Insider Threat Study:
Illicit Cyber Activity
in the
Banking and Finance Sector
Marisa Reddy Randazzo, Ph.D. Dawn Cappelli
Michelle Keeney, Ph.D. Andrew Moore
Eileen Kowalski CERT® Coordination Center
National Threat Assessment Center Software Engineering Institute
United States Secret Service
At 11:48 AM 9/8/04 -0700, Hal Finney wrote:
Seth Schoen of the EFF proposed an interesting cryptographic primitive
called a hard to verify signature in his blog at
http://vitanuova.loyalty.org/weblog/nb.cgi/view/vitanuova/2004/09/02 .
The idea is to have a signature which is fast to make but slow
At 11:19 AM 9/8/04 -0400, Tyler Durden wrote:
Hum. I wonder. Do you think these secret regulations are communicated
via
secure channels? What would happen if someone decided to send their own
regulations out to all of the local airline security offices rescinding
any
private regs, particularly if
At 11:48 AM 9/8/04 -0700, Hal Finney wrote:
Seth Schoen of the EFF proposed an interesting cryptographic primitive
called a hard to verify signature in his blog at
http://vitanuova.loyalty.org/weblog/nb.cgi/view/vitanuova/2004/09/02 .
The idea is to have a signature which is fast to make but slow
At 11:57 AM 9/7/04 -0400, Sunder wrote:
The answer to that question depends on some leg work which involves
converting the source code to stegetect into hardware and seeing how
fast
that hardware runs, then multiplying by X where X is how many of the
chips
you can afford to build.
A quick perusal
GLENDALE, Calif. - Police arrested a man they said tracked his
ex-girlfriend's whereabouts by attaching a global positioning system to
her car.
Ara Gabrielyan, 32, was arrested
Aug. 29 on one count of stalking and
three
At 08:57 AM 9/3/04 -0400, Tyler Durden wrote:
Well, W did say he'd do whatever is necessary.
I caught the last bit of Bush's rant. The scary
part was him talking about the resurrection of
NYC. Given how his little bubble-brain is addicted
to xianity, and his coterie has geo-political messianic
At 10:55 PM 9/1/04 -0700, Bill Stewart wrote:
Puerto Ricans in the ethnic neighborhoods along the shore
might get uppity and take over the naval base, which everybody knew
had Nuke-u-lur Weapons even though they'd never admit it,
and the naval base might not be able to defend itself against a mob,
At 10:55 PM 9/1/04 -0700, Bill Stewart wrote:
Puerto Ricans in the ethnic neighborhoods along the shore
might get uppity and take over the naval base, which everybody knew
had Nuke-u-lur Weapons even though they'd never admit it,
and the naval base might not be able to defend itself against a mob,
At 01:30 PM 9/1/04 +0200, Nomen Nescio wrote:
Yet we need
to make sure we're not abused too much since sooner or later laws
will catch up with the remailers should abuse sky-rocket.
You need a Bill of Rights that specifies freedom of expression,
and judges that understand it. Since you appear
http://www.thesmokinggun.com/archive/0831041_photostamps_1.html?link=eaf
At 01:30 PM 9/1/04 +0200, Nomen Nescio wrote:
Yet we need
to make sure we're not abused too much since sooner or later laws
will catch up with the remailers should abuse sky-rocket.
You need a Bill of Rights that specifies freedom of expression,
and judges that understand it. Since you appear
http://www.blackboxvoting.org/?q=node/view/77 is up
Seems its due to an intentional, insider job, and not just as
an engineering backdoor (c) Cisco
Consumer Report: Part 2 - Problems with GEMS Central Tabulator
Submitted by Bev Harris on Thu,
We remain concerned about any devices or software that permit listeners
to transform a broadcast into a music library, RIAA spokesman Jonathan
Lamy said.
http://wired.com/news/digiwood/0,1412,64761,00.html?tw=wn_tophead_6
The pigs want to be able to send anonymous messages over
IP or POTS using their emergency 700 Mhz comm system:
http://www.ncs.gov/informationportal/Web_Proxy_Report.doc
http://www.dhs.gov/interweb/assetlibrary/Vendor_Day_List_FIN818.pdf
The following list of companies have expressed an interest in the
US-VISIT System requirement by participating in the Industry Conference
and/or responding to the
sources sought RFI. This list is being provided in an attempt to
JY reports on the Fed nervousness about his publications;
but anyone with a few hundred $ can buy a CDROM or
nicely printed map of the same info.
