District gets OK on red light cameras -- The Washington Times
Who else a few weeks ago was talking about 'right to face ones accuser'? That a distinction between 'witness' and 'evidence' was being lost? Check the archives ladies and gentlemen. http://www.washingtontimes.com/metro/20010725-91340800.htm -- -- Nature and Nature's laws lay hid in night: God said, Let Tesla be, and all was light. B.A. Behrend The Armadillo Group ,::;::-. James Choate Austin, Tx /:'/ ``::/|/ [EMAIL PROTECTED] www.ssz.com.', `/( e\ 512-451-7087 -~~mm-'`-```-mm --'-
Antigen found W32/Sircam-A (Sophos) virus
Antigen for Exchange found ¦ô»ù³æ.xls.pif infected with W32/Sircam-A (Sophos) virus. The file is currently Removed. The message, CDR: ¦ô»ù³æ, was sent from ³¯»Ê´ and was discovered in IMC Queues\Inbound located at Cognex/Natick/BAMBI.
ENLARGE YOUR PENIS GUARANTEED 11347
HAVE A SMALL PENIS? WE CAN MAKE IT BIGGER!!!Click Below For More Info!!! http://www.geocities.com/penisgrowth2001 To be removed from all further mailings, please send a message to: [EMAIL PROTECTED] We honor all remove requests. ```
Antigen found W32/Sircam-A (Sophos) virus
Antigen for Exchange found Comprimise.doc.com infected with W32/Sircam-A (Sophos) virus. The file is currently Removed. The message, Comprimise, was sent from [EMAIL PROTECTED] and was discovered in IMC Queues\Inbound located at Cognex/Natick/BAMBI.
Re: Ohio man convicted for obscene stories in his private journal
On Monday 23 July 2001 15:43, Steve Schear wrote: What's the difference between the Russian Constitution and the American Constitution? They both guarantee freedom of speech, but the U.S. Constitution also guarantees freedom after the words are uttered. Dmitry Perevozhkin, Anecdotes about Putin The constitution may have its problems, but it is better than what we have now. - Unknown
Re: Open 802.11b wireless access points and remailers
On 24 Jul 2001, at 20:59, Petro wrote: There are several companies making embedded systems boards that use very little power and are capable of running linux. I don't know if any of them are quite low power enough to run off a solar panel yet, but some of the mips/arm designs might be. My current new toy is a CerfCube. (http://www.intrinsyc.com/products/referencedesigns/cerfcube.html) The specs say max 1A @ 5VDC. I know that running a Compact Flash card makes it draw toward the upper limit, but the built in 32MB RAM + 16MB Flash should be enough to run a remailer. Maybe not quite disposable at $379, but it would be interesting to see what I can do in that area. With an adapter, I can run a 802.11 card from the CF socket, I think. (drivers might be tricky) Having fallen a little out of touch, what are the popular remailers in use? Can't seem to find my Mixmaster link anymore. It would seem to me that if it's a box you don't expect to get back, it might be a better idea to build a special purpose machine--just the motherboard, 802.11 device and a reduced Linux installation running out of flash ram. That sounds like the CerfCube (maybe without the stylish Al cube case). Depending on the area covered, you wouldn't even need to trespass. If it's in a mall area, coverage would probably extend to certain areas of the outside of the building where it might be feasible to mount a small enough box that it wouldn't get noticed. Epoxy your box to the wall next to some other sort of electrical equipment (if the interference won't get in the way) and it will probably remain undiscovered for a while. Hmmm maybe an inductive parasite power tap? -- Roy M. Silvernail [ ] [EMAIL PROTECTED] DNRC Minister Plenipotentiary of All Things Confusing, Software Division PGP Key 0x1AF39331 : 71D5 2EA2 4C27 D569 D96B BD40 D926 C05E Key available from [EMAIL PROTECTED] I charge to process unsolicited commercial email
Re: Attention to detail lacking
At 8:35 PM -0700 7/24/01, Tim May wrote: At 8:24 PM -0700 7/24/01, [EMAIL PROTECTED] wrote: I think Choate is much like this tech of mine: Have you ever seen the two of them together? (Not that college physics is needed. I should hope not, I've got a Fine Art degree with a smattering of philosophy and English. Which is why I work with computers for a living. When I was in high school I knew enough about physics and math not to have made some of the boners Choate has come out with.) I don't know enough math, but I know that I don't, so where I get confused I ask.
Re: Adobe's Teeth. (Was: Re: [free-sklyarov] Re: Rallies on Monday)
On Sat, 21 Jul 2001, Black Unicorn wrote: I would be amused to see one of these cloistered techies in a real encounter with police, who recognize that the best legal argument they The only serious encounter I would risk with anything, is by means of anonymized (including resistance to trace analysis) physical proxy. So the threshold is pretty high. Who do you think we are, marines?
Re: Ohio man convicted for obscene stories in his privatejournal
On Tue, 24 Jul 2001, Alan wrote: The constitution may have its problems, but it is better than what we have now. - Unknown That's *Classic*! -- Yours, J.A. Terranson [EMAIL PROTECTED] If Governments really want us to behave like civilized human beings, they should give serious consideration towards setting a better example: Ruling by force, rather than consensus; the unrestrained application of unjust laws (which the victim-populations were never allowed input on in the first place); the State policy of justice only for the rich and elected; the intentional abuse and occassionally destruction of entire populations merely to distract an already apathetic and numb electorate... This type of demogoguery must surely wipe out the fascist United States as surely as it wiped out the fascist Union of Soviet Socialist Republics. The views expressed here are mine, and NOT those of my employers, associates, or others. Besides, if it *were* the opinion of all of those people, I doubt there would be a problem to bitch about in the first place...
Re: Choate Prime Physics
On Wed, 25 Jul 2001, Jim Choate wrote: The incident photons strike the mirror. A current is induced. That current is electrons moving in a resistor. Making heat, losing energy. Note, we are NOT talking about photons here but J/C. That current re-emits photons that retain both frequency and temporal/time related coherence (see Maxwell's Equations for more detail). However, the total number of photons MUST be reduced from the incident beam. This also means the incident photons can not be the same as the emitted photons. No. The electromagnetic field, as described by Maxwell's equations, is a statistical abstraction arising out of quantum electrodynamics, with strict limits on its applicability. When you try to deal with individual photons, you're going outside these limits, just as surely as you would be going outside the limits of classical thermodynamics if you e.g. tried to argue from the 2nd law in a simple enough quantum system like an isolated electron. The classical ED only gets you statistical results, and as such does not allow you to reason about the behavior of individual quanta. Reflection of light in a mirror happens at a scale beyond the reach of classical electrodynamics. The only thing that happens is that some photons are converted to heat, while others scatter as-is. (Besides, the above stuff is nonsense at its face, as one can clearly see from the fact that insulators can be reflective, and that an incident magnetic field does not visibly affect the reflectance of a conductive mirror.) Sampo Syreeni, aka decoy, mailto:[EMAIL PROTECTED], gsm: +358-50-5756111 student/math+cs/helsinki university, http://www.iki.fi/~decoy/front
judge downes rules
Instead of remanding, Downes rules. This means that Downes is going with the feds. We need some help guys. Please think some help up. http://www.geocities.com/CapitolHill/Congress/8327/ We are working on this. So are they. http://www.geocities.com/CapitolHill/Congress/8327/buehlerpayne.html
No Subject
Title: Make Money At Home MMAH716A We apologize if you have inadvertently received this e-mail. If you consider that this message is in violation of any applicable local, state and federal laws in all jurisdictions, stop reading it further down beyond this panel. Further reading may legally be construed as your affirmatory invitation of this message.To be REMOVED from our mailing lists, Enter your e-mail addresses separated by space in the box belowClick [Remove] button just once and wait awhile. WORK@HOME AMERICA ** MAKE MONEY AT HOME ** Good Weekly Real Income It All Began In a Small GardenInvest In Yourself For your Free information on our Make-Money-At-Home program (MMAH716)Enter your e-mail addresses separated by space in the box belowClick [OK] button just once and wait awhile.
It's not a network marketing company, it's just the opposite.
Dear Friends, How are you doing? I hope great. I am very excited about a new program I have gotten involved with. It's like a breath of fresh air! It's not a network marketing company, it's just the opposite. Instead of me looking for heavy hitters with lots of money to build an organization, I am looking for people who NEED MONEY! That's right. For the first time in my business life I feel like I have found a business Where I can Make A Difference in the lives of others, really! Please remember this a program that you will have to work and you will find it to be very rewarding to all involved, but if you aren't willing to work than please don't ask for info. So if you want to do this too just drop me an email: with I am interested and want more info. [EMAIL PROTECTED] and I will send you all the info. Looking forward to telling you all about this. *** This message is sent in compliance of the new e-mail bill. Per Section 301, Paragraph (a)(2)(C) of S. 1618, Further transmissions by the sender of this email may be stopped, at no cost to you, by sending a reply to this email address with the word remove in the subject line. mailto:[EMAIL PROTECTED]?subject=REMOVE. Your request will be honored immediately. Thanks!
FBI not as incompetent as recent reports say
Wen Ho Lee, Robert Hanssen, screwed-up lab tests, failure to detect Aldrich Ames, missing handguns, Waco, Ruby Ridge...the portrait of a dysfunctional agency, right? Far from it, from what I can see. Some of the examples are marginally silly, some are due to pressures from bureaucrats, some are things which virtually no organization on earth could have detected. I'm not a particular friend of the FBI, as the Seattle and Portland offices will probably acknowledge, but I seen no particular _decline_ in quality such as the article Matt Gaylor posted suggests. The spotlight is much brighter today, there are many more reporting outlets. And the Net magnifies conspiracy theories. (I believe Waco was mishandled badly--the preacher should have just been picked up by the local Sheriff or arrested on one of his many trips into town or walks along his fence. And I believe Ruby Ridge was an example of a barricade situation which didn' t need to happen. The crime of selling a long gun with a barrel one quarter of an inch too short was both a set up (to induce cooperation by Randy Weaver) and shouldn't have been a crime in the first place. These are mistakes, not evidence of a Bureau that has become incompetent or malevolent.) The Wen Ho Lee case is much more mysterious. Maybe he _was_ a Chinese spy...certainly China is an emerging superpower with the willingness to recruit spies. We do it, the Russians do it, the French and Germans do it, why not the Chinese? What about missing weapons? Well, large organizations lose all kinds of things. Including guns. Big deal. Hanssen? The Sovs knew that recruiting agents within the FBI's counter-spy division was the equivalent of recruiting agents at Los Alamos in the 1940s. Did the FBI miss some warning signs? Probably. Did Jim Bamford miss some warning signs? Yep. (Bamford was a friend of Hanssen's.) How about the bad lab results? Sure. Shit happens. But, all in all, I see no particular evidence that the FBI is in a state of moral or professional collapse. I think I'd rather have been working for Louis Freeh these past 10 years than a weirdo like J. Edgar Hoover and his queen Tolson. (I had and still have profound disagreement with Freeh and Jim Kellstrom (spelling? I used to know his name, but it escapes me right now) over things like Clipper, key escrow, and no knock raids, but I thought they were competent, professional, and intelligent adversaries. They never knew who I was, obviously, but we were in the same competency league. In my opinion, of course.) Thinking of the FBI as Keystone Kops is dangerous, which is why I am writing this note. --Tim May -- Timothy C. May [EMAIL PROTECTED]Corralitos, California Political: Co-founder Cypherpunks/crypto anarchy/Cyphernomicon Technical: physics/soft errors/Smalltalk/Squeak/agents/games/Go Personal: b.1951/UCSB/Intel '74-'86/retired/investor/motorcycles/guns
Increase Sales, Accept Credit Cards! [107iso]
We provide businesses of ALL types an opportunity to have their own no hassle Credit Card Merchant Account with NO setup fees. Good credit, bad credit, no credit -- not a problem! 95% approval rate! You will be able to accept all major credit cards including Visa, MasterCard, American Express and Discover, as well as debit cards, ATM and check guarantee services. You will have the ability to accept E-checks over the Internet with a secure server. To insure that you wont miss a sale, you will be able to accept checks by Phone or Fax. We can handle ANY business and client type! If you already have a merchant account we can lower your rates substantially with the most competitive rates in the industry and state of the art equipment and software. We will tailor a program to fit your budget and you wont pay a premium for this incredible service! If you are a U.S. or Canadian citizen and are interested in finding out additional information or to speak with one of our reps, reply to this email and include the following contact information: Your Name, Phone Number (with Area/Country code), and if possible, a best time to call. One of our sales reps will get back to you shortly. Thank you for your time. If you wish to be removed from our mailing list, please reply to this email with the subject Remove and you will not receive future emails from our company.
No Subject
Do you look in the mirror in the mornings and just wish you could lose those few extra pounds?If you have tried countless diets and weight loss programs that never work, THEN THIS IS FOR YOU! Big or fat, we are all human beings with feelings, and with my help, you can re-establish those confident feelings and feel good about yourself and your body. ** You may ask why you should read something on dieting from a complete stranger. Good question, who am I? My name is Manfred Seibert, I am a qualified chef - I finished my training in Germany where I worked for several leading hotels. Following training I braved the world and spent time in Switzerland, Norway, and Sweden and rested in my current position as Executive Chef for a leading resort on the island of Bermuda. The idea to develop my own diet came when I gave up smoking and gained 45lb. I'm sure that's not unfamiliar to others out here. I tried countless diets out there on the market and I must admit, a few made a dent in my weight, but nothing worked well for me. So, I decided to develop my own program based on a low-fat and cholesterol free diet. I needed a diet program that satisfied my needs and time schedule. This is what I have developed. After coming up with recipes and designing the program itself I managed to lose 45lb without feeling hungry, being depressed or nervous. The most important fact is that it changed my eating habits, and the weight stayed off. After watching the program work for me, other people around me began to ask me what I did to lose all that weight. I put various people on the same diet program, adjusted the time schedules accordingly and it worked for every one of them. Even my boss, Mr. Billy Griffith, used it. He too lost 45lb. It was his idea I market the program, and so I turned the program into a book that will help you lose 4lb per month, and keep it off. The only disadvantage is spending a little more time in the supermarket looking for the low fat items and reading the labels. If you too would like to benefit from this program for just $10.00 plus $7.95 shipping worldwide please email me personally at [EMAIL PROTECTED] with delivery information. In addition please feel free to email me if you have any questions. Or visit my website for more information at www.millenniumshapeup.com GOOD LUCK! This message is sent in compliance of the new e-mail bill:SECTION 301. Per section 301, Paragraph (a)(2)(c) of s. 1618, Further transmissions to you by the sender of this e-mail may be stopped at no cost to you by sending a reply to this email address with the word remove in the subject line.
Re: Air Force Turns 747 Into Holster for Giant Laser
At 04:43 PM 7/24/2001 -0500, Jim Choate wrote: On Tue, 24 Jul 2001, Eugene Leitl wrote: On Mon, 23 Jul 2001, Jim Choate wrote: Maybe. But even mirrors can be burned through by a laser. And then we've Jim, why are you trying so hard to make a complete fool out of yourself, in a public forum? A chemical laser needs active optics to track your remote target. What do you think that optics is made from, unobtainium? Do you understand basic laws of optics? I recommend purchasing a 15 W laser (and a pair of matching protection goggles), and then use it to ignite a match from a close distance, and then over a few km, preferably during summer in your native Texas. You could target the beam towards a projection wall, and watch it with a pair of binoculars. It will be quite instructive. The optics used for focusing are NOT mirrors, they are (hopefully) transparent at the frequency under use. A mirror on the other hand is required to be OPAQUE with respect to transmission, we want full, 100%, reflectivity. That means that every photon that hits that mirror interacts, loses some energy, and gets re-emitted. The optics used for focusing are probably mirrors, one fully reflective and probably backed by piezo actuators to controllably distort for focus and adjust for atmospheric distortions, the other mostly reflecting (to keep the lasing process going) to leak the lethal beam. steve
Re: Ashcroft Targets U.S. Cybercrime
-- Yes, it does work in the world of building reputations associated with (anonymous or claimed-not-anonymous) keys, but not when you need meatspace credit --give the meat named Prof Joe tenure credit for work X. James A. Donald: It is common for real world authors to publish under nom de plumes. Adding a key to a nom de plume gives added advantages to the nom de plume. David Honig wrote: A nom de plume which cannot be revealed to the folks one wants credit from (because you go to meatspace jail when the association is leaked) is useless for getting credit in meatspace. Yes the nym gets credit; but it doesn't help you get tenure, or a raise, or invitations to speak. The advantage of a nom de plume is that it can be selectively revealed, revealed to some people and not others, or revealed to everyone at a later date depending on how things turned out. Adding a public key to a nom de plume improves that advantage, The same is true of a nom de guerre, only even more so. To inopportunely reveal a nom de guerre is likely to be fatal. To be unable ot prove a nom de guerre may well result in the loss an personal gains resulting from victory. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG mkF3vClVh1ADZdWMKCRDtSJboD5GxB++yr8Wh4f1 4hd66T9IGIrYcT9RAm+JsBR1bEipLxfgpibdVoOpv
No Subject
Title: Make Money At Home MMAH716A We apologize if you have inadvertently received this e-mail. If you consider that this message is in violation of any applicable local, state and federal laws in all jurisdictions, stop reading it further down beyond this panel. Further reading may legally be construed as your affirmatory invitation of this message.To be REMOVED from our mailing lists, Enter your e-mail addresses separated by space in the box belowClick [Remove] button just once and wait awhile. WORK@HOME AMERICA ** MAKE MONEY AT HOME ** Good Weekly Real Income It All Began In a Small GardenInvest In Yourself For your Free information on our Make-Money-At-Home program (MMAH716)Enter your e-mail addresses separated by space in the box belowClick [OK] button just once and wait awhile.
