[i2p] Distributed Search Engine (fwd from tkaitchuck@comcast.net)

2005-01-13 Thread Eugen Leitl
- Forwarded message from Tom Kaitchuck [EMAIL PROTECTED] -

From: Tom Kaitchuck [EMAIL PROTECTED]
Date: Thu, 13 Jan 2005 00:51:51 -0600
To: [EMAIL PROTECTED]
Subject: [i2p] Distributed Search Engine
User-Agent: KMail/1.7.2

For those of you that do not know, I am currently working on building a 
distributed search engine for I2P. While it is still in an alpha state, it is 
approaching the point where it could use some wider testing. It is now in cvs 
under the module khksearch. I was planning to hold off on releasing it until 
I fixed a bug preventing servers from joining in mid operation, but it has 
proved elusive enough, that I think more eyeballs may help.

One thing that some of you may be interested in even if you don't care about 
the search engine itself, is that to make it work with I2P I took the 
streaming library for Java and put it into a wrapper class that imitates 
java.net so all one has to do is take the wrapper code put it in the class 
path and in your java program replace import java.net.* with Import 
search.connection.* and your app is instantly ported to I2P. (Assuming it is 
fairly simplistic and only has one socket server per Jvm instance. But this 
could easily be improved upon if anyone is interested. )

There is still lots to do, not all of which requires huge technical skill. 
(Code cleanup, Better instructions, Startup scripts for windows and other 
JVMs) Also the existing awt interface needs to be converted into an applet or 
so that it can run within a webpage. The biggest thing that remains 
to be done is implementing the ranking code, I plan to do this next.

As far as the license goes, it will we a free software license that permits 
modification and public access to the source. (probably lgpl or similar) 
However all of the scripts and all of the code for the wrapper, were written 
by me, and are public domain.

So if you are interested in helping out, or would just like to play with it, 
check it out.
___
i2p mailing list
[EMAIL PROTECTED]
http://i2p.dnsalias.net/mailman/listinfo/i2p

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgp5PU9cEpkGx.pgp
Description: PGP signature


Pain reliver Lortab Lorcet Hydrocodone Norco Vicoden ...

2005-01-13 Thread Zachery I. Sylvester
Need
0xycon1n
Vicod1n
0xyc0d0ne


http://akj.oruo.com/p/sales/xfpvne



Links exchange with http://vegasreference.com.

2005-01-13 Thread Cole Dunwall
Dear owner of http://vegasreference.com,

 
We've looked through your site http://vegasreference.com and we liked it very 
much, so we propose to you link exchange 
between our sites.  


If you agree to be our link partner please add our links to your resources page 
and send us your information:
Title, Description, URL and preferred Category. 
We would add your resource to our site shortly.



Information about our sites is next:

URL: http://www.blackjackgame4u.com/howtoplay.html
Link Title: Black Jack In Online Casino
Description: Black Jack in Casino: Slang and Lingvo, Rules, Tips, Strategies, 
Jokes of Black Jack.
 

URL: http://www.craps4u.com/playcraps.html
Link Title: Online Gambling. Play Craps!
Description: Online Craps: Useful Information About This Game, Strategies and 
Jokes.
 
URL: http://www.slotsgame4u.com/betting.html
Link Title: Online Casino. Play Slots!!!
Description: Slots And Betting, Information About Gambling, Strategies in 
Casino Online.
 
URL: http://www.roulette4u.com/facts.html
Link Title: Play Roulette In Online Casino.
Description: Roulette Game For You! Facts About Playing. Rules and Jokes.
 
URL: http://www.videopoker4u.com/terms.html
Link Title: Online Casino. Video Poker!
Description: Rules, Tips, Strategies and Jokes Of Poker. Poker Terms and 
Glossary.


Best regards, 
Cole Dunwall



Heyllooo, Baby

2005-01-13 Thread hush.ai
Would you like to keep me some company?
My idiot Husband works night shifts, which makes me very lonely at night.

To contact me please go here: http://wetdear.com/d/1.php

Sincerely Yours,
Courtney l


Block Spyware Pop-Ups

2005-01-13 Thread Protect your PC
Hello, 

Have you recently noticed that your computer is all of a sudden running slower 
than normal? Or, perhaps you're noticing that you've recently been inundated 
with an inordinate amount of annoying and intrusive pop up advertisements. 
The reason this may be happening is because your PC's hard drive is infected 
with Spyware and/or Adware files. 

http://www.fundowntheroad.com/cgbbbih_tuuuhleuhx.html

These are files that are installed on your PC without your knowledge and can be 
extremely harmful to your PC and could lead to the crashing of your PC's hard 
drive. 

The only way to check your system for these files is to scan your system using 
our software. You may now scan your system AbsolutelyFree to check for these 
infected files. To do so, simply go here to start the scan: 
http://www.fundowntheroad.com/ltooosg_tuuuhleuhx.html 

It's imperative that you keep a constant check of your PC to ensure these files 
are not residing on your hard drive. If after scanning you find these files do 
exist on your hard drive, it's essential that you remove them immediately. 

Again, please scan your system now (atno cost) by going here: 
http://www.fundowntheroad.com/jvw_tuuuhleuhx.html 

Best, 

MyNetProtectorý
Your Rights, Your Privacy! 






If you no longer want to receive mail from this list:

Send a blank email to 
mailto:[EMAIL PROTECTED], 
or write to Good Times
123 North Congress Avenue Suite 180
Boynton Beach, Florida 33426




Ridge Wants Fingerprints in Passports

2005-01-13 Thread R.A. Hettinga
http://www.nytimes.com/2005/01/13/politics/13fingerprint.html?oref=loginpagewanted=printposition=

The New York Times
January 13, 2005

Ridge Wants Fingerprints in Passports
 By MATTHEW L. WALD


WASHINGTON, Jan. 12 - The United States should issue passports that include
a full set of the bearer's fingerprints, Tom Ridge, the departing secretary
of homeland security, said Wednesday. Mr. Ridge said the change would
induce foreign governments to do the same on the passports they issue.

Privacy advocates promised to fight the Ridge suggestion, in part because
it would deliver the prints of American travelers to foreign governments,
and the State Department has been cool to it as well.

Mr. Ridge, speaking at the Center for Strategic and International Studies,
a research group here, cast his comments as advice to Michael Chertoff,
chosen by President Bush on Tuesday to succeed him.

Be aggressive, go after 10 fingerprints on the passports, Mr. Ridge said,
adding that it was a lot easier to negotiate with your allies if you've
already done what you're asking them to do.

 Applicants for visas to visit the United States must already submit to
finger scans of both index fingers. Experts call them scans, not prints,
because the images are taken on a scanner screen, without ink.

Later this year, a 2002 law will require people whose nationality allows
them to enter this country without a visa to present machine-readable
passports that incorporate a digital photograph as biometric data.

 A spokeswoman for the State Department, Kelly Shannon, said that the
machine-readable passports the United States issues would have a computer
chip with 64 kilobytes of memory, far more than is needed for the
traveler's name, date and place of birth, passport number and a single
photo. The chip could be used for other biometric data in the future,
including an additional photo, Ms. Shannon said, adding that the globally
interoperable, chosen biometric for travel documents was photos.

 At the Electronic Privacy Information Center, a nonprofit group here, Marc
Rotenberg, the president, said that providing foreign governments with the
fingerprints of each American visitor would make it easier for those
foreign governments to conduct their own investigations of U.S. citizens in
that foreign country.