[listsig: surveillance, 1st amendment, everyone is a reporter]
MAP DETAILS
This 2003/2004 edition of the N. American Natural Gas
System map is the
http://www.blackboxvoting.org/?q=node/view/77 is up
Seems its due to an intentional, insider job, and not just as
an engineering backdoor (c) Cisco
Consumer Report: Part 2 - Problems with GEMS Central Tabulator
Submitted by Bev Harris on Thu,
http://www.psywarrior.com/sexandprop.html
H.M.G.'s secret pornographer
http://www.seftondelmer.co.uk/hmg.htm
http://www.psywarrior.com/sexandprop.html
H.M.G.'s secret pornographer
http://www.seftondelmer.co.uk/hmg.htm
would be, how many
*other* cameras have column 67 disabled? One of every thousand?
And how many thousand cameras were sold?
Pope Major Variola (ret)
At 01:26 PM 8/24/04 -0400, Tyler Durden wrote:
PS: I thought Tyler had nominated himself as leader? :-)
No, almost the opposite. I propose that any 'Cypherpunk' can declare
himself
to be leader and make 'official statements' at any time.
Oh, then you'd be reformed cypherpunk. The orthodoxy is
would be, how many
*other* cameras have column 67 disabled? One of every thousand?
And how many thousand cameras were sold?
Pope Major Variola (ret)
At 01:26 PM 8/24/04 -0400, Tyler Durden wrote:
PS: I thought Tyler had nominated himself as leader? :-)
No, almost the opposite. I propose that any 'Cypherpunk' can declare
himself
to be leader and make 'official statements' at any time.
Oh, then you'd be reformed cypherpunk. The orthodoxy is
At 09:09 PM 8/23/04 -0400, An Metet wrote:
You may laugh but 74% (or whatever is the % who believes Saddam
personally
piloted all 9/11 planes) of americans will believe it.
So Mr. Young is anarchist for all practical purposes and consequences.
And you are all his associates.
While acknowledging
ok, from /., but highly amusing
Meet the Peeping Tom worm
A worm that has the capability to using webcams to spy on users is
circulating across the
Net.
http://www.theregister.co.uk/2004/08/23/peeping_tom_worm/
ok, from /., but highly amusing
Meet the Peeping Tom worm
A worm that has the capability to using webcams to spy on users is
circulating across the
Net.
http://www.theregister.co.uk/2004/08/23/peeping_tom_worm/
Court rejects piracy claims against P2P file-sharing networks
Friday, August 20, 2004 1:05:55 PM ET
New Ratings
NEW YORK, August 20 (New Ratings) A federal appeals court in the
US has declared that the online file-sharing software companies are not
liable
to copyright infringement charges.
At 09:20 AM 8/18/04 -0400, R. A. Hettinga wrote:
Hey, I have an idea! Why don't I write a script crossposting
everything from sci.crypt to cypherpunks! How about a few dozen
other on-topic newsgroups and mailing lists too?
Go ahead. Are you going to reformat them for legibility first, if
At 09:20 AM 8/18/04 -0400, R. A. Hettinga wrote:
Hey, I have an idea! Why don't I write a script crossposting
everything from sci.crypt to cypherpunks! How about a few dozen
other on-topic newsgroups and mailing lists too?
Go ahead. Are you going to reformat them for legibility first, if
Contrary to widespread belief, it was more
likely American voters in Israel, not Florida,
who put George W. Bush in the White
House four years ago a phenomenon that has Kerry's supporters in
Israel vowing to do whatever it takes to make certain that doesn't
happen
again in November.
