RE: WSJ: NSA Computer Upgrade

2001-03-14 Thread John Young
It is likely that a principal reason for the new NSA system is to be able to more efficiently spy on its users, as with intelink, siprnet and niprnet -- and our own beloved Internet whose users and hackers know not what is being logged. Counterintelligence has become a more important function

Bell Trial Schedule

2001-03-09 Thread John Young
et me know if you have any questions. Jeff - To: Gordon Jeff TIGTA [EMAIL PROTECTED] From: John Young [EMAIL PROTECTED] Subject: Bell trial schedule Date: Fri, 9 Mar 2001 10:15 -0500 : : Jeff, Thanks for the information. Could you find out if I can buy a transcript of my grand jury

Bell Grand Jury Experience

2001-01-28 Thread John Young
I've written up notes on the Bell grand jury experience, a bit too long, too entrapping in this tar pit, to post here: http://cryptome.org/jdg-gje.htm Others have told me about being warned by Robb London about perjury and self-incrimination during testimony. Lawyers say this is standard, but

Re: Bell Grand Jury

2001-01-27 Thread John Young
or visit. Consider me a target for indictment, hanging in the wind, a warning to others, a Kafka character, PR for LO. Do not bite "John Young" bait.

Bell Grand Jury

2001-01-25 Thread John Young
This morning I testified before a Grand Jury in Western Washington District Court, Seattle, which is investigating Jim Bell for interstate stalking of federal officials. The testimony concerned what I knew about alleged CIA employee Mueller and Jim's alleged gathering of personsal information

Re: oppose nomination of John Ashcroft

2001-01-20 Thread John Young
William Jennings McCullagh wrote: But I get paid by the word for mine, generally speaking. Those are speaking words did you not say a few days ago, now worth more than wired fool's nuggets. Who's your agent for priceless yarp, and what's her cut? These questions are aimed at learning how to

Re: NONSTOP Crypto Query

2001-01-19 Thread John Young
This, from David Wagner on Cryptography, is most informative: In a paper on side channel cryptanalysis by John Kelsey, Bruce Schneier, Chris Hall, and I, we speculated on possible meanings of NONSTOP and HIJACK: [...] It is our belief that most operational cryptanalysis makes use of

Re: CDR: RE: RE: Rapid5 Networks, Inc.

2001-01-18 Thread John Young
Rush steps into a bucket of: This is not true. I know Jim in person. Rush, get ready for a subpoena. Better, to plead, I don't know anybody or anything that will not incriminate me. Jim didn't say that, just one time, and from that came the CDR mark of entrapment and forthwith acting on

Bell Update

2001-01-15 Thread John Young
According to the Jim Bell court docket of January 11: 1. Innocent victim Jim (via attorney Robert Leen) has made motions: 1a. To suppress (unknown what). 1b. To dismiss the indictment. 1c. To continue the trial date. 1d. To change venue. 1e. To represent himself. Though AUSA Robb has

Re: NONSTOP Crypto Query

2001-01-12 Thread John Young
Joel McNamara first told me about NONSTOP and its commonly associated classified codeword, HIJACK, both somehow related to Tempest. When you do a search on either of them you get hundreds (or 1000s) of hits for the generic terms "non-stop" and "hi-jack" but few entries for the codewords, and

Re: Bell Case Subpoena

2001-01-09 Thread John Young
We've completed transcription of the subpoena and attachments: http://cryptome.org/jdb-subpoena.htm The Information for Grand Jury Witnesses says, "The witness is required to answer all questions asked, except to the extent that a truthful answer to a question would tend to

Bell Case Subpoena

2001-01-08 Thread John Young
Today at 4:30 PM two Treasury agents, Tom Jack and Matthew Mc Whirr, served me a Subpoena to Testify Before Grand Jury, in US District Court of Western Washington, Seattle, WA, on January 25, 2001, 9:00 AM. Robb London, AUSA, is the applicant. The agents asked no questions except to verify

Re: Bell Case Subpoena

2001-01-08 Thread John Young
Jim burnes wrote: How would you know if it was sent by him unless it had a digital signature that you are willing to testify in court was know to belong to him and had not been comprimised? Right. Nor could I know that "Jim Bell" who's was posting to cpunks is Jim Bell or a Jim Bell being run

