From: Chip Eastham on 18 Apr 2008 23:24 Security Agency, : America's most secret intelligence organization : Author James Bamford, 1983 revision, ISBN 0-14-00.6748-5 Page numbers are from the above 1983 release. Ready? P171-172: David Kahn, in a transatlantic phone call, reluctantly agreed to delete a handful of paragraphs dealing with the most sensitive subject of all: NSA's relationship with its supersecret British partner, GCHQ. "The two agencies exchange personnel on a temporary basis... A similar but much smaller liaison program is maintained with Canada and Australia." P399: After two years of compromising and negotiating, the BRUSA Agreement was supplemented in 1947 by the five-power UKUSA Agreement, which, according to one report, established the United States as a first party to the treaty, and Britain, Canada, and Australia-New Zealand as second parties. P391: ...quite likely the most secret agreement ever entered into by the English-speaking world. Signed in 1947 and known as the UKUSA Agreement, it brought together under a single umbrella the SIGINT organizations of the United States, Britain, Canada, Australia and New Zealand. The UKUSA Agreement's existence has never been officially acknowledged by any country even today. P271: Sharing seats alongside the NSA operators, at least in some areas, are SIGINT specialists from Britain's Government Communications Headquarters (GCHQ). According to a former Menwith Hill official, the two groups work very closely together. P229: David Watters, a telecommunications engineer once attached to the CIA's communications research and development branch, pulls out a microwave routing map of the greater Washington area and jabs his index finger at a small circle with several lines entering it and the letters NSA. "
From: Risto Lankinen on 18 Apr 2008 19:45 polemic': ---- This is a U.S.-centric message, but keep reading even if you are not in the U.S.; British, Canadian, Australian and New Zealand citizens are also directly affected. This message is about ECHELON, which is an unbelievably huge world-wide spying apparatus, including the domestic phone calls of many countries. United States citizens' phone calls are being monitored in a dragnet fashion not even George Orwell could have imagined. This was all paid for by U.S. taxpayers. Built in secret. Not debated. The CALEA legislation is a shameful takes-us-into-the-abyss domestic spy bill. It is for the FBI to simultaneously monitor HUGE amounts of our phone calls. And when the judiciary found out about NSA monitoring U.S. citizens' overseas telephone calls without a warrant: they approved the loss of our Fourth Amendment rights. Giving Presidential Directives the same force of law as the Constitution. Congress has lost it too. * The New York Times, undated * * The House is not expected to vote on the search-and-seizure bill until * at least Wednesday. But tonight the Republicans defeated a Democratic * amendment that SIMPLY REITERATED THE WORDS OF THE FOURTH AMENDMENT OF * THE UNITED STATES CONSTITUTION. * * The vote was 303 to 121. * * The Democrats were trying to portray the Republicans as wanting to * eliminate the constitutional protection against unlawful searches. * * Indeed, they cornered the Republicans into saying that the measure * containing the Fourth Amendment would gut the seizure bill. Just what
From: Christian Siebert on 18 Apr 2008 22:01 being suspected of a crime. Dragnet monitoring should not be the American way. Unrestricted cryptography must be made legal now, so we are no longer naked to ECHELON monitoring. It will be a beginning. : Privacy Journal's War Stories (75 pages, $21.50) is available from : PRIVACY JOURNAL, P.O. Box 28577, Providence RI 02908, 401/274-7861, : electronic mail: 5101719(a)mcimail.com. : : Beverly Folmsbee of Pittsfield Massachusetts, who was not suspected : of any drug use, left her job after declining to take a "degrading" : urinalysis test at her company, then known as Tech Tool Grinding & : Supply Inc. : : It required disrobing, donning a hospital gown, and submitting to : bodily inspection by a medical staff person. : : But the highest court in the state said that the testing was legitimate. : Source: Folmsbee v.Tech Tool Grinding & Supply Inc., 417 Mass. 338, 630 : N.E. 2d 586 (1994). It is totally urinating what the politicians and courts have allowed in the name of the Drug War. : Privacy Journal's War Stories, By Attorney Robert Ellis Smith : : Burlingame, CA, 1990: A flight attendant suffered medical complications : because of Federal requirements that compel drug-monitors to have : employees drink water until they can provide a urine sample. The 40-year- : old woman was unable to urinate in a random drug test. She drank three : quarts of water and even vomited some of it but could not urinate in the : noisy crowded test site. She became ill at home and a doctor diagnosed : her condition as "water intoxication." The lack of privacy inhibits : 25 percent of people
From: Pubkeybreaker on 18 Apr 2008 22:16 almost entirely as components of this integrated system. Each station in the network - not just the satellite stations - has Dictionary computers that report to the ECHELON system P37 United States spy satellites, designed to intercept communications from orbit above the earth, are also likely to be connected into the ECHELON system. These satellites either move in orbits that criss-cross the earth or, like the Intelsats, sit above the Equator in geostationary orbit. They have antennae that can scoop up very large quantities of radio communications from the areas below. A final element of the ECHELON system are facilities that tap directly into land-based telecommunications systems, completing a near total coverage of the world's communications. The microwave networks are made up of chains of microwave towers relaying messages from hilltop to hilltop (always within line of sight) across the countryside. These networks shunt large quantities of communications across a country. Intercepting them gives access to international underseas communications (once they surface) and to international communication trunk lines across continents. They are also an obvious target for large-scale interception of domestic commu
From: Risto Lankinen on 18 Apr 2008 19:38
# of lines filename ----- -------- 54 4x.env 139 LocalRules 344 LoginDlg.cc 65 LoginDlg.h 221 MacroRules 87 Makefile 619 OASYSMain.cc 175 OASYSMain.h 79 SubApp.cc 51 SubApp.h 54 gui_main.cc 33 gui_main.h 42 lib_inc 647 sbOfLogin.cc 113 sbOfLogin.h 0 sun4_4 22 version.txt 0 lib_inc/*.h 128 lib_inc/AccountBalance.h 22 lib_inc/AccountBalanceTest.h 59 lib_inc/AccrlInptTb.h 86 lib_inc/ArrClasT.h [snip of 247 lines] 38696 total ********** end excerpt from 'Corruption at Salomon Brothers' ********** Another major category of security incidents are what I've named: o Dumb-and-Dumber ********** begin excerpt from 'Corruption at Salomon Brothers' ********** > Date: Thu, 23 May 96 11:52:04 EDT > From: guy > To: vivian [Salomon lawyer to whom I reported] > Subject: Snarf: Two Redhots May 21/22 1996 > Cc: mon_c > > Vivian, > > |