Re: Trouble at HavenCo?

2003-08-05 Thread Declan McCullagh
Actually the best link for my stories is the News.com site:
http://news.com.com/2100-1028-5059676.html

They include relevant links; they include better formatting; they include
photographs; they are updated faster. News.com syndicates may not include
those features.

-Declan


On Tue, Aug 05, 2003 at 11:03:25AM -0400, Trei, Peter wrote:
 Sunder sent me a better link...
 
 http://www.businessweek.com/technology/cnet/stories/5059676.htm
 
 Peter
 
  --
  From:   Trei, Peter
  Sent:   Tuesday, August 05, 2003 10:14 AM
  To: '[EMAIL PROTECTED]'
  Subject:Trouble at HavenCo?
  
  http://rss.com.com/2100-1028_35059676.html?type=ptpart=rsstag=feedsubj=
  ne
  ws
  
  
  Has 'haven' for questionable sites sunk?
  
  By Declan McCullagh
  Staff Writer, CNET News.com
  August 4, 2003, 1:38 PM PT
  
  LAS VEGAS--A widely publicized 
  project to transform a platform in 
  the English Channel into a safe 
  haven for controversial Web 
  businesses has failed due to 
  political, technical and management 
  problems, one of the company's 
  founders said.
  
  Ryan Lackey, former chief technology 
  officer of HavenCo, said on Sunday 
  afternoon that he left the project 
  because his business partners 
  had become nervous about 
  hosting objectionable material 
  and were leading the company 
  toward financial ruin, with only 
  about six customers remaining. 



Re: old encryption paper

2003-07-22 Thread Declan McCullagh
On Sat, Jul 19, 2003 at 04:33:37PM -0400, [EMAIL PROTECTED] wrote:
 IMHO, it is exactly this kind of commentary which scuttled an attack
 on free encryption software in the wake of the attack.  Moreover, the
 monolith authentication schemes were also laid to rest or driven

Well, no. This kind of commentary made folks on mailing lists like
these feel warm and fuzzy and made some other tech types realize what
was at stake. But Sen. Judd Gregg's proposal failed because of lack of
support from his colleagues and opposition from well-connected
industry lobbyists, not people writing about GNU-Darwin (probably
not one congresscritter knows what that means anyway, or cares).

-Declan



Secret nanotech spy agency meeting

2003-07-07 Thread Declan McCullagh
today...

TECHNOLOGY
National Academies
Meeting of the Committee on Nanotechnology for the Intelligence Community.
Closed session summary posted after the meeting
Location: Keck Center of the National Academies, 500
5th St., NW, Washington, D.C..
Contact: James Killian, 202-334-1758; http://www.national-academies.org


Denver Post article on mattd/proffr/AP/Jim Bell/cypherpunks

2003-07-07 Thread Declan McCullagh
http://www.denverpost.com/Stories/0,1413,36~53~1497971,00.html

..

The development of digital money, and encryption software restricting 
government's ability to monitor Internet activity, are common goals among 
the online anarchists and libertarians known as cypherpunks.

The ultimate purpose of Assassination Politics is to deter people from 
working for government agencies, corporate media outlets or institutions 
beholden to the violence of the state, Taylor said.

Professor Rat also has threatened a University of Ottawa law professor, a 
columnist for The Boston Globe and a Cincinnati police officer.

..

The Post is withholding the names of the subjects of posts by Professor Rat 
to avoid promoting any specific threats.

..

Eugene Volokh, a law professor at the University of California-Los Angeles 
and a First Amendment specialist, said the threats were probably criminal, 
given Taylor's description of the purpose of Assassination Politics.

..



Re: Is Hatch a Mormon or a crypto Satanist?

2003-07-02 Thread Declan McCullagh
On Sat, Jun 21, 2003 at 11:24:30AM -0700, Bill Stewart wrote:
 I've also found it was less trouble to get a beer and _dinner_
 late at night than in much of California, though perhaps they
 have rules requiring bars to also be restaurants.

I was in Salt Lake City just after the Olympics (and during the
Paralympics) last year and, like you, didn't have any problem getting
a beer with dinner. But late at night? Everything seemed to close
around 10-11 pm.

