-Caveat Lector-

from:
http://www.aci.net/kalliste/
<A HREF="http://www.aci.net/kalliste/">The Home Page of J. Orlin Grabbe</A>
-----
------------------------------------------------------------------------
Today's Lesson From The Collapse of Barings

by Stephen Fay


The difficulty was that Leeson knew no way of becoming an elite trader
himself without exploiting his secret 88888 account. He was using it in
a canny way to build his reputation among Barings' traders in Tokyo.
They would ask Leeson to execute, on their behalf, a sell order at the
prevailing price, say $99.20. Lesson would report the sale to Tokyo at
$99.50, giving Tokyo an unexpected profit of 30 cents. Leeson had sold
at the prevailing price ($99.20), and the subsequent 30-cent loss was
absorbed by the 88888 account. Naturally, Leeson's 'skill' at executing
Tokyo's orders was admired by established traders . . . As a mark of
their confidence, Leeson was permitted to start trading options for
clients in October 1993.

That was a boon to him. By October 1993, the loss on the 88888 account
was up again-- to 5.7 million British pounds . . . and by the end of the
year they were 24.39 million British pounds . . .

But the loss never showed up in the accounts because Leeson had written
options which had sold for 30 million British pounds. This was the most
hazardous transaction he had entered into so far because, if the market
had moved against him, the potential loss was unlimited. But, if his
deception was to continue, Leeson had no choice. Although he never
received the option premiums in cash--the premium is automatically
remitted to the exchange as margin for the deal--the 30 million British
pounds appeared as a credit to Leeson's profit-and-loss account,
balancing his real loss on the 88888 account, and hiding his trail.
=====

Killer Shoes

54 Dead, 100 Injured in Minsk Stampede

42 Dead Teen Girls Blamed on High Heels

MINSK, May 31, 1999 -- (Agence France Presse) Fifty-four people died and
more than 100 others were injured in a stampede in a passageway leading
to a Minsk subway station after a rock concert, according to a first
official toll Monday.
Nearly all the victims were teenagers under 18 who had been to the
concert on Sunday evening, Belarus government radio said .

The death toll could rise as some of the injured were in serious
condition, said Interior Minister Yuri Sivakov in a statement early
Monday over Belarus television.

The accident occurred during a sudden storm at around 9 p.m. (1800 GMT).
The crowd of around 2,500 who had been at the open-air concert rushed
for cover into a nearby passageway leading to an underground station,
crushing those who had fallen underfoot in the stampede.

Two policemen and a few adults who had been on their way out of the
subway station also died after getting caught in the crowd.

The interior minister said of the 54 dead, 42 were girls wearing
high-heeled shoes that had apparently caused them to stumble and fall in
the rush.

He said many of the people at the show, billed as a "beer concert," had
been drunk.

Most of the victims had died of suffocation, the report said.

The Belarus government was to hold an emergency meeting Monday as
investigators tried to sort out how the tragedy occurred.

Belarus television and radio had stopped regular programming and played
classical music on Monday.

Russia Today, June 1, 1999


Hacking for Jesus

Hackers Threaten to Take Down All Government Web Sites

Gee, wouldn't that be a tragedy...

WASHINGTON (AP) -- Computer hackers vandalized two more government sites
on the Internet today and left a taunting note promising to attack more
federal computers because of a related FBI investigation.
Hackers from different organizations defaced a Web page early Monday
within the Interior Department and a site run by a federal supercomputer
laboratory in Idaho Falls, Idaho, claiming ``it's our turn to hit them
where it hurts.''

``These are the perils of open government,'' said Stephanie Hanna, an
Interior spokeswoman. ``We try to make as much of the materials of the
Interior Department as open and available as possible. The consequence
of that is, those who choose to do damaging things can do that.''

Last week, hackers claiming to be from another group defaced the Web
site for the U.S. Senate, causing it to be taken offline until the
weekend.

The FBI also was forced to take down its own Internet site last week
after hackers launched an electronic attack against it. It remained
inaccessible Monday, along with the Web site for its National
Infrastructure Protection Center, which helps investigate computer
crimes.

Messages left at the attacked sites suggest they were vandalized to
retaliate against what was said to be the FBI's harassment of specific
hacker groups, including the group that boasted of breaking into the
White House site last month.

The FBI confirmed it executed four search warrants last week in Texas
related to an investigation into allegations of computer intrusion,
including one search at the home of a prominent hacker in Houston.

On the Interior's Web page, the hackers left this message: ``Now, it's
our turn to hit them where it hurts by going after every computer on the
Net with a .gov (suffix).... We'll keep hitting them until they get down
on their knees and beg.''

At the site maintained by the Idaho National Engineering and
Environmental Laboratory, a note threatened the electronic destruction
of the powerful computers that ``serve'' pages on the Internet ``if the
FBI doesn't stop.''

``We could have done worse, like destroying completely all servers,''
the note said. ``We can do it if we want, but hackers are waiting for
Justice.''

In an online interview, the hacker claiming responsibility for the
laboratory attack warned The Associated Press that further FBI
investigation would result in more severe damage.

The hacker identified himself only as M1crochip, living in Portugal and
part of a group calling themselves F0rpaxe. The interview was arranged
through a mutually trusted third party.

``If FBI doesn't do anything and doesn't stop arresting people and
making our life miserable, each member of F0rpaxe will discuss an
eventual destruction of every single server,'' he said. ``If that
happens, everything goes down.''

He added, ``We don't want to proceed that way,'' and called the
electronic attacks the ``only resource'' of the hacker community.

The FBI in Washington declined comment Monday.

Earlier this month, a grand jury in northern Virginia indicted Eric
Burns, 19, on three counts of computer intrusion. Burns is reportedly
known on the Internet as ``Zyklon'' and is believed to be a member of
the group that claimed responsibility for the attacks on the White House
and Senate sites.

``Zyklon'' was one of a dozen names listed on the hacked version of the
White House Web site, which was altered overnight Sunday for a few
minutes before government computers automatically detected the
intrusion.

Burns was accused of breaking into a computer used by the U.S.
Information Agency between August 1998 and January 1999. The grand jury
also said Burns broke into two other computers, one owned by LaserNet of
Fairfax, Va., and the other by Issue Dynamics Inc. of Washington.

Associated Press, May 31, 1999


Nuclear Spying

Nuke Data on the Internet, China Says

Who sold China that laptop?

BEIJING - With lights ablaze and news cameras rolling, a professional
web surfer, Fang Nan, sat before his Chinese government-issue Compaq
Presario computer on Monday afternoon, pointed his Microsoft Explorer
browser to a U.S. internet address and began downloading sophisticated
technical details about America's most advanced nuclear warheads.
The demonstration, put on by China's State Council, or cabinet, was part
of the government's most aggressive attempt to date to discredit a
congressional report, made public last week, that accuses China of
stealing secret nuclear data from the United States over the last two
decades.

The State Council's Minister of Information, Zhao Qizheng, repeated
China's long-standing denial that it has ever stolen American nuclear
technology. He also accused a bipartisan select committee, particularly
Representative Christopher Cox, Republican of California, of racism and
arrogance, saying their report was an effort to diminish the outstanding
work of Chinese bomb and missile makers, who need no help from the
United States.

But in a new approach, Mr. Zhao told Chinese and foreign reporters that
the information China is accused of stealing - including critical design
information on America's top-of-the-line W-88 warhead and six others -
has long been openly available in the United States.

''Moreover, in recent years, performance data about various types of
nuclear warheads, ranging from the early MK-1 to the latest W-88, can
easily be found on the Internet,'' he said. ''They are no longer
secrets, so there is nothing to 'steal.'''

Mr. Zhao relinquished the stage to Mr. Fang of the China Internet
Information Center, a government body that tracks on-line developments
in China.

Mr. Fang logged on to the Internet and quickly linked to the web page of
the Federation of Atomic Scientists, a Washington-based group concerned
with weapons proliferation and other issues.

The results of Mr. Fang's efforts, including a list of every U.S.
nuclear weapon and its specifications, were projected on a large screen.
He then searched for ''W-88.'' Up popped the explosive yield, weight,
length, and diameter of the warhead, as well as a description of the
specific materials used and its key design features.

''There's no need to go all the way to America to think of a way to get
this data,'' Mr. Fang said. ''It's there on the net, and it's easy to
find.''

Charles Ferguson, a senior research analyst at the Federation and a
nuclear expert, said the information on his organization's site could be
useful to China. But he disputed the Chinese suggestion that there is no
difference between what is available in public and secret information,
such as test data.

The site provides ''a wealth of information on nuclear weapons, but we
don't have a manual for how to produce them or anything like that,'' Mr.
Ferguson said.

''There are thousands of parts in the most advanced nuclear weapons,''
he added. Just knowing ''the basic components, what goes into the
primary part of it, what goes into the secondary part of it, is not
enough to give someone the blueprint to develop these things,'' he said.


International Herald Tribune, June 1, 1999
-----
Aloha, He'Ping,
Om, Shalom, Salaam.
Em Hotep, Peace Be,
Omnia Bona Bonis,
All My Relations.
Adieu, Adios, Aloha.
Amen.
Roads End
Kris

DECLARATION & DISCLAIMER
==========
CTRL is a discussion and informational exchange list. Proselyzting propagandic
screeds are not allowed. Substance—not soapboxing!  These are sordid matters
and 'conspiracy theory', with its many half-truths, misdirections and outright
frauds is used politically  by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credeence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to