Re: Trouble at HavenCo?
Actually the best link for my stories is the News.com site: http://news.com.com/2100-1028-5059676.html They include relevant links; they include better formatting; they include photographs; they are updated faster. News.com syndicates may not include those features. -Declan On Tue, Aug 05, 2003 at 11:03:25AM -0400, Trei, Peter wrote: Sunder sent me a better link... http://www.businessweek.com/technology/cnet/stories/5059676.htm Peter -- From: Trei, Peter Sent: Tuesday, August 05, 2003 10:14 AM To: '[EMAIL PROTECTED]' Subject:Trouble at HavenCo? http://rss.com.com/2100-1028_35059676.html?type=ptpart=rsstag=feedsubj= ne ws Has 'haven' for questionable sites sunk? By Declan McCullagh Staff Writer, CNET News.com August 4, 2003, 1:38 PM PT LAS VEGAS--A widely publicized project to transform a platform in the English Channel into a safe haven for controversial Web businesses has failed due to political, technical and management problems, one of the company's founders said. Ryan Lackey, former chief technology officer of HavenCo, said on Sunday afternoon that he left the project because his business partners had become nervous about hosting objectionable material and were leading the company toward financial ruin, with only about six customers remaining.
Re: old encryption paper
On Sat, Jul 19, 2003 at 04:33:37PM -0400, [EMAIL PROTECTED] wrote: IMHO, it is exactly this kind of commentary which scuttled an attack on free encryption software in the wake of the attack. Moreover, the monolith authentication schemes were also laid to rest or driven Well, no. This kind of commentary made folks on mailing lists like these feel warm and fuzzy and made some other tech types realize what was at stake. But Sen. Judd Gregg's proposal failed because of lack of support from his colleagues and opposition from well-connected industry lobbyists, not people writing about GNU-Darwin (probably not one congresscritter knows what that means anyway, or cares). -Declan
Secret nanotech spy agency meeting
today... TECHNOLOGY National Academies Meeting of the Committee on Nanotechnology for the Intelligence Community. Closed session summary posted after the meeting Location: Keck Center of the National Academies, 500 5th St., NW, Washington, D.C.. Contact: James Killian, 202-334-1758; http://www.national-academies.org
Denver Post article on mattd/proffr/AP/Jim Bell/cypherpunks
http://www.denverpost.com/Stories/0,1413,36~53~1497971,00.html .. The development of digital money, and encryption software restricting government's ability to monitor Internet activity, are common goals among the online anarchists and libertarians known as cypherpunks. The ultimate purpose of Assassination Politics is to deter people from working for government agencies, corporate media outlets or institutions beholden to the violence of the state, Taylor said. Professor Rat also has threatened a University of Ottawa law professor, a columnist for The Boston Globe and a Cincinnati police officer. .. The Post is withholding the names of the subjects of posts by Professor Rat to avoid promoting any specific threats. .. Eugene Volokh, a law professor at the University of California-Los Angeles and a First Amendment specialist, said the threats were probably criminal, given Taylor's description of the purpose of Assassination Politics. ..
Re: Is Hatch a Mormon or a crypto Satanist?
