Re: layered deception

2001-04-29 Thread Declan McCullagh

I rather like the idea of encrypting the logs on the fly and shipping them
offshore. Your offshore partner will be instructed to turn over the
logs only if you are not asking for them under duress. (A reasonable
protocol can probably be worked out. Would a court order instruct you
to lie? If so, would it be valid?)

-Declan


On Sat, Apr 28, 2001 at 03:45:38PM -0600, Anonymous wrote:
 In view of the recent gimme-the-logs-or-we-fuck-you activities
 of armed men
 (http://www.indymedia.org/front.php3?article_id=36912group=webcast , 
 http://seattle.indymedia.org/display.php3?article_id=3013 )
 what would be the legal consequence of the following:
 
 1. A virus is designed that spreads itself in some standard way and that
 deletes log files of popular http server implementations.
 
 2. Files are deleted when virus receives a packet on a known port.
 
 3. Detection of virus requires more than average admin can do.
 
 So when logs are requested an outside 3rd party can maliciously
 remove logs. The first several ISPs to contract this virus will
 probably get fucked, but by then it should become obvious that the
 ISP cannot effectively control the virus.




RE: layered deception

2001-04-29 Thread Declan McCullagh

Right, in most circumstances you're not required to keep logs. But there 
are some cases, albeit a fairly narrow subset, in which you'd want to have 
log files that are available to you but not an adversary using legal process.

-Declan


At 01:15 AM 4/29/01 -0400, Phillip H. Zakas wrote:

there is no requirement for maintaining log files (unless specifically
directed otherwise.)  log files contain either marketing value or sysadmin
value -- in both cases specific ip addr info isn't necessary to maintain
that value (except in case of anomalous activity). one could collect info
without identifying information.

same principle applies to e-mail. once mail is deleted from a pop or imap or
whatever server, there is no requirement to keep the backup tapes of e-mail.
in fact the larger isps no longer keep deleted e-mail...they maintain only
e-mail headers for up to six months.  smaller isps should follow in these
steps (though i'd argue you shouldn't even keep header info.)

don't save it if you don't really truly need it.

phillip

  -Original Message-
  From: [EMAIL PROTECTED]
  [mailto:[EMAIL PROTECTED]]On Behalf Of Declan McCullagh
  Sent: Saturday, April 28, 2001 11:46 PM
  To: Anonymous
  Cc: [EMAIL PROTECTED]
  Subject: Re: layered deception
 
 
 
  I rather like the idea of encrypting the logs on the fly and shipping them
  offshore. Your offshore partner will be instructed to turn over the
  logs only if you are not asking for them under duress. (A reasonable
  protocol can probably be worked out. Would a court order instruct you
  to lie? If so, would it be valid?)
 
  -Declan
 
 
  On Sat, Apr 28, 2001 at 03:45:38PM -0600, Anonymous wrote:
   In view of the recent gimme-the-logs-or-we-fuck-you activities
   of armed men
   (http://www.indymedia.org/front.php3?article_id=36912group=webcast ,
   http://seattle.indymedia.org/display.php3?article_id=3013 )
   what would be the legal consequence of the following:
  
   1. A virus is designed that spreads itself in some standard way and that
   deletes log files of popular http server implementations.
  
   2. Files are deleted when virus receives a packet on a known port.
  
   3. Detection of virus requires more than average admin can do.
  
   So when logs are requested an outside 3rd party can maliciously
   remove logs. The first several ISPs to contract this virus will
   probably get fucked, but by then it should become obvious that the
   ISP cannot effectively control the virus.
 
 




RE: layered deception

2001-04-29 Thread Declan McCullagh

I think Matt is a bit too quick to conclude a court will charge the 
operator with contempt and that the contempt charge will stick on appeal. 
Obviously judges have a lot of discretion, but it doesn't seem to me like 
the question is such a clear one if a system is set up in the proper 
cypherpunkish manner.

-Declan


At 01:04 PM 4/29/01 -0400, Matthew Gaylor wrote:
Declan McCullagh [EMAIL PROTECTED] wrote:
Right, in most circumstances you're not required to keep logs. But there 
are some cases, albeit a fairly narrow subset, in which you'd want to 
have log files that are available to you but not an adversary using legal 
process.

-Declan

Which would/could get you charged with obstruction of 
justice/contempt/conspiracy etc, etc.  You can protect your log files 
safely enough by not having any-  But protecting your real ASSets is a bit 
more difficult.

Regards,  Matt-


**
Subscribe to Freematt's Alerts: Pro-Individual Rights Issues
Send a blank message to: [EMAIL PROTECTED] with the words subscribe FA
on the subject line. List is private and moderated (7-30 messages per week)
Matthew Gaylor, 2175 Bayfield Drive, Columbus, OH 43229
(614) 313-5722  ICQ: 106212065   Archived at http://groups.yahoo.com/group/fa/
**




Report from NORML conference in Washington, DC

2001-04-24 Thread Declan McCullagh



http://www.wired.com/news/politics/0,1283,43232,00.html
   
   Pot Backers Call for Reeferendum
   By Declan McCullagh ([EMAIL PROTECTED])
   2:30 p.m. Apr. 23, 2001 PDT
   
   WASHINGTON -- Hundreds of drug war critics gathered here this weekend
   to share political tips, marijuana cigarettes, pipes and bowls, and a
   growing sense of optimism about the future of drug legalization.
   
   The occasion was the National Organization for the Reform of Marijuana
   Laws convention, an annual event usually held around April 20, a date
   that has the same kind of significance to cannabis users that, say,
   July 4 has to patriots.
  
   In the ranks of the legalize-weed movement, NORML has a venerable
   history. It's been around since 1970, and has held 27 annual
   conventions so far -- only to see the drug war escalate during that
   time to include military troops, longer prison terms, and the creation
   of a federal bureaucracy that has become the arch-enemy of pot
   smokers.
   
   So why were the roughly 250 conference goers sounding almost, well,
   happy?
   
   It wasn't just the plentiful herb at the event. NORML believes that
   thanks to pro-legalization politicians like Gov. Gary Johnson (R-New
   Mexico) and Rep. Barney Frank (D-Massachusetts), state action on
   medical marijuana, and the spread of the Internet, public opinion may
   be shifting.
   
   We don't live in an isolated world anymore, said Allen St. Pierre,
   the executive director of the NORML Foundation. We can be watching
   people indulge in cannabis in an Amsterdam cafe via a webcam.
   
   St. Pierre said Johnson and Frank's support is heartening. We have not
   had a major political figure since the '70s come out and endorse a
   departure from the status quo. That's important and noteworthy to say
   the least.
   
   St. Pierre is talking about what former President Carter said in 1977:
   Penalties against drug use should not be more damaging to an
   individual than use of the drug itself. Nowhere is this more clear
   than in the laws against possession of marijuana in private for
   personal use.

   [...]




Epilogue: U.S. v. Jim Bell trial in federal court in Tacoma

2001-04-16 Thread Declan McCullagh
 Security number. Now Bell has been convicted for get this
   stalking government arm-twisters.
   
   Stalking? Well ... that's what they call it. Bell gathered the sort of
   information on them that they compiled on him and many, many other
   people for years. For that offense, the feds decided to send Bell away
   again, and they did everything in their power to fix the trial.
   
   A cypherpunk and libertarian, Bell originally got official skirts in a
   bind when he penned Assassination Politics, a provocative think piece
   that postulated an Internet-based system for anonymously rewarding
   people who knock off abusive government officials. All hot and
   bothered by the article, the feds made Bell a target of an intense
   investigation. Soon, he was an unwilling guest of the government, and
   the powers that be thought they were done with yet one more thorn in
   their sides.

   [...]
   
   Whatever the paper charges, Jim Bell was clearly arrested and
   prosecuted for loudly criticizing the government and for being
   abrasive and unrelenting in the process. Bell may be something of an
   eccentric, but he had enough moxie to make federal agents nervous.
   
   That's the worst crime as far as any government official is concerned.
   
   [...]

***

http://www.cluebot.com/article.pl?sid=01/04/11/238254

   [...]
   
   Government prosecutors now appear to qualify as technical experts on
   the cypherpunk phenom, having scrutinized listmember behavior as ants
   under lenses. London told the jury yesterday that "the one unifying
   theme that defines someone as a cypherpunk on the Internet is the
   ability to encrypt mail." One could say the same thing about a NAI
   marketing flack, but that wouldn't be as quotable.
   
   It's all so sad and predictable and sad again. The cypherpunks list
   had its glory days: Wired magazine cover stories, blossoming
   technology, and, yes, even those damnable tentacles. Now it's become a
   convenient way for the Feds to land convictions.

***

Date: Fri, 13 Apr 2001 14:14:32 -0400
To: [EMAIL PROTECTED]
From: John Young [EMAIL PROTECTED]
Subject: Breeding Rats Galore

Anonymous writes:

[Quote]

Over the past few days, I found the story about James Bell in 
Tacoma who is being hung out to dry it seems.

I thought that the group I am associated with would enjoy reading all
the info you have on James Bell, so I pieced together some of the posts
about him and the link to Wired's articles.

That post was not incredibly controversial, nor were any threats made
against any person or group by myself or the respondents, yet I have
evidence that starting today, I am being watched, and trailed as I
drive.

Is there something magic about the James Bell case that causes
alphabet agencies to investigate those that openly discuss it?

This is a real question to which I hope you will reply: Considering the
type of data you post on your sites, do you find that you're being
watched, or has that period come and gone?  Have you ever requested your
FBI file through the FOIA?  I don't know that I have one, but I may send
off a request just to see.

I would love to hear your suggestions on how to react to "being watched"
if you've been frustrated by similar experiences.  Also, on the FOIA.

[Unquote]

Would the DoD, CIA and FBI use Jeff Gordon's pissant operation to 
conceal a burgeoning homeland defense Stasi octupussy? Yes, and here's why:

Federal Register: April 13, 2001

DEPARTMENT OF DEFENSE

Defense Science Board

SUMMARY: The Defense Science Board Task Force on Intelligence Needs for 
Homeland Defense--Follow-On Initiative will meet in closed session on 
April 11, 2001, at Los Alamos National Laboratory, Albuquerque, NM, 
April 12-13, 2001, at Sandia National Laboratory, Albuquerque, NM. This 
Task Force will explore the intelligence ramifications posed by a 
changing spectrum of threat regimes, including biological, chemical, 
information, nuclear, and radiological weapons.

[Snip. Complete document at http://cryptome.org/dod041301.txt --DBM]

**

Date: Thu, 5 Apr 2001 02:23:09 -0600
From: Jim Burnes [EMAIL PROTECTED]
Subject: Re: Day #2: U.S. v. Jim Bell report from federal court in Tacoma

On Thu, Apr 05, 2001 at 12:33:54PM -0400, Declan McCullagh wrote:
 - Forwarded message from Declan McCullagh [EMAIL PROTECTED] -

"It's still on the Internet today," London said during the second day
of the trial in federal district court. "He has not retracted it."

Maybe London would prefer China, where thought crime is punished
by life in slave labor camps.  During your communist "rebirth" process
you are made to renounce your opinions on a daily basis.

London said that while Bell may not have directly threatened IRS agent
Jeff Gordon, "he has done it indirectly through 'Assassination
Politics.'"

Why don't they charge him with conspiracy to murder 

Re: Cypherpunks, Feds, and Pudgyfaced Voyeurism

2001-04-11 Thread Declan McCullagh

Hmm. Anyone know what are some extant web-to-email remailers,
and what Type I remailers exist?

-Declan


On Wed, Apr 11, 2001 at 06:43:10PM -0700, Ray Dillinger wrote:
 On Wed, 11 Apr 2001, Declan McCullagh wrote:
 
 
 It's all so sad and predictable and sad again. The cypherpunks list
 had its glory days: Wired magazine cover stories, blossoming
 technology, and, yes, even those damnable tentacles. Now it's become a
 convenient way for the Feds to land convictions.
 
 Perhaps it is time to consider a new and different mailing 
 list which accepts messages ONLY from remailers.  It would 
 be publicly archived and unmoderated just as cypherpunks is, 
 and monitored by the lions just as cypherpunks is, but now 
 that the thought-crime laws are setting in full force, it 
 could provide a forum where there wouldn't be such a simple 
 evidentiary chain from post to poster. 
 
 Given the recent spate of events, and the fact that some forms 
 of political speech now seem to be a crime, or at least grounds 
 for legal harassment and admissible as evidence of other crimes, 
 I will probably have to set up such a list -- more info when 
 it's ready to accept posts.
 
 The best name (cypherpunks) seems to be taken.  Hmm.  I will 
 have to consider.  The naming of things is a ticklish business.
 
   Bear




Re: the link doesn't work......

2001-03-13 Thread Declan McCullagh

We would be delighted to help you for our usual consulting fees.

-Declan


On Tue, Mar 13, 2001 at 07:54:18AM -0500, [EMAIL PROTECTED] wrote:
 I was trying to check out the link on your "code cracking" page maybe you 
 could help me. I was trying to find out if this is a page containing info. on 
 how to "crack codes" if it is, or if you have some info for me regarding 
 "code cracking" e mail me back and let me know. thanx...
 




biochemwmdterror in DC today

2001-03-13 Thread Declan McCullagh


HOUSE SELECT INTELLIGENCE COMMITTEE Terrorism Briefing Full committee 
Speaker's Working Group on Terrorism holds briefing on intelligence 
matters. Location: H-405 U.S. Capitol. 12;30 p.m. Contact: 202-225-4121 
http://www.house.gov/select **NEW/CLOSED**




fun with the CIA

2001-03-13 Thread Declan McCullagh

Speculation over why aliens would want to observe us:
http://www.foia.ucia.gov/scripts/cgiservlets/NavigatorServlet.pl?docNumber=44116partNumber=2method=generateFrameSettotalNumber=2

CIA reports on Russian police scrambling over UFO sighting:
http://www.foia.ucia.gov/scripts/cgiservlets/NavigatorServlet.pl?docNumber=98713partNumber=2method=generateFrameSettotalNumber=2

CIA report on Barbados sighting:
http://www.foia.ucia.gov/scripts/cgiservlets/NavigatorServlet.pl?docNumber=43362partNumber=2method=generateFrameSettotalNumber=2

CIA summarizes news articles on UFOs in ancient China:
http://www.foia.ucia.gov/scripts/cgiservlets/NavigatorServlet.pl?docNumber=42351partNumber=1method=generateFrameSettotalNumber=4




Re: Microsoft Trial Judge Based His Break-Up Remedy On Flawed Theory, Not Facts

2001-02-28 Thread Declan McCullagh

On Tue, Feb 27, 2001 at 11:46:58AM -0800, lizard wrote:
 "Colin A. Reed" wrote:
  
 
  I'll admit that the trial was fucked up from the start by the decision to
  center it around netscape rather than something more blatant like stac.
  Anyways, this has nothing to do with FC, unless you think that enterprise
  is fundamentally expressive and Microsoft's vicious suppression of
  competition has limited the ability of others to be heard.
  
 But if source code is free speech, isn't a judge ordering some code be
 removed/edited/changed an intrustion on free speech? Isn't saying
 "Remove Explorer from the core install!" the same as saying "Remove this
 chapter from this book!"
 
 Sure, the chapter can then be republished separately, but who is the
 judge to decide what elements of a work of speech belong together? 
 
 Code IS speech. And this has implications beyond DECSS and PGP.

I'll go further. The First Amendment is part of the U.S. Constitution,
and antitrust law is not.

When the two are in conflict, the law must give way. :)

(This is pretty much in jest, you antitrust scholars note. Yes, I have
read media antitrust cases, etc.)

-Declan




DeCSS ruling in DVD case must be reversed, eight amicus briefs say

2001-01-26 Thread Declan McCullagh

Eight different coalitions -- from cryptographers to journalist groups -- 
are filing amicus briefs in the DVD/DeCSS case. The briefs -- an unusually 
high number -- urge that the Second Circuit Court of Appeals overturn the 
district court's ruling of last August.

Wired News article on the briefs being filed today:
http://www.wired.com/news/politics/0,1283,41441,00.html

The journalist/media brief, which focuses on the right to link:
http://www.politechbot.com/docs/linking-amicus.012601.html
The computer scientists' brief (the only one filed earlier in the week):
http://cryptome.org/mpaa-v-2600-bac.htm

Photos from trial, protests, anti-DMCA march:
http://www.mccullagh.org/theme/dvd-2600-trial.html
http://www.mccullagh.org/theme/2600.html
http://www.mccullagh.org/theme/dmca-protest.html
http://www.mccullagh.org/image/950-5/tshirt-cssscramble.html

Other briefs include one by the ACLU, one by the ACM, one by law 
professors, and one by Ernest Miller, Siva Vaidhyanathan et al. that says 
"to be governed by the District Court's version of the DMCA is to be 
stripped of the right to make the valuable fair uses of copyrighted 
materials upon which new contributions to the field are so often based."

Judge Lewis Kaplan's ruling last August:
http://www.wired.com/news/politics/0,1283,38287,00.html

EFF is funding 2600 magazine's defense and appeal. The appeal brief to the 
circuit court, filed last Friday, is here:
http://www.eff.org/IP/Video/MPAA_DVD_cases/20010119_ny_eff_appeal_pressrel.html
http://www.eff.org/IP/Video/MPAA_DVD_cases/20010119_ny_eff_appeal_brief.html

Brief of MPAA member companies is due February 19. Their amici must file a 
week later.

Some of the briefs, including ones I've perused, are still in draft form. 
EFF promises to have all of them online shortly. ACLU says their brief -- 
still in draft form -- will be up on their site by noon.

-Declan




Re: oppose nomination of John Ashcroft

2001-01-21 Thread Declan McCullagh



On Sat, Jan 20, 2001 at 08:32:14AM -0800, James A. Donald wrote:
  --
 On Fri, Jan 19, 2001 at 04:13:32PM -1000, Reese wrote:
Then why were the troops laying siege to the compound, instead of
snatching koresh when he made one of his frequent trips into town?
 
 At 11:54 PM 1/19/2001 -0500, Declan McCullagh wrote:
   Because sometimes a show of force is perceved as necessary.
  
   Heck, employers do it to employees all the time.
 
 I cannot recall any employer ever calling security to stick guns in my face.

You're thinking too literally. Show of force: When an employer reminds
a slacker that having a job is not a right.

-Declan




Re: John Ashcroft

2001-01-21 Thread Declan McCullagh

On Sat, Jan 20, 2001 at 01:06:43AM -0800, Raymond D. Mereniuk wrote:
 Declan McCullagh [EMAIL PROTECTED] wrote
 
  But I wonder who really believes Ashcroft is being absolutely genuine
  in his responses to Feinstein?
 
 In the last election in Texas when G.W. Bush was running for 
 governor he was accused by his opponent of only using the 
 governvorship of Texas as a base to run for the presidency of the 
 US.  He promised to serve a full term.

So did Clinton.

-Declan




Re: oppose nomination of John Ashcroft

2001-01-21 Thread Declan McCullagh

At 12:07 AM 1/21/01 -1000, Reese wrote:

It wasn't a right for the what, 40,000 in flint michigan, either, was it?

