*****************
DISCLAIMER: This unencrypted message has been intercepted and read by
several intelligence agencies before you have read it.
*****************
CIA is operating a wide and deep intelligence network in international
businesses in many regions. The objective of this network is to steal
economic, business and technological information and data for the
benefit of some specific U.S. corporations 031599
CIA's former and current agents are promoting their services to certain
international companies in order to collect specific business intelligence
for these companies (their "clients"). There have been meetings, where
identified and known CIA agents have performed this promoting. 031599
A hidden order of influential business men and industrialists exist to
influence and transform covertly existing and new legislation, executive
orders to ensure optimum tactical and strategic financial results.,
042799
CIA is actively pursuing its economic intelligence programs to collect
economic intelligence for U.S. companies, 042799
U.S. and UK intelligence agencies are using Internet to collect economic
intelligence for U.S. and U.K businesses., 0427994
Encryption conspiracy to implement Wassenaar encryption control agreement
so that US UK intelligence agencies can collect and decipher more easily
other people's private / business information, 042799
There is an active secret channel between certain intelligence agencies and
some large software companies to enable these companies to continue it
monopolistic intentions and activities, 042799
One of the most popular encryption program is one element of NSA's covert
action program to control the strength of encryption algorithms in the
market place. An encryption application with trapdoors. Its
"author" is the member of info security architecture committee. 051699
A competitive intelligence professional society is used by some US
companies and government agencies for counterintelligence purposes. 070199
Some rental car agencies have installed microphones and other surveillance
devices into their vehicles in order to monitor their clients. 070199
All search engine queries are used for many marketing and other research
purposes and specific IP addresses and people ID's are recorded on tracking
files. 050199
Specific hubs have been created and used by CIA, NSA and other UKUSA
intelligence agencies to monitor all Internet traffic and communications.
031599
-----------------------------------------------------
NOTE: "I disagree with what you say, but I will defend to the death your
right
to say it."
Markku J. Saarelainen
Email: [EMAIL PROTECTED]
1st DISCLAIMER:
No thought written in this message is a statement
of any organization by which I am employed or for
which I work.
2nd DISCLAIMER: This unencrypted message may have
been intercepted and read by several individuals
and agencies before you have read it.
NOTE: "A leader listens; responds; follows up and inspires others to action!"
-----------------------------------------------------
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]