working on just such a system back in 1989.
* According to the Arizona Republic of July 20th, 1989, inventor Jack
* Dunl


From: Risto Lankinen on
to the NATIONAL SECURITY of
* the United States.
*
* $3.1 billion for the CIA
* $10.4 billion for the Army, Navy, Air Force
* and Marines special-operations units
* $13.2 billion for the NSA/NRO/DIA
*
* The only damage done so far is to the
* credibility of those who opposed the measure.

There is no constitutional basis for this
massive loss of Fourth Amendment rights.

It sounds like some wild conspiracy theory, doesn't it?

Yet it exists.




******************************************************************************

Secret Court
------ -----


: The Washington Post Magazine, June 23 1996
: Government surveillance, terrorism and the U.S. Constitution:
: The story of a Washington courtroom no tourist can visit.
: By Jim McGee and Brian Duffy [snipped article excerpts shown here]
: Adapted from the book "Main Justice", 1996, ISBN 0-684-81135-9.
:
* Last year, a secret court in the Justice Department authorized a record
* 697 'national security' wiretaps on American soil, outside normal
* constitutional procedures.
*
* The Foreign Intelligence Surveillance Act, is a 1978 law that permits
* secret buggings and wiretaps of individuals suspected of being agents
* of a hostile foreign government or international terrorist organization
* EVEN WHEN THE TARGET IS NOT SUSPECTED OF COMMITTING ANY CRIME.
*
*


From: Pubkeybreaker on
are linked together
under Project Platform. The first Cray went to the NSA. p138
]

* Although the NSA was officially formed in 1952, it grew out of an
* International Agreement signed in 1947. Officially termed the "UKUSA
* PACT," this was an agreement between Britain, the U.S.A., Canada, New
* Zealand, Australia and the NATO countries.
*
* The UKUSA PACT was, quite simply and bluntly, an agreement between these
* countries to collect and collate information on their respective citizens
* and to share this information with each other and pass on to Fort Meade.
*
* On March 9th 1977, the Leader of the Opposition, Mr. Bill Hayden, asked
* "questions on notice" on the subject. On April 19, Prime Minister Malcom
* Fraser, declined to answer the questions, "in the interests of national
* security."
*
* The first clue of the Australian Headquarters of PROJECT PLATFORM appeared
* in 1975. Then, as today, government undertakings involving expenditure
* over a certain amount must be presented to a Senate body, the Joint
* Parliamentary Accounts Committee (JPAC). In 1975 JPAC was asked to
* examine and approve finance for the construction of a new building in
* Deakin, a leafy suburb of Canberra.
*
* This quite massive building was to be constructed behind an existing, much
* smaller one, which, until then, had been known to the public only as the
* "Deakin Telephone Exchange."
*
* That it was not, and never had been, simply a "telephone exchange