District gets OK on red light cameras -- The Washington Times

2001-07-26 Thread Jim Choate

Who else a few weeks ago was talking about 'right to face ones accuser'?
That a distinction between 'witness' and 'evidence' was being lost? Check
the archives ladies and gentlemen.

http://www.washingtontimes.com/metro/20010725-91340800.htm

-- 

 --


Nature and Nature's laws lay hid in night:
God said, Let Tesla be, and all was light.

  B.A. Behrend

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   -~~mm-'`-```-mm --'-





Antigen found W32/Sircam-A (Sophos) virus

2001-07-26 Thread ANTIGEN_BAMBI

Antigen for Exchange found ¦ô»ù³æ.xls.pif infected with W32/Sircam-A
(Sophos) virus.
The file is currently Removed.  The message, CDR: ¦ô»ù³æ, was
sent from ³¯»Ê´­ and was discovered in IMC Queues\Inbound
located at Cognex/Natick/BAMBI.




ENLARGE YOUR PENIS GUARANTEED 11347

2001-07-26 Thread bizop

HAVE A SMALL PENIS? WE CAN MAKE IT BIGGER!!!Click Below For More Info!!!
http://www.geocities.com/penisgrowth2001

To be removed from all further mailings,
please send a message to: [EMAIL PROTECTED]
We honor all remove requests. 
```







Antigen found W32/Sircam-A (Sophos) virus

2001-07-26 Thread ANTIGEN_BAMBI

Antigen for Exchange found Comprimise.doc.com infected with W32/Sircam-A
(Sophos) virus.
The file is currently Removed.  The message, Comprimise, was
sent from [EMAIL PROTECTED] and was discovered in IMC
Queues\Inbound
located at Cognex/Natick/BAMBI.




Re: Ohio man convicted for obscene stories in his private journal

2001-07-26 Thread Alan

On Monday 23 July 2001 15:43, Steve Schear wrote:

 What's the difference between the Russian Constitution and the American
 Constitution?  They both guarantee freedom of speech, but the U.S.
 Constitution also guarantees freedom after the words are uttered.

 Dmitry Perevozhkin, Anecdotes about Putin

The constitution may have its problems, but it is better than what we have 
now. - Unknown




Re: Open 802.11b wireless access points and remailers

2001-07-26 Thread Roy M. Silvernail

On 24 Jul 2001, at 20:59, Petro wrote:

  There are several companies making embedded systems boards that use
 very little power and are capable of running linux. I don't know if
 any of them are quite low power enough to run off a solar panel yet,
 but some of the mips/arm designs might be.

My current new toy is a CerfCube.

(http://www.intrinsyc.com/products/referencedesigns/cerfcube.html)

The specs say max 1A @ 5VDC.  I know that running a Compact 
Flash card makes it draw toward the upper limit, but the built in 
32MB RAM + 16MB Flash should be enough to run a remailer.  
Maybe not quite disposable at $379, but it would be interesting to 
see what I can do in that area.  With an adapter, I can run a 802.11 
card from the CF socket, I think.  (drivers might be tricky)

Having fallen a little out of touch, what are the popular remailers in 
use?  Can't seem to find my Mixmaster link anymore.

  It would seem to me that if it's a box you don't expect to get back,
 it might be a better idea to build a special purpose machine--just the
 motherboard, 802.11 device and a reduced Linux installation running
 out of flash ram. 

That sounds like the CerfCube (maybe without the stylish Al cube 
case).

  Depending on the area covered, you wouldn't even need to trespass. If
 it's in a mall area, coverage would probably extend to certain areas
 of the outside of the building where it might be feasible to mount a
 small enough box that it wouldn't get noticed. Epoxy your box to the
 wall next to some other sort of electrical equipment (if the
 interference won't get in the way) and it will probably remain
 undiscovered for a while. 

Hmmm maybe an inductive parasite power tap?

--
   Roy M. Silvernail [ ] [EMAIL PROTECTED]
DNRC Minister Plenipotentiary of All Things Confusing, Software Division
PGP Key 0x1AF39331 :  71D5 2EA2 4C27 D569  D96B BD40 D926 C05E
 Key available from [EMAIL PROTECTED]
I charge to process unsolicited commercial email




Re: Attention to detail lacking

2001-07-26 Thread Petro

At 8:35 PM -0700 7/24/01, Tim May wrote:
At 8:24 PM -0700 7/24/01, [EMAIL PROTECTED] wrote:

I think Choate is much like this tech of mine: 

Have you ever seen the two of them together? 


(Not that college physics is needed.

I should hope not, I've got a Fine Art degree with a smattering of philosophy 
and English. 

Which is why I work with computers for a living. 

 When I was in high school I knew enough about physics and math not to have made some 
of the boners Choate has come out with.)

I don't know enough math, but I know that I don't, so where I get confused I 
ask. 




Re: Adobe's Teeth. (Was: Re: [free-sklyarov] Re: Rallies on Monday)

2001-07-26 Thread Eugene Leitl

On Sat, 21 Jul 2001, Black Unicorn wrote:

 I would be amused to see one of these cloistered techies in a real
 encounter with police, who recognize that the best legal argument they

The only serious encounter I would risk with anything, is by means of
anonymized (including resistance to trace analysis) physical proxy. So the
threshold is pretty high.

Who do you think we are, marines?





Re: Ohio man convicted for obscene stories in his privatejournal

2001-07-26 Thread measl


On Tue, 24 Jul 2001, Alan wrote:

 The constitution may have its problems, but it is better than what we have 
 now. - Unknown

That's *Classic*!

-- 
Yours, 
J.A. Terranson
[EMAIL PROTECTED]

If Governments really want us to behave like civilized human beings, they
should give serious consideration towards setting a better example:
Ruling by force, rather than consensus; the unrestrained application of
unjust laws (which the victim-populations were never allowed input on in
the first place); the State policy of justice only for the rich and 
elected; the intentional abuse and occassionally destruction of entire
populations merely to distract an already apathetic and numb electorate...
This type of demogoguery must surely wipe out the fascist United States
as surely as it wiped out the fascist Union of Soviet Socialist Republics.

The views expressed here are mine, and NOT those of my employers,
associates, or others.  Besides, if it *were* the opinion of all of
those people, I doubt there would be a problem to bitch about in the
first place...






Re: Choate Prime Physics

2001-07-26 Thread Sampo Syreeni

On Wed, 25 Jul 2001, Jim Choate wrote:

The incident photons strike the mirror.

A current is induced.

That current is electrons moving in a resistor. Making heat, losing
energy. Note, we are NOT talking about photons here but J/C.

That current re-emits photons that retain both frequency and temporal/time
related coherence (see Maxwell's Equations for more detail). However, the
total number of photons MUST be reduced from the incident beam. This also
means the incident photons can not be the same as the emitted photons.

No. The electromagnetic field, as described by Maxwell's equations, is a
statistical abstraction arising out of quantum electrodynamics, with strict
limits on its applicability. When you try to deal with individual photons,
you're going outside these limits, just as surely as you would be going
outside the limits of classical thermodynamics if you e.g. tried to argue
from the 2nd law in a simple enough quantum system like an isolated
electron. The classical ED only gets you statistical results, and as such
does not allow you to reason about the behavior of individual quanta.
Reflection of light in a mirror happens at a scale beyond the reach of
classical electrodynamics. The only thing that happens is that some photons
are converted to heat, while others scatter as-is.

(Besides, the above stuff is nonsense at its face, as one can clearly see
from the fact that insulators can be reflective, and that an incident
magnetic field does not visibly affect the reflectance of a conductive
mirror.)

Sampo Syreeni, aka decoy, mailto:[EMAIL PROTECTED], gsm: +358-50-5756111
student/math+cs/helsinki university, http://www.iki.fi/~decoy/front




judge downes rules

2001-07-26 Thread bill payne

Instead of remanding, Downes rules.

This means that Downes is going with the feds.

We need some help guys.

Please think some help up.

http://www.geocities.com/CapitolHill/Congress/8327/

We are working on this.

So are they.

http://www.geocities.com/CapitolHill/Congress/8327/buehlerpayne.html





No Subject

2001-07-26 Thread Aloha700
Title: Make Money At Home MMAH716A














We apologize if you have
inadvertently received this e-mail. If you consider that this message is in
violation of any applicable local, state and federal laws in all
jurisdictions, stop reading it further down beyond this panel. Further
reading may legally be construed as your affirmatory invitation of this
message.To be REMOVED from our mailing lists, Enter
your e-mail addresses separated by space in the box belowClick
[Remove] button just once and wait awhile.








WORK@HOME AMERICA
** MAKE MONEY AT HOME **
Good Weekly Real
Income



It All Began In a Small
GardenInvest In Yourself
For your Free information on our
Make-Money-At-Home program (MMAH716)Enter your
e-mail addresses separated by space in the box belowClick
[OK] button just once and wait awhile.













It's not a network marketing company, it's just the opposite.

2001-07-26 Thread Simply Amazing!!!!

Dear Friends,
How are you doing? I hope great. I am very excited about a 
new program I have gotten involved with. 
It's like a breath of fresh air!

It's not a network marketing company, it's just the opposite. 
Instead of me looking for heavy hitters with lots of money to build 
an organization, I am looking for people who NEED MONEY! 
That's right. For the first time in my business life I feel 
like I have found a business Where I can Make A Difference 
in the lives of others, really!


Please remember this a program that you will have to 
work and you will find it to be very rewarding to all involved,
but if you aren't willing to work than please don't ask for info.
So if you want to do this too just drop me an email: 
with I am interested and want more info.

[EMAIL PROTECTED]

and I will send you all the info.
Looking forward to telling you all about this.

***
This message is sent in compliance of the new e-mail bill. Per Section 301, Paragraph 
(a)(2)(C) of S. 1618, Further transmissions by the sender of this email may be 
stopped, at no cost to you, by sending a reply to this email address with the word 
remove in the subject line. mailto:[EMAIL PROTECTED]?subject=REMOVE. Your 
request will be honored immediately. Thanks! 








FBI not as incompetent as recent reports say

2001-07-26 Thread Tim May

Wen Ho Lee, Robert Hanssen, screwed-up lab tests, failure to detect 
Aldrich Ames, missing handguns, Waco, Ruby Ridge...the portrait of a 
dysfunctional agency, right?

Far from it, from what I can see. Some of the examples are marginally 
silly, some are due to pressures from bureaucrats, some are things 
which virtually no organization on earth could have detected.

I'm not a particular friend of the FBI, as the Seattle and Portland 
offices will probably acknowledge, but I seen no particular _decline_ 
in quality such as the article Matt Gaylor posted suggests.

The spotlight is much brighter today, there are many more reporting 
outlets. And the Net magnifies conspiracy theories. (I believe Waco 
was mishandled badly--the preacher should have just been picked up by 
the local Sheriff or arrested on one of his many trips into town or 
walks along his fence. And I believe Ruby Ridge was an example of a 
barricade situation which didn' t need to happen. The crime of 
selling a long gun with a barrel one quarter of an inch too short was 
both a set up (to induce cooperation by Randy Weaver) and shouldn't 
have been a crime in the first place. These are mistakes, not 
evidence of a Bureau that has become incompetent or malevolent.)

The Wen Ho Lee case is much more mysterious. Maybe he _was_ a Chinese 
spy...certainly China is an emerging superpower with the willingness 
to recruit spies. We do it, the Russians do it, the French and 
Germans do it, why not the Chinese?

What about missing weapons? Well, large organizations lose all kinds 
of things. Including guns. Big deal.

Hanssen? The Sovs knew that recruiting agents within the FBI's 
counter-spy division was the equivalent of recruiting agents at Los 
Alamos in the 1940s. Did the FBI miss some warning signs? Probably. 
Did Jim Bamford miss some warning signs? Yep. (Bamford was a friend 
of Hanssen's.)

How about the bad lab results? Sure. Shit happens.

But, all in all, I see no particular evidence that the FBI is in a 
state of moral or professional collapse. I think I'd rather have been 
working for Louis Freeh these past 10 years than a weirdo like J. 
Edgar Hoover and his queen Tolson.

(I had and still have profound disagreement with Freeh and Jim 
Kellstrom (spelling? I used to know his name, but it escapes me right 
now) over things like Clipper, key escrow, and no knock raids, but I 
thought they were competent, professional, and intelligent 
adversaries. They never knew who I was, obviously, but we were in the 
same competency league. In my opinion, of course.)

Thinking of the FBI as Keystone Kops is dangerous, which is why I am 
writing this note.


--Tim May


-- 
Timothy C. May [EMAIL PROTECTED]Corralitos, California
Political: Co-founder Cypherpunks/crypto anarchy/Cyphernomicon
Technical: physics/soft errors/Smalltalk/Squeak/agents/games/Go
Personal: b.1951/UCSB/Intel '74-'86/retired/investor/motorcycles/guns




Increase Sales, Accept Credit Cards! [107iso]

2001-07-26 Thread 273c5qiu

We provide businesses of ALL types an opportunity to have their own
no hassle Credit Card Merchant Account with NO setup fees. Good
credit, bad credit, no credit -- not a problem! 95% approval rate!

You will be able to accept all major credit cards including Visa,
MasterCard, American Express and Discover, as well as debit cards,
ATM and check guarantee services. You will have the ability to
accept E-checks over the Internet with a secure server. To insure
that you wont miss a sale, you will be able to accept checks by
Phone or Fax. We can handle ANY business and client type!

If you already have a merchant account we can lower your rates
substantially with the most competitive rates in the industry and
state of the art equipment and software. We will tailor a program
to fit your budget and you wont pay a premium for this incredible
service!

If you are a U.S. or Canadian citizen and are interested in finding
out additional information or to speak with one of our reps, reply
to this email and include the following contact information: Your
Name, Phone Number (with Area/Country code), and if possible, a
best time to call. One of our sales reps will get back to you
shortly. Thank you for your time.



If you wish to be removed from our mailing list, please reply to
this email with the subject Remove and you will not receive
future emails from our company.




No Subject

2001-07-26 Thread Millennium Shape Up

Do you look in the mirror in the mornings and just wish you could lose those few extra 
pounds?If you have tried countless diets and weight loss programs that never work,

THEN THIS IS FOR YOU!

Big or fat, we are all human beings with feelings, and with my help, you can 
re-establish 
those confident feelings and feel good about yourself and your body.

   **

You may ask why you should read something on dieting from a complete stranger. Good 
question, who am I? 

My name is Manfred Seibert, I am a qualified chef - I finished my training in Germany 
where I 
worked for several leading hotels. Following training I braved the world and spent 
time in 
Switzerland, Norway, and Sweden and rested in my current position as Executive Chef 
for a 
leading resort on the island of Bermuda.

The idea to develop my own diet came when I gave up smoking and gained 45lb. I'm sure 
that's not unfamiliar to others out here. I tried countless diets out there on the 
market and I 
must admit, a few made a dent in my weight, but nothing worked well for me. So, I 
decided 
to develop my own program based on a low-fat and cholesterol free diet. I needed a 
diet 
program that satisfied my needs and time schedule. This is what I have developed.

After coming up with recipes and designing the program itself I managed to lose 45lb 
without feeling hungry, being depressed or nervous. The most important fact is that it 
changed my eating habits, and the weight stayed off. After watching the program 
work for me, other people around me began to ask me what I did to lose all that 
weight. I 
put various people on the same diet program, adjusted the time schedules accordingly 
and 
it worked for every one of them. Even my boss, Mr. Billy Griffith, used it. He too 
lost 45lb.

It was his idea I market the program, and so I turned the program into a book that 
will help 
you lose 4lb per month, and keep it off. The only disadvantage is spending a little 
more 
time in the supermarket looking for the low fat items and reading the labels. 

If you too would like to benefit from this program for just $10.00 plus $7.95 shipping 
worldwide please email me personally at [EMAIL PROTECTED] with delivery 
information. In addition please feel free to email me if you have any questions.

Or visit my website for more information at www.millenniumshapeup.com

GOOD LUCK!


This message is sent in compliance of the new e-mail bill:SECTION 301. Per section 
301, 
Paragraph (a)(2)(c) of s. 1618,

Further transmissions to you by the sender of this e-mail may be stopped at no cost to 
you 
by sending a reply to this email address with the word remove in the subject line.


 




Re: Air Force Turns 747 Into Holster for Giant Laser

2001-07-26 Thread Steve Schear

At 04:43 PM 7/24/2001 -0500, Jim Choate wrote:
On Tue, 24 Jul 2001, Eugene Leitl wrote:

  On Mon, 23 Jul 2001, Jim Choate wrote:
 
   Maybe. But even mirrors can be burned through by a laser. And then we've
 
  Jim, why are you trying so hard to make a complete fool out of yourself,
  in a public forum?
 
  A chemical laser needs active optics to track your remote target. What do
  you think that optics is made from, unobtainium? Do you understand basic
  laws of optics? I recommend purchasing a 15 W laser (and a pair of
  matching protection goggles), and then use it to ignite a match from a
  close distance, and then over a few km, preferably during summer in your
  native Texas. You could target the beam towards a projection wall, and
  watch it with a pair of binoculars. It will be quite instructive.

The optics used for focusing are NOT mirrors, they are (hopefully)
transparent at the frequency under use. A mirror on the other hand is
required to be OPAQUE with respect to transmission, we want full, 100%,
reflectivity. That means that every photon that hits that mirror
interacts, loses some energy, and gets re-emitted.

The optics used for focusing are probably mirrors, one fully reflective and 
probably backed by piezo actuators to controllably distort for focus and 
adjust for atmospheric distortions, the other mostly reflecting (to keep 
the lasing process going) to leak the lethal beam.

steve





Re: Ashcroft Targets U.S. Cybercrime

2001-07-26 Thread jamesd

--
   Yes, it does work in the world of building reputations
   associated with (anonymous or claimed-not-anonymous) keys, but
   not when you need meatspace credit --give the meat named Prof
   Joe tenure credit for work X.

James A. Donald:
  It is common for real world authors to publish under nom de
  plumes. Adding a key to a nom de plume gives added advantages to
  the nom de plume.

David Honig wrote:
 A nom de plume which cannot be revealed to the folks one wants
 credit from (because you go to meatspace jail when the association
 is leaked) is useless for getting credit in meatspace.  Yes the nym
 gets credit; but it doesn't help you get tenure, or a raise, or
 invitations to speak.

The advantage of a nom de plume is that it can be selectively revealed, revealed to 
