That's what they WANT you to think. ;-) But seriously, security breaches happen not by way of the measures in place, but by some breakdown in the same measures. Once the information is there, it is always going to be a temptation for interested parties to get their hands on it. All that said, the situation is no different that it already is everywhere else these days.
Besides, if they fear a revolution, they are right where we want them. :-) Bob On Feb 8, 2010, at 8:58 AM, Neal Campbell wrote: > Thirdly, the process is > incredibly controlled. The government has to give specific transactions they > want to see (in other words, no fishing expeditions, they have to know what > they want to see in advance), they can only see the transactions (no copies) > and the whole process is limited to 3 people (a SWIFT representative, an > external independent security auditor and the Treasury representative). _______________________________________________ use-revolution mailing list use-revolution@lists.runrev.com Please visit this url to subscribe, unsubscribe and manage your subscription preferences: http://lists.runrev.com/mailman/listinfo/use-revolution