re
Minister Charles Simpson has the power to make you a LEGALLY ORDAINED MINISTER within 48 hours 1st22 BE ORDAINED NOW! As a minister, you will be authorized to perform the rites and ceremonies of the church!! WEDDINGS MARRY your BROTHER, SISTER, or your BEST FRIEND!! Don't settle for being the BEST MAN OR BRIDES' MAID Most states require that you register your certificate (THAT WE SEND YOU) with the state prior to conducting the ceremony. FUNERALS A very hard time for you and your family Don't settle for a minister you don't know!! Most states require that you register your certificate (THAT WE SEND YOU) with the state prior to conducting the ceremony. BAPTISMS You can say WELCOME TO THE WORLD I AM YOUR MINISTER AND YOUR UNCLE!! What a special way to welcome a child of God. FORGIVENESS OF SINS The Catholic Church has practiced the forgiveness of sins for centuries **Forgiveness of Sins is granted to all who ask in sincerity and willingness to change for the better!! VISIT CORRECTIONAL FACILITIES Since you will be a Certified Minister, you can visit others in need!! Preach the Word of God to those who have strayed from the flock WANT TO START YOUR OWN CHURCH?? After your LEGAL ORDINATION, you may start your own congregation!! At this point you must be wondering how much the Certificate costs. Right? Well, let's talk about how much the program is worth. Considering the value of becoming a CERTIFIED MINISTER I'd say the program is easily worth $100. Wouldn't you agree? However, it won't cost that much. Not even close! My goal is to make this life changing program affordable so average folks can benefit from the power of it. Since I know how much you want to help others, you're going to receive your Minister Certification for under $100.00... Not even $50.00... You are going to receive the entire life-changing course for only $29.95. For only $29.95 you will receive: 1. 8-inch by 10-inch certificate IN COLOR, WITH GOLD SEAL. (CERTIFICATE IS PROFESSIONALLY PRINTED BY AN INK PRESS) 2. Proof of Minister Certification in YOUR NAME!! 3. SHIPPING IS FREE!!! *** LIMITED TIME OFFER: ORDER TODAY! SEND Only $29.95 US (CREDIT CARD, CASH, CHECK, OR MONEY ORDER) SHIPPING IS FREE!!! For Shipping OUTSIDE the US please add $11.00. To place your order merely fill out the following form and fax to 1-775-667-5709. If this line is busy, please try faxing to 1-413-669-7364. or mail to: Internet Information Services PO Box 21442 Billings, MT 59104 (ALL ORDERS FILLED WITHIN 24 HOURS OF RECEIVING THEM) *Please allow 8 days to receive your certificate by mail. If you do not receive your order within 10 days, please send us a fax letting us know of the late arrival. We will then contact you to figure out why you have not received your order. * Credit Card Order Form (Please print very clearly in dark ink) Name on Credit Card: Address: City/State/ZIP: Your email address: Your card will be charged $29.95 for your Ministers' Certificate. For Shipping OUTSIDE the US please add $11.00. Type of Card, circle one (Visa, MasterCard, American Express) Credit Card Number: Date Credit Card Expires: Please tell us your phone Number: Please tell us your fax Number: To order by Check or Money Order: MAKE YOUR CHECK PAYABLE TO: Internet Information Services (Please Print Clearly Your Name and Address) Name: Address: City/State/ZIP: E-mail Address: Please tell us your phone Number: Please tell us your fax Number: (ALL ORDERS FILLED WITHIN 24 HOURS OF RECEIVING THEM) *Please allow 8 days to receive your certificate by mail. If you do not receive your order within 10 days, please send us a fax letting us know of the late arrival. We will then contact you to figure out why you have not received your order. Thank you for your business, Internet Information Services PO Box 21442 Billings, MT 59104 Fax to 1-775-667-5709. If this line is busy, please try faxing to 1-413-669-7364. Copyright (c) 1997-2000 All Rights Reserved This ad is produced and sent out by: Universal Advertising Systems To be removed from our mailing list please email us at [EMAIL PROTECTED] with remove in the subject line or call us toll free at 1-888-605-2485 and give us your email address or write us at: Central DB Removal, PO Box 1200, Oranjestad, Aruba *** 86013
NO MORE CREDIT CARD DEBT!
Eliminate your credit card debt without filing bankruptcy! Are you tired of making minimum payments and barely getting by? Are you drowning in debt? Are you ready for a change and some freedom? What will buying this package do for me? *It will terminate your credit card debt! (Major credit cards only - Not department store cards or gas cards) *This covers cash advances! *This covers unsecured loans as well! *It will allow you to stop making monthly payments immediately! *It will empower you to take back the control of your life! *Unlike bankruptcy this keeps your affairs completely private! Only you, the creditors, and the credit bureau will know. However, you will not lose your home, or any other assets! *You will no longer be able to use those credit cards. The price of this package runs between $1750-$2500 This depends on if you want to do it yourself or with the aid of an paralegal. We offer a guarantee too! This program has been used successfully for 7 years! For more information please call: 1-800-320-9895 Ext 7483 This works in the US ONLY! To be removed reply to: [EMAIL PROTECTED] or just reply to this email with remove in the subject!
smoke heat
Fire effects MILLIONS of Americans each year. Is YOUR family protected?? Since 1971, we have been distributing only HIGH quality residential fire products. We treat each customer's safety as our own! Our 10 inch thick Lifesaving Testimonial Book shows satisfied customer after customer. Become one of them today! Reply with your name, address, and phone number. A representative will contact you shortly. To be removed from future mailings (Click Reply) with remove in the subject line.
RF Weapons
[I wonder if our more unpopular Federal agencies house their mainframes in facilities that are shielded from this sort of attack] Simple RF Weapon Can Fry PC Circuits Ê Scientists show device that could make the electromagnetic spectrum the terrorist weapon of choice. Reggie Beehner, Medill News Service Wednesday, May 02, 2001 ABERDEEN PROVING GROUND, MARYLAND -- A weapon built out of parts from any electronics store can deliver radio frequency radiation that can burn out electronic circuits within seconds, according to a recent demonstration by scientists here. Many government officials fear terrorists could use the simple device to disrupt computer networks or paralyze electronic equipment. Because of its small size, the weapon could be stowed in a van or briefcase and used to wreak havoc on government offices, hospitals, airports, or other targets. The device, assembled with commonly available components, delivers quick, powerful bursts of RF radiation. Just about any unprotected electronic equipment is at risk, including PCs, home security systems, police scanners, and medical and air-traffic control equipment. Businesses can protect their computer networks by using metal product enclosures on hardware and radio frequency filter lines on power lines, says Randy Bernard, vice president of Schriner Engineering, which built the device for a demonstration to government officials. Also, Bernard urges businesses to keep an offsite data storage area to back up materials that could not be protected. For the guy at home in front of his computer, I'd say don't worry about this, Bernard says. But if your business has something to lose, then you might want to pay attention. It may not be an immediate threat, but it's something you should keep in mind. But the demonstration is a wake-up call for government and others in technology industries, Bernard notes. Equipment Crashes, Croaks Our whole nation is vulnerable, says David Schriner, a weapons specialist and engineer who codesigned the radio frequency device. We dance along with all this high technology, and we're very dependent on it. But if it breaks, where will we be? Though less dramatic than those officials envisioned, the RF weapon demonstrated did inflict noticeable damage on an assortment of electronic equipment. Computer screens flickered and froze, medical equipment died, and a home security system lost all power. Even a camera, purchased earlier in the week to videotape the demonstration, came too close to the radiation pulses and was added to the list of casualties. When building the RF device, the scientists stuck to using backyard means to see how easily it could be done. They bought all the components from retail stores or online, finding some on eBay. Total cost for the parts ran about $10,000. There's nothing classified, Schriner says. This is all homegrown stuff, everyday tools and parts. And though we're a bright group, we're certainly not unique. Others, including terrorist groups, could do this very easily. Study Continues Whether such a device could be used effectively by terrorists is unclear, and scientists plan to conduct tests this summer to answer that question. There's a lot of innuendo that [terrorist groups] have used this, Schriner says. Is it true? I don't know. Sometimes when you start researching this you find out it's a lot of crock. But the question still remains. That question was enough to convince the Defense Department to spend $4 million on the project and attract the attention of the House Armed Services Committee's Special Oversight Panel on Terrorism. One of the lessons of warfare is the need to keep ahead of the curve of technology, says Rep. Jim Saxton, R-New Jersey, who chairs the terrorism panel. Saxton was among a handful of congressional leaders who turned out to witness the 45-minute demonstration at a U.S. Army testing ground. Since the dawn of the Cold War, the government has been careful to protect the nation's military computers and infrastructure, officials say. But high costs and cumbersome materials have left those precautions largely ignored in the private sector, leaving many businesses vulnerable.
Updating our list
We are updating our mailing list. If you do not want to remain on it, DO NOTHING or Send a blank email to [EMAIL PROTECTED] You will automatically be deleted and never mailed again. Thank You! If you wish to remain on the list, please reply to [EMAIL PROTECTED] As a way of saying thank you, we will give you 4 pieces of fully functional software for remaining on our list. You will also receive regular updates from us. Software will include: 1. Desk Top submission software to place your web site in 950 Search engines and directories. 2. Ezine assistant and text editor. Start your own Ezine with articles that are refreshed every month automatically by Top Internet Marketers. 3. Webmaster linking program. Keep track of your linking partners and also extract targeted email addresses from the Internet. 4. Classified ad submission program. Place your classified ad on 1000's of ad sites. Great for promoting your business! Again, when you reply, you will be given the download site for this FREE fully functional software! Have a great day!
BlackOffers.com Newsletters
Title: BlackOffers.com - Newsletters for the African American Subscribe to our free newsletters and get the latest information you need to know! BlackOffers.com exclusive newsletters targets African Americans online looking for the latest information relating to the black experience. Although not all content is black related, we bring it to you from a black perspective. Enter your email and select from our newsletters below. YOUR E-MAIL: Inspirational Motivations Contests & Sweepstakes Black History New Black Web Sites Black Headlines Doing Business Online Free Offers Specials & Promotions Click here for information about the Newsletters Visit these other fine black destinations: Blackstocks.com Gospelcity.com BlackWebPortal.com Blackplanet.com Important Notes: 1. There is no cost to join, all lists are free. 2. Your privacy is guaranteed. Your information will never be sold to any third parties. 3. Easy process to unsubscribe. 4. Newsletters are sent in rich media html format. Home About Us Partner Contact Us Copyright 2001, BlackOffers.com www.blackoffers.com [EMAIL PROTECTED] ---To be unsubscribed from the BlackOffers.com Newsletters mailing list, simply click on the link below:Unsubscribe [EMAIL PROTECTED]
FireBreathing Reno sighted
FoxNewChannel's Hannity Colmes will have Janet Reno on tonight. (Repeated throughout the night)
martha vazquez summons
Subject: Judge Martha Vazquez summons, jury DEMAND, and final complaint Date: Wed, 02 May 2001 13:03:07 -0600 From: [EMAIL PROTECTED] To: [EMAIL PROTECTED] CC: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED], http://www.nmcourt.fed.us/dcdocs/judges/vazquez.html Be careful in the future what you sign! __ SECOND JUDICIAL DISTRICT COURT COUNTY OF BERNAO STATE OF NEW MEXICO CASE NUMBER Arthur R Morales William H Payne v Theodore C. Baca Norman C. Bay Phyllis A. Dow Raymond Hamilton Rodey, Dickason, Sloan , Akin Robb PA Martha Vazquez Complaint for Complaint for Relief from HARASSMENT SUMMONS TO: Martha Vazquez 100 S. Federal Place Santa Fe, New Mexico 87501 Defendant(s). Greeting: You are hereby directed to serve a pleading or motion in response to the Complaint within 30 days after service of the Summons and file the same, all as provided by law. You are notified that, unless you so serve and file a responsive pleading or motion, the Plaintiff(s) will apply to the court for the relief demanded to the Complaint. Pro Se Plaintiffs: Arthur R Morales William H Payne 1024 Los Arboles NW 13015 Calle de Sandias NE Albuquerque, NM 87107 Albuquerque, NM 98111 505 3451381 505 292 7037 WITNESS the Honorable _ District Judge of said Court of the State of New Mexico and the Seal of the District Court of said County, this__ day of 20__ BENNINA ARMIJO-SISNEROS CLERK OF THE DISTRICT COURT By: NOTE: This summons does not require you to see, telephone or write to the District Judge of the court at this time. It does require you or your attorney to file your legal defense to the case in writing with the Clerk of the Distinct Court within 30 days after the summons is legally served on you. If you do not do this, the party suing may get a judgment by default against you. Revised 1/1/83 CY 4.45- STATE OF NEW MEXICO ) ) ss. COUNTY OF_) RETURN FOR COMPLETION BY SHERIFF OR DEPUTY: I certify that I served the within Summons in said County on the day of ___ ,20_, by delivering a copy thereof, with copy of Complaint attached. in the following manner: RETURN FOR COMPLETION BY OTHER PERSON MAKING SERVICE: I, being duly sworn, on oath. say that I ant over the age of 18 years and not a parry to this lawsuit. and that I served the within Summons in said County on the ___ day of _ by delivering a copy thereof with copy of Complaint attached, in the following manner: (check one box and fill in appropriate blanks) _ To Defendant _(used when Defendant receives copy of Summons is read Summons or Complaint or refuses to receive Summons or hear reading.) To _ a person over the age of 15 years and residing at the usual place of abode of Defendant who at the time of such service was absent therefrom. _ By posting a copy of the Summons and Complaint in the most public part of the premises of Defendant __, (used if no person found at dwelling house or usual place of abode. _ To ___, agent authorized to an receive service of process for Defendant _ _ To _, (parent) (guardian) of Defendant (used when Defendant is a minor or an incapacitated person.) To _ ___ name of persontitle of person authorized to receive service (used when Defendant is a corporation or association subject to suit under a common name, a land grant board of trustees. the State of New Mexico or any political subdivision.) Fees: Signature of Private Citizen Making Service SHERIFF OF _ Subscribed and sworn before me this _ COUNTY State of New Mexico day of ,20___ _ Sheriff Notary or Other Officer Authorized to Administer Oaths By: DEPUTY _ SECOND JUDICIAL DISTRICT COURT COUNTY OF BERNALILLO STATE OF NEW MEXICO CASE NUMBER Arthur R Morales William H Payne Plaintiffs v Theodore C. Baca Norman C. Bay Phyllis A. Dow Raymond Hamilton
[BAWUG] RFC1149 implemented
From: Lars Aronsson [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: [BAWUG] RFC1149 implemented List-Help: mailto:[EMAIL PROTECTED]?subject=help BAWUG, Some people in Bergen, Norway are betting on a different wireless future and have made the first known implementation of the CPIP protocol from RFC1149. This Internet Request For Comments is titled A Standard for the Transmission of IP Datagrams on Avian Carriers and was published on April 1, 1990. Yes, this means sending IP packets with homing pigeons. The experiment was conducted by the Bergen Linux Users' Group in cooperation with Vesta Brevduveforening on April 28, 2001. Ping times varied between 3200 and 6300 seconds (1 - 2 hours). Here are the images: http://www.blug.linux.no/rfc1149/ Lars Aronsson. -- Aronsson Datateknik Teknikringen 1e tel +46-70-7891609 [EMAIL PROTECTED] SE-583 30 Linköping, Sweden fax +46-13-211820http://aronsson.se -- general wireless list, a bawug thing http://www.bawug.org/ [un]subscribe: http://lists.bawug.org/mailman/listinfo/wireless
thousands of mortgage programs 10411
FREE LOAN INFO APR, Fixed rate, points, discount rates, application fees...Sound familiar? It does if you are searching for a mortgage, refinancing, debt consolidation, etc. . Stop trying to figure it all out, they make it confusing for a reason! Let us do all the work for you. We will search an entire database with thousands of current lenders and programs, sift through all the fine print and confusing terms, and find those that fit your needs. End the hassles and confusion right now. we do all the work for you, absolutely FREE. Simply Click Here, and fill out the short form. Please click here to be REMOVED
Re: NTT/Mitsubishi release Camilla, ESIGN, EPOC
At 10:35 PM 4/30/01 -0400, Rich Salz wrote: NTT and Mitsubishi will be granting royalty free licenses for strict implementations of Camilla (128bit block cipher), The best part about Camilla is that it demonstrates that the Japs have a sense of humor, about the british, at least.