Steven Levy Book Tour

2001-01-07 Thread John Young
Steven Levy writes: Here is a link to some sites for a book tour: http://www.penguinputnam.com/stevenlevy/tour.htm Not on there for some reason is a reading/discussion at Microsoft's Mountain View (CA) campus on Jan 12 at 3:30 p.m. that's open to the public. Another public event is Jan. 16

Re: More half-baked social planning ideas

2001-01-04 Thread John Young
A furnace makes heat, a boiler makes steam or hot water. Many small buildings have a boiler that does all three by combing components in a single unit. Large buildings have three separate units, and more for specialized tasks. In New York City, there is an important distinction between cellar

Steven Levy Talks Crypto

2001-01-04 Thread John Young
From: "Levy, Steven" [EMAIL PROTECTED] To: 'John Young' [EMAIL PROTECTED] Date: Thu, 4 Jan 2001 15:40:50 -0500 : Hi, John. Can you do me a favor and spread the word around that I'll be talking about CRYPTO at the Upper West Side Barnes and Noble (82nd and Broadway) on TUESDAY (Jan

Levy's Crypto

2000-12-29 Thread John Young
After reading Steve Levy's "Crypto," two points he covers still intrigue: the true origin of public key encryption and the true origin of cypherpunks. Intriguing, to this reader at least, is the link between the two in fostering public use of crypto -- and whether there was covert involvement

Underground

2000-12-25 Thread John Young
Here's an informative site on underground structures -- tunnels, military bases, caves, temples, unidentifiables -- and the technology, epistimology and religion of them:    http://www.sauderzone.com/ubtlinks.htmhttp://www.sauderzone.com/ubtlinks.htm Nearly all of the world's most secret (and

Re: keyboard loggers.

2000-12-19 Thread John Young
Somebody wrote in response to Bill Stewart's message: At least under Windows 98 you can "Start", "Programs", "Accessories", "System Tools", "System Information", and list the "System Hooks".  Most keyboard sniffers are installed as "hooks".  If you see a new one, you may have a

FBI Sniff Correction

2000-12-15 Thread John Young
Correction of first URL: On December 6 Cryptome published a list of some 2600 names of alleged "CIA sources," provided by a person named Gregory Douglas, who claims to have received the list from Robert Crowley, once Deputy Director of Operations for the CIA: http://cryptome.org/cia-2619.htm

Re: About 5yr. log retention

2000-12-05 Thread John Young
Here's the source for the data preservation requirement: http://www.usdoj.gov/criminal/cybercrime/COEFAQs.htm Preservation is not a new idea; it has been the law in the United States for nearly five years. 18 U.S.C. 2703(f) requires an electronic communications service provider to "take

Re: Jim Bell arrested, documents online

2000-11-24 Thread John Young
Bear surmised: The "Needs Killing" verbiage you see here, I think, is mostly from people who, correctly or not, tend to think in terms either of there not being any governments, or in terms of the government being so ineffective that they are effectively in an ungoverned state. Hold on.

Jim Bell Arrested

2000-11-18 Thread John Young
A family member says Jim Bell was arrested last night when he went out to the store. The person also said the feds were searching for e-mail Jim sent around August 18. I can't prove the family member is that and not a fisher.

Re: Bell's warrant return inventory

2000-11-14 Thread John Young
What's missing from the inventory is material which would disclose other ongoing investigations. And how to tell which material is of genuine interest and which is listed for camouflage. The public docs never disclose everything but are often used to misinform. Jim is being used as bait.

DMCA Final Rule

2000-10-27 Thread John Young
We offer the US Digital Millennium Copyright Act Final Rule on Access Control Circumvention: http://cryptome.org/dmca102700.txt (149KB) An excerpt on why there will be no exemption for circumventing access to DVDs by tools such as DeCSS: http://cryptome.org/dmca-dvd.htm (15KB) The

Declan My Lai

2000-10-22 Thread John Young
Declan, Pounding out the hundreds of deathless reports you've done did you dream it would be the Gore My Lai that got you onto the NYTimes opinion page today?

