From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: cef3a20232a674c3842ee828c0e9f83cb6eeb423ab6f5f589678c28e4e6e11c0
Message ID: <1.5.4.32.19970605170229.008ee9c8@pop.pipeline.com>
Reply To: N/A
UTC Datetime: 1997-06-05 17:18:48 UTC
Raw Date: Fri, 6 Jun 1997 01:18:48 +0800
From: John Young <jya@pipeline.com>
Date: Fri, 6 Jun 1997 01:18:48 +0800
To: cypherpunks@toad.com
Subject: Body Bunker Usage
Message-ID: <1.5.4.32.19970605170229.008ee9c8@pop.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain
We offer excerpts from the Federal Law Enforcement
Training Center "Catalog of Training Programs FY 1997-98":
Financial Fraud Institute
The FFI takes the proactive role of arming the student with
specialty skills and techniques to develop solid prosecutable
cases in a range of crimes. Included are crimes involving
government contracts, procurement fraud, illegal tax shelters,
complex financial transactions supporting terrorism and criminal
conspiracies, asset removal/seizures, money laundering activities
involving drug smuggling organizations and other illegal
enterprises, insurance frauds, electronic funds transfer fraud,
and employee embezzlement. Also addressed in training are
technical crimes involving computers and networks such as
unauthorized access to government data systems and complex
fraud cases using or involving computer systems.
Training programs:
Computer Evidence Analysis
Criminal Investigations in an Automated Environment
Financial Crimes Investigations
Financial Forensics Techniques
International Banking and Money Laundering
International Financial Fraud
Microcomputers for Investigators
Money Laundering and Asset Forfeiture
Seized Computer and Evidence Recovery Specialist
Telecommunications Fraud
White Collar Crime
Windows Applications for Investigations
http://jya.com/ffi.htm (34K)
-----
Security Specialties Division
The design, development, and conduct of courses relating to
antiterrorism, physical security, and officer safety and
survival is the prime mission of the Security Specialties
Division (SSD). Courses include; Bombs and Explosives,
Personal Protection, First Response, Handling Sensitive/
Classified Information, Criminal Information/Intelligence,
Officer Safety and Survival, Physical Security, Surviving
Hostage Situations, and Weapons/Explosive Detection.
Training programs:
Advanced Physical Security
Antiterrorism Contingency Planning
Antiterrorism Management
Criminal Intelligence Analyst
Crisis Management
First Response
Officer Safety and Survival
Physical Security Managers
Protective Security Operations
Seaport Security/Antiterrorism
http://jya.com/ssd.htm (22K)
-----
The former addresses, among others, "encryption/decryption,
disguised data, data hidden by programming techniques,
hackers and phreakers."
The latter addresses, among others, "left-wing terrorism,
right-wing terrorism, animal rights and environmental
extremists, assassinations and body bunker usage."
Return to June 1997
Return to “John Young <jya@pipeline.com>”
1997-06-05 (Fri, 6 Jun 1997 01:18:48 +0800) - Body Bunker Usage - John Young <jya@pipeline.com>