[CTRL] Privacy Row in the Skies
-Caveat Lector- http://www.thetruthseeker.co.uk/article.asp?ID=1327 Privacy Row in the Skies Gordon Thomas President Bush and the European Union are on a head-on collision course over Washingtons plan to introduce the largest surveillance system ever used on civilian populations. The American Civil Liberties Union has called it a surveillance monster that will not make anyone safer. It could have a serious effect on tourism to America. It could see airlines that co-operate with the system facing huge penalties from the European Union. But those airlines who refuse to bow to Washingtons demands will be denied landing rights at all US airports. Last week, as President Bush flew to and from Baghdad on Air Force One in a slick publicity stunt for footage to enhance his coming election video, he broke some of the very laws he now wants to enforce. Air Force One did not identify itself as it sneaked out of Andrews Air Force Base. The President did not say he was on board. Or where he was going. In doing so, he broke the spirit if not the proposed law of the Computer Assisted Passenger Pre-Screening System, CAPPS-II. This is the updated version of a system introduced in 1996 after TWA flight 800 went down over Long Island Sound, killing 250. Before it was learned that the tragedy was noting to do with terrorism, the Clinton Administration had rushed through CAPPS-I. It was supposed to single out potential terrorists by vetting them before they boarded flights. Fliers who bought one-way tickets, checked in without tickets or paid in cash for flights were flagged as potential threats. But now, prompted by Bush, Homeland Security wants to introduce in the New Year, CAPPS-II, that goes far beyond the original scheme. Each airline bringing a passenger to the United States must supply Homeland Security with the name, address, date of birth, home and office telephone number and occupation of each traveller. There will be no exceptions. Even babies must be logged. Details of a childs school must be provided. The information will be fed into state-of-the-art computers at Homeland Securitys Transportation Division. Each detail will be checked with data-mining software to cross-reference that information with computerised records already stored. These would contain details of previous flights a passenger has made along with where and how long he or she stayed in the United States. Any change in marital status will be noted. The data will then be processed by more computers to determine the level of security risk to the United States any passenger poses. This information will be supplemented by a passengers on board food preference, who he travelled with in the past, who he is currently flying with. Details of how, where and when a ticket was purchased, by credit card or cash, will be stored for years. For this to work, a huge amount of private information will be needed on each person. But of the 39 separate items of information that the US wants on each traveller, only 19 are permitted to be disclosed under European Union privacy laws, said Paris based airline industry analyst, Peter Densor. Colin Wallace, a former British intelligence surveillance operative, said that CAPPS-II is a further step to what the state does in the name of protecting the individual. There is something sinister in what Homeland Security is proposing. The results of such surveillance can reshape, reform, or at least control, the thinking and behaviour of any individual. Such surveillance is liberated from any legal or moral obligations. The fact is that the US has nothing like the data-protection legislation which exists in Europe and it is very likely that intimate information on private citizens would be sold on from company to company, predicted Peter Somer, adviser to Britains Trade and Industry Department. Kevin Warwick, professor of Cybernetics at Englands University of Reading, says that what CAPPS-II will do is to further ensure that surveillance will eventually totally control us. There are already far too many government bodies who are privy to our secrets. They are the watchers. We are the watched. A major problem with CAPPS-II which will trigger confrontation with Washington is that the European Community want it to have as minimum an independent appeals procedure. A spokesman for the EU said: If the systems indicate you are a high-risk passenger due to fault information held on computer, or the checks didnt source enough information on you, then you could end up on a no-fly list forever. The supporters of CAPPS-II led by Israel say that civil liberties have to be traded for security. But Richard Tomlinson, a former MI6 officer said, that argument is knocked on the head by identity theft. For a few hundred dollars a false ID can be obtained. It is relatively easy for a determined terrorist to create a safe passenger profile with easily available documents; credit cards and driving
[CTRL] Privacy Alert for YAHOO + groups users
-Caveat Lector- --- Forwarded message follows --- To: [EMAIL PROTECTED] From: [EMAIL PROTECTED] Date sent: Wed, 8 Jan 2003 14:53:05 EST Subject:!b_a_Act: Privacy Alert for YAHOO + groups users Yahoo is now using something called Web Beacons to track Yahoo Group users around the net and see what you're doing - similar to cookies. Take a look at their updated privacy statement: http://privacy.yahoo.com/privacy/us/pixels/details.html About half-way down the page, in the section Outside the Yahoo! Network, you'll see a little click here link that will let you opt-out of their new method of snooping. I recommend doing this. Once you have clicked that link, you are opted out. Notice the Success message at the top of the next page. Be careful, because on that page there is a Cancel Opt-out button that, if clicked, will *undo* the opt-out.You are now done, and will receive less junk mail. If you want to prevent Yahoo from spamming you or selling your personal information, you can ALSO update your account preferences at this address Which will show you as opted out if you performed the funcion at the beginning of this email. http://subscribe.yahoo.com/showaccount Yahoo Group users may want to check this out. Yahoo users please note - new cyber snooping measures in place Anyone who is in a Yahoo group needs to read this. Yahoo may be taking advantage of the new Homeland Security measures set up for ISPs to Monitor the netAt least for now Yahoo has an Opt Out of their Web Beacons Trackers. This has been posted (note that you must opt out on every browser you use with Yahoo): -- --- End of forwarded message --- -- Steve Wingate ANOMALOUS IMAGES AND UFO FILES http://www.anomalous-images.com A HREF=http://www.ctrl.org/;www.ctrl.org/A DECLARATION DISCLAIMER == CTRL is a discussion informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substancenot soap-boxingplease! These are sordid matters and 'conspiracy theory'with its many half-truths, mis- directions and outright fraudsis used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of [EMAIL PROTECTED]/A http:[EMAIL PROTECTED]/ A HREF=http:[EMAIL PROTECTED]/;ctrl/A To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om
Re: [CTRL] Privacy Not
-Caveat Lector- please enlighten me c I really want to know, to understand, to see how I have been failing you and make amends by passing your test with love and best wishes, andrew www.planetxorg.com - Original Message - From: c. [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Wednesday, August 01, 2001 7:02 AM Subject: Re: [CTRL] Privacy Not -Caveat Lector- - Original Message - From: Andrew Hennessey [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Tuesday, July 31, 2001 10:14 PM Subject: Re: [CTRL] Privacy Not -Caveat Lector- you came up with an original word no i didn't. 'twas a simple test to assess your understanding of the subject you speak so authoritively. unsurprisingly, you fail. A HREF=http://www.ctrl.org/;www.ctrl.org/A DECLARATION DISCLAIMER == CTRL is a discussion informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substance-not soap-boxing-please! These are sordid matters and 'conspiracy theory'-with its many half-truths, mis- directions and outright frauds-is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of [EMAIL PROTECTED]/A http:[EMAIL PROTECTED]/ A HREF=http:[EMAIL PROTECTED]/;ctrl/A To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om A HREF=http://www.ctrl.org/;www.ctrl.org/A DECLARATION DISCLAIMER == CTRL is a discussion informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substancenot soap-boxingplease! These are sordid matters and 'conspiracy theory'with its many half-truths, mis- directions and outright fraudsis used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of [EMAIL PROTECTED]/A http:[EMAIL PROTECTED]/ A HREF=http:[EMAIL PROTECTED]/;ctrl/A To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om
Re: [CTRL] Privacy Not
-Caveat Lector- i cannot illuminate you andrew. only you can do that. not so much a test as an assessment. can't you see the fnords? i mean, really? your writing is full of them... c. www.boohoo.demon.co.uk/pageone.htm - Original Message - From: Andrew Hennessey [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Wednesday, August 01, 2001 4:15 PM Subject: Re: [CTRL] Privacy Not -Caveat Lector- please enlighten me c I really want to know, to understand, to see how I have been failing you and make amends by passing your test with love and best wishes, andrew www.planetxorg.com - Original Message - From: c. [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Wednesday, August 01, 2001 7:02 AM Subject: Re: [CTRL] Privacy Not -Caveat Lector- - Original Message - From: Andrew Hennessey [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Tuesday, July 31, 2001 10:14 PM Subject: Re: [CTRL] Privacy Not -Caveat Lector- you came up with an original word no i didn't. 'twas a simple test to assess your understanding of the subject you speak so authoritively. unsurprisingly, you fail. A HREF=http://www.ctrl.org/;www.ctrl.org/A DECLARATION DISCLAIMER == CTRL is a discussion informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substance-not soap-boxing-please! These are sordid matters and 'conspiracy theory'-with its many half-truths, mis- directions and outright frauds-is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of [EMAIL PROTECTED]/A http:[EMAIL PROTECTED]/ A HREF=http:[EMAIL PROTECTED]/;ctrl/A To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om A HREF=http://www.ctrl.org/;www.ctrl.org/A DECLARATION DISCLAIMER == CTRL is a discussion informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substancenot soap-boxingplease! These are sordid matters and 'conspiracy theory'with its many half-truths, mis- directions and outright fraudsis used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of [EMAIL PROTECTED]/A http:[EMAIL PROTECTED]/ A HREF=http:[EMAIL PROTECTED]/;ctrl/A To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om A HREF=http://www.ctrl.org/;www.ctrl.org/A DECLARATION DISCLAIMER == CTRL is a discussion informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substancenot soap-boxingplease! These are sordid matters and 'conspiracy theory'with its many half-truths, mis- directions and outright fraudsis used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of [EMAIL PROTECTED]/A http:[EMAIL PROTECTED]/ A HREF=http:[EMAIL PROTECTED]/;ctrl/A To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe
Re: [CTRL] Privacy Not
-Caveat Lector- On Tue, 31 Jul 2001 20:23:53 +0100, Andrew Hennessey [EMAIL PROTECTED] posted article 005201c119f6$566b3400$d0e928c3@elessar, which said: unfortunately this list is a bit of a playground for retired CIA etc who are trying to make a bit of pocketmoney - so the key wouldn't be safe also - I'm pretty sure the government/NSA has the ability to strip down PGP by now - its the first thing i would ask ET for - computer capacity like that. Possibly so. Phil Zimmermann, of course, still claims that it would take supercomputers several months to crack the code, but after I heard about that new computer that was built to run atmospheric simulations, I'm starting to wonder what actually defines a supercomputer. Compared to my old TRS-80 Color Computer with 16k of RAM, this Athlon 1200 MHz with 256 megs of RAM is a supercomputer. Over in Europe, Sun Microsystems built a computer with the RAM that equates to 11,000 CD-ROM's. Nearly 7 Terabytes of RAM, that is. This computer is going to be used to try to figure out exactly what happened in the process of evolution. As for this atmospheric meteorlogical simulator, I don't remember how much RAM it has -- I think they said 11 Terabytes, or they packed enough CPU's in it to make it run at a clock speed of 11 Terahertz. I watch TechTV all the time, so when I see the report again, I'll respond here and update the thread. Anyway, seems like with a computer that fast, it wouldn't take very long to crack a PGP key. And I think all these new versions of PGP probaby have a master key held by the government. I remember a few years back, the government was S concerned about people encrypting the e-mail they were probably reading left and right, so they came up with this plan to have all PGP users private keys held in escrow and with a court order, the FBI and other law enforcement agencies could use a warrant to obtain a copy of your private key and decrypt your e-mails. Needless to say, privacy advocates and PGP users were in an uproar. Now notice that recently they relaxed the laws against exporting encryption technologies outside the United States. Why? I imagine that not only do they now have all our private keys, not even held in escrow, but sitting on their hard drives so they can access our e-mail without probably cause, but they also have a computer fast enough to crack PGP encryption keys in a matter of minutes. Phil Zimmermann says that we can always increase the encryption strength of our keys, which is a lot easier and cheaper to do than building a more powerful computer to crack it. But even in 1994 we had 2048-bit keys, and maybe even earlier. Nowadays the most I've heard of is 4096-bit keys. In 1993 about the fastest consumer-grade PC you could buy was something like a Pentium 60 and maybe a Pentium 75. Now you can get a Pentium IV running at 1800 MHz. We should be using at LEAST 131,072-bit keys to keep the same relative strength of encryption that we had back then. But while computer speeds have increased nearly 20-fold, our PGP keys are only twice as strong. Yep... it's been cracked. Privacy is an illusion. Damaeus A HREF=http://www.ctrl.org/;www.ctrl.org/A DECLARATION DISCLAIMER == CTRL is a discussion informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substancenot soap-boxingplease! These are sordid matters and 'conspiracy theory'with its many half-truths, mis- directions and outright fraudsis used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of [EMAIL PROTECTED]/A http:[EMAIL PROTECTED]/ A HREF=http:[EMAIL PROTECTED]/;ctrl/A To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om
[CTRL] Privacy Not