See:
http://www.mccullagh.org/theme/winter-paralympics-2002.html

-Declan



biochemwomdterror in dc

2001-05-02 Thread Declan McCullagh

  FOR IMMEDIATE RELEASE
  May 1, 2001
  For More Information Contact:
  Andrea Andrews (202) 224-6518

  WASHINGTON, DC - U.S. Senator Richard C. Shelby (R-AL), Chairman of
  the Senate Intelligence Committee, will hold a press conference
  Wednesday, May 2 to discuss domestic terrorism and to announce
  hearings to investigate domestic terrorism.

  Senator Shelby will be joined by Senator Judd Gregg (Chairman of the
  Appropriations Subcommittee on Commerce, Justice State and the
  Judiciary) and Senator Pat Roberts (Chairman of the Armed Services
  Subcommittee on Emerging Threats and Capabilities).

  The press conference will highlight the Senate's series of hearings to
  examine the efforts of more than forty different federal agencies with
  responsibility for combating domestic terrorism.  Armed Services
  Chairman, Senator John Warner, and Senator Ted Stevens, Chairman of
  the Senate Appropriations Committee, will also hold hearings.

   DOMESTIC TERRORISM PRESS CONFERENCE
   With Senators Shelby, Gregg and Roberts 2pm - Wednesday
   Senate Radio TV Gallery




Re: layered deception

2001-04-30 Thread Declan McCullagh

On Sun, Apr 29, 2001 at 11:24:09PM -0700, Steve Schear wrote:
 What if the sysadmin is intentionally located in an offshore location so 
 that they cannot be kept from notifying all users of the logging order?

Then we pass a cybercrime treaty to require them to follow U.S. laws.

Law enforcement has a long time horizon.

-Declan




Re: layered deception

2001-04-30 Thread Declan McCullagh

Steve,
Even assuming that what you say is true, and I suspect it is,
you'd be relying on protections enshrined in the law. The purpose
of this treaty, of course, is to change the law. :)

-Declan


On Mon, Apr 30, 2001 at 10:07:33AM -0700, Steve Schear wrote:
 At 10:56 AM 4/30/2001 -0400, Declan McCullagh wrote:
 
 On Sun, Apr 29, 2001 at 11:24:09PM -0700, Steve Schear wrote:
   What if the sysadmin is intentionally located in an offshore location so
   that they cannot be kept from notifying all users of the logging order?
 
 Then we pass a cybercrime treaty to require them to follow U.S. laws.
 
 Ahhh, but who is the them?  My understanding is that under state and 
 Federal law only executives and those with signature authority can be held 
 criminally responsible for their actions.  U.S. corporations can be created 
 and administered solely by non-residents (only an in-state legal service 
 point is generally required.).  Nevada corporations can be held in bearer 
 form shielding beneficial owners.
 
 steve




Re: Technological Solution

2001-04-29 Thread Declan McCullagh

On Sat, Apr 28, 2001 at 08:49:43PM -0700, Tim May wrote:
 Well, better than nothing. (Like I said in another article tonight, 
 the best is often the enemy of the good.) We knew even in 1992 that 
 remailers were a pale imitation of the DC Nets discussed a few 
 years earlier by Chaum and analyzed by others as well. But there were 
 no DC Nets in 1992, and so remailers were nonetheless a step above 
 what existed then (basically, the Kremvax/Kleinpaste/Julf approach).

Better than nothing is understating the case a bit, I think. The
info hiding workshop was a very interesting one that was almost
entirely cypherpunk-relevant. It seems like researchers are choosing
to present less-polished work here rather than waiting in line at
eurocrypt, for instance, which makes it more timely, probably.

The program's at:
http://www.cert.org/IHW2001/

There's always a tension between the corporate-watermarking folks and
the anon-privacy folks at these types of events, and this year was no
exception. But it hasn't split into two yet, and seems set to stay
intact for at least one more round in 18 months.

-Declan




Re: Airlines IDs [was RE: Amtrak The War On Drugs]

2001-04-28 Thread Declan McCullagh

I believe at least one FOIA request has been pending for the exact
FAA rule. I wrote about this a few years ago and asked the FAA to
clarify its position, and I never heard anything authoritative.