Re: layered deception
At 10:32 PM 4/28/01 -0700, Steve Schear wrote: At 11:46 PM 4/28/2001 -0400, Declan McCullagh wrote: I rather like the idea of encrypting the logs on the fly and shipping them offshore. Your offshore partner will be instructed to turn over the logs only if you are not asking for them under duress. (A reasonable protocol can probably be worked out. Would a court order instruct you to lie? If so, would it be valid?) One of the simplest and most effective ways to accomplish this is to require the legally responsible corporate person to physically show up at the offshore location as proof of a lack of duress. A location which does not have extradition contracts with the homeland...
Re: layered deception
Tim May [EMAIL PROTECTED] wrote: A profound new insight. We still await some real insights from a real graduate student (!), beyond her saying that we don't know as much as she says she knows. BTW, I have removed the additional addresses (David Honig [EMAIL PROTECTED], Declan@Well. Com [EMAIL PROTECTED], Steve Schear [EMAIL PROTECTED]). When a list is replied to, there is no need to carry along the baggage of everyone who has added to a thread. --Tim May Why bother to continue the thread when you have nothing of value to add? Regards, Matt- ** Subscribe to Freematt's Alerts: Pro-Individual Rights Issues Send a blank message to: [EMAIL PROTECTED] with the words subscribe FA on the subject line. List is private and moderated (7-30 messages per week) Matthew Gaylor, 2175 Bayfield Drive, Columbus, OH 43229 (614) 313-5722 ICQ: 106212065 Archived at http://groups.yahoo.com/group/fa/ **
Make Money Under One Straight Line Plan!!!
Hi, Make Money Under One Straight Line Plan!!! FREE To Join And Benefit! This program are People Helping People Build A Reliable Residual Income Through Teamwork, We Will All See Our Dreams Come True! No RECRUITING! No SELLING! No PRODUCTS! No SCAMS! AND THE BEST PART... IT'S FREE! We know this sounds too good to be true, but our this amazing program is designed to provide everyday people with a residual income stream while doing NOTHING! Take a look! Request for info! mailto:[EMAIL PROTECTED]?subject=inu_info please! Everybody Benefits! Everyone join after you will place below you in one straight line. Have a Nice Day! Regards.
Re: layered deception
At 11:46 PM 4/28/2001 -0400, Declan McCullagh wrote: I rather like the idea of encrypting the logs on the fly and shipping them offshore. Your offshore partner will be instructed to turn over the logs only if you are not asking for them under duress. (A reasonable protocol can probably be worked out. Would a court order instruct you to lie? If so, would it be valid?) One of the simplest and most effective ways to accomplish this is to require the legally responsible corporate person to physically show up at the offshore location as proof of a lack of duress. steve
RE: layered deception
there is no requirement for maintaining log files (unless specifically directed otherwise.) log files contain either marketing value or sysadmin value -- in both cases specific ip addr info isn't necessary to maintain that value (except in case of anomalous activity). one could collect info without identifying information. same principle applies to e-mail. once mail is deleted from a pop or imap or whatever server, there is no requirement to keep the backup tapes of e-mail. in fact the larger isps no longer keep deleted e-mail...they maintain only e-mail headers for up to six months. smaller isps should follow in these steps (though i'd argue you shouldn't even keep header info.) don't save it if you don't really truly need it. phillip -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Declan McCullagh Sent: Saturday, April 28, 2001 11:46 PM To: Anonymous Cc: [EMAIL PROTECTED] Subject: Re: layered deception I rather like the idea of encrypting the logs on the fly and shipping them offshore. Your offshore partner will be instructed to turn over the logs only if you are not asking for them under duress. (A reasonable protocol can probably be worked out. Would a court order instruct you to lie? If so, would it be valid?) -Declan On Sat, Apr 28, 2001 at 03:45:38PM -0600, Anonymous wrote: In view of the recent gimme-the-logs-or-we-fuck-you activities of armed men (http://www.indymedia.org/front.php3?article_id=36912group=webcast , http://seattle.indymedia.org/display.php3?article_id=3013 ) what would be the legal consequence of the following: 1. A virus is designed that spreads itself in some standard way and that deletes log files of popular http server implementations. 2. Files are deleted when virus receives a packet on a known port. 3. Detection of virus requires more than average admin can do. So when logs are requested an outside 3rd party can maliciously remove logs. The first several ISPs to contract this virus will probably get fucked, but by then it should become obvious that the ISP cannot effectively control the virus.
Re: layered deception
I rather like the idea of encrypting the logs on the fly and shipping them offshore. Your offshore partner will be instructed to turn over the logs only if you are not asking for them under duress. (A reasonable protocol can probably be worked out. Would a court order instruct you to lie? If so, would it be valid?) -Declan On Sat, Apr 28, 2001 at 03:45:38PM -0600, Anonymous wrote: In view of the recent gimme-the-logs-or-we-fuck-you activities of armed men (http://www.indymedia.org/front.php3?article_id=36912group=webcast , http://seattle.indymedia.org/display.php3?article_id=3013 ) what would be the legal consequence of the following: 1. A virus is designed that spreads itself in some standard way and that deletes log files of popular http server implementations. 2. Files are deleted when virus receives a packet on a known port. 3. Detection of virus requires more than average admin can do. So when logs are requested an outside 3rd party can maliciously remove logs. The first several ISPs to contract this virus will probably get fucked, but by then it should become obvious that the ISP cannot effectively control the virus.
Ashcroft's Wants A Billion More than Reno...
[Note from Matthew Gaylor: Here is a prime example of the Republican vision of doing more with less FY 2002 budget includes $1.057 billion in program increases. That's a billion more than Janet Reno spent. What total and complete government reduction frauds the Republicans are. Also note that Ashcroft wants to add 1,500 School Resource Officers to Clinton's 100,000 Cops program. What these 1500 federal funded officers are going to do in our schools, will make an even better case for home schooling. I'm sure the stupid ass religious right can be happy now that they've added a new federally funded police force bureaucracy to local schools. I'll know who to blame especially after they fought tooth and nail for Ashcroft's nomination. Please note- My stupid ass comment is not directed at religion, but is directed at those who supported Ashcroft. And to top it off he wants extra cash to break crypto, presumably so we can't bitch about their nefarious anti-liberty activities privately.] STATEMENT OF JOHN ASHCROFT BEFORE THE UNITED STATES SENATE COMMITTEE ON APPROPRIATIONS SUBCOMMITTEE ON COMMERCE, JUSTICE, AND STATE, THE JUDICIARY AND RELATED AGENCIES April 26, 2001 Mr. Chairman and Members of the Subcommittee: It is both an honor and a pleasure to appear before you this morning to present President Bush's first budget request for the Department of Justice. For Fiscal Year 2002, the President's budget seeks $24.65 billion for the Department of Justice, including $20.94 billion in discretionary spending authority and $3.71 billion in mandatory resources, such as fees. This budget seeks to fulfill our basic federal law enforcement responsibilities, address emerging technology and critical infrastructure needs, and focus on the Administration's priorities of reducing gun crime, combating drug use, guaranteeing the rights of all Americans, and empowering communities in their continued fight against crime. While the fiscal year 2002 budget request maintains the same overall amount of discretionary spending authority as was provided by this Subcommittee in FY 2001, we have managed to enhance a number of key areas. The budget includes a general shift in spending from state and local law enforcement in order to support our core federal law enforcement mission, and better target assistance to areas of greatest need, such as crime in our schools, crimes committed with firearms, and violence against women. The Community Oriented Policing Services (COPS) program is continued at a somewhat reduced level, with resources targeted for school safety, law enforcement technology needs, and reducing DNA backlogs. The COPS request does not disrupt or affect the commitments made to put 100,000 more police on the streets and, in fact, goes further by proposing to hire up to an additional 1,500 School Resource Officers. Basic Law Enforcement The Core Federal Mission The budget I present to you today first addresses the basic law enforcement responsibilities of the Department of Justice. The mission of the Department is clear: to enforce the law and defend the interests of the United States according to the law; to provide leadership in preventing and controlling crime; to seek just punishment for those guilty of unlawful behavior; to administer and enforce the nation's immigration laws fairly and effectively; and to ensure fair and impartial administration of justice for all Americans. The FY 2002 budget includes $1.057 billion in program increases to enable the Department to carry out its mission, particularly in the areas of detention and incarceration, antiterrorism, cybercrime, and counterintelligence. Increased Detention and Incarceration Capacity The number of inmates in the Federal Prison System has more than doubled since 1990 as a result of tougher sentencing guidelines, mandatory minimum sentences, the abolition of parole, and increased federal law enforcement efforts. This surge in the prison population continually tests the limits of our detention and incarceration capacity. The FY 2002 budget for the Department of Justice includes a $949.5 million increase in funding to support the federal responsibility of detaining individuals awaiting trial or sentencing in federal court, and incarcerating inmates who have been sentenced to prison for federal crimes. The rapid growth in the federal inmate population is expected to continue. Despite the investment of nearly $5 billion for prison construction over the past decade, the prison system is
RE: layered deception
On Sun, 29 Apr 2001, Declan McCullagh wrote: Right, in most circumstances you're not required to keep logs. But there are some cases, albeit a fairly narrow subset, in which you'd want to have log files that are available to you but not an adversary using legal process. -Declan If you need your logs for technical debugging, do your technical debugging diligently and daily, and erase them immediately after. Until the moment they are erased, they are vulnerable to theft, whether the thief has a subpeona or not. If you want to preserve relevant information from your logfiles, just lift out the relevant information and nothing else. Mung it into a completely different form (so it's not a logfile anymore), encrypt it, and save it to a private directory. With any luck, a regular data thief won't find it. Short of making a bad mistake, even if they do find it they won't be able to decrypt. If you're forced to guide a thief with a subpeona to it, there's no guarantee that the info *you* found relevant is the same info they want and also the precedent on whether you can be jailed for refusing to reveal a key you keep in your head is fuzzy at best. Bear
Re: Choate - Enough is Enough
Will someone at lne.com finally decide that he qualifies as spam and start filtering? That simple act would improve the signal to noise ratio dramatically. Internet is a self-service establishment. Full-service has too much undesirable luggage attached to it. I haven't seen choatian posts for months, because I'm filtering him out. The only time it fails is when he changes the originating address, which is infrequent. So stop whining and do it yourself. Hushmail won't let you do it ? Tough shit. You need a better service.
RE: layered deception
Declan McCullagh [EMAIL PROTECTED] wrote: Right, in most circumstances you're not required to keep logs. But there are some cases, albeit a fairly narrow subset, in which you'd want to have log files that are available to you but not an adversary using legal process. -Declan Which would/could get you charged with obstruction of justice/contempt/conspiracy etc, etc. You can protect your log files safely enough by not having any- But protecting your real ASSets is a bit more difficult. Regards, Matt- ** Subscribe to Freematt's Alerts: Pro-Individual Rights Issues Send a blank message to: [EMAIL PROTECTED] with the words subscribe FA on the subject line. List is private and moderated (7-30 messages per week) Matthew Gaylor, 2175 Bayfield Drive, Columbus, OH 43229 (614) 313-5722 ICQ: 106212065 Archived at http://groups.yahoo.com/group/fa/ **
RE: layered deception
Right, in most circumstances you're not required to keep logs. But there are some cases, albeit a fairly narrow subset, in which you'd want to have log files that are available to you but not an adversary using legal process. -Declan At 01:15 AM 4/29/01 -0400, Phillip H. Zakas wrote: there is no requirement for maintaining log files (unless specifically directed otherwise.) log files contain either marketing value or sysadmin value -- in both cases specific ip addr info isn't necessary to maintain that value (except in case of anomalous activity). one could collect info without identifying information. same principle applies to e-mail. once mail is deleted from a pop or imap or whatever server, there is no requirement to keep the backup tapes of e-mail. in fact the larger isps no longer keep deleted e-mail...they maintain only e-mail headers for up to six months. smaller isps should follow in these steps (though i'd argue you shouldn't even keep header info.) don't save it if you don't really truly need it. phillip -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Declan McCullagh Sent: Saturday, April 28, 2001 11:46 PM To: Anonymous Cc: [EMAIL PROTECTED] Subject: Re: layered deception I rather like the idea of encrypting the logs on the fly and shipping them offshore. Your offshore partner will be instructed to turn over the logs only if you are not asking for them under duress. (A reasonable protocol can probably be worked out. Would a court order instruct you to lie? If so, would it be valid?) -Declan On Sat, Apr 28, 2001 at 03:45:38PM -0600, Anonymous wrote: In view of the recent gimme-the-logs-or-we-fuck-you activities of armed men (http://www.indymedia.org/front.php3?article_id=36912group=webcast , http://seattle.indymedia.org/display.php3?article_id=3013 ) what would be the legal consequence of the following: 1. A virus is designed that spreads itself in some standard way and that deletes log files of popular http server implementations. 2. Files are deleted when virus receives a packet on a known port. 3. Detection of virus requires more than average admin can do. So when logs are requested an outside 3rd party can maliciously remove logs. The first several ISPs to contract this virus will probably get fucked, but by then it should become obvious that the ISP cannot effectively control the virus.