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



RE: To Tyler Durden

2005-01-13 Thread Tyler Durden
WHAT THE FUCK ARE YOU TALKING ABOUT! THIS IS MY REAL NAME GODDAMMIT!!!
Wait, I'm getting sleepy...gotta take a nap...
-TD


From: Major Variola (ret) [EMAIL PROTECTED]
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
Subject: To Tyler Durden
Date: Wed, 12 Jan 2005 19:02:14 -0800
TD,
I just watched _Fight Club_ so I finally get your nym.  (Here in
low-earth geosynchronous orbit, content is delayed).  Cool.
I had thought it was your real name.
Maj. Variola (ret)



Download Movies Still In The Theater

2005-01-13 Thread Dawn Wong
When I returned I checked because I didn't believe you, sure enough, was this 
it?
http://www.2oo5-downloading.com/gr8.html

You can just about download any CD album you want to.  Not to mention console 
games and dvd's.  So I've downloaded 3 video games  movies so far today :).

You should get a load of how many movies are in here that'l play in your dvd 
player - it's crazy.
Theres a few pages in there on how to get your selection on CD if you need the 
help.

I know this, the movie section has movies in it that are still in theates - I 
dont know about you but thats seriously impressive.

I'll talk to you later.
 
Dawn



VIRUS (Worm.SomeFool.Gen-1) IN MAIL FROM YOU

2005-01-13 Thread amavisd-new
VIRUS ALERT

Our content checker found
virus: Worm.SomeFool.Gen-1
in email presumably from you (cypherpunks@minder.net), to the following 
recipient:
- [EMAIL PROTECTED]

Please check your system for viruses,
or ask your system administrator to do so.

Delivery of the email was stopped!


For your reference, here are headers from your email:
- BEGIN HEADERS -
Return-Path: cypherpunks@minder.net
Received: from adfc.de (p508ABF6B.dip.t-dialin.net [80.138.191.107])
by mail2.srv.syswebcom.net (Postfix) with ESMTP id DB4E82FEC27
for [EMAIL PROTECTED]; Thu, 13 Jan 2005 19:06:51 +0100 (CET)
From: cypherpunks@minder.net
To: [EMAIL PROTECTED]
Subject: Re: Your picture
Date: Thu, 13 Jan 2005 19:07:43 +0100
MIME-Version: 1.0
Content-Type: multipart/mixed;
boundary==_NextPart_000_0005_622B.4C04
X-Priority: 3
X-MSMail-Priority: Normal
Message-Id: [EMAIL PROTECTED]
-- END HEADERS --
Reporting-MTA: dns; mail2
Received-From-MTA: smtp; mail2.srv.syswebcom.net ([127.0.0.1])
Arrival-Date: Thu, 13 Jan 2005 19:06:56 +0100 (CET)

Final-Recipient: rfc822; bettundbike@dachgeber.de
Action: failed
Status: 5.7.1
Diagnostic-Code: smtp; 550 5.7.1 Message content rejected, id=25733-09 - VIRUS: Worm.SomeFool.Gen-1
Last-Attempt-Date: Thu, 13 Jan 2005 19:06:56 +0100 (CET)
Received: from adfc.de (p508ABF6B.dip.t-dialin.net [80.138.191.107])
	by mail2.srv.syswebcom.net (Postfix) with ESMTP id DB4E82FEC27
	for [EMAIL PROTECTED]; Thu, 13 Jan 2005 19:06:51 +0100 (CET)
From: cypherpunks@minder.net
To: [EMAIL PROTECTED]
Subject: Re: Your picture
Date: Thu, 13 Jan 2005 19:07:43 +0100
MIME-Version: 1.0
Content-Type: multipart/mixed;
	boundary==_NextPart_000_0005_622B.4C04
X-Priority: 3
X-MSMail-Priority: Normal
Message-Id: [EMAIL PROTECTED]


Re: Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire

2005-01-13 Thread John Kelsey
From: Justin [EMAIL PROTECTED]
Sent: Jan 10, 2005 7:35 PM
To: [EMAIL PROTECTED]
Subject: Re: Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire

...
Some gun accidents are suicides reported as such to avoid
embarrassment to the family.  

I've heard this from other people, too--some in reasonably good positions to 
know how such things were reported.  And there's surely some ambiguity between 
fatal accidents caused by doing something really stupid and intentional 
suicides.  

...

--John



[RealEstate] Our-capitol, your growth.

2005-01-13 Thread Information-Letter from OSG







REInfo






Blue Iraq: Local Experts in Global Communications

2005-01-13 Thread R.A. Hettinga
I expect a few cypherpunks will know the founder of blueiraq...

Cheers,
RAH
(who wonders who's running rediraq.com... ;-))
--

http://blueiraq.com/iraq/index.html
Blue Iraq

Local Experts in Global Communications
about Blue Iraq | Products and Services | Technology and Networks | Iraq
FAQ |  Support | Contact Us

Iraq FAQ

 FAQs

 

Technology and Internet in Iraq:
 Frequently Asked Questions

We have found that there are a few common questions about Internet access
and general IT in Iraq. By answering these questions here, we can try to
improve understanding inside and outside Iraq of the unique environment
which exists here.
 What kind of Internet connection does Iraq have?
Iraq does not have one main Internet connection. As of 2003, Iraq has had
no landline or microwave relay connections to the outside world. All
international communications, and most domestic communications, have been
via satellite. Domestic wireline or wireless networks rely on satellite
access for international connectivity. Many businesses use small satellite
terminals (VSATs) to communicate directly with the outside world.
 Who uses Internet service in Iraq?
The US Department of Defense, DoD and Redevelopment Contractors, Western
expatriates, and the Iraqi Government are major users of Internet and
international communications services in Iraq. Additionally, many NGOs,
universities, and Iraqi businesses are establishing internet connectivity.
One of the major purchasers of Internet service in the domestic Iraqi
market is for small, entrepreneurial Internet Cafes.
Why is service in Iraq more expensive than in other parts of the world?
Satellite capacity is usually more expensive than terrestrial connectivity,
due to the high costs of satellites and limited RF capacity available on a
given transponder. However, satellites also have very high reliability, and
are the only practical means of deploying communications rapidly over a
large territory without building extensive (and vulnerable) fixed
infrastructure. Modern shared IP-optimized Ku-band VSAT systems can be very
affordably priced compared to older satellite communications systems.

 Communications companies operating in Iraq also face higher operating
costs than similar communications companies operating elsewhere in the
world, due to security concerns and lack of infrastructure.
 Can I use Voice over IP (VoIP) over satellite?
Generally VoIP will require special settings to work reliably over
satellite. We currently only support our iDirect network and dedicated
satellite capacity for VoIP applications, and all supported VoIP
communications must go through our VoIP gateway to ensure traffic
prioritization and quality of service.
Your competitors offer some systems which are cheaper, and can use Iraqis
to do the installation. Why should I use Blue Iraq?
Our prices are actually lower than most other satellite systems, based on
service capacity and performance -- unlike a lot of companies, we specify
our systems based on observed performance in Iraq, not a fanciful design
specification.