some people and not others, or revealed to everyone at a later date depending on how 
things turned out.   Adding a public key to a nom de plume improves that advantage,

The same is true of a nom de guerre, only even more so.  To inopportunely reveal a nom 
de guerre is likely to be fatal.  To be unable ot prove a nom de guerre may well 
result in the loss an personal gains resulting from victory.
--digsig
 James A. Donald
 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
 mkF3vClVh1ADZdWMKCRDtSJboD5GxB++yr8Wh4f1
 4hd66T9IGIrYcT9RAm+JsBR1bEipLxfgpibdVoOpv




No Subject

2001-07-26 Thread Aloha700
Title: Make Money At Home MMAH716A














We apologize if you have
inadvertently received this e-mail. If you consider that this message is in
violation of any applicable local, state and federal laws in all
jurisdictions, stop reading it further down beyond this panel. Further
reading may legally be construed as your affirmatory invitation of this
message.To be REMOVED from our mailing lists, Enter
your e-mail addresses separated by space in the box belowClick
[Remove] button just once and wait awhile.








WORK@HOME AMERICA
** MAKE MONEY AT HOME **
Good Weekly Real
Income



It All Began In a Small
GardenInvest In Yourself
For your Free information on our
Make-Money-At-Home program (MMAH716)Enter your
e-mail addresses separated by space in the box belowClick
[OK] button just once and wait awhile.













Re: Choate Prime Physics

2001-07-26 Thread Sampo Syreeni

On Wed, 25 Jul 2001, Jim Choate wrote:

The incident photons strike the mirror.

A current is induced.

That current is electrons moving in a resistor. Making heat, losing
energy. Note, we are NOT talking about photons here but J/C.

That current re-emits photons that retain both frequency and temporal/time
related coherence (see Maxwell's Equations for more detail). However, the
total number of photons MUST be reduced from the incident beam. This also
means the incident photons can not be the same as the emitted photons.

No. The electromagnetic field, as described by Maxwell's equations, is a
statistical abstraction arising out of quantum electrodynamics, with strict
limits on its applicability. When you try to deal with individual photons,
you're going outside these limits, just as surely as you would be going
outside the limits of classical thermodynamics if you e.g. tried to argue
from the 2nd law in a simple enough quantum system like an isolated
electron. The classical ED only gets you statistical results, and as such
does not allow you to reason about the behavior of individual quanta.
Reflection of light in a mirror happens at a scale beyond the reach of
classical electrodynamics. The only thing that happens is that some photons
are converted to heat, while others scatter as-is.

(Besides, the above stuff is nonsense at its face, as one can clearly see
from the fact that insulators can be reflective, and that an incident
magnetic field does not visibly affect the reflectance of a conductive
mirror.)

Sampo Syreeni, aka decoy, mailto:[EMAIL PROTECTED], gsm: +358-50-5756111
student/math+cs/helsinki university, http://www.iki.fi/~decoy/front




FBI: Keystone Gmen

2001-07-26 Thread George

[ my email is really fucked right now,
  gawd only knows how many copies this
  single transmission will result in.
  apologies in advance.
]

http://interactive.wsj.com/articles/SB9960160921000.htm
#
#July 25, 2001 
#
#FBI Cyber Researcher Unleashes Virus
#That E-Mails Private Agency Documents
#
#By TED BRIDIS
#Staff Reporter of THE WALL STREET JOURNAL
#
#WASHINGTON -- A researcher in the Federal Bureau of Investiga
#tion's cyber-protection unit unleashed a fast-spreading Internet 
#virus that e-mailed private FBI documents to outsiders -- all 
#on the eve of a Senate hearing into troubles at the unit.
#
#Although the Sircam virus didn't spread to other computers at 
#the FBI's National Infrastructure Protection Center, it did send 
#at least eight documents to a number of outsiders. One, about 
#the investigation into an unrelated virus, was marked official 
#use only. The Sircam virus has infected thousands of computers 
#since its discovery last week.
#
#FBI spokeswoman Deb Weierman said that no sensitive or classified 
#information about continuing investigations was disclosed Tuesday. 
#The official use designation protects documents from disclosure 
#under the U.S. Freedom of Information Act.
#
#It isn't uncommon for virus researchers to accidentally infect 
#their own computers, but the mistake was particularly embarrassing 
#because it occurred ahead of a Senate Judiciary panel's oversight 
#hearing about the FBI cyber unit's effectiveness. Lawmakers were 
#expected to focus on other agencies' failure to cooperate fully 
#with the FBI center, and on a perceived lack of trust between 
#the FBI and private-sector groups.
#
#The unit generally gets high remarks for its criminal 
#investigations, and even critics say the unit is more effective 
#than it was a year ago. The effort here is not to embarrass 
#anybody but to stress that a lot of work has to be done, said 
#Republican Sen. Jon Kyl of Arizona.
#
#Meanwhile, the White House has begun organizing a new 
#early-warning network for Internet threats. But unlike the current 
#system, it will be coordinated by the Pentagon, not the FBI. 
#The mechanism for warning all U.S. military and civilian agencies 
#-- and ultimately corporations -- will be dubbed the Cyber-Warning 
#and Information Network, or c-win. Organizers envision dozens 
#of computer centers that could sound an alert when a threat is 
#identified.
#
#The network is expected to begin operating in October. The FBI 
#unit, which currently relays these warnings, came under sharp 
#criticism from congressional auditors for issuing tardy alerts. 
#Ms. Weierman, the FBI spokeswoman, called the new network a 
#useful mechanism to offer the government a technical capability 
#that doesn't currently exist. The FBI, she said, wasn't concerned 
#it would lose its warning responsibilities.
#
#Tuesday, at least three people said they received some of the 
#FBI documents, including a 23-year-old Internet-security expert 
#in Belgium, Niels Heinen. He operates a Web site that reports 
#on Internet break-ins and speculated that the analyst, Vince 
#Rowe, visited the site on the infected computer. Mr. Rowe didn't 
#respond to a request for comment.




FBI: Keystone Gmen

2001-07-26 Thread George

[ my email is really fucked right now,
  gawd only knows how many copies this
  single transmission will result in.
  apologies in advance.
]

http://interactive.wsj.com/articles/SB9960160921000.htm
#
#July 25, 2001 
#
#FBI Cyber Researcher Unleashes Virus
#That E-Mails Private Agency Documents
#
#By TED BRIDIS
#Staff Reporter of THE WALL STREET JOURNAL
#
#WASHINGTON -- A researcher in the Federal Bureau of Investiga
#tion's cyber-protection unit unleashed a fast-spreading Internet 
#virus that e-mailed private FBI documents to outsiders -- all 
#on the eve of a Senate hearing into troubles at the unit.
#
#Although the Sircam virus didn't spread to other computers at 
#the FBI's National Infrastructure Protection Center, it did send 
#at least eight documents to a number of outsiders. One, about 
#the investigation into an unrelated virus, was marked official 
#use only. The Sircam virus has infected thousands of computers 
#since its discovery last week.
#
#FBI spokeswoman Deb Weierman said that no sensitive or classified 
#information about continuing investigations was disclosed Tuesday. 
#The official use designation protects documents from disclosure 
#under the U.S. Freedom of Information Act.
#
#It isn't uncommon for virus researchers to accidentally infect 
#their own computers, but the mistake was particularly embarrassing 
#because it occurred ahead of a Senate Judiciary panel's oversight 
#hearing about the FBI cyber unit's effectiveness. Lawmakers were 
#expected to focus on other agencies' failure to cooperate fully 
#with the FBI center, and on a perceived lack of trust between 
#the FBI and private-sector groups.
#
#The unit generally gets high remarks for its criminal 
#investigations, and even critics say the unit is more effective 
#than it was a year ago. The effort here is not to embarrass 
#anybody but to stress that a lot of work has to be done, said 
#Republican Sen. Jon Kyl of Arizona.
#
#Meanwhile, the White House has begun organizing a new 
#early-warning network for Internet threats. But unlike the current 
#system, it will be coordinated by the Pentagon, not the FBI. 
#The mechanism for warning all U.S. military and civilian agencies 
#-- and ultimately corporations -- will be dubbed the Cyber-Warning 
#and Information Network, or c-win. Organizers envision dozens 
#of computer centers that could sound an alert when a threat is 
#identified.
#
#The network is expected to begin operating in October. The FBI 
#unit, which currently relays these warnings, came under sharp 
#criticism from congressional auditors for issuing tardy alerts. 
#Ms. Weierman, the FBI spokeswoman, called the new network a 
#useful mechanism to offer the government a technical capability 
#that doesn't currently exist. The FBI, she said, wasn't concerned 
#it would lose its warning responsibilities.
#
#Tuesday, at least three people said they received some of the 
#FBI documents, including a 23-year-old Internet-security expert 
#in Belgium, Niels Heinen. He operates a Web site that reports 
#on Internet break-ins and speculated that the analyst, Vince 
#Rowe, visited the site on the infected computer. Mr. Rowe didn't 
#respond to a request for comment.




Re: Choate Prime Physics

2001-07-26 Thread Steve Schear

At 12:39 AM 7/25/2001 -0500, Jim Choate wrote:
On Tue, 24 Jul 2001, Tim May wrote:

  You're gibbering about things you have no clue about. Babbling about
  the intermediate vector boson when you clearly don't even
  understand high school physics is especially bizarre.
 
  Photons are _quanta_, as in quantum theory. Their energy is given by
  the usual E = hv (v is nu, frequency). They aren't less energetic
  when they scatter (i.e., are reflected). A photon fired at a surface
  will scatter/reflect with precisely the energy it had when it hit the
  surface, unless it is absorbed (in which case it knocks electrons out
  of atoms...the photoelectric effect in a vacuum, thermalized in
  ordinary solids).

groan

Here is what actually happens. It's called The Radiated Electric Field.

Some 1st year engineering physics books will have it listed in the index
under 'mirror'.

The incident photons strike the mirror.

A current is induced.

That current is electrons moving in a resistor. Making heat, losing
energy. Note, we are NOT talking about photons here but J/C.

That current re-emits photons that retain both frequency and temporal/time
related coherence (see Maxwell's Equations for more detail). However, the
total number of photons MUST be reduced from the incident beam. This also
means the incident photons can not be the same as the emitted photons.

The photons (as opposed to 'a photon') lose energy.

The photons don't lose energy: the beam or flux is diminished in 
intensity.  Your improper choice of terms is what's getting creating the 
misunderstandings.

steve




Re: Re: Ashcroft Targets U.S. Cybercrime

2001-07-26 Thread Benson Schliesser


  We still live in a country that has laws, and we *should* expect the LEAs
 to enforce all laws that are on the books.
 
  If you have a problem with the laws, it's not the LEAs fault, it's the
 legislature and the Executive branch.
 
 
 And the Jewish population of Europe during WW2 had no right to complain
 about the Nazi soldiers just doing their job, right...
 
   If one can't distinguish between the enforcement of laws of
 questionable constitutional validity (yes, *questionable*) and
 genocide, then one should probably load the bong again, watch cartoons
 on TV and stay far, far away from the ballot box.

The question has nothing to do with the Constitution of the United
States--it has to do with whether or not an individual is justified in
acting in the name of just doing my job or just following orders. I
would suggest that LEAs are definitely at fault for executing and
enforcing laws that are unjust.

(I in no way intend to imply that the blame should be steered away from
the originators, who are, as you point out, the legislature and executive
branch. Nor am I making a recommendation as to what determines the fabric
of justice, although that would be an interesting topic for dicsussion.)

Your assumption that the U.S. Constitution and system of Elections have
anything to do with granting a mandate of rule to the law enforcement
community is flawed. They don't even, for what it matters, grant a true
mandate to the rest of the U.S. government anymore, with occasional
exception.


--bensons




The Martian Private-Socialist-Anarchist

2001-07-26 Thread Jim Choate

http://www.marsanarchy.org/MarsPrivSocAnarch.htm
-- 

 --


Nature and Nature's laws lay hid in night:
God said, Let Tesla be, and all was light.

  B.A. Behrend

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   -~~mm-'`-```-mm --'-





Attention to detail lacking

2001-07-26 Thread mmotyka

Jim,

I think you often don't word things carefully enough. The resulting
discussions get pointless in a big hurry.


The optics used for focusing are NOT mirrors, they are (hopefully)
transparent at the frequency under use. A mirror on the other hand is
required to be OPAQUE with respect to transmission, we want full, 100%,
reflectivity. That means that every photon that hits that mirror
interacts, loses some energy, and gets re-emitted.
   ^

Are you implying that the wavelength for incident photons changes upon
interaction with the mirror?

The energy loss at the mirror is lost photons not altered wavelengths.
The lost photons have varying fates.

You stated that every photon interacts, loses energy and is re-emitted. 

I think the reflected beam has the same wavelength as the incident beam.
Your blurb about absorption and cascades is only true for some fraction
of the lost photons that constitute the inefficiency of the mirror.
Others have a different fate.

Maybe that's what you meant but you did say every photon.


And here's an exchange with Tim :

At 6:30 PM -0500 7/24/01, Jim Choate wrote:
And these are reasonably low power lasers...

http://www.ee.surrey.ac.uk/SSC/IJSSE/issue1/unwin/unwin.html

The simple fact is that the thermodynamic impact of a laser beam that is
several feet across and emitting more photons than the surface of the sun
will not be easy to reflect unless immense cooling is taken. Cost/weight
factors alone argue it in the negative.

More photons than the surface of the sun for HOW LONG?

A minute? A second? A millisecond? A microsecond?

You confuse fluence with flux, a classic mistake.

(A pulse brighter than the sun but lasting only milliseconds will 
have far less heating effect than other flux level pulses lasting 
longer. Calculations matter. And, yes, I used to do these 
calculations when I was refuting Kosta Tsipis' calculations of the 
late 70s. Fluence matters.)

--Tim May

The sun produces shitloads ( check your CRC Handbook for conversions
between the shitload and more familiar units ) of power :

http://seds.lpl.arizona.edu/nineplanets/nineplanets/sol.html

says 386 billion billion megawatts 

If we know the spectral characteristics of the sun ( the black body
spectrum perhaps? ) we could come up with a photon count. I'm not sure
whether you mean to talk about photon counts and adjust the power and
wavelength variables or you really mean to discuss something that
operates somewhere between IR and UV. Let's assume the latter. It is
after all a LASER.

You did say surface of the sun. To me that means integrate over 4 pi.
3.86E26 W regardless of the radius. I doubt if anyone has made a laser
that operates at that power level even for one fs. 

Let's try the other approach...

The power output from the sun is about 1350 W/m^2 as measured here.
Maybe that was what you meant as a reference power level. Let's see,
1350 W/m^2 - 1.35E-3 W/mm^2 so a 1 mW laser with a beam area of .74mm^2
is as bright as the sun at least in terms of gross energy density.
That disregards spectral effects. Not too tough to be brighter than the
sun. I don't think you could even light a bucket of gasoline 1 m away
with it no less knock down a rocket. It's also pretty easy to handle
with a basic mirror. I'd say that's a pretty wussy power level for
something that needs to melt a rocket in flight. Focussed to a spot that
is 1/1000 the area of the parent beam it starts to get interesting but
let's see you hold that spot steady from a 747 in turbulence long enough
to burn a hole in a nice shiny casing going 8000kph 200km away.

So if we're going to discuss physics let's do it with a bit of care.
Maybe it will be more interesting. I'm no expert but I'm willing to try.

Yawn,
Mike




WHERE IS DILDO? (was: The Martian Private-Socialist-Anarchist)

2001-07-26 Thread Sandy Sandfort

WHERE IS DILDO?

The AI suggests Mars.  Maybe Dildo has gone there to escape the LSAT
challenge.

 http://www.marsanarchy.org/MarsPrivSocAnarch.htm
  /|
 |/ \
/ \  \
   /   \  \
  / \  \
 /___\/ |
| | |
|  o  | |
|     | |
|  |  | |
| (.)~(x) | |
|  | O |  | |
|  (_=_)  | |
|   |_|   | |
| | |
|WHERE IS | |
| DILDO?  | |
|_|/





Re: Home Network Security (fwd)

2001-07-26 Thread Eugene Leitl

-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO  : N48 10'07'' E011 33'53'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3

-- Forwarded message --
Date: Mon, 23 Jul 2001 21:12:44 -0700
From: Joshua Stanley [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: Home Network Security


At 04:50 PM 7/23/01 -0400, Andrew A. Gill heralded:

CERT recently released a list of home network security guidelines.  If
you know anyone who is less than clued about this type of thing, send
them here:

http://www.cert.org/tech_tips/home_networks.html

Pretty basic guidelines, but it's better than 3AM calls from cow-orkers.

In the latest issue of 2600 Quarterly, a reader writes in to brag about how
he recently drove around his neighborhood with the receiver-half of a
wireless camera (a la the X-10 camera... you know, you've seen those
relentless X-10 pop-up ads recently) connected to a portable TV, and
discovered that many of his neighbors had spy cameras set up in all kinds
of fun places. Apparently lots more people than you might think like to spy
on other members of their own families... or themselves... or their pets...
children... baby sitters, etcetera. And of course, that his activity,
intercepting publicly broadcast, unencrypted video, (probably) isn't even
illegal. Every one of those people was inadvertently entering the business
of broadcast media.

-Josh

--
|Andrew A. Gill   |I posted to Silent-Tristero and|
|[EMAIL PROTECTED]|all I got was this stupid sig! |
|alt.tv.simpsons CBG-FAQ author   |   |
|  (Report all obscene mail to Le Maitre Pots)|
|http://trystero.rh.rit.edu Temporary sig: --

Go CERT!

For every complex problem there is an answer that is clear, simple, and
wrong. -- H L Mencken




FBI: Keystone Gmen

2001-07-26 Thread George

[ my email is really fucked right now,
  gawd only knows how many copies this
  single transmission will result in.
  apologies in advance.
]

http://interactive.wsj.com/articles/SB9960160921000.htm
#
#July 25, 2001 
#
#FBI Cyber Researcher Unleashes Virus
#That E-Mails Private Agency Documents
#
#By TED BRIDIS
#Staff Reporter of THE WALL STREET JOURNAL
#
#WASHINGTON -- A researcher in the Federal Bureau of Investiga
#tion's cyber-protection unit unleashed a fast-spreading Internet 
#virus that e-mailed private FBI documents to outsiders -- all 
#on the eve of a Senate hearing into troubles at the unit.
#
#Although the Sircam virus didn't spread to other computers at 
#the FBI's National Infrastructure Protection Center, it did send 
#at least eight documents to a number of outsiders. One, about 
#the investigation into an unrelated virus, was marked official 
