Blacks on Blondes.

2003-01-24 Thread Matthew X
Ahh dogfart, sheer porking pleasure...
http://www.sexhealth.org/problems/premature.shtml

Do we really have to look far for Mongs hostility? ( 
J...e...al...o...u...s...)

http://www.blonde-black.com/551/pix/10.jpg

http://www.blonde-black.com/551/pix/11.jpg

http://www.fuckedathome.com/freegallery/nadia/2/pics/18.jpg

He's a well hung Chicano Mong...enjoy.



Jail House Rocked.

2003-01-24 Thread Matthew X
Riot rocks Vancouver Island jail

Wednesday, January 22, 2003


corporate news report


A riot by about a dozen unruly inmates at the Vancouver Island Regional 
Correctional Centre on Wilkinson Road caused $40,000 damage to prison 
property late Tuesday night.


Three prisoners are now facing charges.


The inmates were in a common area when the call came for lockdown at 10 
p.m. But they refused to go back to their cells and began trashing the 
place. Of the 23 prisoners in the unit, up to half were involved in the 
riot. Some of the others locked themselves inside their cells to avoid 
being implicated in the trouble. Corrections officers negotiated a peaceful 
end to the incident by 1 a.m. Corrections spokesperson Wayne Willows says 
the living unit officer was slightly injured, but managed to call police 
and lock himself in an empty cell for protection.


The inmates in the remand unit have been charged with committing an 
offence, but have not yet been tried. Although they have not been 
determined guilty, they are kept in custody to ensure they appear in court 
and cannot commit another offence. All remand inmates are housed in secure 
facilities that emphasize control, separation and protection.

Willows says the incident appears to be spontaneous. He says the three 
troublemakers who were arrested didn't make any demands. But he says if the 
inmates have any grievances they should bring them to the institution's 
attention.

We will hear those grievances, Willows says.

Saanich police were called in to secure the perimeter of the jail, but none 
of the rioters breached the institution's security. Police also supplied a 
hostage negotiator and emergency response team. The Saanich Police 
Department has a protocol agreement with the corrections branch to provide 
support when requested.


Willows says there hasn't been an incident of this magnitude at the prison 
in about 10 years. Last September a couple of inmates started a fire in one 
of the cells. Seven inmates were treated for smoke inhalation following the 
incident.

Link: http://www.geocities.com/insurrectionary_anarchists

http://www.infoshop.org/inews/stories.php?story=03/01/23/5365146



What's Your Interest in China?

2003-01-24 Thread Matthew X
Two Chinese workers tried for subversion over protests
By John Chan
23 January 2003
Two Chinese workers' leaders-Yao Fuxin, 52, and Xiao Yunliang, 56-could 
face the death penalty if found guilty of charges related to their role in 
demonstrations of laid-off workers in the city of Liaoyang in north-east 
China last March. As many as 30,000 workers participated in the protests to 
demand financial assistance and the prosecution of corrupt officials.
Local police have held Yao and Xiao in detention for the 10 months. On 
January 15, the two were dragged before the Liaoyang Intermediate Peoples 
Court to face charges of subversion. A verdict is expected to be announced 
in the next few days.
The detention and trial of the two workers has been a politically-motivated 
farce from start to finish. Chinese authorities have flouted even the 
limited legal rights available to the detainees under the country's 
constitution. Originally charged with organising an illegal gathering and 
demonstration, the two should have been tried or released by last October.
In November, however, new charges of terrorism were brought, based on 
false claims that cars had been bombed during the March protests. Prior to 
last week's trial, the previous charges were dropped. A decision was 
obviously taken at the top levels of the Stalinist bureaucracy to make an 
example of the two workers by trying them on the political charge of 
subversion, which is notoriously vague and carries more serious penalties.
The court proceedings were surrounded by tight security. Chinese 
authorities ignored the standard procedure of providing three days notice 
and announced the case on the day of the trial. Most of the 200 tickets to 
the public galleries had already been distributed to police officers and 
government officials in order to ensure that few of Yao and Xiao's 
supporters were in court.
Despite the short notice, hundreds of workers gathered outside the court 
building to register their protest against the proceedings. Police blocked 
off the streets near the trial and established a substantial presence in 
workers' neighbourhoods. A French journalist attempting to cover the case 
was detained and forced to return to Beijing.
Prior to the trial, police cut the phone lines of other local leaders-Wang 
Zhaoming and Pang Qingxiang-and threatened their families if protests took 
place. Wang, who disappeared from his home on New Year's Eve, has since 
returned home but was warned not to discuss the trial.
The trial itself took only four hours. The prosecutors called no witnesses 
to testify and presented little evidence. The only basis for the 
accusations of subverting the government was that Yao and Xiao had 
contacts with foreign news services, human rights groups and the banned 
China Democracy Party. Phone records of conversations were submitted.
The prosecution produced one statement from another protest leader, Pang 
Qingxiang, who was arrested along with Yao and Xiao in March. He had 
obviously been pressured to incriminate his fellow detainees. He was 
released after he alleged that Yao had had contact with the China Democracy 
Party. Based upon Pang's statement, the court accused Yao of signing a 
Democracy Party petition letter in 1998.
Yao was also accused of having communication with a hostile element-Han 
Dongfang, director of the Hong Kong-based China Labour Bulletin and the 
expelled leader of the Beijing Workers Autonomous Union, which played a 
prominent role in the 1989 protests in Tienanmen Square and elsewhere. Han 
immediately told the media that the Chinese authorities had made up the 
story and accused them of turning the trial into a showcase to deter 
other workers from taking action.
According to a report in the Washington Post: When given a chance to 
speak, Xiao mocked the charges against him, asking how an unemployed worker 
like himself could overthrow the government, audience members said. Yao 
delivered a more emotional statement, they said, arguing the everything he 
did was for his fellow workers and shedding tears as he described how poor 
they were. Some workers in the gallery wept too, and police forced them to 
leave the courtroom.
Mo Shaoping, defence lawyer for the two workers, told Reuters after the 
hearing that the prosecution had just accused them of this crime but had 
provided no concrete evidence in court. He said the two defendants were not 
guilty and felt the accusations were false.
It is highly unlikely, however, that China's politically subservient court 
system will do anything other than bring down the required guilty verdict 
and a harsh penalty. Yao's daughter was quoted in the Washington Post as 
saying: We're not optimistic. We still have hope, but we're very worried.
A signal to investors
The newly installed Chinese Communist Party leadership has clearly decided 
to prosecute Yao and Xiao both as a warning to workers and as a signal to 
foreign investors that the regime will not 

The Trafficante Family is the original team of buccaneers in Tampa.

2003-01-24 Thread Matthew X
Tampa Bay Buccaneers

The Trafficante Family is the original team of buccaneers in Tampa

 Related Resources
• Mobs Outside New York
 Elsewhere on the Web
• The Tampa Mob
With the Tampa Bay Buccaneers in the Super Bowl for the first time, the 
spotlight is shining once again on that West Florida city. For the 
community, the Super Bowl appearance means millions in revenue from T-shirt 
sales, party supplies and increased restaurant sales.

For the underworld, the Bucs’ accomplishment means lots of illegal 
gambling. Associated and independent bookies alike will be taking a lot of 
action on the Super Bowl and that means money for what remains of the 
Trafficante family. You can be sure that somewhere, the Trafficantes, 
Santos junior and senior, are smiling with all of the action their family 
bookmakers must be taking these days.

Times have certainly changed in the Tampa-St. Petersburg area from when 
Santos Senior took control of the Florida mob from Ignacio Antinori in 
1940. Trafficante was tough enough to go toe-to-toe with Meyer Lansky over 
the control of the lucrative South Florida gambling joints and smart enough 
to know when to back off and play ball with Lansky and the Syndicate.

Along with Lansky, Trafficante built up the Cuban gaming empire which 
collapsed when communists took control of the island in the late 50s. 
Santos Sr. died in 1954 and when Castro took control of Havana, he threw 
Santos Trafficante Jr.  on the island to oversee the gambling operations -- 
in jail and then threw him out of the country.

The Trafficante family has had a rough run over the years, especially under 
the reign of Santos Jr. More than any other Mafioso, except, perhaps Sam 
Giancana, Santos Trafficante Jr. has been linked with government intrigue 
on the highest levels.

His first run-in with the federal government was when he was recruited to 
help the CIA assassinate Fidel Castro.

Under federal immunity, Trafficante testified in 1975 before Congress that 
he brought other mobsters into the plot out of patriotic duty.

More likely, Trafficante probably used the CIA as a bank. He was given 
large sums of money to supply insurgents in Cuba and to buy influence with 
people who could get close to the Cuban leader. According to statements by 
Chicago mobster Johnny Roselli, who helped Trafficante with the plots, the 
money never left Florida.

The fact that Junior managed to walk out of a Havana prison with all of his 
money leads many to suspect that Trafficante was a double agent who tipped 
Fidel to the plots against him. He may have played a large role in the 
failure of the Bay of Pigs fiasco, although it is more likely Santos was 
playing both ends against the middle.

Knowing all about the invasion, Trafficante had an associate standing by in 
the Bahamas with a suitcase filled with gold which was to be used to buy 
favor with whomever took control after Castro was ousted.

When the invasion collapsed, Trafficante and Lansky moved their Caribbean 
operations to Nassau.

Trafficante’s name also comes up fairly often in conspiracy theories 
surrounding the assassination of President John F. Kennedy, although no 
credible evidence exists to link the Mafia with Kennedy’s murder.

Like his father, Santos Jr. managed to die peacefully.

The Tampa mob is in a condition similar to many outside New York City. Old 
age, stronger methods of combating organized crime and an influx of street 
gang-linked criminals have reduced the influence of a once-proud family.

One thing is certain, the Bucs’ appearance in the Super Bowl will put a 
great deal of cash into Tampa’s underworld economy. Regardless who wins 
next Sunday, the Tampa mob should be well juiced for months to come.

http://organizedcrime.about.com/library/weekly/aa012103a.htm



Message sent by Vallen e-Mailer

2003-01-24 Thread hope
 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;
charset=US-ASCII;
charset=US-ASCII;

 charset=US-ASCII;

Are you paying too much for Auto Insurance?

2003-01-24 Thread GreatDeals
Title: Save On Auto Insurance!





	This offer is presented to you by Great Deals

  
   
   
   
   
   
   
   
   
   
  

  

   
  
  
   
 
  Are You Paying 
Too Much?
  
Compare Multiple 
  FREE Quotes
One Easy Form - 
  Only takes Minutes
Over 20 
  National Insurance Carriers
  

   
   
  
  
   
   
  
  
   

   
   
  
  
   
   
  
  
   

   
   
  
  
   
   
  
  
   
   
  
  

 
  
   2002 LowerMyBills.com 


   
  






-
You are receiving this mailing because you opted in via MillionOrbLoad6.
To unsubscribe, please click 

here or reply to this email.







*****SPAM***** Are you a Cocaine Addict?

2003-01-24 Thread The Stuff





  

  
	From the Planets Foremost Botanical Cooperative...
	For your absolutely
	legal
	Delight  Pleasuring... The BEST ever...
	You must be 21 Years of age!!! 
	SATISFACTION
	GUARANTEED
	719-332-9352

  



  

  1.)
	CHEN CHEN
	HERBA Very mellow, uplifting and happy; 
	just a few draws of Sensitive Smoka. Clean, loose-leaf; 
	Roll it, bowl it or smoke it with a pipe!! (pipe included) 2oz..$75.00
	
	2.)
	TONGA TAI
	BRICK...Solid amalgamation of high-ratio; 
	strike-alchemized,(brickened  kiffened) exoticas. Indeed a 
	Sensitive/Responsive pipe-smoking substance. Just a pinch 
	Smokes a long, long wayA most significant remedy. Absolutely 
	a depressive / regressive!!! (pipe included) 2oz.brick..$115.00 
	
	3.)
	TONGA TAI HAPPY
	DROPS..A breakthrough Liquid Toke 
	for the non-smoker. Under the tongue or in juice.70+ servings. 
	2oz. dropper bottle..$115.00
	
	4.)
	LASIVIOUS EROTOMANIA APHRODISIA
	DROPS
	Promotes both physical  psychological Desire  Uninhibitedness.
	
	For men  women!!! Under the tongue or in juice. 45+ servings. 
	1 oz. dropper bottle ..$90.00
	
	5.)
	HARMONY
	SNOOTAn inhalant powder originally designed
	to 
	help end cocaine and methamphetamine dependenciesVery
	psychologically uplifting, very mood-enhancing, very multi-level 
	(body-mind-spirit) energizing. Non-invasive!!! Just a little row
	is 
	all you need..3 dry oz. bottle (well over 600 servings) 
	(includes glass snooter).$85.00
	
	6.) OOH
	LA LA. INTRO OFFER.Everything Above
	for..
	$210.00.(Reg. Price.$480.00.)

  



  

  
	TO
	ORDER / MORE
	INFO please call
	719-332-9352
	during normal business hours. 
	All orders shipped next day via U.S. Priority Mail. 
	Please add $7.00 SH to all orders. 
	All credit cards accepted. 
	Thank you for your wonderful attention 
	God Bless.

  




Your email address was obtained from a purchased
list, Reference # 1210-13903.If you wish to unsubscribe from
this list, please email our
Abuse Control
Center, or call 1-888-763-2497, or write us at: NoSpam, 6484 Coral Way,
Miami, FL, 33155.






[IP] Open Source TCPA driver and white papers (fwd)

2003-01-24 Thread Eugen Leitl
-- Forwarded message --
Date: Fri, 24 Jan 2003 02:29:27 -0500
From: Dave Farber [EMAIL PROTECTED]
To: ip [EMAIL PROTECTED]
Subject: [IP] Open Source TCPA driver and white papers


-- Forwarded Message
From: David Safford [EMAIL PROTECTED]
Date: Tue, 21 Jan 2003 12:05:39 -0500
To: [EMAIL PROTECTED]
Subject: [open-source] Open Source TCPA driver and white papers


IBM has released a Linux device driver under GPL for its TCPA chip (TPM).
The driver is available at
http://www.research.ibm.com/gsal/tcpa/

This page also has links to two papers, one presenting positive uses
of the chip, and the second rebutting misinformation about the chip.

These papers, combined with the Linux driver and the TCPA specification
at http://www.trustedcomputing.org, give everyone the ability to
test an actual chip (such as in the Thinkpad T30), to see for themselves
what it can, and cannot do.

Note: the papers and driver do not discuss Palladium.
  Palladium and TCPA are two separate topics.

dave safford
[EMAIL PROTECTED]



-- End of Forwarded Message

-
You are subscribed as [EMAIL PROTECTED]
To unsubscribe or update your address, click
  http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/




CCNA«ä¬ì»{ÃÒ§K¶O¸ÕŪ

2003-01-24 Thread Teach
Title: Untitled Document




CCNA«ä¬ì»{ÃÒ§K¶O¸ÕŪ 
¬Û«H¤j®a³£¤£·|ÃhºÃ«ä¬ì(Cisco)¨t²Î¦b¥þ²y³q°T³]³Æ¥«³õ¤Wªº¦û¦³²v¡A¨ä»â¥ýªºIntranet©MInternetºôµ¸¡A¥H¤Î³nµw¥ó²£«~³£¼s¨ü¤j¤p¾÷ºc±Ä¥Î¡C©Ò¥H¦pªG­n§ë¨­I.T¦æ·~¡A¦Ò¨ú«ä¬ì»{ÃÒ¬O´N¬O§A¥²³ÆªZ¾¹¡C

3¤p®É100%§K¶O¸ÕŪ

Cisco»{ÃÒ¬O¬°±q¨Æºôµ¸¤u§@ªº¤H¤h¦Ó³]¡A¦¨¥\¦Ò¨ú¥i§U§A¦¨¥\¦w¸Ë©M°t¸mºôµ¸¡A¨Ã¼W¥[ºôµ¸ÀW¼e¡B¼W±j¥i¾a©Ê¡B¥ç´£°ªºôµ¸©Ê¯à©M¦w¥þ©Ê¡C¸ò«Ü¦h»{ÃÒ¤@¼Ë¡A«ä¬ì»{ÃÒ¤À¤T­Ó¯Å§O¡A¤À§O¬OCCNA¡BCCNP©MCCIE
  ¡C¨ä¤¤CCNA¡]Cisco Certified Network Associate¡^ÄݤJªùµ{«×¡A¥ç¬Oªñ¦~¦æ¤º³Ì¨üÅwªïªº»{ÃÒ¤§¤@¡C¨ä¦Ò¸Õ½d³ò¤Î¤º®e­«©ó²{¤µ¬y¦æªººôµ¸§Þ³N¤Î¸ô¥Ñ¾¹(Router)ªº³]©w¡A¥]¬A
  ¡R 
1.³]©w¤lºô¸ô¡A´î¤Ö¼s¼½¥X²{°ÝÃD,´£°ªºô¸ô®Ä¯à
2.»·ºÝ Telnet ³]©w Router ¡A¦s¨ú Router ¸ê®Æ
3.³]©w ¸ô¥Ñ¾¹ªº¸ô¥Ñ¨ó©w¡C¨Ò¦p: RIP , IGRP & OSPF µ¥
4.Switch ªº³]©w¡ASpanning-Tree Protocol¡AVirtual Lan ªº³]©w
5.OSI Model ¤§¶¡ªºÃö«Y
6.Frame Relay¡APVC ±M½uªº¬[³]
7.Access List ¡A¸T¤î/·Ç³\ºô¸ô¥\¯à
3¤p®É100%§K¶O¸ÕŪ



To be removed from our mailing list, please click here.



