Re: Gestapo harasses John Young, appeals to patriotism, told to fuck off

2003-11-12 Thread Anonymous
I tried to get them to sit together but they carefully
bracketed me.

John, it's imaginable how it feels. It's very inconvenient when men
with guns send their minions - and it wouldn't surprise me if it does,
over time, change Cryptome's attitude. Avoid heroic stupidity. Optimize
for the long run. As opposed to Mr.May, you are causing some real
irritation.



F.B.I.'s Reach Into Records Is Set to Grow

2003-11-12 Thread Steve Schear
http://www.nytimes.com/2003/11/12/politics/12RECO.html

November 12, 2003

F.B.I.'s Reach Into Records Is Set to Grow

By ERIC LICHTBLAU

ASHINGTON, Nov. 11 A little-noticed measure approved by both the House and 
Senate would significantly expand the F.B.I.'s power to demand financial 
records, without a judge's approval, from car dealers, travel agents, 
pawnbrokers and many other businesses, officials said on Tuesday.

Traditional financial institutions like banks and credit unions are 
frequently subject to administrative subpoenas from the Federal Bureau of 
Investigation to produce financial records in terrorism and espionage 
investigations. Such subpoenas, which are known as national security 
letters, do not require the bureau to seek a judge's approval before 
issuing them.

The measure now awaiting final approval in Congress would significantly 
broaden the law to include securities dealers, currency exchanges, car 
dealers, travel agencies, post offices, casinos, pawnbrokers and any other 
institution doing cash transactions with a high degree of usefulness in 
criminal, tax or regulatory matters.

Officials said the measure, which is tucked away in the intelligence 
community's authorization bill for 2004, gives agents greater flexibility 
and speed in seeking to trace the financial assets of people suspected of 
terrorism and espionage. It mirrors a proposal that President Bush outlined 
in a speech two months ago to expand the use of administrative subpoenas in 
terrorism cases.

Critics said the measure would give the federal government greater power to 
pry into people's private lives.

This dramatically expands the government's authority to get private 
business records, said Timothy H. Edgar, legislative counsel for the 
American Civil Liberties Union. You buy a ring for your grandmother from a 
pawnbroker, and the record on that will now be considered a financial 
record that the government can get.

The provision is in the authorization bills passed by both houses of 
Congress. Some Democrats have begun to question whether the measure goes 
too far and have hinted that they may try to have it pulled when the bill 
comes before a House-Senate conference committee. Other officials predicted 
that the measure would probably survive any challenges in conference and be 
signed into law by President Bush, in part because the provisions already 
approved in the House and the Senate are identical.

The intelligence committees considered the proposal at the request of 
George J. Tenet, the director of central intelligence, officials said. 
Officials at the C.I.A. and the Justice Department declined to comment on 
Tuesday about the measure.

A senior Congressional official who supports the provision said that this 
is meant to provide agents with the same amount of flexibility in terrorism 
investigations that they have in other types of investigations.

This was really just a technical change to reflect the new breed of 
financial institutions, the official added.

Asked what had prompted the measure, the official said: This is coming 
from 3,000 dead people. There's an ever-expanding universe of places where 
terrorists can hide financial transactions, and it's only prudent and wise 
to anticipate where they might be and to give law enforcement the tools 
that they need to find them.

Christopher Wray, the Justice Department's assistant attorney general in 
charge of the criminal division, also addressed the issue last month at a 
Senate hearing.

Mr. Wray said that compared with the antiterrorism law that allowed agents 
to demand business records with court approval, the F.B.I.'s administrative 
subpoenas were more limited. The administrative subpoenas do provide for 
production of some records, he said, but they don't cover as many types 
of business records. 



Gun ownership == using it in crime, Texas court rules

2003-11-12 Thread Declan McCullagh
Toby Wade Beyer, Appellant Vs. State of Texas, Appellee

No. 11-02-00323-CR

COURT OF APPEALS OF TEXAS, ELEVENTH DISTRICT, EASTLAND

November 5, 2003, Filed

PRIOR HISTORY: Appeal from the 266th District of Erath County.

DISPOSITION: Affirmed.



COUNSEL: For Plaintiff or Petitioner: Andrew Ottaway, Attorney At Law, 
Granbury, TX.

For Defendant or Respondent: John Terrill, District Attorney, Stephenville, TX.

JUDGES: Panel consists of: Arnot, C.J., and Wright, J., and McCall, J.