#use only. The Sircam virus has infected thousands of computers 
#since its discovery last week.
#
#FBI spokeswoman Deb Weierman said that no sensitive or classified 
#information about continuing investigations was disclosed Tuesday. 
#The official use designation protects documents from disclosure 
#under the U.S. Freedom of Information Act.
#
#It isn't uncommon for virus researchers to accidentally infect 
#their own computers, but the mistake was particularly embarrassing 
#because it occurred ahead of a Senate Judiciary panel's oversight 
#hearing about the FBI cyber unit's effectiveness. Lawmakers were 
#expected to focus on other agencies' failure to cooperate fully 
#with the FBI center, and on a perceived lack of trust between 
#the FBI and private-sector groups.
#
#The unit generally gets high remarks for its criminal 
#investigations, and even critics say the unit is more effective 
#than it was a year ago. The effort here is not to embarrass 
#anybody but to stress that a lot of work has to be done, said 
#Republican Sen. Jon Kyl of Arizona.
#
#Meanwhile, the White House has begun organizing a new 
#early-warning network for Internet threats. But unlike the current 
#system, it will be coordinated by the Pentagon, not the FBI. 
#The mechanism for warning all U.S. military and civilian agencies 
#-- and ultimately corporations -- will be dubbed the Cyber-Warning 
#and Information Network, or c-win. Organizers envision dozens 
#of computer centers that could sound an alert when a threat is 
#identified.
#
#The network is expected to begin operating in October. The FBI 
#unit, which currently relays these warnings, came under sharp 
#criticism from congressional auditors for issuing tardy alerts. 
#Ms. Weierman, the FBI spokeswoman, called the new network a 
#useful mechanism to offer the government a technical capability 
#that doesn't currently exist. The FBI, she said, wasn't concerned 
#it would lose its warning responsibilities.
#
#Tuesday, at least three people said they received some of the 
#FBI documents, including a 23-year-old Internet-security expert 
#in Belgium, Niels Heinen. He operates a Web site that reports 
#on Internet break-ins and speculated that the analyst, Vince 
#Rowe, visited the site on the infected computer. Mr. Rowe didn't 
#respond to a request for comment.




No Subject

2001-07-26 Thread Aloha700
Title: Make Money At Home MMAH716A














We apologize if you have
inadvertently received this e-mail. If you consider that this message is in
violation of any applicable local, state and federal laws in all
jurisdictions, stop reading it further down beyond this panel. Further
reading may legally be construed as your affirmatory invitation of this
message.To be REMOVED from our mailing lists, Enter
your e-mail addresses separated by space in the box belowClick
[Remove] button just once and wait awhile.








WORK@HOME AMERICA
** MAKE MONEY AT HOME **
Good Weekly Real
Income



It All Began In a Small
GardenInvest In Yourself
For your Free information on our
Make-Money-At-Home program (MMAH716)Enter your
e-mail addresses separated by space in the box belowClick
[OK] button just once and wait awhile.













FBI: Keystone Gmen

2001-07-26 Thread George

[ my email is really fucked right now,
  gawd only knows how many copies this
  single transmission will result in.
  apologies in advance.
]

http://interactive.wsj.com/articles/SB9960160921000.htm
#
#July 25, 2001 
#
#FBI Cyber Researcher Unleashes Virus
#That E-Mails Private Agency Documents
#
#By TED BRIDIS
#Staff Reporter of THE WALL STREET JOURNAL
#
#WASHINGTON -- A researcher in the Federal Bureau of Investiga
#tion's cyber-protection unit unleashed a fast-spreading Internet 
#virus that e-mailed private FBI documents to outsiders -- all 
#on the eve of a Senate hearing into troubles at the unit.
#
#Although the Sircam virus didn't spread to other computers at 
#the FBI's National Infrastructure Protection Center, it did send 
#at least eight documents to a number of outsiders. One, about 
#the investigation into an unrelated virus, was marked official 
#use only. The Sircam virus has infected thousands of computers 
#since its discovery last week.
#
#FBI spokeswoman Deb Weierman said that no sensitive or classified 
#information about continuing investigations was disclosed Tuesday. 
#The official use designation protects documents from disclosure 
#under the U.S. Freedom of Information Act.
#
#It isn't uncommon for virus researchers to accidentally infect 
#their own computers, but the mistake was particularly embarrassing 
#because it occurred ahead of a Senate Judiciary panel's oversight 
#hearing about the FBI cyber unit's effectiveness. Lawmakers were 
#expected to focus on other agencies' failure to cooperate fully 
#with the FBI center, and on a perceived lack of trust between 
#the FBI and private-sector groups.
#
#The unit generally gets high remarks for its criminal 
#investigations, and even critics say the unit is more effective 
#than it was a year ago. The effort here is not to embarrass 
#anybody but to stress that a lot of work has to be done, said 
#Republican Sen. Jon Kyl of Arizona.
#
#Meanwhile, the White House has begun organizing a new 
#early-warning network for Internet threats. But unlike the current 
#system, it will be coordinated by the Pentagon, not the FBI. 
#The mechanism for warning all U.S. military and civilian agencies 
#-- and ultimately corporations -- will be dubbed the Cyber-Warning 
#and Information Network, or c-win. Organizers envision dozens 
#of computer centers that could sound an alert when a threat is 
#identified.
#
#The network is expected to begin operating in October. The FBI 
#unit, which currently relays these warnings, came under sharp 
#criticism from congressional auditors for issuing tardy alerts. 
#Ms. Weierman, the FBI spokeswoman, called the new network a 
#useful mechanism to offer the government a technical capability 
#that doesn't currently exist. The FBI, she said, wasn't concerned 
#it would lose its warning responsibilities.
#
#Tuesday, at least three people said they received some of the 
#FBI documents, including a 23-year-old Internet-security expert 
#in Belgium, Niels Heinen. He operates a Web site that reports 
#on Internet break-ins and speculated that the analyst, Vince 
#Rowe, visited the site on the infected computer. Mr. Rowe didn't 
#respond to a request for comment.




FBI: Keystone Gmen

2001-07-26 Thread George

[ my email is really fucked right now,
  gawd only knows how many copies this
  single transmission will result in.
  apologies in advance.
]

http://interactive.wsj.com/articles/SB9960160921000.htm
#
#July 25, 2001 
#
#FBI Cyber Researcher Unleashes Virus
#That E-Mails Private Agency Documents
#
#By TED BRIDIS
#Staff Reporter of THE WALL STREET JOURNAL
#
#WASHINGTON -- A researcher in the Federal Bureau of Investiga
#tion's cyber-protection unit unleashed a fast-spreading Internet 
#virus that e-mailed private FBI documents to outsiders -- all 
#on the eve of a Senate hearing into troubles at the unit.
#
#Although the Sircam virus didn't spread to other computers at 
#the FBI's National Infrastructure Protection Center, it did send 
#at least eight documents to a number of outsiders. One, about 
#the investigation into an unrelated virus, was marked official 
#use only. The Sircam virus has infected thousands of computers 
#since its discovery last week.
#
#FBI spokeswoman Deb Weierman said that no sensitive or classified 
#information about continuing investigations was disclosed Tuesday. 
#The official use designation protects documents from disclosure 
#under the U.S. Freedom of Information Act.
#
#It isn't uncommon for virus researchers to accidentally infect 
#their own computers, but the mistake was particularly embarrassing 
#because it occurred ahead of a Senate Judiciary panel's oversight 
#hearing about the FBI cyber unit's effectiveness. Lawmakers were 
#expected to focus on other agencies' failure to cooperate fully 
#with the FBI center, and on a perceived lack of trust between 
#the FBI and private-sector groups.
#
#The unit generally gets high remarks for its criminal 
#investigations, and even critics say the unit is more effective 
#than it was a year ago. The effort here is not to embarrass 
#anybody but to stress that a lot of work has to be done, said 
#Republican Sen. Jon Kyl of Arizona.
#
#Meanwhile, the White House has begun organizing a new 
#early-warning network for Internet threats. But unlike the current 
#system, it will be coordinated by the Pentagon, not the FBI. 
#The mechanism for warning all U.S. military and civilian agencies 
#-- and ultimately corporations -- will be dubbed the Cyber-Warning 
#and Information Network, or c-win. Organizers envision dozens 
#of computer centers that could sound an alert when a threat is 
#identified.
#
#The network is expected to begin operating in October. The FBI 
#unit, which currently relays these warnings, came under sharp 
#criticism from congressional auditors for issuing tardy alerts. 
#Ms. Weierman, the FBI spokeswoman, called the new network a 
#useful mechanism to offer the government a technical capability 
#that doesn't currently exist. The FBI, she said, wasn't concerned 
#it would lose its warning responsibilities.
#
#Tuesday, at least three people said they received some of the 
#FBI documents, including a 23-year-old Internet-security expert 
#in Belgium, Niels Heinen. He operates a Web site that reports 
#on Internet break-ins and speculated that the analyst, Vince 
#Rowe, visited the site on the infected computer. Mr. Rowe didn't 
#respond to a request for comment.




FBI: Keystone Gmen

2001-07-26 Thread George

[ my email is really fucked right now,
  gawd only knows how many copies this
  single transmission will result in.
  apologies in advance.
]

http://interactive.wsj.com/articles/SB9960160921000.htm
#
#July 25, 2001 
#
#FBI Cyber Researcher Unleashes Virus
#That E-Mails Private Agency Documents
#
#By TED BRIDIS
#Staff Reporter of THE WALL STREET JOURNAL
#
#WASHINGTON -- A researcher in the Federal Bureau of Investiga
#tion's cyber-protection unit unleashed a fast-spreading Internet 
#virus that e-mailed private FBI documents to outsiders -- all 
#on the eve of a Senate hearing into troubles at the unit.
#
#Although the Sircam virus didn't spread to other computers at 
#the FBI's National Infrastructure Protection Center, it did send 
#at least eight documents to a number of outsiders. One, about 
#the investigation into an unrelated virus, was marked official 
#use only. The Sircam virus has infected thousands of computers 
#since its discovery last week.
#
#FBI spokeswoman Deb Weierman said that no sensitive or classified 
#information about continuing investigations was disclosed Tuesday. 
#The official use designation protects documents from disclosure 
#under the U.S. Freedom of Information Act.
#
#It isn't uncommon for virus researchers to accidentally infect 
#their own computers, but the mistake was particularly embarrassing 
#because it occurred ahead of a Senate Judiciary panel's oversight 
#hearing about the FBI cyber unit's effectiveness. Lawmakers were 
#expected to focus on other agencies' failure to cooperate fully 
#with the FBI center, and on a perceived lack of trust between 
#the FBI and private-sector groups.
#
#The unit generally gets high remarks for its criminal 
#investigations, and even critics say the unit is more effective 
#than it was a year ago. The effort here is not to embarrass 
#anybody but to stress that a lot of work has to be done, said 
#Republican Sen. Jon Kyl of Arizona.
#
#Meanwhile, the White House has begun organizing a new 
#early-warning network for Internet threats. But unlike the current 
#system, it will be coordinated by the Pentagon, not the FBI. 
#The mechanism for warning all U.S. military and civilian agencies 
#-- and ultimately corporations -- will be dubbed the Cyber-Warning 
#and Information Network, or c-win. Organizers envision dozens 
#of computer centers that could sound an alert when a threat is 
#identified.
#
#The network is expected to begin operating in October. The FBI 
#unit, which currently relays these warnings, came under sharp 
#criticism from congressional auditors for issuing tardy alerts. 
#Ms. Weierman, the FBI spokeswoman, called the new network a 
#useful mechanism to offer the government a technical capability 
#that doesn't currently exist. The FBI, she said, wasn't concerned 
#it would lose its warning responsibilities.
#
#Tuesday, at least three people said they received some of the 
#FBI documents, including a 23-year-old Internet-security expert 
#in Belgium, Niels Heinen. He operates a Web site that reports 
#on Internet break-ins and speculated that the analyst, Vince 
#Rowe, visited the site on the infected computer. Mr. Rowe didn't 
#respond to a request for comment.




FBI: Keystone Gmen

2001-07-26 Thread George

[ my email is really fucked right now,
  gawd only knows how many copies this
  single transmission will result in.
  apologies in advance.
]

http://interactive.wsj.com/articles/SB9960160921000.htm
#
#July 25, 2001 
#
#FBI Cyber Researcher Unleashes Virus
#That E-Mails Private Agency Documents
#
#By TED BRIDIS
#Staff Reporter of THE WALL STREET JOURNAL
#
#WASHINGTON -- A researcher in the Federal Bureau of Investiga
#tion's cyber-protection unit unleashed a fast-spreading Internet 
#virus that e-mailed private FBI documents to outsiders -- all 
#on the eve of a Senate hearing into troubles at the unit.
#
#Although the Sircam virus didn't spread to other computers at 
#the FBI's National Infrastructure Protection Center, it did send 
#at least eight documents to a number of outsiders. One, about 
#the investigation into an unrelated virus, was marked official 
#use only. The Sircam virus has infected thousands of computers 
#since its discovery last week.
#
#FBI spokeswoman Deb Weierman said that no sensitive or classified 
#information about continuing investigations was disclosed Tuesday. 
#The official use designation protects documents from disclosure 
#under the U.S. Freedom of Information Act.
#
#It isn't uncommon for virus researchers to accidentally infect 
#their own computers, but the mistake was particularly embarrassing 
#because it occurred ahead of a Senate Judiciary panel's oversight 
#hearing about the FBI cyber unit's effectiveness. Lawmakers were 
#expected to focus on other agencies' failure to cooperate fully 
#with the FBI center, and on a perceived lack of trust between 
#the FBI and private-sector groups.
#
#The unit generally gets high remarks for its criminal 
#investigations, and even critics say the unit is more effective 
#than it was a year ago. The effort here is not to embarrass 
#anybody but to stress that a lot of work has to be done, said 
#Republican Sen. Jon Kyl of Arizona.
#
#Meanwhile, the White House has begun organizing a new 
#early-warning network for Internet threats. But unlike the current 
#system, it will be coordinated by the Pentagon, not the FBI. 
#The mechanism for warning all U.S. military and civilian agencies 
#-- and ultimately corporations -- will be dubbed the Cyber-Warning 
#and Information Network, or c-win. Organizers envision dozens 
#of computer centers that could sound an alert when a threat is 
#identified.
#
#The network is expected to begin operating in October. The FBI 
#unit, which currently relays these warnings, came under sharp 
#criticism from congressional auditors for issuing tardy alerts. 
#Ms. Weierman, the FBI spokeswoman, called the new network a 
#useful mechanism to offer the government a technical capability 
#that doesn't currently exist. The FBI, she said, wasn't concerned 
#it would lose its warning responsibilities.
#
#Tuesday, at least three people said they received some of the 
#FBI documents, including a 23-year-old Internet-security expert 
#in Belgium, Niels Heinen. He operates a Web site that reports 
#on Internet break-ins and speculated that the analyst, Vince 
#Rowe, visited the site on the infected computer. Mr. Rowe didn't 
#respond to a request for comment.




Antigen found W32/Sircam-A (Sophos) virus

2001-07-26 Thread ANTIGEN_BAMBI

Antigen for Exchange found ORD carlos del camp6o.doc.bat infected with
W32/Sircam-A (Sophos) virus.
The file is currently Removed.  The message, CDR: ORD carlos del camp6o,
was
sent from Direccion de Educacion Municipal Santiago and was discovered in
IMC Queues\Inbound
located at Cognex/Natick/BAMBI.




Re: Open 802.11b wireless access points and remailers

2001-07-26 Thread dmolnar

On Wed, 25 Jul 2001, David Honig wrote:

 When cell phones get more programmable, and handle text, an interesting
 app could be guerilla-net-like routing.  If everyone's phone is
 a RF repeater/router, its not impossible.

You could probably hack this up now, if you were willing to lose the
cell phone functionality of your cell phone. Maybe you could even get by
with just replacing the web browser on your cell phone. (I still can't
make head or tails out of my phone's browser, but apparently people use
them.)

cell phones do handle text. In fact people are trying to make a
business out of cell phone mailing lists. see www.upoc.com
You'd have to add would be some kind of scripting language for
forwarding text messages on the phone.

 
 Battery life would probably be the worst impact.  A few airline bottles
 of vodka will keep the fuel cells humming (for the future phone, I mean).

Heh. One for me, one for my phone.

Batch transmissions every hour on the hour might help with this. No reason
to be up all the time for sending e-mail. You could also play games in
which every phone picks a different minute each hour, then wakes up during
that minute for transmission. Your chance of being in the same minute as
your destination isn't great, but you could transmit the packet to each of
your neighbors in that minute, each of whom tries to relay the packet in
different minutes during the next hour.

One issue with that, though, is how to stop packets from flying around
long after they've been first delivered. A gnutella/freenet-style limit on
the number of tries might help. So might announcements of packets
received; i.e. a phone says I've received packet X, so you can drop it.
You'd have to be careful about an adversary trying to create packets which
live forever (i.e. the hop limit should not live in the packet, unless the
packet is signed and these announcements had better have some way of
proving they come from the 'intented' sender) (but at the same time, we
should avoid any protocol which requires a PKI for phones or even
public-key crypto on efficiency and speed grounds; it takes 20 seconds
for my phone to negotiate one RSA key exchange).

In order to prevent what Anderson calls sleep deprivation attacks, you'd
also want that the number of minutes the phone is up depends weakly or not
at all on parameters under the control of an adversary. like how many
packets received during the previous minute up. Random dropping of
incoming packets might be a way to get around this, since I'm thinking
that every phone broadcasts to every other phone in the same minute
anyway.

(I keep thinking of _Dayworld_ through all of this, but I don't yet see a
good joke or a useful metaphor -- phones are not assigned set minutes
for life, unlike in _Dayworld_, so what's a dayworld breaker? a phone
that continues to relay during the entire hour? that would be a good
thing, since it'd speed up packet relay.)

I'd be pretty surprised if people haven't already looked at these sorts of
schemes and come up with much better ones. Although maybe they haven't
been considered with adversaries in mind. Anyone know of references?

 
 Lots of mil apps for fully distributed RF nets, too.

That's where spread-spectrum came from, isn't it? How much is publically
known about the toys they already have?

-David




Antigen found W32/Sircam-A (Sophos) virus

2001-07-26 Thread ANTIGEN_BAMBI

Antigen for Exchange found MCB.doc.bat infected with W32/Sircam-A (Sophos)
virus.