Deniable Thumbdrive?

2003-01-24 Thread Tyler Durden
I got a hold of a little gadget recently that is very nearly perfect for 
certain forms of data storage. It's called a Thumbdrive and I bought it 
online somewhere (64Meg for about $179 or so).

The cool thing about this drive (small enough that it has holes for use as a 
keychain) is that it's got a Public area and a private area, and the 
private area is accessible (if one desires) only via the little fingerprint 
reader on the top of the drive. (It's also USB based, and on Windows2000 and 
beyond you don't need any software drivers--just plug it in to a USB port 
and it appears as a drive).

ANyway, I was wondering. I'd really like a nice software mod of this thing 
so that, depending on which finger I use for verification, a different 
private area on the drive will open (right now several users can be assigned 
access by the master user to use their fingerprint for access to the single 
private area). Of course, there should be no indication that there even IS 
more than one private area.

So...anyone heard of such a hack/mod, or is there a straightforward way to 
go about doing it oneself?

-TD





_
Tired of spam? Get advanced junk mail protection with MSN 8. 
http://join.msn.com/?page=features/junkmail



cypherpunks@minder.net

2003-01-24 Thread =?gb2312?q?=C7=F0=D3=C0=B4=EF_
ÄúºÃ£º
ÐÂÄêÀ´ÁÙÖ®¼Ê£¬¹§×£ÄúÐÂÄê¿ìÀÖ¡¢ÁúÂí¾«Éñ¡£
еÄÒ»ÄêÉúÒâÐË¡¡¢ºÃÔËÁ¬Á¬~£¡

ÕâÊÇÄúµÄÅóÓÑÍþ¶øÐŹ«Ë¾¸øÄú·¢À´×ÊÁÏ¡£Ï£Íû¶ÔÄãÓаïÖú,Èç¹û¶ÔÄãµÄ¹¤×÷´øÀ´Âé·³,ÔٴαíʾǸÒâ!
¹ãÖÝÍþ¶øО«ÃÜÒÇÆ÷ÓÐÏÞ¹«Ë¾ÊÇÒ»¼ÒרÃÅ´ÓÊÂÉú²ú¾«ÃܲâÁ¿ÒÇÆ÷µÄÖÐÍâºÏ×ÊÆóÒµ¡£
¹«Ë¾Ö÷Òª²úÆ·£º
Ô²¶ÈÒÇ£¬¶¯Ì¬²¨ÎƶÈÒÇ£¬²¨ÎƶÈÒÇ£¬ÐÎ×´²âÁ¿ÒÇ£¬ÂÖÀªÒÇ£¬¹µÇúÂÊÒÇ£¬Í¹¶ÈÒÇ£¬Ö±Ï߶ÈÒÇ£¬½Ç¶ÈÒÇ£¬Í¹ÂÖÖá²âÁ¿ÒÇ£¬Í⾶×Ô¶¯¼ì²â»úµÈ¡£
ÁªÏµÈË£ºÇðÓÀ´ï
ÊÖ»ú£º013858302668
Http://cnhld.gzyp21.com
E-mail: [EMAIL PROTECTED], [EMAIL PROTECTED]
Èç´ËÓʼþ¶ÔÄúûÓã¬Çë˳ÊÖɾ³ý¡£Ð»Ð»¡£¡£  


Danger,Danger! High Voltage!

2003-01-24 Thread Matthew X
The CIA directors idiot son is about to place a penny in the fusebox...and 
meanwhile in Gotham city...A reputed mob boss was charged yesterday with 
arranging to whack a former Mafia-busting prosecutor in a 1987 hit that was 
botched when misfit mobsters took out the lawyer's elderly father by mistake.
Joel Joe Waverly Cacace, 61, the reputed acting boss of the Colombo crime 
family, was charged with four murders - including the long-unsolved death 
of the former prosecutor's father, 78, a judge.
Also arrested were 11 other alleged Colombo family members, including 
reputed capo Luca DiMatteo, and one reputed Luchese associate named in an 
indictment on charges ranging from gambling and cigarette smuggling to 
extortion.
Yesterday was the first time federal prosecutors identified Cacace, who 
could face up to 100 years in prison if convicted, as the Colombo family's 
acting boss.
His public bow came courtesy of a 2001 wiretap of a Brooklyn jewelry store 
which caught an alleged wiseguy saying of Cacace: He's the captain of the 
team. You know what I mean?
The captain went quietly yesterday when federal agents and New York City 
cops pulled up outside his Deer Park, L.I., home at 6 a.m.
I'll be right down. Give me a few minutes, Cacace told them as he leaned 
out his upstairs bedroom window.
The mild exit was a marked contrast to what federal prosecutors described 
as a career of orchestrating senseless murder and mayhem.
Cacace's lawyer, Michael Macklowitz, declined to comment on the charges.
Federal prosecutors said that in 1987, Carmine the Snake Persico - the 
jailed-for-life boss of the Colombo family - felt former federal prosecutor 
William Aronwald had disrespected organized crime. He ordered Cacace, 
then a Colombo soldier, to have him rubbed out.
Cacace gave the assignment to two of his henchmen, brothers Eddie and 
Vincent Carini.
In a tragic twist, they made a horrible mistake, Brooklyn U.S. Attorney 
Roslyn Mauskopf said of the brothers.
The Carinis went to the law office of Aronwald's father, George, an 
administrative law judge for the city's Parking Violations Bureau and 
identified the wrong target, court papers said.
They tailed the senior Aronwald from the law office he and his son - then 
in private practice - shared and pumped five bullets into him.
The botched murder led to the rubout of four gangland hoods in an orgy of 
rage and revenge, the feds said.
Organized-crime leaders were so furious at the fumbled 1987 hit that 
Cacace, under pressure, allegedly OK'd having two mobsters from other crime 
families kill the Carinis.
The brothers were found shot to death in the back seats of separate sedans 
parked in Sheepshead Bay.
After attending the brothers' funeral, Cacace allegedly wanted to even the 
score.
He recruited an associate - now one of two cooperating witnesses - to carry 
out a broad daylight double-hit on the triggermen - Frank Santora, a 
Bonanno associate, and Carmine Variale, a wiseguy in the Luchese family, 
prosecutors said.
Aronwald's slay remained unsolved until last year when a convicted drug 
dealer implicated in the killing of Santora and Variale began cooperating 
with authorities, sources said.
The mob turncoat told them about Cacace orchestrating the hit on William 
Aronwald, the sources said.
Aronwald yesterday called the arrest bittersweet.
In addition to three of the Aronwald-related murders, Cacace is charged in 
the 1987 slaying of a corrupt ex-cop, Carlo Antonino.
Detectives are also pressing their investigation into a fifth murder where 
Cacace has been a suspect, but never been charged - the slaying of cop 
Ralph Dols.
The off-duty cop was ambushed in his car and executed mob-style outside his 
Sheepshead Bay home in 1997.
In an odd twist, at the time of his death Dols was married to Cacace's 
ex-wife, Kim Kennaugh, who was also Eddie Carini's widow.
It's an odd twist that Gaudi's buck rodgers building is actually stacking 
up well against the nightmarish opposition,why not go all the way with the 
Gotham theme and do a replica of that Stalin Tower in Moscow,you know,the 
apartments converted to a hotel with the spooky roof.
Actually the sooner al quida come back and kill you all in your puritan 
beds the better,the whole worlds tired of yankee crap...take 
this...·   ·   Always (Turned) On
The beautiful, young women of VoyeurDorm.com spend 24 hours a day 
broadcasting their personal lives online. Now they're fighting a legal 
battle to keep their most private moments public.
·   ·   High Tech Peeping Toms
Voyeurs are taking their hidden cameras out of the dressing room and onto 
the street in an effort to sneak a peek up the skirts and down the blouses 
of unsuspecting women. And they're posting the photos online.
·   ·   Selling Sex Online
New breed of prostitutes are surfing the street corners of the information 
superhighway. They say online prostitution is safer, more lucrative, and 
less disruptive. The police say it's still 

RE: Deniable Thumbdrive?

2003-01-24 Thread Trei, Peter


 --
 From: Tyler Durden[SMTP:[EMAIL PROTECTED]]
 Sent: Friday, January 24, 2003 9:52 AM
 To:   [EMAIL PROTECTED]
 Subject:  Deniable Thumbdrive?
 
 I got a hold of a little gadget recently that is very nearly perfect for 
 certain forms of data storage. It's called a Thumbdrive and I bought it 
 online somewhere (64Meg for about $179 or so).
 
 The cool thing about this drive (small enough that it has holes for use as
 a 
 keychain) is that it's got a Public area and a private area, and the 
 private area is accessible (if one desires) only via the little
 fingerprint 
 reader on the top of the drive. (It's also USB based, and on Windows2000
 and 
 beyond you don't need any software drivers--just plug it in to a USB port 
 and it appears as a drive).
 
 ANyway, I was wondering. I'd really like a nice software mod of this thing
 
 so that, depending on which finger I use for verification, a different 
 private area on the drive will open (right now several users can be
 assigned 
 access by the master user to use their fingerprint for access to the
 single 
 private area). Of course, there should be no indication that there even IS
 
 more than one private area.
 
 So...anyone heard of such a hack/mod, or is there a straightforward way to
 
 go about doing it oneself?
 
 -TD
 
Try contacting Trek and see if you can suggest it.

What's you're threat model? If it's your wife or kid sister, this
might work. If it's a major corporation or a government, forget
it - they'll bitcopy the whole flash rom, and look at it with ease.

Based on what I've seen, the fingerprint simply acts as a 
access control. The data on the chip is not encrypted.

There are cheaper thumbdrives which use passwords
which therefore don't leave any evidence binding a specific
drive to a specific person - you said you wanted deniability,
so leaving your thumbprint in the device is not desirable.

That said, these are really neat gadgets. Our FSEs use
them to carry around software tools and utilities - much
easier than a box of floppies or CDs.

Peter




Imagine if Adobe pulled a SCO.

2003-01-24 Thread Matthew X


Putting all your eggs in Big Brother's basket
By Simon Minahan
November 25 2002
Recently, federal shadow spokeswoman for IT, Kate Lundy, was bemoaning the 
IT straitjacket that state and federal governments are in. She was 
referring to recently renewed commitments to Microsoft products for the 
long term - and for mucho dinero. Her proposition was that it was done 
without sufficient thought about other solutions.

Certainly when compared to the nascent global trend evident in Norway, 
Britain, Peru and the EU to break out from proprietary software to open 
source, the lack of substantial commitment - beyond a little research and a 
lot of rhetoric - seems, well, unquestioning and questionable. In the case 
of Microsoft XP products, it's a question with some serious legal 
undertones. For starters, there is the question of security vulnerability. 
As I have discussed recently, Microsoft is forever issuing patches for such 
vulnerabilities and one has to wonder about the implications for the 
security of government IT that relies on it. Then there's the whole 
operational philosophy of the XP model. A United States commentator, 
Michael Jennings, recently listed no fewer than 18 instances where XP 
operates by automatically and remotely connecting to Microsoft servers and 
exchanging data. Just what data is not clear in many cases. Neither is it 
clear there are only 18 instances where it happened.

Coupled with the possibility that (as Jennings remarks) some security 
vulnerabilities have been engineered to allow US agencies to access 
computers running Microsoft, it starts to be a bit chilling. Admittedly 
there is a touch of conspiracy theory hysteria about the idea.

Next, there's the whole content control push that already sees applications 
internally branding content produced by them and dissemination possibly 
being regulated by corporate clearance.

Finally, factor in the licensing and contractual model Microsoft introduced 
with XP, where it is possible to install patches and introduce contractual 
amend ments remotely, and the notion of sovereignty (and the wisdom of 
putting the eggs in this particular basket) begins to look a little shaky.

The fact is that vast slabs of the public information foundation are going 
to be run on systems over which Microsoft will have some opaque degree of 
remote control and which have a long history of security problems. And it 
may impede easy or complete citizen access to information and increase the 
likelihood of unauthorised access. In turn, this could well bring 
governments into conflict with legal requirements under Privacy Acts and 
the common law. It also leaves them hostage to a legacy rather than 
exploring the possibilities of spreading the business and the buying power.

Lets hope these topics have been thoroughly addressed in the 
decision-making processes. I mean, the government would do that, right?

The Microsoft experience must also make one think about committing to 
proprietary code systems more generally. If the biggest IT company on the 
globe can introduce a wholesale change to its business and legal model in 
one generation of manufacture, then it's possible anyone may. For instance, 
a reader recently wrote asking about the possible pitfalls of putting a 
public archive into Adobe's PDF files. My initial response was that Adobe 
couldn't possibly change from distributing reader technology free. It would 
be commercial suicide. I also wonder if there mightn't be some legal basis 
for holding them to the model on the grounds of a long and continuing 
representation that this is how the system works and will work.

But then I can't recall an express promise by them that it would always be 
thus and haven't found one yet (on, admittedly, a brief research 
excursion). So, who's to say, for sure? At least open systems will stay open.

The author is a Melbourne barrister who practises in intellectual property 
and commercial law. The information in this column is of a general nature. 
Readers should obtain legal advice for specific problems. The author may be 
contacted at [EMAIL PROTECTED]

http://smh.com.au/articles/2002/11/25/1038173686615.html



Create a Paycheck with your computer

2003-01-24 Thread tulsa2155r57
Hi there, 


If you're like me, you've tried other work at home opportunities and been 
disappointed for any number of reasons. I know you've heard this before, 
but this is different. This is a legitimate home-based business opportunity 
with a proven record of success. 
 
If you are looking for a get-rich-quick scheme this is not for you. 
If you are ready to make extra money, work hard to build your business, 
and eventually fire your boss, then this is for you. Due to our new vertical 
integration system, this is an excellent time to be coming in to this program. 
You will be able to see your business growing even before you start seriously 
promoting it, which will convince you of the potential this program has very 
quickly.
 
Some of us do this for extra money, some are saving for the house or car they 
want, some have great jobs and are working toward early retirement, some need 
the extra money to pay the rent, some want to work exclusively out of their homes.  
Everyone has different goals, but we are all working in one way or another
 toward financial freedom.
 
We embrace a team concept which gives people ahead of you incentive to help 
you succeed. The more profitable you are, the more profitable they are.
 Best of all, this program is free to join and you can opt out any time. 
 
To get more information send a separate e-mail (please do not reply to this one) 
to :[EMAIL PROTECTED] 
 with Send Me My Free Membership in the subject line.
 Include your first and last name and your e-mail address (if different from above) 
and I will forward it at once. 
 
Remember, it won't cost a cent to test drive this program. I will be looking forward 
to 
hearing from you and to helping you make you dream of financial independence come 
true. 
 
Sincerely, 
Jennifer Jadin


To be removed: Send an email to [EMAIL PROTECTED]  with remove in the 
subject line.
9403CCql7



Too early to write off Bill Gates,( but not to assassinate him.)

