Minister Charles Simpson has the power to make you a LEGALLY ORDAINED MINISTER within
48 hours 1st22
BE ORDAINED NOW!
As a minister, you will be authorized to perform the rites and ceremonies of the
church!!
WEDDINGS
MARRY your BROTHER, SISTER, or your BEST FRIEND!!
Don't
At 10:35 PM 4/30/01 -0400, Rich Salz wrote:
NTT and Mitsubishi will be granting royalty free licenses for strict
implementations of Camilla (128bit block cipher),
The best part about Camilla is that it demonstrates that the Japs have
a sense of humor, about the british, at least.
At 10:32 PM 4/28/01 -0700, Steve Schear wrote:
At 11:46 PM 4/28/2001 -0400, Declan McCullagh wrote:
I rather like the idea of encrypting the logs on the fly and shipping them
offshore. Your offshore partner will be instructed to turn over the
logs only if you are not asking for them under duress.
Tim May [EMAIL PROTECTED] wrote:
A profound new insight.
We still await some real insights from a real graduate student (!),
beyond her saying that we don't know as much as she says she knows.
BTW, I have removed the additional addresses (David Honig
[EMAIL PROTECTED], Declan@Well. Com [EMAIL
At 11:46 PM 4/28/2001 -0400, Declan McCullagh wrote:
I rather like the idea of encrypting the logs on the fly and shipping them
offshore. Your offshore partner will be instructed to turn over the
logs only if you are not asking for them under duress. (A reasonable
protocol can probably be worked
:46 PM
To: Anonymous
Cc: [EMAIL PROTECTED]
Subject: Re: layered deception
I rather like the idea of encrypting the logs on the fly and shipping them
offshore. Your offshore partner will be instructed to turn over the
logs only if you are not asking for them under duress. (A reasonable
I rather like the idea of encrypting the logs on the fly and shipping them
offshore. Your offshore partner will be instructed to turn over the
logs only if you are not asking for them under duress. (A reasonable
protocol can probably be worked out. Would a court order instruct you
to lie? If so,
On Sun, 29 Apr 2001, Declan McCullagh wrote:
Right, in most circumstances you're not required to keep logs. But there
are some cases, albeit a fairly narrow subset, in which you'd want to have
log files that are available to you but not an adversary using legal process.
-Declan
If you
Will someone at lne.com finally decide that he qualifies as spam and start
filtering? That simple act would improve the signal to noise ratio dramatically.
Internet is a self-service establishment.
Full-service has too much undesirable luggage attached to it.
I haven't seen choatian posts
Declan McCullagh [EMAIL PROTECTED] wrote:
Right, in most circumstances you're not required to keep logs. But
there are some cases, albeit a fairly narrow subset, in which you'd
want to have log files that are available to you but not an
adversary using legal process.
-Declan
Which
To: Anonymous
Cc: [EMAIL PROTECTED]
Subject: Re: layered deception
I rather like the idea of encrypting the logs on the fly and shipping them
offshore. Your offshore partner will be instructed to turn over the
logs only if you are not asking for them under duress. (A reasonable
I think Matt is a bit too quick to conclude a court will charge the
operator with contempt and that the contempt charge will stick on appeal.
Obviously judges have a lot of discretion, but it doesn't seem to me like
the question is such a clear one if a system is set up in the proper
At 01:04 PM 4/29/2001 -0400, Matthew Gaylor wrote:
Declan McCullagh [EMAIL PROTECTED] wrote:
Right, in most circumstances you're not required to keep logs. But there
are some cases, albeit a fairly narrow subset, in which you'd want to
have log files that are available to you but not an
Ken Brown [EMAIL PROTECTED] wrote:
You need phone numbers to buy train tickets?