OPINIONBY: TERRY McCALL

OPINION: Appellant pleaded guilty to the first degree felony offense of the 
manufacture of methamphetamine. The jury assessed punishment at 20 years 
confinement and found that appellant used or exhibited a deadly weapon 
during the commission of the offense. The trial court entered a deadly 
weapon finding in its judgment. See TEX. CODE CRIM. PRO. ANN. art. 42.12, ' 
3g(a)(2) (Vernon Supp. 2003). We affirm.

In his sole point of error, appellant complains that the evidence was 
insufficient to support the jury's finding that he used or exhibited a 
deadly weapon in the commission of the offense. HN1To determine if the 
evidence is legally sufficient, we must review all of the evidence in the 
light most favorable to the verdict [*2]  and determine whether any 
rational trier of fact could have found the essential elements of the crime 
beyond a reasonable doubt. Jackson v. Virginia, 443 U.S. 307, 61 L. Ed. 2d 
560, 99 S. Ct. 2781 (1979); Jackson v. State, 17 S.W.3d 664 
(Tex.Cr.App.2000). To determine if the evidence is factually sufficient, we 
must review all of the evidence in a neutral light and determine whether 
the evidence supporting guilt is so weak as to render the conviction 
clearly wrong and manifestly unjust or whether the evidence supporting 
guilt, although adequate when taken alone, is so greatly outweighed by the 
overwhelming weight of contrary evidence as to render the conviction 
clearly wrong and manifestly unjust. Vasquez v. State, 67 S.W.3d 229, 236 
(Tex.Cr.App.2002); Goodman v. State, 66 S.W.3d 283 (Tex.Cr.App.2001); 
Johnson v. State, 23 S.W.3d 1, 11 (Tex.Cr.App.2000); Cain v. State, 958 
S.W.2d 404 (Tex.Cr.App.1997); Clewis v. State, 922 S.W.2d 126 (Tex.Cr.App. 
1996).

HN2The Court of Criminal Appeals has defined the terms use and exhibit 
as they are used in Article 42.12, section 3g(a)(2).  [*3]  Gale v. State, 
998 S.W.2d 221, 225 (Tex.Cr.App. 1999); Patterson v. State, 769 S.W.2d 938, 
941 (Tex.Cr.App.1989). The use of a deadly weapon during the commission 
of a felony offense extends to any employment of a deadly weapon, even its 
simple possession, if such possession facilitated the associated felony. 
Patterson v. State, supra. A defendant's use of a deadly weapon in the 
sense of protecting and facilitating his possession of a controlled 
substance constitutes use of a deadly weapon under Article 42.12, section 
3g(a)(2). Gale v. State, supra; Patterson v. State, supra.

In this case, the evidence showed that law enforcement officers searched 
appellant's residence, pursuant to a search warrant, on December 12, 2001. 
Investigator Gerald Wayne Rogers of the S.T.O.P. Narcotics Task Force 
participated in the search. Investigator Rogers testified that, other than 
the officers, appellant was the only person present at the residence during 
the search. The officers discovered methamphetamine during the search. They 
also discovered a working methamphetamine laboratory in the residence and 
ingredients [*4]  necessary to manufacture methamphetamine.

Investigator Rogers said that appellant's residence was equipped with 
surveillance equipment. The officers saw their vehicles on the surveillance 
television in the living room to the left of the front door. The officers 
found a loaded sawed-off double-barreled shotgun on a couch that was near 
the television. Investigator Rogers said that a person sitting on the couch 
could watch the surveillance on the television and be ready to shoot the 
shotgun if anybody came in the front door. Investigator Rogers testified 
that, in his experience, individuals who are involved in manufacturing 
methamphetamine are generally well armed. Investigator Rogers said that the 
shotgun was a deadly weapon that was used in the commission of the offense 
of manufacturing the methamphetamine.

Appellant does not deny that the shotgun was a deadly weapon or that he was 
in possession of it. Rather; he argues that there was no evidence to 
support the jury's finding that his possession of the shotgun facilitated 
the associated felony of manufacturing methamphetamine. We disagree. Based 
on the evidence, a rational trier of fact could find that the shotgun 
facilitated appellant's [*5]  offense of manufacturing. The officers found 
the loaded shotgun on the couch near the surveillance television. The 
evidence was legally and factually sufficient to establish that appellant 
used the shotgun in the sense that it protected and facilitated his 

Re: Gestapo harasses John Young, appeals to patriotism, told to fuck off

2003-11-12 Thread Tim May
On Nov 8, 2003, at 11:06 AM, Anonymous wrote:

Cryptome received a visit today from FBI Special Agents Todd Renner 
and Christopher
Kelly from the FBI Counterterrorism Office in New York, 26 Federal 
Plaza, telephone
212) 384-1000. Both agents presented official ID and business cards.
Good stuff. Pigs getting concerned about cryptome means they are 
scared.