Re: Choate Prime Physics
On Wed, 25 Jul 2001, Jim Choate wrote: The incident photons strike the mirror. A current is induced. That current is electrons moving in a resistor. Making heat, losing energy. Note, we are NOT talking about photons here but J/C. That current re-emits photons that retain both frequency and temporal/time related coherence (see Maxwell's Equations for more detail). However, the total number of photons MUST be reduced from the incident beam. This also means the incident photons can not be the same as the emitted photons. No. The electromagnetic field, as described by Maxwell's equations, is a statistical abstraction arising out of quantum electrodynamics, with strict limits on its applicability. When you try to deal with individual photons, you're going outside these limits, just as surely as you would be going outside the limits of classical thermodynamics if you e.g. tried to argue from the 2nd law in a simple enough quantum system like an isolated electron. The classical ED only gets you statistical results, and as such does not allow you to reason about the behavior of individual quanta. Reflection of light in a mirror happens at a scale beyond the reach of classical electrodynamics. The only thing that happens is that some photons are converted to heat, while others scatter as-is. (Besides, the above stuff is nonsense at its face, as one can clearly see from the fact that insulators can be reflective, and that an incident magnetic field does not visibly affect the reflectance of a conductive mirror.) Sampo Syreeni, aka decoy, mailto:[EMAIL PROTECTED], gsm: +358-50-5756111 student/math+cs/helsinki university, http://www.iki.fi/~decoy/front
FBI: Keystone Gmen
[ my email is really fucked right now, gawd only knows how many copies this single transmission will result in. apologies in advance. ] http://interactive.wsj.com/articles/SB9960160921000.htm # #July 25, 2001 # #FBI Cyber Researcher Unleashes Virus #That E-Mails Private Agency Documents # #By TED BRIDIS #Staff Reporter of THE WALL STREET JOURNAL # #WASHINGTON -- A researcher in the Federal Bureau of Investiga #tion's cyber-protection unit unleashed a fast-spreading Internet #virus that e-mailed private FBI documents to outsiders -- all #on the eve of a Senate hearing into troubles at the unit. # #Although the Sircam virus didn't spread to other computers at #the FBI's National Infrastructure Protection Center, it did send #at least eight documents to a number of outsiders. One, about #the investigation into an unrelated virus, was marked official #use only. The Sircam virus has infected thousands of computers #since its discovery last week. # #FBI spokeswoman Deb Weierman said that no sensitive or classified #information about continuing investigations was disclosed Tuesday. #The official use designation protects documents from disclosure #under the U.S. Freedom of Information Act. # #It isn't uncommon for virus researchers to accidentally infect #their own computers, but the mistake was particularly embarrassing #because it occurred ahead of a Senate Judiciary panel's oversight #hearing about the FBI cyber unit's effectiveness. Lawmakers were #expected to focus on other agencies' failure to cooperate fully #with the FBI center, and on a perceived lack of trust between #the FBI and private-sector groups. # #The unit generally gets high remarks for its criminal #investigations, and even critics say the unit is more effective #than it was a year ago. The effort here is not to embarrass #anybody but to stress that a lot of work has to be done, said #Republican Sen. Jon Kyl of Arizona. # #Meanwhile, the White House has begun organizing a new #early-warning network for Internet threats. But unlike the current #system, it will be coordinated by the Pentagon, not the FBI. #The mechanism for warning all U.S. military and civilian agencies #-- and ultimately corporations -- will be dubbed the Cyber-Warning #and Information Network, or c-win. Organizers envision dozens #of computer centers that could sound an alert when a threat is #identified. # #The network is expected to begin operating in October. The FBI #unit, which currently relays these warnings, came under sharp #criticism from congressional auditors for issuing tardy alerts. #Ms. Weierman, the FBI spokeswoman, called the new network a #useful mechanism to offer the government a technical capability #that doesn't currently exist. The FBI, she said, wasn't concerned #it would lose its warning responsibilities. # #Tuesday, at least three people said they received some of the #FBI documents, including a 23-year-old Internet-security expert #in Belgium, Niels Heinen. He operates a Web site that reports #on Internet break-ins and speculated that the analyst, Vince #Rowe, visited the site on the infected computer. Mr. Rowe didn't #respond to a request for comment.
FBI: Keystone Gmen
[ my email is really fucked right now, gawd only knows how many copies this single transmission will result in. apologies in advance. ] http://interactive.wsj.com/articles/SB9960160921000.htm # #July 25, 2001 # #FBI Cyber Researcher Unleashes Virus #That E-Mails Private Agency Documents # #By TED BRIDIS #Staff Reporter of THE WALL STREET JOURNAL # #WASHINGTON -- A researcher in the Federal Bureau of Investiga #tion's cyber-protection unit unleashed a fast-spreading Internet #virus that e-mailed private FBI documents to outsiders -- all #on the eve of a Senate hearing into troubles at the unit. # #Although the Sircam virus didn't spread to other computers at #the FBI's National Infrastructure Protection Center, it did send #at least eight documents to a number of outsiders. One, about #the investigation into an unrelated virus, was marked official #use only. The Sircam virus has infected thousands of computers #since its discovery last week. # #FBI spokeswoman Deb Weierman said that no sensitive or classified #information about continuing investigations was disclosed Tuesday. #The official use designation protects documents from disclosure #under the U.S. Freedom of Information Act. # #It isn't uncommon for virus researchers to accidentally infect #their own computers, but the mistake was particularly embarrassing #because it occurred ahead of a Senate Judiciary panel's oversight #hearing about the FBI cyber unit's effectiveness. Lawmakers were #expected to focus on other agencies' failure to cooperate fully #with the FBI center, and on a perceived lack of trust between #the FBI and private-sector groups. # #The unit generally gets high remarks for its criminal #investigations, and even critics say the unit is more effective #than it was a year ago. The effort here is not to embarrass #anybody but to stress that a lot of work has to be done, said #Republican Sen. Jon Kyl of Arizona. # #Meanwhile, the White House has begun organizing a new #early-warning network for Internet threats. But unlike the current #system, it will be coordinated by the Pentagon, not the FBI. #The mechanism for warning all U.S. military and civilian agencies #-- and ultimately corporations -- will be dubbed the Cyber-Warning #and Information Network, or c-win. Organizers envision dozens #of computer centers that could sound an alert when a threat is #identified. # #The network is expected to begin operating in October. The FBI #unit, which currently relays these warnings, came under sharp #criticism from congressional auditors for issuing tardy alerts. #Ms. Weierman, the FBI spokeswoman, called the new network a #useful mechanism to offer the government a technical capability #that doesn't currently exist. The FBI, she said, wasn't concerned #it would lose its warning responsibilities. # #Tuesday, at least three people said they received some of the #FBI documents, including a 23-year-old Internet-security expert #in Belgium, Niels Heinen. He operates a Web site that reports #on Internet break-ins and speculated that the analyst, Vince #Rowe, visited the site on the infected computer. Mr. Rowe didn't #respond to a request for comment.
Re: Choate Prime Physics
At 12:39 AM 7/25/2001 -0500, Jim Choate wrote: On Tue, 24 Jul 2001, Tim May wrote: You're gibbering about things you have no clue about. Babbling about the intermediate vector boson when you clearly don't even understand high school physics is especially bizarre. Photons are _quanta_, as in quantum theory. Their energy is given by the usual E = hv (v is nu, frequency). They aren't less energetic when they scatter (i.e., are reflected). A photon fired at a surface will scatter/reflect with precisely the energy it had when it hit the surface, unless it is absorbed (in which case it knocks electrons out of atoms...the photoelectric effect in a vacuum, thermalized in ordinary solids). groan Here is what actually happens. It's called The Radiated Electric Field. Some 1st year engineering physics books will have it listed in the index under 'mirror'. The incident photons strike the mirror. A current is induced. That current is electrons moving in a resistor. Making heat, losing energy. Note, we are NOT talking about photons here but J/C. That current re-emits photons that retain both frequency and temporal/time related coherence (see Maxwell's Equations for more detail). However, the total number of photons MUST be reduced from the incident beam. This also means the incident photons can not be the same as the emitted photons. The photons (as opposed to 'a photon') lose energy. The photons don't lose energy: the beam or flux is diminished in intensity. Your improper choice of terms is what's getting creating the misunderstandings. steve
Re: Re: Ashcroft Targets U.S. Cybercrime
We still live in a country that has laws, and we *should* expect the LEAs to enforce all laws that are on the books. If you have a problem with the laws, it's not the LEAs fault, it's the legislature and the Executive branch. And the Jewish population of Europe during WW2 had no right to complain about the Nazi soldiers just doing their job, right... If one can't distinguish between the enforcement of laws of questionable constitutional validity (yes, *questionable*) and genocide, then one should probably load the bong again, watch cartoons on TV and stay far, far away from the ballot box. The question has nothing to do with the Constitution of the United States--it has to do with whether or not an individual is justified in acting in the name of just doing my job or just following orders. I would suggest that LEAs are definitely at fault for executing and enforcing laws that are unjust. (I in no way intend to imply that the blame should be steered away from the originators, who are, as you point out, the legislature and executive branch. Nor am I making a recommendation as to what determines the fabric of justice, although that would be an interesting topic for dicsussion.) Your assumption that the U.S. Constitution and system of Elections have anything to do with granting a mandate of rule to the law enforcement community is flawed. They don't even, for what it matters, grant a true mandate to the rest of the U.S. government anymore, with occasional exception. --bensons
The Martian Private-Socialist-Anarchist
http://www.marsanarchy.org/MarsPrivSocAnarch.htm -- -- Nature and Nature's laws lay hid in night: God said, Let Tesla be, and all was light. B.A. Behrend The Armadillo Group ,::;::-. James Choate Austin, Tx /:'/ ``::/|/ [EMAIL PROTECTED] www.ssz.com.', `/( e\ 512-451-7087 -~~mm-'`-```-mm --'-
Attention to detail lacking
Jim, I think you often don't word things carefully enough. The resulting discussions get pointless in a big hurry. The optics used for focusing are NOT mirrors, they are (hopefully) transparent at the frequency under use. A mirror on the other hand is required to be OPAQUE with respect to transmission, we want full, 100%, reflectivity. That means that every photon that hits that mirror interacts, loses some energy, and gets re-emitted. ^ Are you implying that the wavelength for incident photons changes upon interaction with the mirror? The energy loss at the mirror is lost photons not altered wavelengths. The lost photons have varying fates. You stated that every photon interacts, loses energy and is re-emitted. I think the reflected beam has the same wavelength as the incident beam. Your blurb about absorption and cascades is only true for some fraction of the lost photons that constitute the inefficiency of the mirror. Others have a different fate. Maybe that's what you meant but you did say every photon. And here's an exchange with Tim : At 6:30 PM -0500 7/24/01, Jim Choate wrote: And these are reasonably low power lasers... http://www.ee.surrey.ac.uk/SSC/IJSSE/issue1/unwin/unwin.html The simple fact is that the thermodynamic impact of a laser beam that is several feet across and emitting more photons than the surface of the sun will not be easy to reflect unless immense cooling is taken. Cost/weight factors alone argue it in the negative. More photons than the surface of the sun for HOW LONG? A minute? A second? A millisecond? A microsecond? You confuse fluence with flux, a classic mistake. (A pulse brighter than the sun but lasting only milliseconds will have far less heating effect than other flux level pulses lasting longer. Calculations matter. And, yes, I used to do these calculations when I was refuting Kosta Tsipis' calculations of the late 70s. Fluence matters.) --Tim May The sun produces shitloads ( check your CRC Handbook for conversions between the shitload and more familiar units ) of power : http://seds.lpl.arizona.edu/nineplanets/nineplanets/sol.html says 386 billion billion megawatts If we know the spectral characteristics of the sun ( the black body spectrum perhaps? ) we could come up with a photon count. I'm not sure whether you mean to talk about photon counts and adjust the power and wavelength variables or you really mean to discuss something that operates somewhere between IR and UV. Let's assume the latter. It is after all a LASER. You did say surface of the sun. To me that means integrate over 4 pi. 3.86E26 W regardless of the radius. I doubt if anyone has made a laser that operates at that power level even for one fs. Let's try the other approach... The power output from the sun is about 1350 W/m^2 as measured here. Maybe that was what you meant as a reference power level. Let's see, 1350 W/m^2 - 1.35E-3 W/mm^2 so a 1 mW laser with a beam area of .74mm^2 is as bright as the sun at least in terms of gross energy density. That disregards spectral effects. Not too tough to be brighter than the sun. I don't think you could even light a bucket of gasoline 1 m away with it no less knock down a rocket. It's also pretty easy to handle with a basic mirror. I'd say that's a pretty wussy power level for something that needs to melt a rocket in flight. Focussed to a spot that is 1/1000 the area of the parent beam it starts to get interesting but let's see you hold that spot steady from a 747 in turbulence long enough to burn a hole in a nice shiny casing going 8000kph 200km away. So if we're going to discuss physics let's do it with a bit of care. Maybe it will be more interesting. I'm no expert but I'm willing to try. Yawn, Mike
WHERE IS DILDO? (was: The Martian Private-Socialist-Anarchist)
WHERE IS DILDO? The AI suggests Mars. Maybe Dildo has gone there to escape the LSAT challenge. http://www.marsanarchy.org/MarsPrivSocAnarch.htm /| |/ \ / \ \ / \ \ / \ \ /___\/ | | | | | o | | | | | | | | | | (.)~(x) | | | | O | | | | (_=_) | | | |_| | | | | | |WHERE IS | | | DILDO? | | |_|/
Re: Home Network Security (fwd)
-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a __ ICBMTO : N48 10'07'' E011 33'53'' http://www.lrz.de/~ui22204 57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3 -- Forwarded message -- Date: Mon, 23 Jul 2001 21:12:44 -0700 From: Joshua Stanley [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: Re: Home Network Security At 04:50 PM 7/23/01 -0400, Andrew A. Gill heralded: CERT recently released a list of home network security guidelines. If you know anyone who is less than clued about this type of thing, send them here: http://www.cert.org/tech_tips/home_networks.html Pretty basic guidelines, but it's better than 3AM calls from cow-orkers. In the latest issue of 2600 Quarterly, a reader writes in to brag about how he recently drove around his neighborhood with the receiver-half of a wireless camera (a la the X-10 camera... you know, you've seen those relentless X-10 pop-up ads recently) connected to a portable TV, and discovered that many of his neighbors had spy cameras set up in all kinds of fun places. Apparently lots more people than you might think like to spy on other members of their own families... or themselves... or their pets... children... baby sitters, etcetera. And of course, that his activity, intercepting publicly broadcast, unencrypted video, (probably) isn't even illegal. Every one of those people was inadvertently entering the business of broadcast media. -Josh -- |Andrew A. Gill |I posted to Silent-Tristero and| |[EMAIL PROTECTED]|all I got was this stupid sig! | |alt.tv.simpsons CBG-FAQ author | | | (Report all obscene mail to Le Maitre Pots)| |http://trystero.rh.rit.edu Temporary sig: -- Go CERT! For every complex problem there is an answer that is clear, simple, and wrong. -- H L Mencken
FBI: Keystone Gmen
[ my email is really fucked right now, gawd only knows how many copies this single transmission will result in. apologies in advance. ] http://interactive.wsj.com/articles/SB9960160921000.htm # #July 25, 2001 # #FBI Cyber Researcher Unleashes Virus #That E-Mails Private Agency Documents # #By TED BRIDIS #Staff Reporter of THE WALL STREET JOURNAL # #WASHINGTON -- A researcher in the Federal Bureau of Investiga #tion's cyber-protection unit unleashed a fast-spreading Internet #virus that e-mailed private FBI documents to outsiders -- all #on the eve of a Senate hearing into troubles at the unit. # #Although the Sircam virus didn't spread to other computers at #the FBI's National Infrastructure Protection Center, it did send #at least eight documents to a number of outsiders. One, about #the investigation into an unrelated virus, was marked official #use only. The Sircam virus has infected thousands of computers #since its discovery last week. # #FBI spokeswoman Deb Weierman said that no sensitive or classified #information about continuing investigations was disclosed Tuesday. #The official use designation protects documents from disclosure #under the U.S. Freedom of Information Act. # #It isn't uncommon for virus researchers to accidentally infect #their own computers, but the mistake was particularly embarrassing #because it occurred ahead of a Senate Judiciary panel's oversight #hearing about the FBI cyber unit's effectiveness. Lawmakers were #expected to focus on other agencies' failure to cooperate fully #with the FBI center, and on a perceived lack of trust between #the FBI and private-sector groups. # #The unit generally gets high remarks for its criminal #investigations, and even critics say the unit is more effective #than it was a year ago. The effort here is not to embarrass #anybody but to stress that a lot of work has to be done, said #Republican Sen. Jon Kyl of Arizona. # #Meanwhile, the White House has begun organizing a new #early-warning network for Internet threats. But unlike the current #system, it will be coordinated by the Pentagon, not the FBI. #The mechanism for warning all U.S. military and civilian agencies #-- and ultimately corporations -- will be dubbed the Cyber-Warning #and Information Network, or c-win. Organizers envision dozens #of computer centers that could sound an alert when a threat is #identified. # #The network is expected to begin operating in October. The FBI #unit, which currently relays these warnings, came under sharp #criticism from congressional auditors for issuing tardy alerts. #Ms. Weierman, the FBI spokeswoman, called the new network a #useful mechanism to offer the government a technical capability #that doesn't currently exist. The FBI, she said, wasn't concerned #it would lose its warning responsibilities. # #Tuesday, at least three people said they received some of the #FBI documents, including a 23-year-old Internet-security expert #in Belgium, Niels Heinen. He operates a Web site that reports #on Internet break-ins and speculated that the analyst, Vince #Rowe, visited the site on the infected computer. Mr. Rowe didn't #respond to a request for comment.