-Caveat Lector- Perhaps with all the concerns about wiretaps, e-mail snooping and the like, this might be a nice place to encourage the use of PGP encryption. It would be kind of like sticking our e-mails in a lockbox that only we can open. Only thing is... how do we know an informant is not among us. I dunno... Maybe it's not even worth trying. It's not like we're conspiring to overthrow the government or anything. We're just discussing things that the government would probably prefer that we not even know about. Thing is, though, if enough people use PGP, the government would spend so much time straining their computers to crack the codes of e-mails that it might make e-mail snooping something that's not worth doing anymore. Might cause a mess, though... Does the list get a PGP key? Do we all share our keys with each other? Plus we'd have to type in a passphrase for every e-mail. But is it any more inconvenient than opening an envelope? Damaeus A HREF=http://www.ctrl.org/;www.ctrl.org/A DECLARATION DISCLAIMER == CTRL is a discussion informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substancenot soap-boxingplease! These are sordid matters and 'conspiracy theory'with its many half-truths, mis- directions and outright fraudsis used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of [EMAIL PROTECTED]/A http:[EMAIL PROTECTED]/ A HREF=http:[EMAIL PROTECTED]/;ctrl/A To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om
Re: [CTRL] Privacy Not
-Caveat Lector- On 31 Jul 2001, at 10:50, [EMAIL PROTECTED] wrote: -Caveat Lector- Perhaps with all the concerns about wiretaps, e-mail snooping and the like, this might be a nice place to encourage the use of PGP encryption. It would be kind of like sticking our e-mails in a lockbox that only we can open. Only thing is... how do we know an informant is not among us. I dunno... Maybe it's not even worth trying. It's not like we're conspiring to overthrow the government or anything. We're just discussing things that the government would probably prefer that we not even know about. Thing is, though, if enough people use PGP, the government would spend so much time straining their computers to crack the codes of e-mails that it might make e-mail snooping something that's not worth doing anymore. Might cause a mess, though... Does the list get a PGP key? Do we all share our keys with each other? Plus we'd have to type in a passphrase for every e-mail. But is it any more inconvenient than opening an envelope? Damaeus The only way this would work would be for the list to share it's private key with every member, which would pretty much defeat the purpose of a private key. The snoops could get the key by subscribing to the list. -- Best wishes Woolybooger for the day: (3) These rights and freedoms may in no case be exercised contrary to the purposes and principles of the United Nations. -Article 29, Universal Declaration of Human Rights Adopted and proclaimed by General Assembly resolution 217 A (III) of 10 December 1948. A HREF=http://www.ctrl.org/;www.ctrl.org/A DECLARATION DISCLAIMER == CTRL is a discussion informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substancenot soap-boxingplease! These are sordid matters and 'conspiracy theory'with its many half-truths, mis- directions and outright fraudsis used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of [EMAIL PROTECTED]/A http:[EMAIL PROTECTED]/ A HREF=http:[EMAIL PROTECTED]/;ctrl/A To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om
Re: [CTRL] Privacy Not
-Caveat Lector- unfortunately this list is a bit of a playground for retired CIA etc who are trying to make a bit of pocketmoney - so the key wouldn't be safe also - I'm pretty sure the government/NSA has the ability to strip down PGP by now - its the first thing i would ask ET for - computer capacity like that. andrew - Original Message - From: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Tuesday, July 31, 2001 4:50 PM Subject: [CTRL] Privacy Not -Caveat Lector- Perhaps with all the concerns about wiretaps, e-mail snooping and the like, this might be a nice place to encourage the use of PGP encryption. It would be kind of like sticking our e-mails in a lockbox that only we can open. Only thing is... how do we know an informant is not among us. I dunno... Maybe it's not even worth trying. It's not like we're conspiring to overthrow the government or anything. We're just discussing things that the government would probably prefer that we not even know about. Thing is, though, if enough people use PGP, the government would spend so much time straining their computers to crack the codes of e-mails that it might make e-mail snooping something that's not worth doing anymore. Might cause a mess, though... Does the list get a PGP key? Do we all share our keys with each other? Plus we'd have to type in a passphrase for every e-mail. But is it any more inconvenient than opening an envelope? Damaeus A HREF=http://www.ctrl.org/;www.ctrl.org/A DECLARATION DISCLAIMER == CTRL is a discussion informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substance-not soap-boxing-please! These are sordid matters and 'conspiracy theory'-with its many half-truths, mis- directions and outright frauds-is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of [EMAIL PROTECTED]/A http:[EMAIL PROTECTED]/ A HREF=http:[EMAIL PROTECTED]/;ctrl/A To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om A HREF=http://www.ctrl.org/;www.ctrl.org/A DECLARATION DISCLAIMER == CTRL is a discussion informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substancenot soap-boxingplease! These are sordid matters and 'conspiracy theory'with its many half-truths, mis- directions and outright fraudsis used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of [EMAIL PROTECTED]/A http:[EMAIL PROTECTED]/ A HREF=http:[EMAIL PROTECTED]/;ctrl/A To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om
Re: [CTRL] Privacy Not
-Caveat Lector- - Original Message - From: Andrew Hennessey [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Tuesday, July 31, 2001 8:23 PM Subject: Re: [CTRL] Privacy Not -Caveat Lector- unfortunately fnord this fnord list fnord is fnord a fnord bit fnord of fnord a fnord playground fnord for fnord retired fnord CIA fnord etc fnord who fnord are fnord trying fnord to fnord make fnord a fnord bit fnord of fnord pocketmoney fnord - so fnord the fnord key fnord wouldn't fnord be fnord safe also fnord - I'm fnord pretty fnord sure fnord the fnord government/NSA fnord has fnord the fnord ability fnord to fnord strip fnord down fnord PGP fnord by fnord fnord now - its fnord the fnord first fnord thing fnord i fnord would fnord ask fnord ET fnord for fnord - computer fnord capacity fnord like that. A HREF=http://www.ctrl.org/;www.ctrl.org/A DECLARATION DISCLAIMER == CTRL is a discussion informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substancenot soap-boxingplease! These are sordid matters and 'conspiracy theory'with its many half-truths, mis- directions and outright fraudsis used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of [EMAIL PROTECTED]/A http:[EMAIL PROTECTED]/ A HREF=http:[EMAIL PROTECTED]/;ctrl/A To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om
Re: [CTRL] Privacy Not
-Caveat Lector- you came up with an original word - amazing - all you have to do now is get a few more and make a sentence - and before you know it - you may have expressed an original idea in terms of a paragraph - I would watch trying not to repeat the same idea too often though - folks might get the wrong idea :) andrew - Original Message - From: c. [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Tuesday, July 31, 2001 8:46 PM Subject: Re: [CTRL] Privacy Not -Caveat Lector- - Original Message - From: Andrew Hennessey [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Tuesday, July 31, 2001 8:23 PM Subject: Re: [CTRL] Privacy Not -Caveat Lector- unfortunately fnord this fnord list fnord is fnord a fnord bit fnord of fnord a fnord playground fnord for fnord retired fnord CIA fnord etc fnord who fnord are fnord trying fnord to fnord make fnord a fnord bit fnord of fnord pocketmoney fnord - so fnord the fnord key fnord wouldn't fnord be fnord safe also fnord - I'm fnord pretty fnord sure fnord the fnord government/NSA fnord has fnord the fnord ability fnord to fnord strip fnord down fnord PGP fnord by fnord fnord now - its fnord the fnord first fnord thing fnord i fnord would fnord ask fnord ET fnord for fnord - computer fnord capacity fnord like that. A HREF=http://www.ctrl.org/;www.ctrl.org/A DECLARATION DISCLAIMER == CTRL is a discussion informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substance-not soap-boxing-please! These are sordid matters and 'conspiracy theory'-with its many half-truths, mis- directions and outright frauds-is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of [EMAIL PROTECTED]/A http:[EMAIL PROTECTED]/ A HREF=http:[EMAIL PROTECTED]/;ctrl/A To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om A HREF=http://www.ctrl.org/;www.ctrl.org/A DECLARATION DISCLAIMER == CTRL is a discussion informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substancenot soap-boxingplease! These are sordid matters and 'conspiracy theory'with its many half-truths, mis- directions and outright fraudsis used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of [EMAIL PROTECTED]/A http:[EMAIL PROTECTED]/ A HREF=http:[EMAIL PROTECTED]/;ctrl/A To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om
