Jim Choate blindly wrote:
What law?
The law was quoted just below the citation we provided:
18 USC 2703(f).
The news report quotation exactly matches what the law
says about preservation. Not that you'll read it but here it is again:
Here's the source for news story report about data
From reading the docs at EPIC, it is not clear that the FBI actually
got data from the planted device. The USA application dated June 8
asks for a supplemental order of extension of time in order to break
in and remove the device. This need was caused by Scarfo's unexpected
removal of the
We offer an HTML version of the Carnivore technical
review report released yesterday by DoJ (without appendices):
http://cryptome.org/carnivore.rev.htm (164KB text, 8 images)
The original PDF report is 9.4MB, 121 pages.
One notable conclusion about Carnivore's shortcomings
and why its
CJ has lofted a mortar at the 9th Circuit Court of Appeals for
dismissing his appeal for the right to self-representation, and
has requested a rehearing which, if granted will take place
shortly:
http://cryptome.org/cej-v-ca9.htm
This provides a legal analysis of the dismissal, new precedents
Docket as of November 16, 2000 7:16 pm Page 9
Proceedings include all events.
3:00cr539-ALL USA v. Flowers, et al
11/15/00 1 INDICTMENT by AUSA Jen E Ihlo, Melissa Schraibman. Counts
filed against Richard George Flowers (1) count(s) 1, 2-3,
What is not clear in Schneier's several critiques of crypto
weaknesses is what will be made of them to advance the
burgeoning interests of law enforcement and the compsec
industry in cybercrime control measures.
While it may not be Bruce's intent to provide support for
"the legitimate interests
Jim Choate wrote:
It get's off it's home planet permanently. [and more.]
Yes, thank you very much, indeed, absolutely.
A suave-tailored and barbered and elocuted gentleman
who runs UK's Internet Watch aroused the anti-censorship
crowd with the query "should we allow an image of a penis
up an
Yes, the 16,000 declassified Chile/Allende overthrow docs
are available:
http://foia.state.gov
From files of the State Dept, CIA, FBI, National Security
Council, NARA, DIA, NSA, et al. A bounty of patriotic
gore and defense/intel pork thanks to Dr. Strangelove
and Dickster.
And a new
Interesting take, Declan. Which highlights how most of
natsec-developed technology entering the market gets the
benefit of dual-use regulation. Janus the model.
Self-policing is a kissing cousin of self-censorship, both
pretend at keeping the fuzz out of private affairs by pretending
to be doing
This report is consistent with DoJ's advocacy of a US national,
as well as international, system for police agencies to collect
and share criminal justice information, and to do so while there
is no law against using advanced technology for this purpose.
As noted here recently, see a
. Mueller and Mr. S,
Would you please confirm that there is a CIA facility
in Bend, OR, and that the terms CPIC/West and
ISTAC are applicable to it?
Also, could you clarify whether CIA's ISTAC is related
to the ISTAC of the Bureau of Export Administration?
Thanks very much,
John Young
212-873
Mail to [EMAIL PROTECTED] bounced. Rather a
bounce message was returned from bendnet.com,
and surely cloaks delivery of the message.
And the cc to [EMAIL PROTECTED] would not even leave this
mailer. So it seemed. But the window glass shivered.
Spookery is awesome.
Would anyone in the Oregon area know about
a CIA organization acronymed ISTAC?
Here's the NIC entry, which includes a CIA rep
in Bend, OR. Note that the other CIA rep used
only a last name initial.
CIA (ISTAC-DOM)
1820 Electric Avenue
Yes, the BXA ISTAC is familiar since I'm on its
mailing list. The CIA ISTAC is a different dog.
And it was the Oregon rep which surprised, not
the Vienna, VA and DC addresses. Why Oregon?
Intel, Microsoft, In-Q-tel, or another bedmate helping
equip and run Intelink?
Intelink is reportedly
Adam Back wrote:
The US export regulations no longer prevent export of crypto. PGP
exported binary copies of PGP from US websites, as now do many other
companies. Crypto source is exported also from numerous web sites.
I don't follow why all the discussion talking as if ITAR and EARs were
Tim May wrote:
This story has been around for at least a dozen years. Not saying it
isn't factual, just that it's been around since the late 80s. I've
heard Bill Hamilton being interviewed many times over the years, as
well as the claims of Elliot Richardson, his lawyer, and so on.
Cryptome offers the ADK bug-fix PGP Freeware 6.5.8:
http://jya.com/pgpfree/PGPFW658Win32.zip (7.8MB)
http://jya.com/pgpfree/PGPFW658Mac_sit.bin (5.6MB)
Analyses of the ADK fix and any others most welcome.
