re

2001-05-05 Thread [EMAIL PROTECTED]

Minister Charles Simpson has the power to make you a LEGALLY ORDAINED MINISTER within 
48 hours   1st22

BE ORDAINED NOW!

As a minister, you will be authorized to perform the rites and ceremonies of the 
church!!

WEDDINGS
MARRY your BROTHER, SISTER, or your BEST FRIEND!!
Don't settle for being the BEST MAN OR BRIDES' MAID
Most states require that you register your certificate (THAT WE SEND YOU) with the 
state prior to conducting the ceremony.

FUNERALS
A very hard time for you and your family
Don't settle for a minister you don't know!!
Most states require that you register your certificate (THAT WE SEND YOU) with the 
state prior to conducting the ceremony.

BAPTISMS
You can say WELCOME TO THE WORLD I AM YOUR MINISTER AND YOUR UNCLE!!
What a special way to welcome a child of God.

FORGIVENESS OF SINS
The Catholic Church has practiced the forgiveness of sins for centuries
**Forgiveness of Sins is granted to all who ask in sincerity and willingness to change 
for the better!!

VISIT CORRECTIONAL FACILITIES
Since you will be a Certified Minister, you can visit others in need!!
Preach the Word of God to those who have strayed from the flock

WANT TO START YOUR OWN CHURCH??
After your LEGAL ORDINATION, you may start your own congregation!!


At this point you must be wondering how much the Certificate costs.  Right?  Well, 
let's talk about how much the program is worth.  Considering the value of becoming a 
CERTIFIED MINISTER I'd say the program is easily worth $100.  Wouldn't you agree?  
However, it won't cost that much.  Not even close!  My goal is to make this life 
changing program affordable so average folks can benefit from the power of it.

Since I know how much you want to help others, you're going to receive your Minister 
Certification for under $100.00... Not even $50.00...  You are going to receive the 
entire life-changing course for only $29.95.  

For only $29.95 you will receive:
1. 8-inch by 10-inch certificate IN COLOR, WITH GOLD SEAL.
(CERTIFICATE IS PROFESSIONALLY PRINTED BY AN INK PRESS)
2. Proof of Minister Certification in YOUR NAME!!
3. SHIPPING IS FREE!!!


***

LIMITED TIME OFFER: ORDER TODAY!
SEND Only $29.95 US
(CREDIT CARD, CASH, CHECK, OR MONEY ORDER)
SHIPPING IS FREE!!! For Shipping OUTSIDE the US please add $11.00.

To place your order merely fill out the following form and fax to 1-775-667-5709.  If 
this line is busy, please try faxing to 1-413-669-7364.

or mail to:

Internet Information Services
PO Box 21442
Billings, MT 59104


(ALL ORDERS FILLED WITHIN 24 HOURS OF RECEIVING THEM)
*Please allow 8 days to receive your certificate by mail.
If you do not receive your order within 10 days, please send us a fax letting us know 
of the late arrival.  We will then contact you to figure out why you have not received 
your order.

*

Credit Card Order Form
(Please print very clearly in dark ink)

Name on Credit Card: 

Address:

City/State/ZIP:

Your email address: 

Your card will be charged $29.95 for your Ministers' Certificate.
For Shipping OUTSIDE the US please add $11.00.

Type of Card, circle one (Visa, MasterCard, American Express)

Credit Card Number: 

Date Credit Card Expires: 

Please tell us your phone Number: 

Please tell us your fax Number: 


To order by Check or Money Order:

MAKE YOUR CHECK PAYABLE TO: 
Internet Information Services

(Please Print Clearly Your Name and Address)
   
Name:

Address:

City/State/ZIP:

E-mail Address:

Please tell us your phone Number: 

Please tell us your fax Number: 

(ALL ORDERS FILLED WITHIN 24 HOURS OF RECEIVING THEM)
*Please allow 8 days to receive your certificate by mail.
If you do not receive your order within 10 days, please send us a fax letting us know 
of the late arrival.  We will then contact you to figure out why you have not received 
your order.