In a recent article, I pointed out that the trend is shifting: You
can now use kiosk check-in in some airlines and avoid showing photo ID.

-Declan

On Wed, Apr 25, 2001 at 12:12:25PM -0400, Trei, Peter wrote:
 1. It is not a regulatory requirement for an airline 
 passenger  in the US to produce identification.
 
 2. In fact, it's a violation of the airline's common carrier 
 status for them to do so - they must admit anyone who 
 shows up with a valid ticket. The ticket is a bearer 
 instrument.
 
 3. Regardless of the legalities, US airlines will usually
 request ID. If you refuse, and stand your ground, and can 
 cite the appropriate  common carrier regs, and show that 
 they can't cite any regulatory requirement, they in fact 
 WILL let you fly without ID. However, doing so involves 
 moving far up beyond the counter-droids to superdupervisors,
 calls to corporate legal counsel, and unfriendly attention 
 from airport security. While you would win in the end, 
 you will almost certainly have missed your plane.
 
 4. The reason airlines do this has nothing to do with 
 security, and everything to do with extracting the max 
 from your wallet 
 
 Before these regs existed, and citizen units rightfully 
 refused to let themselves be pushed, filed, stamped, 
 indexed, briefed, debriefed, or numbered to the extent 
 they do today, the bearer instrument status of the 
 tickets allowed people who traveled often to save money.
 
 It worked like this:
 
 In the US, unscheduled, immediate travel ticket prices are
 extremely expensive. On American Airlines, an unrestricted
 Boston to San Francisco coach return ticket is over $2400
 if I leave today and return tommorrow. If I book a month
 ahead and stay over the weekend, it's a tad over $400, a
 $2000 dollar savings.
 
 Companies with lots of predictable travel (for example, 
 one with offices near Boston and San Francisco) would 
 buy  'John Doe' tickets a month ahead, scheduled for
 over-weekend stays. A traveller would go to the 
 travel office, and pick up an outbound and return
 ticket (from different original trips) with dates and
 times which suited him, and execute his business
 trip at a fraction of the cost of it would have if
 he'd bought his ticket in the naive manner.
 
 By hassling travellers who try to use tickets with
 someone elses name, and lying that it is illegal
 to do so, airlines have greatly cut down on this
 cost saving strategy.
 
 If you're going to make more than one business
 trip between the same cities on predictable dates
 in the next year, you can still execute this strategy
 on a personal level, but it requires planning.
 
 So don't believe the lies of the airline spinmeisters.
 The only security they are enhancing is that of
 their bottom line.
 
 Peter Trei




Re: Technological Solution

2001-04-28 Thread Declan McCullagh

On Sat, Apr 28, 2001 at 06:32:08PM -0700, Tim May wrote:
 None of the non-cryptographic methods are very resistant to legal, 
 technical, sniffing, and black bag attacks. And only multiply-chained 
 encrypted-at-each-stage messages, a la remailers, are adequate for 
 high-value messages.

If only they worked. There was an interesting paper presented here
in Pittsburgh at the info hiding workshop this week that suggested 
a way to strengthen the somewhat-suckful mixmaster network. (Of
course, the network will never be even somewhat reliable until
sufficient incentive -- ie digital cash or somesuch -- exists for
running one.) At least one active cypherpunk was involved in writing
that paper, and I cited it in my Wired article this week.

-Declan




biochemwomd terror again, today

2001-04-25 Thread Declan McCullagh

SENATE APPROPRIATIONS COMMITTEE Chemical Weapons Defense Subcommittee 
hearing on Chemical Demilitarization. Witnesses: Joseph Westphal, acting 
secretary of the Army; James Bacon, program manager, Chemical 
Demilitarization; Michael Parker, program manager, Assembled Chemical 
Weapons Assessment; Russell Salter, director, Chemical and Radiological 
Preparedness Division, FEMA; Craig Williams, director, Chemical Weapons 
Working Group; Rufus Kinney, spokesperson, Families Concerned About Nerve 
Gas Incineration; Brenda Lindell, Families Concerned About Nerve Gas 
Incineration Location: 192 Dirksen Senate Office Building. 10 a.m. Contact: 
202-224-3471 http://www.senate.gov/~appropriations




even more biochemwomdterror

2001-04-25 Thread Declan McCullagh

Experts Highlight Shortcomings Of National Terrorism Preparedness  
Response Capabilities

