Re: Re: About 5yr. log retention

2000-12-06 Thread John Young
Jim Choate blindly wrote: What law? The law was quoted just below the citation we provided: 18 USC 2703(f). The news report quotation exactly matches what the law says about preservation. Not that you'll read it but here it is again: Here's the source for news story report about data

Re: IBM Uses Keystroke-monitoring in NJ Mob Case (was Re:

2000-12-06 Thread John Young
From reading the docs at EPIC, it is not clear that the FBI actually got data from the planted device. The USA application dated June 8 asks for a supplemental order of extension of time in order to break in and remove the device. This need was caused by Scarfo's unexpected removal of the

Carnivore Report

2000-11-22 Thread John Young
We offer an HTML version of the Carnivore technical review report released yesterday by DoJ (without appendices): http://cryptome.org/carnivore.rev.htm (164KB text, 8 images) The original PDF report is 9.4MB, 121 pages. One notable conclusion about Carnivore's shortcomings and why its

CJ v. 9th Circuit

2000-11-17 Thread John Young
CJ has lofted a mortar at the 9th Circuit Court of Appeals for dismissing his appeal for the right to self-representation, and has requested a rehearing which, if granted will take place shortly: http://cryptome.org/cej-v-ca9.htm This provides a legal analysis of the dismissal, new precedents

Re: Bob's Bank. Hi, I'm Bob. Just slip it in this pocket here.

2000-11-17 Thread John Young
Docket as of November 16, 2000 7:16 pm Page 9 Proceedings include all events. 3:00cr539-ALL USA v. Flowers, et al 11/15/00 1 INDICTMENT by AUSA Jen E Ihlo, Melissa Schraibman. Counts filed against Richard George Flowers (1) count(s) 1, 2-3,

Re: Schneier: Why Digital Signatures are not Signatures (was Re: CRYPTO-GRAM, November 15, 2000)

2000-11-16 Thread John Young
What is not clear in Schneier's several critiques of crypto weaknesses is what will be made of them to advance the burgeoning interests of law enforcement and the compsec industry in cybercrime control measures. While it may not be Bruce's intent to provide support for "the legitimate interests

Re: Predicting a succesful society

2000-11-14 Thread John Young
Jim Choate wrote: It get's off it's home planet permanently. [and more.] Yes, thank you very much, indeed, absolutely. A suave-tailored and barbered and elocuted gentleman who runs UK's Internet Watch aroused the anti-censorship crowd with the query "should we allow an image of a penis up an

Re: CIA Website Update

2000-11-14 Thread John Young
Yes, the 16,000 declassified Chile/Allende overthrow docs are available: http://foia.state.gov From files of the State Dept, CIA, FBI, National Security Council, NARA, DIA, NSA, et al. A bounty of patriotic gore and defense/intel pork thanks to Dr. Strangelove and Dickster. And a new

Re: ZKS, government regulation, and new privacy laws

2000-11-02 Thread John Young
Interesting take, Declan. Which highlights how most of natsec-developed technology entering the market gets the benefit of dual-use regulation. Janus the model. Self-policing is a kissing cousin of self-censorship, both pretend at keeping the fuzz out of private affairs by pretending to be doing

Re: NZ: Sweeping powers for spy agencies

2000-10-30 Thread John Young
This report is consistent with DoJ's advocacy of a US national, as well as international, system for police agencies to collect and share criminal justice information, and to do so while there is no law against using advanced technology for this purpose. As noted here recently, see a

Re: CIA in Oregon, Intelink

2000-10-28 Thread John Young
. Mueller and Mr. S, Would you please confirm that there is a CIA facility in Bend, OR, and that the terms CPIC/West and ISTAC are applicable to it? Also, could you clarify whether CIA's ISTAC is related to the ISTAC of the Bureau of Export Administration? Thanks very much, John Young 212-873

Re: CIA in Oregon, Intelink

2000-10-28 Thread John Young
Mail to [EMAIL PROTECTED] bounced. Rather a bounce message was returned from bendnet.com, and surely cloaks delivery of the message. And the cc to [EMAIL PROTECTED] would not even leave this mailer. So it seemed. But the window glass shivered. Spookery is awesome.