 Due to the security situation, it is very difficult for Iraqis to get onto
US bases to do installations. We do use trained Iraqis for off-base
installs in some cases. However, in many cases, we have found that having
US engineers do the world results in the most effective solution with the
highest overall quality. An inexpensive system which does not work reliably
is no bargain.
Why should I purchase a system from an Iraq-focused network operating
company, vs. one of the satellite owners or major networks?
One word: presence. Blue Iraq has trained personnel on the ground in Iraq
who are familiar with the environment. Many other vendors have never set
foot in Iraq, and rely on local contract installation companies to do
installations. Non-Iraq based companies also do not have personnel in Iraq
do provide after-sale support if anything goes wrong. In a place like Iraq,
many things can go wrong.
Isn't it too dangerous to operate a business in Iraq? The news shows
bombings and kidnappings every day?
Iraq can be a very dangerous place. However, we take all reasonable
precautions to minimize this risk. Our personnel travel with appropriate
levels of security, and will refuse to go to sites which are not adequately
secured. We primarily operate in conjunction with the US military, and rely
on US military helicopter transport between secure bases. All personnel
have appropriate protective gear and training.
Why does the military use commercial internet services? Doesn't it have
enough satellite capacity of its own?
The US military makes extensive use of commercial products and systems for
a wide variey of non-tactical purposes, as commercial systems often provide
the cheapest, best, and most cost-effective solution to a given problem.
Commercial satellite networks are extensively used for Morale, Welfare, and
Recreation (MWR) purposes, administrative and support systems, and more.
Do you do 

Altnet trying to 'mug' companies

2005-01-13 Thread R.A. Hettinga
http://p2pnet.net/story/3542


p2pnet.net - the original daily p2p and digital media news site
 

 Altnet trying to 'mug' companies




Jay Flemma

p2pnet.net News:- Entertainment lawyer Jay Flemma doesn't believe Altnet's
circular email campaign to p2p companies in a bid to get them to license
the TrueNames 'hash' patent will work.


In fact, As I understand the lay of the land in this case, I believe they
are grossly over-reaching in attempting to turn the world of IP into the
wild, wild west and effectively mug these companies by trying to make them
pay for something for which they do not have the rights to defend or
prosecute, he told p2pnet.


Flemma, who specialises in music, film, tv and book law with particular
emphasis on the confluence of the media with the Net, is consulting with
companies who've received the Altnet patent letter.


We're having discussions as to whether or not Altnet really has a leg to
stand on, says Flemma, an expert in the legalities of Net distribution
media.


But, I think their attorney's claims in the Washington Post that a jury
found that their patent was valid is woefully inaccurate because it is not
a jury question - or what's called a question of fact, whether or not a
patent is valid, he says. That is a question of law,


I can tell you this: juries do not rule on the question of whether or not
a patent is valid.


The EFF (Electronic Frontier Foundation) is taking an interest in events,
we understand.


As p2pnet was the first to report on Monday, Altnet has fired off a round
of identical letters to companies it believes use hashes (think 'links')
for a digital file.


How2Share Technologies, a small Canadian company based in Victoria on
Vancouver Island, British Columbia, and which markets PiXPO software for a
picture sharing network, is one of the more recent victims.

 I don't think the Patent has any legs, managing director Jim Wallace
told p2pnet.

Without saying it in so many words, the Altnet letters imply that if firms
it approaches don't license the patent, they'll be sued.


In the meanwhile, in case you're wondering what all the fuss is about, A
Hash as unique identifier was the whole idea behind hashing algorithms,
says Exo in a p2pnet comment.


Read on 

Earliest example I can recall was the Hash sorting technique. In essence
IBM's punch card sorting machines (pre WWII) are an early example of hash
sorting. In the punch card machine the hash was simply a nibble from a
specific character column that is used to steer the card to a specific bin.
This hash is only perfect in the since that all cards having the same
character in the selected column will be steered to the same bin. To sort
on a wider field, you simply start with the least significant column of the
sort field; run the cards, re-stack first bin on top of second bin, and so
on, repeating for each column in the field.


In data communications the CRC is a hash guaranteed to be unique over a
specific number of bits. A CRC-16 is unique for files up to 2^16 bits in
length, CRC-32 for up to 2^32 bits. Different CRC algorithms use different
bits to generate the feedback used to digest the data into a hash. (early
1970's?) CRC's were first used to detect data errors over serial data
links. Early example: IBM mainframe to terminal equipment communications
using SNA and SDLC protocols. TCP/IP protocol uses a CRC-32 to detect
packet errors. (Mid 19080's)


The field of cryptography, specifically public key cryptography, needed
secure hashing algorithms. (Only secure in the sense that the estimated
length of time to brute force content that will generate a specific hash
value will take a very long time on the order of many CPU years. RSA
patented various Message Digest functions (in the 1970's, several RSA
patents recently expired and are now public domain).


Most of us are familiar with the MD5 algorithm in which several P2P
applications use to generate file Hash values. The whole Idea of using a
Message Digest function in cryptography was to generate a hash on a plain
text document (file) such that it could be used to detect if that document
changes in any way. If any character in the document (file) is different
then the hash will be different. These hashes are used when digitally
signing a document, to verify that a document is the exact same (uniquely
identified) document you viewed before signing. To prevent someone from
changing the hash, it is encrypted using your private key so that others
can verify using your public key. The results of processing the document
using the MD function should exactly match the hash decoded using your
public key.


Databases have used such hashing algorithms to generate unique keys for
locating data in a database. Software has a good example in the C++
language standard template library in the implementation of the std map
object. The map object stores a key, the key can be plain text, but is
usually a hash to minimize the number of characters that need to be

virus gönderilen iletide bulunmuþtur Delivery (info@cabani.com.tr)

2005-01-13 Thread System Anti-Virus Administrator

Dikkat: cypherpunks@minder.net

Gönderdiðiniz bir Eposta iletisinde virus bulunmuþtur.
Bu Eposta tarayýcýsý iletiyi durdurmuþ ve iletinin alýcýya eriþmesini 
engellemiþtir.

Bulunan virus:

Worm.SomeFool.Q


Lütfen virüs tarayýcýnýzý güncelleyin ve/veya Bilgi Ýþlem departmanýna 
sisteminizde virüs bulunduðunu derhal haber verin.

Gönderdiðiniz iletide aþaðýdaki baþlýklar bulunmuþtur:

Gönderen: cypherpunks@minder.net
Alýcý:   [EMAIL PROTECTED] 

... ve aþaðýdaki diðer baþlýklar: 

---
MAILFROM: cypherpunks@minder.net
Received: from unknown (HELO cabani.com.tr) (65.78.109.66)
  by 0 with SMTP; 13 Jan 2005 22:24:14 -
From: cypherpunks@minder.net
To: [EMAIL PROTECTED]
Subject: Delivery ([EMAIL PROTECTED])
Date: Thu, 13 Jan 2005 17:17:35 -0500
MIME-Version: 1.0
Content-Type: multipart/related;
type=multipart/alternative;
boundary==_NextPart_000_001B_01C0CA81.7B015D10
X-Priority: 1
X-MSMail-Priority: High


---



Florida man faces bioweapon charge

2005-01-13 Thread R.A. Hettinga
http://www.cnn.com/2005/US/01/13/ricin.arrest/

CNN


Florida man faces bioweapon charge

FBI says accused had poison ricin and several weapons

Thursday, January 13, 2005 Posted: 7:00 PM EST ( GMT)

MIAMI, Florida (CNN) -- An Ocala, Florida, man was arrested by the FBI
after they found the biotoxin ricin in his possession in the home he shares
with his mother.

Steven Michael Ekberg, 22, had at least 83 castor beans and other
byproducts consistent with the manufacture of ricin in his possession, the
FBI said.

Ricin is a poison that can be made from the waste from processing castor
beans, according to the Centers for Disease Control and Prevention.

The former waiter also had several weapons, including an AK-47 and an Uzi,
the FBI said.

Ekberg was taken into custody Wednesday night and was scheduled to appear
Thursday afternoon before a federal magistrate in Ocala.

He is being charged with possession of a biological weapon.

We are still investigating and are trying to determine what his intentions
were, but we have no information that he released it to anyone, said FBI
spokesman Jeff Westcott.

We believe that he acquired the materials over the Internet, but we are
still investigating, he said.

In their affidavit, FBI officials said they found a number of seeds in
packaging that describes the material as very poisonous.

They said they also found, in a cardboard box in Ekberg's room, glass vials
containing white granules suspected of being husk-less, chopped castor
beans, a byproduct of the manufacture of ricin.