Those who
At 02:43 AM 8/15/04 +0200, Thomas Shaddack wrote:
On Sat, 14 Aug 2004, Major Variola (ret) wrote:
It was disturbing that, as the bottom fell out of telecom, and
handsets
became commoditized, faceplates and ringtones were highly profitable.
Faceplates are at least made of atoms
We worried about compromized OSes, BIOSes, read last week about
a PNG library bug that lets images run buffer exploits, now CPUs
can be backdoored:
From Scheier's Crypto-gram:
Here's an interesting hardware security vulnerability. Turns out that
it's possible to update the AMD K8 processor
Contrary to widespread belief, it was more
likely American voters in Israel, not Florida,
who put George W. Bush in the White
House four years ago a phenomenon that has Kerry's supporters in
Israel vowing to do whatever it takes to make certain that doesn't
happen
again in November.
Those who
At 02:43 AM 8/15/04 +0200, Thomas Shaddack wrote:
On Sat, 14 Aug 2004, Major Variola (ret) wrote:
It was disturbing that, as the bottom fell out of telecom, and
handsets
became commoditized, faceplates and ringtones were highly profitable.
Faceplates are at least made of atoms
At 05:30 AM 8/14/04 +0200, Thomas Shaddack wrote:
On Fri, 13 Aug 2004, Major Variola (ret) wrote:
Even if you map a particular hash into one of a million known-benign
values, which takes work, there are multiple orthagonal hash
algorithms
included on the NIST CD. (Eg good luck finding values
We worried about compromized OSes, BIOSes, read last week about
a PNG library bug that lets images run buffer exploits, now CPUs
can be backdoored:
From Scheier's Crypto-gram:
Here's an interesting hardware security vulnerability. Turns out that
it's possible to update the AMD K8 processor
At 01:48 AM 8/14/04 +0200, Thomas Shaddack wrote:
Then you have
the forest where every tree is marked and the leprechaun is laughing.
Love that story. But the self-watermarking you later mention is a
problem.
Even if you map a particular hash into one of a million known-benign
values, which
A cool thing for this purpose could be a patch for gcc to produce
unique
code every time, perhaps using some of the polymorphic methods used
by
viruses.
The purpose would be that they do not figure out that you are using
some
security program, so they don't suspect that noise in the file or
At 01:46 PM 8/13/04 -0400, John Kelsey wrote:
From: Major Variola (ret) [EMAIL PROTECTED]
Obvious lesson: Steganography tool authors, your programs
should use the worm/HIV trick of changing their signatures
with every invocation. Much harder for the forensic
fedz to recognize your tools
On Fri, 13 Aug 2004, Thomas Shaddack wrote:
In the world of industrial espionage and divorce lawyers, the FedZ
aren't
the only threat model.
At 03:06 PM 8/13/04 -0400, Sunder wrote:
Right, in which case GPG (or any other decent crypto system) is just
fine,
or you wouldn't be looking for
At 01:48 AM 8/14/04 +0200, Thomas Shaddack wrote:
Then you have
the forest where every tree is marked and the leprechaun is laughing.
Love that story. But the self-watermarking you later mention is a
problem.
Even if you map a particular hash into one of a million known-benign
values, which
Quoth Thomas Shaddack [EMAIL PROTECTED]
Obvious lesson: Steganography tool authors, your programs
should use the worm/HIV trick of changing their signatures
with every invocation. Much harder for the forensic
fedz to recognize your tools. (As suspicious, of course).
It should be enough to
At 10:07 PM 8/13/04 +0200, Thomas Shaddack wrote:
On Fri, 13 Aug 2004, Tyler Durden wrote:
And it seems to me to be a difficult task getting ahold of enough
photos
that would be believably worth encrypting.
Homemade porn?
Your 16 year old son's homemade porn.
[google on Heidl rape; a deputy
At 01:46 PM 8/13/04 -0400, John Kelsey wrote:
From: Major Variola (ret) [EMAIL PROTECTED]
Obvious lesson: Steganography tool authors, your programs
should use the worm/HIV trick of changing their signatures
with every invocation. Much harder for the forensic
fedz to recognize your tools
On Fri, 13 Aug 2004, Thomas Shaddack wrote:
In the world of industrial espionage and divorce lawyers, the FedZ
aren't
the only threat model.