2003-01-24 Thread Matthew X
Why Microsoft was right about Linux

By Charles Cooper
Special to ZDNet
January 24, 2003, 5:53 AM PT
COMMENTARY--What do you know? Microsoft was right about Linux all along.
Back in 1998, when lawyers for the software company tried to debunk the 
federal government's monopoly charge against it, they argued that the 
dynamics of an operating system market were inherently fluid.

That was good for a chuckle.
Then Microsoft's attorneys began to talk about the competitive threat posed 
by the Linux open-source operating system as proof the government was 
talking out of its hat.

That brought the house down.

Cynics dismissed the argument as a transparent ploy to convince a doubting 
judge. The thrashing then being meted out to Microsoft by lead government 
attorney David Boies came close to constituting a crime against humanity. 
Any argument was worth a shot, but this one was the equivalent of a Hail 
Mary pass in the waning moments of a game.

However with the passage of years, it's clear that--whatever the original 
motivation--Microsoft's strategists had more insight into Linux than most 
of the critics.

Linux on Intel-based computers is now likely to become the dominant 
platform in corporate data centers, according to a recent report from 
investment bank Goldman Sachs. That puts even more pressure on Microsoft to 
persuade Unix users to stick with its Windows operating system on Intel 
systems rather than move to Linux. (That's no easy feat these days.) 
Indeed, if it fails to stop the groundswell, Microsoft may be forced to 
radically rethink its strategy as none of the company's server platform 
products now run on Linux. One scenario offered by analysts at First Boston 
has Microsoft switching gears and supporting Linux on key subsystems like 
Exchange and SQL Server and the .Net framework.


And then there's the IBM factor to consider.

Windows trounced OS/2 in a furious operating systems battle back when 
George Bush Sr. was president and Lou Gerstner was still busy at RJR 
Nabisco trying to sell folks more Velveeta and Tang.

Smartly retiring from a contest it had little chance of winning, IBM left 
the field to Microsoft, which cemented its desktop dominance and emerged as 
the most powerful software company in history.

There things stood for over a decade, but--F. Scott Fitzgerald aside--there 
are second acts. In this rematch with Microsoft, Big Blue has the stronger 
hand, owing to its very public embrace of Linux three years ago.

IBM is bent on making a commodity out of Intel-based hardware with an 
operating system derived through the open-source process. Its pitch to 
corporate Unix customers running Sun Microsystems' Sparc or other 
proprietary chips is that Linux on Intel offers virtually the same 
performance--but at a far lower hardware price. Once they bite, that then 
opens the door for IBM to rake in the money selling middleware and services.

If IBM pulls it off, Microsoft risks getting cut out of a lot of corporate 
business. The various responses out of Redmond suggest that management does 
not have an obvious answer to the open-source question.

Bill Gates once derided the Pac-Man-like nature of the General Public 
License (GPL) that governs the distribution of open-source code. His 
trusted associate, Jim Allchin, even suggested it was an 
intellectual-property destroyer.

All that played poorly in the press and even worse with customers who 
couldn't fathom how it was relevant to their business. Microsoft has since 
dropped the smear campaign in favor of technology comparisons that focus on 
a discussion of tools, the .Net framework and ways to make a company's 
developers more productive. Execs also are playing up what they see as the 
benefits of a tight integration model with a single sign-on, a common 
management infrastructure and a consistent user experience.

Corporate customers hearing of Microsoft's new company line at LinuxWorld 
in New York this week won't make up their minds about all this overnight. 
But with spending still tight, the question of whether to buy an integrated 
offering or a service solution gets trumped by a simpler consideration: The 
stuff has to work and not cost an arm and a leg.

And that is simply music to the ears of the penguinistas.

http://zdnet.com.com/2100-1107-981981.html

APster pool to put Bill out of our misery? (my 2 e-dinars)



Popeyed.

2003-01-24 Thread Matthew X
There are two main kinds of online advertising: pop-up ads and banners. 
Pop-up ads are annoying and jump up in separate browser windows. There are 
some programs to suppress these, such as StopZilla, PopUpCop and Web Window 
Killer. Not all pop-ups are unwanted so some programs let you to decide how 
you want to handle those at different sites. Programs such as Guidescope 
can filter banners. You can find them at software sites such as Tucows.
http://smh.com.au/articles/2003/01/23/1042911483315.html
TopBlog

William Gibson

William Gibson only invented cyberspace, so the appearance of his very own 
Weblog was sure to excite the digerati.

Gibson has a history of being something of a Luddite in practice, while 
making accurate if somewhat dark predictions about the future. He once 
wrote in Wired magazine that buying old watches on the eBay auction site 
was his only reason for going online.

Now the author of Neuromancer (where the word cyberspace was first used 
in print) and Snowcrash has his own little corner of the Web, where he 
discusses much that will excite his fans.

For instance, there's the effect of drugs on his novels: Yes, I did, 
rather textually obviously, take some of those, most notably LSD of the old 
(and I gather rather different) variety, though that now seems a lifetime 
prior to the writing of Neuromancer. My drug of choice during the 
composition of Neuromancer, for the record, was O'Keefe's Extra Old Stock 
Lager...

More relevant to the books themselves are his musings on style: There may 
well be people who abandon Neuromancer on the grounds that it's riddled 
with sentence fragments, but, in a sense, the sentence fragments are there 
to scare off readers who aren't ready for that, and to encourage those who 
want to see the envelope of language pushed even further, the pedal taken 
even closer to the metal.

Gibson is a writer before all else, and his blog doesn't shy away from that 
experimental grammar - something of a relief after countless 
spelling-doesn't-matter-online efforts by lesser mortals.

If you want that kind of thing, you can head over to the forum area to talk 
to other readers about Gibson's novels and questions such as whether they 
should be made into films, how new readers find their way to Gibson, the 
quality of computer games based on his books.

Back on the blog, Gibson offers comments on the discussions like a 
benevolent ruler watching over the masses, but says: I regard my being me, 
ultimately, as a sort of cosmic accident.

Blog this

Blogger

The first stop for many a young blogger, Blogger has just passed the (to 
be said in your best Dr. Evil voice...) 1 Million Registered Users mark.

It acts as a one-stop shop, providing online blog editing via a simple 
logon system, as well as a choice of a blogspot.com address or pointing 
the blog to your own Web address.

When you update your Blogger blog, it appears ever so briefly on a list on 
the site's heavily-trafficked front page.

The service is free, but BloggerPro is a beefed-up version for advanced 
users or blogs that are part of a commercial enterprise.

Meme of the Week

The Mickey Mouse Act

When the US Supreme Court upheld a law extending copyright - the so-called 
Mickey Mouse act - cyberspace rumbled with annoyance at the perceived 
bias towards big corporations such as Disney over smaller potential users 
of material.

By early this week a proposal that would move much non-commercial material 
into the free public domain was being touted by Stanford University law 
professor Lawrence Lessig, who was lead lawyer on the Supreme Court case.
Lawrence Lessig: cyberlaw.stanford.edu/lessig/blog/
Sources: daypop.com, blogdex.media.mit.edu/.

http://smh.com.au/articles/2003/01/23/1042911483315.html

Neal I wrote to the reporter ...

To: [EMAIL PROTECTED] Subject: Neil Stephenson
wrote 'Snowcrash.' not Gibson.
The white man knows how to make everything,
but he does not know how to distribute it.— Sitting Bull



Re:Improve your Sex Life

2003-01-24 Thread blin33z34dt4wrre
Title: Untitled Document





  

  Have you seen this?
  HGH 1000 is unbelievable!
  Look younger + more energy + lose weight
in three weeks. 
  AS SEEN ON NBC, CBS, CNN, AND
OPRAH. THE HEALTH DISCOVERY
THAT ACTUALLY REVERSES AGING WHILE BURNING FAT
WITHOUT DIETING OR EXERCISE
  Free month's supply
of HGH 1000
   This proven discovery has been reported
on by the New England Journal of Medicine. Forget aging and dieting forever.
And it's Guaranteed.

  


  

  WOULD YOU LIKE TO LOSE WEIGHT WHILE YOU SLEEP?
No dieting.
No hunger pains.
No Cravings.
No strenuous exercise.
Change your life forever.

  


  

  Click
Here to Learn How you can Receive a Full Month's Supply of HGH 1000 Absolutely
FREE
  

  
1. Body Fat Loss82% improvement.
  2. Wrinkle Reduction.61% improvement.
  3. Energy Level..84% improvement.
  4. Muscle Strength.88% improvement.
  5. Sexual Potency...75% improvement.
  6. Emotional Stability.67% improvement.
  7. Memory..62% improvement. 
  

  
  Get Your FREE 1 Month
Supply of HGH 1000 TODAY -
  
  

You are receiving this message as a member of the Opt-In
  America List. To be taken out of the data base please
  go here. We honor
  all remove requests.







Is Heather McDonald a Cunt?

2003-01-24 Thread Matthew X
http://www.weeklystandard.com/Content/Public/Articles/000/000/002/137dvufs.asp

Paen to the misunderstood Totalitarian Information Agency and Ol' Capn' Queeg.
ALSO! A timely warning of possible mousepox at disneyworld.

You will know you have spoken the truth when you are angrily denounced; 
and you will know you have spoken both truly and well when you are visited 
by the police. 



APster booster to take over from Denning.

2003-01-24 Thread Matthew X

Georgetown COSC511
Posted by Matt at 01:03 PM
I've recently received an appointment as Adjunct Professor at Georgetown 
University to teach COSC511 Information Warfare and Security. This class 
was previously taught by Dorothy Denning and I am honored to take it over. 
If you are a student looking for the COSC511 page, you can find it by 
following this link.
http://www.devost.net/index.shtml
Matts been on techtv talking up APster for the IPO. Great stuff Matt,the 
cheques in the mail.
This story from Business 2.0 is interesting. When thinking innovation and 
technology, the drug cartels probably rank just behind Amazon.com.
Colombian cartels have spent billions of dollars to build one of the 
world's most sophisticated IT infrastructures. It's helping them smuggle 
more dope than ever before. Full Story

The Technology Secrets of Cocaine Inc.
 



Protect Your Computer Against Harmful Viruses

2003-01-24 Thread allrdy4fun
KIvkQo

*NEW-Special Package Deal!*
2003 McAfee Version 7.0 Software Suite - Home Edition-

THE NAME THAT MEANS SECURITY FOR YOUR PC COMPUTER.
Do not leave your PC open for a virus that could destroy your data.
McAfee VirusScan is the #1 software used by Corporate Businesses to
protect PCs against virus transmissions via the internet, disks, CDs
or any media that might transmit damaging viruses.  Businesses trust
McAfee VirusScan over Norton AntiVirus to protect and safeguard
millions of PCs around the world.  Hsam

Includes - Feature-Packed Utilities...ALL For ONE Special LOW Price!

- McAfee VirusScan 7.0
- McAfee Firewall
- Intuitive Interface
- Scans  Cleans Instant-Messenger Attachments
- Faster Scanning Speeds
- Received 5-Stars from PC Magazine  CNET Editors's Choice Award
- Scans for Viruses Faster Than Norton AntiVirus

This Software Will:
- Protect your computer from unwanted and hazardous viruses
- Help secure your private  valuable information
- Allow you to transfer files and send e-mails safely

Two Feature-Packed Utilities...For One Great Price!
A $100-Plus Combined Retail Value!

YOURS for Only $29.99! (Includes FREE** Shipping TOO!)

Don't fall prey to destructive viruses or hackers!
Protect  your computer and your valuable information!

CLICK HERE to Order Yours NOW!
http://www.tldonline.com/bestbuy/mcafee/mcafee.htm

If you no longer wish to receive our special offers
Click Here http://www.4-greatdeals.com/bestbuy/rem.html

KIvkQo3043Hsam2165833256142663emtjjnu
0475WCXB2-145hCAj3428qbwK6-026jmJb1063GAxA1-l41




Re: CDR: Re: Forget VOA -- new exec order creating Global Communications Office

2003-01-24 Thread Alif The Terrible

On Thu, 23 Jan 2003, Bill Stewart wrote:

 VoA has spent the last N decades alternating between being
 the official US propaganda arm, and officially NOT being a
 US propaganda arm, just an organization we fund to make sure
 there's objective news reporting receivable in Communist countries
 (ok, ok, being the official US less-official propaganda arm)

This is most likely an attempt to escape the VoA name.  VoA was forever
tainted by their deep Iran-Contra involvement, and like all businesses caught
red-handed, a name change can often be a key survival technique.

My guess is VoA thought that their forced lay-low period could come to an
end with Shrub [making an attempt at] running the POTUS show, and a name
change would be the most expedient way to come out of dormancy.

-- 
Yours, 
J.A. Terranson
[EMAIL PROTECTED]

If Governments really want us to behave like civilized human beings, they
should give serious consideration towards setting a better example:
Ruling by force, rather than consensus; the unrestrained application of
unjust laws (which the victim-populations were never allowed input on in
the first place); the State policy of justice only for the rich and 
elected; the intentional abuse and occassionally destruction of entire
populations merely to distract an already apathetic and numb electorate...
This type of demogoguery must surely wipe out the fascist United States
as surely as it wiped out the fascist Union of Soviet Socialist Republics.

The views expressed here are mine, and NOT those of my employers,
associates, or others.  Besides, if it *were* the opinion of all of
those people, I doubt there would be a problem to bitch about in the
first place...






hey

2003-01-24 Thread kijh
EMAIL ADVERTISING WORKS!!

SUPER EMAIL PACKAGE

250,000 $299 (NORMALLY $499)

500,000 for only $499 (NORMALLY $699)

1,000,000 for only $899 (NORMALLY $1099)

3,000,000 for only $1499 (NORMALLY $1699)

Email advertising response can be as high as 5%.  This 
generally works best in the form of lead generation, or incoming
sales.  Email advertising gets read, its unavoidable.

Email advertising creates an immediate response.

DON'T DELAY SUPER PACKAGE AVAILABLE ONLY TO FIRST 50 CUSTOMERS ONLY.

Call Now! 702-442-1868


If you wish to be removed from our list please send an email to
[EMAIL PROTECTED]  You cannot and will not be removed by calling the
above number.




Re: Atlas Shrugs in Venezuela

2003-01-24 Thread Harmon Seaver
On Thu, Jan 23, 2003 at 05:53:04PM -0800, James A. Donald wrote:
 
 Perhaps they are exercising their will over the facilities of
 production and distribution by CIA microwaves beamed into
 people's brains  :-)

Given the general knownothing, lockstep mentality exhibited by the Bushites,
that may well be true. Or maybe it's something in the water. Or, probably more
likely, something in coca-cola, which is why Chavez just raided the coca-cola
bottling plant. 

 
  Don't we all know that that CNN, et al, are going to do
  everything possible to minimize an anti-corporate leader?
 
 No, we do not know that.  Recall live from Baghdad. 

    That's pretty irrelevant. So they reported their version of propaganda
from the war zone? CNN, especially since 9/11, is, along with Fox, considered to
be the most hawkish and pro-Dubbya of all the mega-corp agit/prop organizations.

 Recall
 Ted Turner's declaration that he is a socialist.

   Ted Turner is just another one of the NWO gang. Bush is also a socialist, as
was Adoph Hitler. Just because the National Socialist Workers Party feuded with
the International Socialists, or communists, didn't make it any less
socialist. Fascism is still socialist, corporate welfare is still socialism,
Dubbya, Klinton, and the Republicrats are all socialists of one strip or
another.
Note how deeply in bed Dubbya, Klinton, et al, are with the PRC. Note how
willing the mega-corp are to help the PRC increase surveillance capabilities of
their slaves.

  Radosh lists
 him as one of his fellow radicals.

  Radical? Most dictionaries define radical as someone who wants to return the
gov't back to it's roots, i.e., Constitutional Jeffersonian democracy. 

-- 
Harmon Seaver   
CyberShamanix
http://www.cybershamanix.com




Are you paying too much for Auto Insurance?

2003-01-24 Thread GreatDeals
Title: Save On Auto Insurance!





	This offer is presented to you by Great Deals

  
   
   
   
   
   
   
   
   
   
  

  

   
  
  
   
 
  Are You Paying 
Too Much?
  
Compare Multiple 
  FREE Quotes
One Easy Form - 
  Only takes Minutes
Over 20 
  National Insurance Carriers
  

   
   
  
  
   
   
  
  
   

   
   
  
  
   
   
  
  
   

   
   
  
  
   
   
  
  
   
   
  
  

 
  
   2002 LowerMyBills.com 


   
  






-
You are receiving this mailing because you opted in via 9MillionRecordLoad.
To unsubscribe, please click 

here or reply to this email.