The FBI said Ekberg has no known ties to terrorists or extremists.

A hazardous-materials team took the substance to the Florida Health
Department laboratory in Jacksonville, where it was confirmed to be ricin,
the FBI said.

FBI biohazard teams swept the house to ensure that no one in the
neighborhood could become contaminated.

Ekberg was arrested on an unrelated weapons and narcotics charge last
weekend by the Marion County Sheriff's Office.

According to the FBI affidavit, an anonymous source now acting as a
confidential source called the sheriff's office and told authorities that
Ekberg showed him the materials several months ago.

If I put this on your food, this would kill you immediately, Ekberg
allegedly told the source, pointing to the contents of a container,
according to the affidavit.

He then picked up another container and stated words to the effect, This
would make you really sick, the source allegedly told authorities.

Picking up another container, he said, This would kill you, but not right
away.

The source told police that Ekberg had two books containing information on
how to make poisons from household chemicals and plants, according to the
affidavit.

Ekberg, who has a license to carry concealed weapons, was in possession of
various handguns at the time of his arrest, in addition to the Uzi and
AK-47, authorities said.

His mother, Theresa Ekberg, told the FBI that he has been treated for
depression, according to the affidavit.

His mother also told authorities that in the past her son had possessed
some chemicals.

She said that on at least one occasion he showed her something he had
purchased via the Internet and expressed concern that if their cat
inadvertently ate enough of it, the cat would die, according to the
affidavit.

She advised that her son had had the chemicals for several years.

The confidential source, according to the FBI, told authorities that Ekberg
would often mix his anti-depression medication with alcohol and visit bars
carrying concealed weapons.

If convicted, he could face up to 10 years in prison.

The FBI is still investigating who sent two letters that contained ricin in
2003 through the U.S. postal system. Those letters contained threats and
complaints about labor regulations in the trucking industry.

In 1978, Georgi Markov, a Bulgarian writer and journalist in London, died
after a man attacked him with an umbrella that had been rigged to inject a
ricin pellet under his skin.

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



Re: Ridge Wants Fingerprints in Passports

2005-01-13 Thread Bill Stewart
He's smearing his sticky fingerprints all over everything else,
and now he wants them in our passports?
Oughtta learn to keep his hands to himself.


Bill Stewart  [EMAIL PROTECTED] 



Re: Florida man faces bioweapon charge

2005-01-13 Thread Eric Cordian
RAH pastes:

...

 Steven Michael Ekberg, 22, had at least 83 castor beans and other
 byproducts consistent with the manufacture of ricin in his possession, the
 FBI said.

...

 They said they also found, in a cardboard box in Ekberg's room, glass vials
 containing white granules suspected of being husk-less, chopped castor
 beans, a byproduct of the manufacture of ricin.

I'm confused here.  Is possession of castor beans possession of ricin?  
Is possession of chopped castor beans possession of ricin?

 He then picked up another container and stated words to the effect, This
 would make you really sick, the source allegedly told authorities.

I could pick up a container of Drano, and make the same commment.  Big 
deal.

 The source told police that Ekberg had two books containing information on
 how to make poisons from household chemicals and plants, according to the
 affidavit.

Still legal to own, as far as I know.

 His mother, Theresa Ekberg, told the FBI that he has been treated for
 depression, according to the affidavit.

 His mother also told authorities that in the past her son had possessed
 some chemicals.

 She said that on at least one occasion he showed her something he had
 purchased via the Internet and expressed concern that if their cat
 inadvertently ate enough of it, the cat would die, according to the
 affidavit.

Obviously this news story is the grand prize winner in an innuendo 
contest.

 The FBI is still investigating who sent two letters that contained ricin in
 2003 through the U.S. postal system. Those letters contained threats and
 complaints about labor regulations in the trucking industry.

 In 1978, Georgi Markov, a Bulgarian writer and journalist in London, died
 after a man attacked him with an umbrella that had been rigged to inject a
 ricin pellet under his skin.

And WTF does this have to do with the guy with the castor beans?

Looks like Ricin Theatre has joined Anthrax Theatre in the armory of 
Weapons of Mass Deception.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
Do What Thou Wilt Shall Be The Whole Of The Law



SolarWinds Network Toolset Update

2005-01-13 Thread Sales

Thank you for downloading our SolarWinds Network Management Tools.

SolarWinds offers trial downloads of all our products.  Everything from our 
TFTP Server utility to our Engineer's Edition Toolset containing over 40 
network management tools.  We even offer a download of our award winning 
web-based Orion Network Performance Monitor (Orion NPM) featured on the cover 
of Network Computing Magazine.

You can access all of these great downloads from: 
http://solarwinds.net/Download-Tools.htm

If you have any questions during the evaluation, please contact our sales team 
at [EMAIL PROTECTED] or our support team at [EMAIL PROTECTED]  If you would 
like a quote, you can create an online quote at 
http://support.solarwinds.net/order/default.cfm?method=PO or we can create one 
for you by calling us at 918-307-8100.
  
Again, enjoy the software. I am confident SolarWinds will exceed your 
expectations as a provider of network management solutions.

Please call or email if I can be of any assistance.

Sincerely,

Kyle Miller,
SolarWinds.Net
[EMAIL PROTECTED]
918-307-8100





PFSO / CSO / SSO Course 7-9 FEB 2005

2005-01-13 Thread seasecure
Title: Untitled






	
		

		Port Facility Security Officer Certification Course
			

			
			

			February 
  7-9, 2005
			
			

			Fort 
  Lauderdale, Florida
			USA

			MTSA 
  / ISPS CODE COMPLIANT TRAINING FOR
			
			

			PFSO / CSO / SSO  PORT FACILITY / VESSEL 
  MANAGEMENT PERSONNEL  
		 

			
			

			
			

			U.S.
			AND INTERNATIONAL LAW REQUIRES TRAINING 
  
			FOR ALL MARITIME PERSONNEL WITH SECURITY 
		DUTIES
		
	



	
		
  
			WHO 
			WE ARE
  
			The Maritime Security Institute 
  (MSI), a not-for-profit educational institution, is the leading maritime 
  security training center in the United States. Our programs are unique in 
  both the unmatched expertise and experience of our instructors, and the 
  hands-on opportunities to put new security skills to work. Students at MSI 
  come from dozens of countries and represent governments, ports, and 
  shipping companies. We train law enforcement, government officials, 
  military, ship and port operations personnel, RSOs, Designated 
  Authorities, and maritime security executives.
			
			

			OUR 
			PROGRAMS
			

			
			

			MSI security programs combine 
  best industry practices from experienced instructors in government and 
  the private sector. Where applicable, these programs meet or exceed the 
  requirements set forth in the IMOs model Training Programs for compliance 
  with the International Ship  Port Facility Security (ISPS) Code or 
  the US Maritime Transportation Security Act (MTSA).
			See our 
		website listed below for more information.


			

			
			
			

			
			

			OUR 
			INSTRUCTORS
			

			
			

			MSI instructors have a rich and 
  diverse background, with tenure in such organizations as the US Coast 
  Guard, CIA, Justice Department, State Department Office of 
  Counterterrorism, FBI, Navy SEALs, and Army Special Forces. Their private 
  sector experience includes tenure with leading organizations such as 
  SeaLand, CSX, Princess and PO Cruises, Renaissance Cruises, and other 
  major cargo and container shipping companies and international 
  seaports.
			
