From: Chip Eastham on
Security Agency,
: America's most secret intelligence organization
: Author James Bamford, 1983 revision, ISBN 0-14-00.6748-5

Page numbers are from the above 1983 release.

Ready?


P171-172: David Kahn, in a transatlantic phone call, reluctantly agreed to
delete a handful of paragraphs dealing with the most sensitive subject of
all: NSA's relationship with its supersecret British partner, GCHQ. "The
two agencies exchange personnel on a temporary basis... A similar but much
smaller liaison program is maintained with Canada and Australia."


P399: After two years of compromising and negotiating, the BRUSA Agreement
was supplemented in 1947 by the five-power UKUSA Agreement, which,
according to one report, established the United States as a first party
to the treaty, and Britain, Canada, and Australia-New Zealand as second
parties.


P391: ...quite likely the most secret agreement ever entered into by the
English-speaking world. Signed in 1947 and known as the UKUSA Agreement,
it brought together under a single umbrella the SIGINT organizations of
the United States, Britain, Canada, Australia and New Zealand. The UKUSA
Agreement's existence has never been officially acknowledged by any country
even today.


P271: Sharing seats alongside the NSA operators, at least in some areas,
are SIGINT specialists from Britain's Government Communications Headquarters
(GCHQ). According to a former Menwith Hill official, the two groups work
very closely together.


P229: David Watters, a telecommunications engineer once attached to the
CIA's communications research and development branch, pulls out a microwave
routing map of the greater Washington area and jabs his index finger at a
small circle with several lines entering it and the letters NSA. "


From: Risto Lankinen on
polemic':
----


This is a U.S.-centric message, but keep reading even if you are not in the
U.S.; British, Canadian, Australian and New Zealand citizens are also directly
affected.

This message is about ECHELON, which is an unbelievably huge world-wide
spying apparatus, including the domestic phone calls of many countries.

United States citizens' phone calls are being monitored in a dragnet
fashion not even George Orwell could have imagined.

This was all paid for by U.S. taxpayers.

Built in secret. Not debated.

The CALEA legislation is a shameful takes-us-into-the-abyss domestic spy bill.
It is for the FBI to simultaneously monitor HUGE amounts of our phone calls.

And when the judiciary found out about NSA monitoring U.S. citizens'
overseas telephone calls without a warrant: they approved the loss
of our Fourth Amendment rights.

Giving Presidential Directives the same force of law as the Constitution.

Congress has lost it too.

* The New York Times, undated
*
* The House is not expected to vote on the search-and-seizure bill until
* at least Wednesday. But tonight the Republicans defeated a Democratic
* amendment that SIMPLY REITERATED THE WORDS OF THE FOURTH AMENDMENT OF
* THE UNITED STATES CONSTITUTION.
*
* The vote was 303 to 121.
*
* The Democrats were trying to portray the Republicans as wanting to
* eliminate the constitutional protection against unlawful searches.
*
* Indeed, they cornered the Republicans into saying that the measure
* containing the Fourth Amendment would gut the seizure bill.

Just what


From: Christian Siebert on
being suspected of a crime.

Dragnet monitoring should not be the American way.

Unrestricted cryptography must be made legal now,
so we are no longer naked to ECHELON monitoring.
It will be a beginning.


: Privacy Journal's War Stories (75 pages, $21.50) is available from
: PRIVACY JOURNAL, P.O. Box 28577, Providence RI 02908, 401/274-7861,
: electronic mail: 5101719(a)mcimail.com.
:
: Beverly Folmsbee of Pittsfield Massachusetts, who was not suspected
: of any drug use, left her job after declining to take a "degrading"
: urinalysis test at her company, then known as Tech Tool Grinding &
: Supply Inc.
:
: It required disrobing, donning a hospital gown, and submitting to
: bodily inspection by a medical staff person.
:
: But the highest court in the state said that the testing was legitimate.
: Source: Folmsbee v.Tech Tool Grinding & Supply Inc., 417 Mass. 338, 630
: N.E. 2d 586 (1994).


It is totally urinating what the politicians and
courts have allowed in the name of the Drug War.


: Privacy Journal's War Stories, By Attorney Robert Ellis Smith
:
: Burlingame, CA, 1990: A flight attendant suffered medical complications
: because of Federal requirements that compel drug-monitors to have
: employees drink water until they can provide a urine sample. The 40-year-
: old woman was unable to urinate in a random drug test. She drank three
: quarts of water and even vomited some of it but could not urinate in the
: noisy crowded test site. She became ill at home and a doctor diagnosed
: her condition as "water intoxication." The lack of privacy inhibits
: 25 percent of people


From: Pubkeybreaker on
almost entirely as components of this integrated system.

Each station in the network - not just the satellite stations - has Dictionary
computers that report to the ECHELON system


P37
United States spy satellites, designed to intercept communications from orbit
above the earth, are also likely to be connected into the ECHELON system.

These satellites either move in orbits that criss-cross the earth or, like
the Intelsats, sit above the Equator in geostationary orbit.

They have antennae that can scoop up very large quantities of radio
communications from the areas below.

A final element of the ECHELON system are facilities that tap directly into
land-based telecommunications systems, completing a near total coverage of
the world's communications.

The microwave networks are made up of chains of microwave towers relaying
messages from hilltop to hilltop (always within line of sight) across the
countryside. These networks shunt large quantities of communications across
a country. Intercepting them gives access to international underseas
communications (once they surface) and to international communication trunk
lines across continents.

They are also an obvious target for large-scale interception of domestic
commu


From: Risto Lankinen on
# of
lines filename
----- --------
54 4x.env
139 LocalRules
344 LoginDlg.cc
65 LoginDlg.h
221 MacroRules
87 Makefile
619 OASYSMain.cc
175 OASYSMain.h
79 SubApp.cc
51 SubApp.h
54 gui_main.cc
33 gui_main.h
42 lib_inc
647 sbOfLogin.cc
113 sbOfLogin.h
0 sun4_4
22 version.txt
0 lib_inc/*.h
128 lib_inc/AccountBalance.h
22 lib_inc/AccountBalanceTest.h
59 lib_inc/AccrlInptTb.h
86 lib_inc/ArrClasT.h
[snip of 247 lines]
38696 total

********** end excerpt from 'Corruption at Salomon Brothers' **********





Another major category of security incidents are what I've named:

o Dumb-and-Dumber


********** begin excerpt from 'Corruption at Salomon Brothers' **********

> Date: Thu, 23 May 96 11:52:04 EDT
> From: guy
> To: vivian [Salomon lawyer to whom I reported]
> Subject: Snarf: Two Redhots May 21/22 1996
> Cc: mon_c
>
> Vivian,
>
>