 

Thank you for your business, 


Internet Information Services
PO Box 21442
Billings, MT 59104

Fax to 1-775-667-5709.  If this line is busy, please try faxing to 1-413-669-7364.


Copyright (c) 1997-2000
All Rights Reserved














This ad is produced and sent out by:
Universal Advertising Systems
To be removed from our mailing list please email us at 
[EMAIL PROTECTED] with remove in the subject line or
call us toll free at 1-888-605-2485 and give us your email address or write us at:
Central DB Removal, PO Box 1200, Oranjestad, Aruba




***
86013





NO MORE CREDIT CARD DEBT!

2001-05-05 Thread creditrelief




 Eliminate your credit card debt without filing bankruptcy!
  

 Are you tired of making minimum payments and barely getting by?
Are you drowning in debt? 
Are you ready for a change and some freedom? 

What will buying this package do for me?


 *It will terminate your credit card debt! 
(Major credit cards only - Not department store cards or gas cards)
*This covers cash advances!
*This covers unsecured loans as well!
*It will allow you to stop making monthly payments immediately! 
*It will empower you to take back the control of your life!  


*Unlike bankruptcy this keeps your affairs completely private!
Only you, the creditors, and the credit bureau will know.

However, you will not lose your home, or any other assets!

*You will no longer be able to use those credit cards.


 The price of this package runs between $1750-$2500
This depends on if you want to do it yourself or with
the aid of an paralegal.  We offer a guarantee too!
 
This program has been used successfully for 7 years!



 For more information please call: 1-800-320-9895  Ext 7483 

This works in the US ONLY!

To be removed reply to:  [EMAIL PROTECTED]
or just reply to this email with remove in the subject!
 






smoke heat

2001-05-04 Thread bizness4ubbottwv









Fire effects MILLIONS of Americans each year.

Is YOUR family protected??

Since 1971, we have been distributing
only HIGH quality residential fire
products.

We treat each customer's safety as
our own!

Our 10 inch thick Lifesaving Testimonial
Book shows satisfied customer after
customer.  Become one of them today!

Reply with your name, address, and phone
number.

A representative will contact you shortly.





To be removed from future mailings
(Click Reply) with remove in
the subject line.






RF Weapons

2001-05-03 Thread An Metet

[I wonder if our more unpopular Federal agencies house their mainframes in facilities 
that are shielded from this sort of attack]

Simple RF Weapon Can Fry PC Circuits
Ê
Scientists show device that could make the electromagnetic spectrum the terrorist 
weapon of choice.

Reggie Beehner, Medill News Service
Wednesday, May 02, 2001

ABERDEEN PROVING GROUND, MARYLAND -- A weapon built out of parts from any electronics 
store can deliver radio frequency radiation that can burn out electronic circuits 
within seconds, according to a recent demonstration by scientists here.

Many government officials fear terrorists could use the simple device to disrupt 
computer networks or paralyze electronic equipment. Because of its small size, the 
weapon could be stowed in a van or briefcase and used to wreak havoc on government 
offices, hospitals, airports, or other targets.

The device, assembled with commonly available components, delivers quick, powerful 
bursts of RF radiation. Just about any unprotected electronic equipment is at risk, 
including PCs, home security systems, police scanners, and medical and air-traffic 
control equipment.

Businesses can protect their computer networks by using metal product enclosures on 
hardware and radio frequency filter lines on power lines, says Randy Bernard, vice 
president of Schriner Engineering, which built the device for a demonstration to 
government officials. Also, Bernard urges businesses to keep an offsite data storage 
area to back up materials that could not be protected.

For the guy at home in front of his computer, I'd say don't worry about this, 
Bernard says. But if your business has something to lose, then you might want to pay 
attention. It may not be an immediate threat, but it's something you should keep in 
mind.

But the demonstration is a wake-up call for government and others in technology 
industries, Bernard notes.

Equipment Crashes, Croaks

Our whole nation is vulnerable, says David Schriner, a weapons specialist and 
engineer who codesigned the radio frequency device. We dance along with all this high 
technology, and we're very dependent on it. But if it breaks, where will we be?