No Subject
Title: Make Money At Home MMAH716A We apologize if you have inadvertently received this e-mail. If you consider that this message is in violation of any applicable local, state and federal laws in all jurisdictions, stop reading it further down beyond this panel. Further reading may legally be construed as your affirmatory invitation of this message.To be REMOVED from our mailing lists, Enter your e-mail addresses separated by space in the box belowClick [Remove] button just once and wait awhile. WORK@HOME AMERICA ** MAKE MONEY AT HOME ** Good Weekly Real Income It All Began In a Small GardenInvest In Yourself For your Free information on our Make-Money-At-Home program (MMAH716)Enter your e-mail addresses separated by space in the box belowClick [OK] button just once and wait awhile.
FBI: Keystone Gmen
[ my email is really fucked right now, gawd only knows how many copies this single transmission will result in. apologies in advance. ] http://interactive.wsj.com/articles/SB9960160921000.htm # #July 25, 2001 # #FBI Cyber Researcher Unleashes Virus #That E-Mails Private Agency Documents # #By TED BRIDIS #Staff Reporter of THE WALL STREET JOURNAL # #WASHINGTON -- A researcher in the Federal Bureau of Investiga #tion's cyber-protection unit unleashed a fast-spreading Internet #virus that e-mailed private FBI documents to outsiders -- all #on the eve of a Senate hearing into troubles at the unit. # #Although the Sircam virus didn't spread to other computers at #the FBI's National Infrastructure Protection Center, it did send #at least eight documents to a number of outsiders. One, about #the investigation into an unrelated virus, was marked official #use only. The Sircam virus has infected thousands of computers #since its discovery last week. # #FBI spokeswoman Deb Weierman said that no sensitive or classified #information about continuing investigations was disclosed Tuesday. #The official use designation protects documents from disclosure #under the U.S. Freedom of Information Act. # #It isn't uncommon for virus researchers to accidentally infect #their own computers, but the mistake was particularly embarrassing #because it occurred ahead of a Senate Judiciary panel's oversight #hearing about the FBI cyber unit's effectiveness. Lawmakers were #expected to focus on other agencies' failure to cooperate fully #with the FBI center, and on a perceived lack of trust between #the FBI and private-sector groups. # #The unit generally gets high remarks for its criminal #investigations, and even critics say the unit is more effective #than it was a year ago. The effort here is not to embarrass #anybody but to stress that a lot of work has to be done, said #Republican Sen. Jon Kyl of Arizona. # #Meanwhile, the White House has begun organizing a new #early-warning network for Internet threats. But unlike the current #system, it will be coordinated by the Pentagon, not the FBI. #The mechanism for warning all U.S. military and civilian agencies #-- and ultimately corporations -- will be dubbed the Cyber-Warning #and Information Network, or c-win. Organizers envision dozens #of computer centers that could sound an alert when a threat is #identified. # #The network is expected to begin operating in October. The FBI #unit, which currently relays these warnings, came under sharp #criticism from congressional auditors for issuing tardy alerts. #Ms. Weierman, the FBI spokeswoman, called the new network a #useful mechanism to offer the government a technical capability #that doesn't currently exist. The FBI, she said, wasn't concerned #it would lose its warning responsibilities. # #Tuesday, at least three people said they received some of the #FBI documents, including a 23-year-old Internet-security expert #in Belgium, Niels Heinen. He operates a Web site that reports #on Internet break-ins and speculated that the analyst, Vince #Rowe, visited the site on the infected computer. Mr. Rowe didn't #respond to a request for comment.
FBI: Keystone Gmen
[ my email is really fucked right now, gawd only knows how many copies this single transmission will result in. apologies in advance. ] http://interactive.wsj.com/articles/SB9960160921000.htm # #July 25, 2001 # #FBI Cyber Researcher Unleashes Virus #That E-Mails Private Agency Documents # #By TED BRIDIS #Staff Reporter of THE WALL STREET JOURNAL # #WASHINGTON -- A researcher in the Federal Bureau of Investiga #tion's cyber-protection unit unleashed a fast-spreading Internet #virus that e-mailed private FBI documents to outsiders -- all #on the eve of a Senate hearing into troubles at the unit. # #Although the Sircam virus didn't spread to other computers at #the FBI's National Infrastructure Protection Center, it did send #at least eight documents to a number of outsiders. One, about #the investigation into an unrelated virus, was marked official #use only. The Sircam virus has infected thousands of computers #since its discovery last week. # #FBI spokeswoman Deb Weierman said that no sensitive or classified #information about continuing investigations was disclosed Tuesday. #The official use designation protects documents from disclosure #under the U.S. Freedom of Information Act. # #It isn't uncommon for virus researchers to accidentally infect #their own computers, but the mistake was particularly embarrassing #because it occurred ahead of a Senate Judiciary panel's oversight #hearing about the FBI cyber unit's effectiveness. Lawmakers were #expected to focus on other agencies' failure to cooperate fully #with the FBI center, and on a perceived lack of trust between #the FBI and private-sector groups. # #The unit generally gets high remarks for its criminal #investigations, and even critics say the unit is more effective #than it was a year ago. The effort here is not to embarrass #anybody but to stress that a lot of work has to be done, said #Republican Sen. Jon Kyl of Arizona. # #Meanwhile, the White House has begun organizing a new #early-warning network for Internet threats. But unlike the current #system, it will be coordinated by the Pentagon, not the FBI. #The mechanism for warning all U.S. military and civilian agencies #-- and ultimately corporations -- will be dubbed the Cyber-Warning #and Information Network, or c-win. Organizers envision dozens #of computer centers that could sound an alert when a threat is #identified. # #The network is expected to begin operating in October. The FBI #unit, which currently relays these warnings, came under sharp #criticism from congressional auditors for issuing tardy alerts. #Ms. Weierman, the FBI spokeswoman, called the new network a #useful mechanism to offer the government a technical capability #that doesn't currently exist. The FBI, she said, wasn't concerned #it would lose its warning responsibilities. # #Tuesday, at least three people said they received some of the #FBI documents, including a 23-year-old Internet-security expert #in Belgium, Niels Heinen. He operates a Web site that reports #on Internet break-ins and speculated that the analyst, Vince #Rowe, visited the site on the infected computer. Mr. Rowe didn't #respond to a request for comment.
FBI: Keystone Gmen
[ my email is really fucked right now, gawd only knows how many copies this single transmission will result in. apologies in advance. ] http://interactive.wsj.com/articles/SB9960160921000.htm # #July 25, 2001 # #FBI Cyber Researcher Unleashes Virus #That E-Mails Private Agency Documents # #By TED BRIDIS #Staff Reporter of THE WALL STREET JOURNAL # #WASHINGTON -- A researcher in the Federal Bureau of Investiga #tion's cyber-protection unit unleashed a fast-spreading Internet #virus that e-mailed private FBI documents to outsiders -- all #on the eve of a Senate hearing into troubles at the unit. # #Although the Sircam virus didn't spread to other computers at #the FBI's National Infrastructure Protection Center, it did send #at least eight documents to a number of outsiders. One, about #the investigation into an unrelated virus, was marked official #use only. The Sircam virus has infected thousands of computers #since its discovery last week. # #FBI spokeswoman Deb Weierman said that no sensitive or classified #information about continuing investigations was disclosed Tuesday. #The official use designation protects documents from disclosure #under the U.S. Freedom of Information Act. # #It isn't uncommon for virus researchers to accidentally infect #their own computers, but the mistake was particularly embarrassing #because it occurred ahead of a Senate Judiciary panel's oversight #hearing about the FBI cyber unit's effectiveness. Lawmakers were #expected to focus on other agencies' failure to cooperate fully #with the FBI center, and on a perceived lack of trust between #the FBI and private-sector groups. # #The unit generally gets high remarks for its criminal #investigations, and even critics say the unit is more effective #than it was a year ago. The effort here is not to embarrass #anybody but to stress that a lot of work has to be done, said #Republican Sen. Jon Kyl of Arizona. # #Meanwhile, the White House has begun organizing a new #early-warning network for Internet threats. But unlike the current #system, it will be coordinated by the Pentagon, not the FBI. #The mechanism for warning all U.S. military and civilian agencies #-- and ultimately corporations -- will be dubbed the Cyber-Warning #and Information Network, or c-win. Organizers envision dozens #of computer centers that could sound an alert when a threat is #identified. # #The network is expected to begin operating in October. The FBI #unit, which currently relays these warnings, came under sharp #criticism from congressional auditors for issuing tardy alerts. #Ms. Weierman, the FBI spokeswoman, called the new network a #useful mechanism to offer the government a technical capability #that doesn't currently exist. The FBI, she said, wasn't concerned #it would lose its warning responsibilities. # #Tuesday, at least three people said they received some of the #FBI documents, including a 23-year-old Internet-security expert #in Belgium, Niels Heinen. He operates a Web site that reports #on Internet break-ins and speculated that the analyst, Vince #Rowe, visited the site on the infected computer. Mr. Rowe didn't #respond to a request for comment.
FBI: Keystone Gmen
[ my email is really fucked right now, gawd only knows how many copies this single transmission will result in. apologies in advance. ] http://interactive.wsj.com/articles/SB9960160921000.htm # #July 25, 2001 # #FBI Cyber Researcher Unleashes Virus #That E-Mails Private Agency Documents # #By TED BRIDIS #Staff Reporter of THE WALL STREET JOURNAL # #WASHINGTON -- A researcher in the Federal Bureau of Investiga #tion's cyber-protection unit unleashed a fast-spreading Internet #virus that e-mailed private FBI documents to outsiders -- all #on the eve of a Senate hearing into troubles at the unit. # #Although the Sircam virus didn't spread to other computers at #the FBI's National Infrastructure Protection Center, it did send #at least eight documents to a number of outsiders. One, about #the investigation into an unrelated virus, was marked official #use only. The Sircam virus has infected thousands of computers #since its discovery last week. # #FBI spokeswoman Deb Weierman said that no sensitive or classified #information about continuing investigations was disclosed Tuesday. #The official use designation protects documents from disclosure #under the U.S. Freedom of Information Act. # #It isn't uncommon for virus researchers to accidentally infect #their own computers, but the mistake was particularly embarrassing #because it occurred ahead of a Senate Judiciary panel's oversight #hearing about the FBI cyber unit's effectiveness. Lawmakers were #expected to focus on other agencies' failure to cooperate fully #with the FBI center, and on a perceived lack of trust between #the FBI and private-sector groups. # #The unit generally gets high remarks for its criminal #investigations, and even critics say the unit is more effective #than it was a year ago. The effort here is not to embarrass #anybody but to stress that a lot of work has to be done, said #Republican Sen. Jon Kyl of Arizona. # #Meanwhile, the White House has begun organizing a new #early-warning network for Internet threats. But unlike the current #system, it will be coordinated by the Pentagon, not the FBI. #The mechanism for warning all U.S. military and civilian agencies #-- and ultimately corporations -- will be dubbed the Cyber-Warning #and Information Network, or c-win. Organizers envision dozens #of computer centers that could sound an alert when a threat is #identified. # #The network is expected to begin operating in October. The FBI #unit, which currently relays these warnings, came under sharp #criticism from congressional auditors for issuing tardy alerts. #Ms. Weierman, the FBI spokeswoman, called the new network a #useful mechanism to offer the government a technical capability #that doesn't currently exist. The FBI, she said, wasn't concerned #it would lose its warning responsibilities. # #Tuesday, at least three people said they received some of the #FBI documents, including a 23-year-old Internet-security expert #in Belgium, Niels Heinen. He operates a Web site that reports #on Internet break-ins and speculated that the analyst, Vince #Rowe, visited the site on the infected computer. Mr. Rowe didn't #respond to a request for comment.
Antigen found W32/Sircam-A (Sophos) virus
Antigen for Exchange found ORD carlos del camp6o.doc.bat infected with W32/Sircam-A (Sophos) virus. The file is currently Removed. The message, CDR: ORD carlos del camp6o, was sent from Direccion de Educacion Municipal Santiago and was discovered in IMC Queues\Inbound located at Cognex/Natick/BAMBI.