CIA in Oregon, Intelink

2000-10-25 Thread John Young
Would anyone in the Oregon area know about a CIA organization acronymed ISTAC? Here's the NIC entry, which includes a CIA rep in Bend, OR. Note that the other CIA rep used only a last name initial. CIA (ISTAC-DOM) 1820 Electric Avenue

RE: CIA in Oregon, Intelink

2000-10-25 Thread John Young
Yes, the BXA ISTAC is familiar since I'm on its mailing list. The CIA ISTAC is a different dog. And it was the Oregon rep which surprised, not the Vienna, VA and DC addresses. Why Oregon? Intel, Microsoft, In-Q-tel, or another bedmate helping equip and run Intelink? Intelink is reportedly

Re: export reg timewarp? (Re: RC4 source as a literate program)

2000-09-03 Thread John Young
Adam Back wrote: The US export regulations no longer prevent export of crypto. PGP exported binary copies of PGP from US websites, as now do many other companies. Crypto source is exported also from numerous web sites. I don't follow why all the discussion talking as if ITAR and EARs were

Re: Re: Bugged Promis in Canada... wheee

2000-08-28 Thread John Young
Tim May wrote: This story has been around for at least a dozen years. Not saying it isn't factual, just that it's been around since the late 80s. I've heard Bill Hamilton being interviewed many times over the years, as well as the claims of Elliot Richardson, his lawyer, and so on.

PGP ADK Bug Fix

2000-08-26 Thread John Young
Cryptome offers the ADK bug-fix PGP Freeware 6.5.8: http://jya.com/pgpfree/PGPFW658Win32.zip (7.8MB) http://jya.com/pgpfree/PGPFW658Mac_sit.bin (5.6MB) Analyses of the ADK fix and any others most welcome.

Superpower Invites Attack

2000-08-22 Thread John Young
Secretary of Defense Cohen in a speech yesterday to the VFW about how the US "Superpower" name invites "asymmetrial attacks," stated: What we have to do is intensify our anti-proliferation types of measures to cut down on the technology that so many of our friends or allies or

Re: MPAA Wins New York DeCSS Case

2000-08-18 Thread John Young
Kaplan's overt prejudice from day one surely diminished respect for federal justice. I had not seen such behavior before in New York. And when the prejudice was flaunted increasingly during trial it occurred to me that he was diabolically aiming to show just how biased the DMCA is toward the

Feds Bust Kazakstan Hackers

2000-08-15 Thread John Young
We offer the unsealed FBI complaints which led to the recent bust of two Kazakstan "hackers" accused of extortion for breaking into Bloomberg's computer system and asking for $200,000 to tell how it was done: http://cryptome.org/bloomberg-bust.htm The complaints describe how the defendants

Jim Bell Msg: So, what's happening?

2000-08-15 Thread John Young
Forwarding a cypherpunks@toad. com message: - From: "jim bell" [EMAIL PROTECTED] To: [EMAIL PROTECTED], "Darcy Bender" [EMAIL PROTECTED] Subject: So, what's happening? Date: Thu, 10 Aug 2000 15:49:04 -0700 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1"

Re: France and Crypto Schizophrenia

2000-08-11 Thread John Young
In a Guardian article yesterday Duncan Campbell reviewed the multi-nation effort to coordinate law enforcement snooping and access to all forms of telecommunications through the ILETS program. A point he makes is that the operation is run by LE officials without participation of government

MI6 Ciphers and Comsec

2000-07-29 Thread John Young
Stephen Dorril's 1999 book on MI6 (just out in the US) alludes to several ciphers and communications security methods whose names he has disguised on legal advice, presumably to avoid violation of Britain's Official Secrets Act. We would appreciate receiving information on these ciphers and

Re: JYA down?

2000-07-24 Thread John Young
The sites have not been yanked, though they are nearly inaccessible. The server of both sites is still clogged by massive hits, and it shuts down automatically when it reaches its limit. Our ISP, Digital Nation, a Verio branch, worked yesterday to restart, but after restart the hits soon

RE: FBI Requests File Removal

2000-07-21 Thread John Young
Special Agent James Castano said the call he made to me was his first for matter like that. He was friendly, open, answered all my questions the best he could, and asked others if he didn't know. We chatted about the DeCSS trial here in NY. His unit he said deals with computer crime, IP

Flakes

2000-07-10 Thread John Young
NYT reports today on a patent for a system which samples the plume of dead skin flakes which rise from humans to identify carriers of bombs, weapons, contraband, dirty money, narcotics, chem-bio warfare ingredients, nuclear materials, and other hazardous material. The devices could be set up