Re: [CTRL] Privacy Not
-Caveat Lector- - Original Message - From: Andrew Hennessey [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Tuesday, July 31, 2001 10:14 PM Subject: Re: [CTRL] Privacy Not -Caveat Lector- you came up with an original word no i didn't. 'twas a simple test to assess your understanding of the subject you speak so authoritively. unsurprisingly, you fail. A HREF=http://www.ctrl.org/;www.ctrl.org/A DECLARATION DISCLAIMER == CTRL is a discussion informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substancenot soap-boxingplease! These are sordid matters and 'conspiracy theory'with its many half-truths, mis- directions and outright fraudsis used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of [EMAIL PROTECTED]/A http:[EMAIL PROTECTED]/ A HREF=http:[EMAIL PROTECTED]/;ctrl/A To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om
[CTRL] Privacy Matters! Read, learn, pass on (fwd)
-Caveat Lector- Weekly Update for 7/26/01 COALITION FOR CONSTITUTIONAL LIBERTIES Volume 5, Number 18 Brought to you by the Center for Technology Policy of the Free Congress Foundation Lisa S. Dean, Director, Center for Technology Policy (mailto:[EMAIL PROTECTED] mailto:[EMAIL PROTECTED] ) J. Bradley Jansen, Deputy Director, Center for Technology Policy (mailto:[EMAIL PROTECTED] mailto:[EMAIL PROTECTED] ) Hannah H. Woody, Coalition Coordinator (mailto:[EMAIL PROTECTED] mailto:[EMAIL PROTECTED] ) phone: (202) 546-3000 fax: (202) 544-2819 http://www.FreeCongress.org http://www.FreeCongress.org THIS WEEK: * INTERNATIONAL DEVELOPMENT OR CORPORATE WELFARE? By J. Bradley Jansen, Deputy Director, Center of Technology Policy, Free Congress Foundation The Free Congress Commentary, From the Endangered Liberties Television Program www.freecongress.org/press/offpress/010723.BJfcc.htm http://www.freecongress.org/press/offpress/010723.BJfcc.htm * DEAN: COLORADO SHOWS CITIZENS PROTECTING THEIR PRIVACY WORKS Press Release, Free Congress Foundation, July 19, 2001 www.freecongress.org/press/releases/010719.htm http://www.freecongress.org/press/releases/010724.htm * JANSEN: OUR CURRENCY SHOULD NOT CARRY TRACKING CHIPS Press Release, Free Congress Foundation, July 23, 2001 www.freecongress.org/press/releases/010724.htm http://www.freecongress.org/press/releases/010724.htm * GOVERNMENT HAS ITS EYE ON YOUR MONEY By Robyn E. Blumner, St. Petersburg Times, July 22, 2001 http://www.sptimes.com/News/072201/Columns/Government_has_its_ey.shtml http://www.sptimes.com/News/072201/Columns/Government_has_its_ey.shtml * CITY COUNCIL DEADLOCKS ON FACE SCANNING By Geoff Dutton, The Tampa Tribune, July 20, 2001 http://tampatrib.com/FloridaMetro/MGAJW6WCDPC.html http://tampatrib.com/FloridaMetro/MGAJW6WCDPC.html * JUSTICE DEPARTMENT GETS A 'PRIVACY CZAR' By Jerry Seper, Washington Times, July 25, 2001 http://asp.washtimes.com/printarticle.asp?action=printArticleID=20010725-23 http://asp.washtimes.com/printarticle.asp?action=printArticleID=20010725-2 3 * HOUSE PLACES REPORTING REQUIREMENT ON CYBERSNOOPING SYSTEM The Office of the House Majority Leader, July 23, 2001 http://www.freedom.gov/library/technology/carnivorereport.asp http://www.freedom.gov/library/technology/carnivorereport.asp * DISTRICT GETS OK ON RED LIGHT CAMERAS By Daniel F. Drummond, THE WASHINGTON TIMES, July 25, 2001 http://washtimes.com/metro/20010725-91340800.htm http://washtimes.com/metro/20010725-91340800.htm * CHASING THE RUNAWAY TAX SLAVES By Paul Craig Roberts, The Washington Times, July 25, 2001 http://www.washtimes.com/commentary/roberts.htm http://www.washtimes.com/commentary/roberts.htm INTERNATIONAL DEVELOPMENT OR CORPORATE WELFARE? By J. Bradley Jansen, Deputy Director, Center of Technology Policy, Free Congress Foundation The Free Congress Commentary, From the Endangered Liberties Television Program www.freecongress.org/press/offpress/010723.BJfcc.htm http://www.freecongress.org/press/offpress/010723.BJfcc.htm President Bush recently proposed some changes at the World Bank. The World Bank and the International Monetary Fund have come under severe criticism. There is a broad consensus among conservatives, libertarians and progressives that the system is broken and needs to be fixed. The Bush administration is filled with Bretton Woods skeptics. Economic advisor Larry Lindsey vocally opposed the latest quota increase for the IMF. Kenneth Dam, the number two man at the Treasury Department behind Secretary Paul O'Neill wrote in a 1998 book with former secretary of State George Shultz, that the bailouts mainly benefited wealthy investors and said that the interventionist policies only makes things worse. They can say to themselves, 'Heads I win, tails you lose,' Dam and Shultz wrote. John Taylor, a former economics professor at Stanford University, is Treasury's undersecretary for international affairs.. He has even advocated abolishing the IMF. He agrees with Dam that bailout actions serve to prop up reckless investing. No one confuses the Bush team as apologists of the left on this issue. However, many on the left are critical of the IMF and the World Bank too. It was the IMF that assembled the high-profile multibillion dollar rescue packages that were meant to rescue foreign creditors even as local banks, finance companies, and corporations were told to bite the bullet by accepting bankruptcy, argues Walden Bello, [Is Bush Bad News for the World Bank?, Focus on the Global South, January 2001]. It was after all mostly young progressives protesting in the streets against the IMF and World Bank. Their anger was mostly fueled by a coalition of progressives that came together in 50 Years is Enough: the Case Against the World Bank and the International Monetary Fund. A less pedestrian criticism came from the Meltzer Commission in February of 2000. It reported that 80 per cent of World Bank resources are devoted not to the poorest developing
[CTRL] Privacy and guilt
-Caveat Lector- It's the classic 'Let's put a spy camera in everyone's bedroom'. What are you doing in there that you're so guilty about, that you object? Anyone who objects is obviously involved in some sort of deviant, illegal behaviour. A HREF=http://www.ctrl.org/;www.ctrl.org/A DECLARATION DISCLAIMER == CTRL is a discussion informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substancenot soap-boxingplease! These are sordid matters and 'conspiracy theory'with its many half-truths, mis- directions and outright fraudsis used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html A HREF=http://peach.ease.lsoft.com/archives/ctrl.html;Archives of [EMAIL PROTECTED]/A http:[EMAIL PROTECTED]/ A HREF=http:[EMAIL PROTECTED]/;ctrl/A To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om
[CTRL] Privacy blitz is coming.you lost.