I don't understand how this Anonymous can title a post with the 
phrase told to fuck off when John Young's account clearly said that 
he allowed the Feebs to enter his area and even had them sitting on 
either side of him.

I cannot claim to know what I would do, or will do, if Feds ever visit 
my home, but I hope I will have the presence of mind to tell them to:

a) get off my property

b) or to arrest me

In either case, talking to them will not help. The way the 
Reichssecuritat is getting convictions these days is to charge sheeple 
with lying to Federal agents.

Nothing in the Constitution allows compelled speech, except under 
limited (and I think unconstitutional) cases involving grand juries 
ordering a person to speak. (Or where use or blanket immunity has been 
granted, again, probably an unconstitutional measure, as it is 
compelling potentially self-incriminating evidence which may very well 
be used in either another case or be twisted to provide a basis for 
another case.)

I hope I will have the self-presence to say You are trespassing. Get 
off my property, right now!

Cooperating with cops snooping around looking for either thoughtcrime 
or terrorist aid and support is a lose, a big lose.

Speculating wildly, the real target may be John Young himself. And 
nearly anything he said to these narcs may be construed, by them and by 
their malleable DAs, as lying to a Federal investigator.

People should not talk to the Feds. If the Feds come calling, refer 
them to one's lawyer. For those who don't have a lawyer on retainer, 
tell them that you need to consult with a lawyer first. Whether you do 
or you don't is beside the point. The point is to not talk to them.

Lying to a Federal investigator is how they probably hope to get 
Cryptome shut down and John's kind of dissent quelled.

--Tim May



Campaign contribution limits and soft money...law of unintended consequences

2003-11-12 Thread Tim May
So the Dems who sought campaign finance reform, via McCain-Feingold 
(*) are now trying to get an exception to allow George Soros to spend 
his soft money to help Dems. It seems the legally collected $160 
million war chest that Shrub has collected is scaring the Dems, who 
have raised vastly less. They are looking with lust at the coffers of 
Soros and others, except the campaign finance reform laws they got 
passed are a problem...

(* McCain is officially a Republican, but is actually deeply statist 
and is to the left of Ted Kennedy on many things)

The Constitutional principle is crystal clear on all of these limits 
on speech: there ain't none.

If Tim May wants to speak out, buy ads, write articles, hire others to 
speak out, he can. Ditto for George Soros. Ditto for anyone else. 
Period.

The fact that the Supreme Court has not said Just what part of the 
First Amendment have you not read? and struck down the laws is 
symptomatic of the sick adhocracy we now live in.

I cannot wait for the mushroom cloud over D.C.

--Tim May
Gun Control: The theory that a woman found dead in an alley, raped and
strangled with her panty hose,  is somehow morally superior to a woman 
explaining to police how her attacker got that fatal bullet wound



Re: Gun ownership == using it in crime, Texas court rules

2003-11-12 Thread Steve Schear
At 11:01 AM 11/12/2003 -0500, Declan McCullagh wrote:
Appellant does not deny that the shotgun was a deadly weapon or that he 
was in possession of it. Rather; he argues that there was no evidence to 
support the jury's finding that his possession of the shotgun facilitated 
the associated felony of manufacturing methamphetamine. We disagree. Based 
on the evidence, a rational trier of fact could find that the shotgun 
facilitated appellant's [*5]  offense of manufacturing. The officers found 
the loaded shotgun on the couch near the surveillance television. The 
evidence was legally and factually sufficient to establish that appellant 
used the shotgun in the sense that it protected and facilitated his 
manufacturing of the methamphetamine. Gale v. State, supra; Patterson v. 
State, supra. Appellant's sole point of error is overruled.
This sort of stupidity will likely lead to more un-intended 
consequences.  Those that operate a business and possess firearms, to 
protect the business, will now have to think whether the possession could 
get them substantial jail time if they are also found to be somehow in 
violation of some other criminal statute.  Imagine a liquor store in a 
violent neighborhood.that is occasionally selling to underage kids 
(counterfeit IDs are rampant).  Imagine a drug dealer trying to protect 
their inventory from competitor expropriation.