On Sat, Jun 21, 2003 at 11:24:30AM -0700, Bill Stewart wrote: I've also found it was less trouble to get a beer and _dinner_ late at night than in much of California, though perhaps they have rules requiring bars to also be restaurants. I was in Salt Lake City just after the Olympics (and during the Paralympics) last year and, like you, didn't have any problem getting a beer with dinner. But late at night? Everything seemed to close around 10-11 pm. See: http://www.mccullagh.org/theme/winter-paralympics-2002.html -Declan
biochemwomdterror in dc
FOR IMMEDIATE RELEASE May 1, 2001 For More Information Contact: Andrea Andrews (202) 224-6518 WASHINGTON, DC - U.S. Senator Richard C. Shelby (R-AL), Chairman of the Senate Intelligence Committee, will hold a press conference Wednesday, May 2 to discuss domestic terrorism and to announce hearings to investigate domestic terrorism. Senator Shelby will be joined by Senator Judd Gregg (Chairman of the Appropriations Subcommittee on Commerce, Justice State and the Judiciary) and Senator Pat Roberts (Chairman of the Armed Services Subcommittee on Emerging Threats and Capabilities). The press conference will highlight the Senate's series of hearings to examine the efforts of more than forty different federal agencies with responsibility for combating domestic terrorism. Armed Services Chairman, Senator John Warner, and Senator Ted Stevens, Chairman of the Senate Appropriations Committee, will also hold hearings. DOMESTIC TERRORISM PRESS CONFERENCE With Senators Shelby, Gregg and Roberts 2pm - Wednesday Senate Radio TV Gallery
Re: layered deception
On Sun, Apr 29, 2001 at 11:24:09PM -0700, Steve Schear wrote: What if the sysadmin is intentionally located in an offshore location so that they cannot be kept from notifying all users of the logging order? Then we pass a cybercrime treaty to require them to follow U.S. laws. Law enforcement has a long time horizon. -Declan
Re: layered deception
Steve, Even assuming that what you say is true, and I suspect it is, you'd be relying on protections enshrined in the law. The purpose of this treaty, of course, is to change the law. :) -Declan On Mon, Apr 30, 2001 at 10:07:33AM -0700, Steve Schear wrote: At 10:56 AM 4/30/2001 -0400, Declan McCullagh wrote: On Sun, Apr 29, 2001 at 11:24:09PM -0700, Steve Schear wrote: What if the sysadmin is intentionally located in an offshore location so that they cannot be kept from notifying all users of the logging order? Then we pass a cybercrime treaty to require them to follow U.S. laws. Ahhh, but who is the them? My understanding is that under state and Federal law only executives and those with signature authority can be held criminally responsible for their actions. U.S. corporations can be created and administered solely by non-residents (only an in-state legal service point is generally required.). Nevada corporations can be held in bearer form shielding beneficial owners. steve
Re: Technological Solution
On Sat, Apr 28, 2001 at 08:49:43PM -0700, Tim May wrote: Well, better than nothing. (Like I said in another article tonight, the best is often the enemy of the good.) We knew even in 1992 that remailers were a pale imitation of the DC Nets discussed a few years earlier by Chaum and analyzed by others as well. But there were no DC Nets in 1992, and so remailers were nonetheless a step above what existed then (basically, the Kremvax/Kleinpaste/Julf approach). Better than nothing is understating the case a bit, I think. The info hiding workshop was a very interesting one that was almost entirely cypherpunk-relevant. It seems like researchers are choosing to present less-polished work here rather than waiting in line at eurocrypt, for instance, which makes it more timely, probably. The program's at: http://www.cert.org/IHW2001/ There's always a tension between the corporate-watermarking folks and the anon-privacy folks at these types of events, and this year was no exception. But it hasn't split into two yet, and seems set to stay intact for at least one more round in 18 months. -Declan
Re: Airlines IDs [was RE: Amtrak The War On Drugs]
I believe at least one FOIA request has been pending for the exact FAA rule. I wrote about this a few years ago and asked the FAA to clarify its position, and I never heard anything authoritative. In a recent article, I pointed out that the trend is shifting: You can now use kiosk check-in in some airlines and avoid showing photo ID. -Declan On Wed, Apr 25, 2001 at 12:12:25PM -0400, Trei, Peter wrote: 1. It is not a regulatory requirement for an airline passenger in the US to produce identification. 2. In fact, it's a violation of the airline's common carrier status for them to do so - they must admit anyone who shows up with a valid ticket. The ticket is a bearer instrument. 3. Regardless of the legalities, US airlines will usually request ID. If you refuse, and stand your ground, and can cite the appropriate common carrier regs, and show that they can't cite any regulatory requirement, they in fact WILL let you fly without ID. However, doing so involves moving far up beyond the counter-droids to superdupervisors, calls to corporate legal counsel, and unfriendly attention from airport security. While you would win in the end, you will almost certainly have missed your plane. 