What intrigues about Tim's message was the implication that the war on terrorism, by
all sides, is fundamentally about racism, although camouflaged by political and
economic drapery. As was, and is, imperialism and its bastard clone, capitalism.
Demonizing the enemy, whether by skin color, by
Response and addition to:
http://cryptome.org/war-reason.htm
From: V
To: [EMAIL PROTECTED]
Date: Sat, 15 Feb 2003 14:01:47 -0500
Subject: Racism is Not Fashionable
Tim May writes..
A war that, Allah willing, causes Washington, D.C. to be be hit with a
suitcase nuke, cleansing it of a
I'm currently working with Rafael Vinoly's firm, though not on the WTC project,
instead a giant medical research campus outside DC for the Howard Hughes Medical
Institute, a cool $500 million semi-underground facility described at hhmi.org.
Vinoly's on a roll, just having won a competition for
I'm currently working with Rafael Vinoly's firm, though not on the WTC project,
instead a giant medical research campus outside DC for the Howard Hughes Medical
Institute, a cool $500 million semi-underground facility described at hhmi.org.
Vinoly's on a roll, just having won a competition for
It's common for those accomplished in one field to believe that ability is confidently
transferrable to another, in particular for social, political and religious matters --
and vice versa.
Endeavors which require close, sustained concentration and logical methodologies
seldom help with
Based on Larry Augustin's apology for cops and his avowed closeness to them, a protest
is even more deserved against him if not the other participants.
Larry appears to be quoting from the COPS PR manual for garnering public support to
offset deserved criticism of official misbehavior.
Larry
Based on Larry Augustin's apology for cops and his avowed closeness to them, a protest
is even more deserved against him if not the other participants.
Larry appears to be quoting from the COPS PR manual for garnering public support to
offset deserved criticism of official misbehavior.
Larry
Schemes for vengeance that promise safety for the avenger won't cut it, for
those are the coward's way and can be countered by upping the promise to
hurt the coward, which knocks out the will to act beyond bravado.
It's true that most of the world's leaders, and petty aspirants to power,
exhort
Schemes for vengeance that promise safety for the avenger won't cut it, for
those are the coward's way and can be countered by upping the promise to
hurt the coward, which knocks out the will to act beyond bravado.
It's true that most of the world's leaders, and petty aspirants to power,
exhort
Lne has blocked all my messages for about a month, though that is
a small number. A spam rejection is returned.
We were at the DC march. It took two hours to pass a point, and we left
before the end had appeared, in fact couldn't see the end. The Wash Post
reported
over 100,000 participated, largest since Vietnam.
We videoed and photoed the demo, but tape and chip were confiscated Sunday
by the guards at
We were at the DC march. It took two hours to pass a point, and we left
before the end had appeared, in fact couldn't see the end. The Wash Post
reported
over 100,000 participated, largest since Vietnam.
We videoed and photoed the demo, but tape and chip were confiscated Sunday
by the guards at
http://cryptome.org/intel-anon.htm
[Excerpt. There are 15 images in the patent.]
Anonymity Server, May 14, 2002
Description
BACKGROUND
1. Field
The present invention relates to the field of communications.
More particularly, the present invention relates to a system and
method for
Cryptome offers 2 court orders and 22 formerly sealed documents
in the case of Abdallah Higazy, an Egyptian national in the US to
attend school, who was detained as a material witness based
on a false accusation by a hotel guard of possessing an air-to-ground
communcation device while staying
Cryptome offers 2 court orders and 22 formerly sealed documents
in the case of Abdallah Higazy, an Egyptian national in the US to
attend school, who was detained as a material witness based
on a false accusation by a hotel guard of possessing an air-to-ground
communcation device while staying
In the September Atlantic Monthly Bruce Schneier explains
yet again why cryptography is not the solution to security;
what's needed are private cyber cops like his:
http://www.theatlantic.com/issues/2002/09/mann.htm
Amazing how Bruce's philosopy matches that of those
he once combated in the
Bear in mind that Declan has always favored the copyright industry,
after all that fits his ambition to be a star in that field, not that he
is alone in seeking media celebrity by seducing others with the
allure of attention and fame. He drops way too many names
not to come across as an
Digicash 1999 IRS forms:
http://cryptome.org/digicash-481k.htm
Yes, Steve, the 1099 describes payments made to others, or is
supposed to, but 1099s are shifty and don't always conform to reality.