For most trains around here at least, the answer is no. You get on
the train, and the conductor sells you a ticket to where you're going
for cash. Or you can pay at the ticket office at the station
beforehand, if
On Thu, 19 Apr 2001, James A. Donald wrote:
Detweiler repeatedly attempted that hack in several different newsgroups
and mailing lists, and repeatedly failed. Everyone would come to the
conclusion that he was a loon, and that anyone who agreed with him was
either a tentacle or a fellow loon.
those pussies should have used pipe bombs, thats where it's at!
-
-
Shaun Ollivierre
Dream Developments/EHI
[EMAIL PROTECTED]
www.enphourell.com
On Fri, 20 Apr 2001, Trei, Peter wrote:
It would be cruel to use live animals.
Maybe they should use stuffed shirts.
Peter
--
Although ChoicePoint says it has records
on nearly every American with a credit card,
it doesnt always provide access to that data.
The companys Autotrack service is popular
with many
Certainly. Head down to the local hardware store and buy
yourself a very large axe.
Now find something you want to hack, lift the axe over your
head, and bring it down edge first. You may need to hack
three or four times before you break all the way through.
It's easy once you get the
Peter,
Thanks for the tip on that. I'll be looking out for it, although at
that price, it's cheaper to buy a dedicated PC and run SpeakFreely, as
you point out.
Linux PDAs with good sound chips are just around the corner,
apparently, and it seems that it shouldn't be too big a feat to get
It's very simple.
Go to a military surplus store or your local Wall-Mart and buy a machete. If
you buy a surplus one, you may want to sharpen it and polish the rusty blade,
although this step is not essential because one may hack quite noisily and
dramatically with a rusty dull machete.
Go out
: [EMAIL PROTECTED]
Subject: RE: Starium?
At the RSA conference I saw a company selling Starium-equivalent
units, both for voice and data encryption. The voice only units were
about $1400 apiece. (frankly, at that price, you could plug a PC
with an A/D converter card between
Quoting Ray Dillinger [EMAIL PROTECTED]:
On Wed, 11 Apr 2001, Declan McCullagh wrote:
It's all so sad and predictable and sad again. The cypherpunks list
had its glory days: Wired magazine cover stories, blossoming
technology, and, yes, even those damnable tentacles. Now it's become
a
Unindictedcoconspiritors? Tentaclenet? Targetzone? Shootmeplease?
-- DS
"Y'know, if the earth were flat, all the Chinese would fall off..."
-- Firesign Theatre
How do we expect to even find them, when they're using mixmasters to
remain anonymous? Do you know what a mixmaster is? This is exactly the
problem.
from "Can hackers help stop child porn on the Net?"
I see now, this is why ICC is enlisting cypherpunks.
---
High Commissioner of the
On Wed, 11 Apr 2001, Declan McCullagh wrote:
It's all so sad and predictable and sad again. The cypherpunks list
had its glory days: Wired magazine cover stories, blossoming
technology, and, yes, even those damnable tentacles. Now it's become a
convenient way for the Feds to land convictions.
Hmm. Anyone know what are some extant web-to-email remailers,
and what Type I remailers exist?
-Declan
On Wed, Apr 11, 2001 at 06:43:10PM -0700, Ray Dillinger wrote:
On Wed, 11 Apr 2001, Declan McCullagh wrote:
It's all so sad and predictable and sad again. The cypherpunks list
had its
On Tue, 3 Apr 2001, Declan McCullagh wrote:
Obviously there are going to be some points of agreement. Seth is a liberal
and a programmer who is going to like strong crypto, free speech (only the
types the ACLU approves of, naturally), and so on. But on cases involving
free trade,
I found out that Worldtravel had moved my flight to a Tuesday departure
that would get into the city that afternoon, *after* the proceedings had
begun. That could (understandably) piss off the judge -- I'd be violating a
This is my worst nightmare.
We are ruled by infantile idiots.
Oh, the
At 08:59 PM 4/2/01 -0700, Alan Olsen wrote:
On Mon, 2 Apr 2001, David Honig wrote:
but while working
for aol i remember companies trying to sell me on the concept of
'anti-porn'
pic filtering software. it worked by looking for a high percentage of
flesh
tones in a pic.
