
cool|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| ||||!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!At 10:04 09/04/1996 -0700, Anton Rager wrote:
Wouldn't it be great if it were true!!!!!!! -- sorry folks -- doesn't seem to exist
1. - No domain of dod.gov -- there is info for nsa.gov...just not dod.gov 2. - No valid URL of http://nsa.dod.gov/~reports/quarterly.txt -- no page returned
This must be a joke....I was gullible enough to try anyway.
____________ Original Message Follows _____________________________________
Yes, there are annual and quarterly reports released to the public which describe in meticulous detail expenditures for the agency's program, personnel and equipment:
1. The program of services and information supplied to government and other intelligence organizations, US and foreign, with terms of each client contract.
2. US employees, their organization, skills, duties and longevity of service; their names, ranks, identification codes, secure communication methods and home addresses; the location of workplaces; the continued training each is scheduled to receive; leaves of absence and destinations while absent.
3. Foreign nationals covertly employed worldwide, with information on each as per 2.
4. A comprehensive listing of all types of world-wide equipment operated; its detailed design, function and output; where it is located; its designers, manufacturers and purchase cost; its schedule of amortization; and its schedule for replacement and/or upgrade, with fifteen-year projected procurement.
5. Special short- and long-term contracts with governmental and non-governmental organizations, US and foreign for one-time projects, by goal, personnel and equipment.
6. Special projects with other US and foreign counter- intelligence to issue disinformation about the agency.
7. Special section on world-wide US and foreign cryptology: cryptanalysis, cryptography, steganography, codes, cyphers, glyphs, mimes; each ranked for security and ease of cracking; governmental and non-governmental parties using each; names of cooperative and resistant cryptographers and cooperating pseudo-cryptographers.
8. Sub-section on methods of Internet traffic and language analysis; operation and surveillance of anonymous remailers, bulletin boards and mail lists; lists of cooperative and resistant educational institutions and commercial organizations.
9. Appendices on: black operations; transparent operations; methods for managing cooperative and resistant governmental and non-governmental persons.
The public is invited to study and/or download these reports anonymously at:
A la prochaine, Gilles