View Single Post
  #1  
Old August 14th 07, 04:13 AM posted to sci.crypt,rec.aviation.piloting
Fahd AL-Zawahiri
external usenet poster
 
Posts: 1
Default What does Ahmed oppose so powerfully, whenever Hussein includes the meaningful compound very shrilly?

and searched
there and took his computer systems. [The case is still pending @6/97]




The code is simple. It's choosing the keyword filtration sequence that's
tricky. I figured out how to determine it in an almost systemic way. Oddly
enough, I needed no keywords for specifically seeking out source code.


So, keyword monitoring is highly effective, I could even cover three feeds,
and, sigh, I should mention that it took well less than 5000 lines of
programming source code for me to implement it.

And I generated two FBI cases.

[
Think of what could happen should the FBI get its implementation of
the CALEA bill. They could go nuts, and say "see, that proves we need
to monitor thousands of phone calls simultaneously".

And into the abyss we go.

There would be no place to hide from the government,
even for lawful peaceful political protest.

Domestic ECHELON must be physically disabled.
]




There's more.


************************************************** ****************************


I Can See What You Are Thinking
- --- --- ---- --- --- --------


In the complaint, I breathlessly described being able to see more than just
dry security incidents. The point was germane to my analysis that one of the
reasons the corrupt member of Salomon's Internal Audit department could
seemingly not be punished by anyone was that his job as financial traffic
analysis person made him privy to the most damaging unreported SEC violations
that anyone at Salomon would know about.

If you spot criminal behavior, it is a very personal thing to the employee.

********** begin excerpt from 'Corruption at Salomon Brothers' **********

: I could see not only regular security incidents, but also who was queer,
: what your