Some interesting stuff in this one...

------- Start of forwarded message -------
Message-Id: <[EMAIL PROTECTED]>
Date: Fri, 10 Mar 2000 23:20:14 -0500
To: Cryptome Daily <[EMAIL PROTECTED]>
From: Cryptome Daily <[EMAIL PROTECTED]>
Subject: Cryptome Daily 9-10 March 2000

Cryptome Daily - 9/10 March 2000 (None 7/8 March)

---------------------------------------------------------------

U.S. Intelligence and Investigative Net Domains, March 10, 2000

"This presents a collection of records on military and government 
Net domains gathered today for U.S. intelligence and investigative 
agencies such as the Central Intelligence Agency, Federal Bureau 
of Investigation, Department of Justice, Treasury Department, U.S. 
Courts, National Security Agency, National Reconnaissance Office 
and Defense Intelligence Agency. This provides recent information 
on which agencies are using machine addresses that overtly identify 
the operative agency and which do not. For example, Cryptome has 
never logged a machine overtly named cia.gov, fbi.gov, nsa.gov, 
nsa.mil, nro.gov, nro.mil or dia.mil, though there are machines 
logged with host addresses traceable to most of those agencies. 
In contrast, some other governmental machines are overtly 
identifiable by their addresses."

  http://cryptome.org/usiid.htm

---------------------------------------------------------------

Bernstein Second Inquiry to BXA on Crypto Regs, March 10, 2000

  http://cryptome.org/bernstein-bxa2.htm

---------------------------------------------------------------

Alleged MI6 Officers in Qadahfi Murder Plot Revealed, March 10, 2000

"The report says that among British journalists in Lisbon there was 
a certain bad feeling towards Home Secretary Jack Straw because the 
British Official Secrets Act 'forbids them publishing the names of 
David Watson and Richard Bartlitt, alleged secret agents PT-16B and 
PT-16, from MI6, and probably responsible for the murder attempt on 
Gadafhy, revealed by interviews of David Shayler in Paris.' "

  http://cryptome.org/qadahfi-mi6.htm

---------------------------------------------------------------

Espionage and Secrecy News, March 10, 2000

  http://cryptome.org/esn031000.htm      

---------------------------------------------------------------

Orbit/FR Debarred for ITAR Violation, March 10, 2000

  http://cryptome.org/dos031000.txt

---------------------------------------------------------------

BXA Rule on Hi-Performance Computers, March 10, 2000

  http://cryptome.org/bxa031000.txt
---------------------------------------------------------------

MPAA Attacks DeCSS Down Under, March 10, 2000

"MPAA have sent us, an Australian organisation, the same letter with 
the same demands etc etc, presuming that we should be subject to US 
laws etc. I thought you'd be further interested to see this posting 
about the situation as it's developing down under (in short, there 
are no laws preventing DeCSS from being distributed/marketed/whatever 
in Australia and a set of upcoming changes to Copyright law which 
bring in a few provisions about reverse engineering through 
decompilation etc don't address the issue and the MPAA is sending 
people to Australia to pressure the Government into adding them 
despite the bill being quite close to passing in it's current form 
without provisions for circumvention devices etc)."

  http://cryptome.org/dvd-mpaa-au.htm

---------------------------------------------------------------

Yahoo on Secret Qadahfi Report, March 9, 2000

"Cryptome noted that there is an intense British investigation to 
learn how the Qadahfi document was offered on Geocities, and that a 
British person had been arrested recently as a result. And asked 
would he comment on whether Yahoo has been contacted for this 
investigation. Mr. Holtz said to comment on such matters would 
violate Yahoo's policy on customer privacy. Mr. Holtz said it is 
Yahoo policy to neither confirm nor deny the reasons for the 
offering or removal of content on its Geocities web sites. Yahoo 
does not examine the content before it is offered, and does not 
review it unless a complaint is made. If reviewed in response to 
a complaint, the content is evaluated only according to the terms 
of Yahoo's service contract. Yahoo will never remove content that 

is in compliance with its terms of service contract -- except by 
court order. Mr. Holtz said he could not comment on whether Yahoo 
received a court order to reveal information about the source of 
the the Qadahfi document or to remove it, nor comment on any 
other speculation for its offering or removal, for that would 
violate Yahoo's strict policy on the privacy of customers."

  http://cryptome.org/yahoo-qadahfi.htm

---------------------------------------------------------------

Cylink Response, March 9, 2000

"In an e-mail to Cylink's CEO, you invited a response. This letter 
is that response. We see no reason to comment on the unsubstantiated, 
unsourced, unsigned and libelous allegations posted by you on your 
website. We assume you are aware that by electing to publish these 
comments on your site, you have made yourself legally responsible 
for their actionable content. We also note this is not the first 
time you have libeled Cylink, its officers and directors. My clients 
reserve all of their rights and remedies with respect to their 
claims against you, your site, your partners and all those who 
participated in this posting."