Yeah but all
see any Libertarians protesting either when Sally Mann and
Jock Sturges are hauled off to the Sex Offender Re-Education Camp either.
In fact, Libertarians are real good at letting everyone have whatever
rights they can personally defend, without anyone else lifting a finger.
Foo on Libertaria
At 05:55 PM 4/2/01 -0400, Phillip H. Zakas wrote:
ya know this does sound like an april fools joke (esp. the part about
encouraging the photographer to enter into counseling.)
Particularly if you only ran across it Monday. Got Mr. Bear, too.
There are some cute RFCs dated 1.4.x too.
but
In article [EMAIL PROTECTED],
Declan McCullagh [EMAIL PROTECTED] wrote:
Pretty Good Privacy that permits digital signatures to be forged in
some situations.
Phil Zimmermann, the PGP inventor who's now the director of the
OpenPGP Consortium, said on Wednesday that he and a
A "vulnerability" that requires the opponent to have write access
to your private key in order to exploit?
Okay. What was PGP's threat model again? I'd have sworn that this
was squarely outside it.
Probably. Do you need only write access? What does that do for smart
cards - if
use the ms crypto api architecture has already received an
"ok" for export (with caveats re: 128 bit encryption.) i've been through
this process so I know the 'crack' and the export license information is
correct (as of one year ago anyway).
the most significant problem with pki, imho, i
In article 99b89r$lgd$[EMAIL PROTECTED],
Ian Goldberg [EMAIL PROTECTED] wrote:
If p is wrong, the result S' will be correct mod q but incorrect mod p.
so S' ^ e mod q = M mod q, but S' ^ e mod p != M mod p.
Therefore GCD(S' ^ e mod n, M) = q, and we're done.
I think you meant GCD((S'^e mod
In article [EMAIL PROTECTED],
Declan McCullagh [EMAIL PROTECTED] wrote:
http://www.wired.com/news/politics/0,1283,42553,00.html
Your E-Hancock Can Be Forged
by Declan McCullagh ([EMAIL PROTECTED])
10:20 a.m. Mar. 21, 2001 PST
WASHINGTON -- A Czech information security firm
On Sat, 17 Mar 2001, Alan Olsen wrote:
Gnu Privacy Guard is an Open Source PGP replacement.
I have not examined interoperability with older versions of PGP though.
(I will be doing that soon though.)
The short version is this: GPG will work more-or-less transparently with
PGP 5.x and 6.x,
On Thu, 15 Mar 2001, cory ertle wrote:
I want to see if my girl is cheating on me by hacking into her e-mail
account at school. Now i know enough about here to bypass her pass pretty
easily but i however don't know the best way to go about getting to her
account.
I would suggest social
John Young[SMTP:[EMAIL PROTECTED]]
Men usually got a hangup about paternity, and
many don't want to know the truth, so the 28% is
surely way low, in particular to protect the kids and
the wives and to keep the men in harness. Them's
the facts of biology and culture and healthy
workplace
On Thu, 15 Mar 2001, David Honig wrote:
The motivation for this is that the legals have decided
that supporting the children is more important than
fairness. Its that simple; some legals will even admit it.
"Fairness" is such a slippery word. Is it fair for a child
to have no support
It is likely that a principal reason for the new NSA system is
to be able to more efficiently spy on its users, as with intelink,
siprnet and niprnet -- and our own beloved Internet whose
users and hackers know not what is being logged.
Counterintelligence has become a more important function
We would be delighted to help you for our usual consulting fees.
-Declan
On Tue, Mar 13, 2001 at 07:54:18AM -0500, [EMAIL PROTECTED] wrote:
I was trying to check out the link on your "code cracking" page maybe you
could help me. I was trying to find out if this is a page containing info. on
On Mon, 12 Mar 2001, EarnMor wrote:
Over the last couple weeks I've been telling you about a unique way to earn up to or
over $2000 a
week with minimal effort on your part. All you need to do is advertise our
toll-free number, and
our professional sales staff will take care of the
Such replicas can be bought in shops or by mail order and are frequently used
by criminals.