RE: layered deception
I think Matt is a bit too quick to conclude a court will charge the operator with contempt and that the contempt charge will stick on appeal. Obviously judges have a lot of discretion, but it doesn't seem to me like the question is such a clear one if a system is set up in the proper cypherpunkish manner. -Declan At 01:04 PM 4/29/01 -0400, Matthew Gaylor wrote: Declan McCullagh [EMAIL PROTECTED] wrote: Right, in most circumstances you're not required to keep logs. But there are some cases, albeit a fairly narrow subset, in which you'd want to have log files that are available to you but not an adversary using legal process. -Declan Which would/could get you charged with obstruction of justice/contempt/conspiracy etc, etc. You can protect your log files safely enough by not having any- But protecting your real ASSets is a bit more difficult. Regards, Matt- ** Subscribe to Freematt's Alerts: Pro-Individual Rights Issues Send a blank message to: [EMAIL PROTECTED] with the words subscribe FA on the subject line. List is private and moderated (7-30 messages per week) Matthew Gaylor, 2175 Bayfield Drive, Columbus, OH 43229 (614) 313-5722 ICQ: 106212065 Archived at http://groups.yahoo.com/group/fa/ **
RE: layered deception
At 01:04 PM 4/29/2001 -0400, Matthew Gaylor wrote: Declan McCullagh [EMAIL PROTECTED] wrote: Right, in most circumstances you're not required to keep logs. But there are some cases, albeit a fairly narrow subset, in which you'd want to have log files that are available to you but not an adversary using legal process. -Declan Which would/could get you charged with obstruction of justice/contempt/conspiracy etc, etc. You can protect your log files safely enough by not having any- But protecting your real ASSets is a bit more difficult. Almost anything the court does not like can get you so charged. So what else is new? Still, if the information or principle is sufficiently important you will eventually be released (if you are even held). steve
Get Away on us!! Make some $$!!!
GET YOUR FREE GIFT WHEN VISITING OUR WEB SITE! Are you being paid what you are worth? We are living in the most prosperous time in history. Now is your turn to profit. Learn to earn 6 Figures from home. It is easier than ever! Plus, receive your FREE GIFT & FREE Info when visiting our web site. CLICK HERE! You were sent this message because your address is in our subscriber database. If you wish to be removed, please click here and we will remove you from our subscriber list.
Sellin stuff without knowin what your sellin
From Eurocrypt: Abstract. We consider the question of protecting the privacy of customers buying digital goods. More specifically, our goal is to allow a buyer to purchase digital goods from a vendor without letting the vendor learn what, and to the extent possible also when and how much, it is buying. We propose solutions which allow the buyer, after making an initial deposit, to engage in an unlimited number of priced oblivious-transfer protocols, satisfying the following requirements: As long as the buyer's balance contains sufficient funds, it will successfully retrieve the selected item and its balance will be debited by the item's price. However, the buyer should be unable to retrieve an item whose cost exceeds its remaining balance. The vendor should learn nothing except what must inevitably be learned, namely, the amount of interaction and the initial deposit amount (which imply upper bounds on the quantity and total price of all information obtained by the buyer). In particular, the vendor should be unable to learn what the buyer's current balance is or when it actually runs out of its funds.
layered deception
In view of the recent gimme-the-logs-or-we-fuck-you activities of armed men (http://www.indymedia.org/front.php3?article_id=36912group=webcast , http://seattle.indymedia.org/display.php3?article_id=3013 ) what would be the legal consequence of the following: 1. A virus is designed that spreads itself in some standard way and that deletes log files of popular http server implementations. 2. Files are deleted when virus receives a packet on a known port. 3. Detection of virus requires more than average admin can do. So when logs are requested an outside 3rd party can maliciously remove logs. The first several ISPs to contract this virus will probably get fucked, but by then it should become obvious that the ISP cannot effectively control the virus.
toolmakers not responsible for tooluse
http://dailynews.yahoo.com/h/ap/20010427/ts/court_handgun_liability.html Friday April 27 10:29 AM ET Gun Ruling To Have National Impact By JOEL STASHENKO, Associated Press Writer ALBANY, N.Y. (AP) - A ruling by the state's top court that gun makers can't be held liable for shooting deaths and injuries because of their marketing practices is certain to have an impact on dozens of such cases nationwide, lawyers say. So if gun-makers aren't responsible for how guns are used, why is Napster held responsible for how its software is used? Why is Felton responsible for how his thinking might be used?
The Program
Several months ago, I made a conscious decision not to delete what I figured was just another junk e-mail. That decision has changed my life. Here you have the very same opportunity in front of you. If you take just five minutes to read through the following program you wont regret it. See for yourself! Dear Friends Future Millionaires: AS SEEN ON NATIONAL TV: Making over half a million dollars every 4 to 5 months from your home for an investment of only $25 U.S. Dollars expense one time THANKS TO THE COMPUTER AGE AND THE INTERNET ! == BE A MILLIONAIRE LIKE OTHERS WITHIN A YEAR!!! Before you say ''Bull'', please read the following. This is the letter you have been hearing about on the news lately. Due to the popularity of this letter on the Internet, a national weekly news program recently devoted an entire show to the investigation of this program described below, to see if it really can make people money. The show also investigated whether or not the program was legal. Their findings proved once and for all that there are ''absolutely NO Laws prohibiting the participation in the program and if people can -follow the simple instructions, they are bound to make some mega bucks with only $25 out of pocket cost''. DUE TO THE RECENT INCREASE OF POPULARITY RESPECT THIS PROGRAM HAS ATTAINED, IT IS CURRENTLY WORKING BETTER THAN EVER. This is what one had to say: ''Thanks to this profitable opportunity. I was approached many times before but each time I passed on it. I am so glad finally joined just to see what one could expect in return for the minimal effort and money required. To my astonishment, I received total $610,470.00 in 21 weeks, with money still coming in. Pam Hedland, Fort Lee, New Jersey. === Here is another testimonial: This program has been around for a long time but I never believed in it. But one day when I received this again in the mail I decided to gamble my $25 on it. I followed the simple instructions and voila . 3 weeks later the money started to come in. First month I only made $240.00 but the next 2 months after that I made a total of $290,000.00. So far, in the past 8 months by re-entering the program, I have made over $710,000.00 and I am playing it again. The key to success in this program is to follow the simple steps and NOT change anything.'' More testimonials later but first, = PRINT THIS NOW FOR YOUR FUTURE REFERENCE == $ If you would like to make at least $500,000 every 4 to 5 months easily and comfortably, please read the following...THEN READ IT AGAIN and AGAIN!!! $ FOLLOW THE SIMPLE INSTRUCTIONS BELOW AND YOUR FINANCIAL DREAMS WILL COME TRUE, GUARANTEED! INSTRUCTIONS: =Order all 5 reports shown on the list below = For each report, send $5 CASH, THE NAME NUMBER OF THE REPORT YOU ARE ORDERING and YOUR E-MAIL ADDRESS to the person whose name appears ON THAT LIST next to the report. MAKE SURE YOUR RETURN ADDRESS IS ON YOUR ENVELOPE TOP LEFT CORNER in case of any mail problems. === When you place your order, make sure you order each of the 5 reports. You will need all 5 reports so that you can save them on your computer and resell them. YOUR TOTAL COST $5 X 5=$25.00. Within a few days you will receive, via e-mail, each of the 5 reports from these 5 different individuals. Save them on your computer so they will be accessible for you to send to the 1,000's of people who will order them from you. Also make a floppy of these reports and keep it on your desk in case something happens to your computer. IMPORTANT - DO NOT alter the names of the people who are listed next to each report, or their sequence on the list, in any way other than what is instructed below in steps '' 1 through 6 '' or you will loose out on a majority of your profits. Once you understand the way this works, you will also see how it does not work if you change it. Remember, this method has been tested, and if you alter it, it will NOT work!!! People have tried to put their friends/relatives names on all five thinking they could get all the money. But it does not work this way. Believe us, we all have tried to be greedy and then nothing happened. So Do Not try to change anything other than what is instructed. Because if you do, it will not work for you. Remember, honesty reaps the reward!!! 1 After you have ordered all 5 reports, take this advertisement and REMOVE the name address of the person in REPORT # 5. This person has made it through the cycle and is no doubt counting their fortune. 2 Move the name address in REPORT # 4 down TO REPORT # 5. 3 Move the name address in REPORT # 3 down TO REPORT # 4. 4 Move the name address in REPORT # 2 down TO REPORT # 3. 5 Move the name address in REPORT # 1 down TO REPORT # 2. 6 Insert YOUR
Report from NORML conference in Washington, DC
http://www.wired.com/news/politics/0,1283,43232,00.html Pot Backers Call for Reeferendum By Declan McCullagh ([EMAIL PROTECTED]) 2:30 p.m. Apr. 23, 2001 PDT WASHINGTON -- Hundreds of drug war critics gathered here this weekend to share political tips, marijuana cigarettes, pipes and bowls, and a growing sense of optimism about the future of drug legalization. The occasion was the National Organization for the Reform of Marijuana Laws convention, an annual event usually held around April 20, a date that has the same kind of significance to cannabis users that, say, July 4 has to patriots. In the ranks of the legalize-weed movement, NORML has a venerable history. It's been around since 1970, and has held 27 annual conventions so far -- only to see the drug war escalate during that time to include military troops, longer prison terms, and the creation of a federal bureaucracy that has become the arch-enemy of pot smokers. So why were the roughly 250 conference goers sounding almost, well, happy? It wasn't just the plentiful herb at the event. NORML believes that thanks to pro-legalization politicians like Gov. Gary Johnson (R-New Mexico) and Rep. Barney Frank (D-Massachusetts), state action on medical marijuana, and the spread of the Internet, public opinion may be shifting. We don't live in an isolated world anymore, said Allen St. Pierre, the executive director of the NORML Foundation. We can be watching people indulge in cannabis in an Amsterdam cafe via a webcam. St. Pierre said Johnson and Frank's support is heartening. We have not had a major political figure since the '70s come out and endorse a departure from the status quo. That's important and noteworthy to say the least. St. Pierre is talking about what former President Carter said in 1977: Penalties against drug use should not be more damaging to an individual than use of the drug itself. Nowhere is this more clear than in the laws against possession of marijuana in private for personal use. [...]
Re: Amtrak The War On Drugs
Ken Brown [EMAIL PROTECTED] wrote: You need phone numbers to buy train tickets? For most trains around here at least, the answer is no. You get on the train, and the conductor sells you a ticket to where you're going for cash. Or you can pay at the ticket office at the station beforehand, if there is one, to save a little money. -- Riad Wahby [EMAIL PROTECTED] MIT VI-2/A 2002 5105
Re: Reading List (for the umpteenth time....)
On Thu, 19 Apr 2001, James A. Donald wrote: Detweiler repeatedly attempted that hack in several different newsgroups and mailing lists, and repeatedly failed. Everyone would come to the conclusion that he was a loon, and that anyone who agreed with him was either a tentacle or a fellow loon. Hmm. I wouldn't care to advertise my ignorance (as Detweiler is certainly part of net.legend), what *was* the final outcome of that ordeal? (Feel free to answer offline, or to post links only.) Sampo Syreeni, aka decoy, mailto:[EMAIL PROTECTED], gsm: +358-50-5756111 student/math+cs/helsinki university, http://www.iki.fi/~decoy/front
RE: not getting it in Quebec
those pussies should have used pipe bombs, thats where it's at! - - Shaun Ollivierre Dream Developments/EHI [EMAIL PROTECTED] www.enphourell.com On Fri, 20 Apr 2001, Trei, Peter wrote: It would be cruel to use live animals. Maybe they should use stuffed shirts. Peter -- From: Blank Frank[SMTP:[EMAIL PROTECTED]] By mid-afternoon, protesters tore down a section of the concrete and chain-link security barricade and pelted police officers in riot gear with cans, bottles, rocks and stuffed animals. Officers responded by lobbing canisters of tear gas. Stuffed animals? Did they expect that the cops would use cheese-whiz instead of mace? http://dailynews.yahoo.com/h/ap/20010420/ts/summit.html Friday April 20 4:41 PM ET Quebec Summit Opens Amid Protests
Privacy Prez?
The Privacy President? By WILLIAM SAFIRE WASHINGTON Ñ In an action that left medical data-swappers sputtering with rage and the well-heeled intrusion lobby moaning about its "operational nightmare," President Bush struck a blow last week for the privacy of medical patients' records. Few expected Bush to make good on the belated rule changes his departing predecessor made that so offended health-care bureaucrats. But now doctors, hospitals and insurers are obliged to get patients' consent before passing around intimate personal information. This is only the beginning. During his campaign, Bush promised not only to uphold the principle of advance consent from users of the Internet and from depositors in banks, but to go after identity thieves and "make it a criminal offense to sell a person's Social Security number without his or her express consent." His spokesman made clear to Wall Street Journal reporters that despite pressures from marketers, bankers, H.M.O.'s and credit snoops, Bush had told his domestic policy advisers he would "tend to side with the privacy point of view." He doesn't go overboard Ñ he thinks parents, for example, should be able to see their children's records Ñ but he seems to grasp the essential principle. Meanwhile, the U.S. Court of Appeals here smacked one of the largest commercial snoops upside its headers. Trans Union Corporation, which has electronic dossiers on three out of four Americans, claimed a First Amendment right to sell credit information in mortgage applications to "target marketers" without the targeted consumers' permission. The intruder was willing to provide only an "opt-out," placing the burden of defending privacy on the unsuspecting victim. The court disagreed. It held that the government, through the Federal Trade Commission, could require companies to get an individual's permission before selling credit data on that person to salesmen looking for prospects with delicious vulnerabilities. The far-reaching court decision affirms the role of government in protecting the privacy of individuals. But what about government itself poking unnecessarily into people's private lives? Sure enough, with the executive and judicial branches awakening to the public's growing resentment of data rape, sleepy solons of the legislative branch are rubbing their eyes and noticing the issue. Senator Fred Thompson discovered that 64 government Web sites place "cookies" in the computers of site visitors, enabling the feds to track the viewing habits of citizens long after they have left the government site. The irate Tennessean promised hearings because "the federal government should be setting the standard for privacy protection in the Information Age." Rather than setting up talkathon commissions, Congress should be setting down laws, because banks, hospitals, colleges and dot-com enterprises have for years been paying lip service to privacy standards Ñ posting soothing "privacy policies" that are warrants for sustained snooping Ñ while making an open book of every person's health, personal habits and bank account. One oughta-be-a-law applies to a problem that touches a nerve in tens of millions of Americans: the abuse of Social Security numbers as identifiers, contrary to the specific intent of the system. Ostensibly used for identity protection, Social Security number abuse has led to increased stalking and even murder. And identity theft. Next on President Bush's privacy list is this spreading crime that ruins lives, not just credit ratings. In the Senate, Richard Shelby has been taking the lead on this, the D'Artagnan working with "the three privateers," Dianne Feinstein, Jon Kyl and Judd Gregg. Bush's signals have given heart to Clay Shaw in the House. He says, "We'll be dropping a new bill to protect Social Security numbers in the next couple of weeks, hold hearings before Memorial Day and look for Senate partners." Pitfall ahead: We'll see if Bush's appointee to head the Federal Trade Commission is as privacy-conscious as the departing chairman, Robert Pitofsky. But the tide she is a-turning. We have a Congress that is getting the word from constituents; a judiciary that remembers Justice Brandeis and his "right to be let alone"; a press beginning to assign privacy as a beat; and a man in the White House who may not be averse to being thought of as the privacy president.
