From: Risto Lankinen on
and responsibilities:

> Project management of a new XXXXX project is what I'll be
> doing at XXXXX XXXXX (a bank from <country> ranked in the top 20).
> I'll start by consulting ($$/hour plus 1.5*OT) for TTTTTTTT.
> After that we talk about them invoking their right-to-hire clause.
> I might make VP. The project is great inasmuch as I'm starting it
> from scratch; it's not only not burdened by legacy code, but I
> can even pick the hardware. I'm "up" but also worried about the
> responsibility.
>
> The application is X risk analysis and XX for investors. It connects
> to a front end for a trading system.
>
> I put a lot of working into talking my new boss into me giving the
> normal 2 weeks notice at Salomon (they wanted me yesterday), because
> my current project is nearing a critical point. But my Salomon boss
> said just do a handoff now and leave.
>
> I am upset. I was trying to be professional.


Boy, email is one cheap detective!

Anyway, that seems the full scoop.

---guy

********** end excerpt from 'Corruption at Salomon Brothers' **********



Notice my 'Boy, email is one cheap detective!' observation; Legal had talked
about hiring


From: Pubkeybreaker on
P47
The keywords include such things as names of people, ships, organizations,
countries and subjects. They also include the known telex and phone numbers
and Internet addresses of the individuals, businesses, organizations and
government offices they may want to target.

The agencies also specify combinations of these keywords to help sift out
communications of interest.

For example, they might search for diplomatic cables containing both the
words 'Suva' and 'aid', or cables containing the word 'Suva' but NOT the
word 'consul' (to avoid the masses of routine consular communications).

It is these sets of words and numbers (and combinations of them), under a
particular category, that are placed in the Dictionary computers.

The whole system was developed by the NSA.


P51-
The only known public reference to the ECHELON system was made in relation to
the Menwith Hill station. In July 1988, a United States newspaper, the
Cleveland Plain Dealer, published a story about electronic monitoring of
phone calls of a Republican senator, Strom Thurmond. The alleged monitoring
occurred at Menwith Hill.

Margar


From: Pubkeybreaker on
(SIOC) optical card technology, thus
* enabling single, one-pass encoding. [it's a color card printer]

Is it just a sophisticated photo-ID, or is it a Universal Biometric Card?

* Sandia has combined its exclusive DataGlyphs portable database software
* and secure card printing technologies with Fingerscan's three
* dimensional fingerprint imaging capabilities to provide a complete
* secure card solution using biometric data.
*
* The innovations of this technology can benefit banking and financial
* institutions, national welfare, benefits and immigration programs. In
* recent contracts, technology from Fingerscan has replaced traditional
* password systems at the White House and at the U.S. Strategic Air Command.
*
* Fingerscan, an Identix company, provides biometric identification in
* the form of a three dimensional scan of a fingerprint, captured when a
* finger is held against a Fingerscan device, a self-contained terminal
* that stores finger records, keeps a log of transactions and interacts
* with


From: Risto Lankinen on
developed at
* Los Alamos National Laboratory for the noninvasive identification
* of the fill content of sealed containers.
*
* Identification is accomplished by analyzing the effect that the fill
* material has on the resonance modes of the container. Based on the
* acoustic vibrations of an object, this Los Alamos instrument quickly
* and safely identifies the fill content of containers [for purity of
* one kind of substance I guess].
*
* [The instrument is implemented and pictured] The ARS instrument was
* selected to receive one of R&D Magazine's 1995 R&D 100 Awards; the
* awards are given annually for the one hundred most significant
* technical innovations.
*
* The technique is suitable for any noninvasive identification of fill
* materials in sealed containers.

But no, massive monitoring of people suspected of no crime is the
appropriate response.

They were just warming us up for the CALEA telephone monitoring bill.

----

Here is part of the story on why we let trucks full of cocaine and
heroin just roll right into the United States.

* "Diminished U.S. Role Below Border Plays Into Traffickers' Hands"
*
* By Molly Moore and John Ward Anderson
* Washington Post Foreign Service



From: Rotwang on
Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum Drum
War War War War War War War War War War War War War War War


It is ECHELON that they are trying to protect.

If the FBI targets you, they can get all your phone conversations BEFORE
they are encrypted, and can get your password to access your private
cryptography key.

* "Above the Law", by David Burnham, ISBN 0-684-80699-1, 1996
* "Keeping Track of the American People: The Unblinking Eye and Giant Ear"
*
* About six times a week, fifty-two weeks a year, a team of highly trained
* FBI agents secretly breaks into a house, office, or warehouse somewhere in
* the United States.
*
* The agents are members of the bureau's Surreptitious Entry Program, and
* their usual mission is to plant a hidden microphone or camera without
* tipping off the people who occupy the targeted structure.
*
* FBI officials refuse to discuss, even in the most general way, the
* operations of these clandestine hit squads.
*
* Use of break-ins has increased six-fold in the last several years.
*
* Furthermore, the FBI has blamed the security industry for making locks
* and alarms more difficult to defeat.
*
* That was the central justification offered by the FBI when a couple of
* years ago it asked the White House for $27 million in public funds to
* pay the engineering whizzes at the Sandia and Los Alamos National
* Laboratories and several other government research facilities to develop
* ways to defeat "any locking