So if you believe the 1099, Digicash either made at least $481K
or got it somehow or just made up the number in a venture to
fleece a lender or flummox a Chaum
Bear in mind that Declan has always favored the copyright industry,
after all that fits his ambition to be a star in that field, not that he
is alone in seeking media celebrity by seducing others with the
allure of attention and fame. He drops way too many names
not to come across as an
Well, it's probably safer to publish the hack anonymously
and see if it withstands counter-hacking. Could be Microsoft
is baiting and waiting for just such attacks. The giant might
even leak and spread a few itself in order to shoot them down,
to boost its eye-mote credibility.
Send the hack to
From the United States Department of Defense
No. 136-P
PRESS ADVISORY July 24, 2002
The DoD Chief Information Officer John Stenbit will conduct
a demonstration of the DoD's use of its public key infrastructure
(PKI) to mark issuance of the millionth PKI certificate set,
Friday, July 26, at
From the United States Department of Defense
No. 136-P
PRESS ADVISORY July 24, 2002
The DoD Chief Information Officer John Stenbit will conduct
a demonstration of the DoD's use of its public key infrastructure
(PKI) to mark issuance of the millionth PKI certificate set,
Friday, July 26, at
John Gilmore initiated a federal suit today in CA Northern District
against Ashcroft, et al, challenging the air travel ID requirement:
http://cryptome.org/freetotravel.htm
Yes, now two of the named defendants in Gilmore's suit
are on their way out of office: head of FAA and now TSA.
Not bad results for the first 12 hours.
John Gilmore initiated a federal suit today in CA Northern District
against Ashcroft, et al, challenging the air travel ID requirement:
http://cryptome.org/freetotravel.htm
Bear in mind that the holders of US debts do not want the debts
paid, only the interest, and in fact want both to increase as they
have consistently since the US government went into hock.
A prime reason holders of US debt fear other countries defaulting
on their debt is that that might become a
Ross said MSNBC had pulled the Palladium story, not Newsweek.
Other Levy stories remain available on MSNBC. A search on
MSNBC for Palladium produces Steven Levy's chat about
Palladium:
http://www.msnbc.com/m/nw/talk/archive.asp?lt=062502_levy
Still, it may policy for MSNBC to pull Newsweek
Cryptome offers Microsoft's second patent on digital rights management,
invented by the same three persons as the first, Paul England,
John DeTreville and Butler Lampson:
http://cryptome.org/ms-drm-os2.htm
This second patent was issued on December 7, 2001, a week before the
first available
We failed to save a copy of Steven Levy's Palladium article in Newsweek
and online at MSNBC, now withdrawn by MSNBC. We can find no copy
online. Whoever save a copy: we would like to receive it for publication to
assure its continued availability.
A Microsoft programmer, John DeTreville,
Bob Open Mike Hettinga kariokaed:
I try not to post news to cypherpunks. :-). I post *lots* of news to the
dbs list, of course...
To prevent spamming DCSB is subscriber only, as are all my own lists.
Rolling in the phsst-shot EVA, shitting my spacesuit, wailing for yo
momma's impaired irony:
Bob Open Mike Hettinga kariokaed:
I try not to post news to cypherpunks. :-). I post *lots* of news to the
dbs list, of course...
To prevent spamming DCSB is subscriber only, as are all my own lists.
Rolling in the phsst-shot EVA, shitting my spacesuit, wailing for yo
momma's impaired irony:
I appreciate what an honorable ISP admin will do to abide customer
rights over intrusive snoopers and perhaps cooperative administrators
above the pay grade of a sysadmin. Know that a decent sysadmin is on
for about 1/3 of a weekday for 24x7 systems is a small comfort but
leaves unanswered what
I appreciate what an honorable ISP admin will do to abide customer
rights over intrusive snoopers and perhaps cooperative administrators
above the pay grade of a sysadmin. Know that a decent sysadmin is on
for about 1/3 of a weekday for 24x7 systems is a small comfort but
leaves unanswered what
Ross has shifted his TCPA paper to:
http://www.ftp.cl.cam.ac.uk/ftp/users/rja14/toulouse.pdf
At 07:03 PM 6/22/2002 -0700, Lucky wrote:
I recently had a chance to read Ross Anderson's paper on the activities
of the TCPA at http://www.cl.cam.ac.uk/ftp/users/rja14/.temp/toulouse.pdf
Data retention is being done now by programs and services
which cache data to ease loading on servers and networks.