4. The reason airlines do this has nothing to do with security, and everything to do with extracting the max from your wallet Before these regs existed, and citizen units rightfully refused to let themselves be pushed, filed, stamped, indexed, briefed, debriefed, or numbered to the extent they do today, the bearer instrument status of the tickets allowed people who traveled often to save money. It worked like this: In the US, unscheduled, immediate travel ticket prices are extremely expensive. On American Airlines, an unrestricted Boston to San Francisco coach return ticket is over $2400 if I leave today and return tommorrow. If I book a month ahead and stay over the weekend, it's a tad over $400, a $2000 dollar savings. Companies with lots of predictable travel (for example, one with offices near Boston and San Francisco) would buy 'John Doe' tickets a month ahead, scheduled for over-weekend stays. A traveller would go to the travel office, and pick up an outbound and return ticket (from different original trips) with dates and times which suited him, and execute his business trip at a fraction of the cost of it would have if he'd bought his ticket in the naive manner. By hassling travellers who try to use tickets with someone elses name, and lying that it is illegal to do so, airlines have greatly cut down on this cost saving strategy. If you're going to make more than one business trip between the same cities on predictable dates in the next year, you can still execute this strategy on a personal level, but it requires planning. So don't believe the lies of the airline spinmeisters. The only security they are enhancing is that of their bottom line. Peter Trei
Re: Technological Solution
On Sat, Apr 28, 2001 at 06:32:08PM -0700, Tim May wrote: None of the non-cryptographic methods are very resistant to legal, technical, sniffing, and black bag attacks. And only multiply-chained encrypted-at-each-stage messages, a la remailers, are adequate for high-value messages. If only they worked. There was an interesting paper presented here in Pittsburgh at the info hiding workshop this week that suggested a way to strengthen the somewhat-suckful mixmaster network. (Of course, the network will never be even somewhat reliable until sufficient incentive -- ie digital cash or somesuch -- exists for running one.) At least one active cypherpunk was involved in writing that paper, and I cited it in my Wired article this week. -Declan
biochemwomd terror again, today
SENATE APPROPRIATIONS COMMITTEE Chemical Weapons Defense Subcommittee hearing on Chemical Demilitarization. Witnesses: Joseph Westphal, acting secretary of the Army; James Bacon, program manager, Chemical Demilitarization; Michael Parker, program manager, Assembled Chemical Weapons Assessment; Russell Salter, director, Chemical and Radiological Preparedness Division, FEMA; Craig Williams, director, Chemical Weapons Working Group; Rufus Kinney, spokesperson, Families Concerned About Nerve Gas Incineration; Brenda Lindell, Families Concerned About Nerve Gas Incineration Location: 192 Dirksen Senate Office Building. 10 a.m. Contact: 202-224-3471 http://www.senate.gov/~appropriations
even more biochemwomdterror
Experts Highlight Shortcomings Of National Terrorism Preparedness Response Capabilities 7 Date: Tue, 24 Apr 2001 18:01:41 -0400 7 Subject: 4/24/01 Experts Highlight Shortcomings Of National Terrorism Preparedness Response Capabilities 7 From: Hansen, Steve [EMAIL PROTECTED] NEWS U.S. House Committee on Transportation and Infrastructure U.S. Rep. Don Young, Chairman Contact: Steve Hansen (Communications Director) (202) 225-7749 Justin Harclerode (Communications Assistant) (202) 226-8767 To: National Desk Date: April 24, 2001 Experts Highlight Shortcomings Of National Terrorism Preparedness Response Capabilities Washington, D.C. - Members of Congress and experts in counterterrorism testified today at a Congressional hearing about the federal government's uncoordinated and wasteful organization to combat domestic terrorism. Three legislative proposals to address the nation's fragmented terrorism preparedness and response programs were examined at today's joint hearing conducted by two U.S. House of Representatives Subcommittees: 1) the Transportation and Infrastructure Subcommittee on Economic Development, Public Buildings and Emergency Management, and 2) the Government Reform Subcommittee on National Security, Veterans Affairs and International Relations. Government Needs To Better Coordinate Domestic Terrorism Efforts The question isn't whether the many programs we have to combat domestic terrorism are working, but rather if they are working in a coordinated and effective way rather than independently of each other, said U.S. Rep. Steve LaTourette (R-OH), the Chairman of the Public Buildings, Economic Development and Emergency Management Subcommittee. It is troubling that we don't have one person within the federal government who can tell us who is doing what to combat domestic terrorism, or if we're duplicating efforts left and right. I hope that by examining this issue closely at this hearing we will be able to zero in on what the federal government's role should be and focus on a plan that will guarantee the safety of our citizens while also ensuring that taxpayers' dollars are wisely spent, LaTourette said. As A Government, We Are Not Prepared Almost a decade after the