Re: Open 802.11b wireless access points and remailers
On Wed, 25 Jul 2001, David Honig wrote: When cell phones get more programmable, and handle text, an interesting app could be guerilla-net-like routing. If everyone's phone is a RF repeater/router, its not impossible. You could probably hack this up now, if you were willing to lose the cell phone functionality of your cell phone. Maybe you could even get by with just replacing the web browser on your cell phone. (I still can't make head or tails out of my phone's browser, but apparently people use them.) cell phones do handle text. In fact people are trying to make a business out of cell phone mailing lists. see www.upoc.com You'd have to add would be some kind of scripting language for forwarding text messages on the phone. Battery life would probably be the worst impact. A few airline bottles of vodka will keep the fuel cells humming (for the future phone, I mean). Heh. One for me, one for my phone. Batch transmissions every hour on the hour might help with this. No reason to be up all the time for sending e-mail. You could also play games in which every phone picks a different minute each hour, then wakes up during that minute for transmission. Your chance of being in the same minute as your destination isn't great, but you could transmit the packet to each of your neighbors in that minute, each of whom tries to relay the packet in different minutes during the next hour. One issue with that, though, is how to stop packets from flying around long after they've been first delivered. A gnutella/freenet-style limit on the number of tries might help. So might announcements of packets received; i.e. a phone says I've received packet X, so you can drop it. You'd have to be careful about an adversary trying to create packets which live forever (i.e. the hop limit should not live in the packet, unless the packet is signed and these announcements had better have some way of proving they come from the 'intented' sender) (but at the same time, we should avoid any protocol which requires a PKI for phones or even public-key crypto on efficiency and speed grounds; it takes 20 seconds for my phone to negotiate one RSA key exchange). In order to prevent what Anderson calls sleep deprivation attacks, you'd also want that the number of minutes the phone is up depends weakly or not at all on parameters under the control of an adversary. like how many packets received during the previous minute up. Random dropping of incoming packets might be a way to get around this, since I'm thinking that every phone broadcasts to every other phone in the same minute anyway. (I keep thinking of _Dayworld_ through all of this, but I don't yet see a good joke or a useful metaphor -- phones are not assigned set minutes for life, unlike in _Dayworld_, so what's a dayworld breaker? a phone that continues to relay during the entire hour? that would be a good thing, since it'd speed up packet relay.) I'd be pretty surprised if people haven't already looked at these sorts of schemes and come up with much better ones. Although maybe they haven't been considered with adversaries in mind. Anyone know of references? Lots of mil apps for fully distributed RF nets, too. That's where spread-spectrum came from, isn't it? How much is publically known about the toys they already have? -David
Antigen found W32/Sircam-A (Sophos) virus
Antigen for Exchange found MCB.doc.bat infected with W32/Sircam-A (Sophos) virus. The file is currently Removed. The message, CDR: MCB, was sent from Yatrik Shah and was discovered in IMC Queues\Inbound located at Cognex/Natick/BAMBI.
BIBLE ANSWERS ON CD 0246
IMPORTANT COMPUTER TECHNOLOGY NEWS By now, you've probably heard about, read about or talked about the most advanced Bible study technology available today. IT'S THE WORD -- BIBLE ON CD SOFTWARE. Find solutions to all your daily problems and life's challenges at the click of a mouse button? This incredible new software has the answers you're looking. It's the most powerful, life-changing tool available today and it's easy to use. So don't wait any longer, take advantage of this sizzling summer special. On one CD, (Windows or Macintosh versions) you have a complete library of Bibles, well known reference books and study tools. You can view several Bible versions simultaneously, make personal notes, print scriptures and search by word, phrase or topic. If you are interested in complete information on The Word CD, please visit our Web site. Go to: http://www.1chn.net/bible/ If this link does not work, try typing the address directly into your browser. If your browser won't load the Web site, send us an e-mail and we will provide you with more information. mailto:[EMAIL PROTECTED]?subject=Please-email-Bible-info THE WORD BIBLE CD IS SIMPLY AMAZING The wide range of resources on the CD are valued at over $1,500 if purchased separately. ** 14 English Bible Versions ** 12 Foreign Language Versions ** 9 Original Language Versions ** Homeschool Resource Index ** 17 Notes Commentaries ** Colorful Maps, Illustrations, Graphs ** Step-by-Step Tutorial ** Fast Powerful Word/Phrase Search ** More than 660,000 cross references ** Complete Manual With Index Also: ** Build a strong foundation for dynamic Bible Study, ** Make personal notes directly into your computer, ** Create links to favorite scriptures and books. Try it. No Risk. 30-day money-back guarantee [excluding shipping handling] US and International orders accepted. Credit cards and personal checks accepted. If you are interested in complete information on The Word CD, please visit our Web site: http://www.1chn.net/bible/ If this link does not work, try typing the address directly into your browser. If your browser won't load the Web site, send us an e-mail and we will provide you with more information. mailto:[EMAIL PROTECTED]?subject=Please-email-Bible-info Your relationship with God is the foundation of your life -- on earth and for eternity. It's the most important relationship you'll ever enjoy. Build your relationship with God so you can reap the life-changing benefits only He can provide: unconditional love; eternal life; financial and emotional strength; health; and solutions to every problem or challenge you'll ever face. May God Bless You, GGII Ministries 160 White Pines Dr. Suite C Alpharetta GA, 30004 *** We apologize if you are not interested in being on our Bible News e-mail list. The Internet is the fastest method of distributing this type of timely information all over the world. If you wish to have your e-mail address off our Bible News e-mail database, DO NOT USE THE REPLY BUTTON. THE FROM ADDRESS DOES NOT GO TO OUR OPT-OUT DATABASE. Simply click here to send an e-mail that will opt-out your address from the database: mailto:[EMAIL PROTECTED]?subject=offlist
Kallstrom
Did an interview for Time Digital 2 or 3 years ago. Just threw my copy away. Equated limits on the effectiveness of domestic crypto with speed limits. Pretty much spewed the party line. Had quit to work for a bank. google it : james kallstrom fbi cryptography http://www.inet-one.com/cypherpunks/dir.98.07.13-98.07.19/msg00018.html
Antigen found W32/Sircam-A (Sophos) virus
Antigen for Exchange found JJ.doc.bat infected with W32/Sircam-A (Sophos) virus. The file is currently Removed. The message, CDR: JJ, was sent from Stephen and was discovered in IMC Queues\Inbound located at Cognex/Natick/BAMBI.
OPT: Re: CDR: Open 802.11b wireless access points and remailers
http://einstein.ssz.com/hangar18 Come join the Plan 9 party...(anybody got 16-bit ISA EIDE Controllers for sale? I've got two boxes I'll donate to the cause. One process, one file. I just can't find the #!*-]#@ controllers local). The PC-104 format is something I highly recommend if you want something specific like this. In particular, http://www.emjembedded.com 1-800-548-2319 Slap it in a NEMA box and you're a happy camper. It's one of the reasons I used 'small world networks' for my Igor remailer (Perl on Plan 9). In passing, if anyone is in Austin Thu. nite there is a key signing party at the Austin Linux Group, http://austinlug.org On Tue, 24 Jul 2001 [EMAIL PROTECTED] wrote: Several years ago, there was discussion on the list about creating headless or throwaway remailers (likely hidden in some institution where they could get power and net access for a long time until they were discovered)- I didn't spend a lot of time thinking about that, because I thought that the necessary Ethernet (or other network) connection which would be made between the hidden machine and the host network would make it easy enough to detect and disable that it wasn't a productive direction for exploration. (There are also any number of legal issues related to trespass, unauthorized network use, etc., which may apply.) However, that limitation may be withering away, with the spread of 802.11b (or similar) wireless networks - the attached email describes a Seattle-area system apparently set up by Microsoft in a shopping mall providing free network access to people within the reach of its radio units. An old laptop, a solar panel, some auxiliary batteries, and an 802.11 network card might be able to stay online for a long, long time in that sort of environment. This also sounds like a good way to get casual, anonymous network access to upload or download email - once upon a time, bad people who wanted to send forbidden emails or browse hidden sites did that by going to public terminals in libraries or web cafes or [...] - now perhaps they'll do that at Starbucks or the mall, either for free or having paid cash for short-term access via 802.11b wireless. And, if you're the sort that's worried about permission, etc., the nice thing is that these networks are explicitly intended for the use of guests on the premises, so at least the first level of concerns about trespass or unauthorized use are addressed. These days, remailers aren't as exciting as they once were - perhaps the next important tools are going to be Freenet or Mojo Nation nodes - but the combination of wireless access plus anonymous access provides an interesting opportunity for network participants which are physically within a jurisdiction yet unavailable for punishment. To: [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] From: Todd Boyle [EMAIL PROTECTED] Date: Mon, 23 Jul 2001 15:24:14 +0200 Subject: [decentralization] Free wireless access at Crossroads Somehow I view this with the same sense of foreboding as the spread of two different species of africanized honeybees. In business school we were taught that the incumbent in a market generally wants to wait for upstarts to expend their capital to deploy in specific places then, go to those places and compete. Drawing on billions of reserves from product X, the larger vendor can give away product Y for free. Todd From: Michael Codanti [EMAIL PROTECTED] To: [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: Crossroads Mall in Bellevue Date: Mon, 23 Jul 2001 11:36:13 -0700 Organization: CIVIS Consulting I just thought I would drop a note to the lists about the Crossroads mall in Bellevue, WA. This is the one that Micro$oft has installed their test MSChoice network. We were on our way back from a trip to Canada and stopped in at the mall. Within seconds we were on the ChoiceNet network and according to my tests we had a full T1 to ourselves. (1132k down/1250k up) They have 4 Cisco APs and coverage appeard to be very good. Their site says you have to use the PANS client on Windows 2000, but I was using Windows XP RC1 and it ever even asked me to authentidicate... The most interesting thing is that the StarBucks in the mall has their MobileStar AP up, but signal strength sucked. (I was fairly close to StarBucks) And considering that ChoiceNet is free, and MobileStar wants $12/hour I don't know how much business they will get... Michael
FBI: Keystone Gmen
[ my email is really fucked right now, gawd only knows how many copies this single transmission will result in. apologies in advance. ] http://interactive.wsj.com/articles/SB9960160921000.htm # #July 25, 2001 # #FBI Cyber Researcher Unleashes Virus #That E-Mails Private Agency Documents # #By TED BRIDIS #Staff Reporter of THE WALL STREET JOURNAL # #WASHINGTON -- A researcher in the Federal Bureau of Investiga #tion's cyber-protection unit unleashed a fast-spreading Internet #virus that e-mailed private FBI documents to outsiders -- all #on the eve of a Senate hearing into troubles at the unit. # #Although the Sircam virus didn't spread to other computers at #the FBI's National Infrastructure Protection Center, it did send #at least eight documents to a number of outsiders. One, about #the investigation into an unrelated virus, was marked official #use only. The Sircam virus has infected thousands of computers #since its discovery last week. # #FBI spokeswoman Deb Weierman said that no sensitive or classified #information about continuing investigations was disclosed Tuesday. #The official use designation protects documents from disclosure #under the U.S. Freedom of Information Act. # #It isn't uncommon for virus researchers to accidentally infect #their own computers, but the mistake was particularly embarrassing #because it occurred ahead of a Senate Judiciary panel's oversight #hearing about the FBI cyber unit's effectiveness. Lawmakers were #expected to focus on other agencies' failure to cooperate fully #with the FBI center, and on a perceived lack of trust between #the FBI and private-sector groups. # #The unit generally gets high remarks for its criminal #investigations, and even critics say the unit is more effective #than it was a year ago. The effort here is not to embarrass #anybody but to stress that a lot of work has to be done, said #Republican Sen. Jon Kyl of Arizona. # #Meanwhile, the White House has begun organizing a new #early-warning network for Internet threats. But unlike the current #system, it will be coordinated by the Pentagon, not the FBI. #The mechanism for warning all U.S. military and civilian agencies #-- and ultimately corporations -- will be dubbed the Cyber-Warning #and Information Network, or c-win. Organizers envision dozens #of computer centers that could sound an alert when a threat is #identified. # #The network is expected to begin operating in October. The FBI #unit, which currently relays these warnings, came under sharp #criticism from congressional auditors for issuing tardy alerts. #Ms. Weierman, the FBI spokeswoman, called the new network a #useful mechanism to offer the government a technical capability #that doesn't currently exist. The FBI, she said, wasn't concerned #it would lose its warning responsibilities. # #Tuesday, at least three people said they received some of the #FBI documents, including a 23-year-old Internet-security expert #in Belgium, Niels Heinen. He operates a Web site that reports #on Internet break-ins and speculated that the analyst, Vince #Rowe, visited the site on the infected computer. Mr. Rowe didn't #respond to a request for comment.
Re: A Study into the Use of Laser Retroreflectors on a Small Satellite - M.Unwin
At 6:30 PM -0500 7/24/01, Jim Choate wrote: And these are reasonably low power lasers... http://www.ee.surrey.ac.uk/SSC/IJSSE/issue1/unwin/unwin.html The simple fact is that the thermodynamic impact of a laser beam that is several feet across and emitting more photons than the surface of the sun will not be easy to reflect unless immense cooling is taken. Cost/weight factors alone argue it in the negative. More photons than the surface of the sun for HOW LONG? A minute? A second? A millisecond? A microsecond? You confuse fluence with flux, a classic mistake. (A pulse brighter than the sun but lasting only milliseconds will have far less heating effect than other flux level pulses lasting longer. Calculations matter. And, yes, I used to do these calculations when I was refuting Kosta Tsipis' calculations of the late 70s. Fluence matters.) --Tim May -- Timothy C. May [EMAIL PROTECTED]Corralitos, California Political: Co-founder Cypherpunks/crypto anarchy/Cyphernomicon Technical: physics/soft errors/Smalltalk/Squeak/agents/games/Go Personal: b.1951/UCSB/Intel '74-'86/retired/investor/motorcycles/guns
FBI: Keystone Gmen
[ my email is really fucked right now, gawd only knows how many copies this single transmission will result in. apologies in advance. ] http://interactive.wsj.com/articles/SB9960160921000.htm # #July 25, 2001 # #FBI Cyber Researcher Unleashes Virus #That E-Mails Private Agency Documents # #By TED BRIDIS #Staff Reporter of THE WALL STREET JOURNAL # #WASHINGTON -- A researcher in the Federal Bureau of Investiga #tion's cyber-protection unit unleashed a fast-spreading Internet #virus that e-mailed private FBI documents to outsiders -- all #on the eve of a Senate hearing into troubles at the unit. # #Although the Sircam virus didn't spread to other computers at #the FBI's National Infrastructure Protection Center, it did send #at least eight documents to a number of outsiders. One, about #the investigation into an unrelated virus, was marked official #use only. The Sircam virus has infected thousands of computers #since its discovery last week. # #FBI spokeswoman Deb Weierman said that no sensitive or classified #information about continuing investigations was disclosed Tuesday. #The official use designation protects documents from disclosure #under the U.S. Freedom of Information Act. # #It isn't uncommon for virus researchers to accidentally infect #their own computers, but the mistake was particularly embarrassing #because it occurred ahead of a Senate Judiciary panel's oversight #hearing about the FBI cyber unit's effectiveness. Lawmakers were #expected to focus on other agencies' failure to cooperate fully #with the FBI center, and on a perceived lack of trust between #the FBI and private-sector groups. # #The unit generally gets high remarks for its criminal #investigations, and even critics say the unit is more effective #than it was a year ago. The effort here is not to embarrass #anybody but to stress that a lot of work has to be done, said #Republican Sen. Jon Kyl of Arizona. # #Meanwhile, the White House has begun organizing a new #early-warning network for Internet threats. But unlike the current #system, it will be coordinated by the Pentagon, not the FBI. #The mechanism for warning all U.S. military and civilian agencies #-- and ultimately corporations -- will be dubbed the Cyber-Warning #and Information Network, or c-win. Organizers envision dozens #of computer centers that could sound an alert when a threat is #identified. # #The network is expected to begin operating in October. The FBI #unit, which currently relays these warnings, came under sharp #criticism from congressional auditors for issuing tardy alerts. #Ms. Weierman, the FBI spokeswoman, called the new network a #useful mechanism to offer the government a technical capability #that doesn't currently exist. The FBI, she said, wasn't concerned #it would lose its warning responsibilities. # #Tuesday, at least three people said they received some of the #FBI documents, including a 23-year-old Internet-security expert #in Belgium, Niels Heinen. He operates a Web site that reports #on Internet break-ins and speculated that the analyst, Vince #Rowe, visited the site on the infected computer. Mr. Rowe didn't #respond to a request for comment.
Antigen found W32/Sircam-A (Sophos) virus
Antigen for Exchange found gASTOS DE ENVIO.xls.pif infected with W32/Sircam-A (Sophos) virus. The file is currently Removed. The message, CDR: gASTOS DE ENVIO, was sent from Calipo and was discovered in IMC Queues\Inbound located at Cognex/Natick/BAMBI.
