That's what they WANT you to think. ;-) But seriously, security breaches happen 
not by way of the measures in place, but by some breakdown in the same 
measures. Once the information is there, it is always going to be a temptation 
for interested parties to get their hands on it. All that said, the situation 
is no different that it already is everywhere else these days. 

Besides, if they fear a revolution, they are right where we want them. :-)

Bob


On Feb 8, 2010, at 8:58 AM, Neal Campbell wrote:

> Thirdly, the process is
> incredibly controlled. The government has to give specific transactions they
> want to see (in other words, no fishing expeditions, they have to know what
> they want to see in advance), they can only see the transactions (no copies)
> and the whole process is limited to 3 people (a SWIFT representative, an
> external independent security auditor and the Treasury representative).

_______________________________________________
use-revolution mailing list
use-revolution@lists.runrev.com
Please visit this url to subscribe, unsubscribe and manage your subscription 
preferences:
http://lists.runrev.com/mailman/listinfo/use-revolution

Reply via email to