7   Date: Tue, 24 Apr 2001 18:01:41 -0400
7   Subject: 4/24/01 Experts Highlight Shortcomings Of National 
Terrorism Preparedness  Response Capabilities
7   From: Hansen, Steve [EMAIL PROTECTED]

NEWS
U.S. House Committee on Transportation and Infrastructure
U.S. Rep. Don Young, Chairman
Contact:  Steve Hansen (Communications Director)  (202) 225-7749
Justin Harclerode (Communications Assistant)  (202) 226-8767
To:  National Desk
Date:  April 24, 2001

Experts Highlight Shortcomings
Of National Terrorism Preparedness  Response Capabilities

Washington, D.C. - Members of Congress and experts in counterterrorism
testified today at a Congressional hearing about the federal government's
uncoordinated and wasteful organization to combat domestic terrorism.

 Three legislative proposals to address the nation's fragmented
terrorism preparedness and response programs were examined at today's joint
hearing conducted by two U.S. House of Representatives Subcommittees:  1)
the Transportation and Infrastructure Subcommittee on Economic Development,
Public Buildings and Emergency Management, and 2) the Government Reform
Subcommittee on National Security, Veterans Affairs and International
Relations.

Government Needs To Better Coordinate Domestic Terrorism Efforts
The question isn't whether the many programs we have to combat domestic
terrorism are working, but rather if they are working in a coordinated and
effective way rather than independently of each other, said U.S. Rep. Steve
LaTourette (R-OH), the Chairman of the Public Buildings, Economic
Development and Emergency Management Subcommittee. It is troubling that we
don't have one person within the federal government who can tell us who is
doing what to combat domestic terrorism, or if we're duplicating efforts
left and right.
I hope that by examining this issue closely at this hearing we will be able
to zero in on what the federal government's role should be and focus on a
plan that will guarantee the safety of our citizens while also ensuring that
taxpayers' dollars are wisely spent, LaTourette said.

As A Government, We Are Not Prepared
Almost a decade after the dawn of a harsh new strategic reality -
international terrorism aimed at our military and civilian personnel, abroad
and here at home - these bills address today's equally stark realities: As a
nation, we are not ready.  As a government, we are not prepared, said U.S.
Rep. Chris Shays (R-CT), the Chairman of the National Security, Veterans
Affairs and International Relations Subcommittee.

Speaking on behalf of legislation that each of them introduced this year in
the House, U.S. Reps. Wayne Gilchrest (R-MD), Mac Thornberry (R-TX), and Ike
Skelton (D-MO) agreed that Congressional action is needed to focus the
efforts of the more than 40 federal agencies and departments that operate
separate terrorism preparedness programs.
Witnesses representing national security and terrorism preparedness panels
concurred, citing different problems that plague preparedness efforts,
including a lack of overall strategy, a lack of a high ranking coordinating
authority or office, a means of evaluating program effectiveness, and an
overlapping of services that leads to inefficiency and waste.
Witnesses also agreed none of the three bills examined at the hearing was a
complete solution to the problem, but that each makes a significant
contribution to a final solution.  The bills would do the following:

Preparedness Against Domestic Terrorism Act of 2001 (H.R. 525)
Introduced by Rep. Wayne Gilchrest, this bill would create a Presidential
Council within the Executive Office of the President to oversee and
coordinate the preparedness efforts of more than 40 departments and
agencies.  The bill provides the Council with oversight of federal programs
and the authority to make recommendations to OMB regarding budget
allocations for each federal terrorism preparedness program, based on a
comprehensive national strategy.  A similar measure (H.R. 4210 introduced by
former Rep. Tillie Fowler) received bi-partisan support last year and passed
the House unanimously under suspension of the rules.

National Homeland Security Agency Act (H.R. 1158)
Introduced by Rep. Mac Thornberry, this bill would create the National
Homeland Security Agency (NHSA) by renaming the Federal Emergency Management
Agency (FEMA) and merging the Coast Guard, the Customs Service, and the
Border Patrol into the new agency.  This new agency would be responsible for
defending the homeland, and would continue to be the principal response
agency for natural disasters.  This bill would give FEMA, as the NHSA, the
primary responsibility for coordination, response, and prevention for
terrorist attacks and other manmade disasters.  FEMA would also serve as the
principal point of contact for state and local governments.

