From: Pubkeybreaker on
---------------------------------

This is a security incident report regarding the Internet (a public wire)
traffic of Salomon Brothers, which is monitored for security/compliance.

NOTE: THESE INCIDENTS HAVE NOT STOPPED DESPITE REPEATED SISS REPORTS!

This report should be taken as a complaint that insufficient procedures
have been put in place to ensure current and new Salomon personnel are
made aware of the security issues of Internet transmissions for network
device configuration files. Suggest wide-spread distribution of a memo
concerning the problem. Perhaps place "no-Internet-transmission" comments
in all network config files. Standard warning issued to all new networkers.

Three transmissions of live passwords to three different Salomon routers
have been sent in cleartext over the Internet by Rock Transves nnn-nnnn
of Internet Client Services:


SENDER DATE ROUTER LINE PASSWORD

Rock Transves 6/27/96 09:37 bc7f7w40 [global] bs345way
[and again on] 6/26/96 16:10 con 0 bs345way
aux 0 bs345way
vty 0 qwerty0

Rock Transves 6/18/96 11:27 ard7w35 [global] z23c4v5b
trangobw1 [global] bs345way
con 0 bs345way

ALL OF THESE ROUTERS *AND* ALL ROUTERS USING THE SAME PASSWORDS
MUST HAVE THEIR PASSWORDS CHANGED.
[snip]




*******************************************************************************
*******************************************************************************
*******************************************************************************

SECURITY INCIDENT REPORT, 7/3/96

OASYS SOURCE C


From: Matthew T. Russotto on
that the original target of the
* FBI probe was CISPES, but that the investigation broadened to include
* more than 100 other groups that opposed Reagan administration policy in
* Nicaragua and El Salvador.
*
* Despite the long investigation, no criminal charges were ever brought
* against any of the groups or their members.
*
* An FBI statement issued Wednesday said the agency only investigated
* suspected crimes, not political beliefs or constitutionally protected
* freedom of speech.
*
* Oliver Revell, the FBI's executive assistant director, said that the
* FBI did not investigate CISPES because of its political activities,
* but for a "wide range of possible crimes."


% The New York Times, Thursday, February 4, 1988
% "Reagan Backs FBI Over Surveillance"
%
% President Reagan is satisfied that the Federal Bureau of Investigation
% conducted a proper surveillance campaign against groups opposed to his
% policies in Central America, the White House said today.
%
% The new FBI Director William S. Sessions assured Reagan that there was
% a solid basis for the investigation: "We knew CISPES was established
% from funding by the Communist Party, U.S.A."


Well, Reagan didn't like a peaceful Texas based group called CISPES, which
was against the United States' support of the El Salvador government.

The El Salvador government was torturing and killing people.

* "Officers held in Salvador Abductions", By James LeMoyne, NYT, 4/25/86
*
* One of those arrested was accused of killing the head of the Salvadoran
* Land Reform Institute and two AMERICAN agrarian advisors.

So the FBI had one of their agents infiltrate CISPES using a Frank
Varelli, who was born in San Salvador and served in the U.S. Army.

#


From: Christian Siebert on
may be a thing of the past using a scanner that maps
# over 400 identifying features of your iris. The system will be tested at
# ATMs in Columbus, Ohio later this year. The company has been inundated
# with calls from other industries interested in using the technology.

And what about head shots of people...any 'machine vision' deals there?

* "New System Lets Computer Identify Pictures and Images"
* The New York Times, By John Holusha, [I failed to date the article clipping]
*
* New technology that may help solve one of the thorniest problems in computer
* science---teaching machines to recognize pictures--- was announced yesterday
* by officials of the David Sarnoff Research Center in Princeton, NJ. "We are
* going to make a business out of this", said IS VP Curtis R. Carlson. "It
* does things on a personal computer that used to require a supercomputer."

# "FBI Setting Standards for Computer Picture File of Criminals", NYT, 11/5/95
#
# A meeting called "Mug Shot and Facial Image Standards Conference" was held
# to set facial image standards. The standards will take into account
# emerging technologies like software that determines if two facial images
# belong to the same person, even from composite sketches.

Yep. Even using photographs. More on this later.

----

And what does a National ID Card with a Universal Biometric identifier mean?

A number (that is: scanned fingerprint or iris) that cannot be faked.

Unprecedented possibilities for control of the presumed guilty population.

You will be forced to verify yourself for an endlessly ever-growing list of
items.

* Dr. Linda Thompson:
* YOUR STATE IS NEXT AND DON'T THINK OTHERWISE. Sandia and other defense
* contractors, without a war elsewhere, are OUT OF WORK, so they're
* creating job security for themselves by helping fascists wage war in the
* United States on us and our r


From: tchow on
General. Meese had written
to companies like the owners of 7-11 and told them selling Playboy and
Penthouse could get them Federal obscenity charges. That was his attempt
to get around the First Amendment.

10/3/96 NYT: Because of computers, a bill was passed that changes the
definition of child pornography to include generated images that do
not involve actual children.

Thought crime. Law enforcement child pornography hysteria.

Sturges incident: attacked by the FBI Thought Police Squad. Massive corrupt
use of governmental law enforcement authority to enforce mere political
correctness. Due to its size: by definition not an aberration.


It cost one million dollars of our tax money.


----


On June 19, 1997, Senate Commerce Committee Chairman John McCain introduced
his own bill (Senator Kerrey co-sponsor) which parrots the Clinton
administration's position and forced it to replace the Pro-Code bill.

He banged the Drum of War against Child Pornography.

* http://cgi.pathfinder.com/netly, By Declan McCullagh
*
* In the end, it was child pornography that derailed encryption legislation
* in the U.S. Senate and dealt a bitter defeat to crypto supporters.
*
* Sen. John McCain (R-Ariz.), committee chair and chief sponsor of the
* measure, led the attack, saying Congress must "stop child pornography
* on the Internet."
*
* He warned that "allowing encryption to be exported would permit child
* pornographers to use it."
*
* "If it's being used for child pornography? Are we going to say
* that's just fine? That's it's just business? I don't think so."
*
* Sen. John Ashcroft (R-MO) tried to disagree. "It's like photography. We're
* not going to [ban] photog


From: JSH on
comply with a legion of rules to qualify for grants.
: Kerrey's proposed bill, called "The Secure Public
: Network Act," would add yet another provision to
: the fine print. It requires that "all encryption
: software purchased with federal funds shall be
: software based on a system of key recovery" and
: "all encrypted networks established with the use
: of federal funds shall use encryption based on a
: system of key recovery." Key recovery, or key
: escrow, technology enables law-enforcement
: officials to obtain copies of the mathematical keys
: needed to decipher messages. In other words,
: someone else keeps a copy of your secret key
: -- and some proposed bills say that the cops
: may not even need a search warrant to seize it.
: [snip]
:
: What about the penalties for "unauthorized
: breaking of another's encryption codes?" That
: would criminalize cryptanalysis, the way to verify
: the security of encryption software you buy. "The
: only way to know the strength of a cipher is
: cryptanalysis," says Marc Briceno, a
: cryptography guru at Community ConneXion.
:
: Then there's Kerrey's statement saying "there
: will be" restrictions on what encryption products
: you're permitted to buy from overseas firms.