Re: Air Force Turns 747 Into Holster for Giant Laser (washing tonpost.com)
Bill Stewart writes: Meanwhile of course, any foreign terrorist that wants to nuke the US with a physically small weapon only needs to pack it in cocaine and bring it in with the regular shipments, while Rogue Nations that can only make large Fat Boy style weapons need cruder methods, like bribing a crane operator to load the wrong container on a ship bound for New York or Los Angelese harbor. It may not be that easy. My understanding (based on various TV programs broadcast back in the early 90's) is that there is a program called 'NEST', which stands for something like Nuclear Emergency (mumble) Team, tasked with dealing with this type of problem. One protection hinted is that strategically chosen points of transit (bridges, ports, tunnels, major highways, mail, baggage and freight facilities, etc) have detectors for nuclear materials. The thing is, while you can sheild a source to the point where it is not a hazard, sheilding it to the point of *undetectability* is far harder task. If you detect even a single gamma ray of a certain frequency, or betas or even alphas of certain energies, you *know* that a certain isotope produced them. If the detectors note the presence of a certain isotopes, they generate the appropriate alarms. There are also other detection systems - I've seen X-rays of entire container trucks which were passing through the Chunnel - illegal immigrants were quite visible inside the container. An attacker's best chance would be to place his weapon in a container, heavily sheilded, and then to bury that in the middle of a stack of other containers of heavy shielding in the hold of a container ship, and plan to detonate it while still on board in a target harbor. UPS probably would not work (besides, I think they have a limit of around 90 lbs). Peter Trei
Antigen found W32/Sircam-A (Sophos) virus
Antigen for Exchange found Hi Juniper.doc.com infected with W32/Sircam-A (Sophos) virus. The file is currently Removed. The message, CDR: Hi Juniper, was sent from Jan Lundberg and was discovered in IMC Queues\Inbound located at Cognex/Natick/BAMBI.
Re: A Study into the Use of Laser Retroreflectors on a Small Satellite - M.Unwin
On Tue, 24 Jul 2001, Tim May wrote: More photons than the surface of the sun for HOW LONG? Continous. If you look at the sun constantly a certain number of photons hit a given area of your retina. Stare at a 1 mW laser and an equal or great number strike that same area. -- Nature and Nature's laws lay hid in night: God said, Let Tesla be, and all was light. B.A. Behrend The Armadillo Group ,::;::-. James Choate Austin, Tx /:'/ ``::/|/ [EMAIL PROTECTED] www.ssz.com.', `/( e\ 512-451-7087 -~~mm-'`-```-mm --'-
Re: The Plan
This is true, of course. It's true in much the same way that a GOP administration/Congress is good for lefty groups in the sense that they can raise more money, and the converse when the Dems are in charge. Setup? Not a chance. The Feds don't like test cases unless they can win them. I wrote what I think is an interesting piece that'll be up on Wired tomorrow about what Congress thinks of the DMCA. Hint: They like it, and aren't gonna change it. -Declan On Tue, Jul 24, 2001 at 03:57:41PM -0700, Morlock Elloi wrote: Tasteless as it may sound (but this is home of cypherpranks anyway), it seems that Sklyarov's arrest advanced the anti-DMCA case more than anything else. And it will continue to advance it as long he remains in jail. Almost as if the whole thing was a clever setup. And it works. If feds release him they will prove that they are a corporate police in very clear terms. If they do not release him DMCA is facing a very real challenge. So I'd like to congratulate to whoever has masterminded this in Adobe. Excellent job. And when DMCA collapses the author should get public recognition. - = end (of original message) Y-a*h*o-o (yes, they scan for this) spam follows: Make international calls for as low as $.04/minute with Yahoo! Messenger http://phonecard.yahoo.com/
Re: Weird message from someone named NIPC
At 02:48 AM 7/26/2001 +, Triffid Master wrote: [ My PSINet email is history. ] Tim May wrote: # #I really cannot imagine why I am getting these SirCam messages #from some government agency named NIPC, unless for some reason #my e-mail address is in their address book. How could that happen? I don't know, but I just got my first two mailings from some poor sap, and it has the same intro. I send you this file in order to have your advice I emailed the person to let them know, asked if they've visited my URL or anything. Gave them the CERT URL. Again: http://www.cert.org/advisories/CA-2001-22.html Tim May wrote: #It must be bogus.This does not seem plausible, that they would #send me something, so I expect a hoax. No, it's real, and screamingly funny!!! I received an executable .xls.pif version of a spreadsheet called 2000 taxes. From viewing *hundreds* of these using strings as part of previous email monitoring duties, I can tell just by looking at it that it's the real thing. (If that showed anything interesting, I transferred it to a PeeCee for further inspection.) If anyone actually wants to run the win32 executable, email me for it. Check it out: #Salary #David-AMD #Lori-Dell #Federal #Withholding #PAYROLL #GMAC-Home Loan #Bank One - Home Improvement #HOUSE INTEREST #Silver Lake-Time Share-2nd Home #HOUSE - REAL ESTATE TAX #GMAC #Amount #Taxes Paid @ Time of Withdrawal! #Hartford was rolled to Dell-1099R: #1099R Shows Distribution Code H in Box 7 as rolled over. #401k WITHDRAWAL DELL #INTEREST INCOME #Bank One #Bank of America #CHARITY GIFTS #Goodwill #CAPITAL GAINS/LOSSES #See Etrade Info My experience says it is real. Tim May wrote: # #PC has been tasked to assist in the take-down of a high-profile #hacker terrorist at the DefCon conference next week in Las Vegas. # #The take-down is being planned for maximal public impact, as #per AG Ashcroft's memo of 24JUN01. Full assistance will be #provided by NIPC. Plain clothes agents will be at the conference #to render assistance. Holy Shit, Batman!!! Too bad it didn't get out earlier! Let me know if you want the whole thing put up on WWW. I've also gotten two such emailing. Fortunately (or unfortunately) the attachments were automatically detected by my system and deleted before I could read them. steve
RE: Attention to detail lacking
Tim May Wrote: I think Choate is much like this tech of mine: lacking a solid grounding and overly reliant on his own private notions of what mass and energy and group velocity and so on are. All the best cranks view the world this way. maybe Choate is the long lost son of oedipa maas. phillip
Re: Air Force Turns 747 Into Holster for Giant Laser (washingtonpost.com)
On Wed, 25 Jul 2001, Steve Schear wrote: Or reduce the effectiveness of the detection system by clandestinely salting vessels entering our ports with radio active dust with the same energy signatures. Sort of a radio active chaff. The point of a clandestine WOMD attack is that there is no forewarning. Salting random vehicles will make some people way more paranoid that they already are. As to nukes, according to anecdotal evidence (a single former employee), UPS doesn't screen for fissible signatures. I very much doubt they screen for vanilla HE (which, unless well packaged, emanate telltale volatiles, and contain a high nitrogen concentration, which you could probably detect with proper activation spectrocopy, unless *very* well shielded, or packed with a shipment of nitrate fertilizer). Screening devices are expensive, and have a limited processvity -- but technology marches on, of course. If a country would want to nuke a country with few 10..100 devices, it will get them into the country, and there's jack you can do about that. The probability of detection would be very, very low. The reason it's not being done is 1) no point 2) basic milk of human kindness. Sooner or later some random ijit or random group of ijits is going to fry/poison/infect a few people, which will have some serious impact on security policy, and the style of living where people concentrate. I hope I'm not there when it happens.
London C Training - poRusski
html head meta http-equiv=Content-Type content=text/html; charset=windows-1251 titleRussia/title /head body lang=EN-GB link=black vlink=purple style='tab-interval:36.0pt' div class=Section1 table border=0 cellpadding=5 cellspacing=5 width=100% tr td width=9% height=54 bgcolor=#FF6633font face=Arialstrong/strong/font/td td width=91% height=54 bgcolor=#3366CCfont face=Arialstrongspan lang=RU style='font-size:12.0pt;mso-bidi-font-size: 10.0pt;mso-ansi-language:RU'font face=Courier size=5 color=#FFLondon Corporate Training/font/span/strong/font/td /tr tr bgcolor=#DFE4DE td colspan=2span lang=RU style='font-size:12.0pt;mso-bidi-font-size: 10.0pt;mso-ansi-language:RU'b#1052;#1099; #1051;#1086;#1085;#1076;#1086;#1085;#1089;#1082;#1072;#1103; #1082;#1086;#1084;#1087;#1072;#1085;#1080;#1103; #1079;#1072;#1085;#1080;#1084;#1072;#1102;#1097;#1072;#1103;#1089;#1103;span style=mso-spacerun: yes /span/b/spanbspan lang=RU style='font-size:12.0pt; mso-bidi-font-size:9.0pt;mso-ansi-language:RU'#1082;#1086;#1088;#1087;#1086;#1088;#1072;#1090;#1080;#1074;#1085;#1099;#1084;/spanspan lang=RU style='font-size:12.0pt;mso-bidi-font-size:10.0pt;mso-ansi-language: RU' #1084;#1077;#1085;#1077;#1076;#1078;#1084;#1077;#1085;#1090; #1090;#1088;#1077;#1085;#1080;#1085;#1075;#1086;#1084;, #1087;#1088;#1077;#1076;#1083;#1072;#1075;#1072;#1077;#1084; #1042;#1072;#1084; #1089;#1074;#1086;#1080; #1091;#1089;#1083;#1091;#1075;#1080; #1074; #1090;#1072;#1082;#1080;#1093; #1089;#1092;#1077;#1088;#1072;#1093; #1086;#1073;#1091;#1095;#1077;#1085;#1080;#1103; #1082;#1072;#1082;:o:pbr /o:p/spanspan lang=RU style='font-size:12.0pt;mso-bidi-font-size: 10.0pt;mso-ansi-language:RU'#1060;#1080;#1085;#1072;#1085;#1089;#1086;#1074;#1099;#1081; #1084;#1077;#1085;#1077;#1076;#1078;#1084;#1077;#1085;#1090;, #1050;#1072;#1076;#1088;#1086;#1074;#1099;#1081; #1084;#1077;#1085;#1077;#1076;#1078;#1084;#1077;#1085;#1090;, #1055;#1086;#1076;#1073;#1086;#1088; #1087;#1077;#1088;#1089;#1086;#1085;#1072;#1083;#1072;,span style=mso-spacerun: yes /span#1069;#1082;#1086;#1083;#1086;#1075;#1080;#1095;#1077;#1089;#1082;#1080;#1081; #1084;#1077;#1085;#1077;#1076;#1078;#1084;#1077;#1085;#1090;, /spanspan style='font-size:12.0pt;mso-bidi-font-size:10.0pt'HR/spanspan lang=RU style='font-size:12.0pt;mso-bidi-font-size:10.0pt;mso-ansi-language:RU'- #1084;#1077;#1085;#1077;#1076;#1078;#1084;#1077;#1085;#1090;, /spanspan style='font-size:12.0pt;mso-bidi-font-size:10.0pt'PR/spanspan lang=RU style='font-size:12.0pt;mso-bidi-font-size:10.0pt;mso-ansi-language:RU'- #1084;#1077;#1085;#1077;#1076;#1078;#1084;#1077;#1085;#1090;,o:p /o:p/spanspan style='font-size:12.0pt;mso-bidi-font-size:10.0pt'IT- /spanspan lang=RU style='font-size:12.0pt;mso-bidi-font-size:10.0pt; mso-ansi-language:RU'#1084;#1077;#1085;#1077;#1076;#1078;#1084;#1077;#1085;#1090;/spanspan style='font-size:12.0pt;mso-bidi-font-size:10.0pt', E-Commerce #1080; #1090;#1076;.o:p/o:p/span /b /td /tr tr bgcolor=#DFE4DE td colspan=2 height=112 p align=centerspan lang=RU style='font-size:12.0pt;mso-bidi-font-size: 10.0pt;mso-ansi-language:RU'#1042; #1076;#1072;#1085;#1085;#1099;#1081; #1084;#1086;#1084;#1077;#1085;#1090; #1084;#1099; #1079;#1072;#1074;#1077;#1088;#1096;#1072;#1077;#1084; #1087;#1086;#1076;#1075;#1086;#1090;#1086;#1074;#1082;#1091; #1050;#1086;#1085;#1092;#1077;#1088;#1077;#1085;#1094;#1080;#1080;:o:pbr /o:pfont color=#FF#1057;#1090;#1086;#1087;! #1054;#1090;#1084;#1099;#1074;#1072;#1085;#1080;#1102; #1044;#1077;#1085;#1077;#1075;/font/spanfont color=#FFspan style='font-size:12.0pt; mso-bidi-font-size:10.0pt'o:p/o:p/span/fontspan style='font-size:12.0pt; mso-bidi-font-size:10.0pt'o:pbr /o:p/spanspan lang=RU style='font-size:12.0pt;mso-bidi-font-size: 10.0pt;mso-ansi-language:RU'#1055;#1088;#1086;#1075;#1088;#1072;#1084;#1084;#1072; #1073;#1091;#1076;#1077;#1090; #1074;#1082;#1083;#1102;#1095;#1072;#1090;#1100; #1074; #1089;#1077;#1073;#1103; #1087;#1086;#1076;#1088;#1086;#1073;#1085;#1099;#1081; #1088;#1072;#1079;#1073;#1086;#1088; #1086;#1087;#1077;#1088;#1072;#1094;#1080;#1081; #1089;#1074;#1103;#1079;#1072;#1085;#1085;#1099;#1093; #1089; #1074;#1099;#1103;#1074;#1083;#1077;#1085;#1080;#1077;#1084; #1080; #1087;#1088;#1077;#1076;#1086;#1090;#1074;#1088;#1072;#1097;#1077;#1085;#1080;#1077;#1084; #1054;#1090;#1084;#1099;#1074;#1072;#1085;#1080;#1103; #1044;#1077;#1085;#1077;#1075;, /spanspan lang=RU style='font-size:12.0pt;mso-bidi-font-size: 10.0pt;mso-ansi-language:RU'#1075;#1083;#1072;#1074;#1085;#1099;#1084; #1086;#1073;#1088;#1072;#1079;#1086;#1084; #1074; #1057;#1090;#1088;#1072;#1085;#1072;#1093;
Re: Choate Testing His ASAT Again?
AARGH! The Colour Out of Space! Run away! Jim Windle wrote: A Reuters reporter saw a tapered object shaped like a trumpet bell falling diagonally through the western sky near West Chester, Pennsylvania, 20 miles from Philadelphia at about 6:20. The object emitted a lustrous rainbow of colors ranging from bright yellow on its downward-pointing flared end to light green and finally rust-colored red at the upward pointing tapered end.