Re: Stalking Louis Freeh
Although ChoicePoint says it has records on nearly every American with a credit card, it doesnt always provide access to that data. The companys Autotrack service is popular with many agencies and businesses and is also used by reporters at The Wall Street Journal. But entering the name of FBI Director Louis Freeh into the Autotrack database produces an error message. A company spokesman says ChoicePoint intentionally blocks Mr. Freehs records as an act of good corporate citizenship. I wonder if they would be willing to block my records as an act of good corporate citizenship.
Keysigning Party, Simi Valley, CA, USA
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 LUG-Fest (Linux User's Group Festival) an expo style event for Linux users in the bay area is going to hold a large keysigning party. If any cypherpunks are interested in attending here is the relevant information: LUG Fest April 21-22, 2001 at Nortel Networks, Simi Valley, CA, USA! Keysigning Party Press Release: http://www.lugfest.org/gpg.cgi "Sunday, April 22nd, 2001, 12:30 p.m, the Simi Valley Linux Users group will hold a GPG/PGP Key signing party during LUGFest IV. LUGFest IV will be held at Nortel Networks in Simi Valley, CA. The LUGFest and the key signing party are open to the public, all are welcome to attend." The lugfest press release links to the GnuPG Keysigning Party HOWTO, which I wrote. Constructive criticism of that document is appreciated. I posted in here once before for review and got some good feed back. It lives at: http://www.cryptnet.net/fdp/crypto/gpg-party.html I've been trying to get LUGs (linux user groups) around the country to start holding regular keysigning parties in the last 5 minutes of their meetings. LUGs exist in every major metro area in the US and meet regularly. They are capable a providing an excellent backbone (infrastructure support) for a strong nation wide web of trust. Local webs of trust formed by lugs can be linked at conferences like LUG-Fest. I strongly urge everyone who can to participate in the LUG-Fest party, and to thank LUG-Fest for holding it. Also, if you are a member of your local LUG, I urge you to help it establish a keysigning tradition and a strong web of trust. Thanks, - VAB -BEGIN PGP SIGNATURE- Version: GnuPG v1.0.4 (GNU/Linux) Comment: Made with pgp4pine 1.75-6 iD8DBQE62vWt+pIJc5kqSz8RArvHAJ4+nN/IBDjWIpEUWoU61m3Eo3NzuwCeJGcg 6DiqV+fs2HWcE5oxmrtxbfc= =bCzD -END PGP SIGNATURE-
Re: hello, I would like to learn how to hack a bit
Certainly. Head down to the local hardware store and buy yourself a very large axe. Now find something you want to hack, lift the axe over your head, and bring it down edge first. You may need to hack three or four times before you break all the way through. It's easy once you get the hang of it. Bear On Mon, 16 Apr 2001, roland wrote: but I'm not verry good jet, can u tell me how pls answer me quick
Misc p2p article
Also, today's NYT has an article about national security needs for more language experts. http://interactive.wsj.com/articles/SB987356381635082061.htm # #April 16, 2001 # #Asian Technology # #Two New Peer-to-Peer Programs Aim High, but Still Have Glitches # #By JEREMY WAGSTAFF Staff Reporter of THE WALL STREET JOURNAL # #Time to grovel. I was hoping this week to be able to trumpet #a bunch of new programs that free you from some of the physical #constraints of modern computing. I was hoping to be able to say #that, at last, you were free of shackles such as overprotective #technical staff, the corporate Intranet and endless e-mail #attachments. # #But paradise, I'm afraid to say, has to be postponed for a while. #The two programs I've been toying with, new versions of which #were both released last week, are Groove Networks Inc.'s Groove #(www.groove.net1 ) and GoToMyPC (www.gotomypc.com2 ) from #Expertcity Inc. # #Groove is the first serious attempt to introduce peer-to-peer #computing to the business marketplace, giving employees a chance #to communicate and share files by setting up their own online #work groups. GoToMyPC offers the first Web-based -- and legal #-- method of accessing and controlling another computer. Both, #in theory, are great ideas, elegant in their simplicity and #genuinely useful. But neither worked perfectly. # #Peer-to-peer computing -- where multiple users can interact #directly, rather than through a server -- is probably the next #great thing for the Internet. Best known as a way to swap music #over the Net via Napster, so-called P-to-P applications allow #much more, such as letting users share files, messages or #calendars, or collaborate in real time on a document or drawing. # #As I've mentioned before, the Web will start coming into its #own once people stop obsessing about how to make money out of #other users and start capitalizing on the intrinsic benefits #of having millions of people all sharing a network. # #Peer-to-peer computing offers users the chance to set up their #own personalized networks atop the public Web. Without these #P-to-P systems, people have to use a number of imperfect #alternatives. For instance, users can rely on their Internet- #service providers to provide the tools (but they may be held #hostage to proprietary programs or HTML); or use corporate #networks (jealously guarded by techies rightly afraid of viruses #and other abuses); or shuffle e-mail messages among team members #(a cumbersome process). # #In practice, Groove isn't quite mature yet. The preview edition #looks and feels professional, and carries loads of useful #features, including instant messaging, file sharing, even a #doodling pad. It also supposedly works behind a firewall, and #around problems such as connecting to computers that share the #same Internet connection. # #Although the program is sturdier than its beta ancestors, I found #it unstable and unreliable. On one computer it wouldn't load #properly; on another it behaved erratically through the company #firewall and offered no easily accessible options that I could #tweak to make it perform better. # #Disappointing, but not fatal. Groove, or something like it, is #definitely the wave of the future: Freeing up employees to set #up their own peer groups without cluttering the corporate Intranet #makes sense. Pharmaceutical company GlaxoSmithKline, for one, #agrees: Last week it bought 10,000 licenses for more than 100,000 #employees world-wide, making it Groove Networks' first paying #customer. # #GoToMyPC, meanwhile, tackles a similar problem from a slightly #different angle, and is a unilateral peer-to-peer system, rather #than the more common variety that lets anyone talk to anyone #else. Whether on the Net or not, users have been hamstrung by #the fact that generally they only can run one computer at a time. #Working from home? Chances are you only can access the office #network with difficulty. Forget a vital file at home? There are #only one or two programs available that allow you to access a #remote computer, and most of them aren't Internet-based. Instead, #these programs rely on actually dialing into the computer via #a phone line. # #GoToMyPC aims to make the process simpler by harnessing the #Internet to link computers. It sounds simple, and it is: Assuming #the two computers are connected to the Internet (and most office #computers permanently are hooked up, as are PCs on a cable modem #or other high-speed Internet connection), the software merely #links them together. It establishes
Epilogue: U.S. v. Jim Bell trial in federal court in Tacoma
Four articles are excerpted below: Wired News on government's motion to seal public court records Sierra Times: "IRS Prosecutes Outspoken Dissident" About.com: "Jim Bell's show trial" Cluebot.com on how government surveillance killed the cypherpunks list -Declan *** http://www.wired.com/news/politics/0,1283,43064,00.html The U.S. government wants to seal public court records in a trial of an Internet essayist for privacy reasons. Assistant U.S. Attorney Robb London this week asked a federal judge to seal all documents -- including exhibits and transcripts -- that might include personal information and home addresses about people who testified in the trial of Jim Bell. A jury found Bell guilty of two counts of interstate stalking. London said: "We are concerned that information in these exhibits not be published... (We) don't need to have that information posted on the Internet." While the charges are crucial to understanding the case against Bell, the government feels uneasy about the home addresses of federal agents being easily accessible to the public. London cited the addresses of agents dozens of times in open court, and displayed digital photographs of the homes Bell visited. U.S. District Judge Jack Tanner thought about London's request for a moment, then denied it. "I don't think I have the authority to do that," Tanner said. [The meaning was changed slightly in editing. The fourth paragraph should be "addresses of people Bell *believed* to be federal agents but were not. One was, for instance, a real estate agent. --DBM] *** http://www.sierratimes.com/archive/files/apr/13/arst041301.htm IRS Prosecutes Outspoken Dissident SierraTimes 04.13.00 James Dalton Bell may remind you of somebody you know. He's very bright, dresses and looks like a nerd and, most importantly, he dislikes the IRS. In that last respect, he is not in a minority. Where Jim Bell does fall into a minority is that instead of merely grumbling quietly, he decided to do something about it. And that's why he was just convicted in the Washington Federal District Court in Tacoma on Tuesday [4/10/2001]. Jim Bell has been a lifelong libertarian, ever since he was a teenager. Bell's view of government was that it was unnecessary. Is he an anarchist? Only, as he puts it, in the sense of "I believe in order; I do not believe in orders." He disparaged the huge hierarchies that have evolved in current bureaucracies, and believed that such hierarchies were unresponsive and dehumanizing. And, as Bell would personally learn, such a hierarchy creates two classes as outlined in George Orwell's Animal Farm: those who are part of the government hierarchy, and those who are not. [...] Bell, in his defense, stated that he had signed the LP oath that he would not initiate violence. And there was absolutely no direct evidence that he had ever initiated violence against anyone. People that he had come in contact with in his 2000 investigation characterized him as polite, and did not see him as threat. And Bell had obviously taken no discernible steps that would equip him to initiate violence. So what the government was left with was prosecuting a thought crime: intent. Because Bell had used his freedom of political speech to write such items as "Assassination Politics" and disclose IRS agents' home addresses, he obviously had to have the intent to harass federal agents. And the harassment was loosely construed. Any attempt to find or disclose any personal information about an agent can be made to fit federal law against "intention to harass or injure" an agent. Several times during the trial, the prosecutor made it clear that such an investigation was inappropriate and illegal merely on the basis that the subjects of such investigation were federal agents. Numerous times he cited the special privilege that agents hold that ordinary citizens don't possess. Federal agents are, indeed, a breed apart and must be specially protected, he insisted. While they could surveil and investigate ordinary citizens, it was illegal for ordinary citizens to do the same to them. [...] *** http://civilliberty.about.com/newsissues/civilliberty/library/weekly/aa041101a.htm Jim Bell's show trial Cypherpunk Jim Bell was found guilty of making the feds nervous Dateline: 4/11/01 Jim Bell has been probed, raided and arrested. He spent time in prison for "obstructing" Internal Revenue Service agents and using a false Social Security number. Now Bell has been convicted for get this stalking government
DoD's Counterdrug Technology Office Launches Biometrics Catalog
NATIONAL INSTITUTE OF JUSTICE (NIJ) Biometrics Catalog Online NIJ has teamed with the U.S. Department of Defense's Counterdrug Technology Development Program Office to launch the online Biometrics Catalog. Biometrics consist of automated methods for recognizing a person based on physiological or behavioral characteristics such as fingerprints, voice patterns, facial recognition, etc. The catalog provides a single location to find information about biometric technologies and allows the Biometrics community to share information about commercial products, development efforts, and government evaluations. To visit the Biometrics Catalog online, please go to the following: http://www.biometricscatalog.org/ You can search in the following categories: Fingerprint, hand geometry, eye-retinal, eye-iris, facial recognition, speaker, dynamic signature, multiple biometric, and other types. I did a sample search on facial recognition and commercially available products and got these hits. BioANTS-Face 4/3/01 FaceIt 7/28/00 FaceMail4/2/01 FaceVACS3/30/01 HNeT Acsys FRS...4/2/01 MindsEye 4/5/01 President 4/2/01 Here's the info for the "President" package: Modified: 4/2/01 9:01:00 PM Category: Commercially Available Products Biometric Type: Facial Recognition Vendor: Biometrica Title: President Description: Biometrica Systems, Inc. supplies facial recognition technology to casinos worldwide. In addition, their software is used by law enforcement and other surveillance departments worldwide. Additional References Related sites: Biometrica Systems, Inc. http://www.biometrica.com Now I'm just going to have to make sure I remember to invest in those theatrical mask companies...Or I could just celebrate Halloween all year long. Regards, Matt- ** Subscribe to Freematt's Alerts: Pro-Individual Rights Issues Send a blank message to: [EMAIL PROTECTED] with the words subscribe FA on the subject line. List is private and moderated (7-30 messages per week) Matthew Gaylor, 2175 Bayfield Drive, Columbus, OH 43229 (614) 313-5722 ICQ: 106212065 Archived at http://groups.yahoo.com/group/fa/ **
Re: Starium?
Peter, Thanks for the tip on that. I'll be looking out for it, although at that price, it's cheaper to buy a dedicated PC and run SpeakFreely, as you point out. Linux PDAs with good sound chips are just around the corner, apparently, and it seems that it shouldn't be too big a feat to get SpeakFreely or something similar running on them. These PDAs are a lot cheaper than the dedicated encryption hardware, such as Starium, which was going to price at around $500, last I heard. Also, because everything in the PDA is open source, it would be easier to trust it. Maybe when I have time and money to do it, and the PDAs with the necessary hardware are really shipping, I'll do some project like this. Basically, all it needs would be a full-duplex sound chip, and a built-in modem, and a reasonably fast CPU. It's just a shame that we have encryption all over the place, except for the one medium which we probably use the most: voice.
Re: hello, I would like to learn how to hack a bit
It's very simple. Go to a military surplus store or your local Wall-Mart and buy a machete. If you buy a surplus one, you may want to sharpen it and polish the rusty blade, although this step is not essential because one may hack quite noisily and dramatically with a rusty dull machete. Go out in your back yard and find some brush or small trees. (Bamboo works well but may not be available in your area.) Hack away -- it's that simple! Disclaimer: In many states, if you hack at decorative trees or shrubs that do not belong to you, you may be liable for a sum in damages equal to thrice the actual value of the vegetation destroyed. -- Daniel - Original Message - From: roland [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Monday, April 16, 2001 5:02 AM Subject: CDR: hello, I would like to learn how to hack a bit but I'm not verry good jet, can u tell me how pls answer me quick
RE: Starium?