It's called at-will employment: You keep your employer happy, you get your 
job. (I'm starting to think you're not only very educated, but not very 
educable. I'd love for you to prove me wrong; that would likely involve 
refraining from mouthing off.)

-Declan




Bush's whitehouse.gov launches with embarrassing errors, bugs

2001-01-21 Thread Declan McCullagh



http://www.wired.com/news/politics/0,1283,41319,00.html

   Anybody Home at Whitehouse.gov?
   by Declan McCullagh ([EMAIL PROTECTED])
   4:00 p.m. Jan. 21, 2001 PST
   
   WASHINGTON -- President Bush not only got the keys to the White House
   this weekend, but he also took over the official whitehouse.gov
   website.
   
   While the new president's speedily organized inaugural celebration
   concluded without incident in a chill rain, the launch of the Bush
   administration's Web presence was not as successful.
   
   Dozens of links return error messages, and the home page appears to
   have sported an unusual slogan on the left-hand rail when it first
   went up on Saturday: "Insert Something Meaningful Here."
   
   At high noon on Saturday, as Bush and Vice President Cheney took oaths
   of office on the Capitol building steps, the new administration
   officially took over the whitehouse.gov domain.
   
   Many of the text-only whitehouse.gov pages, designed for readers who
   are visually impaired or have low-bandwidth connections, return broken
   links. Clicking on the text-only option from the search page results
   in a malformed link with the title:
   "www.whitehouse.gov/--%20INTERFACE%20LINK%20."

   Links at the bottom of the White House History page -- including past
   first families, first ladies, or tour information -- return "404: The
   page cannot be found".
   
   In the children's area of whitehouse.gov, the Historic Moments page
   includes broken links to images of Abraham Lincoln and Franklin
   Roosevelt.

   On the home page, the placeholder message "Insert Something Meaningful
   Here" briefly appeared on the left side of the screen, according to a
   Wired News reader who saved a screen snapshot. The message, according
   to the snapshot, appeared under "President George W. Bush is
   Inaugurated as President of the United States" and above "Recent
   Additions."
   
   [...]

Remainder at:
http://www.wired.com/news/politics/0,1283,41319,00.html

Snapshot of "insert something meaningful here" (also submitted by other
readers):
http://www.brianwestbrook.com/whitehousegov.html

Examples of pages with broken links:
http://www.whitehouse.gov/kids/text/moments.html
http://www.whitehouse.gov/tours/text/map.html

Or, for example, click on "text only" from the search page:
http://www.whitehouse.gov/search




-
POLITECH -- Declan McCullagh's politics and technology mailing list
You may redistribute this message freely if it remains intact.
To subscribe, visit http://www.politechbot.com/info/subscribe.html
This message is archived at http://www.politechbot.com/
-


- End forwarded message -




Re: oppose nomination of John Ashcroft

2001-01-20 Thread Declan McCullagh

Reno probably didn't expect the situation to, um, blow up in her face.

It is also undisputed that if they wanted to avoid a show of force, they 
could have nabbed Koresh during his jogs around the property line or 
whatnot in the morning. Reese, you blather too much.

-Declan


At 09:19 PM 1/19/01 -1000, Reese wrote:
At 11:54 PM 1/19/01 -0500, Declan McCullagh wrote:
 On Fri, Jan 19, 2001 at 04:13:32PM -1000, Reese wrote:
  Then why were the troops laying siege to the compound, instead of
  snatching koresh when he made one of his frequent trips into town?
 
 Because sometimes a show of force is perceved as necessary.

oh geez.  Why was it necessary to bring in tanks, special forces and
gunships for overflights?  Why, when if all they wanted was koresh,
all they had to do was wait for him to go to town again, and snatch
him off the street as he walked down the sidewalk?

Who benefited from this "necessary" show of how forcefully Reno et al.
could burn wooden buildings with people inside them?  Yeah-yeah, the
evidence is contested, re: who started the fires.  What isn't contested
is the armored vehicles poking gun muzzles through the walls.

Reese





Re: oppose nomination of John Ashcroft

2001-01-20 Thread Declan McCullagh

At 10:52 AM 1/20/01 -1000, Reese wrote:
 It is also undisputed that if they wanted to avoid a show of force, they
 could have nabbed Koresh during his jogs around the property line or
 whatnot in the morning.

I said something to that effect, yesterday.  Missed it, did'ja?

Pardon me if I don't pay terribly close attention to your deathless prose.

  Reese, you blather too much.

Blather?  As opposed to what you do?  I think it's preferable.

But I get paid by the word for mine, generally speaking.

-Declan




Re: John Ashcroft

2001-01-19 Thread Declan McCullagh

I agree with the below. But it is mistaken to treat civil asset
forfeiture as an issue marked by broad bipartisan condemnation.
Quite the opposite is true; hence, we still have it.

-Declan

On Fri, Jan 19, 2001 at 01:14:46PM -0600, Harmon Seaver wrote:
 
 1. Cops and Robbers:  Exposs Find Ashcroft Encouraged
Constitutional Violations in Missouri Asset Forfeiture Cases,
Police Agencies Kept Funds Intended for Schools
http://www.drcnet.org/wol/169.html#copsrobbers
 
 An article by investigative journalist Dan Forbes, released
 yesterday evening by the Progressive Review
 (http://www.prorev.org), has confirmed something that drug war
 observers had strongly suspected:  John Ashcroft, as Missouri
 Governor, agreed to "look the other why" while state police




Re: oppose nomination of John Ashcroft

2001-01-19 Thread Declan McCullagh

On Fri, Jan 19, 2001 at 04:13:32PM -1000, Reese wrote:
 Then why were the troops laying siege to the compound, instead of
 snatching koresh when he made one of his frequent trips into town?

Because sometimes a show of force is perceved as necessary.

Heck, employers do it to employees all the time. We do it to our pets
when teaching them a lesson. Why should cops be any different?

 And _you_ think _I've_ bought into a statist line.

Um, sure.

-Declan




Re: What are you all about???

2001-01-19 Thread Declan McCullagh

Where's Tim's old .sig when we need it?

-Declan


On Fri, Jan 19, 2001 at 09:18:47AM -0800, William Weinmann wrote:
 
 




Re: oppose nomination of John Ashcroft

2001-01-18 Thread Declan McCullagh

Quite right. Ashcroft is objectionable, as is any candidate George W.
would propose, but he is arguably less objectionable than Reno.

Here's what he said yesterday about Microsoft:
http://www.wired.com/news/politics/0,1283,41264,00.html

-Declan


On Wed, Jan 17, 2001 at 01:18:32PM -0800, Greg Broiles wrote:
 On Wed, Jan 17, 2001 at 01:29:28PM -0600, Harmon Seaver wrote:
   Just heard Asskroft on the radio during the hearings affirming
  his support for the assault weapon ban ( and Herr Busch's support of
  same) and their intention to reimplement that ban when it sunsets. So
  much for his being against guncontrol -- he made it pretty clear that he
  believes the 2nd is about sporting arms, not military weapons.
 
 Yeah, and they made him apologize for telling the tired old joke about
 how the only thing found in the "middle of the road" are moderates and
 dead skunks. Sounds like everyone's taking this process real seriously.
 Confirmation is more like a ritual hazing and has absolutely nothing
 to do with a candidate's fitness for the job. We've survived Ed Meese
 and Janet Reno, we'll survive John Ashcroft, too. 
 
 --
 Greg Broiles [EMAIL PROTECTED]
 PO Box 897
 Oakland CA 94604
 




Re: John Ashcroft

2001-01-18 Thread Declan McCullagh

More on Ashcroft's tech record:
http://www.politechbot.com/cgi-bin/politech.cgi?name=ashcroft

But I wonder who really believes Ashcroft is being absolutely genuine
in his responses to Feinstein?

-Declan


On Thu, Jan 18, 2001 at 10:55:10AM -0500, Matthew Gaylor wrote:
 I happened to catch some of the confirmation hearings on CSPAN last 
 night.  Of particular interest was John Ashcroft's responses to 
 Dianne Feinstein's, (D-Calif.) questions.  Basically Ashcroft stated 
 that both Brady and the assault weapon bill are constitutional and 
 that he supported their continuance.  He said something to the effect 
 that "We need to move forward on these issues". He also mentioned 
 that he favored closing the "gun show loophole" (A view shared by 
 Republican sellouts).
 
 On both 1st and 4th amendment issues, John Ashcroft has one of the 
 worst records on Capital Hill. Ashcroft sponsored the 
 "Methamphetamine Anti-Proliferation
 Act" would have criminalized certain drug- and drug policy- related 
 discussions on the Internet, and would have allowed police to conduct 
 secret searches of homes, with the residents never being informed 
 before or after that the police were there.
 
 It is my opinion that Yale grad Ashcraft is a phony conservative 
 (aside from the abortion issue) and phony constitutionalist.
 
 Please visit http://www.StopJohnAshcroft.org today and help stop the 
 appointment of John Ashcroft as Attorney General -- or, just call the 
 Congressional Switchboard at (202) 224-3121, twice, have them 
 transfer you to each of your two Senators in turn, and urge they vote 
 "no" on the Ashcroft appointment.
 
 Regards,  Matt-
 
 
 **
 Subscribe to Freematt's Alerts: Pro-Individual Rights Issues
 Send a blank message to: [EMAIL PROTECTED] with the words subscribe FA
 on the subject line. List is private and moderated (7-30 messages per month)
 Matthew Gaylor, 2175 Bayfield Drive, Columbus, OH 43229
 (614) 313-5722 Archived at http://www.egroups.com/list/fa/
 **
 




biochemcyberterror update

2001-01-17 Thread Declan McCullagh

today...

FOREIGN AFFAIRS
Potomac Institute for Policy Studies (PIPS)
News briefing on "Terrorism: Review of 2000 and Outlook for 2001."
A special report on Osama bin Laden will also be released
Location: National Press Club, Lisagor, White and Murrow
 Rooms, 14th and F St., NW. 1 p.m.
Contact: Erin O'Connell, 703-525-0770 ext 241




Re: oppose nomination of John Ashcroft

2001-01-17 Thread Declan McCullagh

I've written about Ashcroft's mixed records on tech issues:

http://www.politechbot.com/cgi-bin/politech.cgi?name=ashcroft


On Tue, Jan 16, 2001 at 07:54:00PM -0800, Anonymous wrote:
 "Me" [EMAIL PROTECTED] wrote:
 
  - Original Message -
  From: "sparky" [EMAIL PROTECTED]
   http://www.opposeashcroft.com
  
   I'm not trying to get people into any arguments here.. I
  thought this
   might be appropriate since people here are concerned with civil
   rights.
 
  Quite right, I am very concerned.
 
  Lets examine the page:
 
  "He has voted against affirmative action and anti-discrimination
  laws, against a crucial AIDS provision."
 
 H... "Ashcroft has been hailed as an ally by the NRA, voting against
 trigger locks and the assault weapons ban while supporting conceal and carry
 laws and gun show loopholes to regulation."
 
  Excellent, he is clearly a firm supporter of civil liberties.
 
 Might I second that, in this case.  Gee, maybe this website should be named
 http://www.supportashcroft.com/; I was feeling kinda lukewarm about his
 nomination until I saw it.  Thanks, sparky!
 
  Unfortunately, I don't see any place on your web page to voice my
  support for his nomination?
 
 "In 1999, Ashcroft recorded radio ads urging Missouri voters to support an
 NRA-sponsored ballot initiative that would have allowed almost anyone -
 including convicted child molesters and stalkers - to carry concealed guns
 in Missouri."
 
 Maybe I should move to Missouri.  I've always wanted to shoot a
 child molester.
 
 
 




GOP hopes for more porn prosecutions; Bush to weigh MS case

2001-01-13 Thread Declan McCullagh



http://www.wired.com/news/politics/0,1283,41164,00.html

As the Porn Peril Turns
by Declan McCullagh ([EMAIL PROTECTED])

2:00 a.m. Jan. 13, 2001 PST
WASHINGTON -- The peril of online porn is why John Ashcroft should be
the next attorney general, conservative organizations said on Friday.

At a press conference organized to support Ashcroft's embattled
nomination, the groups predicted that, among his other virtues, he
would kick off a wave of Net-sex prosecutions.

Beverly LaHaye of Concerned Women for America said that Ashcroft,
unlike Attorney General Janet Reno, would enforce "laws against
obscenity."

Donna Rice-Hughes, the former Gary Hart gal pal turned antiporn
activist, described herself as an "Internet safety advocate in support
of John Ashcroft for attorney general."

"The $1.5 billion online porn industry has continued to prosper with
an anything-goes green light from the current Justice Department,"
said Rice-Hughes, who founded Enough is Enough.

"When George W. won, the porn industry lost," said Rice-Hughes, who
claimed that online prurience "exploits women, preys on men and
invades the innocence of (America's) children."

[...]



http://www.wired.com/news/politics/0,1283,41163,00.html

DOJ Pushes Case Against MS
by Declan McCullagh
9:45 a.m. Jan. 12, 2001 PST

President-elect George W. Bush and his cabinet will soon decide what
to do about the Microsoft antitrust case, a spokesman said on Friday.

"The incoming administration and the incoming attorney general will
review them and make any decisions as necessary," Ari Fleischer,
Bush-Cheney transition spokesman, said in response to a question about
Microsoft and other lawsuits the Clinton administration has filed.

Fleischer, at the daily transition press conference, said he would not
comment further on the Microsoft case. But he said that in general,
Bush believes that the feds "too often engage in litigation to solve
problems."

"The president-elect will not rush to litigate the way some folks in
Washington enjoy litigating," Fleischer said.

[...] 




Re: The uses of pseudo-links

2001-01-10 Thread Declan McCullagh

Right. Most news organizations nowadays provide some kind of "alert"
service. Wired News has one that lets readers choose to be alerted by
name of author or keyword:

http://www.wired.alerts.com/wired/add_alert.jsp

These, to buttress your point, are better mechanisms to be alerted to
relevant articles than the cpunks list is.

-Declan


On Tue, Jan 09, 2001 at 09:42:07AM -0800, Tim May wrote:
 Your definition of "useful" is different from mine. I believe lists 
 like ours should primarily be about discussions and points of view, 
 not a third-hand CNET or Register or Slashdot. There are many Web 
 sources of breaking news (not that a lot of the "functional quantum 
 computer" sorts of stories are usually breaking news...).
 
 Personally, I like it when someone finds a news item, provides a 
 detailed URL, even quotes (in ASCII, not MIME!) a paragraph or two, 
 and then comments on it and connects it to Cypherpunks issues.
 
 Merely dumping out "general science" items, with general URLs, is 
 just plain abusing the list.
 
 --Tim May
 -- 
 Timothy C. May [EMAIL PROTECTED]Corralitos, California
 Political: Co-founder Cypherpunks/crypto anarchy/Cyphernomicon
 Technical: physics/soft errors/Smalltalk/Squeak/agents/games/Go
 Personal: b.1951/UCSB/Intel '74-'86/retired/investor/motorcycles/guns
 




Re: As Dot-Coms Go Bust in the U.S., Bermuda Hosts a Little Boomlet

2001-01-10 Thread Declan McCullagh

On Wed, Jan 10, 2001 at 12:22:52PM -0500, John Young wrote:
 The full story of crypto is yet to be written, in particular its
 deceptions, perhaps a piece by Vin McLelland, one by
 Declan, one by Tim May, if not by distributed cyperhpunks 
 not quite so malleable as solo individuals given privileged
 access on the condition that . . .

True. As a journalist, I do my best to avoid those conditions. I think
of them (probably not an original thought) as entangling alliances.

I could easily cobble together a book proposal that would include
chapters by cypherpunk types; I'd edit. I've been thinking of writing
a book for a while -- even had meetings with publishers in '96 -- but
it would take too much time. Editing would be far easier.

 What about that timing of CRYPTO release and the NSA
 show?

Ah, it was a lackluster show and not that important.

-Declan




Re: Refutations Considered Unnecessary

2001-01-10 Thread Declan McCullagh

On Wed, Jan 10, 2001 at 10:06:25AM -0800, Tim May wrote:
 e) Brin's book would be just another drop in the ocean, anyway. His 
 vision of the future is unlikely in the extreme (t.v. cameras in 
 police offices...sure, whatever), so refuting his "bad memes" is just 
 a waste of time

Right. Everyone's forgotten it; books like that (and Crypto, and
Database Nation)  have a short half-life.

 As for his views toward "crypto anarchy," what else would one expect? 
 If the future many of us think is likely is in fact _actually_ 
 likely, then what does it matter whether Levy makes dismissive 
 comments on his book tour or not? I didn't find him making dismissive 
 comments in his book, which is what will be read, anyway. (And even 
 if he did, see previous point...)

He didn't make dismissive comments, and was actually more critical
(though mildly) when we had conversations about it in the past.

The thing, though, is that Crypto only spends a paragraph or two --
really -- on crypto anarchy. It's not a focus of the book, or even the
chapter, its name notwithstanding.

-Declan




Re: As Dot-Coms Go Bust in the U.S., Bermuda Hosts a Little Boomlet

2001-01-10 Thread Declan McCullagh

On Wed, Jan 10, 2001 at 01:11:01PM -0800, Tim May wrote:
 I hope you don't do this. There have been several of these kinds of 
 collections--a guy at MIT has done at least a couple of them (I 
 forget his name, though three of my short pieces are in one of his 
 books: the books cost $40-60 or so, for a damned paperback, which is 
 why I don't have my own copy. Even at this high price, they don't pay 
 for submissions and they don't even give out copies to contributors!).

As someone who makes the vast bulk of his income from speaking fees, I
wouldn't undertake such a project unless I could pay contributors and
get a generous number of copies to hand out. Seems only fair.

 There's probably a role for a good book on, say, "digital money," 
 with a mix of overview articles and detailed articles. This would be 
 a _lot_ of work, and the editor would need to be well-versed in the 
 field.

Yep, and not something that I'd be that interested in. But a limited
focus would be necessary. Maybe something titled "Crypto Anarchy." :)

-Declan




Re: Declan's book

2001-01-10 Thread Declan McCullagh

On Wed, Jan 10, 2001 at 03:48:53PM -0800, Tim May wrote:
 Colin Powell recently got paid $200,000 for a 30-minute off-the-cuff 
 speech on some "why foreigh policy matters" b.s. topic. Of course, it 
 was underwritten by a Lebanese "businessman" said in news reports to 
 have close ties to Syrian intelligence, so do the math. A legal way 
 to buy influence in our strange society. If Colin Powell can give N 
 of these b.s. speeches a year, my thoughts are surely worth $10K for 
 a day or two's worth of writing. Of course, this won't happen.