			
		
		
		
		

			COURSES 
			OFFERED
			

			
			

	

			
		PFSO / CSO / SSO Certification Course
			

	

			
			Waterborne Security Operations 
			Management Course
			
			

	

			
			Waterborne Security Operations 
			Operators Course
			
			

	

			
			Maritime Physical Security 
			Management
			
			

	

			
			Managing the Port Facility Guard 
			Force
			
			

	

			
		C-TPAT/CSI/BASC  Program Managers 
			Course
			

	

			
			Maritime Threat  
			Intelligence Collection
			
			

	

			
			Maritime Threat  Intelligence Collection 
  for   
			   Law Enforcement Personnel
			
			

	

			
			Legal Implications of the ISPS 
			Code  MTSA
			
			

	

			
			Underwater Threat 
			Mitigation
			
			

	

			
	Weapons of Mass 
		Destruction  Ports  Ships


			

			
			

			
			

			FUTURE 
			COURSES
			
			

			
			


			
			 
  Container Security: Protecting 
			the Supply Chain
			
			


			
			Passenger Ferry Security 
			Operations  Mgt Course
			
			


			
			Security Train-the-Trainer 
			Certification Program
			
			

	

			
			Cruise Line Security  Managers 
			Course (3-day)
			
			

	

			
		Cruise Line Security  Executive Course (1-day)
			

	

			
			Maritime Terrorism  Crime
			
			

	

			
			Port Employee MTSA Certification 
			Program
			
			

	

			
			MODU Security Operations Course
			
			

	

			
			Information Security for Port 
			 Ship Operators
			
			

	

			
			Security for HAZMAT  CDC 
			Materials
			
			

	

			
	   Florida Port Security Operations:Complyingwith

   State Law 311.12 
  

			

			
			

			
			

			COURSE 
			LOCATIONS
			

			
			
			The Maritime Security Institute offers all of its 
  training courses in southern Florida, or by arrangement, worldwide. These classes can be customized to 
			your particular training requirements or you can let our experts analyze 
			your operations and recommend the most cost effective way to meet the 
			specifications of the International Ship  Port Security (ISPS) Code 
			and the Maritime Transportation Security Act (MTSA) of 
			2002.
		
	


	
		

		FOR MORE 
			INFORMATION
			

			BG 
			Kenneth P. Bergquist, Academic Dean
			
			

	http://www.maritimesecurityinstitute.org

			

		+1.954.567.8995
			

	[EMAIL PROTECTED]

			
			
		
	










 

+++
TO BE REMOVED FROM OUR MGN EMAIL DISTRIBUTION LIST, VISIT:
HTTP://WWW.MGN.COM/[EMAIL PROTECTED]=159109=PQTUW2D64AUX6J3TQLW6 
YOU CAN ALSO CONTACT US DIRECTLY AT:
MARITIME GLOBAL NET
PO BOX 207
BRISTOL, RHODE ISLAND 02809 USA
TEL: (401)247-7780
FAX: (401)247-7756

THANK YOU.

Code: PQTUW2D64AUX6J3TQLW6

Continental African Briefing Volume 2, No. 2

2005-01-13 Thread jamboweb . newsletter
Title: Jamboweb - Continental African Briefing Volume 2, No. 2





 
 
   
			 
 
 
	 Continental African Briefing Volume 2, No. 2
		
		
	

			
 
 
	
  
		
		 

  
		
		AFRICA IN BRIEF
		
		Politics
		
		A PEACE PROCESS THREATENS TO UNRAVEL
		Peace efforts in northern Uganda have been on a precarious footing in recent days, this after a bid to have a comprehensive ceasefire signed on Jan. 31 proved unsuccessful. 
		Source: IPS 
		Suggested book: A Complicated War: The Harrowing of Mozambique, by William Finnegan
		
		more in Politics...
		
		
		Conflict and Security
		
		SUDAN PEACE TREATY ENDS CONFLICT BUT FEARS REMAIN
		The United Nations peacekeeping mission in the troubled eastern region of the Democratic Republic of the Congo (DRC) has found evidence that former Mayi-Mayi militiamen have killed seven civilians, a soldier and perhaps another six former officers from a rival militia... 
		Source: Christian Aid
		Suggested book: 
		The African Stakes of the Congo War
		, by John F. Clark
		
		more in Conflict and Security...
		
		
		Advertisement
		
		
		
		Analysis  Reports
		
		FOR ZAMBIA'S STREET KIDS, THE OUTLOOK IS BLEAK
		The festive season is traditionally a time of giving in Zambia, where the streets of the capital  Lusaka  are awash with people caught up in the buying frenzy that characterizes the end of the year. Accordingly, the city's street children are tracking the mood of consumers as carefully as any economist. 
		Source: IPS Africa
		Suggested books: 
		A History of South Africa, Third Edition, 
		by Leonard Monteath Thompson
		
		more in Analysis and Report...
		
		
		Social Issues
		
		LABOUR CALLS GENERAL STRIKE OVER DEMOCRACY DEMANDS
		An upbeat New Year's message by Prime Minister Themba Dlamini has been rebutted by Swaziland's pro-democracy groups, with labour unions calling for a general strike in January to protest lavish royal spending and a controversial draft constitution...
		Source: IRIN
		Related books:
		 The Root Causes of Sudan's Civil Wars, 
		 by Hamilton Johnson
		
		more in Social Issues...
		
		
		
		UP COMING EVENTS
		
		International Workshop on Africa Water Laws
		The programme will include presentation of papers, group and plenary discussions addressing perspective such as formal water law and existing informal water law governing small-scale rural water uses...
		Date: Jan 26, 2005 
		Organization: International Water Management Institute 
		
		
		7th Congress of the World Association of Theoretically Oriented Chemists
		The theme of the conference is "Modelling Structure and Reactivity", and a number of internationally renowned speakers have confirmed their presence to deliver talks.
		Date: Jan 16, 2005
		Organization: World Association of Theoretically Oriented Chemists 
		
		
	

			
		
  
	
	 
		 
			
			 
 
	 BOOKS AND RESOURCESSouth Africa : The Complete Guide to the Cities, Winelands, and Game Parks, with Zimbabwe and Botswana (2nd Edition) 
	Author: by Andrew Barbour
	
	Zimbabwe the Beautiful
	Author: Peter Joyce
	
	Learn more about Africa
		
	
	
	
	 
	 		Sponsored Links
			
			
		
	
	
	
	 
	 		Looking for a new job? Click here to take a look at HotJobs.com and post your resume.
		
	
	
	 
	 		Tell a friend
		
	
	
	 
	 		Africa Exchange Blog
		
	
	
	 
	 		Become a Marketing & Referral partner
		
	
	
	 
	 		Become a content partner
		
	

			
			
		
	
 
	
 
   
			 
 
	 
	

			
 
 
 
   
			 
 
	 
		
		Thank you for your continued interest in Jamboweb.com products and services. 
		
		TreeLife Solutions, LLC, 410 Breckinridge Square, Leesburg, VA 20175
		
	

			
 
	
	
   
			 
 
	 
	 
		
		We apologize if you have received this newsletter by mistake. If you'd rather not receive the Jamboweb.com newsletter, click here to unsubscribe.
		