London C Training - poRusski
html head meta http-equiv=Content-Type content=text/html; charset=windows-1251 titleRussia/title /head body lang=EN-GB link=black vlink=purple style='tab-interval:36.0pt' div class=Section1 table border=0 cellpadding=5 cellspacing=5 width=100% tr td width=9% height=54 bgcolor=#FF6633font face=Arialstrong/strong/font/td td width=91% height=54 bgcolor=#3366CCfont face=Arialstrongspan lang=RU style='font-size:12.0pt;mso-bidi-font-size: 10.0pt;mso-ansi-language:RU'font face=Courier size=5 color=#FFLondon Corporate Training/font/span/strong/font/td /tr tr bgcolor=#DFE4DE td colspan=2span lang=RU style='font-size:12.0pt;mso-bidi-font-size: 10.0pt;mso-ansi-language:RU'b#1052;#1099; #1051;#1086;#1085;#1076;#1086;#1085;#1089;#1082;#1072;#1103; #1082;#1086;#1084;#1087;#1072;#1085;#1080;#1103; #1079;#1072;#1085;#1080;#1084;#1072;#1102;#1097;#1072;#1103;#1089;#1103;span style=mso-spacerun: yes /span/b/spanbspan lang=RU style='font-size:12.0pt; mso-bidi-font-size:9.0pt;mso-ansi-language:RU'#1082;#1086;#1088;#1087;#1086;#1088;#1072;#1090;#1080;#1074;#1085;#1099;#1084;/spanspan lang=RU style='font-size:12.0pt;mso-bidi-font-size:10.0pt;mso-ansi-language: RU' #1084;#1077;#1085;#1077;#1076;#1078;#1084;#1077;#1085;#1090; #1090;#1088;#1077;#1085;#1080;#1085;#1075;#1086;#1084;, #1087;#1088;#1077;#1076;#1083;#1072;#1075;#1072;#1077;#1084; #1042;#1072;#1084; #1089;#1074;#1086;#1080; #1091;#1089;#1083;#1091;#1075;#1080; #1074; #1090;#1072;#1082;#1080;#1093; #1089;#1092;#1077;#1088;#1072;#1093; #1086;#1073;#1091;#1095;#1077;#1085;#1080;#1103; #1082;#1072;#1082;:o:pbr /o:p/spanspan lang=RU style='font-size:12.0pt;mso-bidi-font-size: 10.0pt;mso-ansi-language:RU'#1060;#1080;#1085;#1072;#1085;#1089;#1086;#1074;#1099;#1081; #1084;#1077;#1085;#1077;#1076;#1078;#1084;#1077;#1085;#1090;, #1050;#1072;#1076;#1088;#1086;#1074;#1099;#1081; #1084;#1077;#1085;#1077;#1076;#1078;#1084;#1077;#1085;#1090;, #1055;#1086;#1076;#1073;#1086;#1088; #1087;#1077;#1088;#1089;#1086;#1085;#1072;#1083;#1072;,span style=mso-spacerun: yes /span#1069;#1082;#1086;#1083;#1086;#1075;#1080;#1095;#1077;#1089;#1082;#1080;#1081; #1084;#1077;#1085;#1077;#1076;#1078;#1084;#1077;#1085;#1090;, /spanspan style='font-size:12.0pt;mso-bidi-font-size:10.0pt'HR/spanspan lang=RU style='font-size:12.0pt;mso-bidi-font-size:10.0pt;mso-ansi-language:RU'- #1084;#1077;#1085;#1077;#1076;#1078;#1084;#1077;#1085;#1090;, /spanspan style='font-size:12.0pt;mso-bidi-font-size:10.0pt'PR/spanspan lang=RU style='font-size:12.0pt;mso-bidi-font-size:10.0pt;mso-ansi-language:RU'- #1084;#1077;#1085;#1077;#1076;#1078;#1084;#1077;#1085;#1090;,o:p /o:p/spanspan style='font-size:12.0pt;mso-bidi-font-size:10.0pt'IT- /spanspan lang=RU style='font-size:12.0pt;mso-bidi-font-size:10.0pt; mso-ansi-language:RU'#1084;#1077;#1085;#1077;#1076;#1078;#1084;#1077;#1085;#1090;/spanspan style='font-size:12.0pt;mso-bidi-font-size:10.0pt', E-Commerce #1080; #1090;#1076;.o:p/o:p/span /b /td /tr tr bgcolor=#DFE4DE td colspan=2 height=112 p align=centerspan lang=RU style='font-size:12.0pt;mso-bidi-font-size: 10.0pt;mso-ansi-language:RU'#1042; #1076;#1072;#1085;#1085;#1099;#1081; #1084;#1086;#1084;#1077;#1085;#1090; #1084;#1099; #1079;#1072;#1074;#1077;#1088;#1096;#1072;#1077;#1084; #1087;#1086;#1076;#1075;#1086;#1090;#1086;#1074;#1082;#1091; #1050;#1086;#1085;#1092;#1077;#1088;#1077;#1085;#1094;#1080;#1080;:o:pbr /o:pfont color=#FF#1057;#1090;#1086;#1087;! #1054;#1090;#1084;#1099;#1074;#1072;#1085;#1080;#1102; #1044;#1077;#1085;#1077;#1075;/font/spanfont color=#FFspan style='font-size:12.0pt; mso-bidi-font-size:10.0pt'o:p/o:p/span/fontspan style='font-size:12.0pt; mso-bidi-font-size:10.0pt'o:pbr /o:p/spanspan lang=RU style='font-size:12.0pt;mso-bidi-font-size: 10.0pt;mso-ansi-language:RU'#1055;#1088;#1086;#1075;#1088;#1072;#1084;#1084;#1072; #1073;#1091;#1076;#1077;#1090; #1074;#1082;#1083;#1102;#1095;#1072;#1090;#1100; #1074; #1089;#1077;#1073;#1103; #1087;#1086;#1076;#1088;#1086;#1073;#1085;#1099;#1081; #1088;#1072;#1079;#1073;#1086;#1088; #1086;#1087;#1077;#1088;#1072;#1094;#1080;#1081; #1089;#1074;#1103;#1079;#1072;#1085;#1085;#1099;#1093; #1089; #1074;#1099;#1103;#1074;#1083;#1077;#1085;#1080;#1077;#1084; #1080; #1087;#1088;#1077;#1076;#1086;#1090;#1074;#1088;#1072;#1097;#1077;#1085;#1080;#1077;#1084; #1054;#1090;#1084;#1099;#1074;#1072;#1085;#1080;#1103; #1044;#1077;#1085;#1077;#1075;, /spanspan lang=RU style='font-size:12.0pt;mso-bidi-font-size: 10.0pt;mso-ansi-language:RU'#1075;#1083;#1072;#1074;#1085;#1099;#1084; #1086;#1073;#1088;#1072;#1079;#1086;#1084; #1074; #1057;#1090;#1088;#1072;#1085;#1072;#1093;
Re: Choate Prime Physics
Jim Choate [EMAIL PROTECTED] wrote: That current re-emits photons that retain both frequency and temporal/time related coherence (see Maxwell's Equations for more detail). However, the total number of photons MUST be reduced from the incident beam. This also means the incident photons can not be the same as the emitted photons. The photons (as opposed to 'a photon') lose energy. That still means your original post was wrong. Jim Choate [EMAIL PROTECTED] wrote: The optics used for focusing are NOT mirrors, they are (hopefully) transparent at the frequency under use. A mirror on the other hand is required to be OPAQUE with respect to transmission, we want full, 100%, reflectivity. That means that every photon that hits that mirror interacts, loses some energy, and gets re-emitted. See? Every photon that hits the mirror, etc. You were under the impression that each photon lost energy. You were wrong. It's not hard to admit it. C'mon. If you don't want to type it, you can just cut and paste the following into a message: ---Begin cut area--- I, James Choate, was wrong. My statements concerning the interactions of photons with mirrors showed a clear misunderstanding of the underlying physics. ---End cut area--- -- Riad Wahby [EMAIL PROTECTED] MIT VI-2/A 2002 5105
Are the digits of Pi random? A Berkley lab researcher may hold the key
http://www.sciencedaily.com/releases/2001/07/010725081838.htm James Choate Product Certification - Operating Systems Staff Engineer 512-436-1062 [EMAIL PROTECTED]
Re: Open 802.11b wireless access points and remailers
In article 3B5E66E7.19729.1368F157@localhost, Roy M. Silvernail [EMAIL PROTECTED] wrote: With an adapter, I can run a 802.11 card from the CF socket, I think. (drivers might be tricky) You don't need an adapter: http://www.symbol.com/products/wireless/la4137.html It's an 802.11 card in a Compact Flash socket. - Ian
Re: Choate Testing His ASAT Again?
On Wed, 25 Jul 2001, Ken Brown wrote: AARGH! The Colour Out of Space! Run away! Naw, only a High Triffid Alert. -- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a __ ICBMTO : N48 10'07'' E011 33'53'' http://www.lrz.de/~ui22204 57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3
SirCam
I got my first SirCam hit today.. WOoohooo Jon BeetsPacer Communications
RE: Attention to detail lacking
At 10:29 AM -0400 7/25/01, Phillip H. Zakas wrote: Tim May Wrote: I think Choate is much like this tech of mine: lacking a solid grounding and overly reliant on his own private notions of what mass and energy and group velocity and so on are. All the best cranks view the world this way. maybe Choate is the long lost son of oedipa maas. What a w.a.s.t.e. --Tim May -- Timothy C. May [EMAIL PROTECTED]Corralitos, California Political: Co-founder Cypherpunks/crypto anarchy/Cyphernomicon Technical: physics/soft errors/Smalltalk/Squeak/agents/games/Go Personal: b.1951/UCSB/Intel '74-'86/retired/investor/motorcycles/guns
Re: CDR: Re: Air Force Turns 747 Into Holster for Giant Laser (washing tonpost.com)
Tomorrow's Soldier David Alexander ISBN 0-380-79502-7 Chpt. 8 War Beyond Tomorrow On Wed, 25 Jul 2001, Trei, Peter wrote: It may not be that easy. My understanding (based on various TV programs broadcast back in the early 90's) is that there is a program called 'NEST', which stands for something like Nuclear Emergency (mumble) Team, tasked with dealing with this type of problem. One protection hinted is that strategically chosen points of transit (bridges, ports, tunnels, major highways, mail, baggage and freight facilities, etc) have detectors for nuclear materials. The thing is, while you can sheild a source to the point where it is not a hazard, sheilding it to the point of *undetectability* is far harder task. If you detect even a single gamma ray of a certain frequency, or betas or even alphas of certain energies, you *know* that a certain isotope produced them. If the detectors note the presence of a certain isotopes, they generate the appropriate alarms. There are also other detection systems - I've seen X-rays of entire container trucks which were passing through the Chunnel - illegal immigrants were quite visible inside the container. An attacker's best chance would be to place his weapon in a container, heavily sheilded, and then to bury that in the middle of a stack of other containers of heavy shielding in the hold of a container ship, and plan to detonate it while still on board in a target harbor. UPS probably would not work (besides, I think they have a limit of around 90 lbs). -- Nature and Nature's laws lay hid in night: God said, Let Tesla be, and all was light. B.A. Behrend The Armadillo Group ,::;::-. James Choate Austin, Tx /:'/ ``::/|/ [EMAIL PROTECTED] www.ssz.com.', `/( e\ 512-451-7087 -~~mm-'`-```-mm --'-
Re: Choate Prime Physics
On Wed, Jul 25, 2001 at 09:10:00AM -0400, Riad S. Wahby wrote: ---Begin cut area--- I, James Choate, was wrong. My statements concerning the interactions of photons with mirrors showed a clear misunderstanding of the underlying physics. ---End cut area--- My working theory is that Choate is using the assembled, um, wisdom of the cypherpunks as an alternative to classical forms of education (note I'm not saying he's actually learning anything). Or, alternatively, Choate is simply a Markov chain that uses the cypherpunks archives, the U.S. Constitution, and a high school physics book as its base text. Perhaps eventually the Book of Choate will become as well known as the Book of Beak: http://www.talltree.net/~aad/beak.html -Declan
Antigen found W32/Sircam-A (Sophos) virus
Antigen for Exchange found Fax Cover Sheet.doc.bat infected with W32/Sircam-A (Sophos) virus. The file is currently Removed. The message, CDR: Fax Cover Sheet, was sent from joe lynch and was discovered in IMC Queues\Inbound located at Cognex/Natick/BAMBI.
where's dildo? if he's not white, at Texas Southern University
Report: TSU Law School Admissions Too Easy The American Bar Association is asking Texas Southern University's law school to raise admission standards, effectively shutting the door to many black and Hispanic students that would likely not have been accepted at other state law schools. The request comes as part of a seven-year accreditation review of the Thurgood Marshall School of Law by the ABA. The law school, created in 1946 to allow blacks to attend a publicly funded law school, trains a majority of the state's black and Hispanic law students. Experts said that many TSU law students and graduates would likely not have been accepted at other state law schools because their college grade point averages and entrance exam scores were too low. The attrition rate is unconscionably high, and the bar passage rate remains the lowest among all law schools in the state of Texas, the Chicago-based ABA said in a report obtained by the Houston Chronicle. The report, citing statistics from the July 2000 Texas bar exam, said that 52 percent of TSU law school graduates passed the test on their first attempt, and 33 percent passed on subsequent attempts. The state-passing rate for those taking the exam for the first time on the same date was 82 percent, and 42 percent on second attempts. Of the 331 students who entered the TSU law school in the fall of 1999, only 201 maintained the required 2.0 grade point average needed to stay at the school by the end of the 2000 academic year, the report said. That gave the school a first-year attrition rate of 40 percent, more than four times the national average of 8.9 percent. Admissions standards have already been raised slightly to meet ABA concerns, said John Brittain, dean of the law school. He expects the school to retain its ABA accreditation, which is required by the state. The school must submit a plan to the ABA by November. Brittain said that he believes it is possible to raise admission standards to weed out many students who would not graduate or pass, but still provide an opportunity to attend law school to minorities who otherwise might not qualify. Raising admission standards presents a dilemma for the state of Texas because it has abolished affirmative action in higher education, Brittain said. The Thurgood Marshall School of Law is performing a special mission for the state by allowing many students to attend law school who would not have gained admission to other law schools. We want to continue fulfilling this historical mission of serving minorities. We have to do a little bit of both, raise admission standards and take educational risks. In the 1999-2000 academic year, TSU officials said that the school enrolled 92 percent of all black first-year law students attending the state's four public law schools and 52 percent of the first-year Hispanic students. In recent years, the average Law School Admissions Test score for students admitted to TSU has been 142, significantly below the national average of 150, the ABA said. The median grade point average for students admitted to TSU's law school has ranged from 2.67 to 2.76, compared with the national average of 3.06 to 3.10. The ABA report also said that TSU's law school does not have adequate resources to educate the large classes of approximately 300 students it has admitted in recent years. The ABA report said that the law building is too small, classes are crowded and that there is not enough space for clinical programs or student organizations. Brittain said that the university has pledged to spend $5 million to renovate the law school building and is considering spending another $5 million to build a new wing. He also said that the school will provide more training for the bar exam, strengthen its research and writing programs, and increase library funding. For more information, log onto the Thurgood Marshall School of Law Web site at www.tsulaw.edu.
Re: So, what do the Russians think?
Good point. A Russian cryptographer was grabbed, unable to talk to his consulate for at least three days, and the Russians don't say anything? I smell a rat. Perhaps Dmitry was sold down the river. (Note for non-USA readers: sold down the river is an americanism for betrayal. It dates from the days of slavery, where the conditions for slaves were worse the further down the (Mississippi) river they were. It was common for slaveowners to promise to sell their slaves upriver to gain their goodwill, and then sell them downriver for more money than they could get upriver. Since slaves' communication was tightly controlled, lying to the ones left about where their buds had gone was also common, and usually undetected. Parallels to the current situation are left as an exercise for the reader.) Bear
Re: Air Force Turns 747 Into Holster for Giant Laser (washing tonpost.com)
At 11:05 AM 7/25/2001 -0400, Trei, Peter wrote: Bill Stewart writes: Meanwhile of course, any foreign terrorist that wants to nuke the US with a physically small weapon only needs to pack it in cocaine and bring it in with the regular shipments, while Rogue Nations that can only make large Fat Boy style weapons need cruder methods, like bribing a crane operator to load the wrong container on a ship bound for New York or Los Angelese harbor. It may not be that easy. My understanding (based on various TV programs broadcast back in the early 90's) is that there is a program called 'NEST', which stands for something like Nuclear Emergency (mumble) Team, tasked with dealing with this type of problem. One protection hinted is that strategically chosen points of transit (bridges, ports, tunnels, major highways, mail, baggage and freight facilities, etc) have detectors for nuclear materials. The thing is, while you can sheild a source to the point where it is not a hazard, sheilding it to the point of *undetectability* is far harder task. If you detect even a single gamma ray of a certain frequency, or betas or even alphas of certain energies, you *know* that a certain isotope produced them. If the detectors note the presence of a certain isotopes, they generate the appropriate alarms. There are also other detection systems - I've seen X-rays of entire container trucks which were passing through the Chunnel - illegal immigrants were quite visible inside the container. An attacker's best chance would be to place his weapon in a container, heavily sheilded, and then to bury that in the middle of a stack of other containers of heavy shielding in the hold of a container ship, and plan to detonate it while still on board in a target harbor. Or reduce the effectiveness of the detection system by clandestinely salting vessels entering our ports with radio active dust with the same energy signatures. Sort of a radio active chaff. steve
Fox Rabbits, or Fox Hounds (re: Fox's Ape Letter)
Fox Rabbits implies an arms race. Fox Hounds implies dead Fox. Here's a way to tickle the Fox. With a taser^H^H^H^HLinux. Copied from another list. On Tue, Jul 24, 2001 at 05:12:53PM -0700, David Honig wrote: It would be amusing to create very large files named Planet_of_the_Apes hosted on very slow servers servers slow enough to discourage actual downloaders, but existent enough to annoy Fox. 'Servers' includes numerous P2P tools, so you can do this at home. Extra credit if the very large files are uniformly distributed noise. Extra credit if the noise has the appropriate headers so it looks like a Divx or whatever is a plausible format. trivial to accomplish, too. attached to this mail is an empty mpeg file (zipped). you can inflate it to any size you desire by doing (on Linux): unzip empty.zip dd if=/dev/urandom bs=1024 count=xxx empty.mpg where xxx is the number of KB you want to add. use 681574400 for 650 MB which is the size of a CD and would look very promising for a pirated movie.