dawn of a harsh new strategic reality - international terrorism aimed at our military and civilian personnel, abroad and here at home - these bills address today's equally stark realities: As a nation, we are not ready. As a government, we are not prepared, said U.S. Rep. Chris Shays (R-CT), the Chairman of the National Security, Veterans Affairs and International Relations Subcommittee. Speaking on behalf of legislation that each of them introduced this year in the House, U.S. Reps. Wayne Gilchrest (R-MD), Mac Thornberry (R-TX), and Ike Skelton (D-MO) agreed that Congressional action is needed to focus the efforts of the more than 40 federal agencies and departments that operate separate terrorism preparedness programs. Witnesses representing national security and terrorism preparedness panels concurred, citing different problems that plague preparedness efforts, including a lack of overall strategy, a lack of a high ranking coordinating authority or office, a means of evaluating program effectiveness, and an overlapping of services that leads to inefficiency and waste. Witnesses also agreed none of the three bills examined at the hearing was a complete solution to the problem, but that each makes a significant contribution to a final solution. The bills would do the following: Preparedness Against Domestic Terrorism Act of 2001 (H.R. 525) Introduced by Rep. Wayne Gilchrest, this bill would create a Presidential Council within the Executive Office of the President to oversee and coordinate the preparedness efforts of more than 40 departments and agencies. The bill provides the Council with oversight of federal programs and the authority to make recommendations to OMB regarding budget allocations for each federal terrorism preparedness program, based on a comprehensive national strategy. A similar measure (H.R. 4210 introduced by former Rep. Tillie Fowler) received bi-partisan support last year and passed the House unanimously under suspension of the rules. National Homeland Security Agency Act (H.R. 1158) Introduced by Rep. Mac Thornberry, this bill would create the National Homeland Security Agency (NHSA) by renaming the Federal Emergency Management Agency (FEMA) and merging the Coast Guard, the Customs Service, and the Border Patrol into the new agency. This new agency would be responsible for defending the homeland, and would continue to be the principal response agency for natural disasters. This bill would give FEMA, as the NHSA, the primary responsibility for coordination, response, and prevention for terrorist attacks and other manmade disasters. FEMA would also serve as the principal point of contact for state and local governments. Homeland Security Strategy
Re: Right to anon. speech online upheld in US district court
On Tue, Apr 24, 2001 at 03:08:19PM -0500, Aimee Farr wrote: This caught me a nudder fish. I'm going into my reinforced steel shark cage, 'cause this tells Mr. Big Fish could be behind him (Tim is like those three sharks with memory in that Deep Blue Sea movie.) Aimee, I like you, I really do. I know there is a lawyer with your name and location since I spent a moment checking on Martindale.com; I'm going to take a gamble and say that you are who you say you are. You seem smart, somewhat tech-clueful, and even a potential cypherpunk. That said, you're now posting mainly peculiar and strange messages. You're not doing this with a sincere desire to engage in dialogue, but with the stated purpose of baiting Tim, John, and others. Now, John may enjoy the repartee, but many cypherpunkly types would rather engage with someone who's doing more than baiting us and watching the sharks fight over the chum. -Declan
Re: The Crypto State
Yep. Brands' book is out from MIT Press, so it's even accessible. (Well, relatively accessible; I keep planning on finishing it RSN.) For someone to ask on cypherpunks for pointers to basic crypto concepts and ignoring reading lists is like someone posting to a political mailing list and asking how senators are elected, and refusing to read the Constitution. (I'm not saying this current case is the same, but it has similarities.) -Declan On Tue, Apr 24, 2001 at 06:25:23PM -0700, Tim May wrote: Read Schneier. Read the oft-cited (certainly cited many times in the years since you claim to have been here, i.e., since when Detweiler was here) Proceedings of the Crypto Conferences (Springer-Verlag, every year)/
Re: Amtrak The War On Drugs
No argument here. I recall a lot of this was in the '96 legislative session, especially the summer. I have some articles on the topic archived at www.eff.org/pub/Publications/Declan_McCullagh -Declan On Wed, Apr 25, 2001 at 09:34:44AM +1000, Ralph Wallis wrote: On Tuesday, 24 Apr 2001 at 16:13, Tim May [EMAIL PROTECTED] wrote: However, it used to be SOP to buy train tickets at the ticket window--for cash and with no I.D. or phone numbers or SS numbers or forehead marks. It looks like the temporary measures to combat the TWA 800 bombing sorts of events, even though TWA 800 almost certainly wasn't a bombing, are now spreading to the trains. I just read Database Nation, which notes that this was an immediate result of TWA 800 and the Atlanta Olympic bombing. (Along with similar policies for air travel.) So it's not a sign of spreading. Since Atlanta was 5 years ago, it's not a temporary measure either.
