From: Risto Lankinen on 18 Apr 2008 18:49 / PASSWORDS SALOMON INTERNAL DOCUMENTATION --------------------------------- This is a security incident report regarding the Internet (a public wire) traffic of Salomon Brothers, which is monitored for security/compliance. Internal Audit member Fred Hamburger has repeatedly transferred passwords to Salomon systems over the unprotected Internet, one system is a Yield Book system, and also transferred a highly detailed internal document on 'EMERGING MARKETS DEBT WHOLE LOANS SUPPORT PROCEDURES' to an individual's external ISP (Internet) account. : ********************************* : Filename: Aug_22_96/dfAA09397 Size: 51729, Dated: Aug 22 15:25 : Sender: fhamburger(a)rocky : Recipient: smystery(a)ix.netcom.com : Subject: PSOPROC.DOC : **** UUencoding, Filename='PSOPROC.DOC' : : Some of the procedures you wanted information on are documented here. : : Fred. : ********************************* : : Microsoft Word 6.0 Document : Salomon Internal Audit#H:\AUDITOR\AB12345\WORD\PSOPROC.DOC : : EMERGING MARKETS DEBT WHOLE LOANS : SUPPORT PROCEDURES : : Fred Hamburger : : EMERGING MARKETS DEBT LDC LOANS : SUPPORT PROCEDURES : : I. CONFIRMATION : Introduction : : Trades in LDC loans are recorded by Traders on trade logs contemporaneously : with the telephone conversations actually executing the transactions. During : the day, these trade logs are passed to data input personnel, who then en
From: tchow on 18 Apr 2008 19:40 running into them in the right place, saying the right things. It's the 1990s now: Only, as we have seen, informants connecting to criminals means the FBI targeting Randy Weaver WHO HAD NO CRIMINAL RECORD for blackmail. Anyone can be made a criminal in the monitoring net. Or seduced into a "crime", like Qubilah Shabazz. Without you realizing it, the person you met was taking advantage of knowing all your most passionate likes and dislikes. It is INSANE to design our systems for government monitoring. CONGRESS WAKE UP NOW FOR CHRIS'SAKES!!! * "Dispute Arises Over Proposal for Wiretaps" * By John Markoff, The New York Times, February 15 1997 * * The telephone companies, after meeting with the FBI, said they wanted to * be able to monitor tens of thousands of conversations simultaneously in * metropolitan areas, much more than their stated intention of simply * trying to transfer its current surveillance capabilities into the * digital era. * * And the Cellular Telephone Industry Association said the FBI wanted to * monitor 103,190 cellular calls simultaneously nationwide. * * Lawyers for AT&T Wireless Services said, "The numbers alone are astounding." * * "This is kind of scary," said Tom Wheeler, CTIA president. "What does * the FBI know about our future that we don't?" ---- You cannot assign people one-to-one to control everyone in a society. But you can control society in a HIGHLY effective way using cybernetics, and do so COST EFFECTIVELY. That's one of the things CALEA is about, cost eff
From: quasi on 18 Apr 2008 19:43 o Phibro Chart of Accounts and internal accounting procedures o Year-end summary of lawsuits filed against subsidiary Basis Petroleum o Pirating of third-party copyright programs o Other firms' IUO (Internal Use Only) inbound o Our detailed systems inventory o Determined what PGP (encrypted) traffic was occurring. Among others, we had constant small traffic back-and-forth with Military contractor Rockwell. o Salomon's Official Restricted List being repeatedly transmitted outbound (list of securities Salomon can't purchase without a conflict of interest) o Unreleased Financing Summaries and unreleased IPO's: SEC violations o Internal Use Only documents o Trade confirmations o JobTalk hits concerning internal budget details by an SOO. o JobTalk hit of a resume of a risk management person who wanted to "explain how it works" here o Hundreds of router (security) configurations o 42,000 lines of OASYS data o router and bridge passwords o Hostname/username/password for unmonitored outbound ISDN access from Salomon o RadioMail: spotted that all the big cheeses who use it have all their highly sensitive email going out over the unprotected Internet, because we were too cheap to buy a transmitter, and so are forwarding all the email over the Internet to RadioMail's transmitter!!! o The key to one's financial l
From: S.C.Sprong on 18 Apr 2008 20:22 daily to the computers, where they would be * processed and examined for any kind of important signal that they * contained. If there was any sort of warning implied by these data, * then an alerting signal would be sent back to the managers of the * plant concerned. What are 'arousal filter' and 'homeostatic loops'? The scope of Cybernetics is, in a word, awesome. A cyberneticist can talk from atoms to cells to nervous systems, to management of a company, country, world, solar system. Whether an organism is mechanical, biological or social, it requires a feedback mechanism to survive. Your nervous system does some amazing things to fight off infections. It creates custom anti-bodies to attack foreign microbes. Custom living cells created through a system of feedback to spot that there was a problem, analysis of the problem, action on the problem. This is a life-sustaining feedback 'homeostatic' loop. [bracket comments are mine] When Stafford Beer says Cyberstride needed to filter 'homeostatic loops': * "The Human Use of Human Beings - Cybernetics and Society" * by Norbert Wiener, 1954, pre-ISBN * * The process [such as that employed by our nervous system] by which we * living beings resist the general stream of corruption and decay is * known as homeostasis. Stayin' alive, stayin' alive... So, "statistical filtration for all homeostatic loops" m
From: Risto Lankinen on 18 Apr 2008 20:58
Military and civilian control of the domestic population. ] P475-477: Like an ever-widening sinkhole, the NSA's surveillance technology will continue to expand, quietly pulling in more and more communications and gradually eliminating more and more privacy. If there are defenses to such technotyranny, it would appear, at least from past experience, that they will not come from Congress. Rather, they will most likely come from academe and industry in the form of secure cryptographic applications to private and commercial telecommunications equipment. The same technology that is used against free speech can be used to protect it, for without protection the future may be grim. Senator Frank Church, chairman of the Senate Intelligence committee, referring to the NSA's SIGINT technology: At the same time, that capability at any time could be turned around on the American people and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesn't matter. There would be no place to hide. If the government ever became a tyran |