Killing Judges

2000-10-21 Thread John Young
What has happened lately in the killing judges world? There was a spate of cases and a couple of jokers got vised, but any recently? I mean in the US, not elsewhere it's acceptable culling. Is Jeff still here hoping for another gold star, is Tim still being bullseyed for "he's gone too far,

NSA Releases Reorg Reports

2000-10-17 Thread John Young
NSA released today on its Web site two reports on its reorganization, one by an external team of 27 page, another of 76 pages by an internal team. Both are big PDF files. We have converted the first to HTML: http://cryptome.org/nsa-reorg-et.htm (77KB) Here is an excerpt: "We interviewed

Unified Cryptologic Architecture

2000-10-17 Thread John Young
The bibliography of another NSA reorganization report released today lists several entries under "Unified Cryptologic Architecture" as well as a "U.S. Cryptologic Strategy - Preparing for the 21st Century." There is also a citation of "SINEWS - GCHQ Modernization and Change Program." We would

Carnivore Proposal Unmasked

2000-09-27 Thread John Young
Somebody noted that the overwritten portions of the Carnivore review proposal in PDF can be easily lifted: http://cryptome.org/carnivore-mask.htm Nothing secret revealed, just the names of the participants, a few home addresses and phone numbers, and their security ratings. Still, that DoJ

Re: Editorial: Liberals Packing Heat (fwd)

2000-08-18 Thread John Young
Tim May wrote: A mighty fine statement. I'll add that too often requests come this way to learn who is downloading docs from Cryptome. Sorry, we say, no way to know that unless you got an in with our ISP's legal department who we understand from reading the newspapers has an informal

MPAA Wins New York DeCSS Case

2000-08-17 Thread John Young
Judge Kaplan finds for MPAA in 93-page decision: http://www.nysd.uscourts.gov/courtweb/pdf/D02NYSC/00-08117.PDF Quote: p. 89 VI. Conclusion In the final analysis, the dispute between these parties is simply put if not necessarily simply resolved. Plaintiffs have invested huge sums over

FBI gets new hacking tools - any ideas?

2000-08-11 Thread John Young
Th message below was sent to [EMAIL PROTECTED] It looks as though mail to toad is not being forwarded to the CDR or is being blocked. Jim Bell sent a long message to toad this morning, and there was a post from Cindy Cohn about Bernstein's case. Is mail from toad being blocked permanently, and

Noda Writes

2000-07-23 Thread John Young
[23 July 2000] Dear Mr.Young I am very grateful to receive helpful tips from you. From unknown reason, now it takes quite a long time to access your site. It also seems to be impossible for me to download the files. I am just an ordinary computer-user and unable to find solutions. Mr.

Noda Writes 2

2000-07-23 Thread John Young
Forgot to include Noda's e-mail address: [EMAIL PROTECTED] Both have jya and cryptome have been inaccessible though all files are still there. According to our ISP, Digital Nation (a Verios subsidiary), the dedicated server became overloaded and shut down. Both sites should be up soon,

Re: Terroristically Threatening a DCSB Fundraiser for Cryptome (was RE: John Young, Freedom Fighter Extraordinaire)

2000-07-21 Thread John Young
We appreciate your offer, and Bob Hettinga's, but at the moment Cryptome is doing okay. We suggest contributions go to EFF which is bleeding rivers of money right now on the DeCSS cases. Regards, John

RE: Jim Und Dave?

2000-07-21 Thread John Young
I misspelled Special Agent Dave's last name; someone has sent the correct spelling, not that that should be used to bullseye Dave, for chrissakes, or his mangy gerbils. I, for one, got no personal beef with him, the gerbils. Shit I get worse threats from our hyperbandit building super, who can

Re: FBI Requests File Removal

2000-07-20 Thread John Young
Yes, it is contradictory that Cryptome will publish the PSIA names but not those of the FBI Special Agents. The senior Special Agent said at the end of the conversation that if his and the other agent's names were published "you are going to be in real trouble." Until that time both agents

Re: Sealand rant (pragmas)

2000-06-09 Thread John Young
The venture could be a great place to run a sting by the global TLAs. As with global banks and private security firms -- especially those set up by ex-TLAs. The cost of staying in business globally is to accept secret watchers of transactions -- whether in telecom, finance, arms, education,

Statements on MPAA Motion for Protective Order

2000-06-01 Thread John Young
Cryptome has submitted a statement to Judge Kaplan in opposition to MPAA's motion for a protective order to bar revelation of deposition materials. A hearing is scheduled for June 6. http://cryptome.org/mpaa-v-2600-cs.htm Anyone can submit a statement in opposition to or in support of the

Re: censorship of the unpopular

2000-05-17 Thread John Young
What about net vigilantism reported today in a US national newspaper, about the volunteers who are helping the fuzz track down miscreants? One gang goes after kiddie peds, another virii, another after "unethical" hackers. In the name of keeping the Net safe for those who promote it. Smells like