Ah, your output for two days is not worth $10K, at least based on a
publisher's estimation of market value. Sadly, politics may not be as
rewarding as investing. *

-Declan

* Unless you're Colin Powell





Review of History Channel's NSA documentary

2001-01-09 Thread Declan McCullagh

[The documentary aired again twice this morning on the History Channel, and 
it's a fair bet it'll show again later this week. --Declan


http://www.wired.com/news/politics/0,1283,41063,00.html

History Looks at the NSA
by Declan McCullagh ([EMAIL PROTECTED])

2:00 a.m. Jan. 9, 2001 PST
WASHINGTON -- As anyone who watched Enemy of the State knows, the
National Security Agency is a rapacious beast with an appetite for
data surpassed only by its disregard for Americans' privacy.

Or is the opposite true, and the ex-No Such Agency staffed by ardent
civil libertarians?

To the NSA, of course, its devilish reputation is merely an
unfortunate Hollywood fiction. Its director, Lt. Gen. Michael Hayden,
has taken every opportunity to say so, most recently on a History
Channel documentary that aired for the first time Monday evening.

"It's absolutely critical that (Americans) don't fear the power that
we have," Hayden said on the show.

He dismissed concerns about eavesdropping over-eagerness and all but
said the NSA, far from being one of the most feared agencies, has
become one of the most handicapped.

One reason, long cited by agency officials: Encryption. The show's
producers obligingly included stock footage of Saddam Hussein, saying
that the dictator-for-life has been spotted chatting on a 900-channel
encrypted cell phone.

That's no surprise. The NSA, as Steven Levy documents in his new
Crypto book (which the documentary overlooks), has spent the last 30
years trying to suppress data-scrambling technology through export
regulations, court battles, and even personal threats.

Instead of exploring that controversial and timely subject that's tied
to the ongoing debate over privacy online, "America's Most Secret
Agency" instead spends the bulk of an hour on a history of
cryptography starting in World War II. Most of the documentary could
have aired two decades ago, and no critics are interviewed.

One of the few surprises in the otherwise bland show is the NSA's new
raison d'etre -- infowar.

[...] 




Review of Steven Levy's Crypto

2001-01-09 Thread Declan McCullagh



http://www.wired.com/news/politics/0,1283,41071,00.html

Crypto: Three Decades in Review
by Declan McCullagh ([EMAIL PROTECTED])

8:20 a.m. Jan. 9, 2001 PST
WASHINGTON --It took only a year or two for a pair of computer and
math geeks to discover modern encryption technology in the 1970s. But
it's taken three decades for the full story to be told.

Transforming what is an unavoidably nerdy tale into the stuff of
passion and politics is not a trivial business, but Steven Levy, the
author of Crypto, proves himself more than up to the task.

Crypto (Viking Penguin, $25.95), is Levy's compelling history of the
personalities behind the development of data encryption, privacy and
authentication: The mathematicians who thought up the idea, the
businessmen who tried to sell it to an unsure public and the
bureaucrats who tried to control it.

Levy, a Newsweek writer and author of well-received technology
histories such as Hackers and Insanely Great, begins his book in 1969
with a profile of Whit Diffie, the tortured, quirky co-discoverer of
public key cryptography. Other characters soon populate the stage: The
MIT mathematicians eager to sign documents digitally; Jim Bidzos, the
Greek-born dealmaker who led RSA Data Security from ruin to success;
and Phil Zimmermann, the peace-activist-turned-programmer who gave the
world Pretty Good Privacy.

Until their contributions, the United States and other countries
suffered from a virtual crypto-embargo, under which the technology to
perform secure communications was carefully regulated as a munition
and used primarily by soldiers and spies.

But what about privacy and security? "On one side of the battle were
relative nobodies: computer hackers, academics and wonky civil
libertarians. On the other were some of the most powerful people in
the world: spies, generals and even presidents. Guess who won," Levy
writes.

(Full disclosure: A few years ago, Levy asked this writer to help him
research portions of the book. For whatever reason -- perhaps he found
what he needed elsewhere -- discussions ceased.)

Throughout Crypto's 356 pages, Levy takes the perspective of the
outsiders -- and, in some cases, rebels -- who popularized the
technology. Although he provides ample space for the U.S. government's
views, he casts the struggle between crypto-buffs and their federal
adversaries in terms familiar to foes of government control.

[...]




Re: Bell Case Subpoena

2001-01-09 Thread Declan McCullagh

On Tue, Jan 09, 2001 at 02:44:57PM -0800, Tim May wrote:
 I expect this upcoming trial will not be the case which hinges on 
 these kinds of issues, but some court will someday have to contend 
 with this utter malleability of received mail files. Unlike paper 
 letters which can be forensically analyzed, e-mail is nearly 
 meaningless.

Yes and no. Courts have figured out long ago how to deal with
malleable computer files, of which email is a special case. And notes
allegedly taken during a telephone call or meeting (which were
important during the MS antitrust trial) are equally malleable.

What the prosecution here is interested in is chain of custody, did
you receive this message, can you verify that Exhibit A is what you
received from [EMAIL PROTECTED], etc. with perjury as a
deterrent. Then they can use phone records to show a defendant was
online then via a dialup connection...

It strikes me that this is a sort of link padding: If you're online
all the time, those phone records will be virtually useless.

-Declan




Re: Steven Levy Book Tour

2001-01-07 Thread Declan McCullagh

I took a copy of Steven's book to Aruba and read most of it there.

Very worthwhile. I'll review it soon.

-Declan


On Sun, Jan 07, 2001 at 06:29:51PM -0500, John Young wrote:
 Steven Levy writes:
 
 Here is a link to some sites for a book tour:
 
http://www.penguinputnam.com/stevenlevy/tour.htm
 
 Not on there for some reason is a reading/discussion at Microsoft's Mountain
 View (CA) campus on Jan 12 at 3:30 p.m. that's open to the public.  Another
 public event is Jan. 16 at the University of Washington bookstore in
 Seattle, at 7 pm. 
 
 -
 
 Sorry I failed to mention previously the full title of Steve's new book
 (first posted, I thnk, by Commando Hettinga):
 
 "CRYPTO: How the Code Rebels Beat the Government - Saving 
 Privacy in the Digital Age."
 
 And more:
 
 Endorsements for Crypto by Neal Stephenson, Kevin Kelly and David Kahn:
 
 "You've got to hear this story of how renegade geniuses and unlikely heroes
 liberated crypto from under the noses of spooks, and installed the code in
 the dream servers of dot-coms. This book persuaded me that despite the
 dangers of strong crypto (it gives a chance for evil to hide) providing it
 to the public was a Very Good Thing. Crypto not only makes e-commerce
 possible, it is also the first political movement in the digital era. Read
 about the future here."
 --Kevin Kelly, author of New Rules for the New Economy and Editor-at-Large,
 Wired Magazine
 
 "At last! The human story of the breakthroughs that gave us e-commerce and
 privacy on the Internet. Steve Levy has written cryptography's Soul of a New
 Machine.'"
 --David Kahn, author of The Codebreakers
 
 "Civilian crypto hardly existed three decades ago.  Now we can't get cash
 from an ATM or buy something on the Net without it.  To tell the story
 coherently is a service, and to tell it entertainingly is a favor to anyone
 with a stake in crypto--which nowadays means all of us.  CRYPTO  is a book
 that needed to be written and Steven Levy has written it. "
 -- Neal Stephenson, author of Cryptonomicon
 
 Author Bio
 
 Steven Levy is also the author of Hackers and Insanely Great: The Life 
 Times of Macintosh, the Computer That Changed Everything. He is Newsweek's
 chief technology writer, a former writer for Macworld, and a frequent
 contributor to Wired.
 
 




Re: cell phone anonymity

2001-01-07 Thread Declan McCullagh

Just got to your local cell phone dealer (even blockbuster here
in DC) and buy an ATT prepaid cell phone for cash.

-Declan


On Sun, Jan 07, 2001 at 11:49:10PM +0100, Mats O. Bergstrom wrote:
 At 10:06 2001-01-07 -0800, montag montag wrote:
 Please post the actual experiences about obtaining a
 pre-paid cell phone
 
 GSM/Europe
 1) Buy a cell phone and pay cash
 2) Buy a GSM cash-card and pay cash
 3) Dont send in the registration form to get that extra half hour!  :-)
 
 To stall traffic analysis - buy many GSM cash-cards and change
 frequently - they are only around USD 10 (not counting the prepaid
 calling time). I don't believe the cell phone is sending it's serial
 number (but who - except for deep insiders and possibly Lucky Green -
 knows for sure?).
 
 //Mob
 




A libertarian protest? That'll get all of 10 people

2000-12-14 Thread Declan McCullagh


- Forwarded message from Libertarian Party Announcements [EMAIL PROTECTED] 
-

From: Libertarian Party Announcements [EMAIL PROTECTED]
Subject: URGENT ACTION ITEM
To: [EMAIL PROTECTED]
Date: Thu, 14 Dec 2000 16:58:56 -0500 (EST)

-BEGIN PGP SIGNED MESSAGE-


===
URGENT ACTION ITEM!
FROM THE LIBERTARIAN PARTY
===
Watergate Office Building
2600 Virginia Avenue, NW, Suite 100
Washington DC 20037
Website: www.LP.org
Email: [EMAIL PROTECTED]
For information: (202) 333-0008 ext. 222
===
December 14, 2000
===

FBI agents plan protest at White House on Friday;
Libertarians organize counterprotest!



"Protest against the FBI! 
Meet us at 11:30am on Friday in Lafayette Park
in front of the White House."
(Further details below.) 

 
   

Dear Friends:
   

A group of FBI agents plans to protest at noon tomorrow 
(Friday, Dec. 15) outside the White House to persuade President Clinton 
not to pardon Leonard Peltier, an American Indian leader convicted of 
killing two FBI agents in South Dakota in 1975. (See the article in 
Thursday's USA Today on page 19A, or go to
http://www.usatoday.com/usatonline/20001214/2915953s.htm

Americans who believe in equal justice under the law plan a 
peaceful counterprotest. Our point: If people who kill FBI agents 
belong in jail, don't FBI agents who kill ordinary Americans belong in 
jail as well? We are inviting you and your friends and colleagues to 
join us. 

We believe that equal justice under the law requires equal 
prosecution and equal punishment as well. Americans who commit criminal 
acts should be prosecuted -- regardless of whether they happen to work 
for the federal government. If Peltier remains in jail, justice 
requires that federal agents who have committed murder be sentenced to 
jail time as well. If they go free, so should he.

Now imagine a huge group of us holding signs that say: 

 

"Thou shalt not kill.
 FBI, that includes you!"

   And: "Who pardoned Horiuchi?"



We believe that's perfectly fair, because unfortunately, FBI 
and other federal agents who have killed innocent Americans have 
repeatedly gone free, in some cases free to kill again. Some examples: 

* FBI sniper Lon Horiuchi assassinated Vicki Weaver as she held 
her infant in her cabin at Ruby Ridge, Idaho in 1992. When it appeared 
Horiuchi would face state manslaughter charges, dozens of his FBI 
colleagues signed a petition to the court asking that he be set free 
because a trial would be "a traumatic ordeal for Lon and his family."  
FBI bureaucrats quietly managed to get the case transferred to a 
federal court, where a federal judge decided Horiuchi deserved 
"sovereign immunity" because he was acting "in his capacity as a 
federal law officer." Horiuchi was set free -- and the trigger-happy 
sniper later reappeared at Waco.

* Dozens of FBI and BATF agents were involved in the shooting 
and burning deaths of 86 people, including 24 children, at Waco, Texas, 
on April 19, 1993. Despite photographic evidence that the FBI fired 
into the burning building, all government agents were exonerated by the 
government after a government investigation by the Danforth Commission 
earlier this year.  (Is there a pattern here?)

* On May 20, 1997, four Marines on an anti-drug patrol gunned 
down Esequiel Hernandez, Jr., a high school sophomore, as he herded 
goats on his own property in Redford, Texas, near the Mexico border. 
The Justice Department later described the killing of the boy, who was 
never even accused of drug smuggling, as a "tragic event" but refused 
to charge the Marines with a crime because there was "insufficient 
evidence that his constitutional rights were intentionally violated."

We could cite countless other instances of agents for the FBI, 
BATF, FBI, DEA, and other agencies literally getting away with murder, 
but you get the point. It's outrageous enough that none of these 
government killers have been brought to justice -- but it's almost 
beyond belief that their colleagues have the nerve to demand that an 
individual who *has* been convicted and has served 24 years in prison, 
Leonard Peltier, should remain there while their own guilty colleagues 
go free.

Because we don't want the FBI's ludicrous position that only 
non-federal agents should be jailed for committing murder to go 
unanswered, we'll be protesting their protest outside the White House.



When 200 FBI agents protest outside the White House, that's 
news -- so if we're there we'll be news, too! We anticipate significant 
media coverage for our event, so please:

* Dress well (and warmly)

   

Re: nambla

2000-12-14 Thread Declan McCullagh

Only four lines of curses? Sheesh. Thought we'd rate at least five.

-Declan


On Thu, Dec 14, 2000 at 12:03:09PM -0800, gary seven wrote:
 You are under the Judgement of the LORD GOD OF HOST for the sin of the sea of 
babies, abortion and infant sacrifice to the devil. You will burn in the presence of 
the HOLY Angels.  The seals are opened.  PREPARE FOR YOUR DESTRUCTION
 
 CAMAEL ARCHANGEL OF DESTRUCTION
 
 THE PLAGUES OF THE LORD FOR THE SIN OF THE “SEA OF BABIES” UPON ALL NATIONS OF THE 
EARTH
 
 IAIAIAIAIOIOIOIOIO   I AM BEFORE ALL BUT THE FATHER; MELOCH HEL ALOKIM TPHARET HOD 
JESAITH; BAHANDO HELESLOIR DEALZAT
 
 Cursed shall you be in the city, and cursed shall you be in the field.
 Cursed shall be your basket and your kneading-trough.
 Cursed shall be the fruit of your body, and the fruit of your ground, the increase 
of your cattle, and the young of your flock.
 Cursed shall you be when you come in, and cursed shall you be when you go out.
 "The LORD will send upon you curses, confusion, and frustration, in all that you 
undertake to do, until you are destroyed and perish quickly, on account of the evil 
of your doings, because you have forsaken me.
 The LORD will make the pestilence cleave to you until he has consumed you off the 
land which you are entering to take possession of it.
 The LORD will smite you with consumption, and with fever, inflammation, and fiery 
heat, and with drought, and with blasting, and with mildew; they shall pursue you 
until you perish.
 And the heavens over your head shall be brass, and the earth under you shall be iron.
 The LORD will make the rain of your land powder and dust; from heaven it shall come 
down upon you until you are destroyed.
 "The LORD will cause you to be defeated before your enemies; you shall go out one 
way against them, and flee seven ways before them; and you shall be a horror to all 
the kingdoms of the earth.
 And your dead body shall be food for all birds of the air, and for the beasts of the 
earth; and there shall be no one to frighten them away.
 The LORD will smite you with the boils of Egypt, and with the ulcers and the scurvy 
and the itch, of which you cannot be healed.
 The LORD will smite you with madness and blindness and confusion of mind;
 and you shall grope at noonday, as the blind grope in darkness, and you shall not 
prosper in your ways; and you shall be only oppressed and robbed continually, and 
there shall be no one to help you.
 You shall betroth a wife, and another man shall lie with her; you shall build a 
house, and you shall not dwell in it; you shall plant a vineyard, and you shall not 
use the fruit of it.
 Your ox shall be slain before your eyes, and you shall not eat of it; your ass shall 
be violently taken away before your face, and shall not be restored to you; your 
sheep shall be given to your enemies, and there shall be no one to help you.
 Your sons and your daughters shall be given to another people, while your eyes look 
on and fail with longing for them all the day; and it shall not be in the power of 
your hand to prevent it.
 A nation which you have not known shall eat up the fruit of your ground and of all 
your labors; and you shall be only oppressed and crushed continually;
 so that you shall be driven mad by the sight which your eyes shall see.
 The LORD will smite you on the knees and on the legs with grievous boils of which 
you cannot be healed, from the sole of your foot to the crown of your head.
 "The LORD will bring you, and your king whom you set over you, to a nation that 
neither you nor your fathers have known; and there you shall serve other gods, of 
wood and stone.
 And you shall become a horror, a proverb, and a byword, among all the peoples where 
the LORD will lead you away.
 You shall carry much seed into the field, and shall gather little in; for the locust 
shall consume it.
 You shall plant vineyards and dress them, but you shall neither drink of the wine 
nor gather the grapes; for the worm shall eat them.
 You shall have olive trees throughout all your territory, but you shall not anoint 
yourself with the oil; for your olives shall drop off.
 You shall beget sons and daughters, but they shall not be yours; for they shall go 
into captivity.
 All your trees and the fruit of your ground the locust shall possess.
 The sojourner who is among you shall mount above you higher and higher; and you 
shall come down lower and lower.
 He shall lend to you, and you shall not lend to him; he shall be the head, and you 
shall be the tail.
 All these curses shall come upon you and pursue you and overtake you, till you are 
destroyed, because you did not obey the voice of the LORD your God, to keep his 
commandments and his statutes which he commanded you.
 They shall be upon you as a sign and a wonder, and upon your descendants for ever.
 "Because you did not serve the LORD your God with joyfulness and gladness of heart, 
by reason of the abundance of all things,
 therefore you shall 

Re: nambla

2000-12-14 Thread Declan McCullagh

Matt, I didn't know you were the religious type!

-Declan

At 21:07 12/14/2000 -0500, Matthew Gaylor wrote:
Our father, who's art is in porn ; Halloween by Thy name; Thy kingdom Cum; 
Thy wife will be done, on earth as she were in a whore house. Give us this 
day our daily blow job; and forgive us our sales taxes, as we forgive 
those who tax against us, and lead us not into D.C. ; but deliver us from 
Church. Amen.
author unknown

Regards,  Matt-




Re: Ranks Of Privacy 'Pragmatists' Are Growing

2000-12-14 Thread Declan McCullagh

Bill, this is splendid! Can I talk you into writing a similar screed about 
privacy leftists? I'll cite you in my weekly column. --Declan


At 21:28 12/13/2000 -0800, Bill Stewart wrote:
At 04:46 PM 12/13/00 -0800, R. A. Hettinga wrote:
 At 11:35 AM -0500 on 12/9/00, Declan McCullagh wrote:
 
 
  Privacy leftists
 
 We have a winner.
 Time to patch the old buzzword engine with something *truly* inflammatory...

Of course, "Privacy Rightwingers" don't believe in real privacy either.
(You can't use the term "privacy rightists" to parallel "privacy leftists"
because it will be interpreted wrong, but "Privacy Rightwingers" is close.)

After all, the government ought to be able to poke into your business,
and tap your phone calls in traditional fashion, and keep track of your race,
and keep track of your nationality in case you might be a furriner,
and keep track of who lives where because there might be (gasp!)
unmarried persons of opposite sex sharing living quarters,
or otherwise shacking up.  Motels, too.   And anywhere Commies do anything.
They probably don't insist on violating your privacy in everything -
for instance there's no need to search people getting on airplanes,
because if everybody took handguns on planes they could shoot
any Commie hijackers trying to go to Cuba

Then there's Barlow's definition of privacy in a small town
"where you don't need to use your turn signal because
everybody knows where you're going anyway."
 Thanks!
 Bill
Bill Stewart, [EMAIL PROTECTED]
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639




Only one horseman left!