http://www.msnbc.com/news/554838.asp WASHINGTON, April 4 The privacy war is over you lost. Now its all about survival. In the next few months tens of thousands of businesses will send consumers billions of so-called privacy notices. Disguised as garden-variety junk mail, these notices required by a new law hold the keys to stopping the wholesale flood of your personal information onto the free market. SOME PEOPLE WILL get 20 or more of these privacy notices as required by the newly enacted Gramm-Leech-Bliley Act, according to financial law expert Rick Fischer, who testified before a congressional privacy hearing this week. Fischers written testimony outlined the broad reach of the Act, noting that it mandates that banks, retailers issuing credit cards, money transmitters, check cashers, mortgage brokers, real-estate settlement services, appraisers, tax preparations services and online companies that offer aggregation, funds transfer or payment services send out notices to all their customers to inform them about the types of personal information being collected, how its being used and to whom it will be sold. Your mission, should you actually be able to tell a privacy notice from the weekly dry cleaning discount offer, is to decipher all the legalese printed in really small type and allsquishedtogetherlikethismakingitevenhardertoread. Having completed that task, you then have to follow exacting instructions on how to properly inform the company that you dont want them to sell every scrap of your personal information, which theyve been collecting from you for the last three decades. The key phrase to look for among these piles of paragraphs is opt out. Because unless you proactively opt out or willingly choose to not participate, these companies can sell anything and everything they know about you unless you tell them not to. Financial and medical records, what you buy, where you shop, your genetic code, are all exposed in a privacy free-for all, Frank Torres, legislative counsel for Consumers Union, told a congressional hearing on privacy recently. Complete strangers can, for a price, have access to your most intimate secrets. ITS ALL SPIT IN THE WIND Now, corporate America is wearing this privacy information blitz like a badge of honor. Its representatives have already testified before Congress about the great and detailed steps theyve taken to ensure that consumers get the all the information they are entitled, by law, to have. Corporate America is spitting in our collective face and trying to sell us on the fact that its as fresh as an April rain shower. Failure to pay attention to these privacy notices may result in sensitive financial data being sold to other companies for marketing and other purposes, warns Tena Friery, research director for the Privacy Rights Clearinghouse. But the barrage of paper and the vagueness of the language make it darn near impossible for anyone to easily make sense of what is taking place. The notices may actually be telling consumers we can sell information about your income, debt level, payment history, bankruptcies, hospitalizations and much more unless you tell us we cant, Friery said. The brutal truth about the fallout of the privacy war is that no part of our lives is left untouched by data collection activities. And its not that all data collection efforts are inherently evil some are downright convenient. But convenience is no excuse for the wholesale rape and pillage of personal information by corporate America. There should be a basic right of data ownership in the U.S. and there simply isnt. Privacy laws have been built over a century bit-by-bit, stitched together in a crazy quilt fabric of confusing laws. This means that consumers have lost control over the ability to be left alone, Torres told Congress. Often, consumers have no choice in whether or not information is collected and no choice in how it is used. Today, any information provided by a consumer for one reason, such as getting a loan at a bank, can be used for any other purposes with virtually no restrictions. So you and I are left with having to buck the increasing trend of information collection and dissemination. We have to cover our own butts because no one else will. Trouble is, even when we make the effort, there are few strong privacy laws in our collective quiver. For all the promise of the opt-out provision now codified by Gramm-Leech-Bliley Act, there are enough loopholes in the law put there by industry lobbyists when the bill was being written that the protections are almost useless. Unfortunately these opt-outs, in reality, will do little or nothing to prevent the sharing of your information with others, Torres says. The main reason is: Although you can opt out of having a particular company sell your
[CTRL] privacy links
http://www.silicon.com/bin/bladerunner?30REQEVENT=REQAUTH=2104614001REQSUB=REQINT1=38711 http://www.wired.com/news/politics/0,1283,37718,00.html http://www.businessweek.com/bwdaily/dnflash/july2000/nf00707g.htm http://www.ewatch.com/pop_sleuth.html http://www.thestandard.com/ http://www.sjmercury.com/svtech/news/top/docs/email071800.htm http://www.washingtonpost.com/wp-dyn/articles/A57330-2000Jul17.html http://www.usatoday.com/life/cyber/tech/cti236.htm http://www.silicon.com/bin/bladerunner?30REQEVENT=REQAUTH=2104614001REQSUB=REQINT1=38715 http://www.dfn.org/ *** NOTICE: In accordance with Title 17 U.S.C. Section 107, this material is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. Feel free to distribute widely but PLEASE acknowledge the source. *** http://www.angelfire.com/mi/smilinks/thirdeye.html A HREF="http://www.ctrl.org/"www.ctrl.org/A DECLARATION DISCLAIMER == CTRL is a discussion informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substancenot soap-boxingplease! These are sordid matters and 'conspiracy theory'with its many half-truths, mis- directions and outright fraudsis used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html A HREF="http://peach.ease.lsoft.com/archives/ctrl.html"Archives of [EMAIL PROTECTED]/A http:[EMAIL PROTECTED]/ A HREF="http:[EMAIL PROTECTED]/"ctrl/A To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om
[CTRL] Privacy groups protest FBI email scanner
Privacy groups protest FBI email scanner By The Associated Press Special to CNET News.com July 12, 2000, 5:55 a.m. PT WASHINGTON--Civil liberties and privacy groups railed against a new system designed to allow law enforcement agents to intercept and analyze huge amounts of email in connection with an investigation. The system, dubbed "Carnivore," was first hinted at April 6 in testimony to a House subcommittee. Now the FBI has it in use. Get the "Big Picture" Related News Message Boards When Carnivore is placed with an Internet service provider, it scans all incoming and outgoing emails for messages associated with the target of a criminal probe. In a letter addressed to two members of the House subcommittee that deals with Fourth Amendment search-and-seizure issues, the American Civil Liberties Union (ACLU) argued that the system breaches the ISP's rights and the rights of all its customers by reading both sender and recipient addresses, as well as subject lines of emails, to decide whether to make a copy of the entire message. Further, while the system is plugged into the ISP's systems, it is controlled solely by the law enforcement agency. In a traditional wiretap, the tap is physically placed and maintained by the telephone company. "Carnivore is roughly equivalent to a wiretap capable of accessing the contents of the conversations of all of the phone company's customers, with the 'assurance' that the FBI will record only conversations of the specified target," read the letter. "This 'trust us, we are the government' approach is the antithesis of the procedures required under our wiretapping laws." Barry Steinhardt, associate director of the ACLU, said citizens shouldn't trust that such a sweeping data tap will only be used against criminal suspects. And even then, he said, the data mined by Carnivore, particularly subject lines, is intrusive. "Law enforcement should be prohibited from installing any device that allows them to intercept communications from persons other than the target," Steinhardt said in an interview. "When conducting these kinds of investigations, the information should be restricted to only addressing information." A representative for Rep. Charles T. Canady (R-Fla.), who heads the Constitution subcommittee, said the congressman had no immediate comment on the letter. In testimony to Canady's subcommittee, Robert Corn-Revere, a lawyer at the law firm of Hogan Hartson here, said he represented an ISP that refused to install the Carnivore system. He said the provider was placed in an "awkward position" because the company feared suits from customers unhappy with the government looking into all its email. "It was acknowledged (by the government) that Carnivore would enable remote access to the ISP's network and would be under the exclusive control of government agents," Corn-Revere added. He told the committee that current law is insufficient to deal with Carnivore's potential and that the ISP lost its court battle partly because telephone laws are stretched to cover the Internet. Corn-Revere would not reveal the name of his client, which lost the case. He said the FBI has been using Carnivore since early this year. James X. Dempsey, senior staff counsel at the Center for Democracy and Technology, said the main problem with Carnivore is its mystery. "The FBI is placing a black box inside the computer network of an ISP," Dempsey said. "Not even the ISP knows exactly what that gizmo is doing." But Dempsey said that ISPs contributed to the problem by saying current technology does not allow them to sort out exactly what the government is entitled to get under a search warrant. The carriers complained that they had to give everything to the FBI. "The service providers said they didn't know how to comply with court orders," Dempsey said. "By taking that position, they have hurt themselves, putting themselves into a box." Marcus Thomas, who heads the FBI's Cyber Technology Section, told The Wall Street Journal that the bureau has about 20 Carnivore systems, which are PCs with proprietary software. He said Carnivore meets current wiretapping laws but is designed to keep up with the Internet. "This is just a specialized sniffer," Thomas told the Journal, which first reported details about Carnivore. Encrypted email, done with an email-encoding program such as PGP (Pretty Good Privacy), still stays in code on Carnivore, and it's up to agents to decode it. Dempsey has a possible solution to the problem, though one that's probably unlikely: Show everyone what it does and how it does it, allowing ISPs to install the software themselves. "The FBI should make this gizmo an open-source product," he said. "Then the secret is gone." Copyright © 2000 Associated Press. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed. -- Everything on this earth has a purpose, and every disease an herb to cure it, and every person a