No approval needed from anybody, indeed, the service is
being offered as a cost saver and expeditor of net services
to ISPs and anybody else who might be eager to get around
Data retention is being done now by programs and services
which cache data to ease loading on servers and networks.
No approval needed from anybody, indeed, the service is
being offered as a cost saver and expeditor of net services
to ISPs and anybody else who might be eager to get around
A follow up on the LEO hit of Cryptome on 4 June 2002 referred
from
http://home.leo.gov/rollcall/internet_tips/2002/tip_060302.htm
Here's the LEO website:
http://www.fbi.gov/hq/cjisd/leo.htm
Activities described on this site appear to contradict recent
congressional testimony by the FBI
A follow up on the LEO hit of Cryptome on 4 June 2002 referred
from
http://home.leo.gov/rollcall/internet_tips/2002/tip_060302.htm
Here's the LEO website:
http://www.fbi.gov/hq/cjisd/leo.htm
Activities described on this site appear to contradict recent
congressional testimony by the FBI
This hit to Cryptome today must be the rapid response to Ashcroft's
openly sicking the FBI on the net:
http://home.leo.gov/rollcall/internet_tips/2002/tip_060302.htm
Leo.gov is an FBI domain, though its use is not limited to that
agency.
Our posting aerial views of nuclear submarine bases
True, the home.leo.gov referrer could be a spoof, indeed, reads
more like a spoof than the real thing which used to be partially
camouflaged, except so did Bush, Ashcroft and company
before 9/11, well, before the Florida and Supreme Court
assault on the assaulting enemies of the state.
Now
This hit to Cryptome today must be the rapid response to Ashcroft's
openly sicking the FBI on the net:
http://home.leo.gov/rollcall/internet_tips/2002/tip_060302.htm
Leo.gov is an FBI domain, though its use is not limited to that
agency.
Our posting aerial views of nuclear submarine bases
Thomas Friedman in the New York Times today:
http://www.nytimes.com/2002/05/26/opinion/26FRIE.html
Webbed, Wired and Worried, May 26, 2002
I've been wondering how the entrepreneurs of Silicon Valley
were looking at the 9/11 tragedy; whether it was giving them
any pause about the wired world
Officials, and journalists, accustomed to handling civil unrest
through police means, have to stretch to get their hands on
national security threats, in particular what to do with military
capabilities which are scaled for much greater threats than
the police can handle.
The military doesn't
Thomas Friedman in the New York Times today:
http://www.nytimes.com/2002/05/26/opinion/26FRIE.html
Webbed, Wired and Worried, May 26, 2002
I've been wondering how the entrepreneurs of Silicon Valley
were looking at the 9/11 tragedy; whether it was giving them
any pause about the wired world
Officials, and journalists, accustomed to handling civil unrest
through police means, have to stretch to get their hands on
national security threats, in particular what to do with military
capabilities which are scaled for much greater threats than
the police can handle.
The military doesn't
Analysis of Neural Cryptography
Alexander Klimov, Anton Mityaguine, and Adi Shamir
Computer Science Department
The Weizmann Institute, Rehovot 76100, Israel
{ask,mityagin,shamir}@wisdom.weizmann.ac.il
Abstract. In this paper we analyse the security of a new key exchange
protocol proposed in
Jim pukes:
Because I can.