Re: Amtrak The War On Drugs
On Tue, Apr 24, 2001 at 06:43:20PM -0700, Tim May wrote: From our perspective, it will show the foolishness of government overreaction (ordering a million animals to be slaughtered and burned with tires and old pressure-treated lumber railroad ties). Good summary. Here's an ENS report: http://ens.lycos.com/ens/apr2001/2001L-04-19-12.html UK's Foot and Mouth Cull Raises Toxic Dilemma 2001-04-19 23:51:15 UK's Foot and Mouth Cull Raises Toxic Dilemma LONDON, United Kingdom, April 19, 2001 (ENS) - The foot and mouth outbreak is under control, according to the United Kingdom government's chief scientist, but the logistical challenge of quickly disposing of more than a million slaughtered animals is raising new fears over dioxins and groundwater contamination... Yes, top-down government regulation is clearly the best way to handle environmental crises, as the Brits showed so very well. -Declan
Re: Fake Child Porn
On Tue, Apr 24, 2001 at 09:27:10PM -0700, Tim May wrote: If this becomes law, it will be a case of pure thoughtcrime. No victims, no aggression against another person, no actual people. Just thoughtcrime. It is law, actually. Passed in 1996, with the Bruce Taylors of the world testifying in favor of it before Senate Judiciary. Hatch and Feinstein were chief sponsors. Five appeals courts have ruled on it. All but one (the Ninth Circuit) said it was constitutional. See: http://216.110.42.179/docs/nlc-frc.amicus.042301.html http://law2.house.gov/uscode-cgi/fastweb.exe?getdoc+uscview+t17t20+965+0++%28%29%20%20AND%20%28%2818%29%20ADJ%20USC%29%3ACITE%20AND%20%28USC%20w%2F10%20%282256%29%29%3ACITE%20%20%20%20%20%20%20%20%20 -Declan
Congress in action
FOR IMMEDIATE RELEASE Contact: Pia Pialorsi Monday, April 23, 2001 202-224-2670 107-38 Hearing on Booster Seats Set for Tuesday, April 24 The Consumer Subcommittee hearing Booster Seats and the Forgotten Child: Closing a Safety Gap is scheduled for Tuesday, April 24, at 10:00 a.m. in room 253 of the Russell Senate Office Building. Senator Peter Fitzgerald (R-IL), Chairman of the Subcommittee, will preside. Members will examine what measures may be needed to better protect children as they graduate from child safety seats to adult seatbelts. Following is the witness list (not necessarily in order of appearance): Panel I Mr. Robert Shelton Executive Director, National Highway Safety Administration Ms. Elaine WeinsteinActing Director, Office of Safety Recommendations and Accomplishments, National Transportation Safety Board Ms. Autumn Alexander Skeen Child Passenger Safety Advocate Dr. Flaura Winston Assistant Professor of Pediatrics at the Children's Hospital of Philadelphia and the University of Pennsylvania School of Medicine Dr. Kyran Quinlan Department of Pediatrics, University of Chicago Ms. Judith Lee StonePresident, Advocates for Highway and Auto Safety Panel II Ms. Heather PaulExecutive Director, National SAFE KIDS Campaign Dr. Adrian K. Lund Chief Operating Officer, Insurance Institute for Highway Safety Mr. James Vondale Director, Automotive Safety Office, Ford Motor Company Mr. Tom Bologa President, Britax Child Safety, Inc. # # #
SecureMedia press release on EncryptoniteTM Encryption Engine
FOR IMMEDIATE RELEASE Contact: Robert Mendes da Costa SecureMedia (415) 345-7720 [EMAIL PROTECTED] SecureMedia announces IP Broadband Media Security for MPEG SecureMedia Develops Security Reference Design to Protect MPEG Streams on Digital Set Top Boxes LAS VEGAS, NV - April 23, 2001 - SecureMedia, the leader in IP Broadband Media Security, today announced it has developed a revolutionary new security system that protects broadcast-quality MPEG-2 and MPEG-4 media streams delivered to digital set top boxes over IP networks. Using its patented EncryptoniteTM Encryption Engine and breakthrough Indexed EncryptionTM technology, the new security system dramatically increases protection of MPEG streams for Video-on-Demand