Here it is http://www.L-3Com.com/cs-east/programs/infosec/privatel.htm 3DES, 1024 bit D-H, TEMPEST compliant. Handles both voice and data. -- From: Trei, Peter Reply To: Trei, Peter Sent: Monday, April 16, 2001 1:35 PM To: Dr. Evil; 'Declan McCullagh' Cc: [EMAIL PROTECTED] Subject: RE: Starium? At the RSA conference I saw a company selling Starium-equivalent units, both for voice and data encryption. The voice only units were about $1400 apiece. (frankly, at that price, you could plug a PC with an A/D converter card between the handset and the base, and roll your own). I'm still decompressing, and have not unpacked all my bumph, else I'd have more specific data. Peter Trei -- From: Declan McCullagh[SMTP:[EMAIL PROTECTED]] Reply To: Declan McCullagh Sent: Sunday, April 15, 2001 1:46 PM To: Dr. Evil Cc: [EMAIL PROTECTED] Subject:Re: Starium? I have a pair of their preproduction units they sent me in December. --Declan On Sun, Apr 15, 2001 at 02:01:10AM -, Dr. Evil wrote: Does anyone know if Starium is ever going to release anything? I noticed on their News section that they have engaged an MA specialist. That's probably not a good sign for them operating as a stand-alone company. email to them bounces.
Starium?
Does anyone know if Starium is ever going to release anything? I noticed on their News section that they have engaged an MA specialist. That's probably not a good sign for them operating as a stand-alone company. email to them bounces.
John Walsh broadcasts Most Wanted sans underwear! (horrors!)
Something I've never bought before - "Globe" 4/17/2001 - has compromising photos of John Walsh and another babe. "Caught! America's most perverted host" He's been married 29 years, but apparently his new fame (Wanted) has led him to keep mistresses and take pictures of them when he gets head! Alrighty! Yet another person claiming to be morally superior, exposed. Of course, he's shirtless in one photo, and holding up his tee shirt in another to flash his nipple (like a girl)! snicker When will they show Jeff Gordon fucking himself with his gun? BANG oops...one too many anal clenches. Next time you see Walsh covering one of the FBI's 10 most wanted, remember that he's not wearing any underwear - he's too sexy for that. A magazine without an URL? I guess so. Found some interesting stuff at an unrelated globe.com. Articles are snipped. http://www.globe.com/news/daily/13/indian_names.htm # #Civil rights panel urges end to Indian sports names at schools # #By Greg Toppo, Associated Press, 04/13/01 # #WASHINGTON -- Saying the use of Indian names and mascots may #violate anti-discrimination laws, the U.S. Commission on Civil #Rights called for an end to their use by non-Indian schools, #colleges and universities. # #The commission said Indian names and mascots could be viewed #as "disrespectful and offensive" by Indian groups and can create #"a racially hostile educational environment that may be #intimidating to Indian students." How about a fire-breathing Reno? http://www.globe.com/news/daily/13/smiley.htm Creator of Smiley Face icon dies at 79 By Associated Press, 04/13/01 WORCESTER -- Harvey R. Ball, whose simple drawing of a smiling face on a yellow background became a cultural icon, died Thursday after a short illness. He was 79. Ball, who co-owned an advertising and public relations firm in Worcester, designed the Smiley Face in 1963 to boost the morale of workers in two recently merged insurance companies. Ball was paid $45 for his artwork by State Mutual Life Assurance Cos. of America -- now Allamerica -- in 1963. He never applied for a trademark or copyright, something his son, Charles Ball, said his father never regretted. "He was not a money-driven guy," Charles Ball told the Telegram and Gazette of Worcester. "He used to say, `Hey, I can only eat one steak at a time, drive one car at a time."' http://www.globe.com/news/daily/13/bush_game.htm Bush virtual pet game popularity soars in China By D. Ian Hopper, Associated Press, 04/13/01 WASHINGTON -- In the aftermath of the downed U.S. spy plane, the Chinese apparently have found a new way to ridicule President Bush -- a virtual pet modeled after him. While the U.S.-made PortaBush software for handheld computers wasn't released with much fanfare last week, it became a big hit in China very quickly. The software's American designers noticed a huge traffic spike Thursday coming from China, at one point reaching about 2,000 downloads in an hour and threatening to overwhelm their servers. "About 80 percent of the downloads were coming from China," Eruptor Entertainment President Brad Foxhoven said Friday. "We just got too much traffic in such a short period of time that wasn't letting up." Released a week ago by Marina Del Ray, Calif.-based Eruptor Entertainment, the software toy is similar to the faded Tamagotchi craze. Players feed their PortaBush, keep him happy and help him make vital national decisions like whether to bomb teen singer Britney Spears.
Fwd: REQUESTED LINKS
Hello, I was just recently introduced to this company but within 2 weeks I was cashing my first check for over 1000 dollars! And two weeks later I received a check for even more. Folks this company is blowing up right now! Remember Microsoft, and Amazon.com Givin the chance to get involved ground floor now, you would never pass it up but back then you may have as many did. DON'T LET THIS ONE PASS YOU BUY YOU OWE IT TO YOURSELF TO AT LEAST TAKE A GOOD LOOK! CLICK THE LINK BELOW http://www.geocities.com/tellmemore1232/networkpage.html OR... If you already found the company you call home, we offer custom leads qualified for your opportunity, every thing is 33% off this next week only! CLICK THE LINK BELOW http://www.geocities.com/bemyguest421/leadpage.html * THIS EMAIL COMPLIES WITH ALL REGULATIONS. TO BE REMOVED WITHIN 24 Hours, SIMPLYEMAIL [EMAIL PROTECTED] FOR IMMEDIATE REMOVAL FROM ANY FUTURE EMAILS FROM OUR COMPANY. *
Used Exercise Equipment
"ATTENTION Therapy Center Operators." Join FREE -- Exercise Equipment for Physical Therapy, Rehabil- itaion Centers. Save thousands of dollars on 'Gym' quality exercise equipment. Get photo links, specif- ications and all the information you need to save money. -- Fitness Equipment On A 'Budget' Get notified by email when Fitness Equipment is on sale. A 'Fitness Center' goes out of business or when a huge Factory Closeout sale is going to take place. -- Get: Treadmills, Stair machines, Elliptical trainers, Exercise bikes, UBE ergometers. Weight lifting machines. -- Many valuable resources will be sent to you by email. -- Dealers Welcome -- To join this FREE 'Notification Service' click here. http://www.LegalNotification.org/submit.php -- Someone has subscribed you to receive this information. To unsubscribe click this link http://www.LegalNotification.org/remove.php (Do not click "reply" to be removed) --
mail forwarders
There's a good smtp forwarder at 127.0.0.1 At 02:36 AM 04/13/2001 -0500, Charles wrote: hello cyberpunks, I want to know if yo know a good free( or low cost) bulk email program to send massive email or a good SMTP servers to can send many emails without problems, what you recommend me? or if you want to recommend me something? charles.
Re: Cypherpunks, Feds, and Pudgyfaced Voyeurism
Quoting Ray Dillinger [EMAIL PROTECTED]: On Wed, 11 Apr 2001, Declan McCullagh wrote: It's all so sad and predictable and sad again. The cypherpunks list had its glory days: Wired magazine cover stories, blossoming technology, and, yes, even those damnable tentacles. Now it's become a convenient way for the Feds to land convictions. Perhaps it is time to consider a new and different mailing list which accepts messages ONLY from remailers. It would be publicly archived and unmoderated just as cypherpunks is, and monitored by the lions just as cypherpunks is, but now that the thought-crime laws are setting in full force, it could provide a forum where there wouldn't be such a simple evidentiary chain from post to poster. But how are we going to filter Choatian messages?
Re: Cypherpunks, Feds, and Pudgyfaced Voyeurism
Unindictedcoconspiritors? Tentaclenet? Targetzone? Shootmeplease? -- DS "Y'know, if the earth were flat, all the Chinese would fall off..." -- Firesign Theatre
One produces an access device by designing it..
Found this. Its a model jury instruction re counterfeit access devices. Interesting thing is that mere 'design' supposedly counts (see near bottom). [How do you show 'fraud' when all you have is a napkin with a design?] Ninth Circuit Model Criminal Jury Instructions 8.68 COUNTERFEIT ACCESS DEVICES PRODUCTION, USE, OR TRAFFICKING (18 U.S.C. 1029(a)(1)) The defendant is charged in [Count ___ of] the indictment with [production of] [use of] [trafficking in] [a] counterfeit access device[s] in violation of Section 1029(a)(1) of Title 18 of the United States Code. In order for the defendant to be found guilty of that charge, the government must prove each of the following elements beyond a reasonable doubt: First, the defendant knowingly [used] [produced] [trafficked in] a counterfeit [access device] [specific type device, e.g., card number, plate number, code number, account number, personal identification number, etc.]; Second, the defendant acted with intent to defraud; and Third, the defendant's conduct in some way affected commerce between one state and [an]other state[s], or between a state or the United States and a foreign country. An "access device" means any card, plate, code, account number, electronic serial number, mobile identification number, personal identification number, or other telecommunications service, equipment, or instrument identifier, or other means of account access that can be used, alone or in conjunction with another access device, that can be used alone or in conjunction with another access device, to obtain money, goods, services, or any other thing of value, or that can be used to initiate a transfer of funds (other than a transfer originated solely by paper instrument). [A "counterfeit access device" is any access device that is counterfeit, fictitious, altered or forged, or an identifiable component of an access device or a counterfeit access device.] [One "produces" an access device by designing it, altering it, authenticating it, duplicating it, or assembling it.] [One "traffics" in an access device by transferring it or otherwise disposing of it to another, or by obtaining control of it with intent to transfer or dispose of it.] http://207.41.19.15/web/sdocuments.nsf/dcf4f914455891d4882564b40001f6dc/bbf68d26da5ebee2882564ba007da0b0?OpenDocument
Re: How do we expect to even find them ...
How do we expect to even find them, when they're using mixmasters to remain anonymous? Do you know what a mixmaster is? This is exactly the problem. from "Can hackers help stop child porn on the Net?" I see now, this is why ICC is enlisting cypherpunks. --- High Commissioner of the Cypherpunk Party Enforcement Division The target list for April 20 operation: $M"#HAO'BGQ$K*!H^F-;@LT!4W3%DB'/"MC$07/5)%1KRREE6+BH:,Y#@[MQ 3USJ`0XP:8XYKJC\V$*6L%KI_%,HX5Y+[1;9_/5(FU_?0;-6VRJUY5"CF M#SL;;QV?5!Q+XH3I-7Q^.;K01,FH#'NAWR#V2G)VT5O?I$\=MKGD6$C)Q !H=MN:ZO.7%]_L@CJ_K35;'H[J73]FG[IZLF1]8+U6*/\!DGQ`38VOGL4@8 3=W^'%BHP6'XR,-)!T,G1.N%T2^"CAG3RL)L`D^L)3+IQJ=*LO(_R% P@L]4B*5W8Q57/.!N%^O]GTZOQS3'86R2ULAU"'5)UU4CVKSG#%P[?'RF ;R)]_=%6!CGH4GP/CF`:\E^LN6KVPN%'G`(\9.E%A+.#_@$?E63YW@ O3A*W]0L$)*==N),`-C,S8*(,#TE6H?59X[!4?I43A6$-!^\LVH2\]9-NL ==`/\^GC8_T!UEJE'9O5`G,#O-)_%E\T+^9AW7P(E8BQ\`4@59#-5#AAJ8 2GY"=X/$A@DFS6_JME?PU=NG4$^1J*UP;4T%+A*"\:2,Z"P8O@2S[E9:A 7G[%.1C._/%TPA$:]HDNK?*P(O\+)H8%\TZ)E)(:9/:8Y;X24U'NV7AQ"@3 ;"R''OSM%\@,[267:MK^)?%./*/\H,4N%R!_5D%@,0D)HX#_GPG.I?Z/.TA A2*HD$OIB!4H$QN`.E,$"$8B`\!E+I1$P4$?#Z6+YE9I"D_MR=YCH!#0X UDB(@9B4::+162)G%Q',@CN]Y2S=\!D@4M\]O-1H'Z'#2OB?(S__5WJ
Re: Cypherpunks, Feds, and Pudgyfaced Voyeurism
On Wed, 11 Apr 2001, Declan McCullagh wrote: It's all so sad and predictable and sad again. The cypherpunks list had its glory days: Wired magazine cover stories, blossoming technology, and, yes, even those damnable tentacles. Now it's become a convenient way for the Feds to land convictions. Perhaps it is time to consider a new and different mailing list which accepts messages ONLY from remailers. It would be publicly archived and unmoderated just as cypherpunks is, and monitored by the lions just as cypherpunks is, but now that the thought-crime laws are setting in full force, it could provide a forum where there wouldn't be such a simple evidentiary chain from post to poster. Given the recent spate of events, and the fact that some forms of political speech now seem to be a crime, or at least grounds for legal harassment and admissible as evidence of other crimes, I will probably have to set up such a list -- more info when it's ready to accept posts. The best name (cypherpunks) seems to be taken. Hmm. I will have to consider. The naming of things is a ticklish business. Bear
Re: Cypherpunks, Feds, and Pudgyfaced Voyeurism
Hmm. Anyone know what are some extant web-to-email remailers, and what Type I remailers exist? -Declan On Wed, Apr 11, 2001 at 06:43:10PM -0700, Ray Dillinger wrote: On Wed, 11 Apr 2001, Declan McCullagh wrote: It's all so sad and predictable and sad again. The cypherpunks list had its glory days: Wired magazine cover stories, blossoming technology, and, yes, even those damnable tentacles. Now it's become a convenient way for the Feds to land convictions. Perhaps it is time to consider a new and different mailing list which accepts messages ONLY from remailers. It would be publicly archived and unmoderated just as cypherpunks is, and monitored by the lions just as cypherpunks is, but now that the thought-crime laws are setting in full force, it could provide a forum where there wouldn't be such a simple evidentiary chain from post to poster. Given the recent spate of events, and the fact that some forms of political speech now seem to be a crime, or at least grounds for legal harassment and admissible as evidence of other crimes, I will probably have to set up such a list -- more info when it's ready to accept posts. The best name (cypherpunks) seems to be taken. Hmm. I will have to consider. The naming of things is a ticklish business. Bear
Tanner Tannerwatch
You can be sure that Tanner has learned all about the "TannerWatch" website, and is hardly amused by it. A public figure, on the taxpayer's dime no less, who is 'hardly amused' by a collection of freely-obtainable documents, some of which were written by his misguided admirers, and some by more astute observers? Awww, poor widdle baby. If you can't take the heat get out of the kitchen, boy.
Re: Seth Finkelstein, reluctant cypherpunk?