[CTRL] Privacy commissioner reveals government database
from: http://www.canoe.ca/CNEWSTopNews/government_may16.html Click Here: A HREF="http://www.canoe.ca/CNEWSTopNews/government_may16.html"G overnment database tantamount to a citizen pro /A - Privacy commissioner reveals government database By NAHLAH AYED-- The Canadian Press OTTAWA (CP) -- There's a massive government database that tracks the lives of ordinary Canadians -- a Big Brother that wasn't supposed to exist, the federal privacy commissioner revealed Tuesday. Bruce Phillips sounded an alarm bell in his annual report to Parliament, warning Canadians that the Human Resources Department database is "tantamount to a citizen profile" and vulnerable to misuse. The "extraordinarily detailed database" holds a dossier on almost every person in Canada with as many as 2,000 pieces of information about each person's education, marital status, ethnic origin, mobility, disabilities, income tax, employment and social assistance history. Concerns raised by privacy commissioner -- Existence of federal government computer database with as many as 2,000 pieces of information about each Canadian. -- Government should be cautious about releasing confidential data from 1906 and 1911 census records because it could diminish confidence in government promises. -- An updated Privacy Act, which applies to the federal public sector, is needed. The act hasn't been revised for 20 years and is not as rigorous as the new bill that applies to the private sector. -- Commissioner disappointed the government rejected a recommendation from a Commons committee to put in law who may use information from a person's Social Insurance Number and for what purposes. -- Commissioner expressed concern numerous projects to collect, share and use personal health information are proceeding without action on promises to protect the privacy of patients. It's all in a single, permanent database that tracks Canadians from cradle to grave. "Successive privacy commissioners have assured Canadians that there was no single federal government file or profile about them," Phillips said in his report. "We were wrong -- or not right enough for comfort." The information on 33.7 million people, dead and alive, is taken from income tax returns, child tax benefits, immigration and welfare files, the National Training Program, Canadian Job Strategy, employment services, employment insurance, job records and the social insurance master file. The only government department which regularly gathers such comprehensive information -- Statistics Canada -- operates under strict laws with penalties for those who misuse information. There are no similar laws regulating the use of the Human Resources database and that "poses significant risks to our privacy," said Phillips. The database is "always open to misuse or abuse unless there are legislated, legal restraints on its use," he said in an interview. While the Privacy Act allows collecting personal information for research, this database raises concerns because it's so comprehensive. If the information was divided up, there would be "lower risk of indiscriminate collection, unrelated uses and improper disclosures," Phillips said in the report. The department, which has been attacked for months in the Commons for mismanaging grants, says it's not breaking the law and it relies on staff professionalism to prevent misuse of the database, created in 1985 and continually updated. "All the information is secure, it's encrypted," said Human Resources Minister Jane Stewart. The data is used to ensure government programs are working, she said. Phillips is recommending a fixed shelf-life for data, penalties for misuse, strict control on collection and legislative changes to set out the research mandate of the database. Pippa Lawson of the Public Interest Advocacy Centre is worried that personal information could be sold. "History has shown governments can go off the rails," she said in an interview. "There's a huge market out there for personal information, for marketing purposes in particular. We've already seen municipal and provincial governments selling databases." Earlier this year, reports indicated Ontario's Transportation Ministry sold personal information to private companies. A research database could also "be retrieved in unforeseen ways -- by disabilities or ethnic origin, for example -- to the detriment of individual rights," said Phillips, who noted the information is never purged. "Without an end, the temptation is to subject everyone to unrelenting information surveillance. This database needs limits." The database is virtually invisible, although it's on a government database list and the Human Resources Web site. Copyright © 2000, Canoe Limited Partnership. All rights reserved. A HREF="http://www.ctrl.org/"www.ctrl.org/A DECLARATION DISCLAIMER == CTRL is a discussion informational exchange list. Proselytizing propagandic screeds are
Re: [CTRL] Privacy
-Caveat Lector- A HREF="http://www.ctrl.org/" /A -Cui Bono?- Now this may seem paranoid, but all my encrypted email is being held up or diverted by the server or other's. I've been monitoring this and have sent blind cross copies of the entire PGP encrypted messages and its been taking over 24 hours to receive them, if not longer. I'd be interested in hearing if anyone else is having the same type of problem. A HREF="http://www.ctrl.org/"www.ctrl.org/A DECLARATION DISCLAIMER == CTRL is a discussion informational exchange list. Proselytizing propagandic screeds are not allowed. Substancenot soap-boxing! These are sordid matters and 'conspiracy theory'with its many half-truths, misdirections and outright fraudsis used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRL gives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. Archives Available at: http://home.ease.lsoft.com/archives/CTRL.html http:[EMAIL PROTECTED]/ To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om
[CTRL] PRIVACY Forum
-Caveat Lector- From: PRIVACY Forum [EMAIL PROTECTED] To: [EMAIL PROTECTED] Date: Tue, 30 Nov 1999 Subj: PRIVACY Forum Digest V08 #17 PRIVACY Forum Digest - Tuesday, 30 November 1999 - Vol 08, Issue 17 (http://www.vortex.com/privacy/priv.08.17) Moderated by Lauren Weinstein ([EMAIL PROTECTED]) Vortex Technology, Woodland Hills, CA, U.S.A. http://www.vortex.com CONTENTS -- Animated Cursors Silently Collecting User Browsing Data (Lauren Weinstein; PRIVACY Forum Moderator) -- Big Brother Wants Your Medical Records (Dawn Richardson) -- Group formed to oppose supermarket "loyalty" cards (Katherine Albrecht) --- From: [EMAIL PROTECTED] (Lauren Weinstein; PRIVACY Forum Moderator) Date: Tue, 30 Nov 99 12:32 PST Subject: Animated Cursors Silently Collecting User Browsing Data Greetings. The "Spies in Your Software" saga continues onward, as analysis of various software's network activities in various quarters continue to reveal new (but unfortunately not really unexpected) surprises. In the latest chapter, users of the popular Comet Systems' animated cursors (for Microsoft Windows systems) have learned that the cursors (reportedly in use by many millions of persons) have silently been feeding information concerning the sites they visit back to Comet for the firm's analysis and use. Unlike the more common situations where Global Identifiers and related data are passed only to the particular server to which a user connects, in this case the information is being fed back to Comet itself, whenever the user visits any of the many 10's of 1000's of affiliated sites. The vast array of sites involved include many oriented towards children, as well as popular comic-strip sites (such as "Dilbert" and others). I spoke at length today with Comet's marketing director, who defended their practices. He contends that the information collected is "anonymous" since they do not collect names, e-mail addresses, or other personally-identifiable information, and that the information they do collect is maintained only in aggregate form for their paying clients, and is purged of other data before distribution to those clients. He stated that he feels concerns about *possible* abuse of collected data in the future (say, after an acquisition, or other policy change) are purely theoretical and are not realistic. One of my main concerns is that it would not seem obvious to most users that an animated cursor should or would be sending *any* information back to a central point. His reaction to my suggestion that the software clearly inform users that there would be information flowing back to Comet was fascinating. He expressed the opinion that there was no need for this since the information was "anonymous"--and that since most people just "click through" license agreements anyway without reading them, there wasn't any point to bothering people with lots of stuff to read through before installation. He also suggested that forcing vendors or sites to provide such information on a routine basis would create a "police state" (his exact words) environment. He did however agree that the lack of regulation creates a situation where each company has to make these determinations on their own, and admitted that it would be a lot easier if it were clearly spelled out what they could or couldn't do. In response to the current furor, Comet has posted a new privacy policy, with links that appear on the main download pages for the cursors and at other points. However, they have chosen not to provide information on those pages to clue people in to the fact that there is anything about the cursors which might relate specifically to privacy concerns, so how many people will choose to read the privacy links is unclear. Also, depending on Javascript and browser security settings (*particularly* of concern with Microsoft Internet Explorer), it is possible that the cursors might be downloaded automatically without the user ever seeing the privacy link information. Comet has also posted instructions regarding removal of the cursors from your system. The main information is at: http://www.cometsystems.com/download/cleaner.shtml Microsoft IE users would need to take some additional steps detailed at: http://download.cometsystems.com/no_nag/nonag.asp to avoid having sites continue to bug them about downloading the cursors. Unfortunately and ironically, you apparently must have cookies enabled to activate this latter function, so you may want to think twice before using it. The saga continues... --Lauren-- [EMAIL PROTECTED] Lauren Weinstein Moderator, PRIVACY Forum - http://www.vortex.com Co-Founder, PFIR: People for Internet Responsibility - http://www.pfir.org Member, ACM
[CTRL] Privacy advocates warn about Internet proposal