At 03:06 PM 8/13/04 -0400, Sunder wrote:
Right, in which case GPG (or any other decent crypto system) is just
fine,
or you wouldn't be looking for
At 02:11 PM 8/13/04 -0400, Sunder wrote:
If you're suspected of something really big, or you're middle eastern,
then you need to worry about PDA forensics. Otherwise, you're just
another geek with a case of megalomania thinking you're important
enough
for the FedZ to give a shit about you.
A cool thing for this purpose could be a patch for gcc to produce
unique
code every time, perhaps using some of the polymorphic methods used
by
viruses.
The purpose would be that they do not figure out that you are using
some
security program, so they don't suspect that noise in the file or
Quoth Thomas Shaddack [EMAIL PROTECTED]
Obvious lesson: Steganography tool authors, your programs
should use the worm/HIV trick of changing their signatures
with every invocation. Much harder for the forensic
fedz to recognize your tools. (As suspicious, of course).
It should be enough to
Saint John of Cryptome has a particularly tasty link to
http://csrc.nist.gov/publications/drafts.html#sp800-72
which describes the state of the art in PDA forensics.
There is also a link to a CDROM of secure hashes of
various benign and less benign programs that the
NIST knows about. Including a
Al Qaeda operatives rarely travel directly from Point A to Point B.
Instead, they jump from country to country, with each destination
having its own end use and with multiple stops between beginning and
end.
Hey, don't they know that onion-routing was patented by the Navy?
Or that the mix network
With the possibility of earning a $1 billion bounty, however,
professional Bin Laden hunting firms would form, allowing the U.S. to
enlist the efficiency and creativity of the free market in our fight
against Osama.
This is brilliant, worthy of being called channelling Tim M. As it
relies
Saint John of Cryptome has a particularly tasty link to
http://csrc.nist.gov/publications/drafts.html#sp800-72
which describes the state of the art in PDA forensics.
There is also a link to a CDROM of secure hashes of
various benign and less benign programs that the
NIST knows about. Including a
With the possibility of earning a $1 billion bounty, however,
professional Bin Laden hunting firms would form, allowing the U.S. to
enlist the efficiency and creativity of the free market in our fight
against Osama.
This is brilliant, worthy of being called channelling Tim M. As it
relies
Al Qaeda operatives rarely travel directly from Point A to Point B.
Instead, they jump from country to country, with each destination
having its own end use and with multiple stops between beginning and
end.
Hey, don't they know that onion-routing was patented by the Navy?
Or that the mix network
At 04:58 AM 8/6/04 -0700, Sarad AV wrote:
Since they are using symmetric keys, for a network of
'n' nodes, each node need to know the secret key that
they share with the remaining (n-1) nodes.Total number
of symmetric keys that need to be distributed is
[n*(n-1)]/2. Key management is harder when
Re Is Source Code Is Like a Machine Gun?
A better thought experiment would be a numerically controlled machine
and a control tape, which, when the machine is turned on, produces
sculpture that is also a machine gun (or merely the sear for a machine
gun which can be dropped into a semi-automatic
At 04:58 AM 8/6/04 -0700, Sarad AV wrote:
Since they are using symmetric keys, for a network of
'n' nodes, each node need to know the secret key that
they share with the remaining (n-1) nodes.Total number
of symmetric keys that need to be distributed is
[n*(n-1)]/2. Key management is harder when
Why do the long range RF folks always use Yagis? Aren't
Yagis supposed to be fairly broadband? Aren't there
other highly-directional (ie high gain in one direction)
antennae which (simply by virtue of being narrow bandwidth)
would be better?
Or is it that Yagi's broadband-ness allows for more
Re Is Source Code Is Like a Machine Gun?