Though less dramatic than those officials envisioned, the RF weapon demonstrated did 
inflict noticeable damage on an assortment of electronic equipment. Computer screens 
flickered and froze, medical equipment died, and a home security system lost all 
power. Even a camera, purchased earlier in the week to videotape the demonstration, 
came too close to the radiation pulses and was added to the list of casualties.

When building the RF device, the scientists stuck to using backyard means to see how 
easily it could be done. They bought all the components from retail stores or online, 
finding some on eBay. Total cost for the parts ran about $10,000.

There's nothing classified, Schriner says. This is all homegrown stuff, everyday 
tools and parts. And though we're a bright group, we're certainly not unique. Others, 
including terrorist groups, could do this very easily.

Study Continues

Whether such a device could be used effectively by terrorists is unclear, and 
scientists plan to conduct tests this summer to answer that question.

There's a lot of innuendo that [terrorist groups] have used this, Schriner says. Is 
it true? I don't know. Sometimes when you start researching this you find out it's a 
lot of crock. But the question still remains.

That question was enough to convince the Defense Department to spend $4 million on the 
project and attract the attention of the House Armed Services Committee's Special 
Oversight Panel on Terrorism.

One of the lessons of warfare is the need to keep ahead of the curve of technology, 
says Rep. Jim Saxton, R-New Jersey, who chairs the terrorism panel.

Saxton was among a handful of congressional leaders who turned out to witness the 
45-minute demonstration at a U.S. Army testing ground.

Since the dawn of the Cold War, the government has been careful to protect the 
nation's military computers and infrastructure, officials say. But high costs and 
cumbersome materials have left those precautions largely ignored in the private 
sector, leaving many businesses vulnerable.




Updating our list

2001-05-03 Thread List Update


 
We are updating our mailing list. If you do not want to remain on it, DO NOTHING 
or Send a blank email to [EMAIL PROTECTED] You will automatically be deleted 
and never mailed again. Thank You!
 
If you wish to remain on the list, please reply to [EMAIL PROTECTED]
 
As a way of saying thank you, we will give you 4 pieces of fully functional software 
for remaining on our list. You will also receive regular updates from us.
 
Software will include:
 
1. Desk Top submission software to place your web site in 950 Search engines 
and directories.
 
2. Ezine assistant and text editor. Start your own Ezine with articles that are 
refreshed every month automatically by Top Internet Marketers.
 
3. Webmaster linking program. Keep track of your linking partners and also extract 
targeted email addresses from the Internet.
 
4. Classified ad submission program. Place your classified ad on 1000's of ad 
sites. Great for promoting your business!
 
Again, when you reply, you will be given the download site for this FREE fully 
functional software!
 
Have a great day!




BlackOffers.com Newsletters

2001-05-02 Thread BlackOffers.com Newsletters
Title: BlackOffers.com - Newsletters for the African American























Subscribe to our free newsletters and get the latest information you need to know!



BlackOffers.com exclusive newsletters targets African Americans online looking for the latest information relating to the black experience. Although not all content is black related, we bring it to you from a black perspective. 

Enter your email and select from our newsletters below.




















YOUR E-MAIL: 
 







Inspirational Motivations




Contests & Sweepstakes







Black History





New Black Web Sites







Black Headlines





Doing Business Online











Free Offers 




Specials & Promotions














  
   

  

Click here for information about the Newsletters

 Visit these other fine black destinations:

  

  Blackstocks.com 
  Gospelcity.com


  BlackWebPortal.com
   Blackplanet.com


  

Important Notes:
1. There is no cost to join, all lists are free.
2. Your privacy is guaranteed. Your information will never be sold to any
third parties.
3. Easy process to unsubscribe.
4. Newsletters are sent in rich media html format.
  

  
  


  
  

  Home
  About Us 
  Partner
  Contact Us


  
  





   
  

  
  
 
  Copyright  2001, BlackOffers.com
  www.blackoffers.com
  
  [EMAIL PROTECTED]


 






---To be unsubscribed from the BlackOffers.com Newsletters mailing list, simply click on the link below:Unsubscribe [EMAIL PROTECTED]



FireBreathing Reno sighted

2001-05-02 Thread George

FoxNewChannel's Hannity  Colmes will have Janet Reno on tonight.