applications, while greatly simplifying key management, reducing bandwidth requirements, and ensuring the highest-quality user experience. At the NAB2001 show in Las Vegas this week, SecureMedia will unveil this system including a new IP broadband security reference design for digital set top boxes based on Equator Technologies' MAP CA reference design. The IP broadband market requires a new class of security solutions to meet the high-bandwidth requirements, end-to-end security needs, scalability and quality consumer experience required for new Internet media services, such as Video-on-Demand, said Jack Oswald, CEO of SecureMedia. By applying our Encryptonite Engine and Indexed Encryption technology to MPEG-2 and MPEG-4, we're able to provide the level of security and performance service providers and network operators need to license and distribute top-quality entertainment. Encryptonite is the only encryption technology designed specifically for IP broadband media. SecureMedia's revolutionary Indexed Encryption technology encrypts each MPEG video frame uniquely with a different key for the highest security. The system is able to intelligently derive packet decryption keys in the client decoder without having to transmit hundreds or thousands of packet keys per stream to the decoder. Without compromising security, bandwidth requirements for key delivery are greatly minimized, as are the key processing requirements at both the client and server, which translate to critical cost savings. The process also contributes to a high-quality user experience because the Indexed Encryption technology is immune to packet loss and corruption often encountered in IP networks. In addition, it supports DVD-style trick play for the end user (i.e., fast forward, seek, rewind). Encryptonite represents an engineering breakthrough, combining well-respected, public key cryptographic mathematics with common symmetric encryption algorithms to produce a very strong, extremely fast, highly scalable and renewable encryption system. Encryptonite encrypts only the MPEG data payload, leaving the control data in the clear so that on-demand, rich media can be safely stored across distributed networks and can either be streamed or downloaded to consumers. SecureMedia has built an impressive list of customers, including RealNetworks., who has integrated Encryptonite technology as a standard component of their RealSystem iQ. Other customers, including TSBN, Vesta Broadband, DivX Networks, InvisiMail, and MediBridge, make SecureMedia the leading supplier of IP broadband media security with more than 1 million users worldwide. SecureMedia is completely committed to MPEG-2 and MPEG-4 and we are actively involved in the ISMA group's effort to standardize implementations of MPEG-4 over IP networks, said Oswald. Within the ISMA, security is considered a high priority and will be a requirement with initial MPEG-4 deployments because the content will be of higher quality and greater value. About SecureMedia SecureMedia (http://www.SecureMedia.com) is the leading provider of IP Broadband Media Security. The company's patented media encryption technologies enable a complete end-to-end security system that protects broadband media from the point of origination to the point of consumption. SecureMedia's customers represent industry leaders such as RealNetworks (NASDAQ: RNWK), where the company's technology provides the security for RealSystem iQ, as well as Oak Technology (NASDAQ: OAKT), King Biscuit Entertainment Group, InvisiMail Ltd. and Communicado/Satlink. SecureMedia is headquartered in San Francisco, CA, and has offices in Boston, MA and Auckland, NZ. Investors include Sony, Macrovision, Trans Cosmos, CB (Berkman) Capital LLP, and Bayview Investors, Ltd., an affiliate of BancBoston Robertson Stephens. # # # RealNetworks, RealSystem, RealPlayer, RealAudio and RealVideo are registered trademarks of RealNetworks, Inc.