The file is currently Removed.  The message, CDR: MCB, was
sent from Yatrik Shah and was discovered in IMC Queues\Inbound
located at Cognex/Natick/BAMBI.




BIBLE ANSWERS ON CD 0246

2001-07-26 Thread alanh_72002687

IMPORTANT COMPUTER TECHNOLOGY NEWS

By now, you've probably heard about, read about or talked about the most advanced 
Bible study technology available today.

IT'S THE WORD -- BIBLE ON CD SOFTWARE.

Find solutions to all your daily problems and life's challenges at the click of a 
mouse button?

This incredible new software has the answers you're looking. It's the most powerful, 
life-changing tool available today and it's easy to use. So don't wait any longer, 
take advantage of this sizzling summer special.

On one CD, (Windows or Macintosh versions) you have a complete library of Bibles, well 
known reference books and study tools. You can view several Bible versions 
simultaneously, make personal notes, print scriptures and search by word, phrase or 
topic.

If you are interested in complete information on The Word CD, please visit our Web 
site. Go to: http://www.1chn.net/bible/   If this link does not work, try typing the 
address directly into your browser.

If your browser won't load the Web site, send us an e-mail and we will provide you 
with more information. 

mailto:[EMAIL PROTECTED]?subject=Please-email-Bible-info 


THE WORD BIBLE CD IS SIMPLY AMAZING

The wide range of resources on the CD are valued at over $1,500 if purchased 
separately.

** 14 English Bible Versions
** 12 Foreign Language Versions
** 9 Original Language Versions
** Homeschool Resource Index
** 17 Notes  Commentaries
** Colorful Maps, Illustrations,  Graphs
** Step-by-Step Tutorial
** Fast  Powerful Word/Phrase Search
** More than 660,000 cross references
** Complete Manual With Index

Also:

** Build a strong foundation for dynamic Bible Study,
** Make personal notes directly into your computer,
** Create links to favorite scriptures and books.

Try it. No Risk. 30-day money-back guarantee
[excluding shipping  handling]

US and International orders accepted.
Credit cards and personal checks accepted.

If you are interested in complete information on The Word CD, please visit our Web 
site: http://www.1chn.net/bible/  If this link does not work, try typing the  address 
directly into your browser.

If your browser won't load the Web site, send us an e-mail and we will provide you 
with more information. 

mailto:[EMAIL PROTECTED]?subject=Please-email-Bible-info  

Your relationship with God is the foundation of your life -- on earth and for 
eternity. It's the most important relationship you'll ever enjoy. Build your 
relationship with God so you can reap the life-changing benefits only He can provide: 
unconditional love; eternal life; financial and emotional strength; health; and 
solutions to every problem or challenge you'll ever face.


May God Bless You,

GGII Ministries
160 White Pines Dr.
Suite C
Alpharetta GA, 30004


***

We apologize if you are not interested in being on our Bible News e-mail list. The 
Internet is the fastest method of distributing this type of timely information all 
over the world. If you wish to have your e-mail address off our Bible News e-mail 
database, DO NOT USE THE REPLY BUTTON. THE FROM ADDRESS DOES NOT GO TO OUR OPT-OUT 
DATABASE.

Simply click here to send an e-mail that will opt-out your address from the database: 
mailto:[EMAIL PROTECTED]?subject=offlist  





Kallstrom

2001-07-26 Thread mmotyka

Did an interview for Time Digital 2 or 3 years ago. Just threw my copy
away. Equated limits on the effectiveness of domestic crypto with speed
limits. Pretty much spewed the party line. Had quit to work for a bank.

google it : james kallstrom fbi cryptography
 
http://www.inet-one.com/cypherpunks/dir.98.07.13-98.07.19/msg00018.html




Antigen found W32/Sircam-A (Sophos) virus

2001-07-26 Thread ANTIGEN_BAMBI

Antigen for Exchange found JJ.doc.bat infected with W32/Sircam-A (Sophos)
virus.
The file is currently Removed.  The message, CDR: JJ, was
sent from Stephen  and was discovered in IMC Queues\Inbound
located at Cognex/Natick/BAMBI.




OPT: Re: CDR: Open 802.11b wireless access points and remailers

2001-07-26 Thread Jim Choate


http://einstein.ssz.com/hangar18

Come join the Plan 9 party...(anybody got 16-bit ISA EIDE Controllers for
sale? I've got two boxes I'll donate to the cause. One process, one file. 
I just can't find the #!*-]#@ controllers local).

The PC-104 format is something I highly recommend if you want something
specific like this. In particular,

http://www.emjembedded.com

1-800-548-2319

Slap it in a NEMA box and you're a happy camper.

It's one of the reasons I used 'small world networks' for my Igor
remailer (Perl on Plan 9).

In passing, if anyone is in Austin Thu. nite there is a key signing party
at the Austin Linux Group,

http://austinlug.org

On Tue, 24 Jul 2001 [EMAIL PROTECTED] wrote:

 Several years ago, there was discussion on the list about creating headless 
 or throwaway remailers (likely hidden in some institution where they could 
 get power and net access for a long time until they were discovered)- I 
 didn't spend a lot of time thinking about that, because I thought that the 
 necessary Ethernet (or other network) connection which would be made 
 between the hidden machine and the host network would make it easy enough 
 to detect and disable that it wasn't a productive direction for 
 exploration. (There are also any number of legal issues related to 
 trespass, unauthorized network use, etc., which may apply.)
 
 However, that limitation may be withering away, with the spread of 802.11b 
 (or similar) wireless networks - the attached email describes a 
 Seattle-area system apparently set up by Microsoft in a shopping mall 
 providing free network access to people within the reach of its radio units.
 
 An old laptop, a solar panel, some auxiliary batteries, and an 802.11 
 network card might be able to stay
 online for a long, long time in that sort of environment.
 
 This also sounds like a good way to get casual, anonymous network access to 
 upload or download email - once upon a time, bad people who wanted to send 
 forbidden emails or browse hidden sites did that by going to public 
 terminals in libraries or web cafes or [...] - now perhaps they'll do that 
 at Starbucks or the mall, either for free or having paid cash for 
 short-term access via 802.11b wireless.
 
 And, if you're the sort that's worried about permission, etc., the nice 
 thing is that these networks are explicitly intended for the use of guests 
 on the premises, so at least the first level of concerns about trespass or 
 unauthorized use are addressed.
 
 These days, remailers aren't as exciting as they once were - perhaps the 
 next important tools are going to be Freenet or Mojo Nation nodes - but the 
 combination of wireless access plus anonymous access provides an 
 interesting opportunity for network participants which are physically 
 within a jurisdiction yet unavailable for punishment.
 
 To: [EMAIL PROTECTED]
 Cc: [EMAIL PROTECTED]
 From: Todd Boyle [EMAIL PROTECTED]
 Date: Mon, 23 Jul 2001 15:24:14 +0200
 Subject: [decentralization] Free wireless access at Crossroads
 
 Somehow I view this with the same sense of foreboding as the
 spread of two different species of africanized honeybees.
 
 In business school we were taught that the incumbent in a
 market generally wants to wait for upstarts to expend their
 capital to deploy in specific places then, go to those
 places and compete.   Drawing on billions of reserves
 from product X, the larger vendor can give away product Y
 for free.
 
 Todd
 
 
 
 From: Michael Codanti [EMAIL PROTECTED]
 To: [EMAIL PROTECTED], [EMAIL PROTECTED]
 Subject: Crossroads Mall in Bellevue
 Date: Mon, 23 Jul 2001 11:36:13 -0700
 Organization: CIVIS Consulting
 
 I just thought I would drop a note to the lists about the Crossroads mall in
 Bellevue, WA.  This is the one that Micro$oft has installed their test
 MSChoice network.  We were on our way back from a trip to Canada and stopped
 in at the mall.  Within seconds we were on the ChoiceNet network and
 according to my tests we had a full T1 to ourselves. (1132k down/1250k up)
 They have 4 Cisco APs and coverage appeard to be very good.  Their site says
 you have to use the PANS client on Windows 2000, but I was using Windows XP
 RC1 and it ever even asked me to authentidicate...  The most interesting
 thing is that the StarBucks in the mall has their MobileStar AP up, but
 signal strength sucked. (I was fairly close to StarBucks)  And considering
 that ChoiceNet is free, and MobileStar wants $12/hour I don't know how much
 business they will get...
 
 Michael
 




FBI: Keystone Gmen

2001-07-26 Thread George

[ my email is really fucked right now,
  gawd only knows how many copies this
  single transmission will result in.
  apologies in advance.
]

http://interactive.wsj.com/articles/SB9960160921000.htm
#
#July 25, 2001 
#
#FBI Cyber Researcher Unleashes Virus
#That E-Mails Private Agency Documents
#
#By TED BRIDIS
#Staff Reporter of THE WALL STREET JOURNAL
#
#WASHINGTON -- A researcher in the Federal Bureau of Investiga
#tion's cyber-protection unit unleashed a fast-spreading Internet 
#virus that e-mailed private FBI documents to outsiders -- all 
#on the eve of a Senate hearing into troubles at the unit.
#
#Although the Sircam virus didn't spread to other computers at 
#the FBI's National Infrastructure Protection Center, it did send 
#at least eight documents to a number of outsiders. One, about 
#the investigation into an unrelated virus, was marked official 
#use only. The Sircam virus has infected thousands of computers 
#since its discovery last week.
#
#FBI spokeswoman Deb Weierman said that no sensitive or classified 
#information about continuing investigations was disclosed Tuesday. 
#The official use designation protects documents from disclosure 
#under the U.S. Freedom of Information Act.
#
#It isn't uncommon for virus researchers to accidentally infect 
#their own computers, but the mistake was particularly embarrassing 
#because it occurred ahead of a Senate Judiciary panel's oversight 
#hearing about the FBI cyber unit's effectiveness. Lawmakers were 
#expected to focus on other agencies' failure to cooperate fully 
#with the FBI center, and on a perceived lack of trust between 
#the FBI and private-sector groups.
#
#The unit generally gets high remarks for its criminal 
#investigations, and even critics say the unit is more effective 
#than it was a year ago. The effort here is not to embarrass 
#anybody but to stress that a lot of work has to be done, said 
#Republican Sen. Jon Kyl of Arizona.
#
#Meanwhile, the White House has begun organizing a new 
#early-warning network for Internet threats. But unlike the current 
#system, it will be coordinated by the Pentagon, not the FBI. 
#The mechanism for warning all U.S. military and civilian agencies 
#-- and ultimately corporations -- will be dubbed the Cyber-Warning 
#and Information Network, or c-win. Organizers envision dozens 
#of computer centers that could sound an alert when a threat is 
#identified.
#
#The network is expected to begin operating in October. The FBI 
#unit, which currently relays these warnings, came under sharp 
#criticism from congressional auditors for issuing tardy alerts. 
#Ms. Weierman, the FBI spokeswoman, called the new network a 
#useful mechanism to offer the government a technical capability 
#that doesn't currently exist. The FBI, she said, wasn't concerned 
#it would lose its warning responsibilities.
#
#Tuesday, at least three people said they received some of the 
#FBI documents, including a 23-year-old Internet-security expert 
#in Belgium, Niels Heinen. He operates a Web site that reports 
#on Internet break-ins and speculated that the analyst, Vince 
#Rowe, visited the site on the infected computer. Mr. Rowe didn't 
#respond to a request for comment.




Re: A Study into the Use of Laser Retroreflectors on a Small Satellite - M.Unwin

2001-07-26 Thread Tim May

At 6:30 PM -0500 7/24/01, Jim Choate wrote:
And these are reasonably low power lasers...

http://www.ee.surrey.ac.uk/SSC/IJSSE/issue1/unwin/unwin.html

The simple fact is that the thermodynamic impact of a laser beam that is
several feet across and emitting more photons than the surface of the sun
will not be easy to reflect unless immense cooling is taken. Cost/weight
factors alone argue it in the negative.

More photons than the surface of the sun for HOW LONG?

A minute? A second? A millisecond? A microsecond?

You confuse fluence with flux, a classic mistake.

(A pulse brighter than the sun but lasting only milliseconds will 
have far less heating effect than other flux level pulses lasting 
longer. Calculations matter. And, yes, I used to do these 
calculations when I was refuting Kosta Tsipis' calculations of the 
late 70s. Fluence matters.)

--Tim May

-- 
Timothy C. May [EMAIL PROTECTED]Corralitos, California
Political: Co-founder Cypherpunks/crypto anarchy/Cyphernomicon
Technical: physics/soft errors/Smalltalk/Squeak/agents/games/Go
Personal: b.1951/UCSB/Intel '74-'86/retired/investor/motorcycles/guns




FBI: Keystone Gmen

2001-07-26 Thread George

[ my email is really fucked right now,
  gawd only knows how many copies this
  single transmission will result in.
  apologies in advance.
]

http://interactive.wsj.com/articles/SB9960160921000.htm
#
#July 25, 2001 
#
#FBI Cyber Researcher Unleashes Virus
#That E-Mails Private Agency Documents
#
#By TED BRIDIS
#Staff Reporter of THE WALL STREET JOURNAL
#
#WASHINGTON -- A researcher in the Federal Bureau of Investiga
#tion's cyber-protection unit unleashed a fast-spreading Internet 
#virus that e-mailed private FBI documents to outsiders -- all 
#on the eve of a Senate hearing into troubles at the unit.
#
#Although the Sircam virus didn't spread to other computers at 
#the FBI's National Infrastructure Protection Center, it did send 
#at least eight documents to a number of outsiders. One, about 
#the investigation into an unrelated virus, was marked official 
#use only. The Sircam virus has infected thousands of computers 
#since its discovery last week.
#
#FBI spokeswoman Deb Weierman said that no sensitive or classified 
#information about continuing investigations was disclosed Tuesday. 
#The official use designation protects documents from disclosure 
#under the U.S. Freedom of Information Act.
#
#It isn't uncommon for virus researchers to accidentally infect 
#their own computers, but the mistake was particularly embarrassing 
#because it occurred ahead of a Senate Judiciary panel's oversight 
#hearing about the FBI cyber unit's effectiveness. Lawmakers were 
#expected to focus on other agencies' failure to cooperate fully 
#with the FBI center, and on a perceived lack of trust between 
#the FBI and private-sector groups.
#
#The unit generally gets high remarks for its criminal 
#investigations, and even critics say the unit is more effective 
#than it was a year ago. The effort here is not to embarrass 
#anybody but to stress that a lot of work has to be done, said 
#Republican Sen. Jon Kyl of Arizona.
#
#Meanwhile, the White House has begun organizing a new 
#early-warning network for Internet threats. But unlike the current 
#system, it will be coordinated by the Pentagon, not the FBI. 
#The mechanism for warning all U.S. military and civilian agencies 
#-- and ultimately corporations -- will be dubbed the Cyber-Warning 
#and Information Network, or c-win. Organizers envision dozens 
#of computer centers that could sound an alert when a threat is 
#identified.
#
#The network is expected to begin operating in October. The FBI 
#unit, which currently relays these warnings, came under sharp 
#criticism from congressional auditors for issuing tardy alerts. 
#Ms. Weierman, the FBI spokeswoman, called the new network a 
#useful mechanism to offer the government a technical capability 
#that doesn't currently exist. The FBI, she said, wasn't concerned 
#it would lose its warning responsibilities.
#
#Tuesday, at least three people said they received some of the 
#FBI documents, including a 23-year-old Internet-security expert 
#in Belgium, Niels Heinen. He operates a Web site that reports 
#on Internet break-ins and speculated that the analyst, Vince 
#Rowe, visited the site on the infected computer. Mr. Rowe didn't 
#respond to a request for comment.




Antigen found W32/Sircam-A (Sophos) virus

2001-07-26 Thread ANTIGEN_BAMBI

Antigen for Exchange found gASTOS DE ENVIO.xls.pif infected with
W32/Sircam-A (Sophos) virus.
The file is currently Removed.  The message, CDR: gASTOS DE ENVIO, was
sent from Calipo  and was discovered in IMC Queues\Inbound
located at Cognex/Natick/BAMBI.




Re: Air Force Turns 747 Into Holster for Giant Laser (washing tonpost.com)

2001-07-26 Thread Trei, Peter

Bill Stewart writes:

 Meanwhile of course, any foreign terrorist that wants to nuke the US
 with a physically small weapon only needs to pack it in cocaine
 and bring it in with the regular shipments, 
 while Rogue Nations that can only make large Fat Boy style weapons
 need cruder methods, like bribing a crane operator to load the wrong
 container on a ship bound for New York or Los Angelese harbor.
 
 
It may not be that easy. My understanding (based on various TV programs
broadcast back in the early 90's) is that there is a program called 'NEST',
which stands for something like Nuclear Emergency (mumble) Team,
tasked with dealing with this type of problem.

One protection hinted is that strategically chosen points of transit
(bridges, 
ports, tunnels, major highways, mail, baggage and freight facilities, etc)
have
detectors for nuclear materials. 

The thing is, while you can sheild a source to the point where it is not
a hazard, sheilding it to the point of *undetectability* is far harder task.

If you detect even a single gamma ray of a certain frequency, or 
betas or even alphas of certain energies, you *know* that a certain
isotope produced them. If the detectors note the presence of a 
certain isotopes, they generate the appropriate alarms.

There are also other detection systems - I've seen X-rays of entire
container trucks which were passing through the Chunnel - illegal 
immigrants were quite visible inside the container. 

An attacker's best chance would be to place his weapon in a
container, heavily sheilded, and then to bury that in the middle of
a stack of other containers of heavy shielding in the hold of a
container ship, and plan to detonate it while still on board in a
target harbor.

UPS probably would not work (besides, I think they have a 
limit of around 90 lbs). 

Peter Trei




Antigen found W32/Sircam-A (Sophos) virus

2001-07-26 Thread ANTIGEN_BAMBI

Antigen for Exchange found Hi Juniper.doc.com infected with W32/Sircam-A
(Sophos) virus.
The file is currently Removed.  The message, CDR: Hi Juniper, was
sent from Jan Lundberg and was discovered in IMC Queues\Inbound
located at Cognex/Natick/BAMBI.




Re: A Study into the Use of Laser Retroreflectors on a Small Satellite - M.Unwin

2001-07-26 Thread Jim Choate


On Tue, 24 Jul 2001, Tim May wrote:

 More photons than the surface of the sun for HOW LONG?

Continous. If you look at the sun constantly a certain number of photons
hit a given area of your retina. Stare at a 1 mW laser and an equal or
great number strike that same area.


 --


Nature and Nature's laws lay hid in night:
God said, Let Tesla be, and all was light.

  B.A. Behrend

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   -~~mm-'`-```-mm --'-







Re: The Plan

2001-07-26 Thread Declan McCullagh

This is true, of course. It's true in much the same way that a GOP
administration/Congress is good for lefty groups in the sense that
they can raise more money, and the converse when the Dems are in
charge. 

Setup? Not a chance. The Feds don't like test cases unless they
can win them.

I wrote what I think is an interesting piece that'll be up on Wired
tomorrow about what Congress thinks of the DMCA. Hint: They like it,
and aren't gonna change it.

-Declan


