From: Rotwang on
outside at a long distance.


* "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996
*
* The leading lobbyist for CALEA was Louis Freeh, the aggressive new
* director of the FBI. The government's most important investigative
* tool, Freeh said, was "wiretapping, court-authorized wiretapping."
*
* Unless remedial steps were taken, he continued, "the country will
* be unable to protect itself from terrorism, violent crime, drug
* trafficking, espionage, kidnapping and other grave crimes."
*
* But is Freeh's frightening vision true?
*
* In fact, at the same time the FBI was telling Congress and the public
* that the new technologies were already preventing them from conducting
* essential wiretaps, senior FBI officials from cities across the United
* States were telling FBI headquarters in Washington THE EXACT OPPOSITE.
* We know this because...[buy the book! Burnham is an American hero.]


Additionally, the FBI/NSA has briefcase-sized devices that can be attached
to any digital telephone company transmission line, and can monitor many
conversations simultaneously.

# "The FBI's Latest Idea: Make Wiretapping Easier"
# By Anthony Ramirez, The New York Times, April 19, 1992
#
# One telecommunications equipment manufacturer said he was puzzled by the
# FBI proposal. "The FBI already has a lot of technology to wiretap digital
# lines," he said, on the condition of anonymity.
#
# He said four companies, including such major firms as Mitel Corporation,
# a Canadian maker of telecommunications equipment, can design digital
# decoders to convert computer code back into voice.
#
# A portable system about the size of a large briefcase could track and
# decode 36 simultaneous c


From: Risto Lankinen on
and industrial companies.

It would have given Allende maximum control over the nations
industrial infrastructure, real-time monitoring of everything.

Everything had a computer monitoring it.

* "The Future of War - Power, Technology, and American World Dominance in
* the 21st Century", by George & Meredith Friedman, 1996, ISBN 0-517-70403-X
*
* McNamara's revolution built on an idea that was central to operations
* research and propounded by many nuclear strategists, that war was not
* methodologically distinguishable from economics. The process whereby you
* analyzed, managed, and controlled an economy was not essentially different
* from the way you managed a war, except that one was an economy of produc-
* tion and the other was an economy of force. The principal underlying both
* was the doctrine of efficiency: maximizing the benefits received from the
* efforts and expenditures---a cost benefit analysis.


Cyberneticians hope to use their capabilities for the
betterment of the human race, of which they are a part.

They are not naive when it comes to the government and politics, either.

* "The Rise of the Computer State", David Burnham, 1984
*
* Norbert Wiener, the MIT professor who is generally credited with being
* one of the principal minds behind the development of the computer,
* refused to take research money from the Pentagon because he was
* convinced it would corrupt his research and undermine his independence.

When Stafford Beer monitored factories and banks to give the government
the necessary tools to govern the economy effectively, he chose to
monitor national infrastructure of the industrial variety.

However, even he


From: Rotwang on
the backups) through my analytics.

I found plenty of stuff there too.

Another major category of incidents: people in their last week at work.

In most cases from the backups, the person had already left the firm.

Even when they were still here:

********** begin excerpt from 'Corruption at Salomon Brothers' **********

! 18,525 lines of proprietary YieldBook C source.
! The user is still here (voicemail answers).
! Sent to themselves, or a relative, into a college campus.
! This source is very Salomon-specific, and could not be useful
! to transmit offsite for "testing".
! It executes other programs in the YieldBook package tree, and
! needs a full setup of YieldBook to operate.
!
! Shall I do the secondary searches and an incident report?
! ---guy
!
! *********************************
! Filename: Dec_21_95/dfAA19116 Size: 522186, Dated: Dec 21 1995
! Sender: blort(a)bpann
! Recipient: blort(a)cornell.edu
! *********************************

********** end excerpt from 'Corruption at Salomon Brothers' **********

Nothing was done: I had completely overwhelmed Salomon Legal with security
incidents, and many were ignored.

In general, when you catch something in the backups, there are two choices:

o Grin and bear it
o File criminal or civil charges in court


Two of the security incidents found in the backups qualified for criminal
prosecution.

One was a source for the Finance Desk Trading System [FDTS].



********** begin excerpt from 'Corruption at Salomon Brothers' **********

>Date: Tue, 7 May 96 23:38:00 EDT
>From: guy
>To: vivian
>Subject: Jan 26 1996 REDHOT
>Cc: <others>

Vivian,

On Jan 26 1996:

18,184 lines of C++ source of something called "basis" for FDTS.

Here was the radar hit:

*********************************
File


From: Marshall on
to study and formulate the best policies
* possible in all economic and social spheres.

: From owner-firewalls-outgoing(a)GreatCircle.COM Wed May 14 18:54:15 1997
: Received: from osiris (osiris.nso.org [207.30.58.40]) by ra.nso.org
: (post.office MTA v1.9.3 ID# 0-13592) with SMTP id AAA322
: for <firewalls(a)GreatCircle.COM>; Wed, 14 May 1997 12:56:13 -0400
: Date: Wed, 14 May 1997 12:58:46 -0400
: To: firewalls(a)GreatCircle.COM
: From: research(a)isr.net (Research Unit I)
: Subject: Re: Encryption Outside US
:
:
: I was part of that OECD Expert Group, and believe I may shine at least
: some light on what exactly was said and happened at the meetings.
:
: The main conflict during all sessions was the demand of the US to be
: able to decrypt anything, anywhere at any time versus the European
: focus: we want to have the choice - with an open end - to maintain
: own surveillance. The US demand would have caused an immediate
: ability to tap into what the European intelligence community believes to
: be its sole and exclusive territory. In fact the Europeans were not at all
: pleased with the US view points of controlling ALL crypto. Germany and
: France vigorously refused to work with the US on this issue.
:
: The Clipper initiative (at the time not readily developed) was completely
: banned, except for the Australian and UK views that felt some obligation
: from the 1947 UKUSA treaty (dealing with interchange of intelligence).
:
: With a vast majority the US was cornered completely, and had to accept
: the international views. And actually adopted those as well. EFF, EPIC and
: other US organizations were delighted to see the formal US views b


From: Tim Smith on
source of secret
intelligence in the world today.


P-5655
Like the British examples, and Mike Frost's Canadian examples, these stories
will only be the tip of the iceberg.

There is no evidence of a UKUSA code of ethics or a tradition of respect
for Parliament or civil liberties in their home countries.

The opposite seems to be true: that anything goes as long as you do not
get caught. Secrecy not only permits but encourages questionable operations.


Three observations need to be made about the immense spying capability
provided by the ECHELON system.

The first is that the magnitude of the global network is a product of
decades of intense Cold War activity. Yet with the end of the Cold War
it has not been demobilized and budgets have not been significantly cut.

Indeed the network has grown in power and reach. Yet the public
justifications, for example that 'economic intelligence is now more
important', do not even begin to explain why this huge spy system
should be maintained. In the early 1980s the Cold War rhetoric was
extreme and glob