The minister said replicas posed a "real threat" to society.
I would have thought that they posed a "replica of a real threat" to
society.
On Mon, 12 Mar 2001, Phillip Hallam-Baker wrote:
Next thing you know, it will be considered assault to hold your finger
like a gun and say "bang". (If it is not already.)
Try it in Heathrow airport and you will get ten years.
Airports are already a "no humour zone", so that is to be
Hi Becky,
Which if the several hundred subscribers to the 8+ CDR nodes and
potentialy thousands of associated webpages might you be refering to?
You seem to have a fuzzy understanding of the concept 'mailing list'.
On Sat, 10 Mar 2001, Becky wrote:
Read your article. Most of the examples
I was doing an internet search on cor esp. your article was on my hit list.
At this point I cannot recall the page. Are you the right person for the
subject?
Jim Choate wrote:
Hi Becky,
Which if the several hundred subscribers to the 8+ CDR nodes and
potentialy thousands of associated
Ok, let me say this again
You are sending a note to a distributed mailing list. It has 8 core nodes
with each node hosting their own set of independent subscribers. The total
number of subscribers is potentaily several hundred. You are acting like
you're sending a note to an individual. You
I received no postings from cyberpass from sometime Monday through
this morning. It seems to be back now.
Peter
--
From: Bill Stewart home email[SMTP:[EMAIL PROTECTED]]
As far as I can tell, I've been receiving this discussion via
cyberpass.net,
so it must be ok
I was subscribed to cyberpass.net, been gone for two days and
came home to no cpunks mail. Subscribed to lne and it started flowing
again.
Pretty weird -- even wierder is what happened to openpgp -- I was
subscribed to that one, it went down, came back up, went down again and
never
On Wed, 7 Mar 2001, John Young wrote:
Jim Bell has made a motion to have three of the USA's
witnesses undergo psychological evaluation. No names
given in the case docket. Since Jim has been repeatedly
moving to have his federal defender, AUSA London, and
Judge Tanner recused, it may be
I think it might have something to do with the fact that we rarely see
females posting on cypherpunks.
But let's see her use a TYPE II remailer, yeah !
How stupid do I look wrote:
Not enough information.
Please clarify the following ambiguities:
What kind of an apple is it?
A magic one, of course.
Is she a witch? Magic scares me.
Why? A female spirit appears to you, that's a "Good Thing", eh?
Is
Doing a little research to be up to speed on cable...
PacketCable is interesting, as it talks about online gaming, telephony,
etc... but check out this part of the spec.
http://www.packetcable.com/specs/pkt-sp-esp-I01-991229.pdf
At 11:02 AM 3/1/01 +, Ken Brown wrote:
Reese wrote:
I don't think Godwin would agree. Godwin's Law is a natural law of Usenet
named after Mike Godwin ([EMAIL PROTECTED]) concerning Usenet "discussions".
It reads, according to the Jargon File: As a Usenet discussion grows
longer,
the
Hm.
It's odd my two main hobbies -- arguing about libertarian politics and
RPGs -- overlap, but check this out:
http://www.rpgplanet.com/dnd3e/interview-rsd-0300.htm
(Do a search on 'network' to find the relevant section of the
interview.)
Apologies to Matt and the II, but from where I stand,
--
At 11:23 PM 2/27/2001 -0500, David Stultz wrote:
Isn't there some sort of rule where at the first mention of
"Hitler" or "Nazi", it's the end of the thread?