-Caveat Lector- Privacy advocates warn about Internet proposal Serial number of each PC would go with every parcel of data By Ted Bridis ASSOCIATED PRESS October 12, 1999 WASHINGTON -- Engineers designing a new way to send information across the Internet want to include a unique serial number from each personal computer within every parcel of data, an idea that privacy advocates fear could lead to tracing of senders' identities. Critics warn that, if adopted, the move could strip away a measure of anonymity and security enjoyed by tens of millions of home computer users who dial into America Online Inc. and other Internet providers over traditional telephone lines. The issue also illustrates the danger of the unintended consequences from arcane design decisions aimed at ensuring the Internet's stability into the 21st century. The proposal by the Internet Engineering Task Force, an international standards body, would include the serial number for each computer's network connection hardware as part of its expanded new Internet protocol address. These "IP" addresses, planted within e-mails and all other information flowing across the Internet, must be unique to distinguish each computer on the global network and to guide the billions of bits and bytes flowing among them. The task force's top engineers acknowledge some implications for online privacy, but, "I think the privacy concerns are overrated," said Fred Baker, the task force's chairman. But some privacy experts said they were appalled that engineers would consider the idea. The new address proposal, called "IPv6," would not become widely used for years but ultimately would affect every Internet user. Critics warned that commercial Internet sites, which already routinely record IP addresses, could begin to correlate these embedded serial numbers against a consumer's name, address and other personal details, from clothing size to political affiliation. The task force itself will ultimately decide whether to include the identifying numbers in the new IP addresses. The timing on that decision is unclear. Baker said the task force is also envisioning ways to configure Internet devices manually so addresses won't contain the sensitive numbers. "Those folks concerned about the privacy issue could use this (alternate) technique," said Thomas Narten, an IBM software engineer working with the task force. Most home computer users are assigned a different IP address each time they connect to the Internet through a telephone line, which affords some extra security and anonymity. It's akin to a person using a different phone number every day to shield his identity and avoid prank phone calls. But under the task force's proposal, a portion of even those somewhat randomly assigned addresses could include the consumer's unique serial number -- and that information would be stamped on every piece of information sent from his computer. "I'm just winding the tape forward here five years, when we all say, 'Oh, my God!' " said Richard L. Smith of Brookline, Mass., a security expert who was among the first to question the plan. The danger worsens, critics warn, as Internet sites begin to share information about their customers: A consumer visiting a Web site for the first time could be identified by his computer's serial number that had been recorded at another site. Copyright 1999 Union-Tribune Publishing Co. DECLARATION DISCLAIMER == CTRL is a discussion and informational exchange list. Proselyzting propagandic screeds are not allowed. Substancenot soapboxing! These are sordid matters and 'conspiracy theory', with its many half-truths, misdirections and outright frauds is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRL gives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credeence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. Archives Available at: http://home.ease.lsoft.com/archives/CTRL.html http:[EMAIL PROTECTED]/ To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om
[CTRL] Privacy Flaky - Stop Tests
-Caveat Lector- http://news.excite.com/news/r/990924/15/news-health-research Colorado Medical Research Center Told To Halt Tests Updated 3:13 PM ET September 24, 1999 DENVER (Reuters) - The government, concerned about how records and data are kept, has ordered Colorado's top medical research university to stop its federally funded clinical tests, putting a halt to thousands of studies on everything from weight loss to diabetes prevention, university officials said Friday. The University of Colorado Health Sciences Center, one of the largest medical research recipients in the United States, said audits by the U.S. Food and Drug Administration found problems in bookkeeping, reporting and database practices that did not meet federal standards. It said the issues were not related to patient safety. The health sciences center receives about $100 million a year in research funding and has about 3,200 ongoing research studies. The university said changes were implemented after an audit, but not to the FDA's satisfaction. "The university is cooperating fully in resolving these concerns," said James Shore, chancellor of the University of Colorado Health Sciences Center. The university said the FDA placed the restrictions on the activities of the Colorado Multiple Institutional Review Board, which is responsible for reviewing and approving protocols and maintaining detailed records. On Sept. 21 the FDA ordered the health sciences center to suspend enrollment of new patients into research using drugs or devices regulated by the FDA. The next day the restrictions were broadened to not enrolling new patients into studies funded by the federal government. Thursday the federal government's Office of Protection from Research Risk (OPRR) suggested suspending all studies until the matter is cleared up. The research group then decided to halt all clinical studies, even ones funded by pharmaceutical companies. DECLARATION DISCLAIMER == CTRL is a discussion and informational exchange list. Proselyzting propagandic screeds are not allowed. Substancenot soapboxing! These are sordid matters and 'conspiracy theory', with its many half-truths, misdirections and outright frauds is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRL gives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credeence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. Archives Available at: http://home.ease.lsoft.com/archives/CTRL.html http:[EMAIL PROTECTED]/ To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om
[CTRL] Privacy is Not Doomed
-Caveat Lector- http://www.techreview.com/articles/oct99/dertouzos.htm Michael Dertouzos * The People's Computer Privacy is Not Doomed I almost fell out of my chair when the politicians asked the technologists to solve the privacy issue! The china at the electronic-spy agency's dining room was exquisite, as was the meal. Ron Rivest, inventor of the RSA approach to public cryptography, and I were having lunch with the National Security Agency's director, Bobby Inman. We were trying to impress on him that the forthcoming growth of the Information Marketplace would create severe privacy problems and the agency should extend the role of cryptography from ensuring secure communications within the U.S. government (and breakable ones outside it) to protecting the privacy of U.S. citizens and organizations, with approaches like RSA. The admiral didn't believe us-our claims of a widely interconnected civilian world in the '90s sounded like pie in the sky. Twenty-five years later, in April 1999, at the other extreme, The Economist proclaimed on its cover "The End of Privacy." Under-reaction then! Over-reaction now! No doubt, the technologies of information can be used to attack our privacy. But they can also be used to protect it. For example, if we agreed that everyone using the Internet did so under the RSA regime of creating and using their own public and private keys, we would end up with secure communications and files and the ability to digitally sign contracts and checks as effectively as we do now by hand. This high level of personal privacy would, however, preclude governments from legally tapping a suspect's private data and would also prevent anonymity-thereby angering Right and Left simultaneously. If we don't like this outcome, we have technologies on hand to establish nearly any desired blend of personal privacy, anonymity and governmental intervention. Such cryptographic approaches would not stop companies with which you do business from selling personal data you give them, corrupting it, or tracking Web sites you frequent. Not to worry. There is technology around to handle these problems, as well: A scheme called P3P, developed by the World Wide Web Consortium, places software within your browser and in the Web sites of vendors. In a P3P personal profile, which you write once, you specify the personal information you are willing to give away along with what others are allowed to do with it. A similar script in the vendor's software identifies the personal information the vendor requires and its planned disposition. These two pieces of software "shake hands" prior to every business transaction and allow it to proceed only if both privacy declarations are satisfied. In a variation of this scheme, governments can introduce absolute privacy policies, by requiring, for example, a minimal level of privacy in the P3P profile of every citizen. These examples accurately suggest that we have enough technology around to provide nearly any level of privacy we want. But what do we want? In the United States, consumers have become accustomed to treating privacy as a tradable commodity-we don't mind giving some of it away to get the goods and services we desire. Vendors are pushing for this approach because they are moving away from mass marketing to one-on-one selling, and are therefore anxious to build intimate knowledge of individual interests and habits. To most non-Americans, however, privacy is not a tradable commodity but an inalienable right that must be guaranteed and protected, especially in the case of minors. The European Union, flexing its muscle, recently threatened to forbid its citizenry from doing electronic commerce with organizations (read U.S.) that do not meet a minimal threshold of absolute privacy guarantees. They have since backed down and gone to committee, as they and their American partners search for common ground. Last February at the World Economic Forum in Davos, Switzerland, a few industrialists tried to establish a voluntary code under which vendors would give you, upon request, all personal information they have on you, explain what they plan to do with it, and correct it if asked. Adoption of this code seemed a small and achievable step, but it failed to pass. The American vendors saw it as an expensive and difficult proposition to implement, and a potential leak of their marketing approaches to adversaries. Clearly, we disagree about the kind of privacy we want. And we don't seem serious enough about reaching agreement-at that same meeting in Davos, I almost fell out of my chair when several world leaders asked the technologists present to "go figure out a solution to the privacy problems you brought upon us!" This abrogation of what should be a central responsibility of politicians and legislators must stop. Let's not surrender our privacy to the big lie of technological inevitability. Let us, instead, augment the debates of privacy specialists, with a far broader discussion
[CTRL] Privacy?