A better thought experiment would be a numerically controlled machine
and a control tape, which, when the machine is turned on, produces
sculpture that is also a machine gun (or merely the sear for a machine
gun which can be dropped into a semi-automatic
http://www.technologyreview.com/articles/04/08/wo_garfinkel080404.asp
Good article re secure hashing
http://www.technologyreview.com/articles/04/08/wo_garfinkel080404.asp
Good article re secure hashing
At 02:23 AM 8/5/04 +0200, Thomas Shaddack wrote:
The impracticability of breaking symmetric ciphers is only a
comparatively
small part of the overall problem.
Indeed. Following Schneier's axiom, go for the humans, it would not
be too hard to involutarily addict someone to something which the
At 02:23 AM 8/5/04 +0200, Thomas Shaddack wrote:
The impracticability of breaking symmetric ciphers is only a
comparatively
small part of the overall problem.
Indeed. Following Schneier's axiom, go for the humans, it would not
be too hard to involutarily addict someone to something which the
At 10:18 PM 8/3/04 +0100, Ian Grigg wrote:
http://www.thesmokinggun.com/archive/jihad13chap3.html
[Moderator's Note: One wonders if the document on the Smoking Gun
website is even remotely real. It is amazingly amateurish -- the sort
of code practices that were obsolete before the Second World
At 10:18 PM 8/3/04 +0100, Ian Grigg wrote:
http://www.thesmokinggun.com/archive/jihad13chap3.html
[Moderator's Note: One wonders if the document on the Smoking Gun
website is even remotely real. It is amazingly amateurish -- the sort
of code practices that were obsolete before the Second World
At 09:53 PM 8/1/04 -0400, Tyler Durden wrote:
the following statements are officially* fairly cypherpunkinsh:
* Fuck you Variola...I just had a couple of dark Spatens ON TAP. I
therefore
declare that any Cypherpunk is officially authorized to make an
official
Cypherpunk statement, particularly if
At 05:17 PM 8/2/04 +0200, Eugen Leitl wrote:
Assuming I generate a key on a RSA smart card made by GD, what kind of
prestige
track do these people have?
They seem to be pretty secretive, that's not a good sign.
FWIW:
They make the SIMs for T-Mobile (ie Deutsche Telecom AG) so they
are part of
At 02:39 PM 8/2/04 -0400, John Kelsey wrote:
This is silly. They have black budgets, but not infinite ones. Given
their budget (whatever it is), they want to buy the most processing bang
for their buck.
Yes. They can't break a 128 bit key. That's obvious. (if all the
atoms in the
universe
At 05:23 PM 8/1/04 -0400, Tyler Durden wrote:
No, the NSA is probably generations ahead in some areas, but their fabs
aren't much better than what's available commercially.
Yes, upon consideration I agreed, re critical dimensions. That's why I
brought up uneconomically sized chips, and the
At 12:58 PM 8/1/04 -0400, Sunder wrote:
You Al-Qaeda types
hate us for having freedom, right?
You're not taken in by that mularky, are you?
Read the Fatwa. Best summarized by a line from a 'Floyd song,
get your filthy hands off my desert.
Go for the Baltimore/Maryland prep schools. Soft
At 12:58 PM 8/1/04 -0400, Sunder wrote:
You Al-Qaeda types
hate us for having freedom, right?
You're not taken in by that mularky, are you?
Read the Fatwa. Best summarized by a line from a 'Floyd song,
get your filthy hands off my desert.
Go for the Baltimore/Maryland prep schools. Soft
At 05:23 PM 8/1/04 -0400, Tyler Durden wrote:
No, the NSA is probably generations ahead in some areas, but their fabs
aren't much better than what's available commercially.
Yes, upon consideration I agreed, re critical dimensions. That's why I
brought up uneconomically sized chips, and the
At 09:53 PM 8/1/04 -0400, Tyler Durden wrote:
the following statements are officially* fairly cypherpunkinsh:
* Fuck you Variola...I just had a couple of dark Spatens ON TAP. I
therefore
declare that any Cypherpunk is officially authorized to make an
official
Cypherpunk statement, particularly if
At 05:17 PM 8/2/04 +0200, Eugen Leitl wrote:
Assuming I generate a key on a RSA smart card made by GD, what kind of
prestige
track do these people have?