James A. Donald:
It appears to me that this rule is most commonly invoked by those
whose ideology and program has a
On Wed, Feb 28, 2001 at 08:52:33AM -0800, Eric Cordian wrote:
More "Zero Intelligence" from the public school system.
http://www.newsday.com/ap/text/national/ap448.htm
Charges dropped:
http://www.cnn.com/2001/LAW/02/28/recording.charge.01.ap/index.html
-
NAVARRE,
At Wed, 28 Feb 2001 08:49:43 -0800, Tim May [EMAIL PROTECTED] wrote:
At 7:16 AM -0600 2/28/01, Jim Choate wrote:
-- Forwarded message --
Date: Tue, 27 Feb 2001 22:23:04 -0800
From: Jon Stevens [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: weird
The comment came from a
On Tue, Feb 27, 2001 at 11:46:58AM -0800, lizard wrote:
"Colin A. Reed" wrote:
I'll admit that the trial was fucked up from the start by the decision to
center it around netscape rather than something more blatant like stac.
Anyways, this has nothing to do with FC, unless you think
On Mon, 26 Feb 2001, Tim May wrote:
At 2:57 PM -0800 2/26/01, Ray Dillinger wrote:
If they can fix micropayments so that I can authorize my web
agent to spend up to $5 a month and not pester me about it,
they might have something I'd use.
Most people will skip any sites that cost
"Colin A. Reed" wrote:
I'll admit that the trial was fucked up from the start by the decision to
center it around netscape rather than something more blatant like stac.
Anyways, this has nothing to do with FC, unless you think that enterprise
is fundamentally expressive and Microsoft's
Also imesh (http://www.imesh.com) seems to work ok.
No details of how it works, but it has a reasonable selection
of music (and porn videos by the look of it) and is faster
than gnutella.
I guess a big thing going for distributed file sharing is the
interest level. These napster a-like people
On Thu, 22 Feb 2001, Ray Dillinger wrote:
If your application can read and write an encrypted drive without
specifically providing the keys, then a trojan on your system can
read and write an encrypted drive without specifically providing
the keys.
I think it is not sensible to include trojans
Encryption is used in economic policy,
without it a minority wouldn't be so lucky over the stock markets
and the majority wouldn't have consistent bad luck over it.
Forget General Dynamic, General Electric or NBC.
Put your attention on how interest rates fluctuation is argumented in favor
of,
During the grand jury questioning I was asked about only
one person besides Jim Bell and the CIA-fictional "Mueller"
and this was someone whose name I did not know. The
name could have been as fictional as the other two.
Do not send me private email or snail mail or telephone
or visit.
snort When will people stop falling for this?
Remember that when you register a second-level domain, you can assign any
subdomains you want through your own DNS service. The owners of KLUGE.ORG,
for example, could add RAYMOND.D.MERENIUK.IS.A.MORON.KLUGE.ORG. If
Microsoft itself had such a
Bill Stewart wrote:
[...]
Neil Stephenson's Cryptonomicon is of course recommended,
and classics like Vinge's "True Names" and "A Fire Upon The Deep".
and Stephenson's "Snow Crash". Orson Scott Card's "Ender's Game"
has some nice treatment of reputation systems and pseudonymity -
mmotyka said:
I wonder what's the budget to date for chasing down one apparently not
so dangerous guy? They may be creating, at great expense ( is there
another way for a government to create? ), what it is they want to find.
If they push him over the edge, in 5 years or so they can have a
Congrats to John on his current luck.
Well, not the visit to WAy out there.
Declan, nice photos.
Now check these out:
http://www.villagevoice.com/issues/0104/conaway.shtml
Heh-heh-heh.
At 07:51 AM 1/23/01 -0600, Lori Banks wrote:
I just read an interesting email that you sent concerning cracking .pwl
files.
I have a need to crack a .pwl file, but I don't know how to make that
program work.
I'm really not computer literate (if you can't tell).
I am a concerned parent that
Bill Stewart wrote:
At 01:26 PM 1/24/01 +0100, Tom wrote:
Alan Olsen wrote:
You could do a collectable card game based on the patent mess, but the
idea of a collectable card game has already been patented. (Now owned by
Hasbro now that they bought Wizards of the Cost.)
wouldn't that
You could do a collectable card game based on the patent mess, but the
idea of a collectable card game has already been patented. (Now
owned by
Hasbro now that they bought Wizards of the Cost.)
On a slightly more cypherpunkish theme, before Cryptonomicon had the
base-52 Solitaire
Jim Burnes smoldered:
#Reese wrote:
# Reno burned little kids in their church, because of the FIREARMS held
# or believed to be held somewhere on or around the compound.
#
# You might want to reappraise.
#
#I've appraised the Waco scenario more than most. You might
Which one of our 8 lists could you not followthe instructions?
Thanks-
Gagler
Why don't we subscribe [EMAIL PROTECTED] to the cypherpunks list? It is
absurd that they haven't removed [EMAIL PROTECTED] from their jokes
list, after being asked repeatedly.
I hope there is a separate sub-challenge on someone being
caught with non-children-"child porno" being labeled a
sex offender.
Talk about thought crime...
At 01:26 PM 1/24/01 +0100, Tom wrote:
Alan Olsen wrote:
You could do a collectable card game based on the patent mess, but the
idea of a collectable card game has already been patented. (Now owned by
Hasbro now that they bought Wizards of the Cost.)
wouldn't that be perfect? a "collectable
L PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED]
Sent: Wednesday, January 24, 2001 10:25 AM
Subject: RE: Unsubscribe broken while you spam this address
Send them the bounce messages that show that their unsubscribe script is
broken.
They also need a clue-by-four upside the head for thei
On Wed, 24 Jan 2001, Gagler wrote:
Date: Wed, 24 Jan 2001 17:31:00 -0600
From: Gagler [EMAIL PROTECTED]
To: James Wilson [EMAIL PROTECTED], A. Melon [EMAIL PROTECTED],
[EMAIL PROTECTED], [EMAIL PROTECTED],
[EMAIL PROTECTED]
Subject: Re: Unsubscribe broken while you spam
Someone is using your mailing lists to direct unwanted
"noise" email at another mailing list. They think it's
fun to subscribe a discussion mailing list address for
one of your no-posting-allowed mailing lists and annoy
a few hundred people a day. The guy who wrote you is
probably not
At 09:53 PM 1/22/01 -0600, Jim Choate wrote:
And probably the best crypto/code/conspiricy fiction ever written,
Foucault's Pendulum by Umberto Eco.
It's worth reading the Illuminatus! trilogy first.
I tried finding that in used book stores a decade or so ago,
and for a while there was a
At 01:27 AM 1/23/01 -0500, dmolnar wrote:
This suggests a tangent - If we look at works of fiction which were
politically or socially influential in their day, how many were
entertaining? how many were "good stories"? A lot of polemics end up
seeming transparent and thin today (I'm thinking in
--
On Fri, Jan 19, 2001 at 04:13:32PM -1000, Reese wrote:
Then why were the troops laying siege to the compound, instead of
snatching koresh when he made one of his frequent trips into town?
At 11:54 PM 1/19/2001 -0500, Declan McCullagh wrote:
Because sometimes a show of force is
nks list: "Blank Frank" is anonymous. S/he
could be anybody, or several different anybodies at the same time.
You happened to catch it/him/her/them in a nasty mood, and at
least one of it/him/her/them flamed you pretty hard. Perhaps that
particular persona of "Blank Frank" is all out of
On Thu, 18 Jan 2001, Declan McCullagh wrote:
from fas:
ASSASSINATION POLITICS
In a new bill introduced in the House of Representatives on January 3, Rep.
Bob Barr proposed to eliminate the longstanding official prohibition
against assassination.
Ew, ick.
This seems to be devolving to the
Ex-MI6 officer Richard Tomlinson's book, "The Big Breach:
From Top Secret To Maximum Security," is available for
order on a Russian Web site:
http://www.thebigbreach.com
It also seems to be available at spAmazon.