		
	

			
 
 









Delivery Notification: Delivery has failed

2005-01-13 Thread Internet Mail Delivery
This report relates to a message you sent with the following header fields:

  Message-id: [EMAIL PROTECTED]
  Date: Fri, 14 Jan 2005 06:51:09 +0200
  From: cypherpunks@minder.net
  To: [EMAIL PROTECTED]
  Subject: hello

Your message cannot be delivered to the following recipients:

  Recipient address: [EMAIL PROTECTED]
  Reason: SMTP transmission failure has occurred
  Diagnostic code: smtp;550 Error: Mail filters have determined that your email 
appears to be infected with the Bagle virus.
  Remote system: dns;zen.estpak.ee (TCP|84.95.2.7|17811|194.126.101.100|25) 
(MX-R-4 ESMTP)

Reporting-MTA: dns;i_mtaout3.012.net.il (tcp-daemon)

Original-recipient: rfc822;jack@shareware.ee
Final-recipient: rfc822;jack@shareware.ee
Action: failed
Status: 5.0.0 (SMTP transmission failure has occurred)
Remote-MTA: dns;zen.estpak.ee (TCP|84.95.2.7|17811|194.126.101.100|25)
 (MX-R-4 ESMTP)
Diagnostic-code: smtp;550 Error: Mail filters have determined that your email
 appears to be infected with the Bagle virus.
Return-path: cypherpunks@minder.net
Received: from tcp-daemon.i_mtaout3.012.net.il by i_mtaout3.012.net.il
 (HyperSendmail v2004.12) id [EMAIL PROTECTED]; Fri,
 14 Jan 2005 06:53:40 +0200 (IST)
Received: from minder.net ([212.116.164.11])
 by i_mtaout3.012.net.il (HyperSendmail v2004.12)
 with ESMTP id [EMAIL PROTECTED] for [EMAIL PROTECTED];
 Fri, 14 Jan 2005 06:53:33 +0200 (IST)
Date: Fri, 14 Jan 2005 06:51:09 +0200
From: cypherpunks@minder.net
Subject: hello
To: [EMAIL PROTECTED]
Message-id: [EMAIL PROTECTED]
MIME-version: 1.0
Content-type: TEXT/PLAIN; CHARSET=WINDOWS-1255
Content-transfer-encoding: QUOTED-PRINTABLE
X-Priority: 3
X-MSMail-priority: Normal




PFSO / CSO / SSO Course 7-9 FEB 2005

2005-01-13 Thread seasecure
Title: Untitled






	
		

		Port Facility Security Officer Certification Course
			

			
			

			February 
  7-9, 2005
			
			

			Fort 
  Lauderdale, Florida
			USA

			MTSA 
  / ISPS CODE COMPLIANT TRAINING FOR
			
			

			PFSO / CSO / SSO  PORT FACILITY / VESSEL 
  MANAGEMENT PERSONNEL  
		 

			
			

			
			

			U.S.
			AND INTERNATIONAL LAW REQUIRES TRAINING 
  
			FOR ALL MARITIME PERSONNEL WITH SECURITY 
		DUTIES
		
	



	
		
  
			WHO 
			WE ARE
  
			The Maritime Security Institute 
  (MSI), a not-for-profit educational institution, is the leading maritime 
  security training center in the United States. Our programs are unique in 
  both the unmatched expertise and experience of our instructors, and the 
  hands-on opportunities to put new security skills to work. Students at MSI 
  come from dozens of countries and represent governments, ports, and 
  shipping companies. We train law enforcement, government officials, 
  military, ship and port operations personnel, RSOs, Designated 
  Authorities, and maritime security executives.
			
			

			OUR 
			PROGRAMS
			

			
			

			MSI security programs combine 
  best industry practices from experienced instructors in government and 
  the private sector. Where applicable, these programs meet or exceed the 
  requirements set forth in the IMOs model Training Programs for compliance 
  with the International Ship  Port Facility Security (ISPS) Code or 
  the US Maritime Transportation Security Act (MTSA).
			See our 
		website listed below for more information.


			

			
			
			

			
			

			OUR 
			INSTRUCTORS
			

			
			

			MSI instructors have a rich and 
  diverse background, with tenure in such organizations as the US Coast 
  Guard, CIA, Justice Department, State Department Office of 
  Counterterrorism, FBI, Navy SEALs, and Army Special Forces. Their private 
  sector experience includes tenure with leading organizations such as 
  SeaLand, CSX, Princess and PO Cruises, Renaissance Cruises, and other 
  major cargo and container shipping companies and international 
  seaports.
			
			
		
		
		
		

			COURSES 
			OFFERED
			

			
			

	

			
		PFSO / CSO / SSO Certification Course
			

	

			
			Waterborne Security Operations 
			Management Course
			
			

	

			
			Waterborne Security Operations 
			Operators Course
			
			

	

			
			Maritime Physical Security 
			Management
			
			

	

			
			Managing the Port Facility Guard 
			Force
			
			

	

			
		C-TPAT/CSI/BASC  Program Managers 
			Course
			

	

			
			Maritime Threat  
			Intelligence Collection
			
			

	

			
			Maritime Threat  Intelligence Collection 
  for   
			   Law Enforcement Personnel
			
			

	

			
			Legal Implications of the ISPS 
			Code  MTSA
			
			

	

			
			Underwater Threat 
			Mitigation
			
			

	

			
	Weapons of Mass 
		Destruction  Ports  Ships


			

			
			

			
			

			FUTURE 
			COURSES
			
			

			
			


			
			 
  Container Security: Protecting 
			the Supply Chain
			
			


			
			Passenger Ferry Security 
			Operations  Mgt Course
			
			


			
			Security Train-the-Trainer 
			Certification Program
			
			

	

			
			Cruise Line Security  Managers 
			Course (3-day)
			
			

	

			
		Cruise Line Security  Executive Course (1-day)
			

	

			
			Maritime Terrorism  Crime
			
			

	

			
			Port Employee MTSA Certification 
			Program
			
			

	

			
			MODU Security Operations Course
			
			

	

			
			Information Security for Port 
			 Ship Operators
			
			

	

			
			Security for HAZMAT  CDC 
			Materials
			
			

	

			
	   Florida Port Security Operations:Complyingwith

   State Law 311.12 
  

			

			
			

			
			

			COURSE 
			LOCATIONS
			

			
			
			The Maritime Security Institute offers all of its 
  training courses in southern Florida, or by arrangement, worldwide. These classes can be customized to 
			your particular training requirements or you can let our experts analyze 
			your operations and recommend the most cost effective way to meet the 
			specifications of the International Ship  Port Security (ISPS) Code 
			and the Maritime Transportation Security Act (MTSA) of 
			2002.
		
	


	
		

		FOR MORE 
			INFORMATION
			

			BG 
			Kenneth P. Bergquist, Academic Dean
			
			

	http://www.maritimesecurityinstitute.org

			

		+1.954.567.8995
			

	[EMAIL PROTECTED]

			
			
		
	










 

+++
TO BE REMOVED FROM OUR MGN EMAIL DISTRIBUTION LIST, VISIT:
HTTP://WWW.MGN.COM/[EMAIL PROTECTED]=159109=HZP19DPIFI5K2QNWJFDD 
YOU CAN ALSO CONTACT US DIRECTLY AT:
MARITIME GLOBAL NET
PO BOX 207
BRISTOL, RHODE ISLAND 02809 USA
TEL: (401)247-7780
FAX: (401)247-7756

THANK YOU.

Code: HZP19DPIFI5K2QNWJFDD

Re: Ridge Wants Fingerprints in Passports

2005-01-13 Thread Justin
On 2005-01-13T17:46:39-0800, Bill Stewart wrote:
 
 He's smearing his sticky fingerprints all over everything else,
 and now he wants them in our passports?
 Oughtta learn to keep his hands to himself.

Fine with me if the first person to get a new biometric passport gets
Ridge's fingers as part of the deal -- to verify for the world that the
prints are valid.

-- 
War is the father and king of all, and some he shows as gods, others as men; 
some he makes slaves, others free. -Heraclitus 53



Re: Florida man faces bioweapon charge

2005-01-13 Thread Justin
On 2005-01-13T17:48:13-0800, Eric Cordian wrote:
 
 RAH pastes:
 
  She said that on at least one occasion he showed her something he had
  purchased via the Internet and expressed concern that if their cat
  inadvertently ate enough of it, the cat would die, according to the
  affidavit.
 