They seem to be pretty secretive, that's not a good sign.
FWIW:
They make the SIMs for T-Mobile (ie Deutsche Telecom AG) so they
are part of
At 02:39 PM 8/2/04 -0400, John Kelsey wrote:
This is silly. They have black budgets, but not infinite ones. Given
their budget (whatever it is), they want to buy the most processing bang
for their buck.
Yes. They can't break a 128 bit key. That's obvious. (if all the
atoms in the
universe
Tyler D asked about how the NSA could be so far ahead.
Besides their ability to make 2 sq. chips at 10% yield (not
something a commercial entity could get away with)
they can also *thin and glue* those chips into say stacks
of 5 thinned die.
2 sq = 4 x performance
5 thinned die with GHz vias = 20
At 12:07 AM 7/29/04 -0500, J.A. Terranson wrote:
On Wed, 28 Jul 2004, Major Variola (ret) wrote:
Did you know that your teeth enamel contain isotope ratios that
encode regions where you might have grown up around age 6?
Yes. I am also aware that tooth enamel has the interesting property
At 12:36 PM 7/29/04 -0400, Tyler Durden wrote:
Remember that the spookfabs don't have to contend with *economics and
yield*.
Damn, this is precisely where I wish Tim May was still around.
We are all just echoes of the voices in his head.
But I did work for a company that owned fabs. And have
At 12:07 AM 7/29/04 -0500, J.A. Terranson wrote:
On Wed, 28 Jul 2004, Major Variola (ret) wrote:
Did you know that your teeth enamel contain isotope ratios that
encode regions where you might have grown up around age 6?
Yes. I am also aware that tooth enamel has the interesting property
At 12:36 PM 7/29/04 -0400, Tyler Durden wrote:
Remember that the spookfabs don't have to contend with *economics and
yield*.
Damn, this is precisely where I wish Tim May was still around.
We are all just echoes of the voices in his head.
But I did work for a company that owned fabs. And have
At 06:44 PM 7/24/04 -0500, J.A. Terranson wrote:
On Sat, 24 Jul 2004, Major Variola (ret) wrote:
There might be blind cypherpunks, we don't discriminate[1],
There Is No We.
touche'
[1] the original phone phreaks were blind,
This is a ridiculous statement, and even worse, leaks information
At 03:52 PM 7/27/04 -0400, Tyler Durden wrote:
Variola wrote...
In the *public* lit.
Well, perhaps but perhaps not. Burst-mode signaling, transceivers, and
networking technology are a good example. If you see DISA, NSA, and
DARPA
all working with the acknoledged experts inthe academic field, and
1. Thanks Declan for pruning my beliefs ---I had actually thought the
younger, stupider, more surrounded by idiots Bush had puked that quote
re Athiests not being 'Merikans. But Googling and your 0-ROI investment
in Lexis-Nexus shows that stupidity is heriditary. But this is why you
are
an
At 09:47 PM 7/23/04 -0500, J.A. Terranson wrote:
What I meant was, Ames and that FBI dude Hansen (sp?), at least the
KGB
got Ames' wife as part of the package, whereas the FBI CI dude
let his wife off as part of the deal he cut. Nice xian that he was,
he
was into strippers.
Aren't we *all*
At 12:40 PM 7/23/04 +0200, Thomas Shaddack wrote:
On Thu, 22 Jul 2004, Major Variola (ret) wrote:
My point is only that they will be killed should they leak their
actual capabilities.
Well... I am reading a book about intelligence now. Specifically,
Ernst
Volkman: Spies - the secret agents who
Working for a major Kiretsu, I learn that a certain keypress sequence
during boot enables SSH. Security by obscurity, baby. Never
heard of Mr. Kirchoff? Undocumented backdoor feature, baby.
LMAO,
yours,
MV
At 09:47 PM 7/23/04 -0500, J.A. Terranson wrote:
What I meant was, Ames and that FBI dude Hansen (sp?), at least the
KGB
got Ames' wife as part of the package, whereas the FBI CI dude
let his wife off as part of the deal he cut. Nice xian that he was,
he
was into strippers.