Re: [IP] Open Source TCPA driver and white papers (fwd)

2003-01-24 Thread Mike Rosing
On Fri, 24 Jan 2003, Eugen Leitl wrote:

 -- Forwarded message --
 Date: Fri, 24 Jan 2003 02:29:27 -0500
 From: Dave Farber [EMAIL PROTECTED]
 To: ip [EMAIL PROTECTED]
 Subject: [IP] Open Source TCPA driver and white papers


 -- Forwarded Message
 From: David Safford [EMAIL PROTECTED]
 Date: Tue, 21 Jan 2003 12:05:39 -0500
 To: [EMAIL PROTECTED]
 Subject: [open-source] Open Source TCPA driver and white papers


 IBM has released a Linux device driver under GPL for its TCPA chip (TPM).
 The driver is available at
 http://www.research.ibm.com/gsal/tcpa/

 This page also has links to two papers, one presenting positive uses
 of the chip, and the second rebutting misinformation about the chip.

Thanks Eugen,  It looks like the IBM TPM chip is only a key
store read/write device.  It has no code space for the kind of
security discussed in the TCPA.  The user still controls the machine
and can still monitor who reads/writes the chip (using a pci bus
logger for example).  There is a lot of emphasis on TPM != Palladium,
and TPM != DRM.  TPM can not control the machine, and for DRM to work
the way RIAA wants, TPM won't meet their needs.  TPM looks pretty useful
as it sits for real practical security tho, so I can see why IBM
wants those !='s to be loud and clear.

Patience, persistence, truth,
Dr. mike




cypherpunks@minder.net

2003-01-24 Thread =?gb2312?q?=C7=F0=D3=C0=B4=EF_
ÄúºÃ£º
ÐÂÄêÀ´ÁÙÖ®¼Ê£¬¹§×£ÄúÐÂÄê¿ìÀÖ¡¢ÁúÂí¾«Éñ¡£
еÄÒ»ÄêÉúÒâÐË¡¡¢ºÃÔËÁ¬Á¬~£¡

ÕâÊÇÄúµÄÅóÓÑÍþ¶øÐŹ«Ë¾¸øÄú·¢À´×ÊÁÏ¡£Ï£Íû¶ÔÄãÓаïÖú,Èç¹û¶ÔÄãµÄ¹¤×÷´øÀ´Âé·³,ÔٴαíʾǸÒâ!
¹ãÖÝÍþ¶øО«ÃÜÒÇÆ÷ÓÐÏÞ¹«Ë¾ÊÇÒ»¼ÒרÃÅ´ÓÊÂÉú²ú¾«ÃܲâÁ¿ÒÇÆ÷µÄÖÐÍâºÏ×ÊÆóÒµ¡£
¹«Ë¾Ö÷Òª²úÆ·£º
Ô²¶ÈÒÇ£¬¶¯Ì¬²¨ÎƶÈÒÇ£¬²¨ÎƶÈÒÇ£¬ÐÎ×´²âÁ¿ÒÇ£¬ÂÖÀªÒÇ£¬¹µÇúÂÊÒÇ£¬Í¹¶ÈÒÇ£¬Ö±Ï߶ÈÒÇ£¬½Ç¶ÈÒÇ£¬Í¹ÂÖÖá²âÁ¿ÒÇ£¬Í⾶×Ô¶¯¼ì²â»úµÈ¡£
ÁªÏµÈË£ºÇðÓÀ´ï
ÊÖ»ú£º013858302668
Http://cnhld.gzyp21.com
E-mail: [EMAIL PROTECTED], [EMAIL PROTECTED]
Èç´ËÓʼþ¶ÔÄúûÓã¬Çë˳ÊÖɾ³ý¡£Ð»Ð»¡£¡£  


Re: Movies

2003-01-24 Thread big
Attached file:


thumdrive integrity --Deniable Thumbdrive?

2003-01-24 Thread someone
WTF is the point of adding more biometric security to a device that cannot
and does not support data integrity?  that flash memory held within the thumbdrive
keeps your data in clear text...unless of course you store everything within
some form of encrypted disk.  even then, the 

quick and dirty way to bypass the bio-security us to pull the card out of the
usb enclosure and start poking at the contents. 

bah.





Date: Fri, 24 Jan 2003 09:52:50 -0500

From: Tyler Durden [EMAIL PROTECTED]

To: [EMAIL PROTECTED]

Subject: Deniable Thumbdrive?



I got a hold of a little gadget recently that is very nearly perfect for 

certain forms of data storage. It's called a Thumbdrive and I bought it 

online somewhere (64Meg for about $179 or so).



The cool thing about this drive (small enough that it has holes for use as
a 

keychain) is that it's got a Public area and a private area, and the 

private area is accessible (if one desires) only via the little fingerprint


reader on the top of the drive. (It's also USB based, and on Windows2000 and


beyond you don't need any software drivers--just plug it in to a USB port 

and it appears as a drive).



ANyway, I was wondering. I'd really like a nice software mod of this thing


so that, depending on which finger I use for verification, a different 

private area on the drive will open (right now several users can be assigned


access by the master user to use their fingerprint for access to the single


private area). Of course, there should be no indication that there even IS


more than one private area.



So...anyone heard of such a hack/mod, or is there a straightforward way to


go about doing it oneself?



-TD











_

Tired of spam? Get advanced junk mail protection with MSN 8. 

http://join.msn.com/?page=features/junkmail






Re: Deniable Thumbdrive?

2003-01-24 Thread Ben Laurie
Tyler Durden wrote:

I got a hold of a little gadget recently that is very nearly perfect for 
certain forms of data storage. It's called a Thumbdrive and I bought 
it online somewhere (64Meg for about $179 or so).

The cool thing about this drive (small enough that it has holes for use 
as a keychain) is that it's got a Public area and a private area, and 
the private area is accessible (if one desires) only via the little 
fingerprint reader on the top of the drive. (It's also USB based, and on 
Windows2000 and beyond you don't need any software drivers--just plug it 
in to a USB port and it appears as a drive).

ANyway, I was wondering. I'd really like a nice software mod of this 
thing so that, depending on which finger I use for verification, a 
different private area on the drive will open (right now several users 
can be assigned access by the master user to use their fingerprint for 
access to the single private area). Of course, there should be no 
indication that there even IS more than one private area.

So...anyone heard of such a hack/mod, or is there a straightforward way 
to go about doing it oneself?

Nice! Get them to cut _all_ your fingers off instead of just one.

Just say no to amputationware.

Cheers,

Ben.

--
http://www.apache-ssl.org/ben.html   http://www.thebunker.net/

There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit. - Robert Woodruff




ADV: Stop Snoring Today!

2003-01-24 Thread Stop Snoring!


  
  

  


  




  


  

This formulation of  
  highly effective natural herbs and enzymes work gently together to 
relieve  
  snoring. You will breathe, sleep and feel better. Snoring can be 
dangerous  
  to your health, and annoying to our loved ones. Safe and effective 
with no  
  side effects! For information please Click
Here


  
  Works the First 
Night, 
  Every Night! 
  Get your Snore RX today and get a good night's 
sleep  
  tomorrow. Snore RX will not only help you sleep better and prevent  
  annoying snoring, it will save you unnecessary embarrassment at 
camping  
  sites, in thin walled cruise cabins or will stop you from bringing 
down  
  the roof at you relatives' house on a family visit.  
  100% Money back guarantee! 
  
  
  

  


  
You have received 
this
email because you have opted-in to receive email from Bmarket.net or its
partners.If
you would no longer like to receive special offers from Bmarket.net or you 
feel
that you received this email in error, please
click Unsubscribe. 


  

  
  
  




Re: Deniable Thumbdrive?

2003-01-24 Thread Thomas Shaddack

 Nice! Get them to cut _all_ your fingers off instead of just one.
 Just say no to amputationware.

Use the kind of fingerprint reader that can also sense the blood flow in
the finger, kinda like the heart rate sensors on some exercise machines.
Dead fingers then will be of no use.

...of course, one can still take a fingerprint photograph, etch it to
metal, pour thin layer of silicone over it, make a relief layer to put
over one's own finger, and fool the sensor. For this you don't even need a
cut-off finger, though - the access to the digitized thumbprints in ie. a
police database (or the database of those stores that allow you to pay
with a fingerprint, if you're there) is enough.





Printer Cartridges - Up To 80% Off Retail - Free Shipping Offer

2003-01-24 Thread Printpal
Title: Printer Ink Cartridges






Running low on ink?  Up to 80% off 
retail prices.

  
  

  
  
  
  
  
  
  


Running low on ink?  Up to 80% off 
retail prices.



  


 
 
 
 
 
 

 

   
You are receiving this email due 
to your membership, that entitles you to purchase Gift Certificates 
to your favorite stores, restaurants, etc at up to 80% off! If you 
wish to cancel your free subscription , please visit http://www.DiscountCertificates.com 
and unsubscribe. You will be removed immediately from our service.
  
  

 






Re: [IP] Open Source TCPA driver and white papers (fwd)

2003-01-24 Thread David Howe
at Friday, January 24, 2003 4:53 PM, Mike Rosing [EMAIL PROTECTED]
was seen to say:
 Thanks Eugen,  It looks like the IBM TPM chip is only a key
 store read/write device.  It has no code space for the kind of
 security discussed in the TCPA.  The user still controls the machine
 and can still monitor who reads/writes the chip (using a pci bus
 logger for example).  There is a lot of emphasis on TPM != Palladium,
 and TPM != DRM.  TPM can not control the machine, and for DRM to work
 the way RIAA wants, TPM won't meet their needs.  TPM looks pretty
 useful as it sits for real practical security tho, so I can see why
 IBM wants those !='s to be loud and clear.
Bearing in mind though that DRM/Paladium won't work at all if it can't
trust its hardware - so TPM != Paladium, but TPM (or an improved TPM) is
a prerequisite.




The Digital Evolution: Freenet and the Future of Copyright on the Internet

2003-01-24 Thread Steve Schear
IMHO, the article is the most reasoned, complete and balanced legal (and 
commonly accessible technical) analysis of the P2P scene.
The direct link is 
http://www.lawtechjournal.com/articles/2002/05_021229_roemer.php

Conclusion
More legal questions and conundrums are raised with a technology like 
Freenet than can be currently answered. Presently, Freenet is still an 
enthusiast's toy and not the next or current Napster, Morpheus, etc. 
However, even if Freenet never gains a massive user base, the law-defying 
encryption and distributed caching techniques of the project will likely 
end up in the next generation of P2P services. The struggles over changes 
in the Internet, seen through the eyes of emerging technologies, 
demonstrate that the confrontations between copyright owners and free 
information advocates will only continue to escalate. This escalation will 
be inextricably tangled in both legal and technological complexity, as 
neither the law nor technology appears capable of solving these dilemmas alone.

As Andrew Frank poignantly observes, P2P technologies are evolving in a 
Darwinian fashion, proving more resistant to technological and legal 
control with each iteration.183 The content industry stopped Napster. The 
industry may stop the FastTrack companies. It may even stop Freenet. 
Eventually, however, a new system, borne of the lessons of these pioneering 
technologies, will likely arrive that cannot be addressed within the 
current practical confines of copyright law. When that day comes, the 
content industry will perhaps have to consider (if has not already done so) 
how it will evolve in the ever-changing digital landscape.




ADV: Stop Snoring Today!

2003-01-24 Thread Stop Snoring!


  
  

  


  




  


  

This formulation of  
  highly effective natural herbs and enzymes work gently together to 
relieve  
  snoring. You will breathe, sleep and feel better. Snoring can be 
dangerous  
  to your health, and annoying to our loved ones. Safe and effective 
with no  
  side effects! For information please Click
Here


  
  Works the First 
Night, 
  Every Night! 
  Get your Snore RX today and get a good night's 
sleep  
  tomorrow. Snore RX will not only help you sleep better and prevent  
  annoying snoring, it will save you unnecessary embarrassment at 
camping  
  sites, in thin walled cruise cabins or will stop you from bringing 
down  
  the roof at you relatives' house on a family visit.  
  100% Money back guarantee! 
  
  
  

  


  
You have received 
this
email because you have opted-in to receive email from Bmarket.net or its
partners.If
you would no longer like to receive special offers from Bmarket.net or you 
feel
that you received this email in error, please
click Unsubscribe. 


  

  
  
  




ADV: Stop Snoring Today!

2003-01-24 Thread Stop Snoring!


  
  

  


  




  


  

This formulation of  
  highly effective natural herbs and enzymes work gently together to 
relieve  
  snoring. You will breathe, sleep and feel better. Snoring can be 
dangerous  
  to your health, and annoying to our loved ones. Safe and effective 
with no  
  side effects! For information please Click
Here


  
  Works the First 
Night, 
  Every Night! 
  Get your Snore RX today and get a good night's 
sleep  
  tomorrow. Snore RX will not only help you sleep better and prevent  
  annoying snoring, it will save you unnecessary embarrassment at 
camping  
  sites, in thin walled cruise cabins or will stop you from bringing 
down  
  the roof at you relatives' house on a family visit.  
  100% Money back guarantee! 
  
  
  

  


  
You have received 
this
email because you have opted-in to receive email from Bmarket.net or its
partners.If
you would no longer like to receive special offers from Bmarket.net or you 
feel
that you received this email in error, please
click Unsubscribe. 


  

  
  
  




ADV: Stop Snoring Today!

2003-01-24 Thread Stop Snoring!


  
  

  


  




  


  

This formulation of  
  highly effective natural herbs and enzymes work gently together to 
relieve  
  snoring. You will breathe, sleep and feel better. Snoring can be 
dangerous  
  to your health, and annoying to our loved ones. Safe and effective 
with no  
  side effects! For information please Click
Here


  
  Works the First 
Night, 
  Every Night! 
  Get your Snore RX today and get a good night's 
sleep  
  tomorrow. Snore RX will not only help you sleep better and prevent  
  annoying snoring, it will save you unnecessary embarrassment at 
camping  
  sites, in thin walled cruise cabins or will stop you from bringing 
down  
  the roof at you relatives' house on a family visit.  
  100% Money back guarantee! 
  
  
  

  


  
You have received 
this
email because you have opted-in to receive email from Bmarket.net or its
partners.If
you would no longer like to receive special offers from Bmarket.net or you 
feel
that you received this email in error, please
click Unsubscribe. 


  

  
  
  




RE: ÁÖ¹®³»¿ëÀÔ´Ï´Ù 5417CHwt8-669i-13

2003-01-24 Thread wwxoouobm
8652iUNr8-331qLHo8677XZWE1-457Hsrf2812CnsX2-795nSkwl488652iUNr8-331qLHo8677XZWE1-457Hsrf2812CnsX2-795nSkwl488652iUNr8-331qLHo8677XZWE1-457Hsrf2812CnsX2-795nSkwl48




1. Àü¼Û ¼º°øµÈ À̸áÁÖ¼Ò¸¸ °¡·Á»Ì¾Æ ¸¸µé¾îÁø 8¹é¸¸°³ À̸Ḯ½ºÆ®(Áߺ¹Á¦°Å, ÇѸÞÀÏÁ¦°Å)
2. Áö¿ª ¹× ¼ºº°, ³ªÀÌ·Î ºÐ·ùµÈ 3õ4¹é¸¸°³ À̸Ḯ½ºÆ®(Áߺ¹Á¦°Å, ÇѸÞÀÏÁ¦°Å)
3. À̸áÀ» ¹Þ´Â ¼­¹öÀÇ ½ºÆÔÇÊÅ͸µÀ» Àß Åë°úÇÏ¿© ¹è´Þ·üÀÌ ³ôµµ·Ï Ư¼öÇÏ°Ô Àß Á¤¸®µÈ 3õ8¹é¸¸°³ À̸Ḯ½ºÆ®(Áߺ¹Á¦°Å, ÇѸÞÀÏÁ¦°Å)
4. ÇѸÞÀÏ Áּҷθ¸ ±¸¼ºµÇ¾îÁø ÇѸÞÀÏ À̸Ḯ½ºÆ® õ5¹é¸¸°³(Áߺ¹Á¦°Å)

***º¸³Ê½º Á¦Ç°: Áö±Ý À̸Ḯ½ºÆ®¸¦ ±¸ÀÔÇϽøé ÃֽŹöÁ¯ À̸á¹ß¼Û±â(±â´É:´ë·®À̸á¹ß¼Û,IP º¯È¯À¸·Î ÇѸÞÀÏÁÖ¼Ò ¹ß¼Û°¡´É,htmlÀ̸ᰡ´É,À̸Ḯ½ºÆ®Á¤¸®,¼ö½Å°ÅºÎ,À¯È¿°Ë»ç)¿Í À̸Ḯ½ºÆ® ÃßÃâ±â¸¦ À̸Ḯ½ºÆ®¿Í °°ÀÌ µå¸³´Ï´Ù***

À§ 4°¡Áö À̸Ḯ½ºÆ®(ÃÑ 9500¸¸°³ À̸áÁÖ¼Ò) ¸ðµÎ¸¦ Çϳª·Î ¹­¾î¼­ 15¸¸¿ø¿¡ ÆǸÅÇÕ´Ï´Ù. Àü¼Û¼º°ø 8¹é¸¸°³ À̸Ḯ½ºÆ®ÀÇ ¹ß¼Û·üÀÌ 50%ÀÌÇÏ·Î ³ª¿Ã °æ¿ì ȯºÒÇØ µå¸®°Ú½À´Ï´Ù.
º¸´Ù ÀÚ¼¼ÇÑ ³»¿ë°ú ÁÖ¹®¹æ¹ýÀ» ¾Ë°í ½ÍÀ¸½Ã¸é  [EMAIL PROTECTED] À¸·Î ¹®ÀÇÇØÁÖ½Ã¸é µË´Ï´Ù.