RE: FINALLY!!! A REAL BUSINESS OPPORTUNITY!!!
For a limited time, we are offering a FREE WEBSITE that will promote your service or product. This website will be custom designed for you and your needs. Our staff of graphic designers, web designers and our marketing team will work with you to design a site that will grab attention and get your product or service sold!!! If your FREE WEBSITE does not appear within the first 20 listings on the major search engines, you are not able to easily gain new clients for your business - because they can't find you!!! Our staff will get your FREE WEBSITE ranked in the top of the search engines so that when the estimated one million internet users today go shopping for what you sell, they will see your new website. They will buy from someone, shouldn't it be you? Millions of dollars are being spent on the Internet every day, What percentage of that do you want to receive??? Click on the link below to find out how to obtain your FREE WEBSITE!!! www.whereismysiteranked.com/freewebsite.htm Thank you again, James Kennsley III WhereIsMySiteRanked.com * We apologize if you received this advertisement by mistake. We make every effort to insure that the recipients of our direct marketing are those individuals who have asked to receive additional information on promotional offers from companies with whom we trade mailing list. If you would like to be removed from our mailing list please email us at [EMAIL PROTECTED] You may also send us a remove request via snail mail at RemoveMyName 3747 Beltline Rd. # 225 Addison, TX 75001, or you may phone us at 972-614-1140. Again we apologize if this message has reached you in error. *
Re: Attention to detail lacking
Tim, I think the reflected beam has the same wavelength as the incident beam. Photons hitting a surface most definitely do not lose some energy and get re-emitted. There are some very particular configurations that can act as wavelength doublers, but this is a particular, and hard to set up, configuration. Photons hitting a mirror either are re-emitted with the same energy as before or interact via the photoelectric effect and are thermalized (converted to phonons). That colors are preserved in mirrors, absent tints (special absorbers), is a Physics 1 clue that mirrors do not downshift photon energies!. The reason for the weak statement I think is that I imagine you might make an argument that the momentum transfer from the photon to the mirror results in a very small doppler shift...I'm just not positive about it at the smallest level of interaction. I think Choate is much like this tech of mine: lacking a solid grounding and overly reliant on his own private notions of what mass and energy and group velocity and so on are. All the best cranks view the world this way. I don't know Choate's educational background, but I would not be at all surprised if he is self-taught and moved into computers out of some technician training school. I've reached the same conclusion. I've known some very bright people who lacked access to a formal education. The results were some startling levels of understanding mixed right in with some mind blowing misconceptions and some outright gaps. Mike
Re: FBI: Keystone Gmen
Answer: Too many! Moral: Don't post to cypherpunks with a screwy mail {delivery,transport} agent. -Declan On Wed, Jul 25, 2001 at 06:55:01AM -0400, [EMAIL PROTECTED] wrote: [ my email is really fucked right now, gawd only knows how many copies this single transmission will result in. apologies in advance. ] http://interactive.wsj.com/articles/SB9960160921000.htm # #July 25, 2001 # #FBI Cyber Researcher Unleashes Virus #That E-Mails Private Agency Documents # #By TED BRIDIS #Staff Reporter of THE WALL STREET JOURNAL # #WASHINGTON -- A researcher in the Federal Bureau of Investiga #tion's cyber-protection unit unleashed a fast-spreading Internet #virus that e-mailed private FBI documents to outsiders -- all #on the eve of a Senate hearing into troubles at the unit. # #Although the Sircam virus didn't spread to other computers at #the FBI's National Infrastructure Protection Center, it did send #at least eight documents to a number of outsiders. One, about #the investigation into an unrelated virus, was marked official #use only. The Sircam virus has infected thousands of computers #since its discovery last week. # #FBI spokeswoman Deb Weierman said that no sensitive or classified #information about continuing investigations was disclosed Tuesday. #The official use designation protects documents from disclosure #under the U.S. Freedom of Information Act. # #It isn't uncommon for virus researchers to accidentally infect #their own computers, but the mistake was particularly embarrassing #because it occurred ahead of a Senate Judiciary panel's oversight #hearing about the FBI cyber unit's effectiveness. Lawmakers were #expected to focus on other agencies' failure to cooperate fully #with the FBI center, and on a perceived lack of trust between #the FBI and private-sector groups. # #The unit generally gets high remarks for its criminal #investigations, and even critics say the unit is more effective #than it was a year ago. The effort here is not to embarrass #anybody but to stress that a lot of work has to be done, said #Republican Sen. Jon Kyl of Arizona. # #Meanwhile, the White House has begun organizing a new #early-warning network for Internet threats. But unlike the current #system, it will be coordinated by the Pentagon, not the FBI. #The mechanism for warning all U.S. military and civilian agencies #-- and ultimately corporations -- will be dubbed the Cyber-Warning #and Information Network, or c-win. Organizers envision dozens #of computer centers that could sound an alert when a threat is #identified. # #The network is expected to begin operating in October. The FBI #unit, which currently relays these warnings, came under sharp #criticism from congressional auditors for issuing tardy alerts. #Ms. Weierman, the FBI spokeswoman, called the new network a #useful mechanism to offer the government a technical capability #that doesn't currently exist. The FBI, she said, wasn't concerned #it would lose its warning responsibilities. # #Tuesday, at least three people said they received some of the #FBI documents, including a 23-year-old Internet-security expert #in Belgium, Niels Heinen. He operates a Web site that reports #on Internet break-ins and speculated that the analyst, Vince #Rowe, visited the site on the infected computer. Mr. Rowe didn't #respond to a request for comment.
Re: Salon: The real enemies of the poor
On Wed, 25 Jul 2001, Faustine wrote: Jim wrote: What I found amusing is that you read the Salon article (probably w/o ^^^ great enthusiasm considering it is Salon after all) and you had another text of articles you hadn't read but had already decided it was a worthy read and that you'd get something out of it. Especially since it was such 'weighty' material in two different contexts. Hey now, I only got the hard copy last week...you can read a lot without having been through all 1124 pages!! I agree, I did say 'amusing'... What about the idea of reputation capital you people are always going on about, my prior knowledge of a couple of the authors makes me certain they wouldn't dream of putting their name on sloppy work... I'm not one of those 'you people'. Arguments from authority are of no worth. Past performance is not a reliable metric for future performance. The ends never justify the means, each step must self-justify. I strongly want global trade and cultural exchange. I do not want global government or corporate enterprise. You mean global corporate enterprise, or corporate enterprise at all? Actually both. The 1870 law which created the modern monster of a 'corporation' should be thrown out. Corporations, and other business organizations, should be able to sell to their like type across the relevant 'big pond'. A corporation should not be able to exist in two different countries as a single organization. I want direct interaction of business in government to be prohibited. How? Any solution I can think of has the potential to be more problematic than the problem itself. So what solution(s) have you thought of? Quid pro Quo... Business is an expression of individual rights. Business should not be able to contribute in any way to the democratic process (there is a reason that business/commerce is mentioned the way it is in the Constitution... An observation that is sure to piss some C-A-C-L's off, but the reality is that in 'free market' economics ala Hayek or Von Mises the potential for 'Bill Gates' wealth is nil. A 'free market' system isn't about getting filthy rich. It's about participating in a 'community'. Bottom line, the world is the way it is because people make it that way. It is not an inviolate law of nature (or if you accept that then some other precepts become questionable; free will, rational, responsible, pre-meditation, etc. ). -- Nature and Nature's laws lay hid in night: God said, Let Tesla be, and all was light. B.A. Behrend The Armadillo Group ,::;::-. James Choate Austin, Tx /:'/ ``::/|/ [EMAIL PROTECTED] www.ssz.com.', `/( e\ 512-451-7087 -~~mm-'`-```-mm --'-
No Subject
No Subject
No Subject
No Subject
No Subject
No Subject
CNN Programs - Presents - The hunt for Eric Rudolph
http://www.cnn.com/CNN/Programs/presents/ -- -- Nature and Nature's laws lay hid in night: God said, Let Tesla be, and all was light. B.A. Behrend The Armadillo Group ,::;::-. James Choate Austin, Tx /:'/ ``::/|/ [EMAIL PROTECTED] www.ssz.com.', `/( e\ 512-451-7087 -~~mm-'`-```-mm --'-
No Subject
Get Out of Debt Fast 24071
More Than $2500 in DEBT? We Can Help You PAY-OFF Your BILLS!! Click here for your FREE Consultation!! http://mysprintfast.com/web/debtfreedom/index1.html ~Cut your monthly payments by 50% or even more... ~Stop paying Creditors high interest rates? ~Better Manage your Financial Situation...Keep More Cash every Month! ~We can Help STOP any Creditor Harassment! ~Consolidate Regardless of past Credit History! Quick - Confidential - No Obligations - Click on the link below to get started!! http://mysprintfast.com/web/debtfreedom/index1.html ~~~ To be removed from all further mailings, please send a message to: 653 [EMAIL PROTECTED] We honor all remove requests.
No Subject
Antigen found W32/Sircam-A (Sophos) virus
Antigen for Exchange found july-2000-checks.xls.com infected with W32/Sircam-A (Sophos) virus. The file is currently Removed. The message, CDR: july-2000-checks, was sent from David Hosmer and was discovered in IMC Queues\Inbound located at Cognex/Natick/BAMBI.
Re: Weird message from someone named NIPC
Jim Choate, Tivoli Engineer of Quality Assurance wrote: # #4. It's another one of those 'hahaha' virus trolls # that has been going on for a while now. # #And you guys are the 'techno-elite' It's official: you're dumber than a rock.
CHECK THIS OUT! 21907
I'm sorry, but you will be glad you did! Order real prescription medications today!! GO TOhttp://www.speedyviagra.com/ http://www.speedyviagra.com/ can overnight right to your door, many prescription medications. http://www.speedyviagra.com/ has VIAGRA for erectile dysfunction, PROPECIA for hair loss, XENICAL for weight loss, and much, much, more!!! No more visits to the doc! Just visit http://www.speedyviagra.com/ Don't wait... place your order today!!! remove [EMAIL PROTECTED]
Re: Assasination Politics in the Middle East
At 05:11 PM 07/23/2001 -0700, Mr. Falun Gong wrote: Ok, the Subject line is a bit of a stretch, as there's no anon payment, but it is interesting nonetheless. Israel to look into Arafat murder ad By SAUD ABU RAMADAN GAZA, July 23 (UPI) -- Israel's attorney general on Monday said he would consider opening a criminal investigation into an advertisement that urged anyone who had the opportunity to murder Palestinian leader Yasser Arafat, the Haaretz newspaper reported. I saw a wire-service article the other day that said that Ariel Sharon's government had put out or endorsed a list of radical fanatic extremist Palestinian group leaders who were targets for assassination in revenge for the recent bombings in Israel. Perhaps the article got mangled in translation or I misread it because the train was noisy, but it sure looked that way. It didn't mention Arafat
Turn $25 into unlimited CASH income. Easy Legal
(This is a ONE TIME EMAIL, please click delete and accept my apologies if you are not interested in making a legal CASH income by investing a small amount of time and money) Dear Entrepreneur: If you've read this far, chances are you're currently working in a home business, or have in the past. Unfortunately, there's also a 90% or better chance that you aren't seeing the kind of income you had hoped for either. If you're honest with yourself, you know exactly what I'm saying. You did everything you were told to do, but it just hasn't happened for you, time and time again. Sound familiar? Spend a fraction of the time you would at most day jobs or home businesses and make some cold, hard, CASH I send out these emails, as many as I can, and people send me cash in the mail for information that I just email back to them. It is all completely legal, and I get to make that walk to the mailbox every day knowing that it is full of $5 bills for me!! What you are about to read is very exciting. Prepare to be amazed. It will explain how almost anyone can legally make a lot of money, in CASH!!! You don't need to have a lot of experience, time, or money to do this, but if you do - all the better! The most important thing you need is the desire to get ahead, a bit of spare time, and an entrepreneurial spirit. Have you been disappointed with a lot of so-called opportunities or all the hassles associated with selling on online auctions? This is different! I'm sure you've heard that before, but please take a few minutes to go through the plan, and make sure you read all of the information. Make this the one you act on! == DEAR FRIENDS AND FUTURE MILLIONAIRES: AS SEEN ON NATIONAL TV: Making over half a million dollars every 4 to 5 months from your home for an investment of only $25 U.S. Dollars expense one time THANKS TO THE COMPUTER AGE AND THE INTERNET! == BE A MILLIONAIRE LIKE OTHERS WITHIN A YEAR!!! Before you say Bull, please read the following. This is the letter you have been hearing about on the news lately. Due to the popularity of this letter on the Internet, a national weekly news program recently devoted an entire show to the investigation of this program described below, to see if it really can make people money. The show also investigated whether or not the program was legal. Their findings proved once and for all that there are absolutely NO Laws prohibiting the participation in the program and if people can follow the simple instructions, they are bound to make some mega bucks with only $25 out of pocket cost. DUE TO THE RECENT INCREASE OF POPULARITY RESPECT THIS PROGRAM HAS ATTAINED, IT IS CURRENTLY WORKING BETTER THAN EVER. This is what one had to say: Thanks to this profitable opportunity. I was approached many times before but each time I passed on it. I am so glad I finally joined just to see what one could expect in return for the minimal effort and money required. To my astonishment, I received total $610, 470.00 in 21 weeks, with money still coming in. Pam Hedland, Fort Lee, New Jersey. Here is another testimonial: This program has been around for a long time but I never believed in it. But one day when I received this again in the mail I decided to gamble my $25 on it. I followed the simple instructions and voila ... 3 weeks later the money started to come in! First month I only made $240.00 but the next 2 months after that I made a total of $290, 000.00. So far, in the past 8 months by re-entering the program, I have made over $710,000.00 and I am playing it again. The key to success in this program is to follow the simple steps and NOT change anything. More testimonials later but first, PRINT THIS NOW FOR YOUR FUTURE REFERENCE == $ If you would like to make at least $500,000 every 4 to 5 months easily and comfortably, please read the following. THEN READ IT AGAIN and AGAIN!!! $ FOLLOW THE SIMPLE INSTRUCTIONS BELOW AND YOUR FINANCIAL DREAMS WILL COME TRUE, GUARANTEED! INSTRUCTIONS: Order all 5 reports shown on the list below. === For each report, send $5 CASH (US CURRENCY), THE NAME NUMBER OF THE REPORT YOU ARE ORDERING and YOUR E-MAIL ADDRESS (plus an alternate email address, at a different domain name if possible, if you have one, in case of unforeseen problems) to the person whose name appears ON THAT LIST next to the report. MAKE SURE YOUR RETURN ADDRESS IS ON YOUR ENVELOPE TOP LEFT CORNER in case of any mail problems. === When you place your order, make sure you order each of the 5 reports. You will need all 5 reports so that you can save them on your computer
RE: FINALLY!!! A REAL BUSINESS OPPORTUNITY!!!
For a limited time, we are offering a FREE WEBSITE that will promote your service or product. This website will be custom designed for you and your needs. Our staff of graphic designers, web designers and our marketing team will work with you to design a site that will grab attention and get your product or service sold!!! If your FREE WEBSITE does not appear within the first 20 listings on the major search engines, you are not able to easily gain new clients for your business - because they can't find you!!! Our staff will get your FREE WEBSITE ranked in the top of the search engines so that when the estimated one million internet users today go shopping for what you sell, they will see your new website. They will buy from someone, shouldn't it be you? Millions of dollars are being spent on the Internet every day, What percentage of that do you want to receive??? Click on the link below to find out how to obtain your FREE WEBSITE!!! www.whereismysiteranked.com/freewebsite.htm Thank you again, James Kennsley III WhereIsMySiteRanked.com * We apologize if you received this advertisement by mistake. We make every effort to insure that the recipients of our direct marketing are those individuals who have asked to receive additional information on promotional offers from companies with whom we trade mailing list. If you would like to be removed from our mailing list please email us at [EMAIL PROTECTED] You may also send us a remove request via snail mail at RemoveMyName 3747 Beltline Rd. # 225 Addison, TX 75001, or you may phone us at 972-614-1140. Again we apologize if this message has reached you in error. *
No Subject
RE: FINALLY!!! A REAL BUSINESS OPPORTUNITY!!!