-Caveat Lector- Here Comes The Beast! Clinton OKs massive attack on privacy (Source: New York, NYT-07-27-99 2104EDT) No. 128, 2 - 8 August 1999 If you thought "Know your customer" was dead, wait until you read the following article. The Federal Government, with William Jefferson Blythe "I Did Not Have Sex With THAT Woman!" Clinton wants to access your bank accounts, corporate networks, and gather information that it has no business knowing. And all in the interests of "national security." The plan was created in response to a presidential directive in May 1998 requiring the executive branch to review the vulnerabilities of the federal government's computer systems in order to become a "model of information and security.'' In a cover letter to the draft plan Clinton writes, "A concerted attack on the computers of any one of our key economic sectors or governmental agencies could have catastrophic effects.'' But the plan strikes at the heart of a growing controversy over how to protect the nation's computer systems while also protecting civil liberties particularly since it would put a new and powerful tool into the hands of the FBI. Increasingly, data flowing over the Internet is becoming a vital tool for law enforcement, and civil liberties experts said law enforcement agencies would be under great temptation to expand the use of the information in pursuit of suspected criminals. "The report clearly recognizes the civil liberties implications,'' said James X. Dempsey, staff counsel for the Center for Democracy and Technology, a Washington civil liberties group, "But it brushes them away.'' (Read that: ignores civil liberties) The draft plan states: "As access to relevant networks is premised on 'consent' of the user to allow session monitoring, the collection of certain data identified as anomalous activity or a suspicious event would not be considered a privacy issue.'' Dempsey conceded the legal validity of the point, but said there was tremendous potential for abuse. "My main concern is that Fidnet is an ill-defined monitoring system of potentially broad sweep,'' he said. "It seems to place monitoring and surveillance at the center of the government's response to a problem that is not well suited to such measures.'' The federal government is making a concerted effort to insure that civil liberties and privacy rights are not violated by the plan, Hunker said. He said that data gathered from non-government computer networks will be collected separately from the FBI-controlled monitoring system at a separate location within a General Services Administration building. He said that was done to keep non-government data at arm's length from law enforcement. The plan also has drawn concern from civil libertarians because it blends civilian and military functions in protecting the nation's computer networks. The report notes that there is already a Department of Defense "contingent'' working at the FBI's infrastructure protection center to integrate intelligence, counterintelligence and law enforcement efforts in protecting Pentagon computers. "The fight over this could make the fight over encryption look like nothing,'' said Mary Culnan, an professor at Georgetown University who served on a presidential commission whose work led to the May 1998 directive on infrastructure protection. "The conceptual problem is that there are people running this program who don't understand how citizens feel about privacy in cyberspace.'' The government has been discussing the proposal widely with a number of industry security committees and associations in recent months. Several industry executives said there is still reluctance on the part of industry to directly share information on computer intrusions with law enforcement. "They want to control the decision-making process,'' said Mark Rasch, vice president and general counsel of Global Integrity, a company in Reston, Va., that coordinates computer security for the financial services industries. One potential problem in carrying out the government's plan is that intrusion-detection software technology is still immature, industry executives said. "The commercial intrusion detection systems are not ready for prime time,'' said Peter Neumann, a computer scientist at SRI International in Menlo Park, Calif., and a pioneer in the field of intrusion detection systems. Current systems tend to generate false alarms and thus require many skilled operators. But a significant portion of the $1.4 billion the Clinton administration has requested for computer security for fiscal year 2000 is intended to be spent on research, and government officials said they were hopeful that the planned effort would be able to rely on automated detection technologies and on artificial intelligence capabilities. For several years computer security specialists have used software variously known as
[CTRL] PRIVACY IN THE INFORMATION AGE
-Caveat Lector- PRIVACY IN THE INFORMATION AGE The right of privacy has been a major distinction between democracies and dictatorships. But those who hold privacy in high regard have seen their rights slowly eroded for decades -- and now the process could swiftly accelerate in the era of high tech. o A single company -- Acxiom Corp. in Conway, Ark. -- has a database combining public and consumer information that covers 95 percent of American households. o A 1997 survey of 900 large companies by the American Management Association found that nearly two-thirds admitted to some form of electronic surveillance of their employees. o Intelligence agencies from America, Canada, Britain, Australia and New Zealand jointly monitor all international satellite-telecommunications traffic via a system called "Echelon" which can pick specific words or phrases from hundreds of thousands of messages. o Tiny microphones can record whispered conversations across the street or monitor them via the normally imperceptible vibrations of window glass. Among the dangers lurks the occasional benefit. In a few years' time, supermarkets could check the contents of customers' refrigerators -- compiling a shopping list as they run out of edibles. Is privacy a thing of the past? Legal experts reply that while privacy statutes exist in the U.S. and other countries, courts have found it almost impossible to pin down a precise legal definition of it and privacy lawsuits hardly ever succeed. The answer may be to rely on market solutions. Already some companies are developing devices to thwart snoops -- such as firms that forward e-mail stripped of any identifying information. Source: "The Surveillance Society," Economist, May 1, 1999. For more on Business Issues http://www.ncpa.org/pd/law/mcc/index4a.html DECLARATION DISCLAIMER == CTRL is a discussion and informational exchange list. Proselyzting propagandic screeds are not allowed. Substancenot soapboxing! These are sordid matters and 'conspiracy theory', with its many half-truths, misdirections and outright frauds is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRL gives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credeence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. Archives Available at: http://home.ease.lsoft.com/archives/CTRL.html http:[EMAIL PROTECTED]/ To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om
[CTRL] Privacy Hack on Pentium III
-Caveat Lector- Privacy Hack on Pentium III by Leander Kahney A German computer magazine claims to have found a way to hack the controversial serial number in the forthcoming Pentium III chip. Computer Technology, or c't, says that contrary to Intel's claims, the identifying Processor serial number in the Pentium III can be secretly turned on and off without the user's knowledge by a small software program. Intel included the number in the chip to provide a secure identifier for e-commerce and help system administrators keep track of large networks. Read the whole story at: http://www.wired.com/news/news/technology/story/18078.html DECLARATION DISCLAIMER == CTRL is a discussion and informational exchange list. Proselyzting propagandic screeds are not allowed. Substancenot soapboxing! These are sordid matters and 'conspiracy theory', with its many half-truths, misdirections and outright frauds is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRL gives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credeence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. Archives Available at: http://home.ease.lsoft.com/archives/CTRL.html http:[EMAIL PROTECTED]/ To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om