Âü°í: ÀúÈñ´Â ±¤°í´ëÇ༭ºñ½ºµµ ÇÕ´Ï´Ù. ¼­ºñ½º·á´Â ¹ß¼Û°¹¼ö¿¡ »ó°ü¾øÀÌ 24½Ã°£ ´ÜÀ§·Î Á¤¾×Á¦·Î °è»êÇÕ´Ï´Ù. Áï °í°´µéÀÇ ±¤°íÀ̸áÀ» ÀúÈñ ¼­¹ö¸¦ ÀÌ¿ëÇÏ¿© 24½Ã°£µ¿¾È ½°¾øÀÌ ¹ß¼ÛÀ» ÇÕ´Ï´Ù.
À̺¥Æ®: À̸Ḯ½ºÆ®¸¦ 1¿ù¸»±îÁö ±¸ÀÔÇÏ½Ã¸é ¹ß¼Û´ëÇà 2ȸ ¹«·á±âȸ¸¦ µå¸³´Ï´Ù.(À̸Ḯ½ºÆ® ±¸ÀÔÈÄ, ±¤°íÇÒ À̸᳻¿ëÀ» º¸³»Áֽøé 24½Ã°£¾¿ 2ȸ µ¿¾È ¹ß¼Û,ÃÑ 48½Ã°£). ¼ºÀΰü·Ã±¤°í¿Í ÇǶó¹Ìµå¸ÞÀÏ°°Àº ºÒ¹ý±¤°í´Â ¹«·á¹ß¼Û´ëÇà¿¡ ÇØ´çÀÌ ¾ÈµË´Ï´Ù. 

½Ñ¸À¿¡ 5¸¸¿øÂ¥¸® À̸Ḯ½ºÆ®¸¦ ±¸ÀÔÇÏ½Ã°í ¾²·¹±âó·³ ¾µ¸ð¾ø´Ù´Â »ç½Ç¿¡ ³î¶ó½Å ºÐµé ¸¹À¸½Ç²®´Ï´Ù. ±×·± À̸Ḯ½ºÆ® ºÙÀâ°í ½âÈ÷ÀÚ´Ï ¾Æ±õ°í ¹ß¼ÛÇÏÀÚ´Ï Á×°¬´Ù°í ´À³¢½Ç ²®´Ï´Ù. ±×·± ºÐµéÀº ÀúÈñÀÇ À̸Ḯ½ºÆ®¸¦ °¡Áö°í ´Ù½Ã ¿ø±â¸¦ ȸº¹ÇÏ½Ã±æ ¹Ù¶ø´Ï´Ù. ±¤°í´Â »ç¾÷ÀÇ ¿øµ¿·ÂÀÔ´Ï´Ù. ±¤°íÀÚü¸¦ Æ÷±âÇÒ ¼ø ¾ø´Â ÀÏÀÔ´Ï´Ù. »ç¾÷ÇϽô ´Ôµé, È­ÀÌÆÃ!!

ÀÌ ¸ÞÀÏÀº ȸ½ÅÀÌ µÇÁö ¾Ê½À´Ï´Ù. ¼ö½Å°ÅºÎ´Â ¿©±â¸¦ Ŭ¸¯ÇØ ÁÖ¼¼¿ä.

If you prefer not to receive further e-mails of this type from us, please Click here



1527YlXy8-780pDBN0904CnLJ1-958saky1035foHf7-764YdHh686l51



False Alarm

2003-01-24 Thread Steve Schear
A device that appeared to be a bomb on a vehicle parked outside Simpson's 
Hardware and Sports on Wesmark Boulevard kept local and state authorities 
busy for nearly four hours Friday before the object was found to be a 
tracking system placed on the car by the driver's wife.

http://www.theitem.com/CityDesk/030118a_news.cfm



RESPONSE NEEDED.

2003-01-24 Thread PRINCE JOHN ILLIASU
   PRINCE JOHN ILLIASU,

URGENT AND CONFIDENTIAL ASSISTANCE

Dear Sir/madam,

We are sending this letter to you based on information
gathered from the Foreign Trade Office of the Nigerian
Chambers of Commerce  Industry. We believe that you
would be in a better position to help us in our bid to
transfer the sum of Thirty Five Million, Five Hundred
Thousand United states Dollars (US$35.5M) only into a
foreign account.

We are members of the special committee for Budget and
Planning of the Ministry of Petroleum and Mining.
This Committee is principally concerned with contract
Appraisals/Approval of contracts in order of priorities
as regards capital projects of the Federal Government of
Nigeria, in our position we sucessfullysecured for ourselves
the sum of Thirty Five Million, Five Hundred Thousand U.S.
Dollars (US$35.5M) only. This amount was accrued through
undeclared windfall from sales of crude oil during the gulf war.

What we need from you is to provide a safe account(s)
where the funds will be transfered since we are not
permitted under the civil service code of the Federal
Republic of Nigeria to own or operate foreign account.

It has been agreed that the owner of the account will
be compensated with Four Million, Five Hundred
Thousand U.S. Dollars (US$4.5M) only, while Two
Million U.S. Dollars (US$2M) will be set aside to
offset expenses and the payment of all the necessary
and mandatory government taxes/levies involved.

Kindly indicate your interest or otherwise through the
above email address, to enable us unfold the mode of
operation to you. Be it known toyou that all the necessary
machineries has been put in place for a smooth and hitch-free
execution, and take note also that once started it will not
take more than 14 working days to be concluded once you give
us your absolute support and co-operation. Be rest assured
that this muitual beneficial transaction is 100% risk
free and safe, but the utmost priority of all parties
involved is confidentiality and secrecy.

This letter was sent to you by one of our colleagues
presently in the Netherlands for an official
assignment/course. Endeavour to contact him on the
above e-mail address for further clarification.

God be with you as we look forward to your immediate
response.

Best regards.
Prince John Illiasu.
  


Re: thumdrive integrity --Deniable Thumbdrive?

2003-01-24 Thread Thomas Shaddack

 WTF is the point of adding more biometric security to a device that
 cannot and does not support data integrity?  that flash memory held
 within the thumbdrive keeps your data in clear text...unless of course
 you store everything within some form of encrypted disk.  even then,
 the quick and dirty way to bypass the bio-security us to pull the card
 out of the usb enclosure and start poking at the contents.

DEFINITELY TRUE!

Thumbdrive products are a good step in the right direction, but by far not
long enough. Another approach is needed.

The unit should be tamperproof, with more services than just a dumb mass
storage device. The unit should contain a biometric sensor (eg, a
fingerprint reader), a small keypad or other device to enter a PIN, and
its own processor, for performing cryptographic operations.

The device should support several operations for different PINs, and
several PINs, which will allow several different private storage areas,
different operations, and a special PIN for destruction of secure content
and offering dummy content instead (See officer? I told you there are no
crypto keys there!).

The device should be able to keep audit log of operations.

The device should store the data in encrypted form in the memory. The PIN
could be part of the decryption key.

The device should be able to handle the biometric reader output on its
own, independently on the host computer. This architecture together with
adherence to USB mass-storage standards would make us independent on any
OS-specific drivers, making the device truly multiplatform.

The device should be able to perform the encryption/decryption services on
its own (hence the cryptographic CPU). Eg, you have an untrusted computer.
You plug the device to its port, move a document from the untrusted
machine to device's directory Cleartext, authorize yourself to the
device with fingerprint and PIN, select the Encrypt function (which can
be done eg. by a suffix to the PIN). In few seconds, you should then find
the encrypted document in the device's directory Ciphertext. Similarly,
the device should support write-only directory, to which you could write
files freely but won't be able to retrieve them without authorization
(this could allow using the device for data couriers who would be able
to pick data but won't be able to read them along the way).

Optionally, the unit could be usable for encryption/decryption of data
streams, which would make it very useful for IP telephony.

The key for crypto functions should never leave the unit. Attempt of
physical compromising of the unit should result in self destruction of at
least the part of the memory that keeps the keys (maybe keep them in
battery-backed RAM, sealed in epoxide resin with both passive and active
tamper-detection devices (including but not limited to thin wire mesh)?

This way, even if the computer itself would get compromised, the only
thing the adversary would be able to intercept would be the plaintexts
used in the sessions with the compromised machine. Which they would be
able to get using TEMPEST or a keylogger anyway. This design should be
robust against hijacking of the key by eg. trojan horses.





The Secret To Being Wealthy 76-2

2003-01-24 Thread thomas2111377ybyr
 
Dont Waste Another Minute


If you are a motivated and qualified communicator 
I  will personally demonstrate to you a system 
that will make you 4 figures 
per week or more. This is 
NOT mlm.

 
Call our 24 hour pre-recorded number to get the 
details.  Don't waste another minute. Call Now.

   1-972-293-4536



I need people who want to make serious income.  Make 
the call and get the facts.   

  **  Invest 2 minutes in yourself now!  **

 

  1-972-293-4536








_ 
Out Of Database;

[EMAIL PROTECTED]












{%CRAND%}
   

8049feYv5-396SzBK8520AhWG7-012zYUP1821bGzR5-257jmoF5718hPBK5-l57




Re: Deniable Thumbdrive?

2003-01-24 Thread Eugen Leitl
On Fri, 24 Jan 2003, Thomas Shaddack wrote:

 Use the kind of fingerprint reader that can also sense the blood flow in
 the finger, kinda like the heart rate sensors on some exercise machines.
 Dead fingers then will be of no use.

Photoplethysmography and photoxytometry are easy to fake once you know
what you're looking for. Thin-skin translucent silicone casts of
fingerprints (you can of course gather the patterns using the usual
dactyloscopy paraphernalia, whether reduced iron magnetic brush or
iodine/osmium tetroxide exposure) worn over live fingers would probably
work.

Frankly, the fingerprint is a lousy secret: you leak it all over the 
place. You can't help it, unless you're wearing gloves all the time. Ditto 
DNA.




RE: Deniable Thumbdrive?

2003-01-24 Thread Bill Stewart
At 11:40 AM 01/24/2003 -0500, Tyler Durden wrote:

Peter Trei wrote...
What's you're threat model? If it's your wife or kid sister, this
might work. If it's a major corporation or a government, forget
it - they'll bitcopy the whole flash rom, and look at it with ease.


Agreed.  Furthermore, the whole thing is inherently dependent on the
processing model and programming interfaces of your thumbdrive.
What does it look like to your PC if you're not using the right thumb?
What does it look like to your PC if you want to use the right thumb?
Three obvious models are
- PC doesn't need Thumbdrive-specific drivers, just generic USB disk,
and the CPU in the drive decides whether it's seen your thumb
and reveals the otherwise-hidden files if it likes you.
- PC has specific drivers for the Thumbdrive,
Whole drive plus the thumbprint pad are visible to the PC,
and you can only decrypt the secret part if you put a matching
thumb on the thumbprint.
- PC has specific drivers for the Thumbdrive
Public drive, thumbprint pad, and hooks for secret drive are
visible to the PC, and putting the correct thumb on the pad
lets the PC find out the password to mount the secret drive.


At this point, most of my threat models are on this level or the next one 
higher--local cops or dumb goons grab a protestor or whatever and try to 
shake his photos and whatever digital else out of him...OK punk, you're 
not calling a lawyer until you show me what's on this thing...Don't tell 
me nothing's in there I see a login prompt, ya' commie faggot...open it up.

First of all, as Peter says, high-tech cops won't be fooled.
Low-level goons may not recognize it,
or if the thumbprint part requires specific drivers or data on the PC,
you can tell them sorry, that part's for access to my work PC,
and if you'd like to get a search warrant, they'll let you in the building,
and make sure the public part has some pictures of your dog or whatever.
For medium-tech cops, you can say that it requires installing drivers
on their PC (assuming that it does), and offer to download them,
and prearrange that there's a set of drivers at www.kevinmitnick.com
just in case they actually take you up on it.


As for the thumbprint, I'm wondering if other parts of the body could be used
(then even very savvy rubberhosers couldn't just make you try every finger).
I'll try using my, um, nose tonight.


Depending on the interface presented to the PC, it may or may not be obvious
to the PC whether there are zero, one, or more secret areas on the drive.
If it's not obvious, then the obvious extension to the product would be to
support multiple fingerprints for multiple secret areas, the business model
being so that multiple people can use the same drive, so your right thumb
gets your right-wing-conspiracy data, your left thumb gets your Commie stuff,
and your middle finger gets the picture of J.Edgar Hoover in his black negligee
or whatever else you want the cops to see.

Otherwise, figure out which body parts you don't mind them cutting off...




Re: thumdrive integrity --Deniable Thumbdrive?

2003-01-24 Thread John Bethencourt
On Fri, Jan 24, 2003 at 09:51:46PM +0100, Thomas Shaddack wrote:
 DEFINITELY TRUE!
 
 ...
 
 The device should be able to perform the encryption/decryption services on
 its own (hence the cryptographic CPU). Eg, you have an untrusted computer.
 You plug the device to its port, move a document from the untrusted
 machine to device's directory Cleartext, authorize yourself to the
 device with fingerprint and PIN, select the Encrypt function (which can
 be done eg. by a suffix to the PIN). In few seconds, you should then find
 the encrypted document in the device's directory Ciphertext. Similarly,
 the device should support write-only directory, to which you could write
 files freely but won't be able to retrieve them without authorization
 (this could allow using the device for data couriers who would be able
 to pick data but won't be able to read them along the way).

 ...

Good points. I've thought a lot about the possibility of such devices (I
suppose they are kind of obvious/inevitable to crypto-minded people).

One comment:

One the of the primary uses for such a device would be in protocols requiring
digital signatures. If the device is to be used for this, it would seem
necessary to also include a small display on it so the user can view what the
untrusted computer wants signed and authorize the signature. Of course, with
a screen, it's going to be more like a PDA and less like a key-chain sized
device.

One of these days, I might build a little device that stores a private key
and does on-board encryption using a microcontroller. I would do it just for
fun, since it is pretty useless if the infrastructure to support it is not out
there.

John Bethencourt




SuperCobra Crash Information - WLG

2003-01-24 Thread wguerin
SuperCobra Crash Information - WLG

Regarding the Helicopter Crash while on a Drug Bust 2003.01.23

Background: News reports indicate that 2 unknown us marine helicopters 
crashed in the desert while assisting a DEA/Customs drug interception.

News did not break until the next day that these vehicles were BOTH AH1A 
SuperCobra Helicopters. Apparently outfitted for recon and unarmed.

Immediate news reports ALL indicated that eye witnesses can not be trusted 
and witnesses could not be accurate in a description of the crash

US media continues to emphasize the significance of the inability for any 
witness to accurately describe what they saw. Witnesses have no trouble 
describing multiple views of an explosion, possible collision, and ground 
impact of these two AH1A vehicles.

