Re: cypherpunk wargames

2002-10-14 Thread Morlock Elloi

Looks like familiar event with /soccer moms/s//cypherpunks/g applied. Are girl
 boy scouts offered as well?



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:
Faith Hill - Exclusive Performances, Videos  More
http://faith.yahoo.com




Re: citizens as snitches

2002-10-14 Thread Tim May

On Monday, October 14, 2002, at 12:48  PM, Major Variola (ret) wrote:

  We're also getting a lot of pissed-off ex-wives calling in about  
 their
 hunter ex-husbands, says a detective working the investigation.

 http://library.northernlight.com/ 
 FB2002101383014.html?cb=0dx=1006sc=0#doc

 How did the east germans, romanians, etc. deal with this?

During the heyday of the Staasi, there were cases where spouses working  
for the Staasi simply vanished after their spouses learned of their  
narcing.

If a wife or ex-wife narcs out a guy, she has earned killing.

--Tim May
Gun Control: The theory that a woman found dead in an alley, raped and
strangled with her panty hose,  is somehow morally superior to a woman  
explaining to police how her attacker got that fatal bullet wound




Re: UK Censors, Shayler, Bin Laden

2002-10-14 Thread David Howe

at Saturday, October 12, 2002 2:01 AM, Steve Furlong
[EMAIL PROTECTED] was seen to say:
 On Thursday 10 October 2002 13:13, Tim May wrote:

 There are two advantages of web-based discussion fora over usenet:
 propagation time and firewalls.
Not sure about that - propagation time is a issue of course, but a web
interface to nntp isn't that hard (dejanews offered it for years) and
the propagation issue is fixed only by limiting the web forum to a
single server or local cluster of servers - if you were setting up a
web-based interface anyhow, you could get all the benefits of a single
server node while not preventing users not using the web interface from
participating. yes, NNTP submissions from other usenet servers might
take a while to propagate to the Master server (or vice versa) but
that wouldnt' affect the web interface users amongst themselves or
indeed, anyone using nntp directly to that server.

 On the other hand, few discussions are
 so urgent that they need near-real-time reparte, and participants
 shouldn't be cruising usenet from work.
depends on the forum. there are groups I *only* read at work - technical
ones of course, related to my job.  Usenet is a resource, and at times a
good one (provided you can live with the low signal-to-noise ratio).

 More generally, I've been watching the migration of many discussion
 groups over to Web-based forums (or fora). Usually the migration
 does not improve the discussion...it just puts dancing ads and cruft
 all over the pages.
probably more to the point - *profit-making* dancing ads.

 Something like...Google? You can't count on their sweep schedule, but
 it does most of what you're looking for.
deja-google is ok, but a lot of the more interesting threads include
x-no-archive headers (which google respects, and rightly so) somewhere
in them, so you have gaps...




Re: On topic!

2002-10-14 Thread Tim May

On Monday, October 14, 2002, at 02:24  AM, Eugen Leitl wrote:

 On Sun, 13 Oct 2002, Tim May wrote:

 We all noted that most Cypherpunks physical meetings are in about this
 range, of 20 to 30 attendees, and that the mailing list has ranged 
 from
 a few hundred to about 500 distinct, real subscribers for most of the
 list's existence.

 Though the epicenter of the movement is presumably still in the Bay 
 Area,
 a number of us are overseas, and not wealthy enough to hop into a 
 plane on
 a whim. I would presume most of the atendees were local, or semi-local
 (say, from SoCal).

Yes, but this is not inconsistent in any way with the point I was 
making. In fact, it's a major reason for the point.




--Tim May
The State is the great fiction by which everyone seeks to live at the 
expense of everyone else. --Frederic Bastiat




Re: was: Echelon-like resources..

2002-10-14 Thread Ken Brown

Tyler Durden wrote:

[...]

 Granted, Chonskty can be a little tiring on the ears

His voice seems to have mellowed over the years. I heard him on the
radio last week and he sounded just like Garrison Keillor :-)

Ken Brown




cypherpunk wargames

2002-10-14 Thread jsyn

++

 /* Cypherpunk Wargames: Mountainous Forest Operation */

  NOTE: This is an alternative to traditional learning methods, but is 
  nevertheless grounded in traditional responsibility.  Please do not
  read too much into this.