Homeland Security Strategy 

Re: Right to anon. speech online upheld in US district court

2001-04-24 Thread Declan McCullagh

On Tue, Apr 24, 2001 at 03:08:19PM -0500, Aimee Farr wrote:
 This caught me a nudder fish. I'm going into my reinforced steel shark cage,
 'cause this tells Mr. Big Fish could be behind him (Tim is like those
 three sharks with memory in that Deep Blue Sea movie.)

Aimee, I like you, I really do. I know there is a lawyer with your
name and location since I spent a moment checking on Martindale.com;
I'm going to take a gamble and say that you are who you say you
are. You seem smart, somewhat tech-clueful, and even a potential
cypherpunk.

That said, you're now posting mainly peculiar and strange messages.
You're not doing this with a sincere desire to engage in dialogue, but
with the stated purpose of baiting Tim, John, and others. Now, John
may enjoy the repartee, but many cypherpunkly types would rather
engage with someone who's doing more than baiting us and watching the
sharks fight over the chum.

-Declan




Re: The Crypto State

2001-04-24 Thread Declan McCullagh

Yep. Brands' book is out from MIT Press, so it's even accessible.
(Well, relatively accessible; I keep planning on finishing it RSN.)

For someone to ask on cypherpunks for pointers to basic crypto
concepts and ignoring reading lists is like someone posting to a
political mailing list and asking how senators are elected, and
refusing to read the Constitution. (I'm not saying this current
case is the same, but it has similarities.)

-Declan


On Tue, Apr 24, 2001 at 06:25:23PM -0700, Tim May wrote:
 Read Schneier. Read the oft-cited (certainly cited many times in the 
 years since you claim to have been here, i.e., since when Detweiler 
 was here) Proceedings of the Crypto Conferences (Springer-Verlag, 
 every year)/




Re: Amtrak The War On Drugs

2001-04-24 Thread Declan McCullagh

No argument here. I recall a lot of this was in the '96 legislative
session, especially the summer. I have some articles on the topic
archived at www.eff.org/pub/Publications/Declan_McCullagh

-Declan

On Wed, Apr 25, 2001 at 09:34:44AM +1000, Ralph Wallis wrote:
 On Tuesday, 24 Apr 2001 at 16:13, Tim May [EMAIL PROTECTED] wrote:
  However, it used to be SOP to buy train tickets at the ticket 
  window--for cash and with no I.D. or phone numbers or SS numbers or 
  forehead marks.
  
  It looks like the temporary measures to combat the TWA 800 
  bombing sorts of events, even though TWA 800 almost certainly wasn't 
  a bombing, are now spreading to the trains.
 
 I just read Database Nation, which notes that this was an immediate
 result of TWA 800 and the Atlanta Olympic bombing. (Along with similar
 policies for air travel.)
 
 So it's not a sign of spreading. Since Atlanta was 5 years ago,
 it's not a temporary measure either.




Re: Amtrak The War On Drugs

2001-04-24 Thread Declan McCullagh

On Tue, Apr 24, 2001 at 06:43:20PM -0700, Tim May wrote:
  From our perspective, it will show the foolishness of government 
 overreaction (ordering a million animals to be slaughtered and burned 
 with tires and old pressure-treated lumber railroad ties).

Good summary. Here's an ENS report:

http://ens.lycos.com/ens/apr2001/2001L-04-19-12.html
UK's Foot and Mouth Cull Raises Toxic Dilemma
2001-04-19 23:51:15 
UK's Foot and Mouth Cull Raises Toxic Dilemma LONDON, United Kingdom,
April 19, 2001 (ENS) - The foot and mouth outbreak is under control,
according to the United Kingdom government's chief scientist, but the
logistical challenge of quickly disposing of more than a million
slaughtered animals is raising new fears over dioxins and groundwater
contamination...

Yes, top-down government regulation is clearly the best way to handle
environmental crises, as the Brits showed so very well.