While information on the purpose of their mission is most likely not expected, 
it is not uncommon for military operations to assist in high-profile recon and 
interception of drugs and other materials in assistance to customs/dea/etc.

There is a major problem with this story.

The AH1A SuperCobra is amonst the world's most advanced military aircraft. Its 
capabilities for reconaissance and weapons control is extrordinary, and its 
onboard sensor capabilities are amongst the most advanced.

Even if outfitted for DEA support operations, this vehicle will ALWAYS carry 
its standard onboard defense and tracking systems, as well as its standard 
course and threat analysis engines.

In short: The AH1A is virtually INCAPABLE of being run into or running 
something over unless it's control systems are compromised internally.

The potential for mid-air collision of MULTIPLE AH1A SuperCobra helicopters is 
virtually impossible, due to their constant communication and extremely 
advanced sensor and analysis capabilities.

For TWO AH1A vehicles, in ANY situation, to run into each other, is beyond any 
feasible analysis under any publicly-known conditions.

INTERPRETATION:

Something VERY big and heavyweight came across the boarder that night.

It is most likely this thing used either an advanced weapons system or 
communication/sensor override technology to take down the two highly advanced 
AH1As.

Scenereo 1: Highly Unlikely: Something shot BOTH the AH1As down. First of all, 
the public would not hear about it. Secondly, the AH1A would know of the 
weapons capabilities by the time it got there, and would not allow the piolets 
to be stupid enough to fly into missile range.

Scenereo 2: Plausible: Something jammed or intercepted/falsified communications 
and sensory capabilities of EITHER or BOTH AH1As, causing at least one to 
either automaticly (under false information) or allowably (under piolet 
control) run into the other.

Scenereo 3: Unlikely: Someone actually flew a highly advanced helicopter into 
another identical unit, synchronized with realtime communication and carying 
automated override capabilities to respond to realtime threats, such as being 
run over.

We can disregard Scenereo 1 due to numerous unlikely conditions.

Scenereo 3 is disregarded due to the required conditions: complete system 
failure, piolet failure, automatia failure, and stupidity beyond belief.

IMPLICATIONS:

Something with highly advanced capabilities was present in the target operation.

It could have most likely somehow compromised the on-board technologies of the 
well-reviewed AH1A's systems, or sufficiently jammed its ability to operate 
normally AND somehow instigated a situation where they collide.

Could the props have intersected with an unexpected wind gust? A: most likely 
not with an AH1A SuperCobra... With other aircraft, sure, but not something 
this advanced. B: It would have known about the wind gust.

DEDUCTIONS:

Someone took down TWO AH1A SuperCobra attack helicopters. Mechanism of attack 
unknown and not easily deduced.

It is commonly known that these systems are easily overridden, jammed, or 
falsified (override command control systems from remote), but ONLY by extremely 
advanced parties.

Something associated with that convoy knew how to take the AH1As down.

Given that Nothing else was damaged, including the expected numerous 
Customs/DEA/etc helicopters that would be used in this scenereo, it is expected 
that an ON-BOARD FAULT and OVERRIDE was used to voluntarily destroy the two 
AH1As.

This could be as simple as falsifying a signal that indicates vehicle 1 is 
going left when its going right, vehicle 2, to its right, slams into 1 while 
they turn toward the same point.

The problem here, is that SOMETHING knew how to jam and falsify signals and 
control systems on the world's most advanced line of military helicopters.

What would you think?

-Wilfred L. Guerin
[EMAIL PROTECTED]




RESPONSE NEEDED.

2003-01-24 Thread PRINCE JOHN ILLIASU
   PRINCE JOHN ILLIASU,
URGENT AND CONFIDENTIAL ASSISTANCE
Dear Sir/madam,
We are sending this letter to you based on information
gathered from the Foreign Trade Office of the Nigerian
Chambers of Commerce  Industry. We believe that you
would be in a better position to help us in our bid to
transfer the sum of Thirty Five Million, Five Hundred
Thousand United states Dollars (US$35.5M) only into a
foreign account.
We are members of the special committee for Budget and
Planning of the Ministry of Petroleum and Mining.
This Committee is principally concerned with contract
Appraisals/Approval of contracts in order of priorities
as regards capital projects of the Federal Government of
Nigeria, in our position we sucessfullysecured for ourselves
the sum of Thirty Five Million, Five Hundred Thousand U.S.
Dollars (US$35.5M) only. This amount was accrued through
undeclared windfall from sales of crude oil during the gulf war.
What we need from you is to provide a safe account(s)
where the funds will be transfered since we are not
permitted under the civil service code of the Federal
Republic of Nigeria to own or operate foreign account.
It has been agreed that the owner of the account will
be compensated with Four Million, Five Hundred
Thousand U.S. Dollars (US$4.5M) only, while Two
Million U.S. Dollars (US$2M) will be set aside to
offset expenses and the payment of all the necessary
and mandatory government taxes/levies involved.
Kindly indicate your interest or otherwise through the
above email address, to enable us unfold the mode of
operation to you. Be it known toyou that all the necessary
machineries has been put in place for a smooth and hitch-free
execution, and take note also that once started it will not
take more than 14 working days to be concluded once you give
us your absolute support and co-operation. Be rest assured
that this muitual beneficial transaction is 100% risk
free and safe, but the utmost priority of all parties
involved is confidentiality and secrecy.
This letter was sent to you by one of our colleagues
presently in the Netherlands for an official
assignment/course. Endeavour to contact him on the
above e-mail address for further clarification.
God be with you as we look forward to your immediate
response.
Best regards.
Prince John Illiasu.  


DONT GO TO JAIL...TOKE LEGALLY!

2003-01-24 Thread 'Doc'
UNCOMMON EXOTIC PLEASURE BOTANICALS!!! 

Renegade Botanicals: The best in Legal Cannabis and Coke Alternatives, from Exotic Botanical Resources !!! 

“SWEET TREAT” MENU 

(Orders / Customer Service: Please see end of this text.)


1)  STONEY MAHONEY (tm)  Absolutely, the most significant Legal “Personal Choice”; ”Sensitive / Responsive” Primo, non-cannabis / marijuana; non-tobacco “LOOSE-LEAF SMOKA” Botanical on the planet!!! 

2)   HARMONY SNOOT (tm)…….An inhalant; “MOOD FOOD” designed to help 
  overcome cocaine and methamphetamine dependencies.


(Please Note: Definitive product information, pricing and introductory offers are listed in the following text.) 

(Please refer to “Introductory Offers” at bottom of this text for further savings!!)


1) Stoney Mahoney(tm)

“Personal Choice” ~ Primo ~ Exotic Supplemental, Loose-Leaf; “Smoking” Botanical

‘Grand Jester” Variety / Supplemental Agenda

“Absinthium Labyrinthine”Configuration for  “most significant” ENHANCEMENT  PLEASURING of Body, Mind  Spirit “Sensitivities”. 

“Stimulation / Relaxation / Aphrodisia”

(Significant Paradise Consequence!!)

This is the PERSONAL CHOICE “SENSITIVE / RESPONSIVE” SMOKING (“SMOKA”) PRODUCT WE HAVE BEEN WANTING TO OFFER!!!  THIS IS THE PRODUCT AND THE VALUE $$$ THAT YOU HAVE BEEN SEARCHING FOR IN A PERSONAL CHOICE “SENSITIVE / RESPONSIVE” SMOKING  PRODUCT!!!  THIS IS THE PRODUCT THAT YOU WILL BUY AGAIN  AGAIN!!

Suffice to say, without any hype “Grand Jester” Variety Stoney Mahoney is without a doubt, the most significant, non-invasive, non-cannabis, “Sensitive / Responsive”, personal choice, absolutely legal (cannot fail a drug test), LOOSE-LEAF SMOKA  botanical on our planet….probably in the universe!!! Hard to believe that this product is ABSOLUTELY LEGAL!!!.

* Depressive regressive!

* Psychologically uplifting!

* Good-bye stress, anxiety  restlessness!

* Sophisticated, well-balanced “ambiance”.

* Inspires contemplativeness and creativity….

* “Potentiated”  “viripotent”!

* 4 – 5 draws lasts a good, goodly while….

* Sweet aphrodisia!

* Simultaneously; uplifting and relaxing!

* Easy ignition.

* Smooth draw….

* Sweet, heady taste.

* Easy on, easy off!

* SATISFACTION GUARANTEED!!!

* No “munchie” factor.

* No failed drug tests!

Stoney Mahoney botanical is best utilized as a viri-potent “Smoka”, via an herb-pipe or rolling papers. When smoking Stoney (tm), please draw gently as it is a most preeminent “Sensitive / Responsive” Smoke. Both a personal water-pipe (Brass huuka)   (water-pipe is included with quarter pound only) and a standard herb-pipe are included for your smoking convenience and delight. Stoney Mahoney is absolutely a “Sweetish” “Sensitive/Responsive” Treat”!!!

Stoney Mahoney (tm) “Sensitive / Responsive” Smoka includes and is potentiated with the following non-irradiated, Mill-Stoned  Honed, exotica botanicals and botanical essences: Dutch Lactuca Virosa, Bulgarian Artemisia absinthium, Yucatan Turnera aphrodisiaca, rare Chinese Valerian ceae, Jamaican Verbena officinalis, Spanish Peumus boldo, and European(flowering tops only) Sarothamnus Scoparius. Stoney Mahoney (tm) does not include any tobacco or any cannabis factors. Stoney Mahoney (tm) does indeed achieve gourmet distinction….upon its own merit

Stoney Mahoney (tm) is not intended for use during work or while driving. Nor should it be enjoyed during pregnancy. In addition, although no factor in Stoney Mahoney (tm) is illegal or regulated, it is the ethical policy of Exotic Botanical Resources that Stoney Mahoney (tm) not be sold or offered to any person that has not attained at least 21 years of age.  All things in their time 


~ STONEY MAHONEY PRICING ~

one each 2 oz. bag (includes herb-pipe only)….$75.00 plus shipping

two each 4 oz. bag (Quarter Pound ) (includes herb-pipe  personal brass huuka)...$125.00 plus shipping


To place an order via credit card or for customer assistance  product information, please call 1-719-661-3442


2) HARMONY SNOOT(tm)

“HARMONY SNOOT”™
A botanical supplemental aid for the alleviation of Methamphetamine  Cocaine dependencies!

“Harmony Snoot is a brand new, one of a kind, first of its kind, IT’S-ABOUT-TIME KIND, all natural, ultra-pure, ultra-refined, ultra-absorbable, ultra-“sensitive” botanical supplemental, inhalant formulation which has been designed and created to….and is meant to be engaged….as an holistic, power-botanical ally to help achieve the alleviation of cocaine and methamphetamine chemical dependencies and the physical, mental, spiritual and financial hardships incurred within chemical dependency. 


Cypherpunks, You realy need this

2003-01-24 Thread elvennation
Title: Special Offer






 
  



 
   
   

 
   
   

 
   

 
   

 
   
   
   
  
  






 




 

 







Rates at historic lows: use the power of the internet.

2003-01-24 Thread airstream123
[EMAIL PROTECTED],
Get
lenders to compete for your business!

Click
Here

Cash
Back Refinances
No Equity 2nd Trust Deeds
Debt Consolidation
No Income Verification
The Most Competitive Interest Rates!

Fill in our Quick
Quote Form and loan
officers, with access to over 250 lenders
will compete for your mortgage needs.

Click
Here

This
is a FREE service!







You
are receiving this email as a subscriber to our mailing list. Reply to this email with the word "unsubscribe" in the subject and you will automatically be excluded from any future mailings.




Urgent Response Needed

2003-01-24 Thread RUBEN ETUWE
FROM THE DESK OF DR. RUBEN ETUWE.
DEAR SIR, 
WE ARE SENDING THIS LETTER TO YOU BASED ON INFORMATION GATHERED FROM
THE FOREIGN TRADE OFFICE OF THE NIGERIAN CHAMBER OF COMMERCE AND INDUSTRY.
WE BELIEVE THAT YOU WOULD BE IN A POSITION TO HELP US IN OUR BID TO TRANSFER
THE SUM OF FORTY-0NE MILLION, FIVE HUNDRED THOUSAND DOLLARS ($41.5M USD)
INTO A FOREIGN ACCOUNT.
WE ARE MEMBERS OF THE SPECIAL COMMITTEE FOR BUDGET AND PLANNING OF THE
MINISTRY OF PETROLEUM, THIS COMMITTEE IS PRINCIPALLY CONCERNED WITH CONTRACT
APPRAISALS AND APPROVAL OF CONTRACTS IN ORDER OF PRIORITIES AS REGARDS
CAPITAL PROJECT OF THE FEDERAL GOVERNMENT OF NIGERIA. WITH OUR POSITIONS,
WE HAVE SUCCESSFULLY SECURED FOR OURSELVES THE SUM OF FORTY-ONE MILLION,
FIVE HUNDRED THOUSAND UNITED STATE DOLLARS(US$41.5M). THIS AMOUNT WAS
ACCUMULATED THROUGH DELIBERATE OVER-INFLATION OF CONTRACT BY MY GROUP.
WHAT WE NEED FROM YOU IS TO PROVIDE A SAFE ACCOUNT INTO WHICH THE FUNDS
WILL BE TRANSFERRED SINCE GOVERNMENT OFFICIALS ARE NOT  ALLOWED BY OUR
LAWS TO OPERATE FOREIGN ACCOUNT. IT HAS BEEN AGREED THAT THE OWNER OF
THE ACCOUNT WILL BE COMPENSATED WITH US$8.3 MILLION OF THE REMITTED FUNDS,
WE KEEP US$31.125MILLION WHILE US$2.075MILLION WILL BE SET ASIDE TO OFFSET
EXPENSES AND PAY THE NECESSARY TAXES.
IT MAY INTEREST YOU TO KNOW THAT TWO YEARS AGO A SIMILAR TRANSACTION
WAS CARRIED OUT WITH ONE MR. PATRICE MILLER, THE PRESIDENT OF CRAINE
INTERNATIONAL TRADING CORPORATION AT NUMBER 135, EAST 57TH STREET, 28TH
FLOOR, NEW YORK 10022 WITH TELEPHONE (212)308-7788 AND TELEX NUMBER 6731689,
AFTER THE AGREEMENT BETWEEN BOTH PARTNERS IN WHICH HE WAS TO TAKE 25%
THE MONEY WAS DULY TRANSFERRED INTO HIS ACCOUNT ONLY TO BE DISAPPOINTED
ON OUR ARRIVAL IN NEW YORK AS WE WERE RELIABLY INFORMED THAT MR. PATRICE
MILLER WAS NO LONGER ON THAT ADDRESS WHILE HIS TELEPHONE AND TELEX NUMBERS
HAVE BEEN REALLOCATED TO SOMEBODY ELSE, THAT IS HOW WE LOST US$27.5M
TO MR PATRICE MILLER.
THIS TIME AROUND WE NEED A MORE RELIABLE AND TRUSTWORTHY PERSON OR A
REPUTABLE COMPANY TO DO BUSINESS WITH HENCE THIS LETTER TO YOU, SO IF
YOU CAN PROVE YOURSELF TO BE TRUSTED AND INTERESTED IN THIS DEAL THEN
WE ARE PREPARED TO DO BUSINESS WITH YOU. WHAT WE WANT FROM YOU IS THE
ASSURANCE THAT YOU WILL LET US HAVE OUR SHARE WHEN THIS AMOUNT OF US$41.5M
IS TRANSFERRED INTO YOUR ACCOUNT.
IF THIS PROPOSAL SATISFIES YOU, PLEASE CONTACT ME THROUGH E-MAIL STATED
ABOVE  SO WE CAN ADVICE YOU ON THE MODALITIES OF THE TRANSACTION. ALL
MODALITIES OF THE TRANSFER HAVE BEEN WORKED OUT AND ONCE STARTED WILL
NOT TAKE MORE THAN 14 WORKING DAYS WITH THE ABSOLUTE SUPPORT OF ALL CONCERNED.
THIS TRANSACTION IS 100% SAFE.
PLEASE TREAT AS URGENT AND VERY CONFIDENTIAL. GOD BE WITH YOU AS I LOOK
FORWARD TO YOUR REPLY. 
BEST REGARDS.
DR. RUBEN ETUWE.









