Russell Nelson wrote:
Forwarded with permission (the permission being the short quote below,
the message being the long one). I don't have a copy of the
traceroute, but it definitely showed packets going from Washington DC
to NYC through Paris.
This[1] is similar to the argument made to
I know they got one guy here in the States for sending a death threat
across state boundaries (went over the internet out of state, then back
in again).
--
Mike Stay
Programmer / Crypto guy
AccessData Corp.
mailto:[EMAIL PROTECTED]
Today's front-page article in the LA Times may be of special interest
to folks following the proposed Cyberspace Electronic Security Act.
Lawyers Seek to Reopen Cases Over Wiretapping
http://www.latimes.com/HOME/NEWS/STATE/UPDATES/lat_wiretap990924.htm
Hundreds of criminal convictions dating
I've recently aquired a video camera (bttv-based 3Com Bigpicture, can
do 30 fps true color 640x480). I've noticed that under certain
conditions images can become quite noisy. Does anyone has data on the
amount and quality of the entropy produced?
I wouldn't mind any pointers to sources
According to the AP, the Defense Department has opened a new center to help
deal with electronic evidence in case of serious crimes involving the military
(http://www.nytimes.com/aponline/a/AP-Defense-Computer-Crime.html). Among
their purported capabilities are being able to track hackers
Ray Hirschfeld writes:
Seriously, my first reaction was that no crime had been committed, but
upon re-examining the export regulations I'm not so sure. Perhaps the
fact that the packets are explicitly destined for the US is considered
"adequate precaution" against unauthorized transfer.
From: Russell Nelson [EMAIL PROTECTED]
Date: Fri, 24 Sep 1999 16:22:51 -0400 (EDT)
Dick St.Peters writes:
Remember that traceroute I sent you showing packets from me to a site
near here going by way of Europe? I was telling a friend about that
this morning, and he asked an
Now here's an interesting question that no one
has so far addressed:
What happens if you happen to come home early and
catch these guys in the act? They can't reveal
their methods; so do you just "disappear"?
Think about it: (1) they've already decided you
are guilty of something, and are
--- begin forwarded text
Date: 24 Sep 1999 15:20:12 -
From: RProcess [EMAIL PROTECTED]
To: [EMAIL PROTECTED], [EMAIL PROTECTED],
[EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Selective DoS Attacks: Remailer Vulnerabilities
CC: [EMAIL PROTECTED]
Newsgroups: