From: Gerry Myerson on
offsite for "testing".
! It executes other programs in the YieldBook package tree, and
! needs a full setup of YieldBook to operate.
!
! Shall I do the secondary searches and an incident report?
! ---guy
!
! *********************************
! Filename: Dec_21_95/dfAA19116 Size: 522186, Dated: Dec 21 1995
! Sender: blort(a)bpann
! Recipient: blort(a)cornell.edu
! *********************************

********** end excerpt from 'Corruption at Salomon Brothers' **********

Nothing was done: I had completely overwhelmed Salomon Legal with security
incidents, and many were ignored.

In general, when you catch something in the backups, there are two choices:

o Grin and bear it
o File criminal or civil charges in court


Two of the security incidents found in the backups qualified for criminal
prosecution.

One was a source for the Finance Desk Trading System [FDTS].



********** begin excerpt from 'Corruption at Salomon Brothers' **********

>Date: Tue, 7 May 96 23:38:00 EDT
>From: guy
>To: vivian
>Subject: Jan 26 1996 REDHOT
>Cc: <others>

Vivian,

On Jan 26 1996:

18,184 lines of C++ source of something called "basis" for FDTS.

Here was the radar hit:




From: fortune.bruce on
******************************************************************************

BAM-BAM-BAM
--- --- ---

Let's pause to take a look back at the first and still classic expose of NSA.

: The Puzzle Palace
: Inside the National Security Agency,
: America's most secret intelligence organization
: Author James Bamford, 1983 revision, ISBN 0-14-00.6748-5

Page numbers are from the above 1983 release.

Ready?


P171-172: David Kahn, in a transatlantic phone call, reluctantly agreed to
delete a handful of paragraphs dealing with the most sensitive subject of
all: NSA's relationship with its supersecret British partner, GCHQ. "The
two agencies exchange personnel on a temporary basis... A similar but much
smaller liaison program is maintained with Canada and Australia."


P399: After two years of compromising and negotiating, the BRUSA Agreement
was supplemented in 1947 by the five-power UKUSA Agreement, which,
according to one report, established the United States as a first party
to the treaty, and Britain, Canada, and Australia-New Zealand as second
parties.


P391: ...quite likely the most secret agreement ever entered into by the
English-speaking world. Signed in 1947 and known as the UKUSA Agreement,
it brought together under a single umbrella the SIGINT organizations of
the United States, Britain, Canada, Australia and New Zealand. The UKUSA
Agreement's existence has never been officially acknowledged by any country
even today.


P2


From: Risto Lankinen on
Secret Court
------ -----


: The Washington Post Magazine, June 23 1996
: Government surveillance, terrorism and the U.S. Constitution:
: The story of a Washington courtroom no tourist can visit.
: By Jim McGee and Brian Duffy [snipped article excerpts shown here]
: Adapted from the book "Main Justice", 1996, ISBN 0-684-81135-9.
:
* Last year, a secret court in the Justice Department authorized a record
* 697 'national security' wiretaps on American soil, outside normal
* constitutional procedures.
*
* The Foreign Intelligence Surveillance Act, is a 1978 law that permits
* secret buggings and wiretaps of individuals suspected of being agents
* of a hostile foreign government or international terrorist organization
* EVEN WHEN THE TARGET IS NOT SUSPECTED OF COMMITTING ANY CRIME.
*
* The FISA court operates outside the normal constitutional standards for
* searches and seizures. Non-government personnel are not allowed.
* The courts files cannot be publicly reviewed.
*
* The average U.S. citizen might reasonably assume use of this court
* is at the least: unusual.
*
* It is not. In fact, in the United States today it is increasingly
* common. In 1994, federal courts authorized more wiretaps for
* intelligence-gathering and national security purposes than they
* did to investigate ordinary federal crimes.
*
* The review process to prevent legal and factual errors is virtually
* non-existent.
*
* And the FISA system's courtroom advocacy is monumentally one-sided.
*
* The court has never formally rejected an application. Not once.
*
* For the first time in modern U.S. history, the Congress had
* institutionalized a process for ph


From: fortune.bruce on
Duffy, 1996, ISBN 0-684-81135-9
:
: The internal Justice Department FISA watchdog was Mary Lawton: it took
: her two years before saying the investigations into CISPES & Co should
: be shut down.
:
: On the day after Thanksgiving in 1993, not quite a month after Mary Lawton
: died, Richard Scruggs decided it was time to go through her office on the
: sixth floor of Main Justice.
:
: The deeper Scruggs got into the FISA files, the more uneasy he grew.
:
: Reading the FISA applications in Lawton's files, Scruggs began finding
: errors. The volume of FISA cases was so heavy that the lawyers could spend
: only so much time on each one.
:
: "The review process to prevent factual and legal errors was virtually
: nonexistent," Scruggs recalled.
:
: In high school, Mary Lawton had won a debate about the meaning of the
: U.S. Constitution.

Nor was it an aberration: the 1980s joined the 1960s and 1970s with yet
another massive use of this Orwellian technology for political purposes.

And these are when they were caught.

It's currently used for the "Drug War", a highly political endeavor.

Of course, once CISPES was designated as a terrorist organization...

: The Washington Post Magazine, June 23 1996
:
* The CISPES investigation exp


From: Christian Siebert on
and personal messages that the station catches.

The computers automatically search through everything as it arrives at the
station.

This is the work of the Dictionary program.

It reads every word and number in every single incoming message and picks out
all the ones containing target keywords and numbers.

Thousands of simultaneous messages are read in 'real time' as they pour into
the station, hour after hour, day after day, as the computer finds
intelligence needles in the telecommunications haystack.

Telephone calls containing keywords are automatically extracted from the
masses of other calls and digitally recorded to be listened to by analysts
back in the agency headquarters.

The implications of this capability are immense.

The UKUSA agencies can use machines to search through all the telephone calls
in the world, just as they do for written messages.

It has nothing to do with whether someone is deliberately tapping your phone,
simply whether you say a keyword or combination of keywords that is of
interest to one of the UKUSA agencies.


P47
The keywords include such things as names of people, ships, organizations,
countries and subjects. They also include the known telex and phone numbers
and Internet addresses of the individuals, businesses, organizations and
government offices they may want to target.

The agencies also specify combinations of these keywords to help sift out
communications of interest.

For example, they might search for diplomatic cables containing both the
words 'Suva' and 'aid', or cables containing the word 'Suva' but NOT the
word 'consul' (to avoid the masses o