On Tue, 3 Apr 2001, Declan McCullagh wrote: Obviously there are going to be some points of agreement. Seth is a liberal and a programmer who is going to like strong crypto, free speech (only the types the ACLU approves of, naturally), and so on. But on cases involving free trade, commercial speech, critiques of government regulation, Seth is an aggressive anti-cypherpunk and proud of it. Huh? That's like being for an atmosphere but against gravity. If there is strong crypto, then everybody, including traders, government critics, etc, is going to do whatever the hell they want to do with information. Being in favor of something but against its consequences is a state of fundamental conflict, and people who hold such conflicted views are generally ignorable without loss of information in the long run. So if that's the case, why should we even care what he thinks? He's wrong, that's all. Bear
Re: How the Justice Department screws with a reporter
I found out that Worldtravel had moved my flight to a Tuesday departure that would get into the city that afternoon, *after* the proceedings had begun. That could (understandably) piss off the judge -- I'd be violating a This is my worst nightmare. We are ruled by infantile idiots. Oh, the shame, the shame !
RE: DOJ steps up child porn fight, plan regulates digital cameras
At 08:59 PM 4/2/01 -0700, Alan Olsen wrote: On Mon, 2 Apr 2001, David Honig wrote: but while working for aol i remember companies trying to sell me on the concept of 'anti-porn' pic filtering software. it worked by looking for a high percentage of flesh tones in a pic. Yeah but all that blue latex and black leather screws up the pinkfilter. To say nothing of the feathers, whipped cream, or blood. Or that not all people are pink. Yeah, if your porn-AI can parse http://www.mccullagh.org/theme/dazzle-dancers.html you're a better heurist than I.
No Subject
ics.com From: "Trei, Peter" [EMAIL PROTECTED] To: [EMAIL PROTECTED] X-Orig-To: "'[EMAIL PROTECTED]'" [EMAIL PROTECTED] Subject: RSA Conference Expo Free Passes Date: Tue, 3 Apr 2001 16:39:37 -0400 MIME-Version: 1.0 X-Mailer: Internet Mail Service (5.5.2650.21) Content-Type: text/plain Approved: LISTMEMBER CPUNK Sorry for the late notice, but I just found out that the deadline for obtaining free passes has been extended. While the website puts the free pass period as ending a month ago, they are actually still available, but will probably end today. What: Expo section at the RSA Security 2001 Conference Where: Moscone Center, San Francisco When: 9am-5pm 10-11 April 2001 How: Regsiter at www.rsaconference.com Peter Trei
Re: Seth Finkelstein, reluctant cypherpunk?
Declan writes: It's important for cypherpunks to understand why Seth Finkelstein has (apparently) recently subscribed to the list. Seth is essentially an anti-cypherpunk, someone who violently disagrees with free-market points of view and has spent (a conservative estimate) hundreds of hours arguing against them. Thanks, Declan. I think we've all figured that out by now. "Libertarians are people who think the only legitimate function of police is to protect them from their slaves." --Lots of People Most people get sucked into Libertarianism because it sounds like the word "liberty." After learning more about it, and meeting real Libertarians, they go "Icky-Poo" and run swiftly in the opposite direction. Libertarians don't mind this, because most of them also feel the exact same way about other Libertarians. Libertarian "philosophy" provides no mechanism whatsoever for arguing that there can't, for instance, be a death penalty. Or that "child abuse" should be defined by anything other than what the majority of non-children think it is ok to do to kids. I doubt you'll see any Libertarians protesting either when Sally Mann and Jock Sturges are hauled off to the Sex Offender Re-Education Camp either. In fact, Libertarians are real good at letting everyone have whatever rights they can personally defend, without anyone else lifting a finger. Foo on Libertarians. I have no use for them. Can you imagine what Libertarian foreign policy would look like, or a Libertarian space program? -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law"
RE: DOJ steps up child porn fight, plan regulates digital cameras
At 05:55 PM 4/2/01 -0400, Phillip H. Zakas wrote: ya know this does sound like an april fools joke (esp. the part about encouraging the photographer to enter into counseling.) Particularly if you only ran across it Monday. Got Mr. Bear, too. There are some cute RFCs dated 1.4.x too. but while working for aol i remember companies trying to sell me on the concept of 'anti-porn' pic filtering software. it worked by looking for a high percentage of flesh tones in a pic. Yeah but all that blue latex and black leather screws up the pinkfilter. To say nothing of the feathers, whipped cream, or blood.
Join Shopping Investing Club...
Title: Join Shopping Investing Clubs... This is not Junk Mail. See our Anti-Spam Alert below... This is an invitation for you to review the newest concepts in both Shopping and Investing. Visit our web site at SpecialtyOnlineSales.com and review these concepts to see if they fit into your style. Click on the link to seamlessly explore. SHOPPING: Each month SpecialtyOnlineSales.com will present a category of products (usually four to six items), direct from the manufacturer to you. There will be a limited quantity of these items available for a limited time. You can review and make a selection by clicking onto our store at Yahoo.com. Your purchase will be shipped directly to your home or office. Then, each month, we will send you an e-mail itemizing the newest selections. INVESTING: Are you an online investor? Do you want to gain an edge on the big boys? SpecialtyOnlineSales.com is a clearinghouse for an Investing Consortium. You still do all of your own investing and handle all of your own money, but you do it in consort with many other club members. SOS2001.net is a consortium of independent traders interested in maximizing their investment potential by acting as a collective block. Volume of trading can influence price and subsequent participation. Click on our site to review this newest concept. ANTI-SPAM ALERT: This e-mail invitation was sent to you because at some time you opted-into a list and asked to receive information on special offers. If this e-mail is not acceptable to you, please reply by clicking the link below and we will remove you immediately from any further mailings. Click here: SpecialtyOnlineSales.com
Re: PGP flaw found by Czech firm allows dig sig to be forged
In article [EMAIL PROTECTED], Declan McCullagh [EMAIL PROTECTED] wrote: Pretty Good Privacy that permits digital signatures to be forged in some situations. Phil Zimmermann, the PGP inventor who's now the director of the OpenPGP Consortium, said on Wednesday that he and a Network Associates (NETA) engineer verified that the vulnerability exists. ICZ, a Prague company with 450 employees, said that two of its cryptologists unearthed a bug in the OpenPGP format that allows an adversary who breaks into your computer to forge your e-mail signature. A "vulnerability" that requires the opponent to have write access to your private key in order to exploit? Okay. What was PGP's threat model again? I'd have sworn that this was squarely outside it. As far as I can tell, *NOBODY* offers security tools that offer real protection in the event your opponent has physical access to the machine. Bear
Re: PGP flaw found by Czech firm allows dig sig to be forged
A "vulnerability" that requires the opponent to have write access to your private key in order to exploit? Okay. What was PGP's threat model again? I'd have sworn that this was squarely outside it. Probably. Do you need only write access? What does that do for smart cards - if anything? -David
RE: PGP flaw found by Czech firm allows dig sig to be forged
"...As far as I can tell, *NOBODY* offers security tools that offer real protection in the event your opponent has physical access to the machine... Bear" I completely agree. Even if they didn't have access to the machine, losing the private key is a huge problem. I should point out a similar problem exists with microsoft's crypto api (capi). by replacing rsaenh.dll (and one other i could name later...details are on my research laptop and not on this machine) one could dummy down encryption or eliminate encryption control across all crypto api-compliant applications (like ms outlook, explorer, etc.) in fact this 'crack' is simiar to the 'upgrade' ms offers users to go from 56 to 128 bit encryption. interestingly, in order to gain export assurance for a crypto product, it's usually enough to state that your product's crypto relies on the MS crypto api. this is because the ms crypto api architecture has already received an "ok" for export (with caveats re: 128 bit encryption.) i've been through this process so I know the 'crack' and the export license information is correct (as of one year ago anyway). the most significant problem with pki, imho, is the fact one can't verify the publisher of the key. the public key could have been stolen/modified, or the issuer of the key may not have verified the true identity of the requestor. i could, right now, buy for $14.95, a digital cert from verisign claiming I'm napoleon bonaparte. and it would be published in their digital cert. directory as true. ya know, i'm going to do that right now. anyway, as many have already echoed here, gaining access to an adversary's machine provides more interesting possibilities than simply modifying a user's secret key. i would hope the cnsa would try to be more creative than that. phillip In article [EMAIL PROTECTED], Declan McCullagh [EMAIL PROTECTED] wrote: Pretty Good Privacy that permits digital signatures to be forged in some situations. Phil Zimmermann, the PGP inventor who's now the director of the OpenPGP Consortium, said on Wednesday that he and a Network Associates (NETA) engineer verified that the vulnerability exists. ICZ, a Prague company with 450 employees, said that two of its cryptologists unearthed a bug in the OpenPGP format that allows an adversary who breaks into your computer to forge your e-mail signature. A "vulnerability" that requires the opponent to have write access to your private key in order to exploit? Okay. What was PGP's threat model again? I'd have sworn that this was squarely outside it. As far as I can tell, *NOBODY* offers security tools that offer real protection in the event your opponent has physical access to the machine. Bear
E-Mail Marketing at its Best
PROMOTIONS OF AMERICA ENTERPRISES INC. IMPACT ADVERTISEMENT AT ITS BEST PROMOTIONS OF AMERICA ENTERPRISES INC. OFFERS AN EXCITING NEW WAY TO ADVERTISE YOUR PRODUCTS THROUGH THE INTERNET. EXCLUSIVE E-MAIL MARKETING DIRECT TO YOUR CONSUMER BASE. CHOOSE YOUR GEOGRAPHICAL LOCATION BY STATE OR CITY. HAVE US CREATE YOUR AD WITH COLOR AND FUNCTIONING HYPER LINKS. WE WILL SEND YOUR E-MAIL AD FOR YOUR BUSINESS. ALL LISTS ARE OPT-IN INCLUDING OUR CONSUMER AND BUSINESS DATABASE. 100,000 CONSUMER E-MAILS $550.00 300,000 CONSUMER E-MAILS$1100.00 50,000 CONSUMER E-MAILS $300.00 (LIMITED TIME OFFER) CALL FOR MORE DETAILS 1-877-970-1777 TO BE REMOVED FROM THIS E-MAIL LIST TYPE REMOVE IN THE REPLY TO BOX
Re: PGP flaw found by Czech firm allows dig sig to be forged
In article 99b89r$lgd$[EMAIL PROTECTED], Ian Goldberg [EMAIL PROTECTED] wrote: If p is wrong, the result S' will be correct mod q but incorrect mod p. so S' ^ e mod q = M mod q, but S' ^ e mod p != M mod p. Therefore GCD(S' ^ e mod n, M) = q, and we're done. I think you meant GCD((S'^e mod n)-M, n) = q. I don't think what you said is true, since q does not necessarily divide M. - Nikita
Re: PGP flaw found by Czech firm allows dig sig to be forged
In article [EMAIL PROTECTED], Declan McCullagh [EMAIL PROTECTED] wrote: http://www.wired.com/news/politics/0,1283,42553,00.html Your E-Hancock Can Be Forged by Declan McCullagh ([EMAIL PROTECTED]) 10:20 a.m. Mar. 21, 2001 PST WASHINGTON -- A Czech information security firm has found a flaw in Pretty Good Privacy that permits digital signatures to be forged in some situations. Phil Zimmermann, the PGP inventor who's now the director of the OpenPGP Consortium, said on Wednesday that he and a Network Associates (NETA) engineer verified that the vulnerability exists. ICZ, a Prague company with 450 employees, said that two of its cryptologists unearthed a bug in the OpenPGP format that allows an adversary who breaks into your computer to forge your e-mail signature. Of course, if someone can modify your private keyring, I'd suspect your TCB is toast. (Unless you're in the habit of shipping your private keyring around the Internet.) For the interested, this is my guess at the attack. Modify the encrypted value of p, somewhere near the middle. When decrypted, depending on the chaining mode, it's possible that only a couple of blocks of p will be mangled, and the remainder of the private key file will decrypt successfully. Here's where PGP fails to do a MAC to verify integrity of the data. Then, it behaves just like DFA (Differential Fault Analysis). The idea is that to calculate a signature M^d mod n, we calculate M^d mod p and M^d mod q, and use the CRT to combine them to S = M^d mod n. If p is wrong, the result S' will be correct mod q but incorrect mod p. so S' ^ e mod q = M mod q, but S' ^ e mod p != M mod p. Therefore GCD(S' ^ e mod n, M) = q, and we're done. - Ian
Natural And Wonderful
SWEET SENSATIONS ! (tm) The #1 BEST SELLING 100% ALL NATURAL APHRODISIAC IN AMERICA! - HARDCOPY EPISODE- "The Story you have been waiting for that's making men and women go wild! Men and Women who are taking this powerful little natural pill are loving what it's doing to their libido!" - EYEWITNESS NEWS - "Americas Number 1 Natural Love Pill and It's Selling Like Hot Cakes!" For more details please CLICK HERE To be Removed please Hit Reply and Put REMOVE in the subject line.
GOT INK ?? 6703
GOT INK? Free Bonus Ink Offer for your Inkjet Printer *ATTENTION ALL COMPUTER USERS* Tired of paying $20, $30, $40 or even $50 for inkjet cartridges? Tired of your printer running out of ink AGAIN? Tired of running from store to store looking for the right cartridge? Tired of having to wait until morning to get your printer working? Just Tired of being Tired? IT'S NOT YOUR FAULT THERE IS A SOLUTION!! Throwing away the cartridge when you run out of ink is like throwing away your car when you run out of gas! Don't throw your CASH in the trash!!! *Refill your Ink Jet* It works on any type of inkjet printer,any printer, any brand, any C O L O R With Our refill kit you get all the ink tools you need to refill your inkjet cartridge up to 10 times. Our refill is fast, easy simple to use. Your Ink Jet Refill Kit includes: 1 Bottle of Black ink. 1 Bottle of Magenta ink 1 Bottle of Cyan ink 1 Bottle of Yellow ink All the tools you need A detailed instruction booklet Also a Tutorial CD A Toll Free 800# for your use with live 24 hour per day, 5 day per week. Technical assistance All this for only $29.95+SH Be one of the first 1000 orders in this promotion receive a free bonus bottle of Black Ink *ABSOLUTELY FREE* Call toll-free (800) 346-5421 Change your life for the better. Our friendly order line representatives are available 24 hours per day 7 days per week for your convenience. Your Ink Jet Refill Kit comes with a 30-day money back guarantee, so remember with Ink Jet Refill you're not buying it, you're trying it Call toll-free (800) 346-5421 And start saving time today
Rated Strong Buy
Title: Untitled Document For The Serious Investor News Flash: Important Press Release THIS IS A STOCK TO PURCHASE! March 20, 2001 Symbol LIQD (OTCBB) Shares Outstanding 9,000,000 Float 2,100,000 Recent Price $0.32 52 Week High $2.62 Target Price $2.25 The Market:We belive that the nasdaq has done a full turn since dec 1998 has totally bottomed and ready to catapualtand . Historically speaking the small-cap stocks have made a faster and quicker recovery and we belive we have a great opportunity at hand right now. THE OPPORTUNITY:The stock that we are currently recommending is (OTCBB: LIQD) Liquidics, Inc. With two divisions creating products in the high-growth semiconductor market, Liquidics, Inc. is a front-runner in microchip design and manufacturing and if the stock goes back to its 52 week high, we have a 700% return on our money. Liquidics, Inc.industrial divisions is currently marketing magnetic fluids, created in the sixties under the sponsorship of NASA, to semiconductor manufacturing industry. Their consumer product division is producing a new generation of improved performance shock absorbers for offroad vehicles using techology developed by the company's very heralded RD team. FOR MORE INFORMATION CLICK HERE To be removed CLICK HERE
Click to win $100K (53591)
!!! News Flash !!! Online CASINO at http://www.desirescasino.com is giving away FREE $ 10 in Casino CHIPS to every signup. Signup here and explore your chance to win $100,000 !!! CNDC Reporter Julia Rogers reported that this casino is backed by a huge investment company and is extremely credible. Desires Casino is the winner of Best Casino and Most Recommanded online Casino in various reviews. They have specials running for everyone from March Madness basketball gamblers to Blackjack/Poker/Craps/Roulette/Slots players. They also have 20 odd other games like Keno, Video Poker etc. in NO DOWNLOAD JAVA FORMAT. There toll free number is 1-888-527-2982 and their website is http://www.desirescasino.com We recommend you check them out! You have received this email because you have requested to receive sport and gaming information Please reply with REMOVE in the subject line to unsubscribe from the list 10978
Subscribe
SUBSCRIBE Free, encrypted, secure Web-based email at www.hushmail.com
Re: What is the recommended variant of PGP.