Re: Big Brotherish Laws

2003-01-24 Thread Bill Stewart
At 12:45 AM 12/18/2002 +, Adam Back wrote:

If I recall some time ago (years ago) there was some discussion on
list of using non-US drivers licenses or out-of-state drivers licenses
I think to get around this problem.  I thought it was Duncan Frissell
or Black Unicorn who offered some opinions on this.


An International Drivers' License and a real license from another country
is almost always good enough to let you drive in a state you don't live in,
and almost never enough to officially drive in a state you officially live in,
for definitions of officially live in that are more or less flexible
depending on who's asking, and what the address of your car registration is,
and whether you're registered to vote there, whether you carry a passport
and have a foreign accent, and whether you own a house
(which is a rather visible activity) or rent (which is less visible),
and whether you've got somewhere else that you appear to live, and
whether your out-of-state car keeps getting parking tickets
in the same city for months, and things like that.

I have heard of one case where somebody was stopped in Nevada,
and instead of presenting his California driver's license, if any,
he presented his somewhere-in-the-Caribbean non-photo license
and an international driver's license, and that was just fine for Nevada.
It wouldn't have been fine if he was a Nevada resident, but he wasn't.
I forget if this person was driving a company car or his own.
A surprising number of people I used to know worked for corporations
in Nevada and drove company cars, and seemed to have business in the
Bay Area a lot, and their Nevada credit cards seemed to work just fine here.
(Nevada's taxes are much lower.)  But it's much tougher to do that
if you're a married couple and have kids in public school.

California, like many states, doesn't take a full fingerprint set,
but they do take a thumbprint using a digital reader.
Rubber cement is rumoured to be helpful.
I don't know about Washington, but I doubt you'll have much better luck
unless you want to work hard at it, at least in Seattle,
at least if you're an employee who gets a salary that's reported.
If you're living in Vancouver WA (across the river from Portland OR),
then it's easier for you to happen to be in the other state a lot
and park your car across the border every other weekend.




Re: Forget VOA -- new exec order creating Global Communications Office

2003-01-24 Thread Bill Stewart
At 10:45 PM 01/22/2003 +, Peter Fairbrother wrote:

W H Robinson wrote:
 [...]
 with greater clarity
 [...]
 disseminate truthful, accurate, and effective messages about the
 American people and their government.
 [...]
 convey a few simple but powerful messages.

 Shouldn't Saatchi  Saatchi be doing this kind of thing?

Nah. Smith and Wesson.


Leno  Letterman.  (And Dallas, and Jerry Springer, etc.)

VoA has spent the last N decades alternating between being
the official US propaganda arm, and officially NOT being a
US propaganda arm, just an organization we fund to make sure
there's objective news reporting receivable in Communist countries
(ok, ok, being the official US less-official propaganda arm)




RE: Deniable Thumbdrive?

2003-01-24 Thread Trei, Peter


 --
 From: Tyler Durden[SMTP:[EMAIL PROTECTED]]
 Sent: Friday, January 24, 2003 9:52 AM
 To:   [EMAIL PROTECTED]
 Subject:  Deniable Thumbdrive?
 
 I got a hold of a little gadget recently that is very nearly perfect for 
 certain forms of data storage. It's called a Thumbdrive and I bought it 
 online somewhere (64Meg for about $179 or so).
 
 The cool thing about this drive (small enough that it has holes for use as
 a 
 keychain) is that it's got a Public area and a private area, and the 
 private area is accessible (if one desires) only via the little
 fingerprint 
 reader on the top of the drive. (It's also USB based, and on Windows2000
 and 
 beyond you don't need any software drivers--just plug it in to a USB port 
 and it appears as a drive).
 
 ANyway, I was wondering. I'd really like a nice software mod of this thing
 
 so that, depending on which finger I use for verification, a different 
 private area on the drive will open (right now several users can be
 assigned 
 access by the master user to use their fingerprint for access to the
 single 
 private area). Of course, there should be no indication that there even IS
 
 more than one private area.
 
 So...anyone heard of such a hack/mod, or is there a straightforward way to
 
 go about doing it oneself?
 
 -TD
 
Try contacting Trek and see if you can suggest it.

What's you're threat model? If it's your wife or kid sister, this
might work. If it's a major corporation or a government, forget
it - they'll bitcopy the whole flash rom, and look at it with ease.

Based on what I've seen, the fingerprint simply acts as a 
access control. The data on the chip is not encrypted.

There are cheaper thumbdrives which use passwords
which therefore don't leave any evidence binding a specific
drive to a specific person - you said you wanted deniability,
so leaving your thumbprint in the device is not desirable.

That said, these are really neat gadgets. Our FSEs use
them to carry around software tools and utilities - much
easier than a box of floppies or CDs.

Peter




Deniable Thumbdrive?

2003-01-24 Thread Tyler Durden
I got a hold of a little gadget recently that is very nearly perfect for 
certain forms of data storage. It's called a Thumbdrive and I bought it 
online somewhere (64Meg for about $179 or so).

The cool thing about this drive (small enough that it has holes for use as a 
keychain) is that it's got a Public area and a private area, and the 
private area is accessible (if one desires) only via the little fingerprint 
reader on the top of the drive. (It's also USB based, and on Windows2000 and 
beyond you don't need any software drivers--just plug it in to a USB port 
and it appears as a drive).

ANyway, I was wondering. I'd really like a nice software mod of this thing 
so that, depending on which finger I use for verification, a different 
private area on the drive will open (right now several users can be assigned 
access by the master user to use their fingerprint for access to the single 
private area). Of course, there should be no indication that there even IS 
more than one private area.

So...anyone heard of such a hack/mod, or is there a straightforward way to 
go about doing it oneself?

-TD





_
Tired of spam? Get advanced junk mail protection with MSN 8. 
http://join.msn.com/?page=features/junkmail



[IP] Open Source TCPA driver and white papers (fwd)

2003-01-24 Thread Eugen Leitl
-- Forwarded message --
Date: Fri, 24 Jan 2003 02:29:27 -0500
From: Dave Farber [EMAIL PROTECTED]
To: ip [EMAIL PROTECTED]
Subject: [IP] Open Source TCPA driver and white papers


-- Forwarded Message
From: David Safford [EMAIL PROTECTED]
Date: Tue, 21 Jan 2003 12:05:39 -0500
To: [EMAIL PROTECTED]
Subject: [open-source] Open Source TCPA driver and white papers


IBM has released a Linux device driver under GPL for its TCPA chip (TPM).
The driver is available at
http://www.research.ibm.com/gsal/tcpa/

This page also has links to two papers, one presenting positive uses
of the chip, and the second rebutting misinformation about the chip.

These papers, combined with the Linux driver and the TCPA specification
at http://www.trustedcomputing.org, give everyone the ability to
test an actual chip (such as in the Thinkpad T30), to see for themselves
what it can, and cannot do.

Note: the papers and driver do not discuss Palladium.
  Palladium and TCPA are two separate topics.

dave safford
[EMAIL PROTECTED]



-- End of Forwarded Message

-
You are subscribed as [EMAIL PROTECTED]
To unsubscribe or update your address, click
  http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/




Re: [IP] Open Source TCPA driver and white papers (fwd)

2003-01-24 Thread Mike Rosing
On Fri, 24 Jan 2003, Eugen Leitl wrote:

 -- Forwarded message --
 Date: Fri, 24 Jan 2003 02:29:27 -0500
 From: Dave Farber [EMAIL PROTECTED]
 To: ip [EMAIL PROTECTED]
 Subject: [IP] Open Source TCPA driver and white papers


 -- Forwarded Message
 From: David Safford [EMAIL PROTECTED]
 Date: Tue, 21 Jan 2003 12:05:39 -0500
 To: [EMAIL PROTECTED]
 Subject: [open-source] Open Source TCPA driver and white papers


 IBM has released a Linux device driver under GPL for its TCPA chip (TPM).
 The driver is available at
 http://www.research.ibm.com/gsal/tcpa/

 This page also has links to two papers, one presenting positive uses
 of the chip, and the second rebutting misinformation about the chip.

Thanks Eugen,  It looks like the IBM TPM chip is only a key
store read/write device.  It has no code space for the kind of
security discussed in the TCPA.  The user still controls the machine
and can still monitor who reads/writes the chip (using a pci bus
logger for example).  There is a lot of emphasis on TPM != Palladium,
and TPM != DRM.  TPM can not control the machine, and for DRM to work
the way RIAA wants, TPM won't meet their needs.  TPM looks pretty useful
as it sits for real practical security tho, so I can see why IBM
wants those !='s to be loud and clear.

Patience, persistence, truth,
Dr. mike




Re: [IP] Open Source TCPA driver and white papers (fwd)

2003-01-24 Thread David Howe
at Friday, January 24, 2003 4:53 PM, Mike Rosing [EMAIL PROTECTED]
was seen to say:
 Thanks Eugen,  It looks like the IBM TPM chip is only a key
 store read/write device.  It has no code space for the kind of
 security discussed in the TCPA.  The user still controls the machine
 and can still monitor who reads/writes the chip (using a pci bus
 logger for example).  There is a lot of emphasis on TPM != Palladium,
 and TPM != DRM.  TPM can not control the machine, and for DRM to work
 the way RIAA wants, TPM won't meet their needs.  TPM looks pretty
 useful as it sits for real practical security tho, so I can see why
 IBM wants those !='s to be loud and clear.
Bearing in mind though that DRM/Paladium won't work at all if it can't
trust its hardware - so TPM != Paladium, but TPM (or an improved TPM) is
a prerequisite.




The Digital Evolution: Freenet and the Future of Copyright on the Internet

2003-01-24 Thread Steve Schear
IMHO, the article is the most reasoned, complete and balanced legal (and 
commonly accessible technical) analysis of the P2P scene.
The direct link is 
http://www.lawtechjournal.com/articles/2002/05_021229_roemer.php

Conclusion
More legal questions and conundrums are raised with a technology like 
Freenet than can be currently answered. Presently, Freenet is still an 
enthusiast's toy and not the next or current Napster, Morpheus, etc. 
However, even if Freenet never gains a massive user base, the law-defying 
encryption and distributed caching techniques of the project will likely 
end up in the next generation of P2P services. The struggles over changes 
in the Internet, seen through the eyes of emerging technologies, 
demonstrate that the confrontations between copyright owners and free 
information advocates will only continue to escalate. This escalation will 
be inextricably tangled in both legal and technological complexity, as 
neither the law nor technology appears capable of solving these dilemmas alone.

As Andrew Frank poignantly observes, P2P technologies are evolving in a 
Darwinian fashion, proving more resistant to technological and legal 
control with each iteration.183 The content industry stopped Napster. The 
industry may stop the FastTrack companies. It may even stop Freenet. 
Eventually, however, a new system, borne of the lessons of these pioneering 
technologies, will likely arrive that cannot be addressed within the 
current practical confines of copyright law. When that day comes, the 
content industry will perhaps have to consider (if has not already done so) 
how it will evolve in the ever-changing digital landscape.




RE: Deniable Thumbdrive? (and taking signal detection seriously)

2003-01-24 Thread Major Variola (ret)
 From: Tyler Durden [EMAIL PROTECTED]
 The cool thing about this drive (small enough that it has holes for
use as a
 keychain) is that it's got a Public area and a private area, and the

 private area is accessible (if one desires) only via the little
fingerprint
 reader on the top of the drive. (It's also USB based, and on
Windows2000 and
 beyond you don't need any software drivers--just plug it in to a USB
port
 and it appears as a drive).

 ANyway, I was wondering. I'd really like a nice software mod of this
thing
 so that, depending on which finger I use for verification, a different

 private area on the drive will open (right now several users can be
assigned
 access by the master user to use their fingerprint for access to the
single
 private area). Of course, there should be no indication that there
even IS
 more than one private area.

1. You should not rely on their encryption alone, you should use your
own crypto on
whatever you store there.   You can carry your whole environment --incl.

copies of tools, digsigs,and keyrings -- with you.   You do, of course,
have
to trust the hardware/OS you use it with.  If you don't know the
socket,
keep your dongle in your pants

2. If you use your 'nose' you need to borrow other noses to do a signal
detection study ---tally hits, misses, false alarms, false positives.
Then
get back to us.  We can even characterize and compare the performance
of say human sentries this way; even measure their fatigue, perhaps.  If
the
FAA/TSA has half a clue they've done this for their x-ray snoopers.




Re: [IP] Open Source TCPA driver and white papers (fwd)

2003-01-24 Thread Mike Rosing
On Fri, 24 Jan 2003, David Howe wrote:

 Bearing in mind though that DRM/Paladium won't work at all if it can't
 trust its hardware - so TPM != Paladium, but TPM (or an improved TPM) is
 a prerequisite.

Certainly!  But this TPM is really nothing more than a dongle
attached to the pci bus.  It will be straight forward to bypass
it for many nefarious operations.  Which makes me ahppy, but I suspect
it won't make the RIAA very happy :-)

Patience, persistence, truth,
Dr. mike




RE: Deniable Thumbdrive?

2003-01-24 Thread Tyler Durden
Peter Trei wrote...

What's you're threat model? If it's your wife or kid sister, this
might work. If it's a major corporation or a government, forget
it - they'll bitcopy the whole flash rom, and look at it with ease.

At this point, most of my threat models are on this level or the next one 
higher--local cops or dumb goons grab a protestor or whatever and try to 
shake his photos and whatever digital else out of him...OK punk, you're not 
calling a lawyer until you show me what's on this thing...Don't tell me 
nothing's in there I see a login prompt, ya' commie faggot...open it up.

This could of course be done without the thumbprint (probably better), but I 
think that only when you get -really- dangerous do you have to worry about 
highly technical people who are informed of the latest info gadgets, and who 
would even know there are multiple private areas.

As for the thumbprint, I'm wondering if other parts of the body could be 
used (then even very savvy rubberhosers couldn't just make you try every 
finger). I'll try using my, um, nose tonight.

-TD






_
Protect your PC - get McAfee.com VirusScan Online  
http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=3963



Re: Deniable Thumbdrive?

2003-01-24 Thread Ben Laurie
Tyler Durden wrote:

I got a hold of a little gadget recently that is very nearly perfect for 
certain forms of data storage. It's called a Thumbdrive and I bought 
it online somewhere (64Meg for about $179 or so).

The cool thing about this drive (small enough that it has holes for use 
as a keychain) is that it's got a Public area and a private area, and 
the private area is accessible (if one desires) only via the little 
fingerprint reader on the top of the drive. (It's also USB based, and on 
Windows2000 and beyond you don't need any software drivers--just plug it 
in to a USB port and it appears as a drive).

ANyway, I was wondering. I'd really like a nice software mod of this 
thing so that, depending on which finger I use for verification, a 
different private area on the drive will open (right now several users 
can be assigned access by the master user to use their fingerprint for 
access to the single private area). Of course, there should be no 
indication that there even IS more than one private area.

So...anyone heard of such a hack/mod, or is there a straightforward way 
to go about doing it oneself?

Nice! Get them to cut _all_ your fingers off instead of just one.

Just say no to amputationware.

Cheers,

Ben.

--
http://www.apache-ssl.org/ben.html   http://www.thebunker.net/

There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit. - Robert Woodruff




Re: Deniable Thumbdrive?

2003-01-24 Thread Thomas Shaddack

 Nice! Get them to cut _all_ your fingers off instead of just one.
 Just say no to amputationware.

Use the kind of fingerprint reader that can also sense the blood flow in
the finger, kinda like the heart rate sensors on some exercise machines.
Dead fingers then will be of no use.

...of course, one can still take a fingerprint photograph, etch it to
metal, pour thin layer of silicone over it, make a relief layer to put
over one's own finger, and fool the sensor. For this you don't even need a
cut-off finger, though - the access to the digitized thumbprints in ie. a
police database (or the database of those stores that allow you to pay
with a fingerprint, if you're there) is enough.





Re: thumdrive integrity --Deniable Thumbdrive?

2003-01-24 Thread John Bethencourt
On Fri, Jan 24, 2003 at 09:51:46PM +0100, Thomas Shaddack wrote:
 DEFINITELY TRUE!
 
 ...
 