Some will forego having a firearm present and risk what protection it 
affords.  Others will have to consider an uninvited police visit as a 
personal threat and preemptively open fire.  This and 3-strikes laws are 
not good news for law enforcement.

steve 



More crap crypto broken (yawn) (fwd from harley@argote.ch)

2003-11-12 Thread Eugen Leitl
- Forwarded message from Dr. Robert J. Harley [EMAIL PROTECTED] -

From: [EMAIL PROTECTED] (Dr. Robert J. Harley)
Date: Wed, 12 Nov 2003 21:25:16 +0100 (CET)
To: [EMAIL PROTECTED]
Subject: More crap crypto broken (yawn)

From The Register:

-
-
Nokia pledges to pursue N-Gage crack creators
[...]

Nokia today vowed to aggressively pursue the people behind the
successful attempt to crack its N-Gage handheld console-cum-phone's
copy protection mechanism.

A Nokia spokesman told The Register the company had already begun
working with ISPs and law enforcement agencies to track down the
perpetrators.

[...]

As we reported earlier, the crack has been implemented in an
application which when loaded onto an N-Gage or another Symbian-based
Series 60 handset will detect encrypted games stored in the root
directory of a memory card, decrypt the files onto the card then add
the game in the handset's application launcher.

[...]

How the copy protection mechanism was cracked isn't known. The Nokia
spokesman said the company's system was proprietary [...]

[...]

Skill is one thing, but as far as time goes, it has taken only a month
from the console's release to the public for the code to be
cracked. The Nokia spokesman admitted that the company had expected
this to happen - which begs the question why, like the DVD Content
Scrambling System, the copy protection developers didn't come up with
something stronger in the first place.

[...]
-
-

See:
  http://www.theregister.co.uk/content/68/33938.html

R
 .-.   .-.
/   \   .-. .-.   /   \
   / \ /   \   .-. _ .-.   /   \ / \
  /   \   / \ /   \   / \   /   \ / \   /   \
 / \ /   \   / `-'   `-' \   /   \ /
\
\   / `-' `-' \   /
 `-'   `-'
___
FoRK mailing list
http://xent.com/mailman/listinfo/fork

- End forwarded message -
-- Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144 http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE

[demime 0.97c removed an attachment of type application/pgp-signature]



MacOS X (Panther) FileVault

2003-11-12 Thread Ralf-P. Weinmann
Panther's FileVault has already come up in a previous discussion, but questions
which I thought were pretty obvious and which I had expected at least SOMEONE
on cypherpunks to pose haven't come up... Sigh.

Are there any whitepapers available on the design of FileVault? Except for
impressive words from marketing droids (AES-128, industry-standard cipher,
yawn) I have seen absolutely zilch on the implementation yet: i.e. is
encryption done on a per-file basis or is rather blockwise underneath the
filesystem layer (ala loop-aes under Linux)? AES-128, fair enough; but what
mode is used for encrypting the files/blocks? ECB? CBC? CTR?  CCM? 

Maybe Apple ported PHK's GBDE [1], MacOS X having FreeBSD underpinnings and all
that?

What I'd like for Apple to do is step ahead and release the source code of
FileVault for per review...

Ralf

[1] GBDE - GEOM based disk encryption
http://phk.freebsd.dk/pubs/bsdcon-03.gbde.paper.pdf 

-- 
Ralf-P. Weinmann [EMAIL PROTECTED]
PGP fingerprint: 1024D/EF114FC02F150EB9D4F275B6159CEBEAEFCD9B06



Re: MacOS X (Panther) FileVault

2003-11-12 Thread Tim May
On Nov 12, 2003, at 5:40 PM, Ralf-P. Weinmann wrote:

Panther's FileVault has already come up in a previous discussion, but 
questions
which I thought were pretty obvious and which I had expected at least 
SOMEONE
on cypherpunks to pose haven't come up... Sigh.

Are there any whitepapers available on the design of FileVault? Except 
for
impressive words from marketing droids (AES-128, industry-standard 
cipher,
yawn) I have seen absolutely zilch on the implementation yet: i.e. is
encryption done on a per-file basis or is rather blockwise underneath 
the
filesystem layer (ala loop-aes under Linux)? AES-128, fair enough; but 
what
mode is used for encrypting the files/blocks? ECB? CBC? CTR?  CCM?

Maybe Apple ported PHK's GBDE [1], MacOS X having FreeBSD 
underpinnings and all
that?