(Repeated throughout the night)




martha vazquez summons

2001-05-02 Thread bill payne

Subject:
Judge Martha Vazquez summons, jury
DEMAND, and final complaint
   Date:
Wed, 02 May 2001 13:03:07 -0600
   From:
[EMAIL PROTECTED]
 To:
[EMAIL PROTECTED]
CC:
[EMAIL PROTECTED],
[EMAIL PROTECTED],
[EMAIL PROTECTED],
[EMAIL PROTECTED],
[EMAIL PROTECTED],
[EMAIL PROTECTED],
[EMAIL PROTECTED],
[EMAIL PROTECTED],
[EMAIL PROTECTED],
[EMAIL PROTECTED],
[EMAIL PROTECTED],
[EMAIL PROTECTED],
[EMAIL PROTECTED],
[EMAIL PROTECTED],
[EMAIL PROTECTED],




http://www.nmcourt.fed.us/dcdocs/judges/vazquez.html

Be careful in the future what you sign!
__

SECOND JUDICIAL DISTRICT COURT
COUNTY OF BERNAO
STATE OF NEW MEXICO

CASE NUMBER

Arthur R Morales
William H Payne

v

Theodore C. Baca
Norman C. Bay
Phyllis A. Dow
Raymond Hamilton
Rodey, Dickason, Sloan , Akin  Robb PA
Martha Vazquez
Complaint for

Complaint for Relief from HARASSMENT

SUMMONS


TO:

Martha Vazquez
100 S. Federal Place
Santa Fe, New Mexico 87501

Defendant(s). Greeting:

 You are hereby directed to serve a pleading or motion in response to
the Complaint
within 30  days after service of the Summons and file the same, all as
provided by law.

 You are notified that, unless you so serve and file a responsive
pleading or motion, the Plaintiff(s) will
apply to the court for the relief demanded to the Complaint.

Pro Se Plaintiffs:

Arthur R Morales  William H Payne
1024 Los Arboles NW  13015 Calle de Sandias NE
Albuquerque, NM 87107  Albuquerque, NM 98111
505 3451381   505 292 7037




 WITNESS the Honorable _ District Judge of
said Court of the

State of New Mexico and the Seal of the District Court of said County,
this__ day of

20__


   BENNINA ARMIJO-SISNEROS
   CLERK OF THE DISTRICT COURT

   By:


NOTE: This summons does not require you to see, telephone or write to
the District Judge of  the
court at this time.


It does require you or your attorney to file your legal defense to the
case in writing with the Clerk of the Distinct  Court within 30 days
after the summons is legally served on you.  If you do not do this, the
party suing may get a  judgment by default against you.

Revised 1/1/83 CY 4.45-



STATE OF NEW MEXICO )
) ss.
COUNTY OF_)


RETURN FOR COMPLETION BY SHERIFF OR DEPUTY:

 I certify that I served the within Summons in said County on the
 day of
 ___ ,20_, by delivering a copy thereof, with copy of
Complaint attached.
 in the following manner:

RETURN FOR COMPLETION BY OTHER PERSON MAKING SERVICE:
 I, being duly sworn, on oath. say that I ant over the age of 18 years
and not a parry to this

 lawsuit. and that I served the within Summons in said County on the
___ day of

 _ by delivering a copy thereof with copy of Complaint attached, in
the following manner:

(check one box and fill in appropriate blanks)

_ To Defendant _(used when
Defendant receives copy of  Summons is read Summons or Complaint or
refuses to receive Summons or hear reading.)

 To _ a person over the age
of 15 years and

residing at  the usual place of abode of Defendant 
who at the time of such service was absent therefrom.

_ By posting a copy of the Summons and Complaint in the most public
part of the premises

of Defendant __, (used if no

person found at dwelling house  or usual place of abode.

_ To ___, agent
authorized to

an receive service of process for Defendant
_

_ To _, (parent)
(guardian) of

Defendant  (used when Defendant is a

minor or
an incapacitated person.)

