From: JSH on 18 Apr 2008 19:00 January 1989 issue # # Al Bayse, Assistant Director of the FBI, said the FBI has developed an # artificial intelligence system, called Big Floyd, that can analyze # thousands of disparate financial transactions and establish links # between seemingly unconnected suspects. # # The same artificial intelligence methodology will be used to establish # links in terrorism, white-collar crime, intelligence breaches, and violent # crimes with common clues or techniques. Cybernetic control of society. Everything on-line and monitored in real-time. : From: "EPIC-News" <epic-news(a)epic.org> : Date: 05 Jun 1997 19:01:58 -0400 : Subject: EPIC: Clinton Endorses Privacy Rights : : In a commencement address at Morgan State University on May 18, : President Clinton called privacy "one of our most cherished freedoms" : and said that technology should not "break down the wall of privacy and : autonomy free citizens are guaranteed in a free society." Is President Clinton being honest? He supports Clipper III and ECHELON's legal domestic extension CALEA. The Washington Post, July 7, 1996: the Clinton Administration has sharply increased use of
From: Risto Lankinen on 18 Apr 2008 21:23 hesitantly, : "The Police man put the gun to my head, I was very a-scared!" * "1984", author George Orwell, 1949, ISBN 0-679-41739-7 * * Hardly a week passed in which the Times did not carry a paragraph * describing how some eavesdropping little sneak --- 'child hero' was * the phrase generally used --- had overheard some compromising remark * and denounced his parents to the Thought Police. # "The Emperor Wears No Clothes", by Jack Herer, 1992, ISBN 1-878125-00-1 # # The Police-taught DARE program encourages students to turn in # friends and family by becoming a police informant. : Real life: a child in school answers the friendly and inquiring police : officer teaching about drug dangers that yes their parents have some : of the displayed paraphernalia. : : A search warrant is issued, the parents are arrested, and : the child is put into custody of Child Welfare workers. # "The Feds Under Our Beds", By James Bovard, The New York Times, 9/6/1995 # # The
From: quasi on 18 Apr 2008 20:50 Agency, a working group of # federal bureaucrats founded the Biometric Consortium in the early 1990s. # Its 1995 charter promises to "promote the science and performance of # biometrics for the government." # # Consortium mumbers include state welfare agencies, driver's license # bureaus, the Immigration and Naturalization Service, the Social Security # Administration, and the Internal Revenue Service. If my attempts to show how bad a thing this is have been too rambling, too abstract, here is a simple and accurate analogy: * "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5 * * It was Martin Anderson who, in his book, Revolution, revealed that during * the Reagan administration during the 1980s, several top cabinet officials * were urging President Ronald Reagan to implement a computerized National * I.D. Card. * * The rationale for the proposal was that such a system would help put a lid * on illegal immigration. [Reagan had been Governor of California] * * But Anderson, who at the time was a domestic advisor to the President and * sat in on this particular cabinet meeting, spoke up and gave the group * something to think about. * * "I would like to suggest another way that I think is a lot better," he * told them, serious in demeanor but clearly being facetious. "It's a lot * cheaper, it can't be counterfeited. It's very lightweight, and it's * impossible to lose. It's even waterproof." * * "All we have to do," Anderson continued, "is tattoo an identification * number on the inside of everybody's arm." * * His reference was to the tattooing of numbers on victims in Nazi * concentration camps. Survivors still bear the dreaded tattoo markings * to this day. * * Mr. Anderson described the stunned reaction of those present, "There were * several gasps around the table. A couple cabinet members looked as if they * had been slapped. No one said anything for a lon
From: Pubkeybreaker on 18 Apr 2008 20:36 During the shoot-first-ask-questions-later raid, police * fired at least ninety-eight rounds into the apartment. Illinois chairman * Fred Hampton and Peoria chairman Mark Clark were killed. * * An FBI informant gave the bureau specific information about where * Hampton was probably sleeping, and a detailed floor plan of the house * which the special squad used during its raid. * * Thirteen years later, in November 1982, District Court Judge John F. * Grady determined that there was sufficient evidence of an FBI-led * conspiracy to deprive the Panthers of their civil rights, and awarded * the plaintiffs $1.85 million in damages. : 5/30/97 MSNBC : : After more than a quarter of a century in prison, a Black Panther : activist has won the right to a new trial. A judge ruled there had : been prosecutorial misconduct. The judge overturned the conviction : when it was disclosed the government prosecutors withheld critical : evidence: : : o They never said the informer was working with and paid by : the FBI. : : o A former FBI agent also agrees with his alibi: that he was : in the Black Panther HQ at the time of the m
From: Pubkeybreaker on 18 Apr 2008 20:33
these trade logs are passed to data input personnel, who then enter : the trades into AAAA. (AAAA is designed to support direct on-line entry by : Traders, but is not used in this manner on the Emerging Markets Desk.) : AAAA feeds BBBB at the end of day which in turn feeds relevant downstream : Salomon systems. AAAA also feeds the CCCC system, which is maintained as : a stand-alone second level sub-ledger that provides functionality and : records data not otherwise available. The first level sub-ledger on this : Desk is DDDD. : : PROCESSING : ---------- : : All transactions in AAAA should be confirmed orally with counterparties by : the end of trade date by checking to AAAA. All trades where AAAA and EEEE : require [final snip] It was a LONG "Salomon Internal Audit Division" document, highly detailed, including historical background info. This document could be damaging in the wrong hands. This looked like a Dumb-and-Dumber category transfer. ********** end excerpt from 'Corruption at Salomon Brothers' ********** ****************************************************************************** Five Months Statistics ---- ------ ---------- Okay, I think I've shown you enough security incidents for you to determine that this is a real thing. That I am not "full of hooey". Here is a summary of what I accomplished at Salomon while keyword monitoring. ********** begin excerpt from 'Corruption at Salomon |