What I'd like for Apple to do is step ahead and release the source 
code of
FileVault for per review...

Loosely related to this, I was at the Hackers Conference this past 
weekend. At my last attendance, two years ago, Mac Titanium Powerbooks 
were fairly abundant, but faced good competition from x86 laptops.

This time, whoah Nelly, hold the horses! There must have been 40 of 
them, from the small iBooks to the mid-sized Al- and older 
Ti-Powerbooks, to the mammoth 17-inch model. It was astounding to me, a 
long-term Mac user, to see the Mac laptops completely dominant. Looking 
into the audience, a sea of silvering Mac laptops with the distinctive 
white, illuminated Apple logo.

A big hit was Etherpeg, from www.etherpeg.com, which intercepts 
packets over a WiFi network and reconstructs the packets into JPEG 
images (if they exist). Since most of the Macs in the audience were on 
a local WiFi/AirPort network, arranged ad hoc, the output was put up 
on the LCD projector during one of the main talks. Images of naked 
chicks, oh my!

ObCrypto: Some of the Linux advocates said they had switched to Macs 
partly because the small form factor x86 boxes shipped only with 
Palladium (or its equivalent...they were referring to IBM, so it's 
whatever IBM is now shipping on its ThinkPads as part of their Digital 
Rights Management b.s.). A few people had Debian Linux installed on 
their Mac Powerbooks, though they acknowledged that with OS X being 
built on BSD Unix, there was no actual need to have Linux.

Interestingly, there were virtually no desktops of any sort at the 
Conference. Partly this is logistical--people have to decide to 
transport their machines. But the reports that laptops are now 
accounting for 50% of Apple's sales are showing up in what I saw at the 
Conference.

I hope Apple realizes the marketing edge they are gaining in some 
circles and doesn't do what Sony and IBM are doing.

AMD would also do well to realize that DRM and Palladium/Longhorn is a 
major marketing clusterfuck.xt

--Tim May
Dogs can't conceive of a group of cats without an alpha cat. --David 
Honig, on the Cypherpunks list, 2001-11



Re: MacOS X (Panther) FileVault

2003-11-12 Thread Marshall Clow
At 6:18 PM -0800 11/12/03, Tim May wrote:
A big hit was Etherpeg, from www.etherpeg.com, which intercepts 
packets over a WiFi network and reconstructs the packets into JPEG 
images (if they exist). Since most of the Macs in the audience were 
on a local WiFi/AirPort network, arranged ad hoc, the output was 
put up on the LCD projector during one of the main talks. Images of 
naked chicks, oh my!
This was done for the hack contest at MacHack 2001, also.
[ I have no idea if that was the first time, either. ]
The following year (2002) it was enhanced to return fake banner ads, since
machines on the local net could certainly answer before 
ads.doubleclick.com could. :-)
--
-- Marshall

Marshall Clow Idio Software   mailto:[EMAIL PROTECTED]
Hey! Who messed with my anti-paranoia shot?


Re: MacOS X (Panther) FileVault

2003-11-12 Thread Tim May
On Nov 12, 2003, at 7:13 PM, Marshall Clow wrote:

At 6:18 PM -0800 11/12/03, Tim May wrote:
A big hit was Etherpeg, from www.etherpeg.com, which intercepts 
packets over a WiFi network and reconstructs the packets into JPEG 
images (if they exist). Since most of the Macs in the audience were 
on a local WiFi/AirPort network, arranged ad hoc, the output was 
put up on the LCD projector during one of the main talks. Images of 
naked chicks, oh my!
This was done for the hack contest at MacHack 2001, also.
[ I have no idea if that was the first time, either. ]
The following year (2002) it was enhanced to return fake banner ads, 
since
machines on the local net could certainly answer before 
ads.doubleclick.com could. :-)

I didn't mean to give any impression that it was done by the HC 
attendees, just that it was a big hit. And since there were 30-50 Macs 
and PCs in the audience, with many on the ad hoc WiFi/AirPort network, 
and many links to the outside, there were a _lot_ of JPEGs whizzing by. 
Sometimes a blizzard of dozens per second, sometimes just a few per 
second.

The dynamics were interesting, too. The JPEGs started out being from 
porn sites, then became related to whatever the speaker was talking 
about. For example, if someone mentioned the evening's keynote speaker, 
Don Norman, a bunch of sites and photos related to him would appear 
(about 10 seconds later). If someone mentioned snow on the roads (near 
Yosemite), weather maps would appear.

--Tim May