 To _ ___
 name of persontitle of person
authorized to receive service
(used when Defendant is a corporation or association subject to suit
under a common
name, a land grant board of trustees. the State of New Mexico or any
political
subdivision.)

Fees:
Signature of Private Citizen Making Service

SHERIFF OF _  Subscribed and sworn before me this
_

COUNTY State of New Mexico   day of ,20___

_
Sheriff  Notary or Other Officer
  Authorized to Administer Oaths

By: 
  DEPUTY

_
SECOND JUDICIAL DISTRICT COURT
COUNTY OF BERNALILLO
STATE OF NEW MEXICO

  CASE NUMBER

Arthur R Morales
William H Payne

Plaintiffs

v

Theodore C. Baca
Norman C. Bay
Phyllis A. Dow
Raymond Hamilton

[BAWUG] RFC1149 implemented

2001-05-01 Thread Bill Stewart


 From: Lars Aronsson [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Subject: [BAWUG] RFC1149 implemented
 List-Help: mailto:[EMAIL PROTECTED]?subject=help
 
 BAWUG,
 
 Some people in Bergen, Norway are betting on a different wireless
 future and have made the first known implementation of the CPIP
 protocol from RFC1149.  This Internet Request For Comments is titled
 A Standard for the Transmission of IP Datagrams on Avian Carriers
 and was published on April 1, 1990.
 
 Yes, this means sending IP packets with homing pigeons.  The
 experiment was conducted by the Bergen Linux Users' Group in
 cooperation with Vesta Brevduveforening on April 28, 2001.  Ping times
 varied between 3200 and 6300 seconds (1 - 2 hours).
 
 Here are the images:
 
  http://www.blug.linux.no/rfc1149/
 
 
 Lars Aronsson.
 --
Aronsson Datateknik
Teknikringen 1e  tel +46-70-7891609 [EMAIL PROTECTED]
SE-583 30 Linköping, Sweden  fax +46-13-211820http://aronsson.se
 
 --
 general wireless list, a bawug thing http://www.bawug.org/
 [un]subscribe: http://lists.bawug.org/mailman/listinfo/wireless




thousands of mortgage programs 10411

2001-05-01 Thread I25796
FREE LOAN INFO
APR, Fixed rate, points, discount rates, application fees...Sound familiar?
It does if you are searching for a mortgage, refinancing, debt consolidation, etc. . Stop trying to figure it all out, they make
it confusing for a reason! Let us do all the work for you. We will search an entire
database with thousands of current lenders and programs, sift through all the
fine print and confusing terms, and find those that fit your needs. End the hassles
and confusion right now.  we do all the work for you, absolutely FREE.

Simply Click Here, and fill out the short form.

Please click here to be REMOVED






Re: NTT/Mitsubishi release Camilla, ESIGN, EPOC

2001-05-01 Thread David Honig

At 10:35 PM 4/30/01 -0400, Rich Salz wrote:
NTT and Mitsubishi will be granting royalty free licenses for strict
implementations of Camilla (128bit block cipher), 

The best part about Camilla is that it demonstrates that the Japs have
a sense of humor, about the british, at least.





 






  







Re: layered deception

2001-05-01 Thread David Honig

At 10:32 PM 4/28/01 -0700, Steve Schear wrote:
At 11:46 PM 4/28/2001 -0400, Declan McCullagh wrote:
I rather like the idea of encrypting the logs on the fly and shipping them
offshore. Your offshore partner will be instructed to turn over the
logs only if you are not asking for them under duress. (A reasonable
protocol can probably be worked out. Would a court order instruct you
to lie? If so, would it be valid?)

One of the simplest and most effective ways to accomplish this is to 
require the legally responsible corporate person to physically show up at 
the offshore location as proof of a lack of duress.


A location which does not have extradition contracts with the homeland...





 






  







Re: layered deception

2001-05-01 Thread Matthew Gaylor

Tim May [EMAIL PROTECTED] wrote:
A profound new insight.

We still await some real insights from a real graduate student (!), 
beyond her saying that we don't know as much as she says she knows.

