From: Risto Lankinen on 18 Apr 2008 19:08 and responsibilities: > Project management of a new XXXXX project is what I'll be > doing at XXXXX XXXXX (a bank from <country> ranked in the top 20). > I'll start by consulting ($$/hour plus 1.5*OT) for TTTTTTTT. > After that we talk about them invoking their right-to-hire clause. > I might make VP. The project is great inasmuch as I'm starting it > from scratch; it's not only not burdened by legacy code, but I > can even pick the hardware. I'm "up" but also worried about the > responsibility. > > The application is X risk analysis and XX for investors. It connects > to a front end for a trading system. > > I put a lot of working into talking my new boss into me giving the > normal 2 weeks notice at Salomon (they wanted me yesterday), because > my current project is nearing a critical point. But my Salomon boss > said just do a handoff now and leave. > > I am upset. I was trying to be professional. Boy, email is one cheap detective! Anyway, that seems the full scoop. ---guy ********** end excerpt from 'Corruption at Salomon Brothers' ********** Notice my 'Boy, email is one cheap detective!' observation; Legal had talked about hiring
From: Pubkeybreaker on 18 Apr 2008 20:49 P47 The keywords include such things as names of people, ships, organizations, countries and subjects. They also include the known telex and phone numbers and Internet addresses of the individuals, businesses, organizations and government offices they may want to target. The agencies also specify combinations of these keywords to help sift out communications of interest. For example, they might search for diplomatic cables containing both the words 'Suva' and 'aid', or cables containing the word 'Suva' but NOT the word 'consul' (to avoid the masses of routine consular communications). It is these sets of words and numbers (and combinations of them), under a particular category, that are placed in the Dictionary computers. The whole system was developed by the NSA. P51- The only known public reference to the ECHELON system was made in relation to the Menwith Hill station. In July 1988, a United States newspaper, the Cleveland Plain Dealer, published a story about electronic monitoring of phone calls of a Republican senator, Strom Thurmond. The alleged monitoring occurred at Menwith Hill. Margar
From: Pubkeybreaker on 18 Apr 2008 22:05 (SIOC) optical card technology, thus * enabling single, one-pass encoding. [it's a color card printer] Is it just a sophisticated photo-ID, or is it a Universal Biometric Card? * Sandia has combined its exclusive DataGlyphs portable database software * and secure card printing technologies with Fingerscan's three * dimensional fingerprint imaging capabilities to provide a complete * secure card solution using biometric data. * * The innovations of this technology can benefit banking and financial * institutions, national welfare, benefits and immigration programs. In * recent contracts, technology from Fingerscan has replaced traditional * password systems at the White House and at the U.S. Strategic Air Command. * * Fingerscan, an Identix company, provides biometric identification in * the form of a three dimensional scan of a fingerprint, captured when a * finger is held against a Fingerscan device, a self-contained terminal * that stores finger records, keeps a log of transactions and interacts * with
From: Risto Lankinen on 18 Apr 2008 19:18 developed at * Los Alamos National Laboratory for the noninvasive identification * of the fill content of sealed containers. * * Identification is accomplished by analyzing the effect that the fill * material has on the resonance modes of the container. Based on the * acoustic vibrations of an object, this Los Alamos instrument quickly * and safely identifies the fill content of containers [for purity of * one kind of substance I guess]. * * [The instrument is implemented and pictured] The ARS instrument was * selected to receive one of R&D Magazine's 1995 R&D 100 Awards; the * awards are given annually for the one hundred most significant * technical innovations. * * The technique is suitable for any noninvasive identification of fill * materials in sealed containers. But no, massive monitoring of people suspected of no crime is the appropriate response. They were just warming us up for the CALEA telephone monitoring bill. ---- Here is part of the story on why we let trucks full of cocaine and heroin just roll right into the United States. * "Diminished U.S. Role Below Border Plays Into Traffickers' Hands" * * By Molly Moore and John Ward Anderson * Washington Post Foreign Service
From: Rotwang on 18 Apr 2008 21:53
Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum War War War War War War War War War War War War War War War It is ECHELON that they are trying to protect. If the FBI targets you, they can get all your phone conversations BEFORE they are encrypted, and can get your password to access your private cryptography key. * "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996 * "Keeping Track of the American People: The Unblinking Eye and Giant Ear" * * About six times a week, fifty-two weeks a year, a team of highly trained * FBI agents secretly breaks into a house, office, or warehouse somewhere in * the United States. * * The agents are members of the bureau's Surreptitious Entry Program, and * their usual mission is to plant a hidden microphone or camera without * tipping off the people who occupy the targeted structure. * * FBI officials refuse to discuss, even in the most general way, the * operations of these clandestine hit squads. * * Use of break-ins has increased six-fold in the last several years. * * Furthermore, the FBI has blamed the security industry for making locks * and alarms more difficult to defeat. * * That was the central justification offered by the FBI when a couple of * years ago it asked the White House for $27 million in public funds to * pay the engineering whizzes at the Sandia and Los Alamos National * Laboratories and several other government research facilities to develop * ways to defeat "any locking |