Secretary of Defense Cohen in a speech yesterday to
the VFW about how the US "Superpower" name
invites "asymmetrial attacks," stated:
What we have to do is intensify our anti-proliferation types
of measures to cut down on the technology that so many
of our friends or allies or
Kaplan's overt prejudice from day one surely diminished
respect for federal justice. I had not seen such behavior
before in New York. And when the prejudice was flaunted
increasingly during trial it occurred to me that he was
diabolically aiming to show just how biased the DMCA
is toward the
We offer the unsealed FBI complaints which led to the recent
bust of two Kazakstan "hackers" accused of extortion for
breaking into Bloomberg's computer system and asking for
$200,000 to tell how it was done:
http://cryptome.org/bloomberg-bust.htm
The complaints describe how the defendants
Forwarding a cypherpunks@toad. com message:
-
From: "jim bell" [EMAIL PROTECTED]
To: [EMAIL PROTECTED], "Darcy Bender" [EMAIL PROTECTED]
Subject: So, what's happening?
Date: Thu, 10 Aug 2000 15:49:04 -0700
MIME-Version: 1.0
Content-Type: text/plain;
charset="iso-8859-1"
In a Guardian article yesterday Duncan Campbell reviewed
the multi-nation effort to coordinate law enforcement snooping
and access to all forms of telecommunications through the
ILETS program. A point he makes is that the operation is
run by LE officials without participation of government
Stephen Dorril's 1999 book on MI6 (just out in the US)
alludes to several ciphers and communications security
methods whose names he has disguised on legal advice,
presumably to avoid violation of Britain's Official Secrets Act.
We would appreciate receiving information on these ciphers
and
The sites have not been yanked, though they are
nearly inaccessible.
The server of both sites is still clogged by massive hits,
and it shuts down automatically when it reaches its
limit. Our ISP, Digital Nation, a Verio branch, worked
yesterday to restart, but after restart the hits soon
Special Agent James Castano said the call he made to me
was his first for matter like that. He was friendly, open, answered
all my questions the best he could, and asked others if he didn't
know. We chatted about the DeCSS trial here in NY. His unit he
said deals with computer crime, IP
NYT reports today on a patent for a system which samples
the plume of dead skin flakes which rise from humans to
identify carriers of bombs, weapons, contraband, dirty money,
narcotics, chem-bio warfare ingredients, nuclear materials,
and other hazardous material. The devices could be set up
The PDF files are the secret CIA report on the overthrow of
Mossadeq in 1953, made available on the New York Times
web site:
http://www.nytimes.com/library/world/mideast/041600iran-cia-index.html
Redactions of names in the report of Iranian participants were
made digitally by the NYT, and I
The Wall Street Journal reports today on Raytheon's
snooping program, SilentRunner, which is claimed to
be the best yet for snooping on computer users and
for being detectable by ordinary computer users. It utilizes
a TA algorithm to search for suspicious patterns as
well as keywords. Crypto in
The Wall Street Journal reports today on Raytheon's
snooping program, SilentRunner, which is claimed to
be the best yet for snooping on computer users and
for being undetectable by ordinary computer users. It utilizes
a TA algorithm to search for suspicious patterns as
well as keywords. Crypto in
Lucky:
I agree with Peter in that Sealand may wish to consider adding a nuke to
their budget of small arms. Nuclear powers are the only sovereigns that
command any kind of respect from the other members in the club.
Kick that N up to BC arms so the start-up budget is doable. The cost of
a
Here today's tally of CDR subscribers, by way of "who" command:
841 [EMAIL PROTECTED]
115 [EMAIL PROTECTED]
50 [EMAIL PROTECTED]
31 [EMAIL PROTECTED]
8 [EMAIL PROTECTED]
- [EMAIL PROTECTED] - "who" disabled
- sunder.net - "cypherpunks" not recognized
- [EMAIL
Cryptome is down due to a glitch in switching to a new
server. Should be up again today, unless this is MI5
sucking your brain.
by:
Harold Abelson
Andrew Appel
Chris DiBona
Bruce Fries
Martin Garbus
John Gilmore
Robin Gross
Lewis Kurlantzick
Eben Moglen
Matt Pavlovich
Bruce Schneier
Barbara Simons
Frank Stevenson
Dave Touretsky
David Wagner
John Young
Greg Broiles has provided two FOIA documents from the
CIA in September 1996 to Clinton and Gore on the US's
plan to promote key recovery encryption worldwide, to
assure continued US dominance of the cryptography
market and to fulfill the wishes of intel and law enforcement
of the US and
The UK Sunday Times reports today:
http://www.the-times.co.uk/news/pages/sti/2000/04/23/stinwenws01014.html
"MI5 has requested the assistance of the American
Federal Bureau of Investigation in tracking down and
erasing copies of the document from the internet.
Officials are
Now how in hell can it be determined if Jim is wolfing
for the feds to bring in the lambs?