On Sat, 17 Mar 2001, Alan Olsen wrote: Gnu Privacy Guard is an Open Source PGP replacement. I have not examined interoperability with older versions of PGP though. (I will be doing that soon though.) The short version is this: GPG will work more-or-less transparently with PGP 5.x and 6.x, at least for all versions I've played with (most of 'em). It won't play nicely with PGP 2.6.x (or, AFAIK, any older version). ...dave
Now if Gilmore would provide an open phone relay...
UniBlab ran up a $500 LD bill using my calling card. The little darling. http://www.securityfocus.com/news/172 # #Spam war gags Gilmore # #Verio cuts off EFF co-founder John Gilmore over open mail server. #By Kevin Poulsen March 15, 2001 5:19 PM PT # #Aggressive anti-spam measures by Dallas-based ISP Verio have #stripped some of the Internet's digerati of the ability to send #email, and EFF co-founder John Gilmore is calling it censorship. # #Gilmore's home network includes what anti-spam crusaders call #an "open relay" -- a mail server that accepts and forwards email #from anyone. For decades, the practice was considered central #to good network citizenship. But in recent years, spammers have #begun hijacking open relays to multiply, sometimes a thousand #fold, the number of junk messages they can send at once. # #That abuse sparked a campaign by anti-spam activists to close #the open relays, a campaign that Gilmore, an entrepreneur, #electronic civil libertarian, and co-founder of the Electronic #Frontier Foundation (EFF), has little use for. # #"It reminds me of the X-ray machines they have in airports and #the security checks they put people through," says Gilmore. "It #doesn't actually solve the problem, it just infringes on the #rights of the innocent." # #Even as commercial ISPs began tightening down their mail servers #-- rejecting outgoing mail from non-subscribers, and forcing #subscribers to electronically prove their identity before sending #mail -- Gilmore kept his own mail server open to the world, a #service he says his friends have come to rely on. # #"Part of the reason my friends are using my machine is their #own ISPs' anti-spam measures prevent them from sending email #as they move around in the world," says Gilmore. "If one user #connects to my machine from an unknown address and sends a #message, my machine forwards it on. It's happy to. That could #be John Perry Barlow sending email from Africa to his girlfriend." # #Gilmore says he shuts down spammers when he detects them, but #acknowledges that some junk mail gets through his system. Late #last month, one such spam message -- from a would-be entrepreneur #offering professional spamming services to the public -- resulted #in a complaint to Gilmore's ISP, Verio, from an anti-spam group. # #Verio's sweeping acceptable-use policy prohibits open relays. #When Gilmore refused to put fetters on his mail server, the #company's security department slapped a filter on Gilmore's T1 #net connection Wednesday, blocking outgoing email from his #network. # #A Verio spokesperson did not return a telephone call Thursday. #Verio security team leader Darren Grabowski declined to comment. #"What we do is between us and our customer," said Grabowski. # #Anti-spam pressure Gilmore believes anti-spam efforts have gone #too far, and impact the rights of innocent people. "Verio is #filtering me because they were pressured by a pressure group, #and they don't have enough intelligence to stand up against that #pressure." # #But the head of the anti-spam business that forwarded the #complaint to Verio last month says the ISP did the right thing. # #"It's been a very long time since open relays were considered #acceptable on the net," says Julian Haight, owner of SpamCop.net. #"On today's Internet, things have changed considerably." # #SpamCop.net lets netizens easily and automatically track and #report spammers and open relays, and maintains a blacklist of #network addresses the company considers spam-friendly. Haight #acknowledges the influence his organization, and other anti-spam #efforts, can exert on an ISP, but he says no one has a right #to operate a service that lends a hand to spammers. # #"Freedom of speech is not 100 percent," says Haight. "You're #not allowed to come into my home to preach to me... Open servers #are responsible for making copies of unsolicited commercial emails #and sending it to people who don't want it." # #Gilmore argues that by making decisions about what to allow or #disallow over their network, ISPs risk losing the common carrier #status that protects them from legal liability for their #customer's actions. # #"Ultimately, they should be a pipe. They shouldn't care what #content goes through. For them to say, well, we'll send your #IP packets... except when you send this particular type of IP #packet, it takes them out of the realm of a common carrier," #says Gilmore. "That puts the entire Internet in jeopardy." 6/13/2000 Hannity Colmbes, Representive Dan Burton, giving his URL to where he put
Re: firewall
On Thu, 15 Mar 2001, cory ertle wrote: I want to see if my girl is cheating on me by hacking into her e-mail account at school. Now i know enough about here to bypass her pass pretty easily but i however don't know the best way to go about getting to her account. I would suggest social engineering, but in this case... Sampo Syreeni [EMAIL PROTECTED], aka decoy, student/math/Helsinki university
loverscaughtontape.com First Amendment Woes
[Note from Matthew Gaylor: loverscaughtontape.com are the producers of the most successful selling adult titles worldwide. If you're easily offended or are not legally able to view adult only material, don't click on their link. Eric [EMAIL PROTECTED] who owns loverscaughtontape.com and who subscribes to Freematt's Alerts, was kind enough to send me me a box full of their DVD's and videos. Eric has appeared on the Howard Stern show and The New York Times did an article recently on what happens when an adult business gives money to a charity, in this case St. Jude's Children's Hospital in Memphis. St. Jude didn't like it when loverscaughtontape.com posted their thank you letter on their website. BTW, the videos are just what you'd expect- People having sex, while being filmed by surveillance cameras.] Date: Tue, 06 Mar 2001 10:08:49 -0800 From: Eric [EMAIL PROTECTED] Subject: On-topic? To: Matthew Gaylor [EMAIL PROTECTED] Hey Matt- LOVE Freematt's Alerts; please keep it coming. This may be a little off your beaten path, but it has affected us strongly, and I believe there's a first-amendment issue here. We run an adult site (well, more a 'risque' site), and had a good year - then donated some money to charity, and being very self-satisfied, linked to the charities from our site. They got wind of it (because of rants from some religious-righties we were battling with), and threatened to send the legal goon squads after us. The story is here: http://www.loverscaughtontape.com/nytimes.html A fan of ours entered the fray also: http://www.tdavis.org/stjude/ I hope you find it suitable to run, but thanks either way! Best, Eric ** Subscribe to Freematt's Alerts: Pro-Individual Rights Issues Send a blank message to: [EMAIL PROTECTED] with the words subscribe FA on the subject line. List is private and moderated (7-30 messages per week) Matthew Gaylor, 2175 Bayfield Drive, Columbus, OH 43229 (614) 313-5722 ICQ: 106212065 Archived at http://groups.yahoo.com/group/fa/ **
Re: Paternity tests [was: WSJ: NSA Computer Upgrade]
John Young[SMTP:[EMAIL PROTECTED]] Men usually got a hangup about paternity, and many don't want to know the truth, so the 28% is surely way low, in particular to protect the kids and the wives and to keep the men in harness. Them's the facts of biology and culture and healthy workplace economies. [...] Never, ever have your blood tested, nor your brain. Keep your head up where the sun don't go. Read the papers, call what you see lies, distortions of your motherless bastardy. The Bard dealt with this issue, as he did so many others: Pedro. You embrace your charge too willingly: I thinke this is your daughter. Leonato. Her mother hath many times told me so. Bened. Were you in doubt that you askt her? Leonato. Signior Benedicke, no, for then were you a childe. Pedro. You haue it full Benedicke, we may ghesse by this, what you are, being a man, truely the Lady fathers her selfe: be happie Lady, for you are like an honorable father. Ben. If Signior Leonato be her father, she would not haue his head on her shoulders for al Messina, as like him as she is. - Much Ado About Nothing, Actus primus, Scena prima ... and he here also points out why many men don't bother with testing - family resemblence is convincing enough. I have two daughters. One is the image of my sister as a child, and the other looks so much my mother did at that age that people mistake childhood photos of one for the other. In the absence of any particular reason for doubt, blood tests would be a waste of time and money. Peter Trei
RE: WSJ: NSA Computer Upgrade
On Thu, 15 Mar 2001, David Honig wrote: The motivation for this is that the legals have decided that supporting the children is more important than fairness. Its that simple; some legals will even admit it. "Fairness" is such a slippery word. Is it fair for a child to have no support available? Remember, it's not because of anything the child did. I think the criterion here is that the adult is more capable of coping with the unfairness than the child, hence in a situation where you have to be unfair to one or the other, you favor the child's interests over the adult's. There are similarly motivated restrictions on how much you can deny your spouse when you die. This one I don't hang with. Your spouse is presumably an adult, and ought to be able to cope with not getting the estate. But that certainly doesn't stop it from being a serious shitheel type maneuver to leave your spouse in the lurch when you go, and since you're dead at that point you don't really have that much of a compelling interest in the estate any more... But anyway, this has little to do with crypto... Bear
Email Address Extract Expert from Internet
[ This is the last email to you. After you receive this mail, your email has been remove from our mailing list . ] Recommend Software: Email Spider Easy -Targeted Email Address Extract Software. http://www.emailspidereasy.com Key Features: 1 It is very simple and easy to use. 2 Search and Spider from a starting url such as web url, search engine, message board to extract bulk email addresses. Nearly can spider any web url, including search engine, newsgroup, message board. 3 Integrate with 18 top search engines and directories such as Yahoo, Google, Altavista, AOL, MSN, Lycos, Alltheweb, Hotbot, Mamma, Northernlight, Directhit, Go,Iwon. 4 Search and Extract speed is very fast. Allow up to 500 threads to search and extract emails simultaneously. 5 Simple config some parameters to specify which email address is you want and which not. And which urls not need to search 6 Both Web and Url are extracted. For more info,please access url: http://www.emailspidereasy.com
RE: WSJ: NSA Computer Upgrade
It is likely that a principal reason for the new NSA system is to be able to more efficiently spy on its users, as with intelink, siprnet and niprnet -- and our own beloved Internet whose users and hackers know not what is being logged. Counterintelligence has become a more important function of the intel agencies than intelligence, as with corporations, educational institutions and families who face internal attacks. Exposing threats to kids, church and nation is a hot market. Counterintelligence in all its forms is riding high as a savior of the commonweal. Still there are dark sides to knowing the truth. The reports of DNA evidence showing that up to 28% of fathers are not the biological fathers of children for whom they are legal parents is a reminder that revisionist intelligence is not limited to the spooks as data mining becomes more widely available. And what will come of government as it becomes more subject to internal attacks due to greater access to snooping technology and counter-snooping attempts to hold onto the privilege of knowing what underlings do not? Deutch thought he knew why it was wise to work at home, to avoid the counter-snoops watching him, but the counter-snoops knew what he did not -- they work for themselves not the bosses. Sys admins may well become the power mongerers of the future, or is that already the case. Hayden is dreaming if he thinks he will be able to watch his troops without their knowing and counteracting it. What is worrisome is the prospect of a coup by the info hi-technoids, most of who work for the military or have contracts with them -- out contracts. SAIC, BBN, Mitre, RAND, the telecomms, the satcomms, operators of the thick connections worldwide, coupled with the wizards at the NSA, NRO, USAF, DIA, and so, could put on a formidable putsch, while the oversight committees remain, as ever, three monkied.
Re: the link doesn't work......
We would be delighted to help you for our usual consulting fees. -Declan On Tue, Mar 13, 2001 at 07:54:18AM -0500, [EMAIL PROTECTED] wrote: I was trying to check out the link on your "code cracking" page maybe you could help me. I was trying to find out if this is a page containing info. on how to "crack codes" if it is, or if you have some info for me regarding "code cracking" e mail me back and let me know. thanx...
biochemwmdterror in DC today
HOUSE SELECT INTELLIGENCE COMMITTEE Terrorism Briefing Full committee Speaker's Working Group on Terrorism holds briefing on intelligence matters. Location: H-405 U.S. Capitol. 12;30 p.m. Contact: 202-225-4121 http://www.house.gov/select **NEW/CLOSED**
fun with the CIA
Speculation over why aliens would want to observe us: http://www.foia.ucia.gov/scripts/cgiservlets/NavigatorServlet.pl?docNumber=44116partNumber=2method=generateFrameSettotalNumber=2 CIA reports on Russian police scrambling over UFO sighting: http://www.foia.ucia.gov/scripts/cgiservlets/NavigatorServlet.pl?docNumber=98713partNumber=2method=generateFrameSettotalNumber=2 CIA report on Barbados sighting: http://www.foia.ucia.gov/scripts/cgiservlets/NavigatorServlet.pl?docNumber=43362partNumber=2method=generateFrameSettotalNumber=2 CIA summarizes news articles on UFOs in ancient China: http://www.foia.ucia.gov/scripts/cgiservlets/NavigatorServlet.pl?docNumber=42351partNumber=1method=generateFrameSettotalNumber=4
WSJ: NSA Computer Upgrade
NSA COMPUTER UPGRADE - [The Wall Street Journal, B1.] What does it take to send an e-mail to all 38,000 employees at the government's premier computing center, the supersecret National Security Agency? "An act of God," says the agency's director since 1999, Lt. Gen. Michael Hayden. The NSA, he discovered to his chagrin last year, has 68 e-mail systems. He has three computers on his desk - none of which can communicate with the others. To deal with those frustrations, Hayden is now plunging into one of the U.S. government's biggest information-technology outsourcing deals ever. More than 15 companies, including ATT, Computer Sciences, IBM, General Dynamics and OAO, have formed three teams to compete for a contract set to be valued at as much as $5 billion over 10 years. Requests for proposals went out last week; the winner will be chosen by July. Project Groundbreaker, as the job is called, will be a curious venture by any measure. The winning consortium will take over running the NSA's office-technology infrastructure, including thousands of desktop computers and a Medusa-like tangle of software and internal communications systems. Hayden describes the current setup as "anarchic, convoluted and complex." It is a holdover from the days when the NSA, for security reasons, was broken into dozens of sealed-off compartments. Each bought its own computers, developed its own software and built its own networks, intentionally cut off from the rest of the organization. Hayden now wants to open the place up, at least internally. Whoever wins the Groundbreaker contract will have to meld the current mess into one seamless network, so that for the first time the agency can move around top-secret files as any company would, but without fear of an external security breach. If Groundbreaker succeeds, industry experts predict it could set off a wave of other big outsourcing deals within the federal government. Likely next candidates include the departments of Energy and Defense, and even the Central Intelligence Agency. "This will set the standard for how all similar deals proceed," says Thomas Robinson, president of CSC's Defense Group, which is leading one team that also includes General Dynamics and Verizon. The leaders of the other two competing consortia are ATT and OAO.
