From: Risto Lankinen on
James Bamford, 1983 revision
*
* P496-497: You would put in a whole slew of keywords.
* You flip through the results.

And it's damn effective.

I could pick needles out of a haystack. I could find a 16-line Risk Management
report in Salomon's daily 150-230 megabytes of Internet email traffic. It took
only one word: 'risk', and lots of exclusion logic, because the word is used
lots. I had never seen that format of risk report before. It was incoming too.

It sure didn't look like much, but...

The head of Risk Management at Salomon Brothers (real name) replied:

* From bookstaber(a)sbi Wed Jun 19 03:27:55 1996
* Date: Wed, 19 Jun 96 03:27:40 EDT
* To: guy(a)doppelganger
* Subject: Re: Risk Mgmt Report?
* From: bookstaber(a)sbi (Richard Bookstaber)
*
* This is proprietary risk/position information.
* Please let me know the circumstances -- who was sending it to whom.
*
* Is it intrafirm, or was it going to someone outside of the firm?
*
* I am in London now, but will check my e-mail.


So, that's spotting one email due to one
word out of say 200,000,000 characters.

Set it up, push a button, check search results.

I picked up so many people in 'resume condition' at Salomon, they ended
up saying they didn't n


From: quasi on
published a series of articles in 1989 exposing events surrounding a multi-
billion dollar British arms deal with Saudi Arabia.

The newspaper said the deal had been pushed strongly by Mrs. Thatcher, and
it was alleged that massive bribes were made to middlemen, including her
son, Mark, who was said to have received a 10 million Pound commission.

The former employee of the British Joint Intelligence Committee, Robin
Robison, broke his indoctrination oaths and told the Observer that, as
part of his job, which involved sorting intelligence reports from the
British intelligence agencies, he personally forwarded GCHQ transcripts
of intercepted communications about Lonrho to Mrs. Thatcher's office.


P9
Intelligence is not just neutral information; it can be powerful and
dangerous. Intelligence gathering and military force are two sides of
the same coin. Both are used by countries and groups within countries to
advance their interests, often at the expense of others. To influence or
defeat an opponent, knowledge can be more useful than military force.

The type of intelligence described in this book, signals intelligence
(SIGINT), is the largest, most secret and most expensive source of secret
intelligence in the world today.


P-5655
Like the British examples, and Mike Frost's Canadian examples, these stories
will only be the tip of the iceberg.

There is no evidence of a UKUSA code of ethics or a tradition of respect
for Parliament or civil liberties in their home countries.

The opposite seems to be true: that anything goes as long as you do not
get caught. Secrecy not only permits but encourages questionable operations.


Three observations need to be made about the immense spying capability
provided by the ECHELON system.

The first is


From: Christian Siebert on
o The NSA uses a huge number of computers to listen for "key words"
on "watch lists" for ALL border crossing traffic, including voice
conversations. That means in 1975 they could convert voice to text,
then do keyword searches against it. It's 1997 now.

Just how did United States citizens lose these Fourth Amendment rights,
granted by the Constitution? And why is the Military monitoring the
communications of Americans on U.S. soil and working with domestic law
enforcement?

Well, one day President Truman issued a secret order creating the NSA.

As testified by Library of Congress members on C-SPAN, the names of these
presidential findings change with administrations. They are called variously
Presidential Decision Directives, National Security Council Decision
Directives, Executive Orders, etc.

One might think these special override-the-constitution presidential
directives (which came out of nowhere) would be used for short-term
emergencies.

Wrong: the NSA is now a HUGE intelligence organization, eating billions
and billions and billions and billions of dollars in budgets each year,
and monitoring billions of messages a day.

* "Spying Budget Is Made Public By Mistake", By Tim Weiner
* The New York Times, November 5 1994
*
* By mistake, a Congressional subcommittee has published an unusually
* detailed breakdown of the highly classified "black budget" for United
* States


From: Pubkeybreaker on
Part 1: Massive Domestic Spying via NSA ECHELON
---- - ------- -------- ------ --- --- -------

o The NSA Admits
o Secret Court
o Wild Conspiracy Theory
o Over the Top
o BAM-BAM-BAM
o Australian ECHELON Spotted
o New Zealand: Unhappy Campers


Part 2: On Monitoring and Being Monitored
---- - -- ---------- --- ----- ---------

o On Monitoring
- Driver's Seat
- Five Months Statistics
- The FBI Investigations
- I Can See What You Are Thinking
- Why I Monitor
o On Being Monitored


Part 3: 1984 Means a Constant State of War
---- - ---- ----- - -------- ----- -- ---

War #1 - Drugs
War #2 - Guns
War #3 - Child Pornography
War #4 - Terroris


From: Pubkeybreaker on
o Secret Service: Vile Persecution of Ed Cummings
o Secret Service: Harassment of Steve Jackson Games


* The New York Times, CyberTimes, June 20, 1997
*
* Panel Chief Says Computer Attacks Are Sure to Come
*
* By THE ASSOCIATED PRESS
*
* WASHINGTON -- It is "only a matter of time" before critical U.S. computer
* systems face major attack, the head of a White House panel on the nation's
* infrastructure systems warned.
*
* Robert Marsh is the head of the President's Commission on Critical
* Infrastructure Protection.

Whatever should we do about those nasty hackers?

******************************************************************************

Secret Service: Harassment of 2600
------ ------- ---------- -- ----

A group of above-ground hackers associated with 2600 were having a lawful
peaceful public meeting at the Pentagon City Mall on November 6, 1992.

The meeting was busted up by mall police for no apparent reason.

Identification was demanded from everyone.

Bags were searched.

It's the 1990s now.

The harassment was publicized by 2600, and a reporter talked to the head
of the mall's security: he let slip that the Secret Service ordered them
to harass 2600's lawful peaceful public meeting.

That was definitely news.

The mall security manager then denied what he said about Secret Service
ordering the harassment: luckily the reporter recorded his conversation.

CPSR [Computer Professionals for Social Responsibility] and Marc Rotenberg
of EPIC [Electronic Privacy Information Center] began FOIA [U.S. Freedom
of Information Act] proceedings to find out about this incident.

The case raises significant issues of freedom of speech and assembly,
privacy and government account