From: JSH on
January 1989 issue
#
# Al Bayse, Assistant Director of the FBI, said the FBI has developed an
# artificial intelligence system, called Big Floyd, that can analyze
# thousands of disparate financial transactions and establish links
# between seemingly unconnected suspects.
#
# The same artificial intelligence methodology will be used to establish
# links in terrorism, white-collar crime, intelligence breaches, and violent
# crimes with common clues or techniques.


Cybernetic control of society.

Everything on-line and monitored in real-time.


: From: "EPIC-News" <epic-news(a)epic.org>
: Date: 05 Jun 1997 19:01:58 -0400
: Subject: EPIC: Clinton Endorses Privacy Rights
:
: In a commencement address at Morgan State University on May 18,
: President Clinton called privacy "one of our most cherished freedoms"
: and said that technology should not "break down the wall of privacy and
: autonomy free citizens are guaranteed in a free society."

Is President Clinton being honest?

He supports Clipper III and ECHELON's legal domestic extension CALEA.

The Washington Post, July 7, 1996: the Clinton Administration has sharply
increased use of


From: Risto Lankinen on
hesitantly,
: "The Police man put the gun to my head, I was very a-scared!"


* "1984", author George Orwell, 1949, ISBN 0-679-41739-7
*
* Hardly a week passed in which the Times did not carry a paragraph
* describing how some eavesdropping little sneak --- 'child hero' was
* the phrase generally used --- had overheard some compromising remark
* and denounced his parents to the Thought Police.

# "The Emperor Wears No Clothes", by Jack Herer, 1992, ISBN 1-878125-00-1
#
# The Police-taught DARE program encourages students to turn in
# friends and family by becoming a police informant.

: Real life: a child in school answers the friendly and inquiring police
: officer teaching about drug dangers that yes their parents have some
: of the displayed paraphernalia.
:
: A search warrant is issued, the parents are arrested, and
: the child is put into custody of Child Welfare workers.


# "The Feds Under Our Beds", By James Bovard, The New York Times, 9/6/1995
#
# The


From: quasi on
Agency, a working group of
# federal bureaucrats founded the Biometric Consortium in the early 1990s.
# Its 1995 charter promises to "promote the science and performance of
# biometrics for the government."
#
# Consortium mumbers include state welfare agencies, driver's license
# bureaus, the Immigration and Naturalization Service, the Social Security
# Administration, and the Internal Revenue Service.


If my attempts to show how bad a thing this is have been too rambling,
too abstract, here is a simple and accurate analogy:

* "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5
*
* It was Martin Anderson who, in his book, Revolution, revealed that during
* the Reagan administration during the 1980s, several top cabinet officials
* were urging President Ronald Reagan to implement a computerized National
* I.D. Card.
*
* The rationale for the proposal was that such a system would help put a lid
* on illegal immigration. [Reagan had been Governor of California]
*
* But Anderson, who at the time was a domestic advisor to the President and
* sat in on this particular cabinet meeting, spoke up and gave the group
* something to think about.
*
* "I would like to suggest another way that I think is a lot better," he
* told them, serious in demeanor but clearly being facetious. "It's a lot
* cheaper, it can't be counterfeited. It's very lightweight, and it's
* impossible to lose. It's even waterproof."
*
* "All we have to do," Anderson continued, "is tattoo an identification
* number on the inside of everybody's arm."
*
* His reference was to the tattooing of numbers on victims in Nazi
* concentration camps. Survivors still bear the dreaded tattoo markings
* to this day.
*
* Mr. Anderson described the stunned reaction of those present, "There were
* several gasps around the table. A couple cabinet members looked as if they
* had been slapped. No one said anything for a lon


From: Pubkeybreaker on
During the shoot-first-ask-questions-later raid, police
* fired at least ninety-eight rounds into the apartment. Illinois chairman
* Fred Hampton and Peoria chairman Mark Clark were killed.
*
* An FBI informant gave the bureau specific information about where
* Hampton was probably sleeping, and a detailed floor plan of the house
* which the special squad used during its raid.
*
* Thirteen years later, in November 1982, District Court Judge John F.
* Grady determined that there was sufficient evidence of an FBI-led
* conspiracy to deprive the Panthers of their civil rights, and awarded
* the plaintiffs $1.85 million in damages.


: 5/30/97 MSNBC
:
: After more than a quarter of a century in prison, a Black Panther
: activist has won the right to a new trial. A judge ruled there had
: been prosecutorial misconduct. The judge overturned the conviction
: when it was disclosed the government prosecutors withheld critical
: evidence:
:
: o They never said the informer was working with and paid by
: the FBI.
:
: o A former FBI agent also agrees with his alibi: that he was
: in the Black Panther HQ at the time of the m


From: Pubkeybreaker on
these trade logs are passed to data input personnel, who then enter
: the trades into AAAA. (AAAA is designed to support direct on-line entry by
: Traders, but is not used in this manner on the Emerging Markets Desk.)
: AAAA feeds BBBB at the end of day which in turn feeds relevant downstream
: Salomon systems. AAAA also feeds the CCCC system, which is maintained as
: a stand-alone second level sub-ledger that provides functionality and
: records data not otherwise available. The first level sub-ledger on this
: Desk is DDDD.
:
: PROCESSING
: ----------
:
: All transactions in AAAA should be confirmed orally with counterparties by
: the end of trade date by checking to AAAA. All trades where AAAA and EEEE
: require
[final snip]

It was a LONG "Salomon Internal Audit Division" document, highly detailed,
including historical background info.

This document could be damaging in the wrong hands.

This looked like a Dumb-and-Dumber category transfer.

********** end excerpt from 'Corruption at Salomon Brothers' **********


******************************************************************************


Five Months Statistics
---- ------ ----------


Okay, I think I've shown you enough security incidents
for you to determine that this is a real thing.

That I am not "full of hooey".

Here is a summary of what I accomplished at Salomon while keyword monitoring.



********** begin excerpt from 'Corruption at Salomon