-Declan




Re: Fake Child Porn

2001-04-24 Thread Declan McCullagh

On Tue, Apr 24, 2001 at 09:27:10PM -0700, Tim May wrote:
 If this becomes law, it will be a case of pure thoughtcrime. No victims, 
 no aggression against another person, no actual people. Just 
 thoughtcrime.

It is law, actually. Passed in 1996, with the Bruce Taylors of the
world testifying in favor of it before Senate Judiciary. Hatch
and Feinstein were chief sponsors.

Five appeals courts have ruled on it. All but one (the Ninth Circuit)
said it was constitutional.

See:
http://216.110.42.179/docs/nlc-frc.amicus.042301.html

http://law2.house.gov/uscode-cgi/fastweb.exe?getdoc+uscview+t17t20+965+0++%28%29%20%20AND%20%28%2818%29%20ADJ%20USC%29%3ACITE%20AND%20%28USC%20w%2F10%20%282256%29%29%3ACITE%20%20%20%20%20%20%20%20%20

-Declan




Congress in action

2001-04-23 Thread Declan McCullagh

FOR IMMEDIATE RELEASE   Contact: 
Pia Pialorsi
Monday, April 23, 
2001  202-224-2670

107-38

Hearing on Booster Seats Set for Tuesday, April 24

The Consumer Subcommittee hearing Booster Seats and the Forgotten Child: 
Closing a Safety Gap is scheduled for Tuesday, April 24, at 10:00 a.m. in 
room 253 of the Russell Senate Office Building.  Senator Peter Fitzgerald 
(R-IL), Chairman of the Subcommittee, will preside.  Members will examine 
what measures may be needed to better protect children as they graduate 
from child safety seats to adult seatbelts.

Following is the witness list (not necessarily in order of appearance):

Panel I
Mr. Robert Shelton  Executive Director, National 
Highway Safety Administration
Ms. Elaine WeinsteinActing Director, Office of Safety 
Recommendations and Accomplishments, National Transportation Safety Board
Ms. Autumn Alexander Skeen  Child Passenger Safety Advocate
Dr. Flaura Winston  Assistant Professor of Pediatrics 
at the Children's Hospital of Philadelphia and the University of 
Pennsylvania School of Medicine
Dr. Kyran Quinlan   Department of Pediatrics, 
University of Chicago
Ms. Judith Lee StonePresident, Advocates for Highway 
and Auto Safety

Panel II
Ms. Heather PaulExecutive Director, National SAFE 
KIDS Campaign
Dr. Adrian K. Lund  Chief Operating Officer, Insurance 
Institute for Highway Safety
Mr. James Vondale   Director, Automotive Safety Office, 
Ford Motor Company
Mr. Tom Bologa  President, Britax Child Safety, Inc.

# # #




SecureMedia press release on EncryptoniteTM Encryption Engine

2001-04-23 Thread Declan McCullagh

FOR IMMEDIATE RELEASE


Contact:
Robert Mendes da Costa  
SecureMedia 
(415) 345-7720
[EMAIL PROTECTED]



SecureMedia announces IP Broadband Media Security
for MPEG


SecureMedia Develops Security Reference Design to Protect MPEG Streams

on Digital Set Top Boxes

LAS VEGAS, NV - April 23, 2001 - SecureMedia, the leader in IP Broadband
Media Security, today announced it has developed a revolutionary new security
system that protects broadcast-quality MPEG-2 and MPEG-4 media streams
delivered to digital set top boxes over IP networks.  Using its patented
EncryptoniteTM Encryption Engine and breakthrough Indexed EncryptionTM
technology, the new security system dramatically increases protection of
MPEG streams for Video-on-Demand applications, while greatly simplifying
key management, reducing bandwidth requirements, and ensuring the 
highest-quality
user experience.  At the NAB2001 show in Las Vegas this week, SecureMedia
will unveil this system including a new IP broadband security reference
design for digital set top boxes based on Equator Technologies' MAP CA
reference design.

The IP broadband market requires a new class of security solutions to
meet the high-bandwidth requirements, end-to-end security needs, scalability
and quality consumer experience required for new Internet media services,
such as Video-on-Demand, said Jack Oswald, CEO of SecureMedia.  By applying
our Encryptonite Engine and Indexed Encryption technology to MPEG-2 and
MPEG-4, we're able to provide the level of security and performance service
providers and network operators need to license and distribute top-quality
entertainment.