Antiporn groups tell Supremes that morphed child porn law is OK
A collection of anti-porn groups filed amicus briefs today before the U.S. Supreme Court arguing that the so-called morphed child porn is constitutional. Amicus brief from the National Law Center for Children and Families, the National Coalition for the Protection of Children and Families and the Family Research Council: http://www.politechbot.com/docs/nlc-frc.amicus.042301.html Morality in Media amicus brief: http://www.politechbot.com/docs/morality.amicus.042301.html Text of the 1996 morphed child porn law (also called the Child Pornography Prevention Act): http://www.politechbot.com/docs/cppa.text.html Background (see wired.com for coverage tomorrow): http://www.politechbot.com/cgi-bin/politech.cgi?name=morphed -Declan ** From: Bruce Taylor [EMAIL PROTECTED] To: Declan McCullagh [EMAIL PROTECTED] Subject: FW: Our amici brief in Supreme Court in child porn case Date: Mon, 23 Apr 2001 18:18:12 -0400 Attached is the Brief Amici Curiae of the National Law Center for Children and Families, the National Coalition for the Protection of Children Families, and the Family Research Council, in Support of Petitioners (the Attorney General, DOJ, et al.), which was filed with the Supreme Court today in Ashcroft v. Free Speech Coalition, the computerized child porn case involving 18 USC 2252A. The Ninth Circuit declared the statute unconstitutional as applied to computer generated images of child sex that aren't proven to include an actual minor person, but the First, Fourth, and Eleventh Circuits have upheld it as written and intended by Congress to apply to realistic, synthetic images that are or appear to be of real children. We argued that the statute is valid for three main reasons: (1) the new law only applies where the images are so realistic that they appear to be real, whether created in whole or part by polaroid or pentium; (2) that counterfeit child porn is a clear and present danger to children because such realistic images would have the same incitement effect on pedophiles to molest children and the same seductive effect on children to become victims and, therefore, the act of knowingly producing, distributing, or possessing such child sex images should not be recognized as a type of protected expression under the First Amendment; and (3) that such computer imaging technology is a threat to the effectiveness of the existing child exploitation statutes, since law enforcement cannot find all the children in the images and defendants would argue that there is an automatic reasonable doubt defense to prosecutions of even real child porn under the old statute because it cannot be assumed that what appears to be a picture of a child is actually of a real child when computers can create the same authentic-looking images. Amicus briefs were also filed in support of the law by Morality in Media, American Center for Law and Justice, and the National Center for Missing and Exploited Children. **
RE: Interventions r gud
This is nonsense. Even if you, say, don't believe (gays|blacks|IRS agents) should have any rights, and you assault or shoot one, you maintain your rights under the criminal justice system. To a trial by jury, to be confronted with the evidence against you, and so on. --Declan At 03:39 AM 4/22/01 -0400, Phillip H. Zakas wrote: Bell's AP includes neither a system of due process nor a method for the accused to confront his accusor. do you think he's rejected the AP as invalid, or simply realizing how beneficial simple rights as these are when being accused of crimes? is it relevant to refer to these rights when he himself rejected those rights for others?
Re: Making the Agora Vanish
The government argued that Bell had years in which to file a civil suit if he truly believed there was wrongdoing, and his numerous _pro se_ motions showed he knew how. Bell is not alienated from his parents, who were there for the trial. Sad, gentle folks. -Declan At 09:09 PM 4/20/01 -1000, Reese wrote: If the levee should break, who is to blame? Who can legally pursue the matter? Is he totally alienated from his parents? I assume that third parties can still pursue on his parents' behalf,,, Reese
Re: Making the Agora Vanish | OSINT distributed haven (Intellagora)
On Sun, Apr 15, 2001 at 02:11:56PM -0700, Ray Dillinger wrote: You sell Alice a credit history on Bob; Bob takes a new identity; Alice is back to square one. Why would Alice buy credit histories? Not everyone will choose to be lost in the Net. So the solution is simple: I sell Alice a new report on Bob's new identity, after doing the appropriate research and employing the relevant investigators. All credit is a gamble. If I know a person's meatspace identity and ties with religious/social/family groups, I'm far more likely to lend them money then if they're using a throwaway hushmail account. If Bob is doing the latter, he won't get credit in the first place. If he's using a known meatspace identity, I can do the research and likely succeed. -Declan
Jim Bell update, cyberpass down
I'll be covering the trial for at least one more day, Monday. Friday's report about Bell taking the stand should be up on Wired News tomorrow morning. Cyberpass.net is down and I haven't received any cpunx traffic since Friday. -Declan
A young Jim Bell, just out of MIT and Intel
A young Jim Bell (note same glasses as current): http://www.rdrop.com/~jimw/WCCF8/SemiDisk_booth.jpg See also: http://www.rdrop.com/~jimw/j-wccf8.shtml