From: Risto Lankinen on 18 Apr 2008 19:16 James Bamford, 1983 revision * * P496-497: You would put in a whole slew of keywords. * You flip through the results. And it's damn effective. I could pick needles out of a haystack. I could find a 16-line Risk Management report in Salomon's daily 150-230 megabytes of Internet email traffic. It took only one word: 'risk', and lots of exclusion logic, because the word is used lots. I had never seen that format of risk report before. It was incoming too. It sure didn't look like much, but... The head of Risk Management at Salomon Brothers (real name) replied: * From bookstaber(a)sbi Wed Jun 19 03:27:55 1996 * Date: Wed, 19 Jun 96 03:27:40 EDT * To: guy(a)doppelganger * Subject: Re: Risk Mgmt Report? * From: bookstaber(a)sbi (Richard Bookstaber) * * This is proprietary risk/position information. * Please let me know the circumstances -- who was sending it to whom. * * Is it intrafirm, or was it going to someone outside of the firm? * * I am in London now, but will check my e-mail. So, that's spotting one email due to one word out of say 200,000,000 characters. Set it up, push a button, check search results. I picked up so many people in 'resume condition' at Salomon, they ended up saying they didn't n
From: quasi on 18 Apr 2008 20:02 published a series of articles in 1989 exposing events surrounding a multi- billion dollar British arms deal with Saudi Arabia. The newspaper said the deal had been pushed strongly by Mrs. Thatcher, and it was alleged that massive bribes were made to middlemen, including her son, Mark, who was said to have received a 10 million Pound commission. The former employee of the British Joint Intelligence Committee, Robin Robison, broke his indoctrination oaths and told the Observer that, as part of his job, which involved sorting intelligence reports from the British intelligence agencies, he personally forwarded GCHQ transcripts of intercepted communications about Lonrho to Mrs. Thatcher's office. P9 Intelligence is not just neutral information; it can be powerful and dangerous. Intelligence gathering and military force are two sides of the same coin. Both are used by countries and groups within countries to advance their interests, often at the expense of others. To influence or defeat an opponent, knowledge can be more useful than military force. The type of intelligence described in this book, signals intelligence (SIGINT), is the largest, most secret and most expensive source of secret intelligence in the world today. P-5655 Like the British examples, and Mike Frost's Canadian examples, these stories will only be the tip of the iceberg. There is no evidence of a UKUSA code of ethics or a tradition of respect for Parliament or civil liberties in their home countries. The opposite seems to be true: that anything goes as long as you do not get caught. Secrecy not only permits but encourages questionable operations. Three observations need to be made about the immense spying capability provided by the ECHELON system. The first is
From: Christian Siebert on 18 Apr 2008 18:42 o The NSA uses a huge number of computers to listen for "key words" on "watch lists" for ALL border crossing traffic, including voice conversations. That means in 1975 they could convert voice to text, then do keyword searches against it. It's 1997 now. Just how did United States citizens lose these Fourth Amendment rights, granted by the Constitution? And why is the Military monitoring the communications of Americans on U.S. soil and working with domestic law enforcement? Well, one day President Truman issued a secret order creating the NSA. As testified by Library of Congress members on C-SPAN, the names of these presidential findings change with administrations. They are called variously Presidential Decision Directives, National Security Council Decision Directives, Executive Orders, etc. One might think these special override-the-constitution presidential directives (which came out of nowhere) would be used for short-term emergencies. Wrong: the NSA is now a HUGE intelligence organization, eating billions and billions and billions and billions of dollars in budgets each year, and monitoring billions of messages a day. * "Spying Budget Is Made Public By Mistake", By Tim Weiner * The New York Times, November 5 1994 * * By mistake, a Congressional subcommittee has published an unusually * detailed breakdown of the highly classified "black budget" for United * States
From: Pubkeybreaker on 18 Apr 2008 21:11 Part 1: Massive Domestic Spying via NSA ECHELON ---- - ------- -------- ------ --- --- ------- o The NSA Admits o Secret Court o Wild Conspiracy Theory o Over the Top o BAM-BAM-BAM o Australian ECHELON Spotted o New Zealand: Unhappy Campers Part 2: On Monitoring and Being Monitored ---- - -- ---------- --- ----- --------- o On Monitoring - Driver's Seat - Five Months Statistics - The FBI Investigations - I Can See What You Are Thinking - Why I Monitor o On Being Monitored Part 3: 1984 Means a Constant State of War ---- - ---- ----- - -------- ----- -- --- War #1 - Drugs War #2 - Guns War #3 - Child Pornography War #4 - Terroris
From: Pubkeybreaker on 18 Apr 2008 21:17
o Secret Service: Vile Persecution of Ed Cummings o Secret Service: Harassment of Steve Jackson Games * The New York Times, CyberTimes, June 20, 1997 * * Panel Chief Says Computer Attacks Are Sure to Come * * By THE ASSOCIATED PRESS * * WASHINGTON -- It is "only a matter of time" before critical U.S. computer * systems face major attack, the head of a White House panel on the nation's * infrastructure systems warned. * * Robert Marsh is the head of the President's Commission on Critical * Infrastructure Protection. Whatever should we do about those nasty hackers? ****************************************************************************** Secret Service: Harassment of 2600 ------ ------- ---------- -- ---- A group of above-ground hackers associated with 2600 were having a lawful peaceful public meeting at the Pentagon City Mall on November 6, 1992. The meeting was busted up by mall police for no apparent reason. Identification was demanded from everyone. Bags were searched. It's the 1990s now. The harassment was publicized by 2600, and a reporter talked to the head of the mall's security: he let slip that the Secret Service ordered them to harass 2600's lawful peaceful public meeting. That was definitely news. The mall security manager then denied what he said about Secret Service ordering the harassment: luckily the reporter recorded his conversation. CPSR [Computer Professionals for Social Responsibility] and Marc Rotenberg of EPIC [Electronic Privacy Information Center] began FOIA [U.S. Freedom of Information Act] proceedings to find out about this incident. The case raises significant issues of freedom of speech and assembly, privacy and government account |