BTW, I have removed the additional addresses (David Honig 
[EMAIL PROTECTED], Declan@Well. Com [EMAIL PROTECTED], Steve 
Schear [EMAIL PROTECTED]). When a list is replied to, there is no 
need to carry along the baggage of everyone who has added to a 
thread.


--Tim May


Why bother to continue the thread when you have nothing of value to add?

Regards,  Matt-






**
Subscribe to Freematt's Alerts: Pro-Individual Rights Issues
Send a blank message to: [EMAIL PROTECTED] with the words subscribe FA
on the subject line. List is private and moderated (7-30 messages per week)
Matthew Gaylor, 2175 Bayfield Drive, Columbus, OH 43229
(614) 313-5722  ICQ: 106212065   Archived at http://groups.yahoo.com/group/fa/
**




Make Money Under One Straight Line Plan!!!

2001-05-01 Thread 121i

Hi,

Make Money Under One Straight Line Plan!!!

FREE To Join And Benefit!

This program are People Helping People Build A Reliable 
Residual Income 
 
Through Teamwork, We Will All See Our 
Dreams Come True!

No RECRUITING!
No SELLING!
No PRODUCTS!
No SCAMS!
AND THE BEST PART... IT'S FREE!

We know this sounds too good to be true,  but our this amazing 
program is designed to provide everyday people with a residual 
income stream while doing NOTHING!

Take a look!

Request for info!
mailto:[EMAIL PROTECTED]?subject=inu_info please!

Everybody Benefits!
Everyone join after you will place below you in one straight 
line.

Have a Nice Day!

Regards.





Re: layered deception

2001-04-29 Thread Steve Schear

At 11:46 PM 4/28/2001 -0400, Declan McCullagh wrote:
I rather like the idea of encrypting the logs on the fly and shipping them
offshore. Your offshore partner will be instructed to turn over the
logs only if you are not asking for them under duress. (A reasonable
protocol can probably be worked out. Would a court order instruct you
to lie? If so, would it be valid?)

One of the simplest and most effective ways to accomplish this is to 
require the legally responsible corporate person to physically show up at 
the offshore location as proof of a lack of duress.

steve




RE: layered deception

2001-04-29 Thread Phillip H. Zakas


there is no requirement for maintaining log files (unless specifically
directed otherwise.)  log files contain either marketing value or sysadmin
value -- in both cases specific ip addr info isn't necessary to maintain
that value (except in case of anomalous activity). one could collect info
without identifying information.

same principle applies to e-mail. once mail is deleted from a pop or imap or
whatever server, there is no requirement to keep the backup tapes of e-mail.
in fact the larger isps no longer keep deleted e-mail...they maintain only
e-mail headers for up to six months.  smaller isps should follow in these
steps (though i'd argue you shouldn't even keep header info.)

don't save it if you don't really truly need it.

phillip

 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED]]On Behalf Of Declan McCullagh
 Sent: Saturday, April 28, 2001 11:46 PM
 To: Anonymous
 Cc: [EMAIL PROTECTED]
 Subject: Re: layered deception



 I rather like the idea of encrypting the logs on the fly and shipping them
 offshore. Your offshore partner will be instructed to turn over the
 logs only if you are not asking for them under duress. (A reasonable
 protocol can probably be worked out. Would a court order instruct you
 to lie? If so, would it be valid?)

 -Declan


 On Sat, Apr 28, 2001 at 03:45:38PM -0600, Anonymous wrote:
  In view of the recent gimme-the-logs-or-we-fuck-you activities
  of armed men
  (http://www.indymedia.org/front.php3?article_id=36912group=webcast ,
  http://seattle.indymedia.org/display.php3?article_id=3013 )
  what would be the legal consequence of the following:
 
  1. A virus is designed that spreads itself in some standard way and that
  deletes log files of popular http server implementations.
 
  2. Files are deleted when virus receives a packet on a known port.
 
  3. Detection of virus requires more than average admin can do.
 
  So when logs are requested an outside 3rd party can maliciously
  remove logs. The first several ISPs to contract this virus will
  probably get fucked, but by then it should become obvious that the
  ISP cannot effectively control the virus.