 Obviously this news story is the grand prize winner in an innuendo 
 contest.

The article also neglects to mention FEDERAL AGENCIES' pet KILL ratio.
I'm not sure about cats specifically, but dog killing is quite popular.

  The FBI is still investigating who sent two letters that contained ricin in
  2003 through the U.S. postal system. Those letters contained threats and
  complaints about labor regulations in the trucking industry.

Evidently the kid was in possession of Envelopes of Mass Destruction as
well as castor beans, guns, and books.  Envelopes!  Everyone knows that
civilized people communicate via instant/text message or email (insofar
as they are distinct).  We have no need for these ENVELOPES, which as
well as being used to send toxins to KILL LAW-ABIDING TAXPAYERS also
cause untold annual economic damage from paper-cut-caused hospital
visits.

  In 1978, Georgi Markov, a Bulgarian writer and journalist in London, died
  after a man attacked him with an umbrella that had been rigged to inject a
  ricin pellet under his skin.
 
 And WTF does this have to do with the guy with the castor beans?

I spot the beginnings of yet another war.  Please excuse me while I go
bury my umbrellas.  PATRIOTS use hooded raincoats.  We have no NEED for
barbaric and dangerous implements like UMBRELLAS.

 Looks like Ricin Theatre has joined Anthrax Theatre in the armory of 
 Weapons of Mass Deception.

You forgot the guns!  The GUNS!  Those terrible and bloody implements of
death ARE totally unnecessary!  Never mind that they're PERFECTLY LEGAL
and they don't make ricin (excuse me, castor beans) any more deadly.  He
still had guns!

-- 
War is the father and king of all, and some he shows as gods, others as men; 
some he makes slaves, others free. -Heraclitus 53



Searching with Images instead of Words

2005-01-13 Thread Eugen Leitl

Link: http://slashdot.org/article.pl?sid=05/01/13/184226
Posted by: CmdrTaco, on 2005-01-13 20:29:00

   from the blessing-for-those-who-can't-spell dept.
   [1]johnsee writes A computer vision researcher by the name of Hartmut
   Neven is [2]developing ingenious new technology that allows the
   searching of a database by submitting an image, for example, off a
   mobile phone camera. Imagine taking a photo of a street corner to find
   out where you are, or the photo of a city building to see its history

   IFRAME: [3]pos6

References

   1. http://www.sandstorming.com/
   2. http://www.thefeature.com/article?articleid=101341ref=5147543
   3. 
http://ads.osdn.com/?ad_id=2936alloc_id=13732site_id=1request_id=9329739

- End forwarded message -
-- 
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net


pgpekTCZ1owyS.pgp
Description: PGP signature


Re: Tasers for Cops Not You

2005-01-13 Thread Major Variola (ret)
At 01:20 PM 1/8/05 -0800, John Young wrote:
However, Taser claims the civilian version is effective
only to 15 feet while the LE version will explose a heart
at 20 feet. And, Taser says accidental deaths caused
by the shock would have happened to those sick persons
anyway.

Well, yes, homicidal cops say the perps were begging for it,
learning such talk from the president and up to the one who
has fun with joy toy tsunamis.

John: A taser is  50 KV and microamps.  Not fun but it
doesn't cause fibrillation.  (Incoherent cardiac muscle
contraction - no pulse.)  I now work for a company that
makes defibrillators.  It takes a few 10s of Joules through
the heart to fibrillate, typically 100-200 J for an adult,
during a certain critical window during the sinus rhythm.
Our gizmos discharge ~200 uF at up to 2 KV to defibrillate
a fibrillating heart, which will also fibrillate if administered to a
healthy heart
at the wrong time, as I said.  That's up to 40 amps.  (Through the pads
a chest is 20-200 ohms, typically 50.)  Without
a defibrillator the person is dead, CPR or not.

That's the science.  As far as pigs wanting slaves/peasants/citizens
to be unarmed, well, agree.  As far as choke holds on negroes,
excessive force on cocaine-stimulated citizens, etc goes, I have
nothing to bear on this.  As far as banning lethal and nonlethal
weapons for use by all but state minions, we agree.

When tasers, mace, body armor, .50 cal or lesser rifles are outlawed,
well, you know
the rest.  (Of course mace is best applied with q-tips to the eyes of
sitting protesters.  And the mercenaries in Iraq do fine with
pillowcases and
12V batteries.)

Though heavens fall, let justice be done.






Re: [IP] The DNA round-up on Cape Cod (fwd from dave@farber.net

2005-01-13 Thread Major Variola (ret)
The Beast doesn't know who licked the stamp.  A fiducial sample is what
they want.

In Calif, they could merely arrest you for a bogus charge to have the
right
to sample your families DNA as carried by you.

Schwarzenegger is not Austrian accidentally.

GATTACA was optimistic.




At 06:02 PM 1/10/05 +0100, Eugen Leitl wrote:
I live in the town of Truro on Cape Cod about 4 or 5 months out of the
year.
This past week, the Truro has been on the national news because the
local
police are attempting to obtain DNA samples of all men of the town in
order
to solve a three-year old murder case.  Here are a couple of the
articles
that give the details of what is going on in this DNA round-up:

   To Try to Net Killer, Police Ask a Small Town's Men for DNA
   http://www.nytimes.com/2005/01/10/national/10cape.html

   Truro abuzz over 'swab' DNA testing
   http://www.capecodonline.com/cctimes/truroabuzz7.htm

I am headed back to my Truro house later this week.  If I am approached
by
the police to provide a DNA sample for their round-up of Truro males, I
am
planning to refuse.  However, I just realized that I already gave a DNA

sample to the Town of Truro recently.  I paid my property tax bill to
the
Truro tax collectors office two weeks ago.  My DNA is on the tax
payment
envelope that I licked.

Envelopes are apparently a good source of DNA material according to
this
article:

   DNA on Envelope Reopens Decades-old Murder Case
   http://abclocal.go.com/wabc/news/wabc_052103_dnaarrest.html

Richard M. Smith
http://www.ComputerBytesMan.com



-- End of Forwarded Message


-
You are subscribed as [EMAIL PROTECTED]
To manage your subscription, go to
  http://v2.listbox.com/member/?listname=ip

Archives at:
http://www.interesting-people.org/archives/interesting-people/

- End forwarded message -
--
Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE
http://moleculardevices.org http://nanomachines.net

[demime 1.01d removed an attachment of type application/pgp-signature]




expectation of privacy

2005-01-13 Thread Major Variola (ret)
At 09:01 PM 1/12/05 +0100, Eugen Leitl wrote:

It's time to blow the lid off this no expectation of privacy in
public places argument that judges and law enforcement now spout out
like demented parrots in so many situations.

A court refused to hear the case of a man accused of owning unlicensed
pharmaceuticals when a pig entered a locked loo.  The loo was part
of a gas station; the attendant called the pigs.  A prostitute was
in there too, with him, and the area rife with folks of that profession,
FWIW,
which is nothing.  But the court held reduced expectation of privacy in
a public loo.

One imagines much fun with anonymous calls when state employees
are in such places, but this does not temper our disgust, or desire for
karma
with extreme prejudice.








Re: Google Exposes Web Surveillance Cams

2005-01-13 Thread Major Variola (ret)
At 02:20 PM 1/9/05 -0600, Riad S. Wahby wrote:

I love how all of the coverage leaves out the actual search strings, as

if it's hard to discover what they are at this point.

I'm similarly annoyed that articles omit the URLs of terrorist web
sites,
being forced to check ogrish.com, even if I couldn't read the language.

But government and its presses know best.