More slashdot is coming
The shit you post is less than spam which has minimal
content and is anonymous or forged and took slim
intelligence to prepare and lob. You send your stinky
asswipe, in your own shitty name, as if having wiped
your asshole with an article means
Lucky is to be commended for igniting a neglected aspect
of the crypto wars: what happens to cryptosystems over
time after they have been invented, tested, criticized, vetted
and conditionally trusted, then gradually widely distributed
as the best available under practical usage, then
Lucky is to be commended for igniting a neglected aspect
of the crypto wars: what happens to cryptosystems over
time after they have been invented, tested, criticized, vetted
and conditionally trusted, then gradually widely distributed
as the best available under practical usage, then
http://www.techtv.com/cybercrime/features/story/0,23008,3381901,00.html
A Most Deadly Game
CyberCrime' investigates a website that calls for contract killings of
public officials. Is it an exercise in free speech or a manifesto for
murder? Find out more,
http://www.techtv.com/cybercrime/features/story/0,23008,3381901,00.html
A Most Deadly Game
CyberCrime' investigates a website that calls for contract killings of
public officials. Is it an exercise in free speech or a manifesto for
murder? Find out more,
Marc de Piolenc wrote:
Ultra originated in Poland, not Britain. The wartime decryption work was
of course carried out in Britain, but without the prewar seed work of
the Poles it would probably have been futile.
And not only Ultra is rightfully based on the Poles' original work,
but the
What is peculiar about the rejoinders to Lucky's sensible proposal
is the dismissal of it with elaborate affirmations of mathematical
surety, as if there has not been voluminous warnings to never
rely on mathematical surety when weaknesses are far more
likely to be found in the faulty
Morlock wrote:
So do not easily dismiss possibility that someone may not care about
implementation vulnerabilities at all, as long as cyphertext is available.
Agreed that there may well be ways to access cyphertext that
does not attack its crypto-mathematical shield, which could
indeed be
What is peculiar about the rejoinders to Lucky's sensible proposal
is the dismissal of it with elaborate affirmations of mathematical
surety, as if there has not been voluminous warnings to never
rely on mathematical surety when weaknesses are far more
likely to be found in the faulty
Frederick Kagan spoke at the Princeton Club, New York City,
Tuesday evening, April 9, 2002.
http://www.princetonclub.com
American Heritage Lecture Series -- Special Guest
Frederick W. Kagan
After September 11: Terrorism and the Enduring Bases of
American Defense Strategy
Details:
Join us
The Dartmouth site is related to a broader federal PKI Technical
Working Group which is developing PKI standards and protocols.
See:
http://csrc.nist.gov/pki/twg/welcome.html
Below are two recent messages from the PKI-TWG mail list
on some of the work being done.
Subscribe to the PKI-TWG
Frederick Kagan, a historian at the US Military Academy,
argued in a talk recently that the US needs to:
More than double its defense expenditures;
Ignore the Europeans and other allies due to their military
ineffectuality and insufficient defense budgets;
Prepare for long-term US military
Frederick Kagan spoke at the Princeton Club, New York City,
Tuesday evening, April 9, 2002.
http://www.princetonclub.com
American Heritage Lecture Series -- Special Guest
Frederick W. Kagan
After September 11: Terrorism and the Enduring Bases of
American Defense Strategy
Details:
Join us
Optimizzin wrote:
The only use for instant kill weapon in warfare would be for an
officer to shoot mutineers.
Or vice-versa.
I was advised to use a fragmentation grenade to off an officer,
slid under the tent flap, or lobbed from the dark. An officer
can kill a mutineer with impunity, whether
Disinfo is a complicated topic, and it's not easy to know
for sure when it is occurring; if it was easy to tell then
it wouldn't be very effective disinfo.
For all its admirable reputation RAND continues to
be a forum for disinformation of high quality. This
follows from its classified work and
Optimizzin wrote:
The only use for instant kill weapon in warfare would be for an
officer to shoot mutineers.
Or vice-versa.
I was advised to use a fragmentation grenade to off an officer,
slid under the tent flap, or lobbed from the dark. An officer
can kill a mutineer with impunity, whether
We offer about 70 pages of USA court filings in the
summons of Visa offshore card accounts:
http://cryptome.org/usa-visa-does.htm
Declarations in support of the summons provide an
overview of what the US and allies believe to be a major
threat to tax collection by use offshore bank accounts
J. Eric wrote:
Here's an idea -- why not use whatever you use to filter things into
your cypherpunks mailbox to first filter out anything from people you
don't want to read instead of whining to everyone on the list about
how much they send that you don't want to read?
This appears sound at
PGP, or Pretty Good Privacy, is available free online for personal use, a
major reason the company saw little future in trying to make a business of
selling the software for corporate use, said spokeswoman Jennifer Keavney.