What the hell has he been fabricating for Jessica Stern
and Declan, and whose names are they taking to report
on and testify against next, quoting Jim's amazingly
selective memory?
What the hell is this
Jim,
Your understated messages, following quotes of those by
Declan McCullagh and Tim May, are the best ever, I think.
I am dumbfounded by their profundity, subtlety, eloquence,
impenetrability, clarity, wit, generosity, amazing gracefulness.
How do you do it? The purity of an unmarked canvas.
During a break in FSE yesterday Ross Anderson offered
comments on why crypto could not protect privacy against
weak comprehensive systems security. Much of what he
said was confirmed by the news report today on new Dutch
privacy invasion law for intelligence and law enforcement.
He stated
"We" is .gov victims. Who aren't going to take it anymore.
We are going to assure that governments do the right thing,
wither away. Enough is enough. We are certain that if good
people insist on government wither that will make it happen.
We are not naive. We know that government works hard
The NYT today reports on the UK's Demon Internet paying
a wad of money to Laurence Godfrey, a physicist allegedly
libeled on a news group, soc.culture.thai, first on January 12,
1997, there again later, and subsequently on uk.legal.
Phill Hallam-Baker is mentioned as having been required
in
France's Le Monde yesterday had a long piece on Echelon
which closed with speculation about alleged ex-spies going
into commerce around the world as moles and reporting
back economic espionage to the agencies which sent
them out for this purpose under guise of downsizing, or
as with undercover
Last summer World Net Daily published an article on
a hacker group called "Hong Kong Blondes" in which
the hackers claimed that compromising electromagnetic
emanations from computer equipment could be acquired
up by cellular modems.
Can cellular modems be used for this purpose? If so,
what is
Yesterday France initiated a new information security
administration whose aim is to counter the panoply of
digital threats involving economic espionage, cryptology,
TEMPEST, snooping, PW snarfing, DDoS, Echelon and
a few that are new to me:
http://cryptome.org/dcssi.htm
It recounts a bit
Austin Hill wrote:
If within these functions, there exists a market demand for payor and payee
anonymous digital cash, then you can be assured that some ambitious startup
will license from us and attack that market.
I would appreciate being placed as close to the front of that applicant list
Phill wrote:
I know enough people who were involved in the previous investigations
of Mitnick to corroborate the points I made, namely that Mitnick is a nasty
piece of work and a pathetic loser rather than the harmless chap his
defence attorney would have people believe.
Watching Mitnick
It's worth pondering what demonization and criminalization
may evolve from close study of the early Cypherpunk archives
made availalble a few days ago by Ralph Seberry :
http://lanesbry.com/cypherpunks
After a fews days of reading those remarkable exchanges, it would
be a surprise if they
Robert Hettinga wrote:
Well, it seems that we're arguing about word definitions, which is a most
stupid thing to do.
Sorry if you feel that way. I was just going for a laugh, and not really
arguing with you at all...
Charlie Trie said the same in Congress a few days ago, when explaining
how
A provocative document on Cylink has been put on Cryptome
today:
http://cryptome.org/cylinked.htm
Confirmations, supplements and rebuttals welcomed.
Bill Crowell has been invited to give Cylink's response.
Excerpt:
41. Which United States agency recruited Cylink to work
with the KGB
Randolph Graham wrote:
1) If someone comes to rape you, Kill them.
2) If someone comes to rob you, Kill them
3) If someone comes to carjack you, Kill them
4) If someone comes to murder you, Kill them.
5) If someone comes to abduct you, Kill them.
After you have killed these five, your life
Very well, your rebuttal would be an informative addition
to the file, if you don't object.
To pick up on a couple of your points:
There should be a sustained burst of activity from Europe
on the Echelon affair as EuroParl deliberates on it, guided by
the four 1999 Echelon reports prepared by
Sent to the Copyright Office today:
DMCA Comments by Computers Communications Industry
Association
[Excerpt from: http://cryptome.org/dmca-ccia.htm]
"The Computer Communications Industry Association (CCIA)
strongly supported ratification and implementation of the World
Intellectual
Tim May wrote:
Millions in America need killing.
This is taken out of the property is theft context, still it rings true
as if eternal oracle.
Some want more customers, some want fewer social leeches,
some want more slaves for their life style, some want fewer vote
thieves and more dead
We offer the 1995 secret UK report on the plot to
overthrow Kadaffi reported in Britain Saturday:
http://cryptome.org/qadahfi-plot.htm
Cryptome got a demand letter from the MPAA Anti-Priacy Unit
yesterday to remove DeCSS as well as to immediately perform
other unnatural acts:
http://cryptome.org/dvd-mpaa-ccd.htm
A number of responses to the letter have come in which
might be of interest here:
54 matches
Mail list logo