Encryptonite is the only encryption technology designed specifically for
IP broadband media.  SecureMedia's revolutionary Indexed Encryption technology
encrypts each MPEG video frame uniquely with a different key for the highest
security.  The system is able to intelligently derive packet decryption
keys in the client decoder without having to transmit hundreds or thousands
of packet keys per stream to the decoder.  Without compromising security,
bandwidth requirements for key delivery are greatly minimized, as are the
key processing requirements at both the client and server, which translate
to critical cost savings.  The process also contributes to a high-quality
user experience because the Indexed Encryption technology is immune to
packet loss and corruption often encountered in IP networks.  In addition,
it supports DVD-style trick play for the end user (i.e., fast forward,
seek, rewind).

Encryptonite represents an engineering breakthrough, combining well-respected,
public key cryptographic mathematics with common symmetric encryption 
algorithms
to produce a very strong, extremely fast, highly scalable and renewable
encryption system.  Encryptonite encrypts only the MPEG data payload, leaving
the control data in the clear so that on-demand, rich media can be safely
stored across distributed networks and can either be streamed or downloaded
to consumers.

SecureMedia has built an impressive list of customers, including 
RealNetworks.,
who has integrated Encryptonite technology as a standard component of their
RealSystem iQ.  Other customers, including TSBN, Vesta Broadband, DivX
Networks, InvisiMail, and MediBridge, make SecureMedia the leading supplier
of IP broadband media security with more than 1 million users worldwide.

SecureMedia is completely committed to MPEG-2 and MPEG-4 and we are actively
involved in the ISMA group's effort to standardize implementations of MPEG-4
over IP networks, said Oswald.  Within the ISMA, security is considered
a high priority and will be a requirement with initial MPEG-4 deployments
because the content will be of higher quality and greater value.

About SecureMedia
SecureMedia (http://www.SecureMedia.com) is the leading provider of IP
Broadband Media Security.  The company's patented media encryption 
technologies
enable a complete end-to-end security system that protects broadband media
from the point of origination to the point of consumption.  SecureMedia's
customers represent industry leaders such as RealNetworks (NASDAQ: RNWK),
where the company's technology provides the security for RealSystem iQ,
as well as Oak Technology (NASDAQ: OAKT), King Biscuit Entertainment Group,
InvisiMail Ltd. and Communicado/Satlink.  SecureMedia is headquartered
in San Francisco, CA, and has offices in Boston, MA and Auckland, NZ.
Investors include Sony, Macrovision, Trans Cosmos, CB (Berkman) Capital
LLP, and Bayview Investors, Ltd., an affiliate of BancBoston Robertson
Stephens.

# # #

RealNetworks, RealSystem, RealPlayer, RealAudio and RealVideo are registered
trademarks of RealNetworks, Inc.




Antiporn groups tell Supremes that morphed child porn law is OK

2001-04-23 Thread Declan McCullagh

A collection of anti-porn groups filed amicus briefs today before the U.S. 
Supreme Court arguing that the so-called morphed child porn is 
constitutional.

Amicus brief from the National Law Center for Children and Families, the 
National Coalition for the Protection of Children and Families and the 
Family Research Council:
http://www.politechbot.com/docs/nlc-frc.amicus.042301.html

Morality in Media amicus brief:
http://www.politechbot.com/docs/morality.amicus.042301.html

Text of the 1996 morphed child porn law (also called the Child Pornography 
Prevention Act):
http://www.politechbot.com/docs/cppa.text.html

Background (see wired.com for coverage tomorrow):
http://www.politechbot.com/cgi-bin/politech.cgi?name=morphed

-Declan

**

From: Bruce Taylor [EMAIL PROTECTED]
To: Declan McCullagh [EMAIL PROTECTED]
Subject: FW: Our amici brief in Supreme Court in child porn case
Date: Mon, 23 Apr 2001 18:18:12 -0400

