From: fortune.bruce on 18 Apr 2008 21:05 how to determine it in an almost systemic way. Oddly enough, I needed no keywords for specifically seeking out source code. So, keyword monitoring is highly effective, I could even cover three feeds, and, sigh, I should mention that it took well less than 5000 lines of programming source code for me to implement it. And I generated two FBI cases. [ Think of what could happen should the FBI get its implementation of the CALEA bill. They could go nuts, and say "see, that proves we need to monitor thousands of phone calls simultaneously". And into the abyss we go. There would be no place to hide from the government, even for lawful peaceful political protest. Domestic ECHELON must be physically disabled. ] There's more. ****************************************************************************** I Can See What You Are Thinking - --- --- ---- --- --- -------- In the complaint, I breathlessly described being able to see more than just dry security incidents. The point was germane to my analysis that one of the reasons the corrupt member of Salomon's Internal Audit department could seemingly not be punished by anyone was that his job as financial traffic analysis person made him privy to the most damaging unreported SEC violations that anyone at Salomon would know about. If you spot criminal behavior, it is a very personal thing to the employee. ********** begin e
From: Gage on 18 Apr 2008 21:24 of their duties. The government will * also have to create new regulations for international cooperation * so that the necessary surveillance will be able to operate. # "Made in America?", Wired Magazine, June 1997 # # Japan's Justice Ministry is rallying support for an anticrime bill that # would give police extensive wiretap powers---a major departure given the # country's constitutional guarantees for "secrecy of any means of communi- # cations." According to activist Toshimaru Ogura, Japanese cops are # modeling their proposals on US wiretap law, specifically the 1994 # Communications Assistance for Law Enforcement Act (CALEA). The NSA helped # sculpt CALEA's language, which begs the question: Is Japan's wiretap bill # another one of the NSA's covert operations? * "The End of Ordinary Money, Part I", by J. Orlin Grabbe * http://www.aci.net/kalliste * * The Federal Deposit Insurance Corporation (FDIC) is the government * corporation that insures deposits at U.S. member banks. The FDIC * improvement act of 1991 required the FDIC to study the costs and * feasibility of tracking every bank deposit in the U.S. * * The notion was it was necessary to c
From: Rotwang on 18 Apr 2008 19:00 Varney continued to describe the threatening items that had been found > in Cummings' residence: a copy of The Anarchist's Cookbook, publications > from Loompanix, a mag stripe read head (no electronics) which "could have > been used" to commit fraud, and material thought to be C4 but later > proven not to be. However, Varney said, the fact that it could have been > showed how serious this was. Nobody questioned his logic. Wow, I'd better throw out my copy of "The Anarchist's Cookbook", eh?. Oh wait: it would be more fitting if I blew it up. * C-SPAN Television, Wednesday June 5th, 1997 * * Andrew Grove, Chairman & CEO of Intel Corporation, is asked whether * bomb-making information should be censored from the Internet. * * "No. The same information is available in libraries, and we don't * censor libraries, nor should we. When I was thirteen I built a * nitroglycerin bomb. It was an incredibly stupid thing to do, * and I knew someone who had their hand blown off, but I am * adamantly against censoring such material." * * "And unlike a library, a parent can buy a program that uses
From: Risto Lankinen on 18 Apr 2008 19:44 someone(a)sbixxx (someone someone) > : Recipient: someone(a)bfm.com > : Subject: prepay.c > : ********************************* > > > static char *rcsid="$Id: prepay.c,v 1.29 1996/03/26 13:42:30 kautilya"; > /* Copyright M-) 1995 by Salomon Brothers Inc. All rights reserved. > ** Unpublished. > ** This software is proprietary and confidential to Salomon Brothers Inc > ** and may not be duplicated, disclosed to third parties, or used for > ** any purpose not expressly authorized by Salomon Brothers Inc. > ** Any unauthorized use, duplication, or disclosure is prohibited by law > ** and will result in prosecution. */ > > About 500 lines of C source outbound. Full source is enclosed. > > > > Last line in this email is marked as such, there are no attachments. > Thanks, > ---guy > > [snip] > > Roger, > > Let me know if this is what you want, otherwise I'll try again ! > > Lara > > [snip] > Lara, > > I've been hoping for those progs but they hadn't arrived. Can you > check my email address? > > This will be mega brownie points for me to get it working so fast. > > Thanks, > Roger The first one is where an ex-worker ("Dumb") asks a current employee for something proprietary, in this case written by the ex-co-worker, and the current employee ("Dumber") gives it to them. It happened again and again and again at all
From: bitsplit on 18 Apr 2008 21:23
Weaver? Blackmail. One of the FBI's favorite activities is spying on political organizations. They wanted to use him to infiltrate white supremacists groups for the government. Or face prosecution. When Weaver refused, he was indicted on guns charges. He was sent two conflicting court appearance dates. He became paranoid the Government was out to get him, so he didn't show up. [He was eventually acquitted of all charges except the original not showing up in court!] To justify a militaristic retaliation, BATF agents lied to the U.S. attorney's office. BATF agents claimed that Weaver had a criminal record and that he was a suspect in several bank robberies. Both charges were fabrications, even according to BATF Director John Magaw, who admitted the accusations were "inexcusable" in testimony before Congress. THREE HUNDRED armed federal agents conducted a siege of the Weavers' mountain home, first killing Randy Weaver's dog, then his son, then his wife. A law enforcement wilding. * The CATO Institute, "Congressional Testimony", May 24, 1995 * http://www.cato.org * * The Marshals, wearing camouflage and carrying silenced machine guns, did * not identify themselves or their purpose, but they |