It is likely that a principal reason for the new NSA system is
to be able to more efficiently spy on its users, as with intelink,
siprnet and niprnet -- and our own beloved Internet whose
users and hackers know not what is being logged.
Counterintelligence has become a more important function
et me know if you have any
questions.
Jeff
-
To: Gordon Jeff TIGTA [EMAIL PROTECTED]
From: John Young [EMAIL PROTECTED]
Subject: Bell trial schedule
Date: Fri, 9 Mar 2001 10:15 -0500
:
:
Jeff,
Thanks for the information.
Could you find out if I can buy a transcript of my grand jury
I've written up notes on the Bell grand jury experience,
a bit too long, too entrapping in this tar pit, to post here:
http://cryptome.org/jdg-gje.htm
Others have told me about being warned by Robb London
about perjury and self-incrimination during testimony. Lawyers
say this is standard, but
or visit. Consider me a target for indictment, hanging in
the wind, a warning to others, a Kafka character, PR
for LO.
Do not bite "John Young" bait.
This morning I testified before a Grand Jury in
Western Washington District Court, Seattle, which
is investigating Jim Bell for interstate stalking
of federal officials.
The testimony concerned what I knew about alleged
CIA employee Mueller and Jim's alleged gathering of
personsal information
William Jennings McCullagh wrote:
But I get paid by the word for mine, generally speaking.
Those are speaking words did you not say a few days ago,
now worth more than wired fool's nuggets. Who's your agent
for priceless yarp, and what's her cut? These questions are
aimed at learning how to
This, from David Wagner on Cryptography, is most informative:
In a paper on side channel cryptanalysis by John Kelsey, Bruce Schneier,
Chris Hall, and I, we speculated on possible meanings of NONSTOP and HIJACK:
[...]
It is our belief that most operational cryptanalysis makes use of
Rush steps into a bucket of:
This is not true. I know Jim in person.
Rush, get ready for a subpoena. Better, to plead, I don't
know anybody or anything that will not incriminate me.
Jim didn't say that, just one time, and from that came
the CDR mark of entrapment and forthwith acting on
According to the Jim Bell court docket of January 11:
1. Innocent victim Jim (via attorney Robert Leen) has
made motions:
1a. To suppress (unknown what).
1b. To dismiss the indictment.
1c. To continue the trial date.
1d. To change venue.
1e. To represent himself.
Though AUSA Robb has
Joel McNamara first told me about NONSTOP and its commonly
associated classified codeword, HIJACK, both somehow related
to Tempest.
When you do a search on either of them you get hundreds
(or 1000s) of hits for the generic terms "non-stop" and "hi-jack"
but few entries for the codewords, and
We've completed transcription of the subpoena and attachments:
http://cryptome.org/jdb-subpoena.htm
The Information for Grand Jury Witnesses says,
"The witness is required to answer all questions asked,
except to the extent that a truthful answer to a question
would tend to
Today at 4:30 PM two Treasury agents, Tom Jack and Matthew
Mc Whirr, served me a Subpoena to Testify Before Grand Jury,
in US District Court of Western Washington, Seattle, WA, on
January 25, 2001, 9:00 AM. Robb London, AUSA, is the
applicant.
The agents asked no questions except to verify
Jim burnes wrote:
How would you know if it was sent by him unless it had a digital signature
that you are willing to testify in court was know to belong to him and
had not been comprimised?
Right. Nor could I know that "Jim Bell" who's was posting to cpunks
is Jim Bell or a Jim Bell being run
Steven Levy writes:
Here is a link to some sites for a book tour:
http://www.penguinputnam.com/stevenlevy/tour.htm
Not on there for some reason is a reading/discussion at Microsoft's Mountain
View (CA) campus on Jan 12 at 3:30 p.m. that's open to the public. Another
public event is Jan. 16
A furnace makes heat, a boiler makes steam or hot
water. Many small buildings have a boiler that does
all three by combing components in a single unit.
Large buildings have three separate units, and more
for specialized tasks.
In New York City, there is an important distinction between
cellar
From: "Levy, Steven" [EMAIL PROTECTED]
To: 'John Young' [EMAIL PROTECTED]
Date: Thu, 4 Jan 2001 15:40:50 -0500
:
Hi, John. Can you do me a favor and spread the word around
that I'll be talking about CRYPTO at the Upper West Side Barnes
and Noble (82nd and Broadway) on TUESDAY (Jan
After reading Steve Levy's "Crypto," two points he covers
still intrigue: the true origin of public key encryption and the
true origin of cypherpunks. Intriguing, to this reader at least,
is the link between the two in fostering public use of crypto --
and whether there was covert involvement
Here's an informative site on underground structures --
tunnels, military bases, caves, temples, unidentifiables --
and the technology, epistimology and religion of them:
http://www.sauderzone.com/ubtlinks.htmhttp://www.sauderzone.com/ubtlinks.htm
Nearly all of the world's most secret (and
Somebody wrote in response to Bill Stewart's message:
At least under Windows 98 you can "Start", "Programs",
"Accessories", "System Tools", "System Information", and
list the "System Hooks". Most keyboard sniffers are
installed as "hooks". If you see a new one, you may
have a
Correction of first URL:
On December 6 Cryptome published a list of some 2600 names
of alleged "CIA sources," provided by a person named Gregory
Douglas, who claims to have received the list from Robert Crowley,
once Deputy Director of Operations for the CIA:
http://cryptome.org/cia-2619.htm
Here's the source for the data preservation requirement:
http://www.usdoj.gov/criminal/cybercrime/COEFAQs.htm
Preservation is not a new idea; it has been the law in
the United States for nearly five years. 18 U.S.C. 2703(f)
requires an electronic communications service provider to
"take
Bear surmised:
The "Needs Killing" verbiage you see here, I think, is mostly from
people who, correctly or not, tend to think in terms either of there
not being any governments, or in terms of the government being so
ineffective that they are effectively in an ungoverned state.