  http://cryptome.org/cylinked.htm

---------------------------------------------------------------

Decrypting Cold War Espionage Codes, March 9, 2000

"In the course of getting various files from the government agencies, 
my attorney was given several cover letters dated 1947 involving an 
intra-agency transfer of various decrypts made at that time. As I was 
to learn from Mr. Benson of the NSA, the decrypts accompanying the 
cover letters were not copies of the originals, but were later 
decrypts, made after the FBI had entered the Venona project.
Interestingly, the FBI helps shed some light on this very question 
in a memorandum dated February 1956, on the possible use of Venona 
for prosecutions: 'The messages . . . are, for the most part, very 
fragmentary and full of gaps'; it concludes, 'It is for such reasons 
that has indicated that almost anything included in a translation of 
one of these decrypted messages may in the future be radically 
revised.' Viz: The switch from Weichbrod to Rosenberg. If this is 
so it would certainly be interesting to see what these earlier 
decrypts looked like. It is one thing to decrypt coded messages 
cold, and quite another to decrypt when one has 'leads.' How much 
tailoring there was, to fit the 'leads.' remains to be seen. Mr. 
Benson said he would look into getting me those earlier decrypts, 
which were supposed to have been sent to my attorney in the first 
place. But then it turned out that they were not available. The NSA 
makes the claim that 'The preservation of NSA's ability to use 
specific cryptanalytic techniques and the resulting success or failure 
at exploitation using those techniques must be kept in greatest 
secrecy.' As I wrote them in my Notice of Appeal, 'To protect the 
NSA's pre-computer cryptanalytic methodology because it might have 
some bearing on today's methodology . . . is nothing less than a 
joke.' " -- Morton Sobell

  http://cryptome.org/nsa-sobell.htm

---------------------------------------------------------------

Cryptome spoke with Morton Sobell this morning. He said he is one of 
the first to critique the easy-to-spot FBI bias of the Venona-decrypt 
interpretations and that the lack of other such critiques is peculiar. 
We discussed why narrative text is often more beguiling to writers 
than code, and why the FBI and historians want compelling stories 
without gaps, not the indecipherable shards which cryptanalysts 
ponder for years in search of elusive accuracy. We said it is 
noteworthy that The Wall Street Journal had featured his letter, 
that perhaps it is due to Journal's recognition of the importance 
of cryptography for electronic commerce since the Cold War. Mr. 
Sobell agreed; and said The New York Times had refused to publish 
a similar letter five weeks ago. He has additional information and 

views on this matter and welcomes inquiries, especially from those 
with an interest in how the NSA, FBI and historians have creatively 
interpreted the Venona decrypts to fit intentions. The NSA's refusal 
to release outdated decrypt material is a challenge for which Mr. 
Sobell solicits support and advice from the cryptographic community. 
He may be reached at: [EMAIL PROTECTED]; tel: 415-826-2075.

---------------------------------------------------------------

Symantec Threatens Legal Action Over I-Gear Report, March 9, 2000

"Peacefire has never altered any content on our Web site as a result 
of legal threats.  Our report on I-Gear will stay up, and we will 
post updates to our Web site regarding the legal situation."
-- Bennett Haselton, 

  http://cryptome.org/igear-fire.htm

---------------------------------------------------------------

Combatting Terrorism: Chemical and Biological Medical Supplies 
Are Poorly Managed, March 8, 2000

"The Office of Emergency Preparedness (OEP), the Department of 
Veterans Affairs (VA), and the Marine Corps Chemical and Biological 
Incident Response Force (CBIRF) did not have basic internal controls 
to help them manage their stockpiles. As a result, the inventory we 
conducted identified a number of items, such as antidotes and 
antibiotics, that were stocked below required levels or had expired, 
as well as excesses of other items like sterile gloves. In one 
location, for example, we found 1,000 fewer diazepam injectors than 
required. This drug, commonly known as valium, would be administered 
to calm victims and control their convulsions. Although VA contends 
that it stockpiled a substitute, it could not provide written 
documentation of OEP�s approval at the time of the substitution. 
At another location, the entire supply of 2,000 vials of amyl 
nitrate - an antidote for cyanide poisoning - had expired. We 
also found incorrectly recorded expiration dates and lot numbers, 
which are necessary to keep supplies current and respond to 
potential manufacturer recalls. At one location, for example, 
this information was wrong for 250 doxycycline tablets and 100 
ciprofloxacin tablets; these antibiotics would be administered 
to prevent the onset of symptoms in people exposed to anthrax."
-- Cynthia A. Bascetta, GAO

  http://cryptome.org/h100059t.htm

---------------------------------------------------------------

O f f s i t e

Echelon Information Site

  http://echelon.tsx.org

UK computer crime plans attacked

  http://news.bbc.co.uk/hi/english/sci/tech/newsid_669000/669381.stm

UK RIP for basic liberties

  http://www.newsunlimited.co.uk/leaders/story/0,3604,144046,00.html"

UK House of Commons Research paper on RIP

  http://www.parliament.uk/commons/lib/research/rp2000/rp00-025.pdf

UK Seconding Reading debate in House of Commons


http://www.publications.parliament.uk/pa/cm199900/cmhansrd/cm000306/debtext/
00306-06.htm#00306-06_head1

UK Scrambling for Safety 2000

  http://www.fipr.org/sfs2000
               
---------------------------------------------------------------

Cryptome Daily by E-mail
Sub:   Blank e-mail to [EMAIL PROTECTED]
Unsub: Blank e-mail to [EMAIL PROTECTED]

http://cryptome.org

---------------------------------------------------------------


------- End of forwarded message -------

Reply via email to