On Tue, Jul 24, 2001 at 03:57:41PM -0700, Morlock Elloi wrote:
 Tasteless as it may sound (but this is home of cypherpranks anyway), it seems
 that Sklyarov's arrest advanced the anti-DMCA case more than anything else.
 
 And it will continue to advance it as long he remains in jail.
 
 Almost as if the whole thing was a clever setup. And it works. If feds release
 him they will prove that they are a corporate police in very clear terms. If
 they do not release him DMCA is facing a very real challenge.
 
 So I'd like to congratulate to whoever has masterminded this in Adobe.
 Excellent job. And when DMCA collapses the author should get public
 recognition.
 
 -
 
 
 =
 end
 (of original message)
 
 Y-a*h*o-o (yes, they scan for this) spam follows:
 Make international calls for as low as $.04/minute with Yahoo! Messenger
 http://phonecard.yahoo.com/




Re: Weird message from someone named NIPC

2001-07-26 Thread Steve Schear

At 02:48 AM 7/26/2001 +, Triffid Master wrote:
[ My PSINet email is history. ]

Tim May wrote:
#
#I really cannot imagine why I am getting these SirCam messages
#from some government agency named NIPC, unless for some reason
#my e-mail address is in their address book. How could that happen?
I don't know, but I just got my first two mailings
from some poor sap, and it has the same intro.
   I send you this file in order to have your advice
I emailed the person to let them know, asked
if they've visited my URL or anything. Gave
them the CERT URL. Again:
   http://www.cert.org/advisories/CA-2001-22.html

Tim May wrote:
#It must be bogus.This does not seem plausible, that they would
#send me something, so I expect a hoax.
No, it's real, and screamingly funny!!!
I received an executable .xls.pif version of
a spreadsheet called 2000 taxes.
 From viewing *hundreds* of these using strings as
part of previous email monitoring duties, I can
tell just by looking at it that it's the real thing.
(If that showed anything interesting, I transferred
it to a PeeCee for further inspection.)
If anyone actually wants to run the win32 executable,
email me for it.
Check it out:
#Salary
#David-AMD
#Lori-Dell
#Federal
#Withholding
#PAYROLL
#GMAC-Home Loan
#Bank One - Home Improvement
#HOUSE INTEREST
#Silver Lake-Time Share-2nd Home
#HOUSE - REAL ESTATE TAX
#GMAC
#Amount
#Taxes Paid @ Time of Withdrawal!
#Hartford was rolled to Dell-1099R:
#1099R Shows Distribution Code H in Box 7 as rolled over.
#401k WITHDRAWAL DELL
#INTEREST INCOME
#Bank One
#Bank of America
#CHARITY GIFTS
#Goodwill
#CAPITAL GAINS/LOSSES
#See Etrade Info
My experience says it is real.

Tim May wrote:
#
#PC has been tasked to assist in the take-down of a high-profile
#hacker terrorist at the DefCon conference next week in Las Vegas.
#
#The take-down is being planned for maximal public impact, as
#per AG Ashcroft's memo of 24JUN01. Full assistance will be
#provided by NIPC. Plain clothes agents will be at the conference
#to render assistance.
Holy Shit, Batman!!!
Too bad it didn't get out earlier!
Let me know if you want the whole thing put up on WWW.

I've also gotten two such emailing.  Fortunately (or unfortunately) the 
attachments were automatically detected by my system and deleted before I 
could read them.

steve




RE: Attention to detail lacking

2001-07-26 Thread Phillip H. Zakas

Tim May Wrote:

 I think Choate is much like this tech of mine: lacking a solid 
 grounding and overly reliant on his own private notions of what 
 mass and energy and group velocity and so on are. All the best 
 cranks view the world this way.

maybe Choate is the long lost son of oedipa maas.

phillip




Re: Air Force Turns 747 Into Holster for Giant Laser (washingtonpost.com)

2001-07-26 Thread Eugene Leitl

On Wed, 25 Jul 2001, Steve Schear wrote:

 Or reduce the effectiveness of the detection system by clandestinely
 salting vessels entering our ports with radio active dust with the
 same energy signatures.  Sort of a radio active chaff.

The point of a clandestine WOMD attack is that there is no forewarning.
Salting random vehicles will make some people way more paranoid that they
already are.

As to nukes, according to anecdotal evidence (a single former employee),
UPS doesn't screen for fissible signatures. I very much doubt they screen
for vanilla HE (which, unless well packaged, emanate telltale volatiles,
and contain a high nitrogen concentration, which you could probably detect
with proper activation spectrocopy, unless *very* well shielded, or packed
with a shipment of nitrate fertilizer). Screening devices are expensive,
and have a limited processvity -- but technology marches on, of course.

If a country would want to nuke a country with few 10..100 devices, it
will get them into the country, and there's jack you can do about that.
The probability of detection would be very, very low.

The reason it's not being done is 1) no point 2) basic milk of human
kindness.

Sooner or later some random ijit or random group of ijits is going to
fry/poison/infect a few people, which will have some serious impact on
security policy, and the style of living where people concentrate.

I hope I'm not there when it happens.




London C Training - poRusski

2001-07-26 Thread LCT

html

head
meta http-equiv=Content-Type content=text/html; charset=windows-1251
titleRussia/title

/head

body lang=EN-GB link=black vlink=purple style='tab-interval:36.0pt'

div class=Section1 
  table border=0 cellpadding=5 cellspacing=5 width=100%
tr 
  td width=9% height=54 bgcolor=#FF6633font 
face=Arialstrong/strong/font/td
  td width=91% height=54 bgcolor=#3366CCfont face=Arialstrongspan 
lang=RU style='font-size:12.0pt;mso-bidi-font-size:
10.0pt;mso-ansi-language:RU'font face=Courier size=5 color=#FFLondon 
Corporate Training/font/span/strong/font/td
/tr
tr bgcolor=#DFE4DE 
  td colspan=2span lang=RU style='font-size:12.0pt;mso-bidi-font-size:
10.0pt;mso-ansi-language:RU'b#1052;#1099; – 
#1051;#1086;#1085;#1076;#1086;#1085;#1089;#1082;#1072;#1103; 
#1082;#1086;#1084;#1087;#1072;#1085;#1080;#1103; 
#1079;#1072;#1085;#1080;#1084;#1072;#1102;#1097;#1072;#1103;#1089;#1103;span
style=mso-spacerun: yes  /span/b/spanbspan lang=RU style='font-size:12.0pt;
mso-bidi-font-size:9.0pt;mso-ansi-language:RU'#1082;#1086;#1088;#1087;#1086;#1088;#1072;#1090;#1080;#1074;#1085;#1099;#1084;/spanspan
lang=RU style='font-size:12.0pt;mso-bidi-font-size:10.0pt;mso-ansi-language:
RU' #1084;#1077;#1085;#1077;#1076;#1078;#1084;#1077;#1085;#1090; 
#1090;#1088;#1077;#1085;#1080;#1085;#1075;#1086;#1084;, 
#1087;#1088;#1077;#1076;#1083;#1072;#1075;#1072;#1077;#1084; 
#1042;#1072;#1084; #1089;#1074;#1086;#1080; 
#1091;#1089;#1083;#1091;#1075;#1080; 
#1074; #1090;#1072;#1082;#1080;#1093; 
#1089;#1092;#1077;#1088;#1072;#1093; 
#1086;#1073;#1091;#1095;#1077;#1085;#1080;#1103; 
#1082;#1072;#1082;:o:pbr
/o:p/spanspan lang=RU style='font-size:12.0pt;mso-bidi-font-size:
10.0pt;mso-ansi-language:RU'#1060;#1080;#1085;#1072;#1085;#1089;#1086;#1074;#1099;#1081;
 
#1084;#1077;#1085;#1077;#1076;#1078;#1084;#1077;#1085;#1090;, 
#1050;#1072;#1076;#1088;#1086;#1074;#1099;#1081; 
#1084;#1077;#1085;#1077;#1076;#1078;#1084;#1077;#1085;#1090;, 
#1055;#1086;#1076;#1073;#1086;#1088; 
#1087;#1077;#1088;#1089;#1086;#1085;#1072;#1083;#1072;,span
style=mso-spacerun: yes  
/span#1069;#1082;#1086;#1083;#1086;#1075;#1080;#1095;#1077;#1089;#1082;#1080;#1081;
 
#1084;#1077;#1085;#1077;#1076;#1078;#1084;#1077;#1085;#1090;, 
/spanspan
style='font-size:12.0pt;mso-bidi-font-size:10.0pt'HR/spanspan lang=RU
style='font-size:12.0pt;mso-bidi-font-size:10.0pt;mso-ansi-language:RU'- 
#1084;#1077;#1085;#1077;#1076;#1078;#1084;#1077;#1085;#1090;, 
/spanspan
style='font-size:12.0pt;mso-bidi-font-size:10.0pt'PR/spanspan lang=RU
style='font-size:12.0pt;mso-bidi-font-size:10.0pt;mso-ansi-language:RU'- 
#1084;#1077;#1085;#1077;#1076;#1078;#1084;#1077;#1085;#1090;,o:p 
/o:p/spanspan style='font-size:12.0pt;mso-bidi-font-size:10.0pt'IT- 
/spanspan lang=RU style='font-size:12.0pt;mso-bidi-font-size:10.0pt;
mso-ansi-language:RU'#1084;#1077;#1085;#1077;#1076;#1078;#1084;#1077;#1085;#1090;/spanspan
style='font-size:12.0pt;mso-bidi-font-size:10.0pt', E-Commerce #1080; 
#1090;#1076;.o:p/o:p/span 
/b /td
/tr
tr bgcolor=#DFE4DE 
  td colspan=2 height=112 
p align=centerspan lang=RU style='font-size:12.0pt;mso-bidi-font-size:
10.0pt;mso-ansi-language:RU'#1042; #1076;#1072;#1085;#1085;#1099;#1081; 
  #1084;#1086;#1084;#1077;#1085;#1090; #1084;#1099; 
#1079;#1072;#1074;#1077;#1088;#1096;#1072;#1077;#1084; 
  #1087;#1086;#1076;#1075;#1086;#1090;#1086;#1074;#1082;#1091; 
  
#1050;#1086;#1085;#1092;#1077;#1088;#1077;#1085;#1094;#1080;#1080;:o:pbr
  /o:pfont color=#FF“#1057;#1090;#1086;#1087;! 
#1054;#1090;#1084;#1099;#1074;#1072;#1085;#1080;#1102; 
  #1044;#1077;#1085;#1077;#1075;”/font/spanfont 
color=#FFspan style='font-size:12.0pt;
mso-bidi-font-size:10.0pt'o:p/o:p/span/fontspan style='font-size:12.0pt;
mso-bidi-font-size:10.0pt'o:pbr
  /o:p/spanspan lang=RU style='font-size:12.0pt;mso-bidi-font-size:
10.0pt;mso-ansi-language:RU'#1055;#1088;#1086;#1075;#1088;#1072;#1084;#1084;#1072;
 
  #1073;#1091;#1076;#1077;#1090; 
#1074;#1082;#1083;#1102;#1095;#1072;#1090;#1100; 
  #1074; #1089;#1077;#1073;#1103; 
#1087;#1086;#1076;#1088;#1086;#1073;#1085;#1099;#1081; 
  #1088;#1072;#1079;#1073;#1086;#1088; 
#1086;#1087;#1077;#1088;#1072;#1094;#1080;#1081; 
  #1089;#1074;#1103;#1079;#1072;#1085;#1085;#1099;#1093; #1089; 
  #1074;#1099;#1103;#1074;#1083;#1077;#1085;#1080;#1077;#1084; 
  #1080; 
#1087;#1088;#1077;#1076;#1086;#1090;#1074;#1088;#1072;#1097;#1077;#1085;#1080;#1077;#1084;
 
  “#1054;#1090;#1084;#1099;#1074;#1072;#1085;#1080;#1103; 
#1044;#1077;#1085;#1077;#1075;”, 
  /spanspan lang=RU style='font-size:12.0pt;mso-bidi-font-size:
10.0pt;mso-ansi-language:RU'#1075;#1083;#1072;#1074;#1085;#1099;#1084; 
  #1086;#1073;#1088;#1072;#1079;#1086;#1084; #1074; 
#1057;#1090;#1088;#1072;#1085;#1072;#1093; 

Re: Choate Testing His ASAT Again?

2001-07-26 Thread Ken Brown

AARGH! The Colour Out of Space!  Run away!

Jim Windle wrote:

 A Reuters reporter saw a tapered object shaped like a trumpet bell falling 
diagonally through the western sky near West Chester, Pennsylvania, 20 miles from 
Philadelphia at about 6:20.  The object emitted a lustrous rainbow of colors ranging 
from bright yellow on its downward-pointing flared end to light green and finally 
rust-colored red at the upward pointing tapered end.




London C Training - poRusski

2001-07-26 Thread LCT

html

head
meta http-equiv=Content-Type content=text/html; charset=windows-1251
titleRussia/title

/head

body lang=EN-GB link=black vlink=purple style='tab-interval:36.0pt'

div class=Section1 
  table border=0 cellpadding=5 cellspacing=5 width=100%
tr 
  td width=9% height=54 bgcolor=#FF6633font 
face=Arialstrong/strong/font/td
  td width=91% height=54 bgcolor=#3366CCfont face=Arialstrongspan 
lang=RU style='font-size:12.0pt;mso-bidi-font-size:
10.0pt;mso-ansi-language:RU'font face=Courier size=5 color=#FFLondon 
Corporate Training/font/span/strong/font/td
/tr
tr bgcolor=#DFE4DE 
  td colspan=2span lang=RU style='font-size:12.0pt;mso-bidi-font-size:
10.0pt;mso-ansi-language:RU'b#1052;#1099; – 
#1051;#1086;#1085;#1076;#1086;#1085;#1089;#1082;#1072;#1103; 
#1082;#1086;#1084;#1087;#1072;#1085;#1080;#1103; 
#1079;#1072;#1085;#1080;#1084;#1072;#1102;#1097;#1072;#1103;#1089;#1103;span
style=mso-spacerun: yes  /span/b/spanbspan lang=RU style='font-size:12.0pt;
mso-bidi-font-size:9.0pt;mso-ansi-language:RU'#1082;#1086;#1088;#1087;#1086;#1088;#1072;#1090;#1080;#1074;#1085;#1099;#1084;/spanspan
lang=RU style='font-size:12.0pt;mso-bidi-font-size:10.0pt;mso-ansi-language:
RU' #1084;#1077;#1085;#1077;#1076;#1078;#1084;#1077;#1085;#1090; 
#1090;#1088;#1077;#1085;#1080;#1085;#1075;#1086;#1084;, 
#1087;#1088;#1077;#1076;#1083;#1072;#1075;#1072;#1077;#1084; 
#1042;#1072;#1084; #1089;#1074;#1086;#1080; 
#1091;#1089;#1083;#1091;#1075;#1080; 
#1074; #1090;#1072;#1082;#1080;#1093; 
#1089;#1092;#1077;#1088;#1072;#1093; 
#1086;#1073;#1091;#1095;#1077;#1085;#1080;#1103; 
#1082;#1072;#1082;:o:pbr
/o:p/spanspan lang=RU style='font-size:12.0pt;mso-bidi-font-size:
10.0pt;mso-ansi-language:RU'#1060;#1080;#1085;#1072;#1085;#1089;#1086;#1074;#1099;#1081;
 
#1084;#1077;#1085;#1077;#1076;#1078;#1084;#1077;#1085;#1090;, 
#1050;#1072;#1076;#1088;#1086;#1074;#1099;#1081; 
#1084;#1077;#1085;#1077;#1076;#1078;#1084;#1077;#1085;#1090;, 
#1055;#1086;#1076;#1073;#1086;#1088; 
#1087;#1077;#1088;#1089;#1086;#1085;#1072;#1083;#1072;,span
style=mso-spacerun: yes  
/span#1069;#1082;#1086;#1083;#1086;#1075;#1080;#1095;#1077;#1089;#1082;#1080;#1081;
 
#1084;#1077;#1085;#1077;#1076;#1078;#1084;#1077;#1085;#1090;, 
/spanspan
style='font-size:12.0pt;mso-bidi-font-size:10.0pt'HR/spanspan lang=RU
style='font-size:12.0pt;mso-bidi-font-size:10.0pt;mso-ansi-language:RU'- 
#1084;#1077;#1085;#1077;#1076;#1078;#1084;#1077;#1085;#1090;, 
/spanspan
style='font-size:12.0pt;mso-bidi-font-size:10.0pt'PR/spanspan lang=RU
style='font-size:12.0pt;mso-bidi-font-size:10.0pt;mso-ansi-language:RU'- 
#1084;#1077;#1085;#1077;#1076;#1078;#1084;#1077;#1085;#1090;,o:p 
/o:p/spanspan style='font-size:12.0pt;mso-bidi-font-size:10.0pt'IT- 
/spanspan lang=RU style='font-size:12.0pt;mso-bidi-font-size:10.0pt;
mso-ansi-language:RU'#1084;#1077;#1085;#1077;#1076;#1078;#1084;#1077;#1085;#1090;/spanspan
style='font-size:12.0pt;mso-bidi-font-size:10.0pt', E-Commerce #1080; 
#1090;#1076;.o:p/o:p/span 
/b /td
/tr
tr bgcolor=#DFE4DE 
  td colspan=2 height=112 
p align=centerspan lang=RU style='font-size:12.0pt;mso-bidi-font-size:
10.0pt;mso-ansi-language:RU'#1042; #1076;#1072;#1085;#1085;#1099;#1081; 
  #1084;#1086;#1084;#1077;#1085;#1090; #1084;#1099; 
#1079;#1072;#1074;#1077;#1088;#1096;#1072;#1077;#1084; 
  #1087;#1086;#1076;#1075;#1086;#1090;#1086;#1074;#1082;#1091; 
  
#1050;#1086;#1085;#1092;#1077;#1088;#1077;#1085;#1094;#1080;#1080;:o:pbr
  /o:pfont color=#FF“#1057;#1090;#1086;#1087;! 
#1054;#1090;#1084;#1099;#1074;#1072;#1085;#1080;#1102; 
  #1044;#1077;#1085;#1077;#1075;”/font/spanfont 
color=#FFspan style='font-size:12.0pt;
mso-bidi-font-size:10.0pt'o:p/o:p/span/fontspan style='font-size:12.0pt;
mso-bidi-font-size:10.0pt'o:pbr
  /o:p/spanspan lang=RU style='font-size:12.0pt;mso-bidi-font-size:
10.0pt;mso-ansi-language:RU'#1055;#1088;#1086;#1075;#1088;#1072;#1084;#1084;#1072;
 
  #1073;#1091;#1076;#1077;#1090; 
#1074;#1082;#1083;#1102;#1095;#1072;#1090;#1100; 
  #1074; #1089;#1077;#1073;#1103; 
#1087;#1086;#1076;#1088;#1086;#1073;#1085;#1099;#1081; 
  #1088;#1072;#1079;#1073;#1086;#1088; 
#1086;#1087;#1077;#1088;#1072;#1094;#1080;#1081; 
  #1089;#1074;#1103;#1079;#1072;#1085;#1085;#1099;#1093; #1089; 
  #1074;#1099;#1103;#1074;#1083;#1077;#1085;#1080;#1077;#1084; 
  #1080; 
#1087;#1088;#1077;#1076;#1086;#1090;#1074;#1088;#1072;#1097;#1077;#1085;#1080;#1077;#1084;
 
  “#1054;#1090;#1084;#1099;#1074;#1072;#1085;#1080;#1103; 
#1044;#1077;#1085;#1077;#1075;”, 
  /spanspan lang=RU style='font-size:12.0pt;mso-bidi-font-size:
10.0pt;mso-ansi-language:RU'#1075;#1083;#1072;#1074;#1085;#1099;#1084; 
  #1086;#1073;#1088;#1072;#1079;#1086;#1084; #1074; 
#1057;#1090;#1088;#1072;#1085;#1072;#1093; 

Re: Choate Prime Physics

2001-07-26 Thread Riad S. Wahby

Jim Choate [EMAIL PROTECTED] wrote:
 That current re-emits photons that retain both frequency and temporal/time
 related coherence (see Maxwell's Equations for more detail). However, the
 total number of photons MUST be reduced from the incident beam. This also
 means the incident photons can not be the same as the emitted photons.
 
 The photons (as opposed to 'a photon') lose energy.

That still means your original post was wrong.

Jim Choate [EMAIL PROTECTED] wrote:
 The optics used for focusing are NOT mirrors, they are (hopefully)
 transparent at the frequency under use. A mirror on the other hand is
 required to be OPAQUE with respect to transmission, we want full, 100%,
 reflectivity. That means that every photon that hits that mirror
 interacts, loses some energy, and gets re-emitted.

See?  Every photon that hits the mirror, etc.  You were under the
impression that each photon lost energy.

You were wrong.  It's not hard to admit it.  C'mon.  If you don't want
to type it, you can just cut and paste the following into a message:

---Begin cut area---

I, James Choate, was wrong.  My statements concerning the interactions
of photons with mirrors showed a clear misunderstanding of the
underlying physics.

---End cut area---

--
Riad Wahby
[EMAIL PROTECTED]
MIT VI-2/A 2002

5105




Are the digits of Pi random? A Berkley lab researcher may hold the key

2001-07-26 Thread Jim Choate

http://www.sciencedaily.com/releases/2001/07/010725081838.htm

James Choate
Product Certification - Operating Systems
Staff Engineer
512-436-1062
[EMAIL PROTECTED]




Re: Open 802.11b wireless access points and remailers

2001-07-26 Thread Ian Goldberg

In article 3B5E66E7.19729.1368F157@localhost,
Roy M. Silvernail [EMAIL PROTECTED] wrote:
With an adapter, I can run a 802.11 
card from the CF socket, I think.  (drivers might be tricky)

You don't need an adapter:

http://www.symbol.com/products/wireless/la4137.html

It's an 802.11 card in a Compact Flash socket.

   - Ian




Re: Choate Testing His ASAT Again?

2001-07-26 Thread Eugene Leitl

On Wed, 25 Jul 2001, Ken Brown wrote:

 AARGH! The Colour Out of Space!  Run away!

Naw, only a High Triffid Alert.

-- Eugen* Leitl a href=http://www.lrz.de/~ui22204/;leitl/a
__
ICBMTO  : N48 10'07'' E011 33'53'' http://www.lrz.de/~ui22204
57F9CFD3: ED90 0433 EB74 E4A9 537F CFF5 86E7 629B 57F9 CFD3




SirCam

2001-07-26 Thread Jon Beets



I got my first SirCam hit today.. 
WOoohooo

Jon BeetsPacer 
Communications


RE: Attention to detail lacking

2001-07-26 Thread Tim May

At 10:29 AM -0400 7/25/01, Phillip H. Zakas wrote:
Tim May Wrote:

  I think Choate is much like this tech of mine: lacking a solid
  grounding and overly reliant on his own private notions of what
  mass and energy and group velocity and so on are. All the best
  cranks view the world this way.

maybe Choate is the long lost son of oedipa maas.

What a w.a.s.t.e.

--Tim May


-- 
Timothy C. May [EMAIL PROTECTED]Corralitos, California
Political: Co-founder Cypherpunks/crypto anarchy/Cyphernomicon
Technical: physics/soft errors/Smalltalk/Squeak/agents/games/Go
Personal: b.1951/UCSB/Intel '74-'86/retired/investor/motorcycles/guns




Re: CDR: Re: Air Force Turns 747 Into Holster for Giant Laser (washing tonpost.com)

2001-07-26 Thread Jim Choate


Tomorrow's Soldier
David Alexander
ISBN 0-380-79502-7
Chpt. 8 War Beyond Tomorrow

On Wed, 25 Jul 2001, Trei, Peter wrote:

 It may not be that easy. My understanding (based on various TV programs
 broadcast back in the early 90's) is that there is a program called 'NEST',
 which stands for something like Nuclear Emergency (mumble) Team,
 tasked with dealing with this type of problem.
 
 One protection hinted is that strategically chosen points of transit
 (bridges, 
 ports, tunnels, major highways, mail, baggage and freight facilities, etc)
 have
 detectors for nuclear materials. 
 
 The thing is, while you can sheild a source to the point where it is not
 a hazard, sheilding it to the point of *undetectability* is far harder task.
 
 If you detect even a single gamma ray of a certain frequency, or 
 betas or even alphas of certain energies, you *know* that a certain
 isotope produced them. If the detectors note the presence of a 
 certain isotopes, they generate the appropriate alarms.
 
 There are also other detection systems - I've seen X-rays of entire
 container trucks which were passing through the Chunnel - illegal 
 immigrants were quite visible inside the container. 
 
 An attacker's best chance would be to place his weapon in a
 container, heavily sheilded, and then to bury that in the middle of
 a stack of other containers of heavy shielding in the hold of a
 container ship, and plan to detonate it while still on board in a
 target harbor.
 
 UPS probably would not work (besides, I think they have a 
 limit of around 90 lbs). 


 --


Nature and Nature's laws lay hid in night:
God said, Let Tesla be, and all was light.

  B.A. Behrend