 The device should be able to perform the encryption/decryption services on
 its own (hence the cryptographic CPU). Eg, you have an untrusted computer.
 You plug the device to its port, move a document from the untrusted
 machine to device's directory Cleartext, authorize yourself to the
 device with fingerprint and PIN, select the Encrypt function (which can
 be done eg. by a suffix to the PIN). In few seconds, you should then find
 the encrypted document in the device's directory Ciphertext. Similarly,
 the device should support write-only directory, to which you could write
 files freely but won't be able to retrieve them without authorization
 (this could allow using the device for data couriers who would be able
 to pick data but won't be able to read them along the way).

 ...

Good points. I've thought a lot about the possibility of such devices (I
suppose they are kind of obvious/inevitable to crypto-minded people).

One comment:

One the of the primary uses for such a device would be in protocols requiring
digital signatures. If the device is to be used for this, it would seem
necessary to also include a small display on it so the user can view what the
untrusted computer wants signed and authorize the signature. Of course, with
a screen, it's going to be more like a PDA and less like a key-chain sized
device.

One of these days, I might build a little device that stores a private key
and does on-board encryption using a microcontroller. I would do it just for
fun, since it is pretty useless if the infrastructure to support it is not out
there.

John Bethencourt




RE: Deniable Thumbdrive?

2003-01-24 Thread Bill Stewart
At 11:40 AM 01/24/2003 -0500, Tyler Durden wrote:

Peter Trei wrote...
What's you're threat model? If it's your wife or kid sister, this
might work. If it's a major corporation or a government, forget
it - they'll bitcopy the whole flash rom, and look at it with ease.


Agreed.  Furthermore, the whole thing is inherently dependent on the
processing model and programming interfaces of your thumbdrive.
What does it look like to your PC if you're not using the right thumb?
What does it look like to your PC if you want to use the right thumb?
Three obvious models are
- PC doesn't need Thumbdrive-specific drivers, just generic USB disk,
and the CPU in the drive decides whether it's seen your thumb
and reveals the otherwise-hidden files if it likes you.
- PC has specific drivers for the Thumbdrive,
Whole drive plus the thumbprint pad are visible to the PC,
and you can only decrypt the secret part if you put a matching
thumb on the thumbprint.
- PC has specific drivers for the Thumbdrive
Public drive, thumbprint pad, and hooks for secret drive are
visible to the PC, and putting the correct thumb on the pad
lets the PC find out the password to mount the secret drive.


At this point, most of my threat models are on this level or the next one 
higher--local cops or dumb goons grab a protestor or whatever and try to 
shake his photos and whatever digital else out of him...OK punk, you're 
not calling a lawyer until you show me what's on this thing...Don't tell 
me nothing's in there I see a login prompt, ya' commie faggot...open it up.

First of all, as Peter says, high-tech cops won't be fooled.
Low-level goons may not recognize it,
or if the thumbprint part requires specific drivers or data on the PC,
you can tell them sorry, that part's for access to my work PC,
and if you'd like to get a search warrant, they'll let you in the building,
and make sure the public part has some pictures of your dog or whatever.
For medium-tech cops, you can say that it requires installing drivers
on their PC (assuming that it does), and offer to download them,
and prearrange that there's a set of drivers at www.kevinmitnick.com
just in case they actually take you up on it.


As for the thumbprint, I'm wondering if other parts of the body could be used
(then even very savvy rubberhosers couldn't just make you try every finger).
I'll try using my, um, nose tonight.


Depending on the interface presented to the PC, it may or may not be obvious
to the PC whether there are zero, one, or more secret areas on the drive.
If it's not obvious, then the obvious extension to the product would be to
support multiple fingerprints for multiple secret areas, the business model
being so that multiple people can use the same drive, so your right thumb
gets your right-wing-conspiracy data, your left thumb gets your Commie stuff,
and your middle finger gets the picture of J.Edgar Hoover in his black negligee
or whatever else you want the cops to see.

Otherwise, figure out which body parts you don't mind them cutting off...




SuperCobra Crash Information - WLG

2003-01-24 Thread wguerin
SuperCobra Crash Information - WLG

Regarding the Helicopter Crash while on a Drug Bust 2003.01.23

Background: News reports indicate that 2 unknown us marine helicopters 
crashed in the desert while assisting a DEA/Customs drug interception.

News did not break until the next day that these vehicles were BOTH AH1A 
SuperCobra Helicopters. Apparently outfitted for recon and unarmed.

Immediate news reports ALL indicated that eye witnesses can not be trusted 
and witnesses could not be accurate in a description of the crash

US media continues to emphasize the significance of the inability for any 
witness to accurately describe what they saw. Witnesses have no trouble 
describing multiple views of an explosion, possible collision, and ground 
impact of these two AH1A vehicles.

While information on the purpose of their mission is most likely not expected, 
it is not uncommon for military operations to assist in high-profile recon and 
interception of drugs and other materials in assistance to customs/dea/etc.

There is a major problem with this story.

The AH1A SuperCobra is amonst the world's most advanced military aircraft. Its 
capabilities for reconaissance and weapons control is extrordinary, and its 
onboard sensor capabilities are amongst the most advanced.

Even if outfitted for DEA support operations, this vehicle will ALWAYS carry 
its standard onboard defense and tracking systems, as well as its standard 
course and threat analysis engines.

In short: The AH1A is virtually INCAPABLE of being run into or running 
something over unless it's control systems are compromised internally.

The potential for mid-air collision of MULTIPLE AH1A SuperCobra helicopters is 
virtually impossible, due to their constant communication and extremely 
advanced sensor and analysis capabilities.

For TWO AH1A vehicles, in ANY situation, to run into each other, is beyond any 
feasible analysis under any publicly-known conditions.

INTERPRETATION:

Something VERY big and heavyweight came across the boarder that night.

It is most likely this thing used either an advanced weapons system or 
communication/sensor override technology to take down the two highly advanced 
AH1As.

Scenereo 1: Highly Unlikely: Something shot BOTH the AH1As down. First of all, 
the public would not hear about it. Secondly, the AH1A would know of the 
weapons capabilities by the time it got there, and would not allow the piolets 
to be stupid enough to fly into missile range.

Scenereo 2: Plausible: Something jammed or intercepted/falsified communications 
and sensory capabilities of EITHER or BOTH AH1As, causing at least one to 
either automaticly (under false information) or allowably (under piolet 
control) run into the other.

Scenereo 3: Unlikely: Someone actually flew a highly advanced helicopter into 
another identical unit, synchronized with realtime communication and carying 
automated override capabilities to respond to realtime threats, such as being 
run over.

We can disregard Scenereo 1 due to numerous unlikely conditions.

Scenereo 3 is disregarded due to the required conditions: complete system 
failure, piolet failure, automatia failure, and stupidity beyond belief.

IMPLICATIONS:

Something with highly advanced capabilities was present in the target operation.

It could have most likely somehow compromised the on-board technologies of the 
well-reviewed AH1A's systems, or sufficiently jammed its ability to operate 
normally AND somehow instigated a situation where they collide.

Could the props have intersected with an unexpected wind gust? A: most likely 
not with an AH1A SuperCobra... With other aircraft, sure, but not something 
this advanced. B: It would have known about the wind gust.

DEDUCTIONS:

Someone took down TWO AH1A SuperCobra attack helicopters. Mechanism of attack 
unknown and not easily deduced.

It is commonly known that these systems are easily overridden, jammed, or 
falsified (override command control systems from remote), but ONLY by extremely 
advanced parties.

Something associated with that convoy knew how to take the AH1As down.

Given that Nothing else was damaged, including the expected numerous 
Customs/DEA/etc helicopters that would be used in this scenereo, it is expected 
that an ON-BOARD FAULT and OVERRIDE was used to voluntarily destroy the two 
AH1As.

This could be as simple as falsifying a signal that indicates vehicle 1 is 
going left when its going right, vehicle 2, to its right, slams into 1 while 
they turn toward the same point.

The problem here, is that SOMETHING knew how to jam and falsify signals and 
control systems on the world's most advanced line of military helicopters.

What would you think?

-Wilfred L. Guerin
[EMAIL PROTECTED]




Re: thumdrive integrity --Deniable Thumbdrive?

2003-01-24 Thread Thomas Shaddack
 One of these days, I might build a little device that stores a private key
 and does on-board encryption using a microcontroller. I would do it just for
 fun, since it is pretty useless if the infrastructure to support it is not out
 there.

Check http://developer.axis.com/products/mcm/ - this looks like a good
chip. Together with embedded Linux it could be pretty useful for this
purpose, could shorten the development time considerably. For $249 they
offer a readymade developer board.

Has built-in Ethernet and serial ports, and with a chip like FT8U232AM it
could work with USB as well.




Re: Deniable Thumbdrive?

2003-01-24 Thread Eugen Leitl
On Fri, 24 Jan 2003, Thomas Shaddack wrote:

 Use the kind of fingerprint reader that can also sense the blood flow in
 the finger, kinda like the heart rate sensors on some exercise machines.
 Dead fingers then will be of no use.

Photoplethysmography and photoxytometry are easy to fake once you know
what you're looking for. Thin-skin translucent silicone casts of
fingerprints (you can of course gather the patterns using the usual
dactyloscopy paraphernalia, whether reduced iron magnetic brush or
iodine/osmium tetroxide exposure) worn over live fingers would probably
work.

Frankly, the fingerprint is a lousy secret: you leak it all over the 
place. You can't help it, unless you're wearing gloves all the time. Ditto 
DNA.




Re: thumdrive integrity --Deniable Thumbdrive?

2003-01-24 Thread Thomas Shaddack

 WTF is the point of adding more biometric security to a device that
 cannot and does not support data integrity?  that flash memory held
 within the thumbdrive keeps your data in clear text...unless of course
 you store everything within some form of encrypted disk.  even then,
 the quick and dirty way to bypass the bio-security us to pull the card
 out of the usb enclosure and start poking at the contents.

DEFINITELY TRUE!

Thumbdrive products are a good step in the right direction, but by far not
long enough. Another approach is needed.

The unit should be tamperproof, with more services than just a dumb mass
storage device. The unit should contain a biometric sensor (eg, a
fingerprint reader), a small keypad or other device to enter a PIN, and
its own processor, for performing cryptographic operations.

The device should support several operations for different PINs, and
several PINs, which will allow several different private storage areas,
different operations, and a special PIN for destruction of secure content
and offering dummy content instead (See officer? I told you there are no
crypto keys there!).

The device should be able to keep audit log of operations.

The device should store the data in encrypted form in the memory. The PIN
could be part of the decryption key.

The device should be able to handle the biometric reader output on its
own, independently on the host computer. This architecture together with
adherence to USB mass-storage standards would make us independent on any
OS-specific drivers, making the device truly multiplatform.

The device should be able to perform the encryption/decryption services on
its own (hence the cryptographic CPU). Eg, you have an untrusted computer.
You plug the device to its port, move a document from the untrusted
machine to device's directory Cleartext, authorize yourself to the
device with fingerprint and PIN, select the Encrypt function (which can
be done eg. by a suffix to the PIN). In few seconds, you should then find
the encrypted document in the device's directory Ciphertext. Similarly,
the device should support write-only directory, to which you could write
files freely but won't be able to retrieve them without authorization
(this could allow using the device for data couriers who would be able
to pick data but won't be able to read them along the way).

Optionally, the unit could be usable for encryption/decryption of data
streams, which would make it very useful for IP telephony.

The key for crypto functions should never leave the unit. Attempt of
physical compromising of the unit should result in self destruction of at
least the part of the memory that keeps the keys (maybe keep them in
battery-backed RAM, sealed in epoxide resin with both passive and active
tamper-detection devices (including but not limited to thin wire mesh)?

This way, even if the computer itself would get compromised, the only
thing the adversary would be able to intercept would be the plaintexts
used in the sessions with the compromised machine. Which they would be
able to get using TEMPEST or a keylogger anyway. This design should be
robust against hijacking of the key by eg. trojan horses.





RE: Deniable Thumbdrive? (and taking signal detection seriously)

2003-01-24 Thread Bill Frantz
At 10:11 AM -0800 1/24/03, Major Variola (ret) wrote:
You do, of course, have
to trust the hardware/OS you use it with.  If you don't know the
socket, keep your dongle in your pants

Given the well documented advantages of poetry over prose in ease of
recall, this adage should be, If you don't know the socket, keep your
dongle in your pocket.  (Think codpieces.)

Cheers - Bill


-
Bill Frantz   | Due process for all| Periwinkle -- Consulting
(408)356-8506 | used to be the Ameican | 16345 Englewood Ave.
[EMAIL PROTECTED] | way.   | Los Gatos, CA 95032, USA




Re: thumdrive integrity --Deniable Thumbdrive?

2003-01-24 Thread Mike Rosing
On Fri, 24 Jan 2003, Thomas Shaddack wrote:

 Has built-in Ethernet and serial ports, and with a chip like FT8U232AM it
 could work with USB as well.

The 232BM version is easier to use and costs the same.

Patience, persistence, truth,
Dr. mike




Re: thumdrive integrity --Deniable Thumbdrive?

2003-01-24 Thread Tyler Durden
John Bethancourt wrote...

One of these days, I might build a little device that stores a private key 
and does on-board encryption using a microcontroller. I would do it just for 
fun, since it is pretty useless if the infrastructure to support it is not 
out there.

...while Thomas Shaddack gave us the first go round of a Requirements 
document (see below).

Sounds like a nice little project...Cypherpunks(TM) DenyDrive. Surely this 
must exist somewhere, no? Shouldn't the feds have ben using such a thing 
forever? Maybe we could sell them a few...

-TD






The unit should be tamperproof, with more services than just a dumb mass
storage device. The unit should contain a biometric sensor (eg, a
fingerprint reader), a small keypad or other device to enter a PIN, and
its own processor, for performing cryptographic operations.

The device should support several operations for different PINs, and
several PINs, which will allow several different private storage areas,
different operations, and a special PIN for destruction of secure content
and offering dummy content instead (See officer? I told you there are no
crypto keys there!).

The device should be able to keep audit log of operations.

The device should store the data in encrypted form in the memory. The PIN
could be part of the decryption key.

The device should be able to handle the biometric reader output on its
own, independently on the host computer. This architecture together with
adherence to USB mass-storage standards would make us independent on any
OS-specific drivers, making the device truly multiplatform.

The device should be able to perform the encryption/decryption services on
its own (hence the cryptographic CPU). Eg, you have an untrusted computer.
You plug the device to its port, move a document from the untrusted
machine to device's directory Cleartext, authorize yourself to the
device with fingerprint and PIN, select the Encrypt function (which can
be done eg. by a suffix to the PIN). In few seconds, you should then find
the encrypted document in the device's directory Ciphertext. Similarly,
the device should support write-only directory, to which you could write
files freely but won't be able to retrieve them without authorization
(this could allow using the device for data couriers who would be able
to pick data but won't be able to read them along the way).

Optionally, the unit could be usable for encryption/decryption of data
streams, which would make it very useful for IP telephony.

The key for crypto functions should never leave the unit. Attempt of
physical compromising of the unit should result in self destruction of at
least the part of the memory that keeps the keys (maybe keep them in
battery-backed RAM, sealed in epoxide resin with both passive and active
tamper-detection devices (including but not limited to thin wire mesh)?

This way, even if the computer itself would get compromised, the only
thing the adversary would be able to intercept would be the plaintexts
used in the sessions with the compromised machine. Which they would be
able to get using TEMPEST or a keylogger anyway. This design should be
robust against hijacking of the key by eg. trojan horses.






_
MSN 8 with e-mail virus protection service: 2 months FREE*  
http://join.msn.com/?page=features/virus



Re: Forget VOA -- new exec order creating Global Communications Office

2003-01-24 Thread Declan McCullagh
On Thu, Jan 23, 2003 at 06:15:24PM -0800, Bill Stewart wrote:
 VoA has spent the last N decades alternating between being
 the official US propaganda arm, and officially NOT being a
 US propaganda arm, just an organization we fund to make sure
 there's objective news reporting receivable in Communist countries
 (ok, ok, being the official US less-official propaganda arm)

Yeah, it's weird. The VOA asked me to speak to some Polish journalists
via satellite link a few years ago. I was curious and went ahead and
did it; it was an entirely uncensored exchange. We had a conversation
about press freedoms that was entirely unhindered and unrestricted by VOA.

-Declan