--
A quote from Petro's Archives:
Ken Brown wrote:
so (the author claims) bypass Echelon. Hmmm. Whoever put the site up
doesn't seem to have a clear distinction between cryptography,
stenography obfuscation. Does everyone have to reinvent the wheel
every time? Are we going to go through it all *again* with mobile phone
At 01:38 AM 1/21/01 -0500, [EMAIL PROTECTED] wrote:
From: Declan McCullagh [EMAIL PROTECTED]
#
#When I was standing on a sidewalk in front of the federal courthouse on
#Pennsylvania Ave (of Monicagate and Microsoft trial fame), a deputy U.S.
#Marshal told me I could not take a
On Mon, 22 Jan 2001, Bill Stewart wrote:
"Trouble and Her Friends" has some good treatment of cryptographically
protected subcultures, though that's more as redeeming-social-value
for a book that's written for genre.
Yes, that had been nagging at me. I haven't read it in years so didn't
At 07:09 PM 1/22/01 -0500, dmolnar wrote:
Etizoni is a very technical boy. Unfortunately, his value system
led him to invent "Fair Cryptography" (that's "fair" as in "Fair Trade",
not "fair" as in "actually fair to anybody" :-), which covers a
couple of variants on key escrow.
Hmm. So this
One of the major values to fiction is that it lets you think about
the social implications of technology, in most cases without
going deeply into the technology itself. That's important for
cypherpunks, though the street finds its own uses for tech,
and it's easier to describe crypto non-bogusly
On Sat, Jan 20, 2001 at 08:32:14AM -0800, James A. Donald wrote:
--
On Fri, Jan 19, 2001 at 04:13:32PM -1000, Reese wrote:
Then why were the troops laying siege to the compound, instead of
snatching koresh when he made one of his frequent trips into town?
At 11:54 PM 1/19/2001
On Sat, Jan 20, 2001 at 01:06:43AM -0800, Raymond D. Mereniuk wrote:
Declan McCullagh [EMAIL PROTECTED] wrote
But I wonder who really believes Ashcroft is being absolutely genuine
in his responses to Feinstein?
In the last election in Texas when G.W. Bush was running for
governor he
At 12:07 AM 1/21/01 -1000, Reese wrote:
It wasn't a right for the what, 40,000 in flint michigan, either, was it?
It's called at-will employment: You keep your employer happy, you get your
job. (I'm starting to think you're not only very educated, but not very
educable. I'd love for you to
On Sun, 21 Jan 2001, Declan McCullagh wrote:
You're thinking too literally. Show of force: When an employer reminds
a slacker that having a job is not a right.
That's just shit rolling downhill. How long is a manager going to have
his job if he *doesn't* fire slackers? Or how long can an
Which one of our 8 lists could you not followthe instructions?
Thanks-
Gagler
- Original Message -
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Sunday, January 21, 2001 12:00 AM
Subject: Unsubscribe broken while you spam this address
Your unsubscribe process, both the web
Declan McCullagh [EMAIL PROTECTED] wrote
But I wonder who really believes Ashcroft is being absolutely genuine
in his responses to Feinstein?
In the last election in Texas when G.W. Bush was running for
governor he was accused by his opponent of only using the
governvorship of Texas as a
benefited from this "necessary" show of how forcefully Reno et al.
could burn wooden buildings with people inside them? Yeah-yeah, the
evidence is contested, re: who started the fires. What isn't contested
is the armored vehicles poking gun muzzles through the walls.
Reese
At 9:00 AM -0500 1/20/01, Declan McCullagh wrote:
Reno probably didn't expect the situation to, um, blow up in her face.
It is also undisputed that if they wanted to avoid a show of force,
they could have nabbed Koresh during his jogs around the property
line or whatnot in the morning. Reese,
On Sat, 20 Jan 2001, Tim May wrote:
As for Ashcroft, we'll see. Bush won, so Bush gets to appoint his
staff. The whole "review by the Senate" thing is a relic of the
McCarthy era, actually, and should be done away with.
Advice and consent of the Senate as to federal officers has been in
1 - 100 of 1141 matches
Mail list logo