Re: CIA pdf

2000-06-21 Thread John Young
The PDF files are the secret CIA report on the overthrow of Mossadeq in 1953, made available on the New York Times web site: http://www.nytimes.com/library/world/mideast/041600iran-cia-index.html Redactions of names in the report of Iranian participants were made digitally by the NYT, and I

SilentRunner

2000-06-14 Thread John Young
The Wall Street Journal reports today on Raytheon's snooping program, SilentRunner, which is claimed to be the best yet for snooping on computer users and for being detectable by ordinary computer users. It utilizes a TA algorithm to search for suspicious patterns as well as keywords. Crypto in

SilentRunner Resend

2000-06-14 Thread John Young
The Wall Street Journal reports today on Raytheon's snooping program, SilentRunner, which is claimed to be the best yet for snooping on computer users and for being undetectable by ordinary computer users. It utilizes a TA algorithm to search for suspicious patterns as well as keywords. Crypto in

RE: Trusting HavenCo [was: Sealand Rant] CPUNK

2000-06-11 Thread John Young
Lucky: I agree with Peter in that Sealand may wish to consider adding a nuke to their budget of small arms. Nuclear powers are the only sovereigns that command any kind of respect from the other members in the club. Kick that N up to BC arms so the start-up budget is doable. The cost of a

Cpunk Subscribers

2000-06-04 Thread John Young
Here today's tally of CDR subscribers, by way of "who" command: 841 [EMAIL PROTECTED] 115 [EMAIL PROTECTED] 50 [EMAIL PROTECTED] 31 [EMAIL PROTECTED] 8 [EMAIL PROTECTED] - [EMAIL PROTECTED] - "who" disabled - sunder.net - "cypherpunks" not recognized - [EMAIL

Re: Did MI5 finally kill John Young?

2000-05-12 Thread John Young
Cryptome is down due to a glitch in switching to a new server. Should be up again today, unless this is MI5 sucking your brain.

MPAA v. 2600 Defendants' Reply Brief

2000-05-04 Thread John Young
by: Harold Abelson Andrew Appel Chris DiBona Bruce Fries Martin Garbus John Gilmore Robin Gross Lewis Kurlantzick Eben Moglen Matt Pavlovich Bruce Schneier Barbara Simons Frank Stevenson Dave Touretsky David Wagner John Young

CIA on GAK

2000-04-23 Thread John Young
Greg Broiles has provided two FOIA documents from the CIA in September 1996 to Clinton and Gore on the US's plan to promote key recovery encryption worldwide, to assure continued US dominance of the cryptography market and to fulfill the wishes of intel and law enforcement of the US and

MI5 Asks FBI Help

2000-04-23 Thread John Young
The UK Sunday Times reports today: http://www.the-times.co.uk/news/pages/sti/2000/04/23/stinwenws01014.html "MI5 has requested the assistance of the American Federal Bureau of Investigation in tracking down and erasing copies of the document from the internet. Officials are

Re: Looking for Jim Bell

2000-04-14 Thread John Young
Now how in hell can it be determined if Jim is wolfing for the feds to bring in the lambs? What the hell has he been fabricating for Jessica Stern and Declan, and whose names are they taking to report on and testify against next, quoting Jim's amazingly selective memory? What the hell is this

Re: Re: Crypto-Anarchy/Anarcho-Capitalist Errors in Understanding

2000-04-12 Thread John Young
Jim, Your understated messages, following quotes of those by Declan McCullagh and Tim May, are the best ever, I think. I am dumbfounded by their profundity, subtlety, eloquence, impenetrability, clarity, wit, generosity, amazing gracefulness. How do you do it? The purity of an unmarked canvas.

Why Crypto Fails Privacy

2000-04-11 Thread John Young
During a break in FSE yesterday Ross Anderson offered comments on why crypto could not protect privacy against weak comprehensive systems security. Much of what he said was confirmed by the news report today on new Dutch privacy invasion law for intelligence and law enforcement. He stated

Re: Republican Leadership's dot.gov Scam?