2000-12-13 Thread Declan McCullagh


today in dc:

HOUSE JUDICIARY COMMITTEE
Foreign Threats
Crime Subcommittee hearing on the threat posed by the convergence of
organized crime, drug trafficking and terrorism.
Witnesses: Donnie Marshall, administrator, Drug Enforcement
 Administration, Justice Department; Michael
 Sheehan, ambassador at large/coordinator,
 Counterterrorism, State Department; Steven
 McCraw, inspector-deputy assistant director,
 Information, Analysis and Assessments Branch,
 Investigative Division, FBI; Frank Cilluffo,
 senior policy analyst/deputy director, Center
 for Strategic and International Studies; Ralf
 Mutschke, assistant director/sub-directorate,
 Crimes Against Persons and Property, Interpol
 General Secretariat; Raphael Perl, specialist,
 International Affairs, Congressional Research
 Service
Location: 2141 Rayburn House Office Building. 10 a.m.
Contact: 202-225-3951 http://www.house.gov/judiciary




Re: About 5yr. log retention

2000-12-06 Thread Declan McCullagh

On Tue, Dec 05, 2000 at 07:22:30PM -0500, Greg Newby wrote:
 
 Bottom line, as usual, is to trust no-one, including ISPs
 or sysadmins that have a strong privacy ethic.

On the web sites that I maintain, I have a stated policy that we
intend to challenge subpoenas for our web logs and user database. Of
course, talk is cheap, and I'd hope to find funding for lawyers or
pro-bono work. Then again, it's a likely possibility: When I got a
subpoena, I found pro bono counsel (and excellent one too).

-Declan




Re: My plan to deal with subpoenas to testify

2000-12-06 Thread Declan McCullagh

At 11:01 12/6/2000 -0800, Tim May wrote:
(Of course, _serving me_ is problematic. I had a process server make 
several trips out to my semi-rural hilltop home in 1995 before finally 
reaching me at home. And that was when I still answering the doorbell. 
These days I use my peephole, or a t.v. camera I sometimes have set up. I 
doubt a process server could get to me.)

When I was served with a subpoena in the CJ Parker trial, I had had a party 
the night before and let a friend of a friend sleep over in my living room. 
The process server showed up around 7:30 am the following morning and my 
houseguest let him into the foyer. Grr.

-- I was surprised to see so many "affidavits" and "interviews" and 
"pre-trial statements" from various witnesses in the Parker case. Surely 
these people must have known that though their presence could have been 
compelled in Washington state, that they had no obligation to sit down 
with Federal agents and give interviews!

When I was subpoenaed in the Parker trial, I did not give any pre trial 
statement or affidavits or whatnot. (There's no incentive for me to do so, 
and presumably little incentive for list members to do so, unless they see 
it as a way to avoid further involvement.) My lawyer was the person who had 
contact with DoJ.

(Note about expenses: I had heard during the Parker trial that various 
witnesses called to travel to Washington were to "submit travel expense 
receipts." Is this true? What part of the Constitution says citizens must

Yes. It's a standard government form. They also paid something like $25 a 
day while you waited outside the courtroom before being called to the 
stand, and $40 a day you actually testified. Yay.

-Declan




Re: Scenes from the Supreme Court protests today

2000-12-02 Thread Declan McCullagh

Hey, I shot a roll of BW 400-speed that I'm having developed
now. I've hardly given up on analog -- some shots of Jesse Jackson
marching I wouldn't have been able to get without a nice, fast
70-200/2.8 lens and a camera to match. The damnable CoolPix takes
seconds to process each shot.

I'm getting a review unit of the Canon D-30 digital SLR that can take
Canon mount lenses; we'll see how that compares...

-Declan


On Fri, Dec 01, 2000 at 08:16:36PM -0500, [EMAIL PROTECTED] wrote:
 Alright, Declan using his Nikon Coolpix 950! Screw that analog stuff.
 Got 340Mb?
 
 At 5:21 PM -0500 12/1/00, Declan McCullagh wrote:
 #  http://www.mccullagh.org/theme/supreme-court-bush-gore-arguments.html




Re: Lost password

2000-11-29 Thread Declan McCullagh

Aaargh. This "has anyone though [sic]" mail must be a troll.

-Declan
(though maybe it would be useful to have the toad.com addr bounce
back "here's the current info" mail rather than injecting messages
into the distributed majordomo network)

On Tue, Nov 28, 2000 at 10:07:47AM -0800, Console Cowboy wrote:
 Has anyone though about setting this list to only accept mail from it's
 members? That would seem to solve quite a few of these issues (issues
 meaning lots of spam, like 2-5 messages a day of spam from this address.)
 
 { BE ---1011.1110-- [EMAIL PROTECTED] }
  This must be morning.  I never could get the hang of mornings.
 {--- GPG public key @ http://www.technomystic.org/~everding/gpgkey ---}
 
 On 29 Nov 2000, eGroups Notification wrote:
 
 
  Hello,
 
  Thanks for using eGroups, home to free, easy, email groups.
  We have received your request for information about a forgotten
  password.
 
  * If you requested this notice and still don't remember your
password, please follow these steps to create a new
password:
 
1.  In your web browser, go to:
http://www.egroups.com/lostpassword?[EMAIL PROTECTED]
 
2.  Enter this reauthorization number: 68947
 
3.  You will be asked to create a new permanent password.
Your new password cannot be the reauthorization
number.
 
  * If you did not request this notice, please ignore this
message. Your eGroups account and current password have
not been affected and you can continue using our free
service as usual.  If you believe someone is attempting to
misuse your email account, please forward this message to
[EMAIL PROTECTED]
 
 
  Regards,
 
  eGroups Customer Support
 
 
 
 
 
 
 
 
 




Janet Reno on Florida, children, violence

2000-11-28 Thread Declan McCullagh

Today:

ATTORNEY GENERAL JANET RENO'S SCHEDULE
Attends Florida's Children Exposed to Violence "Safe from the 
Start"
Summit, Palm Beach Community College, 4200 Congress Ave., Lake Worth,
FL
Location: Location Not Listed.
Contact: 202-616-2771




Re: On 60 tonight

2000-11-27 Thread Declan McCullagh

Yep. Tim's post is closer to what a cypherpunk would do if elected. :)
I suspect that as soon as the election is over, probably in two weeks,
we'll hear plenty of calls for "healing" and enough GOP leaders will
go along with such a move.

-Declan

On Sun, Nov 26, 2000 at 07:59:59PM -0600, Mac Norton wrote:
 Use your head. One of the first things Bush does is pardon Bill
 Clinton.  After all, given who's in charge of the prosecution,
 if Gore gets elected Clinton gets prosecuted so the Repubs can keep
 that circus going; if Bush gets elected, it's not only no longer
 important, it looks vindictive, which is inconsistent with the 
 compassionate conservatism we've been hearing less and less about 
 lately and with "turning this country around", whatever that meant.
 
 So Bush pardons Clinton, which has the added plus of forcing Clinton
 to the choice of taking it or not.  That's *real* revenge.  Not that
 W. is that smart/mean, but his daddy is. 
 MacN
 
 
 On Sun, 26 Nov 2000, Tim May wrote:
 
  At 6:32 PM -0500 11/26/00, [EMAIL PROTECTED] wrote:
  My on-screen guide said "FISA", tvguide.com says,
  "Mike Wallace looks at one couple's claim that
  they were set up by the FBI and wrongly convicted of espionage."
  
  I notice you're babbling about what's on "60 Minutes" but not saying 
  a peep about the certification of the election in Bush's favor.
  
  Now that an incoming Republican Administration will be able to 
  prosecute Bill for his various crimes, Hillary for her tax evasion 
  and insider trading and Algore on treason charges, I can hear Air 
  Force One warming up its engines for its flight to Cuba.
  
  Fidel has offered asylum to Bill and Al,but not to Hillary. She's too 
  far left even for him.
  
  Hillary may have to take refuge with either the Palestinians, where 
  she can hug Yassir's wife all she wants, or ZOG. Maybe she can set up 
  a double-wide in "No Man's Land." A lesbian sistah like her would no 
  doubt like the sound of that.
  
  Regarding the Demonrats who tried to steal this election, I say it's 
  time to take out the trash.
  
  
  --Tim May
  -- 
  (This .sig file has not been significantly changed since 1992. As the
  election debacle unfolds, it is time to prepare a new one. Stay tuned.)
  
  
 




Re: Jim Bell

2000-11-27 Thread Declan McCullagh

The affidavit/complaint we link to at cluebot.com contains an
allegation from the Feds that Bell only 'fessed up to (in previous
interviews with l.e.)  authoring the AP essays.

I do not recall reading about, or writing about, Bell being charged
with deploying a working AP system. No, they've been prosecuting him
using far more mundane allegations of SSN misuse, stinkbombs, and
stalking. AP just gives it all spice, I suppose.

-Declan


On Mon, Nov 27, 2000 at 11:46:14PM -0500, R. A. Hettinga wrote:
 At 7:45 PM -0800 on 11/27/00, Tim May wrote:
 
 
  (I think any of
  us could be called as witnesses to refute a state claim that he was
  deploying a real system!)
 
 Which, unfortunately, and IIRC, he actually *pled* to, nonetheless.
 
 Sheesh.
 
 Cheers,
 RAH
 -- 
 -
 R. A. Hettinga mailto: [EMAIL PROTECTED]
 The Internet Bearer Underwriting Corporation http://www.ibuc.com/
 44 Farquhar Street, Boston, MA 02131 USA
 "... however it may deserve respect for its usefulness and antiquity,
 [predicting the end of the world] has not been found agreeable to
 experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
 




Jim Bell arrested, documents online

2000-11-21 Thread Declan McCullagh

Check out the affidavit/complaint at:
http://www.cluebot.com/article.pl?sid=00/11/21/1944238

Background documents:
http://www.cluebot.com/article.pl?sid=00/11/11/101218

Wired News article on arrest:
http://www.wired.com/news/politics/0,1283,40300,00.html

-Declan




Re: Conspiracy Theory #187389 (RE: Carnivore All-Consuming)

2000-11-20 Thread Declan McCullagh



On Sun, Nov 19, 2000 at 08:56:31AM -0800, Ernest Hua wrote:
 What is the likelihood that the public just ignores this
 given the ruckus over the election?

Very high.




Re: Is this Reno/wiretap stat true?

2000-11-20 Thread Declan McCullagh



On Sun, Nov 19, 2000 at 12:00:29PM -0800, James A. Donald wrote:
  --
   At 01:29 PM 11/19/2000 -0500, [EMAIL PROTECTED] wrote:
   Found in Usenet:
  
   #I don't know if Reno is a traitor, but consider this:
   #Between 1992 and 1997, there were approximately 2,500
   #national security wiretaps requested by the FBI.  Only one
   #of these 2,500 requests was turned down:  Wen Ho Lee's!  And
   #this turndown took place while Wen Ho Lee was still
   #downloading nuclear secrets from Lost Alamos.
  
   True/False?
 
 
 Any new, important and surprising fact reported on usenet without source or 
 explanation is almost certainly a lie.

In general you'd be right, but this might be an exception. Check out
the annual wiretap reports on epic.org. (Admin office of US Courts
publishes them.)

-Declan




Wired article on Jim Bell, links to search warrant and photo

2000-11-11 Thread Declan McCullagh



http://www.wired.com/news/politics/0,1283,40102,00.html

IRS Raids Cypherpunk's House
by Declan McCullagh ([EMAIL PROTECTED])
2:00 a.m. Nov. 11, 2000 PST

WASHINGTON -- When a dozen armed federal agents invaded Jim Bell's
home this week, he wasn't exactly surprised.

Ever since Bell, a cypherpunk whom the U.S. government has dubbed a
techno-terrorist, was released from prison in April, he's predicted
another confrontation with the Feds.

"They're basically trying to harass me," Bell said in a telephone
interview. He has not been arrested or charged with a crime.

In 1996, Bell attracted the unwelcome attention of the IRS and the
U.S. Secret Service after they learned he was talking up a plan to
promote the assassination of miscreant bureaucrats through an unholy
mix of encryption, anonymity and digital cash. Bell even gave his
scheme a catchy title: "Assassination Politics."

Four years, three arrests and one plea-bargain later, Bell was
released from the medium-security federal penitentiary in Phoenix,
Arizona. Since then, he's been busy trying to prove allegations of
illegal surveillance on the part of the Feds, including his charge
that they unlawfully bugged his home.

For Bell, that meant spending the last six months compiling personal
information about IRS and Bureau of Alcohol, Tobacco, and Firearms
agents, a move that appears to have led to the six-hour search of his
home in Vancouver, Washington.

Government offices were closed on Friday, and representatives were
unavailable for comment. But the agents' search warrant cites
"evidence of violations" of a federal law that prohibits intimidation
of IRS agents.

[...]

***

I've included links to the original documents in this article:

http://www.cluebot.com/article.pl?sid=00/11/11/101218mode=nested

Feds Raid Cypherpunk Jim Bell
posted by declan on Saturday November 11, @05:58AM
from the now-who-saw-this-coming? dept.

Crypto-convict Jim Bell, best known for popularizing the idea
of offing Feds through anonymity, encryption, and digital cash,
was raided this week by the IRS and BATF. He has not been arrested and
is irate, vengeful, and computer-less, but otherwise fine. This
happened just half a year after he was released from prison. We've
placed JPGs online of the search warrant, vehicle search warrant,
justification, and list of items taken. Note the justification
includes items related to his "Assassination Politics" scheme. We also
offer some background and a surprisingly flattering color slide photo
I took of Bell.

*

Photo:
http://www.mccullagh.org/image/9/jim-bell-3.html




Announcing PerpetualElection.com, political news/discussion site

2000-11-10 Thread Declan McCullagh



PerpetualElection.com Launches News and Discussion Site
Press Release

NOVEMBER 10, 2000 -- PerpetualElection.com, the only website devoted 
exclusively to news about the first perpetual presidential election in U.S. 
history, launched on Friday.

The site, operated by activists and journalists, is designed to provide an 
information and discussion area for Americans who want to follow the recent 
events in the Sunshine State.

For example: Will Al Gore litigate? Did George W. Bush truly win? Why would 
over 3,000 people vote for Pat Buchanan anyway? Could the House of 
Representatives pick the next president? At PerpetualElection.com, we'll 
chart the story's development with the help of our readers.

Unlike many other sites, PerpetualElection.com has liberals, conservatives, 
greens, and libertarians as editors. All have equal ability to post news 
and start discussions, and there is no single editorial point of view.

Some of our editors, in alphabetical order:

  * Sonia Arrison of the Pacific Research Institute in San Francisco
  * Kathleen Ellis, a Baltimore system administrator and journalist
  * Declan McCullagh, Washington correspondent for Wired News
  * Jill Pelavin, a programmer living in Mountain View, California

PerpetualElection.com is an open source project: It runs on a Red Hat Linux 
server and uses mySQL as a database. The Slash engine, made popular by 
Slashdot.org, is used for discussions and articles.

For more information, contact:
   [EMAIL PROTECTED]
   (202) 986 3455 Voice
   (413) 845-5444 Fax

Or visit:
   http://www.perpetualelection.com/
   http://www.perpetualelection.com/about.shtml

### 




Re: A successful lawsuit means Gore wins!

2000-11-09 Thread Declan McCullagh

(As a followup, I should say I see "RIGHT" in the sample ballot, but that is
not a requirement, but a suggestion, and I'd argue the ballots that
were used probably have substantially the same form.)

-Declan




Al Gore is only 630 votes away from winning the election

2000-11-08 Thread Declan McCullagh

With 99.9 percent of the votes in Florida counted, Al Gore is only 630 
votes away from winning the presidency. The Florida Department of State 
reports -- in numbers updated in the last five minutes -- that George W. 
Bush won 2,898,865 votes with Gore scoring 2,898,235.

You can see the stats for yourself at:
http://enight.dos.state.fl.us/SummaryRpt.asp?ElectionDate=11/7/00RACE=PRE

If Bush does not win Florida he cannot win the presidency, based on the 
numbers calculated by CNN and the networks. Oregon and Wisconsin, the two 
states still labeled as tossups, have a combined total of 18 votes, not 
enough to propel Bush to the necessary 270 electoral votes without Florida.

A win in Florida would guarantee Gore a victory.

Third parties in Florida made a difference. Libertarian Harry Browne won 
15,609 votes, and the Green Party's Ralph Nader received 94,201 votes in 
the state. Nader occasionally claims that he lures voters who would not 
otherwise go to the polls. But if even one percent of Nader's voters had 
turned to Gore -- a certainty -- the presidential election would have 
turned out differently.

With only a 630 vote difference out of some 6 million votes cast in 
Florida, a recount could go a different way. As I write this, Gore has made 
a concession call to Bush, but I'd imagine the Dems would want a recount. 
That's what Gore's supporters are chanting in Tennessee, anyway.

-Declan




How the Net gave the right Florida count

2000-11-08 Thread Declan McCullagh

My article you received late last night:

"Al Gore is only 630 votes away from winning the election"
http://www.politechbot.com/p-01481.html

Seems to have been the first article anywhere (3:35 am) to report that 
Bush's lead in Florida had dwindled to the hundreds, although CBS at 
approximately the same time had mentioned those numbers on the air. The 
politech article also appears to be the first to predict a recount.

According to a wire service search, Dow Jones Newswire moved a similar 
article three minutes after the politech message (3:38 am), though it did 
not mention a recount:

"WASHINGTON (Dow Jones)--Vice President Al Gore now trails Texas Governor 
George W. Bush by only 629 votes in Florida, throwing the U.S. election 
results into question, CBS News reported early Wednesday."

AP had moved an advisory about 20 minutes before (3:11 am) saying that 
Bush's lead was in the thousands: "The lead in Florida for George W. Bush 
has dwindled to about 6,000 in the vote count." Dow Jones, in an article 
distributed at the same time (3:08 am), called the election even with those 
thousands of votes outstanding: "In an election that ultimately came down 
to a few thousand votes in Florida, Texas Governor George W. Bush has won 
the race for the presidency holding off a strong challenge from Vice 
President Al Gore."

The networks, of course, had called the election for Bush at 2:17 am, after 
incorrectly saying earlier in the evening that Florida would go to Gore.

Part of this mess comes from how mainstream media sources relied on Voter 
News Service for their results. For instance, CNN reported at 3:45 am that 
the Florida results were 2,890,321 (Bush) and 2,884,261 (Gore). That spread 
was still about 6,000 votes.

For my politech article, I used the Net to go directly to the Florida 
secretary of state's website. The numbers there were about 20 minutes newer 
than CNN had at the same time. To their credit, CBS News apparently 
switched to those same numbers, although their hasty calculation of a 629 
vote difference was incorrect.

-Declan




Re: FW: BLOCK: ATT signs bulk hosting contract with spammers

2000-11-06 Thread Declan McCullagh

Then, depending on your personal preferences and how valuable you
think you are to prospective emailers, accept only email messages with
$0.10, or $1.00, or $10.00...