For a limited time, we are offering a FREE WEBSITE that will promote your service or product. This website will be custom designed for you and your needs. Our staff of graphic designers, web designers and our marketing team will work with you to design a site that will grab attention and get your product or service sold!!! If your FREE WEBSITE does not appear within the first 20 listings on the major search engines, you are not able to easily gain new clients for your business - because they can't find you!!! Our staff will get your FREE WEBSITE ranked in the top of the search engines so that when the estimated one million internet users today go shopping for what you sell, they will see your new website. They will buy from someone, shouldn't it be you? Millions of dollars are being spent on the Internet every day, What percentage of that do you want to receive??? Click on the link below to find out how to obtain your FREE WEBSITE!!! www.whereismysiteranked.com/freewebsite.htm Thank you again, James Kennsley III WhereIsMySiteRanked.com * We apologize if you received this advertisement by mistake. We make every effort to insure that the recipients of our direct marketing are those individuals who have asked to receive additional information on promotional offers from companies with whom we trade mailing list. If you would like to be removed from our mailing list please email us at [EMAIL PROTECTED] You may also send us a remove request via snail mail at RemoveMyName 3747 Beltline Rd. # 225 Addison, TX 75001, or you may phone us at 972-614-1140. Again we apologize if this message has reached you in error. *
No Subject
Rep. Boucher says he wants to Free Dmitry and amend DMCA
http://www.wired.com/news/politics/0,1283,45548,00.html Rep: Give Fair Use a Fair Shake By Declan McCullagh ([EMAIL PROTECTED]) 12:55 p.m. July 25, 2001 PDT WASHINGTON -- Rep. Rick Boucher wants to spring a Russian programmer from jail. Boucher, a maverick Virginia Democrat, is hoping to rewrite a federal law that led FBI agents to arrest Dmitry Sklyarov in Las Vegas, Nevada, last week on copyright felony charges. It's a broad overreach to have a person arrested under the federal criminal laws simply because they made software that circumvents a technological measure, Boucher said. Boucher said his office will draft a bill to be introduced later this year. The criminal law in question is the Digital Millennium Copyright Act, which was obscure enough when Congress enacted it in 1998, but has emerged as the one of the most important and far-reaching technology regulations. Sklyarov is charged with trafficking in a program to bypass Adobe's copy protection for e-books, a federal felony under the DMCA. I think the current case adds impetus to the growing effort to fashion an amendment to the DMCA that would restore the classic balance (of fair use rights), Boucher said. That promises to be anything but a trivial task. Leaders of the House and Senate subcommittees that oversee copyright law said Tuesday that they would not consider any changes to the DMCA. [...]
No Subject
Re: Re: Ashcroft Targets U.S. Cybercrime
At 7:39 AM -0500 7/24/01, [EMAIL PROTECTED] wrote: At the risk of going Choatien and stepping far beyond any degrees I may have, the position that each and every LEO in this country *should* (as opposed to does) decide for himself whether a law fits his understanding of the constitution before enforcing it is not only unworkable, but--if the LEO truly believes in the concepts of Rule of Law, wrong headed. Wrong headed or not, LEOs are manufactured out of human beings, and because of this, the spend a considerable amount of time in the Maggot Academy (tm) being taught the fine points of this very issue. In fact, No, they don't. Spoke with an officer this evening about it. The cover (at least the academy he went to here in SillyCon valley) 4 amendment issues, and only from the practical standpoint, not the philosphical standpoint, and mostly was scenario based. a great majority of an LEO's education time is spent instructing them on how to determine [decide] what is and is not constitutionally protected {speech, action}. If they did not use this ability, they would have to arrest *everyone*, and let the courts sort out the mess. No, they would have to arrest everyone they witnessed (or knew) committed an act that violated the law. Other than said 4th amendment issues, street cops *rarely* get involved in constitutional issues. As a further disclaimer, let me say that I don't think The Legal Community agrees with me. They're agreement or not isn't a factor in my thinking. I already know (as Declan points out) that Reno doesn't agree with me, but from her actions it's quite clear she doesn't believe in the Rule Of Law--at least not in the sense I've been using it. Actually, she is the perfect example: she interpreted the constitution her way. The Rule of Law has to be implemented at the individual [enforcer] level: therefore, each enforcer is putin the position of having to make and act on their [constitutional] opinions on a moment to moment basis. Uh. No. From her *ACTIONS* she did not believe in the Rule Of Law, but believed strongly in the long arm and mailed fist of the law. Witness her actions, and the actions of departments under her. The FBI was, in direct violation of the brady law, retaining the information about firearm purchases. Witness how quickly the Waco crime scene was bulldozed. Witness DOJ lawyers arguing in the Ruby Ridge case that Lon H. was not touchable by state law because he was a Fed acting under orders. The fact that you [and in this rare case] I agree that Reno is a fascist sack of shit is completely irrelevent. Well, it's nice to see we agree about something. Now, in an ideal world the constitution would be clearly worded and the semantics would be clearly understood by the people who live under it. However, It ain't like that. English is by no means an ISO (or even ANSI) standard, and even reasonable people can disagree on the complexity generated by the various articles and sections of the constitution and the amendments. Look for example to the issue of the Second Amendment. The clearest plain word interpretation of that amendment is that the no one has the ability to infringe on the right of the people to keep and bear arms. Fairly simple. Does that then mean that just about every firearm law in the country is invalid on it's face? Yes. No. And if you are at all familiar with the history of 2A case law, you will understand why the SCOTUS has been so meticulous in avoiding a ruling. Of course, our friends [hrmmm... Never thought I'd say THAT] in Texas may well put an end to the charade soon. Still waiting to hear about the Emerson case (and the 5th is in New Orleans IIRC). Well, no. See, the same constitution also grants Congress the power to regulate interstate trade, so as long as they don't infringe on the right, they have a wide latitude to set standards etc. Or do they? What are the limits of that particular clause? Virtually the entire 2A ablating federal infrastructure is based on a truly scary finding that *any* firearm is the product of Intertate Commerce, regardless if it has been out of the state in which it was Well, no. Only about 1/2 of the ablating. The other half is Congresses power to tax. (At the federal level a good number of firearms cases are on charges of failing to file and or pay the class 2 or 3 weapons tax stamp). Further more, what is *constitutionally* an infringement? Als at the risk of going Choation, what part of Shall not be infringed don't you understand? I understand shall not, it's the infringed I'm asking about. Is it *really* an infringement on your rights to require firearms manufacturers to meet reasonable standards of functioning? In fact, given the basis of the second
No Subject
Re: Weird message from someone named NIPC
Now that I've actually read through some of what Tim posted, I think it's clear what it is. Hint: Vatis wasn't in charge of NIPC by June 29, and I don't recall any such hearing, and his reported comments are a little, well, unusual. --Declan On Thu, Jul 26, 2001 at 01:15:21AM -0400, Declan McCullagh wrote: There seem to be three explanations. 1. Tim is having some fun with us. It would be easy for him to do so, and NIPC (an FBI subagency) has been in the news today, with a WSJ article this morning posted to the list and a Senate hearing this afternoon. Tim's written similar things before and posted them straight-faced: http://www.politechbot.com/p-01332.html 2. Someone is spoofing NIPC email and having fun with Tim. 3. This really did originate from within NIPC and is a major cypherpunk intelligence find. The WSJ article (http://www.politechbot.com/p-02306.html) says NIPC has been hit by Sircam, which scans hard drives for email addresses in documents and mail archives, according to descriptions I've read. Reports say Sircam emails working documents (in My Documents or whatnot folder) and this could have happened. -Declan On Wed, Jul 25, 2001 at 06:42:34PM -0700, Tim May wrote: Cypherpunks, I've been getting anywhere from 10 to 30 SirCam worm messages a day. The volume is now declining. Most have attached files containing fragments of Microsoft Word documents, apparently extracted from the disk drive of the sender. Most are the usual garbage people write to each other, but some of the ones from corporations have been interesting. And this one, assuming it is real, seems to have orginated from within some department of the government called NIPC. It must be bogus.This does not seem plausible, that they would send me something, so I expect a hoax. The attached filed, with the message, is 926 K, so I'm only enclosing a few tantalizing sections. I really cannot imagine why I am getting these SirCam messages from some government agency named NIPC, unless for some reason my e-mail address is in their address book. How could that happen? (BTW, many of the SirCam messages have clock dates which are wrong. This one is incorrectly dated 8/24/01.) At 2:39 PM -0400 8/24/01, NIPC Intern42 wrote: --017B5BE9_Outlook_Express_message_boundary Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable Content-Disposition: message text Hi! How are you=3F I send you this file in order to have your advice See you later=2E Thanks --017B5BE9_Outlook_Express_message_boundary Content-Type: application/mixed; name=DC TOOLZ.zip.bat Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename=DC TOOLZ.zip.bat The NIPC and FedCIRC have recently received information on attempts to locate, obtain control of and plant new malicious code known as W32-Leaves.worm on computers previously infected with the SubSeven Trojan. The default ports for SubSeven to listen for network traffic are 16959/tcp and 27374/tcp, though the numbers can be changed. Full descriptions and removal instructions of a number of SubSeven variants can be found at various anti-virus firm Web sites, including the following: A computer security unit within the U.S. Federal Bureau of Investigation has detected a series of intrusions into U.S. government networks under an investigation code named Moonlight Maze, and the intrusions appear to have originated from Russia, an FBI official told Congress this week. A spokesman for the Russian embassy here today quoted the head of the press service for the Russian foreign intelligence service, Nikita Rabusov, as saying the Russian special services have no relation whatsoever to the theft of information from computer networks of the U.S. federal agencies. American specialists have failed to establish from where this intrusion originated, the embassy official quoted Rabusov as saying in an interview with the Russian news agency Itar-Tass. They only indicated that it comes from a software company said to be reverse-engineering the products of leading American software companies. Russian special services are not so stupid to undertake such an operation, in case the necessity arises, directly from Moscow. Please report computer crime to your local FBI office (www.fbi.gov/contact/fo/fo.htm) or the NIPC, and to other appropriate authorities. Incidents may be reported online at www.nipc.gov/incident/cirr.htm. The NIPC Watch and Warning Unit also can be reached at (202) 323-3204/3205/3206, or [EMAIL PROTECTED] References to ECONCOM are to be deleted ASAP from all departmental systems. SLAM DUNK cover to be vetted by NIPC for release to journalists. Oakland and Monterey offices to coordinate. Michael Vatis, deputy assistant
FBI SirCammed (fwd)
-- Forwarded message -- Date: Wed, 25 Jul 2001 07:21:35 -0400 From: R. A. Hettinga [EMAIL PROTECTED] To: Digital Bearer Settlement List [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] Subject: FBI SirCammed http://interactive.wsj.com/archive/retrieve.cgi?id=SB9960160921000.djm July 25, 2001 Tech Center FBI Cyber Researcher Unleashes Virus That E-Mails Private Agency Documents By TED BRIDIS Staff Reporter of THE WALL STREET JOURNAL WASHINGTON -- A researcher in the Federal Bureau of Investigation's cyber-protection unit unleashed a fast-spreading Internet virus that e-mailed private FBI documents to outsiders -- all on the eve of a Senate hearing into troubles at the unit. Although the Sircam virus didn't spread to other computers at the FBI's National Infrastructure Protection Center, it did send at least eight documents to a number of outsiders. One, about the investigation into an unrelated virus, was marked official use only. The Sircam virus has infected thousands of computers since its discovery last week. 1U.S. Pentagon Shuts Down Public Access to Web Sites (July 24) 2'Code Red' Web Virus May Attack Other Computers in Coming Weeks (July 23) FBI spokeswoman Deb Weierman said that no sensitive or classified information about continuing investigations was disclosed Tuesday. The official use designation protects documents from disclosure under the U.S. Freedom of Information Act. It isn't uncommon for virus researchers to accidentally infect their own computers, but the mistake was particularly embarrassing because it occurred ahead of a Senate Judiciary panel's oversight hearing about the FBI cyber unit's effectiveness. Lawmakers were expected to focus on other agencies' failure to cooperate fully with the FBI center, and on a perceived lack of trust between the FBI and private-sector groups. The unit generally gets high remarks for its criminal investigations, and even critics say the unit is more effective than it was a year ago. The effort here is not to embarrass anybody but to stress that a lot of work has to be done, said Republican Sen. Jon Kyl of Arizona. Meanwhile, the White House has begun organizing a new early-warning network for Internet threats. But unlike the current system, it will be coordinated by the Pentagon, not the FBI. The mechanism for warning all U.S. military and civilian agencies -- and ultimately corporations -- will be dubbed the Cyber-Warning and Information Network, or c-win. Organizers envision dozens of computer centers that could sound an alert when a threat is identified. The network is expected to begin operating in October. The FBI unit, which currently relays these warnings, came under sharp criticism from congressional auditors for issuing tardy alerts. Ms. Weierman, the FBI spokeswoman, called the new network a useful mechanism to offer the government a technical capability that doesn't currently exist. The FBI, she said, wasn't concerned it would lose its warning responsibilities. Tuesday, at least three people said they received some of the FBI documents, including a 23-year-old Internet-security expert in Belgium, Niels Heinen. He operates a Web site that reports on Internet break-ins and speculated that the analyst, Vince Rowe, visited the site on the infected computer. Mr. Rowe didn't respond to a request for comment. Write to Ted Bridis at [EMAIL PROTECTED] URL for this Article: http://interactive.wsj.com/archive/retrieve.cgi?id=SB9960160921000.djm Hyperlinks in this Article: (1) http://interactive.wsj.com/archive/retrieve.cgi?id=e1-SB9960160921000 (2) http://interactive.wsj.com/archive/retrieve.cgi?id=e2-SB9960160921000 (3) e3-SB9960160921000 Copyright © 2001 Dow Jones Company, Inc. All Rights Reserved. Printing, distribution, and use of this material is governed by your Subscription Agreement and copyright laws. For information about subscribing, go to http://wsj.com -- - R. A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA ... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire' - The Cryptography Mailing List Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED] -- Nature and Nature's laws lay hid in night: God said, Let Tesla be, and all was light. B.A. Behrend The Armadillo Group ,::;::-. James Choate Austin, Tx /:'/ ``::/|/ [EMAIL PROTECTED] www.ssz.com.', `/( e\ 512-451-7087
No Subject
Your Invite #731B
Title: Executive Guild Membership ApplicationResponse-O-Matic Form Dear Candidate, You have been selected as a potential candidate for a free listing in the 2001 Edition of the International Executive Guild Registry. Please accept our congratulations for this coveted honor. As this edition is so important in view of the new millennium, the International Executive Guild Registry will be published in two different formats; the searchable CD-ROM and the Online Registry. Since inclusion can be considered recognition of your career position and professionalism, each candidate is evaluated in keeping with high standards of individual achievement. In light of this, the International Executive Guild thinks that you may make an interesting biographical subject. We look forward to your inclusion and appearance in the International Executive Guild's Registry. Best wishes for your continued success. International Executive Guild Listing Dept. If you wish to be removed from our list, please submit your request at the bottom of this email. International Executive Guild Registration Form (US and Canada Only) Please fill out this form if you would like to be included on The International Executive Guild, For accuracy and publication purposes, please complete and send this form at the earliest opportunity. There is no charge or obligation to be listed on The International Executive Guild. Your Name Your Company Title Address City State or Province Country USACanada ZIP/Postal Code Day Time Telephone Home Phone (Not To Be Published) Email TO HELP US IN CONSIDERING YOUR APPLICATION, PLEASE TELL US A LITTLE ABOUT YOURSELF... Your Business (Financial Svcs, Banking, Computer Hardware, Software, Professional Svcs, Chemicals, Apparel, Aerospace, Food, Government, Utility, etc.) Type of Organization (Mfg, Dist/Wholesaler, Retailer, Law Firm, Investment Bank, Commercial Bank, University, Financial Consultants, Ad Agency, Contractor, Broker, etc.) Your Business Expertise (Corp.Mgmt, Marketing, Civil Engineering, Tax Law, Nuclear Physics, Database Development, Operations, Pathologist, Mortgage Banking, etc.) Major Product Line (Integrated Circuits, Commercial Aircraft, Adhesives, Cosmetics, Plastic Components, Snack Foods, etc.) Note: Submitting this form will be made by email, not by use of www. Confirmation of its delivery is made by browsing your outgoing mail. Thank you for filling in this form, we will contact you with more information. List Removal Click Here