To Tyler Durden

2005-01-13 Thread Major Variola (ret)
TD,
I just watched _Fight Club_ so I finally get your nym.  (Here in
low-earth geosynchronous orbit, content is delayed).  Cool.
I had thought it was your real name.

Maj. Variola (ret)




RE: To Tyler Durden

2005-01-13 Thread Tyler Durden
WHAT THE FUCK ARE YOU TALKING ABOUT! THIS IS MY REAL NAME GODDAMMIT!!!
Wait, I'm getting sleepy...gotta take a nap...
-TD


From: Major Variola (ret) [EMAIL PROTECTED]
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
Subject: To Tyler Durden
Date: Wed, 12 Jan 2005 19:02:14 -0800
TD,
I just watched _Fight Club_ so I finally get your nym.  (Here in
low-earth geosynchronous orbit, content is delayed).  Cool.
I had thought it was your real name.
Maj. Variola (ret)



Re: Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire

2005-01-13 Thread John Kelsey
From: Justin [EMAIL PROTECTED]
Sent: Jan 10, 2005 7:35 PM
To: [EMAIL PROTECTED]
Subject: Re: Ready, Aim, ID Check: In Wrong Hands, Gun Won't Fire

..
Some gun accidents are suicides reported as such to avoid
embarrassment to the family.  

I've heard this from other people, too--some in reasonably good positions to 
know how such things were reported.  And there's surely some ambiguity between 
fatal accidents caused by doing something really stupid and intentional 
suicides.  

..

--John



Re: Ridge Wants Fingerprints in Passports

2005-01-13 Thread Bill Stewart
He's smearing his sticky fingerprints all over everything else,
and now he wants them in our passports?
Oughtta learn to keep his hands to himself.


Bill Stewart  [EMAIL PROTECTED] 



Blue Iraq: Local Experts in Global Communications

2005-01-13 Thread R.A. Hettinga
I expect a few cypherpunks will know the founder of blueiraq...

Cheers,
RAH
(who wonders who's running rediraq.com... ;-))
--

http://blueiraq.com/iraq/index.html
Blue Iraq

Local Experts in Global Communications
about Blue Iraq | Products and Services | Technology and Networks | Iraq
FAQ |  Support | Contact Us

Iraq FAQ

 FAQs

 

Technology and Internet in Iraq:
 Frequently Asked Questions

We have found that there are a few common questions about Internet access
and general IT in Iraq. By answering these questions here, we can try to
improve understanding inside and outside Iraq of the unique environment
which exists here.
 What kind of Internet connection does Iraq have?
Iraq does not have one main Internet connection. As of 2003, Iraq has had
no landline or microwave relay connections to the outside world. All
international communications, and most domestic communications, have been
via satellite. Domestic wireline or wireless networks rely on satellite
access for international connectivity. Many businesses use small satellite
terminals (VSATs) to communicate directly with the outside world.
 Who uses Internet service in Iraq?
The US Department of Defense, DoD and Redevelopment Contractors, Western
expatriates, and the Iraqi Government are major users of Internet and
international communications services in Iraq. Additionally, many NGOs,
universities, and Iraqi businesses are establishing internet connectivity.
One of the major purchasers of Internet service in the domestic Iraqi
market is for small, entrepreneurial Internet Cafes.
Why is service in Iraq more expensive than in other parts of the world?
Satellite capacity is usually more expensive than terrestrial connectivity,
due to the high costs of satellites and limited RF capacity available on a
given transponder. However, satellites also have very high reliability, and
are the only practical means of deploying communications rapidly over a
large territory without building extensive (and vulnerable) fixed
infrastructure. Modern shared IP-optimized Ku-band VSAT systems can be very
affordably priced compared to older satellite communications systems.

 Communications companies operating in Iraq also face higher operating
costs than similar communications companies operating elsewhere in the
world, due to security concerns and lack of infrastructure.
 Can I use Voice over IP (VoIP) over satellite?
Generally VoIP will require special settings to work reliably over
satellite. We currently only support our iDirect network and dedicated
satellite capacity for VoIP applications, and all supported VoIP
communications must go through our VoIP gateway to ensure traffic
prioritization and quality of service.
Your competitors offer some systems which are cheaper, and can use Iraqis
to do the installation. Why should I use Blue Iraq?
Our prices are actually lower than most other satellite systems, based on
service capacity and performance -- unlike a lot of companies, we specify
our systems based on observed performance in Iraq, not a fanciful design
specification.

 Due to the security situation, it is very difficult for Iraqis to get onto
US bases to do installations. We do use trained Iraqis for off-base
installs in some cases. However, in many cases, we have found that having
US engineers do the world results in the most effective solution with the
highest overall quality. An inexpensive system which does not work reliably
is no bargain.
Why should I purchase a system from an Iraq-focused network operating
company, vs. one of the satellite owners or major networks?
One word: presence. Blue Iraq has trained personnel on the ground in Iraq
who are familiar with the environment. Many other vendors have never set
foot in Iraq, and rely on local contract installation companies to do
installations. Non-Iraq based companies also do not have personnel in Iraq
do provide after-sale support if anything goes wrong. In a place like Iraq,
many things can go wrong.
Isn't it too dangerous to operate a business in Iraq? The news shows
bombings and kidnappings every day?
Iraq can be a very dangerous place. However, we take all reasonable
precautions to minimize this risk. Our personnel travel with appropriate
levels of security, and will refuse to go to sites which are not adequately
secured. We primarily operate in conjunction with the US military, and rely
on US military helicopter transport between secure bases. All personnel
have appropriate protective gear and training.
Why does the military use commercial internet services? Doesn't it have
enough satellite capacity of its own?
The US military makes extensive use of commercial products and systems for
a wide variey of non-tactical purposes, as commercial systems often provide
the cheapest, best, and most cost-effective solution to a given problem.
Commercial satellite networks are extensively used for Morale, Welfare, and
Recreation (MWR) purposes, administrative and support systems, and more.
Do you do 

Re: Florida man faces bioweapon charge

2005-01-13 Thread Eric Cordian
RAH pastes:

..

 Steven Michael Ekberg, 22, had at least 83 castor beans and other
 byproducts consistent with the manufacture of ricin in his possession, the
 FBI said.

..

 They said they also found, in a cardboard box in Ekberg's room, glass vials
 containing white granules suspected of being husk-less, chopped castor
 beans, a byproduct of the manufacture of ricin.

I'm confused here.  Is possession of castor beans possession of ricin?  
Is possession of chopped castor beans possession of ricin?

 He then picked up another container and stated words to the effect, This
 would make you really sick, the source allegedly told authorities.

I could pick up a container of Drano, and make the same commment.  Big 
deal.

 The source told police that Ekberg had two books containing information on
 how to make poisons from household chemicals and plants, according to the
 affidavit.

Still legal to own, as far as I know.

 His mother, Theresa Ekberg, told the FBI that he has been treated for
 depression, according to the affidavit.

 His mother also told authorities that in the past her son had possessed
 some chemicals.

 She said that on at least one occasion he showed her something he had
 purchased via the Internet and expressed concern that if their cat
 inadvertently ate enough of it, the cat would die, according to the
 affidavit.

Obviously this news story is the grand prize winner in an innuendo 
contest.

 The FBI is still investigating who sent two letters that contained ricin in
 2003 through the U.S. postal system. Those letters contained threats and
 complaints about labor regulations in the trucking industry.

 In 1978, Georgi Markov, a Bulgarian writer and journalist in London, died
 after a man attacked him with an umbrella that had been rigged to inject a
 ricin pellet under his skin.

And WTF does this have to do with the guy with the castor beans?

Looks like Ricin Theatre has joined Anthrax Theatre in the armory of 
Weapons of Mass Deception.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
Do What Thou Wilt Shall Be The Whole Of The Law