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   -~~mm-'`-```-mm --'-





Re: Choate Prime Physics

2001-07-26 Thread Declan McCullagh

On Wed, Jul 25, 2001 at 09:10:00AM -0400, Riad S. Wahby wrote:
 ---Begin cut area---
 
 I, James Choate, was wrong.  My statements concerning the interactions
 of photons with mirrors showed a clear misunderstanding of the
 underlying physics.
 
 ---End cut area---

My working theory is that Choate is using the assembled, um, wisdom of 
the cypherpunks as an alternative to classical forms of education (note
I'm not saying he's actually learning anything).

Or, alternatively, Choate is simply a Markov chain that uses the
cypherpunks archives, the U.S. Constitution, and a high school physics
book as its base text.

Perhaps eventually the Book of Choate will become as well known as the 
Book of Beak:
http://www.talltree.net/~aad/beak.html

-Declan




Antigen found W32/Sircam-A (Sophos) virus

2001-07-26 Thread ANTIGEN_BAMBI

Antigen for Exchange found Fax Cover Sheet.doc.bat infected with
W32/Sircam-A (Sophos) virus.
The file is currently Removed.  The message, CDR: Fax Cover Sheet, was
sent from joe lynch and was discovered in IMC Queues\Inbound
located at Cognex/Natick/BAMBI.




where's dildo? if he's not white, at Texas Southern University

2001-07-26 Thread Subcommander Bob

Report: TSU Law School Admissions Too Easy

The American Bar Association is asking Texas Southern
University's law school to raise admission
standards, effectively shutting the door to many black
and Hispanic students that would likely not have
been accepted at other state law schools.

 The request comes as part of a
seven-year accreditation review of the
 Thurgood Marshall School of Law by
the ABA.

 The law school, created in 1946 to
allow blacks to attend a publicly
 funded law school, trains a
majority of the state's black and Hispanic law
 students.

 Experts said that many TSU law
students and graduates would likely not
 have been accepted at other state
law schools because their college grade
 point averages and entrance exam
scores were too low.

The attrition rate is unconscionably high, and the bar
passage rate remains the lowest among all law
schools in the state of Texas, the Chicago-based ABA
said in a report obtained by the Houston
Chronicle.

The report, citing statistics from the July 2000 Texas
bar exam, said that 52 percent of TSU law school
graduates passed the test on their first attempt, and 33
percent passed on subsequent attempts. The
state-passing rate for those taking the exam for the
first time on the same date was 82 percent, and 42
percent on second attempts.

Of the 331 students who entered the TSU law school in
the fall of 1999, only 201 maintained the
required 2.0 grade point average needed to stay at the
school by the end of the 2000 academic year,
the report said. That gave the school a first-year
attrition rate of 40 percent, more than four times the
national average of 8.9 percent.

Admissions standards have already been raised slightly
to meet ABA concerns, said John Brittain,
dean of the law school. He expects the school to retain
its ABA accreditation, which is required by the
state. The school must submit a plan to the ABA by
November.

Brittain said that he believes it is possible to raise
admission standards to weed out many students who
would not graduate or pass, but still provide an
opportunity to attend law school to minorities who
otherwise might not qualify.

Raising admission standards presents a dilemma for the
state of Texas because it has abolished
affirmative action in higher education, Brittain said.
The Thurgood Marshall School of Law is
performing a special mission for the state by allowing
many students to attend law school who would
not have gained admission to other law schools.

We want to continue fulfilling this historical mission
of serving minorities. We have to do a little bit of
both, raise admission standards and take educational
risks.

In the 1999-2000 academic year, TSU officials said that
the school enrolled 92 percent of all black
first-year law students attending the state's four
public law schools and 52 percent of the first-year
Hispanic students.

In recent years, the average Law School Admissions Test
score for students admitted to TSU has
been 142, significantly below the national average of
150, the ABA said. The median grade point
average for students admitted to TSU's law school has
ranged from 2.67 to 2.76, compared with the
national average of 3.06 to 3.10.

The ABA report also said that TSU's law school does not
have adequate resources to educate the
large classes of approximately 300 students it has
admitted in recent years.

The ABA report said that the law building is too small,
classes are crowded and that there is not
enough space for clinical programs or student
organizations.

Brittain said that the university has pledged to spend
$5 million to renovate the law school building and
is considering spending another $5 million to build a
new wing. He also said that the school will provide
more training for the bar exam, strengthen its research
and writing programs, and increase library
funding.

For more information, log onto the Thurgood Marshall
School of Law Web site at www.tsulaw.edu.





Re: So, what do the Russians think?

2001-07-26 Thread Ray Dillinger

Good point. 

A Russian cryptographer was grabbed, unable to talk to his consulate 
for at least three days, and the Russians don't say anything?

I smell a rat.  Perhaps Dmitry was sold down the river.

(Note for non-USA readers: sold down the river is an americanism 
for betrayal.  It dates from the days of slavery, where the conditions 
for slaves were worse the further down the (Mississippi) river they 
were.  It was common for slaveowners to promise to sell their slaves 
upriver to gain their goodwill, and then sell them downriver for more 
money than they could get upriver.  Since slaves' communication was 
tightly controlled, lying to the ones left about where their buds had 
gone was also common, and usually undetected.  Parallels to the current 
situation are left as an exercise for the reader.)

Bear




Re: Air Force Turns 747 Into Holster for Giant Laser (washing tonpost.com)

2001-07-26 Thread Steve Schear

At 11:05 AM 7/25/2001 -0400, Trei, Peter wrote:
 Bill Stewart writes:

  Meanwhile of course, any foreign terrorist that wants to nuke the US
  with a physically small weapon only needs to pack it in cocaine
  and bring it in with the regular shipments,
  while Rogue Nations that can only make large Fat Boy style weapons
  need cruder methods, like bribing a crane operator to load the wrong
  container on a ship bound for New York or Los Angelese harbor.
 
 
It may not be that easy. My understanding (based on various TV programs
broadcast back in the early 90's) is that there is a program called 'NEST',
which stands for something like Nuclear Emergency (mumble) Team,
tasked with dealing with this type of problem.

One protection hinted is that strategically chosen points of transit
(bridges,
ports, tunnels, major highways, mail, baggage and freight facilities, etc)
have
detectors for nuclear materials.

The thing is, while you can sheild a source to the point where it is not
a hazard, sheilding it to the point of *undetectability* is far harder task.

If you detect even a single gamma ray of a certain frequency, or
betas or even alphas of certain energies, you *know* that a certain
isotope produced them. If the detectors note the presence of a
certain isotopes, they generate the appropriate alarms.

There are also other detection systems - I've seen X-rays of entire
container trucks which were passing through the Chunnel - illegal
immigrants were quite visible inside the container.

An attacker's best chance would be to place his weapon in a
container, heavily sheilded, and then to bury that in the middle of
a stack of other containers of heavy shielding in the hold of a
container ship, and plan to detonate it while still on board in a
target harbor.

Or reduce the effectiveness of the detection system by clandestinely 
salting vessels entering our ports with radio active dust with the same 
energy signatures.  Sort of a radio active chaff.

steve




Fox Rabbits, or Fox Hounds (re: Fox's Ape Letter)

2001-07-26 Thread David Honig


Fox  Rabbits implies an arms race.  Fox  Hounds implies dead Fox.

Here's a way to tickle the Fox.  With a taser^H^H^H^HLinux.  Copied from
another list.


On Tue, Jul 24, 2001 at 05:12:53PM -0700, David Honig wrote:
 It would be amusing to create very large files named Planet_of_the_Apes
 hosted on very slow servers servers slow enough to discourage actual
 downloaders, but existent enough to annoy Fox.  'Servers' includes
 numerous P2P tools, so you can do this at home.
 
 Extra credit if the very large files are uniformly distributed noise.
 
 Extra credit if the noise has the appropriate headers so it looks like
 a Divx or whatever is a plausible format.

trivial to accomplish, too.

attached to this mail is an empty mpeg file (zipped). you can inflate it to 
any size you desire by doing (on Linux):

unzip empty.zip
dd if=/dev/urandom bs=1024 count=xxx empty.mpg

where xxx is the number of KB you want to add. use 681574400 for 650 MB
which is the size of a CD and would look very promising for a pirated
movie.


 






  







RE: FINALLY!!! A REAL BUSINESS OPPORTUNITY!!!

2001-07-26 Thread James K

For a limited time, we are offering a FREE WEBSITE that will promote your service or 
product.  This website will be custom designed for you and your needs.  Our staff of 
graphic designers, web designers and our marketing team will work with you to design a 
site that will grab attention and get your product or service sold!!!

If your FREE WEBSITE does not appear within the first 20 listings on the major search 
engines, you are not able to easily gain new clients for your business - because they 
can't find you!!!  

Our staff will get your FREE WEBSITE ranked in the top of the search engines so that 
when the estimated one million internet users today go shopping for what you sell, 
they will see your new website.  They will buy from someone, shouldn't it be you?

Millions of dollars are being spent on the Internet every day, 
What percentage of that do you want to receive???

Click on the link below to find out how to obtain your FREE WEBSITE!!!
www.whereismysiteranked.com/freewebsite.htm 
 
Thank you again,

James Kennsley III 
WhereIsMySiteRanked.com









*
We apologize if you received this advertisement by mistake.  We make every effort to 
insure that the recipients of our direct marketing are those individuals who have 
asked to receive additional information on promotional offers from companies with whom 
we trade mailing list.  If you would like to be removed from our mailing list please 
email us at [EMAIL PROTECTED]  You may also send us a remove 
request via snail mail at RemoveMyName 3747 Beltline Rd. # 225  Addison, TX  75001, or 
you may phone us at 972-614-1140.
Again we apologize if this message has reached you in error.
*




Re: Attention to detail lacking

2001-07-26 Thread mmotyka

Tim,

I think the reflected beam has the same wavelength as the incident beam.

Photons hitting a surface most definitely do not lose some energy 
and get re-emitted. There are some very particular configurations 
that can act as wavelength doublers, but this is a particular, and 
hard to set up, configuration.

Photons hitting a mirror either are re-emitted with the same energy 
as before or interact via the photoelectric effect and are 
thermalized (converted to phonons).

That colors are preserved in mirrors, absent tints (special 
absorbers), is a Physics 1 clue that mirrors do not downshift photon 
energies!.

The reason for the weak statement I think is that I imagine you might
make an argument that the momentum transfer from the photon to the
mirror results in a very small doppler shift...I'm just not positive
about it at the smallest level of interaction. 

I think Choate is much like this tech of mine: lacking a solid 
grounding and overly reliant on his own private notions of what 
mass and energy and group velocity and so on are. All the best 
cranks view the world this way.

I don't know Choate's educational background, but I would not be at 
all surprised if he is self-taught and moved into computers out of 
some technician training school.

I've reached the same conclusion. I've known some very bright people who
lacked access to a formal education. The results were some startling
levels of understanding mixed right in with some mind blowing
misconceptions and some outright gaps.

Mike




Re: FBI: Keystone Gmen

2001-07-26 Thread Declan McCullagh

Answer: Too many!

Moral: Don't post to cypherpunks with a screwy mail {delivery,transport}
agent.

-Declan


On Wed, Jul 25, 2001 at 06:55:01AM -0400, [EMAIL PROTECTED] wrote:
 [ my email is really fucked right now,
   gawd only knows how many copies this
   single transmission will result in.
   apologies in advance.
 ]
 
 http://interactive.wsj.com/articles/SB9960160921000.htm
 #
 #July 25, 2001 
 #
 #FBI Cyber Researcher Unleashes Virus
 #That E-Mails Private Agency Documents
 #
 #By TED BRIDIS
 #Staff Reporter of THE WALL STREET JOURNAL
 #
 #WASHINGTON -- A researcher in the Federal Bureau of Investiga
 #tion's cyber-protection unit unleashed a fast-spreading Internet 
 #virus that e-mailed private FBI documents to outsiders -- all 
 #on the eve of a Senate hearing into troubles at the unit.
 #
 #Although the Sircam virus didn't spread to other computers at 
 #the FBI's National Infrastructure Protection Center, it did send 
 #at least eight documents to a number of outsiders. One, about 
 #the investigation into an unrelated virus, was marked official 
 #use only. The Sircam virus has infected thousands of computers 
 #since its discovery last week.
 #
 #FBI spokeswoman Deb Weierman said that no sensitive or classified 
 #information about continuing investigations was disclosed Tuesday. 
 #The official use designation protects documents from disclosure 
 #under the U.S. Freedom of Information Act.
 #
 #It isn't uncommon for virus researchers to accidentally infect 
 #their own computers, but the mistake was particularly embarrassing 
 #because it occurred ahead of a Senate Judiciary panel's oversight 
 #hearing about the FBI cyber unit's effectiveness. Lawmakers were 
 #expected to focus on other agencies' failure to cooperate fully 
 #with the FBI center, and on a perceived lack of trust between 
 #the FBI and private-sector groups.
 #
 #The unit generally gets high remarks for its criminal 
 #investigations, and even critics say the unit is more effective 
 #than it was a year ago. The effort here is not to embarrass 
 #anybody but to stress that a lot of work has to be done, said 
 #Republican Sen. Jon Kyl of Arizona.
 #
 #Meanwhile, the White House has begun organizing a new 
 #early-warning network for Internet threats. But unlike the current 
 #system, it will be coordinated by the Pentagon, not the FBI. 
 #The mechanism for warning all U.S. military and civilian agencies 
 #-- and ultimately corporations -- will be dubbed the Cyber-Warning 
 #and Information Network, or c-win. Organizers envision dozens 
 #of computer centers that could sound an alert when a threat is 
 #identified.
 #
 #The network is expected to begin operating in October. The FBI 
 #unit, which currently relays these warnings, came under sharp 
 #criticism from congressional auditors for issuing tardy alerts. 
 #Ms. Weierman, the FBI spokeswoman, called the new network a 
 #useful mechanism to offer the government a technical capability 
 #that doesn't currently exist. The FBI, she said, wasn't concerned 
 #it would lose its warning responsibilities.
 #
 #Tuesday, at least three people said they received some of the 
 #FBI documents, including a 23-year-old Internet-security expert 
 #in Belgium, Niels Heinen. He operates a Web site that reports 
 #on Internet break-ins and speculated that the analyst, Vince 
 #Rowe, visited the site on the infected computer. Mr. Rowe didn't 
 #respond to a request for comment.




Re: Salon: The real enemies of the poor

2001-07-26 Thread Jim Choate


On Wed, 25 Jul 2001, Faustine wrote:

 Jim wrote:
 
 What I found amusing is that you read the Salon article (probably w/o
^^^
 great enthusiasm considering it is Salon after all) and you had another
 text of articles you hadn't read but had already decided it was a worthy
 read and that you'd get something out of it. Especially since it was such 
 'weighty' material in two different contexts.
 
 Hey now, I only got the hard copy last week...you can read a lot without 
 having been through all 1124 pages!!

I agree, I did say 'amusing'...

 What about the idea of reputation capital you people are always going on 
 about, my prior knowledge of a  couple of the authors makes me certain they 
 wouldn't dream of putting their  name on sloppy work... 

I'm not one of those 'you people'. Arguments from authority are of no
worth. Past performance is not a reliable metric for future performance.
The ends never justify the means, each step must self-justify.

 I strongly want global trade and cultural exchange. I do not want global
 government or corporate enterprise. 
 
 You mean global corporate enterprise, or corporate enterprise at all?

Actually both. The 1870 law which created the modern monster of a
'corporation' should be thrown out. Corporations, and other business
organizations, should be able to sell to their like type across the
relevant 'big pond'. A corporation should not be able to exist in two
different countries as a single organization.

 I want direct interaction of business in government to be prohibited.
 
 How? Any solution I can think of has the potential to be more problematic 
 than the problem itself. 

So what solution(s) have you thought of? Quid pro Quo...

Business is an expression of individual rights. Business should not be
able to contribute in any way to the democratic process (there is a reason
that business/commerce is mentioned the way it is in the Constitution...

An observation that is sure to piss some C-A-C-L's off, but the reality is
that in 'free market' economics ala Hayek or Von Mises the potential for
'Bill Gates' wealth is nil. A 'free market' system isn't about getting
filthy rich. It's about participating in a 'community'.

Bottom line, the world is the way it is because people make it that way.
It is not an inviolate law of nature (or if you accept that then some
other precepts become questionable; free will, rational, responsible,
pre-meditation, etc. ).


 --


Nature and Nature's laws lay hid in night:
God said, Let Tesla be, and all was light.

  B.A. Behrend

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   -~~mm-'`-```-mm --'-






No Subject

2001-07-26 Thread owner-cypherpunks




No Subject

2001-07-26 Thread owner-cypherpunks




No Subject

2001-07-26 Thread owner-cypherpunks




No Subject

2001-07-26 Thread owner-cypherpunks




No Subject

2001-07-26 Thread owner-cypherpunks




No Subject

2001-07-26 Thread owner-cypherpunks




CNN Programs - Presents - The hunt for Eric Rudolph

2001-07-26 Thread Jim Choate

http://www.cnn.com/CNN/Programs/presents/
-- 

 --


Nature and Nature's laws lay hid in night:
God said, Let Tesla be, and all was light.

  B.A. Behrend

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   -~~mm-'`-```-mm --'-





No Subject

2001-07-26 Thread owner-cypherpunks




Get Out of Debt Fast 24071

2001-07-26 Thread brinks


More Than $2500 in DEBT?

We Can Help You PAY-OFF Your BILLS!!
Click here for your FREE Consultation!!
http://mysprintfast.com/web/debtfreedom/index1.html

~Cut your monthly payments by 50% or even more...
~Stop paying Creditors high interest rates?
~Better Manage your Financial Situation...Keep More Cash every Month!
~We can Help STOP any Creditor Harassment!
~Consolidate Regardless of past Credit History!

Quick - Confidential - No Obligations -
Click on the link below to get started!!
http://mysprintfast.com/web/debtfreedom/index1.html