2000-04-09 Thread John Young
"We" is .gov victims. Who aren't going to take it anymore. We are going to assure that governments do the right thing, wither away. Enough is enough. We are certain that if good people insist on government wither that will make it happen. We are not naive. We know that government works hard

Net Libel

2000-04-01 Thread John Young
The NYT today reports on the UK's Demon Internet paying a wad of money to Laurence Godfrey, a physicist allegedly libeled on a news group, soc.culture.thai, first on January 12, 1997, there again later, and subsequently on uk.legal. Phill Hallam-Baker is mentioned as having been required in

Net Moles

2000-04-01 Thread John Young
France's Le Monde yesterday had a long piece on Echelon which closed with speculation about alleged ex-spies going into commerce around the world as moles and reporting back economic espionage to the agencies which sent them out for this purpose under guise of downsizing, or as with undercover

Cellular Modem TEMPEST

2000-03-27 Thread John Young
Last summer World Net Daily published an article on a hacker group called "Hong Kong Blondes" in which the hackers claimed that compromising electromagnetic emanations from computer equipment could be acquired up by cellular modems. Can cellular modems be used for this purpose? If so, what is

French InfoSec Initiative

2000-03-16 Thread John Young
Yesterday France initiated a new information security administration whose aim is to counter the panoply of digital threats involving economic espionage, cryptology, TEMPEST, snooping, PW snarfing, DDoS, Echelon and a few that are new to me: http://cryptome.org/dcssi.htm It recounts a bit

RE: Brands on privacy

2000-03-05 Thread John Young
Austin Hill wrote: If within these functions, there exists a market demand for payor and payee anonymous digital cash, then you can be assured that some ambitious startup will license from us and attack that market. I would appreciate being placed as close to the front of that applicant list

Re: Vin McLellan Charles Mudd On Denial of Service Attacks

2000-03-04 Thread John Young
Phill wrote: I know enough people who were involved in the previous investigations of Mitnick to corroborate the points I made, namely that Mitnick is a nasty piece of work and a pathetic loser rather than the harmless chap his defence attorney would have people believe. Watching Mitnick

Re: Vin McLellan Charles Mudd On Denial of Service Attacks

2000-03-04 Thread John Young
It's worth pondering what demonization and criminalization may evolve from close study of the early Cypherpunk archives made availalble a few days ago by Ralph Seberry : http://lanesbry.com/cypherpunks After a fews days of reading those remarkable exchanges, it would be a surprise if they

Re: The price of bread in Romania

2000-03-03 Thread John Young
Robert Hettinga wrote: Well, it seems that we're arguing about word definitions, which is a most stupid thing to do. Sorry if you feel that way. I was just going for a laugh, and not really arguing with you at all... Charlie Trie said the same in Congress a few days ago, when explaining how

Cylink Doc

2000-03-03 Thread John Young
A provocative document on Cylink has been put on Cryptome today: http://cryptome.org/cylinked.htm Confirmations, supplements and rebuttals welcomed. Bill Crowell has been invited to give Cylink's response. Excerpt: 41. Which United States agency recruited Cylink to work with the KGB

Re: Alternative To Handguns Package (fwd)

2000-02-25 Thread John Young
Randolph Graham wrote: 1) If someone comes to rape you, Kill them. 2) If someone comes to rob you, Kill them 3) If someone comes to carjack you, Kill them 4) If someone comes to murder you, Kill them. 5) If someone comes to abduct you, Kill them. After you have killed these five, your life

Re: MS Funded/Founded by NSA?

2000-02-19 Thread John Young
Very well, your rebuttal would be an informative addition to the file, if you don't object. To pick up on a couple of your points: There should be a sustained burst of activity from Europe on the Echelon affair as EuroParl deliberates on it, guided by the four 1999 Echelon reports prepared by

CCIA Comments on DMCA

2000-02-17 Thread John Young
Sent to the Copyright Office today: DMCA Comments by Computers Communications Industry Association [Excerpt from: http://cryptome.org/dmca-ccia.htm] "The Computer Communications Industry Association (CCIA) strongly supported ratification and implementation of the World Intellectual

Re: Re: why worry?

2000-02-16 Thread John Young
Tim May wrote: Millions in America need killing. This is taken out of the property is theft context, still it rings true as if eternal oracle. Some want more customers, some want fewer social leeches, some want more slaves for their life style, some want fewer vote thieves and more dead

Kadaffi Report

2000-02-14 Thread John Young
We offer the 1995 secret UK report on the plot to overthrow Kadaffi reported in Britain Saturday: http://cryptome.org/qadahfi-plot.htm

MPAA Anti-Piracy Invite

2000-02-08 Thread John Young
Cryptome got a demand letter from the MPAA Anti-Priacy Unit yesterday to remove DeCSS as well as to immediately perform other unnatural acts: http://cryptome.org/dvd-mpaa-ccd.htm A number of responses to the letter have come in which might be of interest here: