From: Gerry Myerson on 18 Apr 2008 21:07 offsite for "testing". ! It executes other programs in the YieldBook package tree, and ! needs a full setup of YieldBook to operate. ! ! Shall I do the secondary searches and an incident report? ! ---guy ! ! ********************************* ! Filename: Dec_21_95/dfAA19116 Size: 522186, Dated: Dec 21 1995 ! Sender: blort(a)bpann ! Recipient: blort(a)cornell.edu ! ********************************* ********** end excerpt from 'Corruption at Salomon Brothers' ********** Nothing was done: I had completely overwhelmed Salomon Legal with security incidents, and many were ignored. In general, when you catch something in the backups, there are two choices: o Grin and bear it o File criminal or civil charges in court Two of the security incidents found in the backups qualified for criminal prosecution. One was a source for the Finance Desk Trading System [FDTS]. ********** begin excerpt from 'Corruption at Salomon Brothers' ********** >Date: Tue, 7 May 96 23:38:00 EDT >From: guy >To: vivian >Subject: Jan 26 1996 REDHOT >Cc: <others> Vivian, On Jan 26 1996: 18,184 lines of C++ source of something called "basis" for FDTS. Here was the radar hit:
From: fortune.bruce on 18 Apr 2008 19:43 ****************************************************************************** BAM-BAM-BAM --- --- --- Let's pause to take a look back at the first and still classic expose of NSA. : The Puzzle Palace : Inside the National Security Agency, : America's most secret intelligence organization : Author James Bamford, 1983 revision, ISBN 0-14-00.6748-5 Page numbers are from the above 1983 release. Ready? P171-172: David Kahn, in a transatlantic phone call, reluctantly agreed to delete a handful of paragraphs dealing with the most sensitive subject of all: NSA's relationship with its supersecret British partner, GCHQ. "The two agencies exchange personnel on a temporary basis... A similar but much smaller liaison program is maintained with Canada and Australia." P399: After two years of compromising and negotiating, the BRUSA Agreement was supplemented in 1947 by the five-power UKUSA Agreement, which, according to one report, established the United States as a first party to the treaty, and Britain, Canada, and Australia-New Zealand as second parties. P391: ...quite likely the most secret agreement ever entered into by the English-speaking world. Signed in 1947 and known as the UKUSA Agreement, it brought together under a single umbrella the SIGINT organizations of the United States, Britain, Canada, Australia and New Zealand. The UKUSA Agreement's existence has never been officially acknowledged by any country even today. P2
From: Risto Lankinen on 18 Apr 2008 19:15 Secret Court ------ ----- : The Washington Post Magazine, June 23 1996 : Government surveillance, terrorism and the U.S. Constitution: : The story of a Washington courtroom no tourist can visit. : By Jim McGee and Brian Duffy [snipped article excerpts shown here] : Adapted from the book "Main Justice", 1996, ISBN 0-684-81135-9. : * Last year, a secret court in the Justice Department authorized a record * 697 'national security' wiretaps on American soil, outside normal * constitutional procedures. * * The Foreign Intelligence Surveillance Act, is a 1978 law that permits * secret buggings and wiretaps of individuals suspected of being agents * of a hostile foreign government or international terrorist organization * EVEN WHEN THE TARGET IS NOT SUSPECTED OF COMMITTING ANY CRIME. * * The FISA court operates outside the normal constitutional standards for * searches and seizures. Non-government personnel are not allowed. * The courts files cannot be publicly reviewed. * * The average U.S. citizen might reasonably assume use of this court * is at the least: unusual. * * It is not. In fact, in the United States today it is increasingly * common. In 1994, federal courts authorized more wiretaps for * intelligence-gathering and national security purposes than they * did to investigate ordinary federal crimes. * * The review process to prevent legal and factual errors is virtually * non-existent. * * And the FISA system's courtroom advocacy is monumentally one-sided. * * The court has never formally rejected an application. Not once. * * For the first time in modern U.S. history, the Congress had * institutionalized a process for ph
From: fortune.bruce on 18 Apr 2008 21:33 Duffy, 1996, ISBN 0-684-81135-9 : : The internal Justice Department FISA watchdog was Mary Lawton: it took : her two years before saying the investigations into CISPES & Co should : be shut down. : : On the day after Thanksgiving in 1993, not quite a month after Mary Lawton : died, Richard Scruggs decided it was time to go through her office on the : sixth floor of Main Justice. : : The deeper Scruggs got into the FISA files, the more uneasy he grew. : : Reading the FISA applications in Lawton's files, Scruggs began finding : errors. The volume of FISA cases was so heavy that the lawyers could spend : only so much time on each one. : : "The review process to prevent factual and legal errors was virtually : nonexistent," Scruggs recalled. : : In high school, Mary Lawton had won a debate about the meaning of the : U.S. Constitution. Nor was it an aberration: the 1980s joined the 1960s and 1970s with yet another massive use of this Orwellian technology for political purposes. And these are when they were caught. It's currently used for the "Drug War", a highly political endeavor. Of course, once CISPES was designated as a terrorist organization... : The Washington Post Magazine, June 23 1996 : * The CISPES investigation exp
From: Christian Siebert on 18 Apr 2008 21:08
and personal messages that the station catches. The computers automatically search through everything as it arrives at the station. This is the work of the Dictionary program. It reads every word and number in every single incoming message and picks out all the ones containing target keywords and numbers. Thousands of simultaneous messages are read in 'real time' as they pour into the station, hour after hour, day after day, as the computer finds intelligence needles in the telecommunications haystack. Telephone calls containing keywords are automatically extracted from the masses of other calls and digitally recorded to be listened to by analysts back in the agency headquarters. The implications of this capability are immense. The UKUSA agencies can use machines to search through all the telephone calls in the world, just as they do for written messages. It has nothing to do with whether someone is deliberately tapping your phone, simply whether you say a keyword or combination of keywords that is of interest to one of the UKUSA agencies. P47 The keywords include such things as names of people, ships, organizations, countries and subjects. They also include the known telex and phone numbers and Internet addresses of the individuals, businesses, organizations and government offices they may want to target. The agencies also specify combinations of these keywords to help sift out communications of interest. For example, they might search for diplomatic cables containing both the words 'Suva' and 'aid', or cables containing the word 'Suva' but NOT the word 'consul' (to avoid the masses o |