It is the leading encryption technology out there, but it's all based
The notion that access to source code for PGP Freeware
assures there's no nasties in it needs to be put to rest.
Now that that rationale is well-established as a ploy to
divert attention from implementation weaknesses.
And, to be sure, that those implementation weakness are
well-established as
Spectacular snuff on CBS this Sunday, showing the impact
and explosion of the first WTC missile. Body fragments show
up blue on spectragrams of the scene.
If you look carefully in the blocks surrounding WTC you can
find body bits: while most of those on the streets have been
consumed by rats, on
If the nuke is placed at the NY Stock Exchange most New
Yorkers would not be affected by the blast due to the unusually
dense architecture surrounding the exchange -- much denser
than now allowed by zoning and building codes. And many of
the older buildings are substantially built of heavy
The closer Congress gets to investigating the failure of
all levels of government -- and its army of national security
and counterterrorism consultants -- to prevent 9/11 the more
we see alarms being rung about terrible threats kept quiet
and imminent threats of disasters sure to come
None of
Here's a handy guide to protecting yourself when the
government heads for, rather remains hidden in, its bunkers:
http://cryptomeorg/dont-panichtm
Covers simple measures to take in nuclear, biological
and chemical attacks Written by a USMC gunnery
sergeant who trained troops in NBC
Michael Dell's statement is a more grievous attack
on civil liberties than the original it tries to apologize
for
It is inappropriate for a company to engage in the
range of considerations for domestic, non-export
use of a product Dell outlines unless the company
has made those considerations
Dell's admission of vetting customer use of its
products on behalf of domestic and national security,
raises the issue of who else is doing that
About ten days ago I got a telephone message from
a person who claims to work for a major ISP as a sysadmin
This person had previously disclosed the
According to the report below, the WSJ hired its own
computer consultant to examine the Al Qaeda laptop.
But there is no mention of the consultant helping with
decrypts.
However, this report is referring to a December 2001
story by Cullison and Higgins, not the January 16 story
which
We've noted here the rise in lost and stolen laptops
containing sensitive and classified information. First,
one or two disappeared while a spook was drunk or
was left behind in a taxi or taken from an unidentified
location.
Then amazing reports of more losses, the number rising
quickly,
http://www.msnbc.com/news/715101.asp
Meet the Press, today:
MR. RUSSERT: The Wall Street Journal provided the
Defense Department a hard-drive computer disk at the end
of last year which had valuable information. Do you think
theres any connection between the paper providing that
computer
Declan:
In other words, the WSJ did what everyone else would do. Doesn't seem
like a big deal to me.
This is not what I've heard and read from a number of journalists, and
the Journal's own reporters of the Reid story had qualms. As reported
in the NY Times:
Asked if there had been dissent
For comprehensive listing of press coverage of Daniel Pearl
after his 23 January kidnapping by the South Asian Journalists
Association (though little about the period before the kidnapping):
http://www.saja.org/pearl.html
Linked from the SAJA site, a February 2, 2002, interview of
ex-CIA
The NY Times followup of the WSJ's Richard Reid report noted that
the computer on which Reid's travel account was found contained
some 1500 files, and that other stories were likely to come from
those files. Recall that some computer files had been decrypted
and some not yet.
Though not
It's been a while since automobile ignition key crypto was
discussed here. An update below from the NY Times.
And what effect on auto theft of the Datacard thievery
Bill Stewart got differentialed by at RSA? On electronic
sneak attacks, there's a succinct description of NONSTOP,
HIJACK and
New York is a world of fanciful invention of people
aching to be more important so bear this in mind.
A fellow this evening claimed to have been present
at the session when the US and the Soviets agreed to
detarget one another, at Bolling AFB, thus closing
down the Doomsday Scenario two
Lucky' right, there's no news in the story, except that
the story is a psyop itself.
Most of DoD's current psyop policy is summarized in
the Defense Science Board report, The Creation and
Dissemination of All Forms of Information in Support
of Psychological Operations (PSYOP) in Time of
Tim May wrote:
The notion that a Panopticon (everything being watched) is desirable is
one of the weirdest mutations of political theory in the past century.
Bentham's Panopticon has beguiled watchers since its invention.