Hold on.
A family member says Jim Bell was arrested last night
when he went out to the store.
The person also said the feds were searching for e-mail Jim
sent around August 18.
I can't prove the family member is that and not a fisher.
What's missing from the inventory is material which would
disclose other ongoing investigations.
And how to tell which material is of genuine interest and
which is listed for camouflage. The public docs never
disclose everything but are often used to misinform.
Jim is being used as bait.
We offer the US Digital Millennium Copyright Act Final
Rule on Access Control Circumvention:
http://cryptome.org/dmca102700.txt (149KB)
An excerpt on why there will be no exemption for
circumventing access to DVDs by tools such
as DeCSS:
http://cryptome.org/dmca-dvd.htm (15KB)
The
Declan,
Pounding out the hundreds of deathless reports
you've done did you dream it would be the Gore
My Lai that got you onto the NYTimes opinion
page today?
What has happened lately in the killing judges world?
There was a spate of cases and a couple of jokers got
vised, but any recently?
I mean in the US, not elsewhere it's acceptable culling.
Is Jeff still here hoping for another gold star, is Tim still being
bullseyed for "he's gone too far,
NSA released today on its Web site two reports on
its reorganization, one by an external team of 27 page,
another of 76 pages by an internal team. Both are big
PDF files. We have converted the first to HTML:
http://cryptome.org/nsa-reorg-et.htm (77KB)
Here is an excerpt:
"We interviewed
The bibliography of another NSA reorganization report
released today lists several entries under "Unified
Cryptologic Architecture" as well as a "U.S. Cryptologic
Strategy - Preparing for the 21st Century."
There is also a citation of "SINEWS - GCHQ Modernization
and Change Program."
We would
Somebody noted that the overwritten portions of the
Carnivore review proposal in PDF can be easily lifted:
http://cryptome.org/carnivore-mask.htm
Nothing secret revealed, just the names of the participants,
a few home addresses and phone numbers, and their security
ratings. Still, that DoJ
Tim May wrote:
A mighty fine statement.
I'll add that too often requests come this way to learn
who is downloading docs from Cryptome. Sorry, we
say, no way to know that unless you got an in with
our ISP's legal department who we understand from
reading the newspapers has an informal
Judge Kaplan finds for MPAA in 93-page decision:
http://www.nysd.uscourts.gov/courtweb/pdf/D02NYSC/00-08117.PDF
Quote:
p. 89
VI. Conclusion
In the final analysis, the dispute between these parties is
simply put if not necessarily simply resolved.
Plaintiffs have invested huge sums over
Th message below was sent to [EMAIL PROTECTED]
It looks as though mail to toad is not being forwarded to
the CDR or is being blocked. Jim Bell sent a long
message to toad this morning, and there was a
post from Cindy Cohn about Bernstein's case.
Is mail from toad being blocked permanently, and
[23 July 2000]
Dear Mr.Young
I am very grateful to receive helpful tips from you.
From unknown reason, now it takes quite a long time to access your site.
It also seems to be impossible for me to download the files.
I am just an ordinary computer-user and unable to find solutions.
Mr.
Forgot to include Noda's e-mail address:
[EMAIL PROTECTED]
Both have jya and cryptome have been inaccessible
though all files are still there. According to our ISP,
Digital Nation (a Verios subsidiary), the dedicated
server became overloaded and shut down. Both sites
should be up soon,
We appreciate your offer, and Bob Hettinga's, but at the
moment Cryptome is doing okay. We suggest contributions
go to EFF which is bleeding rivers of money right now on
the DeCSS cases.
Regards,
John
I misspelled Special Agent Dave's last name; someone
has sent the correct spelling, not that that should be used
to bullseye Dave, for chrissakes, or his mangy gerbils. I, for
one, got no personal beef with him, the gerbils. Shit I get
worse threats from our hyperbandit building super, who can
Yes, it is contradictory that Cryptome will publish the
PSIA names but not those of the FBI Special Agents.
The senior Special Agent said at the end of the
conversation that if his and the other agent's names
were published "you are going to be in real trouble."
Until that time both agents
The venture could be a great place to run a sting
by the global TLAs.
As with global banks and private security firms -- especially
those set up by ex-TLAs.
The cost of staying in business globally is to accept
secret watchers of transactions -- whether in telecom,
finance, arms, education,
Cryptome has submitted a statement to Judge Kaplan in opposition
to MPAA's motion for a protective order to bar revelation of deposition
materials. A hearing is scheduled for June 6.
http://cryptome.org/mpaa-v-2600-cs.htm
Anyone can submit a statement in opposition to or in support
of the
What about net vigilantism reported today in a US national
newspaper, about the volunteers who are helping the fuzz
track down miscreants?
One gang goes after kiddie peds, another virii, another
after "unethical" hackers. In the name of keeping the Net
safe for those who promote it. Smells like
41 matches
Mail list logo