~~~

To be removed from all further mailings, 
please send a message to: 653 [EMAIL PROTECTED] 
We honor all remove requests.









No Subject

2001-07-26 Thread owner-cypherpunks




Antigen found W32/Sircam-A (Sophos) virus

2001-07-26 Thread ANTIGEN_BAMBI

Antigen for Exchange found july-2000-checks.xls.com infected with
W32/Sircam-A (Sophos) virus.
The file is currently Removed.  The message, CDR: july-2000-checks, was
sent from David Hosmer and was discovered in IMC Queues\Inbound
located at Cognex/Natick/BAMBI.




Re: Weird message from someone named NIPC

2001-07-26 Thread Language is a virus and the U.S. government is arresting those responsible

Jim Choate, Tivoli Engineer of Quality Assurance wrote:
#
#4. It's another one of those 'hahaha' virus trolls
#   that has been going on for a while now.
#
#And you guys are the 'techno-elite' 

It's official: you're dumber than a rock.




CHECK THIS OUT! 21907

2001-07-26 Thread riujwe4293

I'm sorry, but you will be glad you did!
 
Order real prescription medications today!!
 
GO TOhttp://www.speedyviagra.com/ 
 
http://www.speedyviagra.com/ can overnight right to your door, many prescription 
medications.  
 
http://www.speedyviagra.com/ has VIAGRA for erectile dysfunction, PROPECIA for hair 
loss, XENICAL for weight loss, and much, much, more!!!
 
No more visits to the doc!
 
Just visit  http://www.speedyviagra.com/ 
 
Don't wait... place your order today!!!



remove [EMAIL PROTECTED]




Re: Assasination Politics in the Middle East

2001-07-26 Thread Bill Stewart

At 05:11 PM 07/23/2001 -0700, Mr. Falun Gong wrote:

Ok, the Subject line is a bit of a stretch, as there's no anon payment,
but it is interesting nonetheless.

  Israel to look into Arafat murder ad
  By SAUD ABU RAMADAN

   GAZA, July 23 (UPI) -- Israel's attorney general on Monday said he
would consider opening a criminal investigation into an advertisement that
urged anyone who had the opportunity to murder Palestinian leader Yasser
Arafat, the Haaretz newspaper reported.

I saw a wire-service article the other day that said that
Ariel Sharon's government had put out or endorsed a list of
radical fanatic extremist Palestinian group leaders who were targets for
assassination in revenge for the recent bombings in Israel.
Perhaps the article got mangled in translation or
I misread it because the train was noisy,
but it sure looked that way.  It didn't mention Arafat





Turn $25 into unlimited CASH income. Easy Legal

2001-07-26 Thread Laura Alves

(This is a ONE TIME EMAIL, please click delete and accept my apologies if 
you are not interested in making a legal CASH income by investing a small 
amount of time and money) 

Dear Entrepreneur: 

If you've read this far, chances are you're currently working in a home 
business, or have in the past. Unfortunately, there's also a 90% or better 
chance that you aren't seeing the kind of income you had hoped for either. 


If you're honest with yourself, you know exactly what I'm saying. You did 
everything you were told to do, but it just hasn't happened for you, time 
and time again. Sound familiar? 

Spend a fraction of the time you would at most day jobs or home businesses 
and make some cold, hard, CASH I send out these emails, as many as I 
can, and people send me cash in the mail for information that I just email 
back to them. It is all completely legal, and I get to make that walk to 
the mailbox every day knowing that it is full of $5 bills for me!! 

What you are about to read is very exciting. Prepare to be amazed. It will 
explain how almost anyone can legally make a lot of money, in CASH!!! 

You don't need to have a lot of experience, time, or money to do this, but 
if you do - all the better! The most important thing you need is the 
desire to get ahead, a bit of spare time, and an entrepreneurial spirit. 

Have you been disappointed with a lot of so-called opportunities or all 
the hassles associated with selling on online auctions? This is different! 
I'm sure you've heard that before, but please take a few minutes to go 
through the plan, and make sure you read all of the information. 

Make this the one you act on! 

== 
DEAR FRIENDS AND FUTURE MILLIONAIRES: 

AS SEEN ON NATIONAL TV: 

Making over half a million dollars every 4 to 5 months from your home for 
an investment of only $25 U.S. Dollars expense one time 

THANKS TO THE COMPUTER AGE AND THE INTERNET! 
== 

BE A MILLIONAIRE LIKE OTHERS WITHIN A YEAR!!! 

Before you say Bull, please read the following. This is the letter you 
have been hearing about on the news lately. Due to the popularity of this 
letter on the Internet, a national weekly news program recently devoted an 
entire show to the investigation of this program described below, to see 
if it really can make people money. The show also investigated whether or 
not the program was legal. 

Their findings proved once and for all that there are absolutely NO Laws 
prohibiting the participation in the program and if people can follow the 
simple instructions, they are bound to make some mega bucks with only $25 
out of pocket cost. 

DUE TO THE RECENT INCREASE OF POPULARITY  RESPECT THIS PROGRAM HAS 
ATTAINED, IT IS CURRENTLY WORKING BETTER THAN EVER. 

This is what one had to say: Thanks to this profitable opportunity. I was 
approached many times before but each time I passed on it. I am so glad I 
finally joined just to see what one could expect in return for the minimal 
effort and money required. To my astonishment, I received total $610,
470.00 in 21 weeks, with money still coming in. 

Pam Hedland, Fort Lee, New Jersey. 

 

Here is another testimonial: This program has been around for a long time 
but I never believed in it. But one day when I received this again in the 
mail I decided to gamble my $25 on it. I followed the simple instructions 
and voila ... 3 weeks later the money started to come in! First month I 
only made $240.00 but the next 2 months after that I made a total of $290,
000.00. So far, in the past 8 months by re-entering the program, I have 
made over $710,000.00 and I am playing it again. The key to success in 
this program is to follow the simple steps and NOT change anything. 

More testimonials later but first, 

 PRINT THIS NOW FOR YOUR FUTURE REFERENCE == 

$ 

If you would like to make at least $500,000 every 4 to 5 months easily and 
comfortably, please read the following. 
THEN READ IT AGAIN and AGAIN!!! 

$ 

FOLLOW THE SIMPLE INSTRUCTIONS BELOW AND YOUR FINANCIAL DREAMS WILL COME 
TRUE, GUARANTEED! 
INSTRUCTIONS: 

 Order all 5 reports shown on the list below. === 

For each report, send $5 CASH (US CURRENCY), THE NAME  NUMBER OF THE 
REPORT YOU ARE ORDERING and YOUR E-MAIL ADDRESS (plus an alternate email 
address, at a different domain name if possible, if you have one, in case 
of unforeseen problems) to the person whose name appears ON THAT LIST next 
to the report. 

MAKE SURE YOUR RETURN ADDRESS IS ON YOUR ENVELOPE TOP LEFT CORNER in case 
of any mail problems. 

=== When you place your order, make sure you order each of the 5 reports. 
You will need all 5 reports so that you can save them on your computer 

RE: FINALLY!!! A REAL BUSINESS OPPORTUNITY!!!

2001-07-26 Thread James K

For a limited time, we are offering a FREE WEBSITE that will promote your service or 
product.  This website will be custom designed for you and your needs.  Our staff of 
graphic designers, web designers and our marketing team will work with you to design a 
site that will grab attention and get your product or service sold!!!

If your FREE WEBSITE does not appear within the first 20 listings on the major search 
engines, you are not able to easily gain new clients for your business - because they 
can't find you!!!  

Our staff will get your FREE WEBSITE ranked in the top of the search engines so that 
when the estimated one million internet users today go shopping for what you sell, 
they will see your new website.  They will buy from someone, shouldn't it be you?

Millions of dollars are being spent on the Internet every day, 
What percentage of that do you want to receive???

Click on the link below to find out how to obtain your FREE WEBSITE!!!
www.whereismysiteranked.com/freewebsite.htm 
 
Thank you again,

James Kennsley III 
WhereIsMySiteRanked.com









*
We apologize if you received this advertisement by mistake.  We make every effort to 
insure that the recipients of our direct marketing are those individuals who have 
asked to receive additional information on promotional offers from companies with whom 
we trade mailing list.  If you would like to be removed from our mailing list please 
email us at [EMAIL PROTECTED]  You may also send us a remove 
request via snail mail at RemoveMyName 3747 Beltline Rd. # 225  Addison, TX  75001, or 
you may phone us at 972-614-1140.
Again we apologize if this message has reached you in error.
*




No Subject

2001-07-26 Thread owner-cypherpunks




RE: FINALLY!!! A REAL BUSINESS OPPORTUNITY!!!

2001-07-26 Thread James K

For a limited time, we are offering a FREE WEBSITE that will promote your service or 
product.  This website will be custom designed for you and your needs.  Our staff of 
graphic designers, web designers and our marketing team will work with you to design a 
site that will grab attention and get your product or service sold!!!

If your FREE WEBSITE does not appear within the first 20 listings on the major search 
engines, you are not able to easily gain new clients for your business - because they 
can't find you!!!  

Our staff will get your FREE WEBSITE ranked in the top of the search engines so that 
when the estimated one million internet users today go shopping for what you sell, 
they will see your new website.  They will buy from someone, shouldn't it be you?

Millions of dollars are being spent on the Internet every day, 
What percentage of that do you want to receive???