Aren't we *all*
At 10:27 AM 7/22/04 -0400, Tyler Durden wrote:
Gilmore et al used a bunch of old Sun Chassis for his Kocher's
DEScracker. You think this is somehow more than 100 watts, in a
diplo suitcase, nowadays?
My point was, Gilmore et al were way behind what's capable.
Proof of concept needn't be
At 12:39 AM 7/22/04 -0500, J.A. Terranson wrote:
On Wed, 21 Jul 2004, Major Variola (ret) wrote:
I'm following the Principle of not underestimating the
adversary,
Don't go overboard: remember that there is a difference between
underestimating your adversary and unrealistically *over*estimating
At 10:27 AM 7/22/04 -0400, Tyler Durden wrote:
Gilmore et al used a bunch of old Sun Chassis for his Kocher's
DEScracker. You think this is somehow more than 100 watts, in a
diplo suitcase, nowadays?
My point was, Gilmore et al were way behind what's capable.
Proof of concept needn't be
At 12:39 AM 7/22/04 -0500, J.A. Terranson wrote:
On Wed, 21 Jul 2004, Major Variola (ret) wrote:
I'm following the Principle of not underestimating the
adversary,
Don't go overboard: remember that there is a difference between
underestimating your adversary and unrealistically *over*estimating
At 10:09 AM 7/21/04 -0400, Tyler Durden wrote:
Variola wrote...
Dark fiber.
Dark Fiber ain't a talisman you merely wave at data to get it to
magically
move to where you want it to.You've got to LIGHT that fiber, and to
light
that fiber you need LOTS and LOTS of power-hungry, space-occupying
At 11:28 AM 7/21/04 -0400, Tyler Durden wrote:
As for the cable landings, likewise I've never heard anyone mention
that
they saw any government equipment at the landings, so I suspect it's
relatively minimal.
I'm sorry but I have to puke at your cluelessness. Do you actually
think the folks in
At 10:12 PM 7/21/04 -0500, J.A. Terranson wrote:
On Wed, 21 Jul 2004, Major Variola (ret) wrote:
With all due respect, you think Ft. Meade uses the same COTS crap
as you are forced to deal with? Bwah hah hah.
Sorry Major, I'm gonna have to call you on that one. Yes, they are
lighting
At 10:09 AM 7/21/04 -0400, Tyler Durden wrote:
Variola wrote...
Dark fiber.
Dark Fiber ain't a talisman you merely wave at data to get it to
magically
move to where you want it to.You've got to LIGHT that fiber, and to
light
that fiber you need LOTS and LOTS of power-hungry, space-occupying
At 11:28 AM 7/21/04 -0400, Tyler Durden wrote:
As for the cable landings, likewise I've never heard anyone mention
that
they saw any government equipment at the landings, so I suspect it's
relatively minimal.
I'm sorry but I have to puke at your cluelessness. Do you actually
think the folks in
At 10:12 PM 7/21/04 -0500, J.A. Terranson wrote:
On Wed, 21 Jul 2004, Major Variola (ret) wrote:
With all due respect, you think Ft. Meade uses the same COTS crap
as you are forced to deal with? Bwah hah hah.
Sorry Major, I'm gonna have to call you on that one. Yes, they are
lighting
At 07:56 AM 7/19/04 -0500, J.A. Terranson wrote:
On Sun, 18 Jul 2004, Major Variola (ret) wrote:
You don't know about tape robots, or offline indexing, eh?
None of which qualify here - remember, the discussion was based upon a
quiet implementation.
The thread was about wiretapping. My point
At 08:41 AM 7/19/04 -0700, James A. Donald wrote:
And as Hettinga predicted, the more anonymous and irreversible the
transaction service, the cheaper and more convenient its services.
All happening as predicted.
D'uh.
So why don't we have anonymous chaumian cash by now?
USPTO
Observe Tim May,
301 - 400 of 1603 matches
Mail list logo