Re: cypherpunks - Make $2000 a Week -ATES
On Mon, 12 Mar 2001, EarnMor wrote: Over the last couple weeks I've been telling you about a unique way to earn up to or over $2000 a week with minimal effort on your part. All you need to do is advertise our toll-free number, and our professional sales staff will take care of the rest. And they pull in about 20% of all calls received as sales for you. Think of the possibilities! - No Selling - No Talking to Anyone - No Inventory - No Monthly Purchases - No Hassles - Weekly Checks Your weekly checks will be delivered faithfully to your home, made up of $100 per direct sale, and $50 for each sale made by someone in your downline. Once you start, your weekly income just keeps rising! But that's not the only reason to join. Even if you're not interested in the business opportunity (but why wouldn't you be?!!), the opportunity to join this discount club is too good to pass up. Everyday items like groceries and film are discounted, along with larger, more occasional purchases. In itself, this membership is worth it. Go to my web site TODAY and find out more! http://www.earnmor.com/5131
Re: Toy gun ban: This is pleasantly insane
Such replicas can be bought in shops or by mail order and are frequently used by criminals. The minister said replicas posed a "real threat" to society. I would have thought that they posed a "replica of a real threat" to society.
RE: Toy gun ban: This is pleasantly insane
On Mon, 12 Mar 2001, Phillip Hallam-Baker wrote: Next thing you know, it will be considered assault to hold your finger like a gun and say "bang". (If it is not already.) Try it in Heathrow airport and you will get ten years. Airports are already a "no humour zone", so that is to be expected... Zero tollerance requires a zero IQ. So with Dufus in the Whitehouse zero tollerance in the US will be comming soon. When Bush Sr. was running for office many people voted for Clinton because "anyone was better". They were wrong. History repeated itself in some sort of sick self-referential joke. I expect that the coming Ashcroft years will make us look back fondly at the Meese and Reno days. [EMAIL PROTECTED] | Note to AOL users: for a quick shortcut to reply Alan Olsen| to my mail, just hit the ctrl, alt and del keys. "In the future, everything will have its 15 minutes of blame."
corporate espionage
Read your article. Most of the examples involve pharm companies. I am interested in examples that involve a prime companies that have an outsourcing relationship. Any thoughts? begin:vcard n:Busch;Rebecca tel;cell:630-816-3648 tel;fax:630-574-2755 tel;work:630-574-2756 x-mozilla-html:FALSE org:MBA Inc. adr:;;1301 West 22nd street Suite 215;Oak Brook;IL;60523; version:2.1 email;internet:[EMAIL PROTECTED] title:CEO note;quoted-printable:Note: The information contained in this message may be privileged and confidential=0D=0A and protected from disclosure. If the reader of this message is not=0D=0A the intended recipient, or an employee or agent responsible for=0D=0A delivering this message to the intended recipient, you are hereby=0D=0A notified that any dissemination, distribution or copying of this=0D=0A communication is strictly prohibited. If you have received this=0D=0A communication in error, please notify us immediately by replying =0D=0Ato the message and deleting it from your computer. Thank you.=0D=0A***=0D=0A fn:Rebecca Busch, RN, MBA, CCM, CFE, FHFMA, end:vcard
Re: corporate espionage
Hi Becky, Which if the several hundred subscribers to the 8+ CDR nodes and potentialy thousands of associated webpages might you be refering to? You seem to have a fuzzy understanding of the concept 'mailing list'. On Sat, 10 Mar 2001, Becky wrote: Read your article. Most of the examples involve pharm companies. I am interested in examples that involve a prime companies that have an outsourcing relationship. Any thoughts? Liberty means responsibility. That is why most men dread it. Locke The Armadillo Group ,::;::-. James Choate Austin, Tx /:'/ ``::/|/ [EMAIL PROTECTED] www.ssz.com.', `/( e\ 512-451-7087 -~~mm-'`-```-mm --'-
Re: corporate espionage
I was doing an internet search on cor esp. your article was on my hit list. At this point I cannot recall the page. Are you the right person for the subject? Jim Choate wrote: Hi Becky, Which if the several hundred subscribers to the 8+ CDR nodes and potentialy thousands of associated webpages might you be refering to? You seem to have a fuzzy understanding of the concept 'mailing list'. On Sat, 10 Mar 2001, Becky wrote: Read your article. Most of the examples involve pharm companies. I am interested in examples that involve a prime companies that have an outsourcing relationship. Any thoughts? Liberty means responsibility. That is why most men dread it. Locke The Armadillo Group ,::;::-. James Choate Austin, Tx /:'/ ``::/|/ [EMAIL PROTECTED] www.ssz.com.', `/( e\ 512-451-7087 -~~mm-'`-```-mm --'- begin:vcard n:Busch;Rebecca tel;cell:630-816-3648 tel;fax:630-574-2755 tel;work:630-574-2756 x-mozilla-html:FALSE org:MBA Inc. adr:;;1301 West 22nd street Suite 215;Oak Brook;IL;60523; version:2.1 email;internet:[EMAIL PROTECTED] title:CEO note;quoted-printable:Note: The information contained in this message may be privileged and confidential=0D=0A and protected from disclosure. If the reader of this message is not=0D=0A the intended recipient, or an employee or agent responsible for=0D=0A delivering this message to the intended recipient, you are hereby=0D=0A notified that any dissemination, distribution or copying of this=0D=0A communication is strictly prohibited. If you have received this=0D=0A communication in error, please notify us immediately by replying =0D=0Ato the message and deleting it from your computer. Thank you.=0D=0A***=0D=0A fn:Rebecca Busch, RN, MBA, CCM, CFE, FHFMA, end:vcard
Re: corporate espionage
Ok, let me say this again You are sending a note to a distributed mailing list. It has 8 core nodes with each node hosting their own set of independent subscribers. The total number of subscribers is potentaily several hundred. You are acting like you're sending a note to an individual. You are NOT. I happen to be the operator of the ssz.com node and I'm trying to get you to understand that you're request is worthless as worded. ssz.com is NOT the same computer (not even in the same state) as cyberpass.net. We simply share cross-feeds on our traffic. If you would like more info as to why, please visit: http://einstein.ssz.com/cdr The Cypherpunks are a group of people discussing cryptography, civil liberty, and economics. If you're question is in one of those areas then feel free to expand upon your problem. If not you should probably go someplace else. On Sat, 10 Mar 2001, Becky wrote: I was doing an internet search on cor esp. your article was on my hit list. At this point I cannot recall the page. Are you the right person for the subject? Jim Choate wrote: Hi Becky, Which if the several hundred subscribers to the 8+ CDR nodes and potentialy thousands of associated webpages might you be refering to? You seem to have a fuzzy understanding of the concept 'mailing list'. On Sat, 10 Mar 2001, Becky wrote: Read your article. Most of the examples involve pharm companies. I am interested in examples that involve a prime companies that have an outsourcing relationship. Any thoughts? Liberty means responsibility. That is why most men dread it. Locke The Armadillo Group ,::;::-. James Choate Austin, Tx /:'/ ``::/|/ [EMAIL PROTECTED] www.ssz.com.', `/( e\ 512-451-7087 -~~mm-'`-```-mm --'-
No Subject
KDLADCKD.EXE
RE: OK, which node is down? [WAS: Re: Denial of Service Attackon Cypherpunks?]
I received no postings from cyberpass from sometime Monday through this morning. It seems to be back now. Peter -- From: Bill Stewart home email[SMTP:[EMAIL PROTECTED]] As far as I can tell, I've been receiving this discussion via cyberpass.net, so it must be ok Bill Harmon Seaver wrote: I was subscribed to cyberpass.net, been gone for two days and came home to no cpunks mail. Subscribed to lne and it started flowing again. Pretty weird -- even wierder is what happened to openpgp -- I was subscribed to that one, it went down, came back up, went down again and never a word from the owner since.
Bell Trial Schedule
From: Gordon Jeff TIGTA [EMAIL PROTECTED] To: "'[EMAIL PROTECTED]'" [EMAIL PROTECTED] Subject: Bell trial schedule Date: Fri, 9 Mar 2001 10:13:02 -0500 : : John You will need to be present at the Tacoma Courthouse at 9:00am on Tuesday, 4/3/01. We anticipate you will testify on Tuesday, but it may extend to Wednesday 4/4/01, depending on the pace of the trial, so the return flight should not be scheduled prior to 5pm on 4/4/01. In order to be reimbursed for travel, all travel arrangements need to be made through the Dru Mercer at the US Attorney's office, (206) 553-7970. Let me know if you have any questions. Jeff - To: Gordon Jeff TIGTA [EMAIL PROTECTED] From: John Young [EMAIL PROTECTED] Subject: Bell trial schedule Date: Fri, 9 Mar 2001 10:15 -0500 : : Jeff, Thanks for the information. Could you find out if I can buy a transcript of my grand jury testimony before the trial? Robb London has not answered my three inquiries. The court reporters office told me it can be released only with Robb's approval. John
No Subject
Attorney General Ashcroft personally approved your subpoena, and that of another reporter who published admissions by James Dalton Bell. The Government is not seeking any source material, notes, or other unpublished material from you by virtue of this subpoena. The limited purpose of the subpoena is to have you review two of your published articles, acknowledge your authorship, review several of the statements which you attributed to Bell in your articles, and have you verify that he in fact told you those things. That's all. We're only interested in having you testify about statements of his that you published. If your subpoena could have been avoided, it would have been. Unfortunately, the Federal Rules of Evidence do not permit a news article to be admitted into evidence for these purposes unless the person who wrote it can attest to its authorship and the accuracy of its content. This must be done in open court, at trial, and cannot be accomplished by affidavit, unless the defendant is willing to stipulate that your appearance can be avoided and that your articles can be admitted into evidence witho! ut! your appearance as a foundation witness. Mr. Bell is not interested in any such stipulations. I regret any inconvenience that a trip to Tacoma may cause. I am extremely sensitive to the intrusiveness of any subpoena and the potential negative impact that press subpoenas can have on the news gathering function. The subpoena that has been served on you, is, in my experience, as minimally intrusive as any such subpoena can be. Robb London Assistant United States Attorney Western District of Washington
DoJ and Cypherpunks...
-BEGIN PGP SIGNED MESSAGE- Wow. I thought this list was dead and gone, yet here we have an Assistant US Attorney apologist copying the list to explain the Subpoena of one of our own. How interesting. -BEGIN PGP SIGNATURE- Version: PGP 7.0.1 iQEVAwUBOqkXES1onm9OaF05AQHfnwgAkS6G1DmZrG4tCnQCI+pFKimbq4DHH+/u S/OoaQFZdARydiN0aHqpA9BLdEgPuT3naEwBvTVLAD0tZ/GzoUEcgY/IlBC3La1G G7X2Hpd2FTfuC5tJM4/rkPGHleIMtHMP5U9QTYsXkZiBz2RaVRgxT2PuZTa+Z8/n m2z9p+XU2pOYXSNXCigP/FEXXUl4ZvXgf4nDfDQy6MDUkvx6qRT0vNqKuW5vPwI9 C6muV2hMAyvHxLmzx/Iq0Pf8e69OJmzQQ1lu1Q5Z22ohLwbm6K1iZ8cwZMinmeMH TFJb9ntGxnUEndgmOmcaNYuFYu3pdHhrSBScYd/5eY1HW/UNMuVm+A== =48sr -END PGP SIGNATURE-
Ellison vs. Gnutella
With the second amended complaint, we were able to add a complaint for vicarious infringement against AOL for the,development of the Gnutella file transfer protocol by its Nullsoft division. Gnutella is Napster without a central processing hub.,By setting up a sting operation, one of our investigators was able to track the infringement of several works by Harlan and,Isaac Asimov using Gnutella. This presents interesting issues regarding the responsibility for the release of software which,effectively pollutes the intellectual property environment. http://www.speculations.com/kick.htm
marines on chicks' leg hair
D. (1) AGENDA ITEM. REQUEST FOR REVISION OF UNIFORM REGULATIONS TO REQUIRE THE REMOVAL OF LEG HAIR ON FEMALE MARINES IF SUCH HAIR IS VISIBLE. (2) DISCUSSION. THE UNIFORM BOARD RECOMMENDED THAT THE FOLLOWING GROOMING REGULATION POLICY BE INCLUDED IN CHAPTER 1 OF THE UNIFORM REGS: "NO FEMALE MARINE WILL BE REQUIRED TO REMOVE LEG HAIR EXCEPT WHERE CONSIDERED UNSIGHTLY AND CANNOT BE COVERED WITH APPROPRIATE HOSIERY AS DESCRIBED IN SUBPARAGRAPH 3027.5." (3) CMC DECISION. APPROVED. http://www.usmc.mil/almars/almararc.nsf/ab422d0547928f548525683900589a0d/9c3d36d73d174b898525683800535c2d?OpenDocumentHighlight=2,352%2F96
DeCSS in perl -- test vectors?
Keith Winstein and Marc Horowitz implemented DeCSS in perl. http://www.cs.cmu.edu/~dst/DeCSS/Gallery/qrpff-fast.pl There is some description of using it here: http://www.cs.cmu.edu/~dst/DeCSS/Gallery/ Does anyone have test vectors for DeCSS. If one had a DVD player and a content scrambled DVD one could use the example they give: % /mnt/dvd/VOB_FILE_NAME | qrpff 153 2 8 105 225 | \ extract_mpeg2 | mpeg2dec - Someone want to extract a few frames from a DVD and include the associated plaintext for testing purposes. I'd like to try reduce the size of the program. Adam