Click on the link below to find out how to obtain your FREE WEBSITE!!!
www.whereismysiteranked.com/freewebsite.htm 
 
Thank you again,

James Kennsley III 
WhereIsMySiteRanked.com









*
We apologize if you received this advertisement by mistake.  We make every effort to 
insure that the recipients of our direct marketing are those individuals who have 
asked to receive additional information on promotional offers from companies with whom 
we trade mailing list.  If you would like to be removed from our mailing list please 
email us at [EMAIL PROTECTED]  You may also send us a remove 
request via snail mail at RemoveMyName 3747 Beltline Rd. # 225  Addison, TX  75001, or 
you may phone us at 972-614-1140.
Again we apologize if this message has reached you in error.
*




No Subject

2001-07-26 Thread owner-cypherpunks




Rep. Boucher says he wants to Free Dmitry and amend DMCA

2001-07-26 Thread Declan McCullagh


   

http://www.wired.com/news/politics/0,1283,45548,00.html

   Rep: Give Fair Use a Fair Shake
   By Declan McCullagh ([EMAIL PROTECTED])
   
   12:55 p.m. July 25, 2001 PDT
   
   WASHINGTON -- Rep. Rick Boucher wants to spring a Russian programmer
   from jail.
   
   Boucher, a maverick Virginia Democrat, is hoping to rewrite a federal
   law that led FBI agents to arrest Dmitry Sklyarov in Las Vegas,
   Nevada, last week on copyright felony charges.
   
   It's a broad overreach to have a person arrested under the federal
   criminal laws simply because they made software that circumvents a
   technological measure, Boucher said. Boucher said his office will
   draft a bill to be introduced later this year.
   
   The criminal law in question is the Digital Millennium Copyright Act,
   which was obscure enough when Congress enacted it in 1998, but has
   emerged as the one of the most important and far-reaching technology
   regulations. Sklyarov is charged with trafficking in a program to
   bypass Adobe's copy protection for e-books, a federal felony under the
   DMCA.
   
   I think the current case adds impetus to the growing effort to
   fashion an amendment to the DMCA that would restore the classic
   balance (of fair use rights), Boucher said.
   
   That promises to be anything but a trivial task. Leaders of the House
   and Senate subcommittees that oversee copyright law said Tuesday that
   they would not consider any changes to the DMCA.

   [...]




No Subject

2001-07-26 Thread owner-cypherpunks




Re: Re: Ashcroft Targets U.S. Cybercrime

2001-07-26 Thread Petro

At 7:39 AM -0500 7/24/01, [EMAIL PROTECTED] wrote:
  At the risk of going Choatien and stepping far beyond any
 degrees I may have, the position that each and every LEO in this
 country *should* (as opposed to does) decide for himself whether a law
 fits his understanding of the constitution before enforcing it is not
 only unworkable, but--if the LEO truly believes in the concepts of
 Rule of Law, wrong headed.

Wrong headed or not, LEOs are manufactured out of human beings, and
because of this, the spend a considerable amount of time in the Maggot
Academy (tm) being taught the fine points of this very issue.  In fact,

No, they don't. Spoke with an officer this evening about it. 

The cover (at least the academy he went to here in SillyCon valley) 4 
amendment issues, and only from the practical standpoint, not the philosphical 
standpoint, and mostly was scenario based. 

a great majority of an LEO's education time is spent instructing them on
how to determine [decide] what is and is not constitutionally protected
{speech, action}.  If they did not use this ability, they would have to
arrest *everyone*, and let the courts sort out the mess.

No, they would have to arrest everyone they witnessed (or knew) committed an 
act that violated the law. 

Other than said 4th amendment issues, street cops *rarely* get involved in 
constitutional issues. 

  As a further disclaimer, let me say that I don't think The
 Legal Community agrees with me. They're agreement or not isn't a
 factor in my thinking. I already know (as Declan points out) that Reno
 doesn't agree with me, but from her actions it's quite clear she
 doesn't believe in the Rule Of Law--at least not in the sense I've
 been using it.

Actually, she is the perfect example: she interpreted the constitution her
way.  The Rule of Law has to be implemented at the individual [enforcer]
level: therefore, each enforcer is putin the position of having to make
and act on their [constitutional] opinions on a moment to moment basis.

Uh. No. 

From her *ACTIONS* she did not believe in the Rule Of Law, but believed 
strongly in the long arm and mailed fist of the law. 

Witness her actions, and the actions of departments under her. The FBI was, in 
direct violation of the brady law, retaining the information about firearm purchases. 
Witness how quickly the Waco crime scene was bulldozed. Witness DOJ lawyers arguing in 
the Ruby Ridge case that Lon H. was not touchable by state law because he was a Fed 
acting under orders. 

The fact that you [and in this rare case] I agree that Reno is a fascist
sack of shit is completely irrelevent.

Well, it's nice to see we agree about something. 

  Now, in an ideal world the constitution would be clearly worded 
 and the semantics would be clearly understood by the people who live 
 under it. However, It ain't like that. English is by no means an ISO 
 (or even ANSI) standard, and even reasonable people can disagree on the 
 complexity generated by the various articles and sections of the 
 constitution and the amendments. 
 
  Look for example to the issue of the Second Amendment. The 
 clearest plain word interpretation of that amendment is that the 
 no one has the ability to infringe on the right of the people to 
 keep and bear arms. 
  
  Fairly simple. 
 
  Does that then mean that just about every firearm law in the 
 country is invalid on it's face? 
Yes.  

No. 


And if you are at all familiar with the history of 2A case law, you
will understand why the SCOTUS has been so meticulous in avoiding a
ruling.  Of course, our friends [hrmmm... Never thought I'd say THAT] in
Texas may well put an end to the charade soon.

Still waiting to hear about the Emerson case (and the 5th is in New Orleans 
IIRC). 


  Well, no. See, the same constitution also grants Congress the 
 power to regulate interstate trade, so as long as they don't infringe
 on the right, they have a wide latitude to set standards etc. Or do they?
 What are the limits of that particular clause? 

Virtually the entire 2A ablating federal infrastructure is based on a
truly scary finding that *any* firearm is the product of Intertate
Commerce, regardless if it has been out of the state in which it was

Well, no. Only about 1/2 of the ablating. The other half is Congresses power 
to tax. (At the federal level a good number of firearms cases are on charges of 
failing to file and or pay the class 2 or 3 weapons tax stamp). 


  Further more, what is *constitutionally* an infringement? 

Als at the risk of going Choation, what part of Shall not be
infringed don't you understand?

I understand shall not, it's the infringed I'm asking about. 

Is it *really* an infringement on your rights to require firearms 
manufacturers to meet reasonable standards of functioning? In fact, given the basis of 
the second 

No Subject

2001-07-26 Thread owner-cypherpunks




Re: Weird message from someone named NIPC

2001-07-26 Thread Declan McCullagh

Now that I've actually read through some of what Tim posted, I think
it's clear what it is. Hint: Vatis wasn't in charge of NIPC by June
29, and I don't recall any such hearing, and his reported comments
are a little, well, unusual. --Declan


On Thu, Jul 26, 2001 at 01:15:21AM -0400, Declan McCullagh wrote:
 There seem to be three explanations.
 
 1. Tim is having some fun with us. It would be easy for him to do so, and
 NIPC (an FBI subagency) has been in the news today, with a WSJ article
 this morning posted to the list and a Senate hearing this afternoon.
 Tim's written similar things before and posted them straight-faced:
 http://www.politechbot.com/p-01332.html
 
 2. Someone is spoofing NIPC email and having fun with Tim.
 
 3. This really did originate from within NIPC and is a major
 cypherpunk intelligence find. The WSJ article
 (http://www.politechbot.com/p-02306.html) says NIPC has been hit by
 Sircam, which scans hard drives for email addresses in documents and
 mail archives, according to descriptions I've read. Reports say Sircam
 emails working documents (in My Documents or whatnot folder) and this
 could have happened.
 
 -Declan
 
 
 
 On Wed, Jul 25, 2001 at 06:42:34PM -0700, Tim May wrote:
  Cypherpunks,
  
  I've been getting anywhere from 10 to 30 SirCam worm messages a 
  day. The volume is now declining. Most have attached files containing 
  fragments of Microsoft Word documents, apparently extracted from the 
  disk drive of the sender. Most are the usual garbage people write to 
  each other, but some of the ones from corporations have been 
  interesting. And this one, assuming it is real, seems to have 
  orginated from within some department of the government called NIPC.
  
  It must be bogus.This does not seem plausible, that they would send 
  me something, so I expect a hoax.
  
  The attached filed, with the message, is 926 K, so I'm only enclosing 
  a few tantalizing sections.
  
  I really cannot imagine why I am getting these SirCam messages from 
  some government agency named NIPC, unless for some reason my e-mail 
  address is in their address book. How could that happen?
  
  (BTW, many of the SirCam messages have clock dates which are wrong. 
  This one is incorrectly dated 8/24/01.)
  
  At 2:39 PM -0400 8/24/01, NIPC Intern42 wrote:
  --017B5BE9_Outlook_Express_message_boundary
  Content-Type: text/plain; charset=ISO-8859-1
  Content-Transfer-Encoding: quoted-printable
  Content-Disposition: message text
  
  Hi! How are you=3F
  
  I send you this file in order to have your advice
  
  See you later=2E Thanks
  
  --017B5BE9_Outlook_Express_message_boundary
  Content-Type: application/mixed; name=DC TOOLZ.zip.bat
  Content-Transfer-Encoding: base64
  Content-Disposition: attachment;  filename=DC TOOLZ.zip.bat
  
  
  The NIPC and FedCIRC have recently received information on attempts 
  to locate, obtain control of and plant new malicious code known as 
  W32-Leaves.worm on computers previously infected with the SubSeven 
  Trojan.
  
  The default ports for SubSeven to listen for network traffic are 
  16959/tcp and 27374/tcp, though the numbers can be changed. Full 
  descriptions and removal instructions of a number of SubSeven 
  variants can be found at various anti-virus firm Web sites, including 
  the following:
  
  
  
  A computer security unit within the U.S. Federal Bureau of 
  Investigation has detected a series of intrusions into U.S. 
  government networks under an investigation code named Moonlight Maze, 
  and the intrusions appear to have originated from Russia, an FBI 
  official told Congress this week. A spokesman for the Russian embassy 
  here today quoted the head of the press service for the Russian 
  foreign intelligence service, Nikita Rabusov, as saying the Russian 
  special services have no relation whatsoever to the theft of 
  information from computer networks of the U.S. federal agencies.
  
  American specialists have failed to establish from where this 
  intrusion originated, the embassy official quoted Rabusov as saying 
  in an interview with the Russian news agency Itar-Tass. They only 
  indicated that it comes from a software company said to be 
  reverse-engineering the products of leading American software 
  companies. Russian special services are not so stupid to undertake 
  such an operation, in case the necessity arises, directly from 
  Moscow.
  
  Please report computer crime to your local FBI office 
  (www.fbi.gov/contact/fo/fo.htm) or the NIPC, and to other appropriate 
  authorities. Incidents may be reported online at 
  www.nipc.gov/incident/cirr.htm. The NIPC Watch and Warning Unit also 
  can be reached at (202) 323-3204/3205/3206, or [EMAIL PROTECTED]
  
  References to ECONCOM are to be deleted ASAP from all departmental 
  systems. SLAM DUNK cover to be vetted by NIPC for release to 
  journalists. Oakland and Monterey offices to coordinate.
  
  
  Michael Vatis, deputy assistant 

FBI SirCammed (fwd)

2001-07-26 Thread Jim Choate


-- Forwarded message --
Date: Wed, 25 Jul 2001 07:21:35 -0400
From: R. A. Hettinga [EMAIL PROTECTED]
To: Digital Bearer Settlement List [EMAIL PROTECTED], [EMAIL PROTECTED],
[EMAIL PROTECTED]
Subject: FBI SirCammed

http://interactive.wsj.com/archive/retrieve.cgi?id=SB9960160921000.djm


July 25, 2001

Tech Center

FBI Cyber Researcher Unleashes Virus
That E-Mails Private Agency Documents

By TED BRIDIS
Staff Reporter of THE WALL STREET JOURNAL

WASHINGTON -- A researcher in the Federal Bureau of Investigation's
cyber-protection unit unleashed a fast-spreading Internet virus that
e-mailed private FBI documents to outsiders -- all on the eve of a Senate
hearing into troubles at the unit.

Although the Sircam virus didn't spread to other computers at the FBI's
National Infrastructure Protection Center, it did send at least eight
documents to a number of outsiders. One, about the investigation into an
unrelated virus, was marked official use only. The Sircam virus has
infected thousands of computers since its discovery last week.

1U.S. Pentagon Shuts Down Public Access to Web Sites (July 24)

2'Code Red' Web Virus May Attack Other Computers in Coming Weeks (July 23)

FBI spokeswoman Deb Weierman said that no sensitive or classified
information about continuing investigations was disclosed Tuesday. The
official use designation protects documents from disclosure under the
U.S. Freedom of Information Act.

It isn't uncommon for virus researchers to accidentally infect their own
computers, but the mistake was particularly embarrassing because it
occurred ahead of a Senate Judiciary panel's oversight hearing about the
FBI cyber unit's effectiveness. Lawmakers were expected to focus on other
agencies' failure to cooperate fully with the FBI center, and on a
perceived lack of trust between the FBI and private-sector groups.

The unit generally gets high remarks for its criminal investigations, and
even critics say the unit is more effective than it was a year ago. The
effort here is not to embarrass anybody but to stress that a lot of work
has to be done, said Republican Sen. Jon Kyl of Arizona.

Meanwhile, the White House has begun organizing a new early-warning network
for Internet threats. But unlike the current system, it will be coordinated
by the Pentagon, not the FBI. The mechanism for warning all U.S. military
and civilian agencies -- and ultimately corporations -- will be dubbed the
Cyber-Warning and Information Network, or c-win. Organizers envision
dozens of computer centers that could sound an alert when a threat is
identified.

The network is expected to begin operating in October. The FBI unit, which
currently relays these warnings, came under sharp criticism from
congressional auditors for issuing tardy alerts. Ms. Weierman, the FBI
spokeswoman, called the new network a useful mechanism to offer the
government a technical capability that doesn't currently exist. The FBI,
she said, wasn't concerned it would lose its warning responsibilities.

Tuesday, at least three people said they received some of the FBI
documents, including a 23-year-old Internet-security expert in Belgium,
Niels Heinen. He operates a Web site that reports on Internet break-ins and
speculated that the analyst, Vince Rowe, visited the site on the infected
computer. Mr. Rowe didn't respond to a request for comment.

Write to Ted Bridis at [EMAIL PROTECTED]

URL for this Article:
http://interactive.wsj.com/archive/retrieve.cgi?id=SB9960160921000.djm

Hyperlinks in this Article:
(1) http://interactive.wsj.com/archive/retrieve.cgi?id=e1-SB9960160921000
(2) http://interactive.wsj.com/archive/retrieve.cgi?id=e2-SB9960160921000
(3) e3-SB9960160921000

Copyright © 2001 Dow Jones  Company, Inc. All Rights Reserved.

Printing, distribution, and use of this material is governed by your
Subscription Agreement and copyright laws.

For information about subscribing, go to http://wsj.com
-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



 --


Nature and Nature's laws lay hid in night:
God said, Let Tesla be, and all was light.

  B.A. Behrend

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   

No Subject

2001-07-26 Thread owner-cypherpunks




Your Invite #731B

2001-07-26 Thread Brad Fakston
Title: Executive Guild Membership
 ApplicationResponse-O-Matic Form

 
 
 
 
 Dear Candidate, 
 
 You have been selected as a potential candidate for a free listing in 
 the  2001 Edition of the International Executive Guild Registry. 
 
 Please accept our congratulations for this coveted honor. 
 
 As this edition is so important in view of the new millennium, the 
 International Executive Guild Registry will be published in two different 
 formats; the searchable CD-ROM and the Online Registry. 
 
 Since inclusion can be considered recognition of your career position 
 and professionalism, each candidate is evaluated in keeping with high 
 standards of individual achievement. In light of this, the International Executive
 Guild thinks that you may make an interesting biographical subject. 
 
 We look forward to your inclusion and appearance in the International 
 Executive Guild's Registry. Best wishes for your continued success. 
 
 International Executive Guild 
 Listing Dept. 
 
 If you
 wish to be removed from our list, please submit
 your request
 at the
 bottom of this email.
 
 
 
 


 

 
  
 
 

 
 
 International Executive Guild
 Registration Form
 (US and Canada
 Only)
 
 
 
 

 
 Please
 fill out this form if you would like to be
 included on The International
 Executive Guild, For accuracy and
 publication purposes, please
 complete and send this form at the earliest
 opportunity. There is no
 charge or obligation to be listed
 on The International Executive Guild.
 
 
 

 
 
 

 
 Your
 Name

 
 

 
 Your
 Company

 
 

 
 Title

 
 

 
 Address

 
 

 
 City

 
 

 
 State
 or Province

 
 

 
 Country

 USACanada
 

 
 ZIP/Postal
 Code

 
 

 
 Day
 Time Telephone

 
 

 
 
 Home
 Phone
 

 (Not
 To Be Published)
 

 
 
 Email
 

 
 

 
 

 
 
 

 
 
 TO
 HELP US IN CONSIDERING YOUR APPLICATION, PLEASE
 TELL US A LITTLE ABOUT
 YOURSELF...
 
 

 
 
 Your
 Business

 
 
 (Financial
 Svcs, Banking, Computer Hardware, Software, Professional Svcs,
 Chemicals,
 Apparel, Aerospace, Food, Government, Utility,
 etc.)
 

 
 Type
 of Organization

 
 
 (Mfg,
 Dist/Wholesaler, Retailer, Law Firm,
 Investment
 Bank, Commercial Bank, University,
 Financial
 Consultants, Ad Agency, Contractor, Broker,
 etc.)
 

 
 
 Your
 Business Expertise
 

 
 
 (Corp.Mgmt,
 Marketing, Civil Engineering,
 Tax

 Law, Nuclear Physics, Database Development, Operations, Pathologist,
 Mortgage
 Banking, etc.)
 

 
 Major
 Product Line

 
 
 (Integrated
 Circuits, Commercial Aircraft, Adhesives, Cosmetics, Plastic Components,

 Snack Foods, etc.)
 
 

 
 
 Note: Submitting this form
 will
 be made by email, not by use of www. Confirmation of its delivery
 is made by browsing your outgoing mail.
 
 Thank
 you for filling in this form, we will contact you with more
 information.
 
 
 List
 Removal
 Click
 Here

 
 


No Subject

2001-07-26 Thread owner-cypherpunks




  1   2   >