It's a market; you do the math.

-Declan


On Sun, Nov 05, 2000 at 08:14:34PM -0800, jim bell wrote:
 
 - Original Message -
 From: Alex B. Shepardsen [EMAIL PROTECTED]
 
 
  On Thu, 2 Nov 2000, Kevin Elliott wrote:
 
   You know, I don't like spammers any more than the next guy, but come
   on.  Unethical?  we're not talking genocide and it's not like it
 
  We ought to be. If spammers feared death as a result of their actions,
  they would be a lot less likely to spam.
 
 I've got a solution to thatoh, never mind.
 
 If "spammers" attached a digi-nickel to each spam, you'd only have to get
 300 such pieces per month (10 per day) to pay for the typical ISP account
 monthly cost.
 
 Jim Bell
 
 




Ray Kurzweil talk at Foresight nanotech conference

2000-11-03 Thread Declan McCullagh



http://www.wired.com/news/technology/0,1282,39967,00.html

Kurzweil: Rooting for the Machine
by Declan McCullagh ([EMAIL PROTECTED])
1:35 p.m. Nov. 3, 2000 PST

BETHESDA, Maryland -- Raymond Kurzweil doesn't merely predict that
machine intelligence will surpass human brains by the end of the
century. He's eagerly anticipating it.

In a Kurzweillian future, the world would become a very strange place,
where converging advances in nanotechnology, biotechnology and
computer science combine to propel humanity to its next stage of
evolution.

"By the end of this century, I don't think there will be a clear
distinction between human and machine," Kurzweil told the Foresight
Institute's Eighth Conference on Molecular Nanotechnology on Friday.

"We can expand the capacity of our brains by a factor of thousands or
millions, and, by the end of the century, by trillions," predicts the
inventor-turned-author of the Age of Intelligent Machines and the Age
of Spiritual Machines.

Technology, of course, has been part of human existence since our
Cro-Magnon ancestors picked up a stone and realized it could be more
than part of the landscape.

But Kurzweil is talking about something a bit more ambitious. If he's
right, exponential progress in science and engineering will allow us
to merge with machines. We will become resistant to diseases, think
faster, live better, and become transhuman in ways that would make
even Superman green with envy.

If he's wrong, well, then we'll continue to have buggy software,
faulty memories, and lifespans that fall far short of the lowly
leopard tortoise.

[...]




soft money (for what it's worth)

2000-11-01 Thread Declan McCullagh



- Original Message -
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Tuesday, October 31, 2000 7:42 AM
Subject: Fw: Soft Money...


  Sascha --- you gotta see this.
 
  - Original Message -
  From: [EMAIL PROTECTED]
  To: [EMAIL PROTECTED]
  Sent: Tuesday, October 31, 2000 7:41 AM
  Subject: Soft Money...
 
 
  
   Kim,
  
   Hi There!
  
   Sorry for taking so long to email you back.  I've been really
   busy---not just with schoolwork, either.  And, no, I don't have a
   boyfriend.  It's practically Election Day!  And since this is my
   first time voting, participating and everything has been really
   important to me.
  
   Remember when John McCain visited my campus back in the spring,
   and I thought that his talk about campaign finance reform was
   pretty cool?  Well, I've changed my mind.  Reform would be nice,
   but right now the most important thing is the election. And this
   election is so close, it could really be decided by which
   campaign is able to run the most television advertisements.
  
   Which brings me to what I've been doing for the past few months.
   Which is, basically collecting soft money for the campaign and
   our candidates --- I call them Our Boys.  And if anybody found
   out what I'm doing, there would be hell to pay. So I am totally
   trusting you to keep this to yourself, OK?
  
   Here's how it started: My father was a delegate at the convention
   this summer. I came along.  It was amazing --- a whole week of
   partying and flirting. The food was fantastic. But I also
   listened to the speeches, and I really got energized, you know
   what I mean? I really got into the messages.  I agreed with so
   much of what the candidate and his VP and everybody else had to
   say---I was totally tripping on the atmosphere.  I asked MD if I
   could give $1000 of my savings account to the campaign, and they
   must have been tripping too, because they said yes.
  
   Silly me, I thought that once you give a thousand dollars, that's
   it. But when I turned in the check, the boy who took it asked if
   I wanted to match my contribution with another thousand dollars
   to the party. That's the "soft money" that McCain was talking
   about. When I told him that I didn't think I could afford any
   more, he said "ok," but that I might want to go out fund raising,
   to see if I could get anybody else to contribute.
  
   This is then when I had my---oh, let's call it a revelation.  We
   were at this after-hours party the night before the last night of
   the convention, and lots of people---MD included---were trashed
   off their asses.  Personally, I was soberer than sober.  So this
   slick-ass middle-aged man in a suit comes up to me and asks me
   what I'm doing there, who I'm with, blah blah blah.  We start
   talking, and he's all impressed with my intelligence and
   education and tan and my Prada minidress. So I tell him that I
   just contributed $1000 and he's all super-impressed with me.
  
   So the guy gets really close to me and murmurs something to the
   effect of: "How would you like to contribute another $1000?"  He
   said that he had to contribute $5000 to get into the party, and
   that they were expecting him to contribute another $5000 the next
   day. He said that if I let him kiss me, he would increase his
   donation to $6000.
  
   Wow.
  
   I got all warm and uncomfortable all of a sudden. I'm sure I was
   blushing. I didn't know what to do. And he said, "what's the
   harm? This campaign is very important to you. It's important to
   me. They need my money. I want to kiss you. A thousand dollars
   for our team."
  
   "You would give them an extra thousand dollars, just for a kiss?"
   I said.
  
   "Well, I was hoping that you would also come back to my hotel
   room with me," he said, with a sly smile on his face.
  
   Right. "My folks are around," I whispered back.  "They'll wonder
   where I am."
  
   "Fine.  A stolen kiss in an empty corner it is," he said.  He
   looked pretty disappointed.  "$100 work for you?"
  
   I was imagining trying to kiss him. To tell the truth, he didn't
   look that bad. But I felt like he was changing the bargain. "I
   thought you said a thousand dollars."
  
   "Yeah, I guess I did. How about $250?"
  
   I nodded and smiled, and we left the big party and went into this
   little conference room with the lights out, and he flipped me
   over like a movie star and gave me this long, slurpy, oops-I'
   m-accidentally-rubbing-your-tits-aren't-I? kiss.  Then he took
   out his checkbook, wrote out a $250 check to the National
   Committee, and gave it to me.
  
   Wow, I thought.  That was pretty easy.  I felt like I had given
   blood or something---drained but exhilarated.
  
   So the next day, while everyone was all at their little parties
   before the Boys were supposed to make their speeches, this other
   older guy comes up to me.
  
   "Hello," he says, with this little 

Zero Knowledge changes business model (press release)

2000-10-31 Thread Declan McCullagh



From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Date: Tue, 31 Oct 2000 06:55:11 -0800
Subject: Zero-Knowledge Introduces Managed Privacy Services for Businesses



Hi Declan,
Today, Zero-Knowledge Systems is introducing its Managed Privacy
Services (MPS) offering to solve the privacy challenges
that businesses face in today's privacy-conscious business
environment.

Privacy is good business. Companies in every industry are
realizing they must institute the proper privacy policies,
practices and infrastructures in order to succeed in
today's digital economy. Zero-Knowledge Managed Privacy
Services provides the tools and strategies that enable
business to establish private customer relationships and
earn consumer trust while ensuring legislative compliance
and mitigating risk.

As companies have become aware of the privacy risks and
legislative hurdles facing them, many have turned to Zero-
Knowledge for advice and solutions, and the MPS offering is
the natural response to companies' needs for comprehensive
privacy solutions.

I've included the press release about MPS below.  If you
have any questions about Zero-Knowledge's Managed Privacy
Services offering or would like to set up a conversation
with Zero-Knowledge President Austin Hill, please give me a
call at 503-552-3749.

Best regards,
Kristy Cory
503-552-3749

ZERO-KNOWLEDGE SYSTEMS INTRODUCES MANAGED PRIVACY SERVICES
TO SOLVE THE PRIVACY CHALLENGES OF BUSINESSES


Montreal -- October 31, 2000 -- Zero-Knowledge(R) Systems,
the leading developer of privacy solutions, today
introduced its new Managed Privacy Services(TM) offering to
solve the privacy challenges of businesses and enable
enterprise to thrive in a privacy-conscious climate.
Delivering a unique combination of technology, policy and
strategy expertise, Zero-Knowledge Managed Privacy Services
(MPS) enables clients to turn privacy into a competitive
advantage by leveraging rich data resources while building
stronger and more profitable relationships with customers,
employees and partners. MPS is based on responsible and
ethical information management in accordance with relevant
legislation and industry standards.

"Privacy is good business -- and Zero-Knowledge Systems is
the company that can deliver continued privacy value to
companies that want to succeed in today's digital economy,"
said Austin Hill, president of Zero-Knowledge
Systems. "Through expert professional services and
technological solutions, Zero-Knowledge Systems works with
companies to leverage and develop the rich data resources
they need, while ensuring that their customers' personal
information will not be abused, misused or sold without
their permission."

Employing a broad toolkit of privacy-enhancing technologies
that control and protect data, MPS brings privacy-based
services to a variety of markets for the first time. These
include: financial services, health care, wireless,
marketing, CRM and hosted solutions (ASPs).

The Managed Privacy Services Process
Zero-Knowledge MPS fuses sophisticated infrastructure
design, advanced cryptographic systems and world-class
privacy expertise to deliver strong privacy integration to
a wide variety of business processes and system designs.
Following a period of assessment and design, MPS culminates
in the deployment of a tailored privacy layer that
integrates seamlessly with the client's existing enterprise
applications.

* ASSESS AND ADVISE -- Managed Privacy Services begins with
a thorough assessment of each client's data storage and
usage patterns, as well as their business objectives. From
this assessment, recommendations are made regarding areas
where data can be better utilized through the addition of a
strong privacy layer, and areas of potential privacy risk
are identified.

* DESIGN AND IMPLEMENT -- The assessment stage provides the
framework for all aspects of the infrastructure design, and
determines which Zero-Knowledge privacy technologies are
best suited to the client's needs. The result is a solution
that not only secures and protects the client's data, but
also allows for a wider array of data-driven activities.
Professional systems integration ensures that all the
client's business requirements are met, and guarantees the
final design will result in the most robust and flexible
system possible.

* VERIFY AND MANAGE -- Zero-Knowledge is able to manage all
elements of the privacy infrastructure, allowing clients to
focus on their core competencies, and providing third-party
credibility to a client's privacy initiatives. Independent
audits ensure that the system deployed is in compliance
with stated policies, and that all controls are functioning
as per the design specifications.

Zero-Knowledge is committed to deploying systems that are
transparent and accountable. In keeping with this policy,
MPS will incorporate third party verification and split
encryption key structures, as well as provide consumers
with access to white papers, independent auditors' reports
or 

Re: Zero Knowledge changes business model (press release)

2000-10-31 Thread Declan McCullagh

I spent perhaps half an hour on the phone with Austin Hill this afternoon. 
Here's what we discussed.

* I suggested that Freedom had been somewhat less than successful in the 
marketplace. (Out of 3,500 cypherpunks messages I have stored here, only 
one nym appears, and this is presumably one of the target audiences.) I 
suggested that this is a change of strategy for ZKS in an era where 
investors want profitability. Austin denied it, and said that over 100 
engineers "right now" were still working on Freedom.

* I suggested the model they were moving toward was Andersen Consulting. 
Austin said no, "Verisign is the better analogy." He said one difference 
was that he anticipated ongoing licensing/fee arrangements between ZKS and 
clients after original work is complete.

* ZKS will offer to store keys. "That includes us holding encryption keys." 
Austin described the key-splitting the same way Adam has here. He refused 
to say whether or not a third-party (Joe's Escrow Service) would ever hold 
keys.

* ZKS appears to be targeting heavily-regulated areas like medical and 
financial sectors. They will come in, set up a privacy-protective system, 
perhaps provide some ongoing service, and (if so) collect ongoing fees. In 
those cases, "a consumer solution like Freedom allowing anonymity doesn't 
fit that market."

* Austin mentioned cell phones/wireless as a major area. He envisions 
services such as if you call 911, your info is revealed, but not when 
phoning other numbers.

* Tim below suggests that "Wouldn't a better approach be for Alice to 
protect her own privacy?" The answer, generally, is yes. I suspect the 
Brands patents can do much to that end. But Austin seems to be envisioning 
a market in which *some* third party in the transaction, be it a business, 
intermediary, or ZKS, possesses personal info about customers and only 
receives what is necessary.

I welcome responses.

-Declan


At 10:30 10/31/2000 -0800, Tim May wrote:
At 1:06 PM -0500 10/31/00, Adam Shostack wrote:
On Tue, Oct 31, 2000 at 09:11:23AM -0800, Tim May wrote:
| Zero-Knowledge is committed to deploying systems that are
| transparent and accountable. In keeping with this policy,
| MPS will incorporate third party verification and split
| encryption key structures
|
| Split encryption key. I think that says it all.

Geez.  I don't know how we ended up with that wording. Multiple key
would have made more sense.  The goal is to have a set of keys which
are held by different entities.  Thus, your data is encrypted such
that each of those entities needs to be involved to decrypt it.


By split key encryption, we mean: E_a(E_b(E_c(data))) where E is a
strong algorithm (3des, twofish, AES), and the keys (abc) are full
strength, properly generated and stored keys for the system.

Let's stipulate that the split keys are as strong as one can imagine.

OK, let's set the stage with some players:

* Alice, a consumer or customer

* Bobco, a giant corporation dealing with Alice, collecting information on 
her, and all the usual stuff involving corporations dealing online with 
consumers like Alice.

* Chuck and Debby, the holders of the "split encryption key," aka the 
"trusted third parties." (Extending the set to 3 or 4 or N such trusted 
third parties does not alter the basic discussion. Nor, by the way, does 
just having a _single_ trusted third party alter the basics of the 
legal/GAK structure: if the legal or national security system can force 
two parties to disclose, forcing one is easier, forcing 3 is slightly 
easier, and so on. But these are "polynomial" issues, so to speak.)

I want to set the state so I can better understand just how and where this 
new ZKS system might be useful (to Alice, to Bobco, to governments).


Given that we're doing this for businesses that are collecting data
now, if you consider those parties 'trusted third parties,' then we're
increasing the assurance that surrounds them.

This business is what I called Bobco above.

Now, suppose Bobco is using the ZKS system. I can see three regimes for 
any use of a crypto product:

-- storage, at either Alice's or Bobco's site

-- transit, between Alice and Bobco

-- unlinkability: something to do with the linkage of purchase information 
with identity; how Bobco collects and disseminates information about 
customers like Alice

The first two are conventional crypto issues, and don't need a new system. 
Both Alice and Bobco are responsible for securing their own data. Should 
laws require Bobco to secure Alice's data  in some specific way, split key 
systems are still a poor solution.

As near as I can tell, your concern about "privacy laws" has something to 
with the third main use for crypto: unlinkability. Am I right?

Before I proceed further, let's see if this is where we're going.

We consider them
'merchants,' 'shipping companes' and other such businesses who today
get data from you.  They're not trusted third parties in the Clipper
chip sense, but 

Re: Insurance: My Last Post

2000-10-26 Thread Declan McCullagh

Maybe. I spent a weekend with Pierre last week in the mountains north
of Montreal, and he nearly qualifies as a cypherpunk. I'll cite him as
an exception that proves my rule. :)

-Declan

On Wed, Oct 25, 2000 at 04:09:55PM -0400, Me wrote:
 From: "Declan McCullagh" [EMAIL PROTECTED]
  It must have something to do with being Canadianized. Only
 folks from
  Alberta seem to get it right.
 
 Pierre Lemieux?!
 
 




Re: Legislative approaches to ID theft?

2000-10-26 Thread Declan McCullagh

Yeah, the sappy Congressional Privacy Caucus ("we ignore government
violations") is having a press conference in an hour to talk about
this bill:
  http://www.cluebot.com/article.pl?sid=00/10/13/0350220mode=nested

I sent my intern.

Then there's the sappy media. I'll forward the complete note, but
one TV reporter just emailed me:

In addition to interviewing pioneers in the field, we are looking for
individuals who have experienced an invasion of privacy over the
Internet.  More specifically, we are looking for men and women, over
the age of eighteen, who have experienced: stolen identity,
exploitation of personal information, loss of job due to employer
monitoring employee9s emails, etc.  Our discussions with anyone who
responds to the posting would be strictly confidential unless he/she
gave written permission and agreed to an interview.  

Sigh.

-Declan



On Wed, Oct 25, 2000 at 11:59:22AM -0700, Tim May wrote:
 BTW, something that's incredibly bad about modern online security is 
 the increasing number of financial companies and agencies that now 
 require "the last four digits of your social number" as an enabling 
 key. When I speak to a phonedroid about the absurdity and danger of 
 this, they act confused.
 
 Declan is right about the above meaning new laws are coming. New laws 
 meaning more control. Government won't be affected...it rarely is 
 affected by its own legislation.
 
 There are many ways to lessen the dangers of "identity theft." 
 Government could start by sticking to the original words on _my_ SS 
 card: "For tax and social security purposes only -- not to be used 
 for identification."
 
 (Or words very similar to this. Somewhere I still have my original SS 
 card, issued in 1969, and this is what it says. I have heard that 
 this phrasing was dropped in later years, opening the door for the SS 
 number to be used for student I.D. numbers, military I.D. numbers, 
 financial record passwords, and all the rest.)
 
 Fucking hypocrites.




Re: Insurance: My Last Post

2000-10-25 Thread Declan McCullagh



On Wed, Oct 25, 2000 at 10:35:53AM -0700, Tim May wrote:
 It's not so much that he's "wrong" as that he's "naive." He arrives 
 on the CP list and begins regurgitating socialist blather he heard in 
 his poli-sci and sociology classes. Junk about mandatory health care, 

True, true. It's probably not worth our time. It's not that he's not
educable -- although we see no indication of that yet -- it's that
there are better uses of scare resources. Anyone hoping to be taken
seriously should at least have read some of the basic cpunk
literature.

And he has not.

 As I have said, and as Lucky just said this morning, the list has for 
 some reason attracted a whole set of such naive and puerile people. 
 One theory is that it's the "fall crop" of students. Another is that 

Probably. I remember on Usenet circa '91 we'd see an influx of
freshmen polluting otherwise useful newsgroups. Lots seemed to come
from psu.edu, for some odd reason.

 increasingly leftist and interventionist. (We have a Canadian branch 
 of the Cypherpunks which is apparently led by a neo-fascist civil 
 rights crusader who wants guns banned and is distrustful of free 
 market solutions.)

Righto. While anyone who wants to can call themselves a cypherpunk,
anarchic labeling and all that, it's clear that some folks just don't
get it.

It must have something to do with being Canadianized. Only folks from
Alberta seem to get it right.




Re: Insurance: My Last Post

2000-10-25 Thread Declan McCullagh

Ah, no. Said individual was born in the U.S. from American parents (and 
then moved to BC). It's that Yankee blood that does it. :)

-Declan


At 12:21 10/25/2000 -0700, Tim May wrote:

Not counting a certain someone, initials SB/SS, from British Columbia?







Re: Killing Judges

2000-10-24 Thread Declan McCullagh

On Sat, Oct 21, 2000 at 03:49:52PM -0700, jim bell wrote:
 "Did the PI hear of this incident?".   (There were presumably at least 100
 people in the courthouse or nearby when this incident occurred:  one might
 think that it would be very unlikely if ALL of them didn't call the news
 media.)   Naturally, she had to point out that they were being "good
 citizens" by NOT reporting"every bomb threat".I should have asked her if

I hate to defend my colleagues, but this is reasonable. I don't know
if bomb threats that turn out to be fake are inherently newsworthy.

I would probably have made the same decision, given limited
resources. Unless there was some evidence that this was a pattern of
threats, etc.

 At the time, though not publicly, I speculated that to try to counteract
 this, a small counter-media organization might be formed, containing as
 little as a sole individual..  I figured that it would announce itself as a
 sounding-board for this kind of thing.  It would receive, anonymously, any
 sort of announcement, statement, threat, promise, warning, etc.  It would
 combine these anonymous snippets, and deliver them (quite openly, in a
 recorded and documented fashion) to all the various news media organizations
 that might otherwise want to ignore what was being said.Since this

What you're describing could well be a competing publication. You'd
presumably have greater legal protection that way in any case.

I can see it now: "CJ and JB's BombNewsWire"

-Declan




Re: Declan My Lai

2000-10-23 Thread Declan McCullagh

Nope, never expected it. This proves what those wise and neutral folks
on NPR today were calling the media's fascination with triviality.
(Me, I would say that voting is such an inefficient process of getting
what you want that it is not rational to read up on all policy
positions of the candidates, and you might as well focus on character,
or what you perceive to be the same.)

If I wanted to be a partisan political reporter, clearly it would be
higher-profile. But that doesn't interest me much, so I shall
diminish, and remain, well, you get the idea.

-Declan


On Sun, Oct 22, 2000 at 11:26:56AM -0400, John Young wrote:
 Declan,
 
 Pounding out the hundreds of deathless reports
 you've done did you dream it would be the Gore
 My Lai that got you onto the NYTimes opinion 
 page today?
 
 
 




Re: Illicit words

2000-10-23 Thread Declan McCullagh

It's too late; you're already on the TLA list since you posted to cypherpunks.

If they know who you are, they don't need to scan your email for keywords.
They can simply read all of it.

-Declan

On Mon, Oct 23, 2000 at 07:08:34PM -0700, Bruce J.A. Nourish wrote:
 I read somewhere that the FBI/NSA/some other Big Bro. organisation has a
 list of words that they check your email against, and if they find any, they
 have someone read your mail. Anyone know what they are?
 
 TIA  HAND
 -- 
 Bruce J.A. Nourish (keys - see header) [EMAIL PROTECTED]





I.R.S. Seeks Credit Card Slips

2000-10-20 Thread Declan McCullagh


http://www.nytimes.com/2000/10/20/business/20BANK.html

October 20, 2000 - New York Times (front page)

Taking Aim at Tax Havens, I.R.S. Seeks Credit Card Slips

  By DAVID CAY JOHNSTON

 The Internal Revenue Service, struggling against Caribbean
havens it suspects of
  draining away at least $70 billion a year in personal income
tax revenue, has set its sights
  on a new target — the credit card slips of  suspected tax
evaders.

  The agency has asked a federal judge in Miami to issue
summonses for two years'
  worth of records of MasterCard and American Express card
transactions in the
  United States that were billed to bank accounts in Antigua and
Barbuda, the
  Bahamas and the Cayman Islands.

  Using the Internet and other outlets, banks in those nations
openly solicit
  tax evasion in ways that the I.R.S. says have proved
attractive to
  corporate executives, business owners, doctors and other
wealthy
  people in the United States.

  Americans can legally move their assets offshore but are
required to
  notify the I.R.S. of those transactions and to pay taxes on
their income
  worldwide. Some Caribbean countries offer an alluring tax
haven,
  however, because they impose no income tax and do not
generally
  cooperate with I.R.S. efforts to track down incomes.




Re: House Passes Bipartisan Commercial Space Bill

2000-10-19 Thread Declan McCullagh

To do the poor-taste thing of following up on my own message:

I'm sure glad the House did such a thing. Without government help,
there would be no incentive for companies to go into space.

-Declan


On Wed, Oct 18, 2000 at 06:49:28PM -0400, Declan McCullagh wrote:
 
 
 Committee on Science
 F. JAMES SENSENBRENNER, JR., CHAIRMAN
 Ralph M. Hall, Texas, Ranking Democrat
 www.house.gov/science/welcome.htm
 
 October 18, 2000
 
 Press Contacts:
 Jeff Lungren ([EMAIL PROTECTED])
 Jeff Donald ([EMAIL PROTECTED])
 (202) 225-4275
 
 
 HOUSE PASSES BIPARTISAN
 COMMERCIAL SPACE BILL
 
 Bill Enhances U.S. Commercial Space Competitiveness
 By Extending Launch Indemnification
 
 WASHINGTON, D.C. - With broad bipartisan support, the House yesterday passed
 H.R. 2607, the Commercial Space Transportation Competitiveness Act, by a
 voice vote.  The bill now goes to the President for final approval.
 
 H.R. 2607 extends launch indemnification to the U.S. commercial launch
 industry for four more years, through the end of 2004.  The federal
 government first decided to indemnify commercial launch companies against
 catastrophic losses as a means of rebuilding a launch industry that was
 critical for national security.  In addition, the bill authorizes funds for
 the Offices of Advanced Space Transportation and Space Commerce in the
 Departments of Transportation and Commerce.
 
 The bill's sponsor, Space and Aeronautics Subcommittee Chairman Dana
 Rohrabacher, (R-CA) said, "Passage of H.R. 2607 signals continued
 congressional support of a highly competitive launch industry in today's
 global market.  This legislation enables the U.S. Government to maintain a
 stable business environment so that the private sector can become more
 competitive.  Moreover, by directing the Administration to examine more
 innovative legal approaches for indemnification, we begin a new chapter in
 U.S. space development in the 21st Century."
 
 House Science Committee Chairman F. James Sensenbrenner, Jr., (R-WI) added,
 "By extending commercial launch indemnification, this bill helps build a
 solid foundation for commercial launch companies.  This foundation enhances
 our national security by encouraging private firms to invest in improving
 U.S. space launch capabilities and maintaining U.S. competitiveness with
 launchers from Europe, Russia, the Ukraine and China.  I hope the President
 will quickly sign this important bipartisan legislation into law."
 
 Science Committee Ranking Minority Member Ralph M. Hall, (D-TX) said, "The
 Commercial Space Competitiveness Act was the top legislative priority for
 the American space launch industry. It is in our Nation's interest that we
 continue to be world leaders in the launch industry.  This bill provides the
 framework of support and incentives the industry indicates they need to keep
 their premier status. I am pleased that the Science Committee could play a
 central role in moving this legislation to completion."
 
 Space and Aeronautics Subcommittee Ranking Minority Member Bart Gordon,
 (D-TN), also an original co-sponsor of the bill, noted, "The key achievement
 of this bill is an extension of the commercial space indemnification
 provisions.  Those provisions, first enacted in 1988, have provided a highly
 effective risk-sharing system that has helped our launch industry compete
 with the world.  Since their enactment 12 years ago, these provisions
 haven't cost the taxpayer one dollar in claims."
 
 ###
 106-164
 
 
 Jeff Donald
 Deputy Communications Director
 House Science Committee
 2320 Rayburn House Office Building
 202-225-4275 (phone)
 202-226-3875 (fax)
 




Rep. Armey questions Justice Department review of Carnivore

2000-10-19 Thread Declan McCullagh



And a Napster poll:
http://freedom.gov/vote/vote5.asp



http://www.cluebot.com/article.pl?sid=00/10/19/2251239

Justice Department Carnivore Review a Sham?
posted by cicero on Thursday October 19, @05:44PM
from the say-could-it-be-an-election-year? dept.

Dick Armey, House majority leader and Republican firebrand, is once
again making trouble for the Clinton administration. Armey this
afternoon sent a letter to Attorney General Janet Reno, saying that
the Justice Department's review of Carnivore appears somewhat less
than objective: "I have questioned the independence of this review.
Several in the media have questioned this review. Several universities
refused to submit review proposals because, in their opinion, the
review process was unfair." Having the supposedly secret names of the
government-affiliated reviewers revealed last month sure didn't help.
Neither did the information in the Carnivore documents obtained under
the Freedom of Information Act. (Armey's letter is below.)

The letter:
http://www.cluebot.com/article.pl?sid=00/10/19/2251239





Cypherpunkly convo on legal vs. tech protections of anonymity

2000-10-19 Thread Declan McCullagh



http://www.cluebot.com/article.pl?sid=00/10/19/1952214mode=nested




RE: I created the Al Gore created the Internet story

2000-10-18 Thread Declan McCullagh

At 17:44 10/18/2000 -0400, Trei, Peter wrote:
Been there, done that, got the credit. I was one of the original developers
of Apple Kermit (in 6502 assembler) at Columbia University. Amongst other

Wow -- I'm impressed. I remember using that.

Actually, by 86, the Mac was out, as was the PC/AT and (I think) the
Amiga. These were much more capable machines than the Apple ][.

True, and the IIgs was out in September '97. But it takes a while for folks 
to upgrade, which is why I said many of us were still using Apple IIs (I 
also had a Mac+ at the time).

-Declan




Re: why should it be trusted?

2000-10-17 Thread Declan McCullagh

On Mon, Oct 16, 2000 at 09:46:25PM -0700, Nathan Saper wrote:
 Fine.  My basis for my claim is that the NSA is the best funded and
 best equiped electronic intelligence agency in the world, and they
 have employed some of the smartest people in the world.

Sorry, but this is hand-waving. There are smart people outside the NSA
and there is money outside the NSA.

 Fine, it's a claim made by the clueless.  I'm not claiming to be
 something other than clueless, but I am claiming to have not meant
 what I sent to this list.  Again, not a good proofreader.  Again, sue me.

No, you'll just be ridiculed instead. Extraordinary claims require
extraordinary proof, and you have not provided it.

Think of it from a longtime cypherpunk's perspective: We see people
come in here and say the same thing as you every month or so, and
offer much in the way of not-very-informed speculation but little in
the way of proof.

-Declan




Gore and Bush during debate: Equal-opportunity censors?

2000-10-17 Thread Declan McCullagh



http://www.cluebot.com/article.pl?sid=00/10/18/042235mode=nested

Gore and Bush: Equal-Opportunity Censors?
posted by cicero on Tuesday October 17, @10:58PM
from the affirmative-action-for-censorhappy-politicos dept.

There was something absent from this evening's presidential debate,
and it wasn't Al's horn-blowing sighs or Dubya's runny-nosed
sniffles. What was missing was an appreciation for the benefits
of free speech, the perils of blocking software, and the hazards
of blaming the world's woes on the Internet. In response to an
audience question about "the morality of our country," both candidates
talked up rating systems, blamed Hollywood, and recommended having the
government help parents who have, allegedly, failed. Al Gore, who
likes to talk about privacy, waxed downright Carnivorous over a
"feature that allows parents to automatically check, with one click,
what sites your kids have visited lately.. if you can check up on
them, then you -- that's real power." Quoth Bush, who had similar
ideas: "There ought to be filters in public libraries, and filters in
public schools, so that if kids get on the Internet, there's not going
to be pornography or violence coming in." Bush was talking about
legislation currently before Congress that ties filtering to checks
from the Feds.

Relevant excerpt from transcript:
http://www.cluebot.com/article.pl?sid=00/10/18/042235mode=nested




I created the Al Gore created the Internet story

2000-10-17 Thread Declan McCullagh




http://www.wired.com/news/politics/0,1283,39301,00.html

The Mother of Gore's Invention
by Declan McCullagh ([EMAIL PROTECTED])

3:00 a.m. Oct. 17, 2000 PDT
WASHINGTON -- If it's true that Al Gore created the Internet, then I
created the "Al Gore created the Internet" story.

I was the first reporter to question the vice president's improvident
boast, way back when he made it in early 1999.

Since then, the story's become far more than just a staple of
late-night Letterman jokes: It's now as much a part of the American
political firmament as the incident involving that other vice
president, a schoolchild, and a very unfortunate spelling of potato.

Poor Al. For a presidential wannabe who prides himself on a sober
command of the brow-furrowing nuances of technology policy, being the
butt of all these jokes has proven something of a setback.

I mean, who can hear the veep talk up the future of the Internet
nowadays without feeling an urge to stifle some disrespectful giggles?
It would be like listening to Dan Quayle doing a
please-take-me-seriously stump speech at an Idaho potato farm.

Case in point: Mars Inc. lampoons the vice president in a hilarious
new commercial for Snickers. In it, a cartoon Al brags that he,
variously, invented the Internet, trousers, and when he wasn't busy
elsewhere, "lots of other stuff too."

When you're getting mocked by a candy company, you know your
statesmanship rating has plummeted to a terrifying new low. No wonder
one recent poll shows Gore to be solidly ahead of his Republican rival
in only 11 states. It's simple: He's got no respect.

Which brings us to an important question: Are the countless jibes at
Al's expense truly justified? Did he really play a key part in the
development of the Net?

The short answer is that while even his supporters admit the vice
president has an unfortunate tendency to exaggerate, the truth is that
Gore never did claim to have "invented" the Internet.

During a March 1999 CNN interview, while trying to differentiate
himself from rival Bill Bradley, Gore boasted: "During my service in
the United States Congress, I took the initiative in creating the
Internet."

That statement was enough to convince me, with the encouragement of my
then-editor James Glave, to write a brief article that questioned the
vice president's claim. Republicans on Capitol Hill noticed the Wired
News writeup and started faxing around tongue-in-cheek press releases
-- inveterate neatnik Trent Lott claimed to have invented the paper
clip -- and other journalists picked up the story too.

My article never used the word "invented," but it didn't take long for
Gore's claim to morph into something he never intended.

The terrible irony in this exchange is that while Gore certainly
didn't create the Internet, he was one of the first politicians to
realize that those bearded, bespectacled researchers were busy
crafting something that could, just maybe, become pretty important.

In January 1994, Gore gave a landmark speech at UCLA about the
"information superhighway."

Many portions -- discussions of universal service, wiring classrooms
to the Net, and antitrust actions -- are surprisingly relevant even
today. (That's an impressive enough feat that we might even forgive
Gore his tortured metaphors such as "road kill on the information
superhighway" and "parked at the curb" on the information
superhighway.)

Gore's speech reverberated around Democratic political circles in
Washington. Other Clinton administration officials began citing it in
their own remarks, and the combined effort helped to grab the media's
attention.

Their timing was impeccable: In July 1993, according to Network
Wizards' survey, there were 1.8 million computers connected to the
Internet. By July 1994, the figure had nearly doubled to 3.2 million,
a trend that continued through January 2000, when about 72 million
computers had permanent network addresses.

Small wonder, then, that as the election nears, Gore's defenders have
been rallying to defend him. In a recent op-ed piece in the San Jose
Mercury News, John Doerr and Bill Joy claim "nobody in Washington
understands" the new economy as well as Gore does.

Net-pioneers Robert Kahn and Vint Cerf, a Democratic party donor, have
written an essay saying "no other elected official, to our knowledge,
has made a greater contribution over a longer period of time" than the
veep.

Scott Rosenberg, in a recent Salon article, joined the fray: "The
'Gore claims he invented the Net' trope is so full of holes that it
makes you wish there were product recalls f

Senate approves online booze ban; FCC, landlords, and telcos

2000-10-15 Thread Declan McCullagh



http://www.cluebot.com/article.pl?sid=00/10/15/2120258mode=nested

Senate Votes to Restrict Online Booze Sales
posted by cicero on Sunday October 15, @04:19PM
from the so-junior-doesn't-order-that-$45-california-merlot dept.

The U.S. Senate voted 95-0 last week to restrict online alcohol
sales. The purported reason: Beer and wine wholesalers claim it
would protect children. "This law will put real power behind
state efforts to enforce laws that require responsible marketing (and)
ID checks," one lobbyist said in a Wired News article. The real
reason: Wholesalers fear being bypassed by mail order firms -- that
would mean losing lucrative markups -- and have handed millions of
dollars in campaign contributions to Congress. The House has already
approved the bill, part of an unrelated measure about trafficking in
sex slaves, and the president is expected to sign it shortly.




http://www.cluebot.com/article.pl?sid=00/10/14/1956211mode=nested

FCC Wants to Force Net Access on Landlords
posted by cicero on Saturday October 14, @02:47PM
from the so-much-for-private-property dept.

Adam Thierer of the conservative Heritage Foundation writes in
with a recent article he wrote about the FCC. He's angry about
a proposed regulation the agency is considering: It requires
apartment and office building owners to let telcom companies wire
the place, at a cost to be determined by the Feds. So much for
private property, eh? Thierer's article is below. 




Re: Ralph Nader sends privacy survey to Bush and Gore campaigns

2000-10-10 Thread Declan McCullagh

At 23:38 10/9/2000 -0700, Bill Stewart wrote:
I seem to remember Etzioni being tied into the Communitarian
movement as well.

Right. In fact, that's an understatement.

He's essentially the anti-cypherpunk: Regulate corporations' data 
collection practices strictly, but don't regulate the governments' practices.

-Declan





Re: Ralph Nader sends privacy survey to Bush and Gore campaigns

2000-10-10 Thread Declan McCullagh

At 12:35 10/10/2000 -0500, Jim Burnes wrote:
Yeah.  In the dim, dusty recesses of my memory I seem to recall the
Communitarian zeal with something the NWO types are calling 'The
Third Way'.  A way of involving business and government together
to create social change.  Last time I checked thats called Fascism.

You don't even have to go as far left as the communitarians to find that.

Check out the DLC, which Clinton headed and Lieberman now chairs: 
http://www.ndol.org/

The "third way" is their motto: http://www.ndol.org/ndol_ka.cfm?kaid=128

-Declan





Democrats on hate crimes in Defense Department bill

2000-10-06 Thread Declan McCullagh



NEWS FROM THE HOUSE DEMOCRATIC LEADER

FOR IMMEDIATE RELEASE House Democratic Leader Richard A. Gephardt
October 6, 2000  H-204, U.S.
Capitol

http://democraticleader.gov/

Gephardt Statement on Hate Crimes and Other Pending Legislation


"In the last 24 hours, we've had three pieces of evidence that the
Republican leadership is not interested in acting on the priorities of the
American people.  In a flurry of legislative maneuvering, Republicans have
taken strong, sensible, bipartisan bills and they have tried to kill those
bills by putting forward weak, watered-down versions that do nothing for the
American people.

"Last night, Republican conferees took a bipartisan, sensible hate
crimes bill and they eliminated it from the Department of Defense
Authorization bill.  Republicans seem determined to file a DOD bill that is
stripped of hate crimes, and their actions in the last 24 hours are an
affront not only to the American people, but to a clear majority in the
Congress.

"Republicans defied the will of both Houses of Congress, denied the
American people a strong, sensible bill that would have given law
enforcement officers the enhanced tools they need to deal with horrible hate
crimes, and they prevented the country from sending a strong signal that we
as a society will not tolerate crimes committed against people simply
because of who they are.

"This is a bipartisan bill.  The President has supported it for
years, the American people support it in overwhelming numbers, and both the
House and the Senate have voted in bipartisan fashion to include hate crimes
in the Department of Defense Authorization bill.

"I will continue to fight with Senator Daschle, President Clinton,
and with my colleagues and all Americans who support this common-sense law,
and I still hope that we can pass this bill this year and accomplish
something meaningful for the American people.

"Now, we've also had two other pieces of news in the last 24 hours
that points to a pattern; and, sadly, the story with re-importation and with
a Patients' Bill of Rights is similar to hate crimes.  First, I am deeply
disappointed that the Republican leadership has decided to defy the will of
the American people and short-circuit a bipartisan effort to craft effective
re-importation legislation that might have lowered drug prices for millions
of Americans.  Instead, Republicans went behind closed doors and came up
with an ineffective, partisan half-measure that serves the needs of the
pharmaceutical companies at the expense of the American people.

"The Republican measure is full of loopholes that will allow
pharmaceutical companies to get around the new law.  It also sunsets after 5
years, so even if seniors did begin to see lower drug prices as a result of
this bill, that benefit will not last.  Republicans have once again chosen
the side of special interests over the people.  Democrats believe that all
seniors should have permanent, reliable help with the high costs of
prescription drugs, and we support effective, permanent re-importation
legislation as a step in that direction.  But the most important way to give
seniors the help they need is to enact an affordable, reliable, universal
Medicare prescription benefit.  Republicans have blocked that measure,
refusing, even, to let us bring it up on the floor for a vote.  Their action
on re-importation seems designed to distract us from the much larger issues
at hand.

"I am just as troubled by a last-minute effort on a Patients' Bill
of Rights.  Here, once again, they have decided to abandon a bipartisan bill
and to seek political cover instead.  Today, Republicans proposed a weak
Patients' Bill of Rights that fails to give patients the protections they
need from their HMO companies.  The real Patients' Bill of Rights passed the
House one year ago tomorrow by a strong bipartisan margin, and it remains
the only bill that will actually do something meaningful for millions of
Americans.

"Democrats will continue to fight for good, common-sense, bipartisan
bills that the American people want and that bipartisan majorities in
Congress support: hate crimes--a strong Patients Bill of Rights-permanent
re-importation legislation-and a Medicare prescription benefit that will be
always be there for seniors.  We will continue to work with all our
colleagues to accomplish something meaningful in the few short days we have
left."

#

Contact: Laura Nichols/Sue Harvey (202) 225-0100
  




Re: Guys, I need help

2000-10-06 Thread Declan McCullagh

Guy,
What do you suggest? This is cypherpunks, be a capitalist: Offer cash for 
setting up another anonymizer-type service that is not blocked. :)

-Declan


At 19:08 10/6/2000 -0700, M. Emad Ul Hasan wrote:
Your anonymizer.com is blocked in Saudi Arabia via proxy. Can you tell me 
a way I can see this site




House scheduled to vote Tuesday on sex-wiretapping bill

2000-10-02 Thread Declan McCullagh



http://thomas.loc.gov/cgi-bin/bdquery/z?d106:h.r.03484:

SEC. 2. AUTHORIZATION OF INTERCEPTION OF COMMUNICATIONS IN THE
INVESTIGATION OF SEXUAL CRIMES AGAINST CHILDREN.

  (a) CHILD PORNOGRAPHY- Section 2516(1)(c) of title 18, United States 
Code, is amended by inserting
  `section 2252A (relating to material constituting or containing child 
pornography),' after `2252 (sexual
  exploitation of children),'.

  (b) COERCION AND ENTICEMENT TO ENGAGE IN PROSTITUTION OR OTHER ILLEGAL
  SEXUAL ACTIVITY- Section 2516(1)(c) of title 18, United States Code, 
is amended by inserting `section
  2422 (relating to coercion and enticement),' after `section 2321 
(relating to trafficking in certain motor
  vehicles or motor vehicle parts),'.

  (c) TRANSPORTATION OF MINORS TO ENGAGE IN PROSTITUTION OR OTHER ILLEGAL
  SEXUAL ACTIVITY- Section 2516(1)(c) of title 18, United States Code, 
is amended by inserting after the
  matter added to that section by subsection (b) of this section the 
following: `section 2423 (relating to
  transportation of minors)'.




Vint Cerf and Robert Kahn defend Al Gore

2000-09-29 Thread Declan McCullagh



http://www.cluebot.com/article.pl?sid=00/09/29/0711253mode=thread

Did Al Gore Really Invent the Internet?
posted by cicero on Friday September 29, @02:11AM
from the resuscitating-al-gore's-image dept.

As the election nears, Net-pioneers Vint Cerf and Robert Kahn
are busy defending Al Gore. The veep's invented-here crack
about creating the Internet, they claim in their article attached
below, has been terribly misunderstood. Now, we're fans of the
TCP/IP-inventing duo, but it's been a long time in political ecology
since Cerf famously joked 15 years ago in parody RFC968 that: "Twas
the night before start-up and all through the net, not a packet was
moving; no bit nor octet..." Things are more complicated now, and
MCI's Cerf has morphed from an IETF geek into a Washington powerbroker
and Friend of Bill and Al. Cerf showed up at the New Year's Eve White
House millennium gala, spoke at an October 1999 White House
"Millennium Evening" lecture, and appeared with the president and vice
president at a July 1997 event to introduce administration policy
proposals. We note that other prominent figures recently have made
similar attempts to rescue Gore's tattered image among techies. But a
more neutral description of the vice president's role in history is,
we think, a fine 1999 article by author Virginia Postrel.

Their article:
http://www.cluebot.com/article.pl?sid=00/09/29/0711253mode=thread




Biochem convention violates privacy rights, study says

2000-09-28 Thread Declan McCullagh

- Forwarded message from Patricia Mohr [EMAIL PROTECTED] -

From: "Patricia Mohr" [EMAIL PROTECTED]
Subject: New Cato study on the Biological Weapons Convention 
To: [EMAIL PROTECTED]
Date: Thu, 28 Sep 2000 09:20:45 -0400
X-Mailer: Microsoft Outlook 8.5, Build 4.71.2173.0

Cato Institute News Release

September 28, 2000

Enforcement Of Biological Weapons Convention Would Be Unconstitutional
Protocol would violate Fourth, Fifth Amendments and appointments clause

WASHINGTON -- One unfinished piece of business on President Clinton's agenda
is the development of a new "enforcement protocol" for the Biological
Weapons Convention (BWC), the 1972 treaty that bars signatories from
producing or using lethal biological agents. But whether the president
submits the protocol to the Senate for ratification or leaves the task to
his successor, enforcing the BWC is so fraught with constitutional problems
as to render the effort futile, according to a new Cato Institute study
released today.

In "Constitutional Problems with Enforcing the Biological Weapons
Convention," Ronald D. Rotunda, visiting senior fellow in constitutional
studies at the Cato Institute, notes that while the United States should
continue to renounce the use of biological weapons, "the protocol will
undermine the privacy rights that U.S. citizens expect and that the Fourth
Amendment guards, will interfere with the safeguards that the appointments
clause was designed to guarantee, and will compromise the intellectual
property rights that the Fifth Amendment protects."

Instead of allowing foreign inspectors access only to public property, the
enforcement protocol would expand access to allow searches of private
individuals and companies "without the strict protections of the Fourth
Amendment and its requirement that a search warrant be issued by a neutral
magistrate only after a finding of probable cause," says Rotunda. "The
protocol's search of private property must be unusually thorough to have any
chance of working effectively, but such invasive searches create a greater
risk of a violation."

The Constitution invests the executive branch of government with the power
to appoint all "officers of the United States."  International inspectors
under the BWC protocol "would have police power over private parties but . .
. would not be subject to appointment and removal by any U.S. official in
the normal manner," Rotunda says.  "The Supreme Court has made clear that
the framers created and limited the appointment power to 'ensure that those
who wielded it were accountable to political force and the will of the
people.'"  BWC inspectors would have no such accountability.

Finally, because the BWC protocol would give international inspectors access
to private companies on the cutting edge of technology, "intrusive
inspections create a serious risk of industrial espionage by foreign
inspectors -- many of whom come from nations that often do not respect
intellectual property rights," says Rotunda.  Companies that have their
trade secrets stolen would face difficulty in getting compensation
guaranteed by the Fifth Amendment, as inspectors may be outside the
jurisdiction of U.S. courts by the time the theft is discovered or may have
diplomatic immunity.

Foreign Policy Briefing no. 61
(http://www.cato.org/pubs/fpbriefs/fpb-061es.html)

Contact:Ronald D. Rotunda, visiting senior fellow in constitutional
studies, 202-218-4600
Randy Clerihue, director of public affairs, 202-789-5266

The Cato Institute is a nonpartisan public policy research foundation
dedicated to broadening policy debate consistent with the traditional
American principles of individual liberty, limited government, free markets,
and peace.



- End forwarded message -




Re: CDR: Re: Lions and Tigers and Backdoors, oh, my...

2000-09-27 Thread Declan McCullagh

To respond to Ray's original message:

I'm also intrigued, but skeptical. Ray wrote:
  Keywords to search by:  "Help field" (in quotes), PKI, NSA, "40 bits"
  "Netscape" -- It's out there, mostly in smarmy self-congratulatory

I've done the searches and come up with nothing. What URL should I
be looking at?

I'm quite interested in exposing any wrongdoing here, both personally
and professionally. Check out my back articles
(http://www.wired.com/news/print/0,1294,21810,00.html) for stuff I've
written that's relevant here.

My PGP key is on the servers; Wired's phone number is in the Washington DC
phone book.

-Declan
Wired News



On Wed, Sep 27, 2000 at 09:27:07AM -0400, Trei, Peter wrote:
 Can you document this claim of the existance of 'help fields' in
 Netscape? I am (to put it mildly) astonished by this claim, and
 more than a little skeptical. I was aware of the Workfactor
 Reduction field in the export 'aka International' version of Lotus Notes
 (which this 'help field' seems identical to), but was not aware
 of it being included in any other application.
 
 If you can document this, I'm seriously interested in following up.
 
 Peter Trei
 Cryptoengineer
 RSA Security Inc.
 
 [EMAIL PROTECTED]
 
 
  --
  From:   Ray Dillinger[SMTP:[EMAIL PROTECTED]]
  Reply To:   Ray Dillinger
  Sent:   Tuesday, September 26, 2000 8:37 PM
  To: Michael Motyka
  Cc: [EMAIL PROTECTED]
  Subject:Re: CDR: Re: Lions and Tigers and Backdoors, oh, my... 
  
  
  
  On Tue, 26 Sep 2000, Michael Motyka wrote:
  
  
  From the article...
  
   Until recently the US government strictly controlled the strength of
   cryptography in software exported to different countries, in order
   to protect the government's ability to access and monitor
   communications data. The regulations were relaxed after pressure
   from industry but Madison believes that this may have driven the
   NSA to find ways to carry out surveillance. "They're not going to
   give in over exporting strong cryptography without getting
   something in return," he says. 
  
  I can't believe that they would voluntarily enter a period of weakend
  capabilities. My guess would be that he has the event ordering wrong.
  
  Nope, he's got it right.  
  
  There used to be, officially, a 40-bit key length limit on exportable 
  software.  This made american software products with any crypto capacity 
  ridiculously weak, to the point where anyone concerned about security 
  would not use it -- the software industry was losing to foreign 
  competition, and the quality of the intercepts was going down because 
  everybody was wise to it and nobody who mattered to them was using it 
  anymore. 
  
  New policy:  The BXA approves export licenses for people who put all 
  but the last 40 bits of the key in the headers or trailers somewhere, 
  encrypted under a key that the NSA doubtless knows.  
  
  Not that this is noised about too much.  Feature AOL saying "yes, we 
  broke the encryption in Netscape starting after version 4.07..." not 
  bloody likely.  
  
  After a little security skirmish with my (now Ex)Bank, I discovered 
  this about Netscape and Internet Explorer; both have "help fields" 
  in their headers that facilitate cryptanalysis of SSL connections 
  if you have the key to the help field.  
  
  As far as I know, the same is true of all software that has BXA approval 
  for downloadable status.  At least (name deleted -- a friend who works 
  at netscape) confirmed that they couldn't get BXA approval for export, OR 
  get anyone at BXA to tell them why not, except for vague wailing about 
  "security considerations" until someone finally offered to put in a 
  "help field".  
  
  Anyway; people concerned about security from ordinary theives can now 
  be reassured because only the US gov't gets the juicy bits, and the 
  Uber-theives at the US gov't are reassured because they are getting 
  the juicy bits again now that most people think US products have "strong" 
  crypto.
  
  Don't get me started on this; I get so mad I can't see straight.
  
  Keywords to search by:  "Help field" (in quotes), PKI, NSA, "40 bits"
  "Netscape" -- It's out there, mostly in smarmy self-congratulatory 
  tones about how "We are pleased to announce that Netscape is working 
  with us and will be in compliance with the Public-Key Infrastructure" 
  by (Date -- I forget the date, but it coincides with the release of 
  Netscape 4.5). 
  
  Ray
  
  
  
 




Liechtenstein ends anonymous bank accounts

2000-09-26 Thread Declan McCullagh


Liechtenstein Formally Announce End Of Anonymous Accounts From October 1st
http://www.tax-news.com/html/oldnews/st_jliBankSecrecyEnd_25_09_00.htm
by Ulrika Lomas, Tax-news.com, Brussels 25/09/00
The cards have been on the table for some time, and now the moment has
come for Liechtenstein, finally, to close the door on banking anonymity.
The
Liechtenstein Bankers Association announced at the end of last week that
their formal agreement to comply with, and enforce, the abolition of
banking
anonymity will take effect from October 1st... [snip]
The Liechtenstein Bankers Association has stated that its members hope to
complete their checks by the end of next year, but it does stress,
unequivocably, that any further account details will remain under normal
banking secrecy agreements. Even so, the Bankers Association says it
expects some clients may refuse to reveal their identity and choose to
withdraw their funds.
The new system of identifying the names of depositors, known as "Know Your
Customer", has been in force for some time but is currently non-obligatory
-
until October 1st that is.
Just as the demise of the anonymous account will be mourned by many an
investor, so too will it be welcomed by institutions such as the OECD and
FATF... [snip]
The pressure placed on Liechtenstein by the FATF has played a major part in
removing banking anonymity, but there remains some tax jurisdictions
outside
Europe which will welcome depositors money without compromising their
identity. However, given the mounting international scrutiny and the
implementation of anti-money laundering initiatives, times are changing and
perhaps it is just a question of time before they begin to come under the
same
amount of pressure as Liechtenstein.
-




Meth bill resurfaces on Capitol Hill

2000-09-26 Thread Declan McCullagh


http://www.cluebot.com/article.pl?sid=00/09/22/0247244mode=thread

Methamphetamine Bill Resurfaces on Capitol Hill
posted by cicero on Saturday September 23, @04:43AM
from the accelerating-speed-bill dept.

Everyone thought the Methamphetamine Anti-Proliferation Act
had died this summer, but a source close to the issue tells us the
Senate has resurrected this nasty bit of legislation. Among other
things, the bill would ban links to drug-related websites. It didn't
quite get enough momentum on its own, so some of our more censorhappy
congresscritters attached it to the entirely unrelated Bankruptcy
Reform Act, part of which could allow police to conduct secret
searches of your home. That bill is currently before a conference
committee, which has only about a week left to finish it before
Congress adjourns for the year. You may want to contact your
legislators before it's too late.




Re: Chaumian cash redux

2000-09-22 Thread Declan McCullagh

At 15:52 9/22/2000 -0400, R. A. Hettinga forwarded:
At the EFF end-of-RSA ball in SF last night David Chaum stood up and
said a few enigmatic words [...]

Well, I wasn't there -- we still were recovering from our own east coast 
bash the day before... But here's some stuff (below) that might be interesting.

First, an article that appeared in the September 20, 2000 issue of American 
Banker. You'll recall that circa May 1999, Drew Hyatt and other folks 
bought the 16 patents from Digicash/Chaum and formed eCash Technologies. 
Excerpt from article:

Back when Digicash Inc. was trying to sell its eCash electronic payment
products to U.S. banks, there were few takers.

But now the products are being offered by eCash Technologies Inc., 
 which has
struck at least one noteworthy deal: Metavante Corp., the technology 
subsidiary
of Marshall  Ilsley Corp., has agreed to integrate the products into its
transaction processing system.

Metavante said it could not discuss the deal because it is in a "quiet
period" related to an initial public offering. The company, which provides 
data
processing services for 700 banks, will begin by offering its members eCash's
Monneta Debit software, which allows consumers to shop or send money online
without exposing their actual debit card numbers.
[...]
eCash Technologies is marketing the electronic payment products under the
name Monneta. The company is touting the Monneta suite -- which includes 
debit,
prepaid, business-to-business, and person-to-person payment products -- as an
anonymous way to make online payments. It uses a blind signature system, which
means that customers can send money to one another through e-mail, or buy from
any online merchant site, without revealing their identities.

Joseph Nocera, editor-at-large at Fortune, is a smart fellow and a good 
interviewer. I know him from when I was also at Time Inc. He wrote in the 
August 2000 issue of Money magazine:

But of course someone did think of it before. He was just too far ahead of
his time. When I spoke to Chaum recently, he professed to have "burned out"
trying to make Digicash work. He had sold its patents to another company 
and was
no longer paying close attention to the business.

He did tell me about a few of his more recent breakthroughs, however. 
 One was
called Digilock. "You take an ordinary key," he explained, "and put it in an
ordinary lock, and it looks it up in a database and says whether the key 
is okay
or not. It makes it possible for a person to have one key for everything." 
Yeah,
I know: It sounds a little far out. But then, I used to think e-cash sounded
pretty far out too.

-Declan




Re: Canada outlaws anonymous remailers (was Re: GigaLaw.com Daily News, September 15, 2000)

2000-09-15 Thread Declan McCullagh

I agree that ZKS took a risk by forming in a country that's more hostile to 
business, and has fewer constitutional safeguards, than the U.S.

But to respond to Bob's point: I'm not sure the Wired article 
(http://www.wired.com/news/print/0,1294,38734,00.html) we ran on our site 
implies that anything has changed. If anything, it says that Canadian 
courts are following the U.S. lead in establishing procedures to "uncloak" 
email addresses at ISPs.

That's a far cry from saying that businesses like ZKS without the apparent 
ability to "uncloak" email senders -- pardon the crass simplification -- 
will be necessarily affected.

-Declan


At 09:40 9/15/2000 -0700, Tim May wrote:

It's what many of us predicted (in writing, here) when it was announced 
that ZKS would locate in Canada because of (or influenced by) Canada's 
supposedly freeer policies on encryption. I wrote at the time, as others 
did, that Canada's supposedly "free export policy" was likely temporary 
and was more of a "show of independence" against what they perceived to be 
U.S. control and influence.

Fact is, as we wrote at the time, Canada lacks a solid constitution for 
protection of basic liberties. Sure, defenders will scurry to point out, 
Canada now _has_ a charter/constitution. But it has not been the bedrock 
that the U.S.C. has been, nor has it had a history of important tests.

Canada is fundamentally an ad hocracy.

As for the effect on ZKS, I haven't seen any actual uses of Freedom, or 
users of it, so I doubt there will be much effect at all.





Re: More Wired News CP Agitprop

2000-08-24 Thread Declan McCullagh

Yes, that is not exactly the article I would have written.

To my mind, a more interesting article is in how many areas the "child
porn" horeseman has been trotted out: Crypto, wiretaps, "Know Your
Customer" surveillance. There must be more I can't think of offhand.

-Declan





On Thu, Aug 24, 2000 at 09:21:09AM -0700, Eric Cordian wrote:
 Nonesense like this is one of the reasons I rarely read Wired News any
 more.  Looks like they let "Lynn Burke" get too close to a logged on
 terminal again, to beat her little sex abuse agenda drum.
 
 http://www.wired.com/news/politics/0,1283,38393,00.html
 
  The Mainstreaming of Kiddie Porn
 The Internet helped create a huge network of child pornography
 distribution. Lately, it's been getting easier and easier to
 find. 
 By Lynn Burke.
 
 What unmitigated crap.
 
 She claims that the word "twink" refers to young boys, instead of
 smooth-looking adult gay males, and uses this to try and twist the arrest
 of one individual into an allegation that egroups.com is openly running a
 publicly available child pornography ring with over 3,000 members.
 
 She claims that "babyrape" is a Usenet newsgroup.
 
 She quotes U.S. Customs, the head of the Vigilante group Cyber Angels, and
 various other law enforcement types.  She does not quote a single civil
 libertarian, nor expert on child porn hype.
 
 One of her "experts" is an author who blames what he calls the
 "mainstreaming" of child porn on teen idols like Britney Spears.
 
 Gosh - why don't the editorial dweebs at Wired News just hire Dr. Laura or
 Andrea Dworkin to write this crap for them.  It's certainly not news, and
 at least then they could claim they had someone famous working for them.
 
 The only thing that is being mainstreamed here is child porn hysteria and
 Wired's complete lack of anything resembling journalistic ethics. 
 
 I'm amazed Declan continues to humble himself by being associated with
 such an outfit. 
 
 -- 
 Eric Michael Cordian 0+
 O:.T:.O:. Mathematical Munitions Division
 "Do What Thou Wilt Shall Be The Whole Of The Law"
 




John Kenneth Galbraith to receive medal of freedom on Wednesday

2000-08-08 Thread Declan McCullagh


John Kenneth Galbraith.
Cambridge, Massachusetts
One of the leading economists of the 20th century and the author of more
than 30 books, Galbraith also held numerous positions during a
distinguished government career. During World War II, he was largely
responsible for the Office of Price Administration?s impressive record in
controlling inflation. An advisor to Presidents Kennedy and Johnson,
Galbraith also served as U.S. Ambassador to India during the Kennedy
Administration. He also was chairman of Americans for Democratic Action
from 1967-69 and taught economics at Harvard College for nearly 30 years.




Re: U.S. military poised to respond to attack on GOP convention

2000-08-05 Thread Declan McCullagh

Nope, I wrote "confidential" since it was, um, confidential. 
Put another way: They weren't handing it out to reporters who asked.

-Declan


On Sat, Aug 05, 2000 at 05:41:21AM -0600, Anonymous wrote:
 PHILADELPHIA -- The U.S. Army is prepared to respond to
 
 disruptions ranging from civil disobedience to nuclear
 
 explosions at the Republican National Convention, a
 
 confidential government document says.
 
 
 
 Confidential ? Is this the journalist's Newspeak ? Wired made you
 
 write that ? 
 
 
 
 Back to the subject - the Good News is that they are scared. One can
 
 exhibit overwhelming force superiority only so far. One city, one
 
 convention. Could they cover 10 cities ? I think that 4-5 simultaneous
 
 events like this is their limit.
 
 
 
 




MojoNation file sharing system plans to beat Napster, Gnutella

2000-07-30 Thread Declan McCullagh



http://www.wired.com/news/technology/0,1282,37892,00.html

Get Your Music Mojo Working
by Declan McCullagh ([EMAIL PROTECTED])

5:45 p.m. Jul. 29, 2000 PDT
LAS VEGAS -- A new file-sharing system could best rivals
like Napster and Gnutella through more anonymous and
efficient transfers.

The service has an innovative feature that rewards users
for uploading and distributing files: payment in a form of
digital currency called "Mojo."

"It's a cross between Napster and eBay," says Jim McCoy,
the 30-year-old CEO of Autonomous Zone Industries,
which created the open-source MojoNation software.

McCoy's goal is nothing if not ambitious: to create the first
file-sharing economy of agents, servers, and search
engines in which senders and receivers can agree on
prices for each transaction and use micropayments to get
paid.

The prospect of millions of users spending Mojo tokens on
pirated movies and songs is sure to draw the wrath of the
entertainment industry, which has sued to shut down
Napster and erase a DVD-descrambling program from the
Web.

Another probable early use is pornography copied from
other sites, and companies such as Penthouse's publisher
also have shown they're willing to take legal action.

Autonomous Zone says that since it -- unlike Napster --
does not keep a master index of files, its employees are
simply unable to remove references to illegal files stored
on MojoNation servers. "We are a bigger threat because
we can survive most attacks," McCoy says.

But the startup claims it wants to work with Hollywood
through a voluntary-payment-for-downloads feature that
the firm's programmers have dubbed "PayLars," a reference
to Metallica drummer and Napster foe Lars Ulrich.

"When the president of Sony comes to us, we'll say
Gnutella's never going to do anything for you," says the
Autonomous Zone programmer who goes by the name
Zooko Journeyman. "Fight them or die -- or join us and
prosper."

In an attempt to spread MojoNation quickly through the
hacker underground, Autonomous Zone plans to release
the beta version at the DefCon convention this weekend in
Las Vegas. Versions will be available on sourceforge.net
for Windows and Linux machines.

MojoNation's current stage of development is somewhere
between a working prototype and a polished final product.
It works, but a friendly interface is still being shaped, and
as of Friday, company programmers were still unearthing
some remaining bugs.

At least when its development is complete, MojoNation
should combine the ease of use and search capabilities of
Napster and Gnutella with the kind of distributed server
network that FreeNet uses. Files that are uploaded to a
Freenet server remain online after a user disconnects, but
Freenet does not support searching or micropayments.

But will MojoNation be compelling enough to make other
users switch? "It doesn't seem to buy anything over
Gnutella," says Jon Lasser, author of Think Unix. "It's not
clear to me who is served by this system."

The libertarian-leaning cypherpunks -- only about seven
so far -- who work at Autonomous Zone are pinning their
hopes on creating an emergent network of electronic
buyers, sellers, and service providers, all exchanging
tokens that might represent as little as one-thousandth of
a cent.

Another addition: A limited form of reputation-tracking, so
you can determine which service providers are the most
reliable. The first time you log on, you generate a public
and private key pair that the system uses to identify you.

"It is an ant colony of sorts -- tons of agents, each with
its own specialized goal," says McCoy, a former Yahoo
engineer who founded Autonomous Zone last summer and
is providing the seed capital.

By pinning even an infinestimal value on all transactions,
the company plans to discourage piggish folks who
download more than they contribute in return.

To earn Mojo tokens, users can sell their extra bandwidth
or disk space and act as servers, or create their own
service that others want to pay for. A successful system
would also likely include money exchangers who buy and
sell Mojo tokens in exchange for dollars.

Before a MojoNation user uploads a file, the client
software splits it into eight pieces using an algorithm akin
to that used in RAID hard disk arrays: Only four pieces are
necessary to reconstruct the entire file, and the sender
can try to use the network to cloak his or her identity.

### 




Re: FBI Requests File Removal

2000-07-21 Thread Declan McCullagh

(resent)

- Forwarded message from Declan McCullagh [EMAIL PROTECTED] -

From: Declan McCullagh [EMAIL PROTECTED]
Subject: Re: FBI Requests File Removal
To: "T. Bankson Roach" [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Date: Fri, 21 Jul 2000 17:19:00 -0500
X-URL: http://www.mccullagh.org/
User-Agent: Mutt/1.2.2i

The presumption should be toward publication, and only withhold
info if absolutely necessary.

There is no absolutely necessary reason to withhold their names.

In fact, there are good reasons to publish. For example, it may 
make them easier to contact by journalists. You need to think
this through.

I included names in my wired.com article on this today.

-Declan


On Fri, Jul 21, 2000 at 08:12:37AM -0700, T. Bankson Roach wrote:
 Let's think about this for a moment. Assume Carnivore is the deadliest
 threat to American freedom since the Clintons arrived in Washington.
 
 First, we know about Carnivore, or think we do. What earthly good is it
 to put the agent's names in the public domain? Unless you planned to do
 something cruel, evil or harmful to people "doing their job" it would
 serve no useful purpose. Contrary to the nonsense propounded at
 Nuremberg in the flush of victory at the end of WW2, I do not think it
 wise to hold underlings responsible for policy decisions made by people
 way up the food chain. The concepts of freedom, privacy, etc. is now
 open to public debate, and to my utter amazement, unlike the British, we
 are mostly giving privacy the benefit of the doubt. There are far too
 many in policy making positions who are ready to cast all our personal
 freedoms to the wolves to catch a few "terrorists" or drug dealers. I
 think American freedoms are worth more than that. In any event one of
 the profound changes that seems to be happening is that the cost to
 saving our liberties may be to a large extent lifted off the backs to
 youth serving in our armed forces, and placed on our own lives. This
 will really give people reason to care about what is happening.
 
 Tom Roach
 
 
 - Original Message -
 From: John Young [EMAIL PROTECTED]
 To: Steven Furlong [EMAIL PROTECTED]
 Cc: [EMAIL PROTECTED]
 Sent: Thursday, July 20, 2000 05:45 PM
 Subject: Re: FBI Requests File Removal
 
 
  Yes, it is contradictory that Cryptome will publish the
  PSIA names but not those of the FBI Special Agents.
 
  The senior Special Agent said at the end of the
  conversation that if his and the other agent's names
  were published "you are going to be in real trouble."
 
  Until that time both agents had been very polite. He
  then said he was going to take the matter up with the
  US Attorney and call again.
 
  So we're brooding on that threat, pondering the FBI
  names on this notepad, comparing this situation with
  that of the MI6 names and the MI5 names and the
  Iranian names and the PSIA names and the CIA
  names Cryptome has published. In none of the other
  instances was Cryptome threatened. And are
  wondering why the FBI carnivores deserve privacy
  we don't get from them and the world's surveillance
  agencies.
 
  More later on those names.
 
  Meanwhile, if curious send an inquiry to the FBI address
  on our e-mail: [EMAIL PROTECTED] Or telephone: 212-384-3155.
 

- End forwarded message -




Re: Tim May

2000-07-18 Thread Declan McCullagh

For shame! Analog is much higher-quality.

-Declan


On Sat, Jul 15, 2000 at 05:06:11PM -0400, [EMAIL PROTECTED] wrote:
 Perhaps investigative reporter Declan McCullagh
 will dig it up sometime, and post pictures
 taken with his Nikon 990. Those would be CoolPix.
 




Re: CDR: Re: Reno DoJ pressures journalist to nail hackers

2000-07-17 Thread Declan McCullagh

(resent to list)
- Forwarded message from Declan McCullagh [EMAIL PROTECTED] -

From: Declan McCullagh [EMAIL PROTECTED]
Subject: Re: CDR: Re: Reno DoJ pressures journalist to nail hackers
To: Steven Furlong [EMAIL PROTECTED]
Date: Mon, 17 Jul 2000 22:29:02 -0500
X-URL: http://www.mccullagh.org/
User-Agent: Mutt/1.2.2i

Right. Letting the government decide who is "legitimate" or not is a
dangerous precedent.

Just FYI, journalist shield laws didn't help me when the Justice
Department subpoenaed me last year totestify in the second cypherpunk
trial.

-Declan


On Mon, Jul 17, 2000 at 06:53:58PM -0400, Steven Furlong wrote:
  In fact, I interpret the First to mean that government may _not_ 
  decide who's a "legitimate reporter" and who's not, anymore than the 
  First would allow government to decide which religions are "valid" 
  and which are not. If Declan is covered by a shield law and cannot be 
  compelled to reveal his sources, then Tim May and Alfred E. Newman 
  are also reporters and are likewise protected.
 
 I agree, but it seems the courts do not. The IRS regularly decides
 who is a "real" pastor. The right to peaceably assemble is subject to
 permit fees which are at times set so high the organization can't pay
 them (see Rudy Guilliani's actions), or the only permitted location
 for a protest is so far from the action that it might as well not be
 held (an anti-internationalization protest, or something, in Albany NY
 a few months ago).
 
 
 -- 
 Steve Furlong, Computer Condottiere Have GNU, will travel
518-374-4720 [EMAIL PROTECTED]
 

- End forwarded message -




Re: An idea to limit the spam ... CPUNK

2000-07-14 Thread Declan McCullagh

Here we go again. Sigh.

You have no "right" to use another person's personal property -- their
server -- as you see fit. If that mail server only approves messages
with CP: in the Subject: line, or only with From: lines from
left-handed lesbian Botswanans, that is the owner's choice. It
certainly isn't censorship: If you don't like it, start your own list. 

In any case, it is not interfering with your "right" to use their
machine as you see fit, since you have no such right to begin with.

-Declan



On Fri, Jul 14, 2000 at 06:26:29AM -0500, Jim Choate wrote:
 
 On Thu, 13 Jul 2000, Declan McCullagh wrote:
 
 Automated filtering is censorship.
 We don't want censorship.
  
  This is nonsense. Censorship is performed by government entities.
 
 Bullshit. Cencorship is performed by ANY entity which interfres with the
 expression of another right.




Re: tapping (was Re: 'Carnivore' Eats Your Privacy)

2000-07-14 Thread Declan McCullagh

David, I didn't say ACLU and EPIC had no effect. You're right to say
they do on some issues. Heck, I write about them frequently.

But *primarily* (as I said below), the battles should be fought with
technology. Besides, ACLU and EPIC are not free-market groups; ACLU
supports the right to welfare and EPIC would love to create a federal
privacy bureaucracy. So while they do good things, it's a mixed bag.

-Declan


On Fri, Jul 14, 2000 at 11:53:16AM -0400, David Honig wrote:
 At 12:26 AM 7/14/00 -0400, Declan McCullagh wrote:
 (resend)
 
 Michael: Have you forgotten what list you're on?
 
 Unlawful government eavesdropping should not primarily be fought in
 Washington. It should be fought with technology. The ACLU and EPIC are
 good for defensive battles only, and when it comes to restraining
 government surveillance, they lose more than they win.
 
 -Declan
 
 I realize you're being facetious but the law holds back that fraction
 of government that plays by the public laws.  Ergo its not entirely futile.
 
 ACLU et al. battles are good publicity.




Re: Source of Kiddie Porn?

2000-07-13 Thread Declan McCullagh

I've written about a few cases. Search the archives.

The law covers images of "minors" or those who appear to be minors.
Lascivious exhibition of the genitals is required, and a dirty mind
helps. No exceptions, unless you're a fed on a sting operation.

-Declan


On Sun, Jul 09, 2000 at 11:23:17PM -0400, Anonymous Sender wrote:
 Perhaps one of the helpful lurking LEOs (Hi Jeff!) can answer a question
 or two:
 
 Is the age of a person relevant when deciding whether or not to string
 them up for possessing naughty pictures of young hard bodies?  What about
 the source of said porn?
 
 Examples:  
 
 - One of the numerous 13-yr-old girls on the list decides to document the
 growth of her pregnant high school friend's body with a Polaroid for a
 science fair project.
 
 - Junior G-Man likes the size of his manhood and snaps some pictures in
 front of his Barbie digital camera while whacking off.
 
 Is it illegal for a "child" to have self-generated porn?  Can they trade
 their porn around among their minor friends?  How about when they turn 18?
 Can a person publish their memoirs, complete with a 'Chapter 4 -- My
 Prepubescent Days' and not fear Federal agents burning down their house?
 




Re: ZKS: how EXACTLY does this protect privacy?

2000-07-13 Thread Declan McCullagh



On Wed, Jul 12, 2000 at 07:12:12PM -0400, Robert Guerra wrote:

 
 That would be Lance M. Cottrell [EMAIL PROTECTED]. I had a chance to 
 meet him and speak with him at CFP2000. Given the work and services 
 his service provides I'd thought more people would know him...

Lance is a swell guy, and a good photographic subject:
http://www.mccullagh.org/image/4/lance-cottrell.html

-Declan




UK immigration authorities take first action against HavenCo

2000-07-13 Thread Declan McCullagh


Date: Fri, 14 Jul 2000 00:42:39 -0400
To: [EMAIL PROTECTED]
From: Declan McCullagh [EMAIL PROTECTED]
Subject: UK immigration authorities take first action against HavenCo

[Part of the allure of HavenCo is that it is based on Sealand, an 
ostensibly independent nation. But that concept is based on the thinnest 
of legal foundations: A 1968 court decision that said Sealand was outside 
of Britain's territorial waters: 
http://www.wired.com/news/politics/0,1283,36756,00.html Since then London 
has extended its territorial claim, which means Sealand -- recognized, I 
believe, by no country in the world -- is no more independent than a 
rowboat anchored 10 feet out in the Thames. --Declan]


http://www.telegraph.co.uk:80/et?ac=002549632124328rtmo=wAMlAsebatmo=hMbepg=/et/00/6/22/ecnseal22.html

 Sealand runs foul of UK immigration
 By David Cohen

 HAVENCO, the controversial data haven based six miles off the 
 coast of Essex, will host its first website next week, despite 
 intervention by the government.

 Immigration officials at Heathrow turned away a HavenCo engineer, 
 Andrew Marsh, who arrived from the United States last Friday, but the 
 company insists that he will start work tomorrow morning.

 HavenCo said the company's schedule was not seriously affected by 
 the setback. "Andrew will start work in Sealand on Friday morning, but 
 I'd rather not discuss how he will get here," a spokesman said.

 Mr Marsh, a 25-year-old computer systems engineer employed by 
 HavenCo, was stopped and questioned by immigration officers at the 
 airport. He announced that he was going to work on Sealand, the offshore 
 Second World War fortress, which claims to be independent of the UK.

 Mr Marsh assumed that he would not need a British work permit to 
 go to Sealand, but a spokesman for the Home Office said: "We consider 
 Sealand to be part of the UK and therefore anyone working there who is 
 not a citizen of a European Union country would require a work permit."

[...]




  1   2   >