Cypherpunk Wargames are tactical training operations designed to engage hackers
in a wide range of strategic and technological thought.  Participants are taken
out of their familiar environments and into a very challenging fourth-
generation warfare exercise for several days.  Creativity and adaptability of
many varients is required for success in this setting.

Each operation is conducted as a unique scenario with it's own special
requirements.  This is a Mountainous Forest operation.  Participants will be
divided into several units, and then battle each other in a simultaneous land-
and network-based wargame carried out while encamped on a rugged mountainside. 
Many strategies for attack and defense will be available, but only one will end
up successful.

Several pilots of this exercise have already been completed in praire, 
woodland, and subterranean urban environments.  This will be the first full-
scale training operation.

For more information, see http://nthought.com/wargames/, or send mail to
[EMAIL PROTECTED]

SCENARIO

Mountainous Forest
backup plan: Mountainous Desert

DATE

November 7th - 11th, 2002 
Extended Veterans' Day Weekend

LOCATION

Several possibilities are still being explored.

Primary target:
Julian, CA - mid-elevation wooded hills; a suitable location has been
found here, and arrangements have been made.

Secondary targets: 
Yucca Valley, CA - desert; we've got a workable location here, too; this is
the backup plan.

Big Bear / Arrowhead, CA region - due to high fire hazard, this national 
forest area is now closed until the risk is diminished.

RULES
=
The rules are in an active state of development.  Expect the rules
about capturing opponents to change most drastically.

Teams and Team Selection:
- there will be several opposing teams (likely to be 4, but could be 3-5)
- the number of teams will be determined by the number of particpants 
   available; there will be 7-15 participants per team, and we are expecting
   40-60 participants, plus another dozen coordinators
- each participant will vote names for selection of the team captains
- each participant will have the opportunity to optionally make some of his 
   equipment resources and skills known
- team captains will draft their team members in rounds
- each team will have a passphrase assigned to it
- the team passphrase will give access to a central server, as well as to a
   GPG PK pair located there
- the team passphrase will not be cryptographically strong; assume that it
   is crackable within a reasonable amount of time

Terrain and Connectivity:
- the operating area will have been divided into several zones -- one for 
   each team, and one or more DMZs
- each team will build one or more camps (tents, networks, etc.) within
   their zone
- each team will be connected to the central NOC/HQ via a wireless network 
   bridge

Network Services:
- each team must run servers for which points will be granted (up to 10 servers
   will be point-granting)
- each server will be assigned one digitally-signed flag keyword file and
   several encrypted flag location files (one for each opposing team); these 
   files are to be placed in the primary file system root directory, readable 
   only by the system superuser
- each server must run at least 10 Well Known services (ports 1024), more for
   extra points (up to 30 point-granting services)
- additional points will be granted for running an older operating system on
   each server (with age defined as the date when 80% of the code was built)
- additional points will be granted per server for creating a guest shell
   account/password and advertising it on a publically accessible service;
   this account must have a traditional, fully functional shell (don't be
   stupid), though it may be enabled in a more restricted mode; the associated
   server must also be running a fully functional remote shell access service;
   for full credit, this must be enabled within 8 hours of each server going
   into operation

Operations:
- any participant may takedown a member of an opposing team (this isn't
   through physical assault, but through a hand-to-hand range nonrepudiable
   tagging mechanism)
- the hit participant is out of commission for a small period of time, their
   team loses points, and the team's central NOC/HQ  account is locked for ten 
   minutes (the exact procedure here is still in development)
- during cease-fires (meals, additional instruction, etc.), all persons are
   to be accounted for and must cease to attack; machines, however, are allowed
   to do whatever they like

Flags:
- the event coordinators will have strategically hidden 10 flags per team,
   with each team's flags being placed within 

Using mobile phone masts to track things

2002-10-14 Thread Scribe

The technology 'sees' the shapes made when radio waves emitted by mobile 
phone masts meet an obstruction. Signals bounced back by immobile objects, 
such as walls or trees, are filtered out by the receiver. This allows 
anything moving, such as cars or people, to be tracked. Previously, radar 
needed massive fixed equipment to work and transmissions from mobile phone 
masts were thought too weak to be useful.

Not enough detail in there to answer many questions - anyone have any more 
info on this?

http://www.observer.co.uk/uk_news/story/0,6903,811027,00.html