What the notion does is hypnotize the watchers into believing they
We had an e-mail exchange today with the FBI about
a bot coming to Cryptome daily to grab new files and
to check on old ones. We complained about the bot
taking over the site during its visit. The FBI explained
that the visits are part of a web cache mirroring process:
To supplement the FBI bot message we note that
several TLAs and others visit each day to download
Cryptome home page, and sometimes individual
files. We assume the file listings are part of a general
Web gathering for internal distribtution. In the case of
NSA and the venerable bot of several
http://www.law.nyu.edu/ili/events.html
Conversation: Siva Vaidhyanathan -- Life in a Distributed Age
Wednesday, February 6, 2002
5:30 PM
room: 210
Vanderbilt Hall
40 Washington Square South
New York, NY 10012
The Information Law Institute presents a lecture by Siva Vaidhyanathan,
author of
Major Variola wrote:
Game theory shows that its in our interest to monitor your reputation
(in extremis, the *plonk* response increases the quality of our lives).
Bear in mind, that earning *plonks* now and then helps keep
the quality of the discourse high, and avoids the chilling effect of
Thanks to Brian McWilliams, we offer the Raise the Fist
Search Warrant and FBI Affidavit:
http://cryptome.org/usa-v-rtf-swa.htm
The young target is made to sound fearsome, well beyond
militant, quite far into the headlights of Ashcroft's and Mueller's
career careening.
The affidavit is a
Yes, this is an affirmation that encrypted data is a sign of
guilt until law enforcement determines that it is not, that is,
when the data has been decrypted and evaluated. It is not
a far step to also claim that use of encryption devices and
programs, passwords and biometrics, would also be
We offer Dmitry Sklyarov's Motion to Dismiss Indictment
for Violation of Due Process filed yesterday:
http://cryptome.org/usa-v-ds-mtd.htm
We offer 19 aerial photos taken yesterday by helicopter of the
170-acre WTC debris criminal investigation site at Fresh Kills
Landfill and 4 aerial photos of the WTC site:
http://cryptome.org/wtc-fk/wtc-freshkills.htm
Threats of violence here should not be taken seriously, except as
literary outbursts. They are a pressure-relieving belly-bump of the
list, not unlike screaming kill at a sports event or in military
training or as children scream fighting over cop-daddy's Beretta
(and as shown last night on
The Wall Street Journal today reports today on alleged
Al Qaeda computer files bought from a seller in Kabul
which were encoded and encrypted.
A key encrypted document reports on a tour assessing
terrorist targets in Egypt and Israel, very similar to the
alleged travels of Richard C. Reid.
Despite what has been promoted by the media (and orchestrated
leaks to it by the US and UK):
1. No definitive link between Al Qweda and the 911 attackers/Moussaoui
has been proven; only assertions have been to date.
2. Nor any proven link of the attackers to the Taliban, the ruling government
More Israeli deathshead humor, confirming what Marine
snipers are told to get them to actually shoot a cross-haired
human laughing head: You are criminals, yes, this is coldstone
murder, get used to it or you'll be cleaning greasetraps.
Takes mere weeks of training to overcome centuries of
An anonymous ISP representative responds to ISPs
Not Filtering Viruses:
A major US ISP which is a subsidiary of a foreign corporation
hosts a US government operation to monitor *all* traffic handled
by the ISP at a central network operations center. This operation
was set up as a condition
If you've been to Israel you would know that statements like
that attributed to Sharon are fairly common. It's part of the
nation's cultural hyperbole to overstate with ironic humor
the mixed message sent to Israel by the US and by Israel to
the US. Samples:
The US needs us more than we need
That's k00l. Now, mattd, you set the script to return the shit
to cpunks to automate and improve the bitching signal and
boost volume. The traditional signal here is indistinguishable
from noise to those who only send to read their own shit
and never comprehend the other.
Idiot sigs, calls for
Declan wrote:
Or there's something about the cypherpunks list that attracts 'em,
which I tend to think is the case.
Agreed, that is what distinguishes this list, now, and based on the
archives, from its beginning. While Tim used miswiring coyly, the
term fits most of what produces innovative
Faustine's right that there is far too much effort wasted here
on trying to control what gets posted, or should or shouldn't
be, rather than improve the quality of the discourse and encourage
new voices, in particular those different from one's own, and
most especially different from one's
201 - 300 of 407 matches
Mail list logo