Attached is the Brief Amici Curiae of the National Law Center for Children
and Families, the National Coalition for the Protection of Children 
Families, and the Family Research Council, in Support of Petitioners (the
Attorney General, DOJ, et al.), which was filed with the Supreme Court today
in Ashcroft v. Free Speech Coalition, the computerized child porn case
involving 18 USC 2252A.
The Ninth Circuit declared the statute unconstitutional as applied to
computer generated images of child sex that aren't proven to include an
actual minor person, but the First, Fourth, and Eleventh Circuits have
upheld it as written and intended by Congress to apply to realistic,
synthetic images that are or appear to be of real children.
We argued that the statute is valid for three main reasons:
(1) the new law only applies where the images are so realistic that they
appear to be real, whether created in whole or part by polaroid or pentium;
(2) that counterfeit child porn is a clear and present danger to children
because such realistic images would have the same incitement effect on
pedophiles to molest children and the same seductive effect on children to
become victims and, therefore, the act of knowingly producing, distributing,
or possessing such child sex images should not be recognized as a type of
protected expression under the First Amendment; and
(3) that such computer imaging technology is a threat to the effectiveness
of the existing child exploitation statutes, since law enforcement cannot
find all the children in the images and defendants would argue that there is
an automatic reasonable doubt defense to prosecutions of even real child
porn under the old statute because it cannot be assumed that what appears to
be a picture of a child is actually of a real child when computers can
create the same authentic-looking images.
Amicus briefs were also filed in support of the law by Morality in Media,
American Center for Law and Justice, and the National Center for Missing and
Exploited Children.

** 




RE: Interventions r gud

2001-04-22 Thread Declan McCullagh

This is nonsense. Even if you, say, don't believe (gays|blacks|IRS agents) 
should have any rights, and you assault or shoot one, you maintain your 
rights under the criminal justice system. To a trial by jury, to be 
confronted with the evidence against you, and so on. --Declan


At 03:39 AM 4/22/01 -0400, Phillip H. Zakas wrote:
Bell's AP includes neither a system of due process nor a method for the
accused to confront his accusor.  do you think he's rejected the AP as
invalid, or simply realizing how beneficial simple rights as these are when
being accused of crimes?  is it relevant to refer to these rights when he
himself rejected those rights for others?




Re: Making the Agora Vanish

2001-04-21 Thread Declan McCullagh

The government argued that Bell had years in which to file a civil suit if 
he truly believed there was wrongdoing, and his numerous _pro se_ motions 
showed he knew how.

Bell is not alienated from his parents, who were there for the trial. Sad, 
gentle folks.

-Declan

At 09:09 PM 4/20/01 -1000, Reese wrote:
If the levee should break, who is to blame?  Who can legally pursue
the matter?  Is he totally alienated from his parents?  I assume that
third parties can still pursue on his parents' behalf,,,

Reese




Re: Making the Agora Vanish | OSINT distributed haven (Intellagora)

2001-04-15 Thread Declan McCullagh

On Sun, Apr 15, 2001 at 02:11:56PM -0700, Ray Dillinger wrote:
 You sell Alice a credit history on Bob; Bob takes a new 
 identity; Alice is back to square one.  Why would Alice 
 buy credit histories?

Not everyone will choose to be lost in the Net.

So the solution is simple: I sell Alice a new report on Bob's new
identity, after doing the appropriate research and employing the
relevant investigators.

All credit is a gamble. If I know a person's meatspace identity and
ties with religious/social/family groups, I'm far more likely to lend
them money then if they're using a throwaway hushmail account.

If Bob is doing the latter, he won't get credit in the first place. If
he's using a known meatspace identity, I can do the research and
likely succeed.

-Declan




Jim Bell update, cyberpass down

2001-04-08 Thread Declan McCullagh

I'll be covering the trial for at least one more day, Monday. Friday's 
report about Bell taking the stand should be up on Wired News tomorrow morning.

Cyberpass.net is down and I haven't received any cpunx traffic since Friday.

-Declan




A young Jim Bell, just out of MIT and Intel

2001-04-08 Thread Declan McCullagh

A young Jim Bell (note same glasses as current):
http://www.rdrop.com/~jimw/WCCF8/SemiDisk_booth.jpg

See also:
http://www.rdrop.com/~jimw/j-wccf8.shtml