Re: layered deception

2001-04-29 Thread Declan McCullagh

I rather like the idea of encrypting the logs on the fly and shipping them
offshore. Your offshore partner will be instructed to turn over the
logs only if you are not asking for them under duress. (A reasonable
protocol can probably be worked out. Would a court order instruct you
to lie? If so, would it be valid?)

-Declan


On Sat, Apr 28, 2001 at 03:45:38PM -0600, Anonymous wrote:
 In view of the recent gimme-the-logs-or-we-fuck-you activities
 of armed men
 (http://www.indymedia.org/front.php3?article_id=36912group=webcast , 
 http://seattle.indymedia.org/display.php3?article_id=3013 )
 what would be the legal consequence of the following:
 
 1. A virus is designed that spreads itself in some standard way and that
 deletes log files of popular http server implementations.
 
 2. Files are deleted when virus receives a packet on a known port.
 
 3. Detection of virus requires more than average admin can do.
 
 So when logs are requested an outside 3rd party can maliciously
 remove logs. The first several ISPs to contract this virus will
 probably get fucked, but by then it should become obvious that the
 ISP cannot effectively control the virus.




Ashcroft's Wants A Billion More than Reno...

2001-04-29 Thread Matthew Gaylor

[Note from Matthew Gaylor:  Here is a prime example of the Republican 
vision of doing more with less FY 2002 budget includes $1.057 
billion in program increases.  That's a billion more than Janet Reno 
spent.  What total and complete government reduction frauds the 
Republicans are.  Also note that Ashcroft wants to add 1,500 School 
Resource Officers to Clinton's 100,000 Cops program.  What these 1500 
federal funded officers are going to do in our schools, will make an 
even better case for home schooling.  I'm sure the stupid ass 
religious right can be happy now that they've added a new federally 
funded police force bureaucracy to local schools. I'll know who to 
blame especially after they fought tooth and nail for Ashcroft's 
nomination.  Please note-  My stupid ass comment is not directed at 
religion, but is directed at those who supported Ashcroft.  And to 
top it off he wants extra cash to break crypto, presumably so we 
can't bitch about their nefarious anti-liberty activities privately.]



  STATEMENT

  OF

JOHN ASHCROFT

   BEFORE THE UNITED STATES SENATE

 COMMITTEE ON APPROPRIATIONS

SUBCOMMITTEE ON COMMERCE, JUSTICE, AND STATE,

  THE JUDICIARY AND RELATED AGENCIES

April 26, 2001

Mr. Chairman and Members of the Subcommittee:

It is both an honor and a pleasure to appear before you this morning
to present President Bush's first budget request for the Department of
Justice. For Fiscal Year 2002, the President's budget seeks $24.65
billion for the Department of Justice, including $20.94 billion in
discretionary spending authority and $3.71 billion in mandatory
resources, such as fees. This budget seeks to fulfill our basic
federal law enforcement responsibilities, address emerging technology
and critical infrastructure needs, and focus on the Administration's
priorities of reducing gun crime, combating drug use, guaranteeing the
rights of all Americans, and empowering communities in their continued
fight against crime.

While the fiscal year 2002 budget request maintains the same overall
amount of discretionary spending authority as was provided by this
Subcommittee in FY 2001, we have managed to enhance a number of key
areas. The budget includes a general shift in spending from state and
local law enforcement in order to support our core federal law
enforcement mission, and better target assistance to areas of greatest
need, such as crime in our schools, crimes committed with firearms,
and violence against women. The Community Oriented Policing Services
(COPS) program is continued at a somewhat reduced level, with
resources targeted for school safety, law enforcement technology
needs, and reducing DNA backlogs. The COPS request does not disrupt or
affect the commitments made to put 100,000 more police on the streets
and, in fact, goes further by proposing to hire up to an additional
1,500 School Resource Officers.

   Basic Law Enforcement  The Core Federal Mission

The budget I present to you today first addresses the basic law
enforcement responsibilities of the Department of Justice. The mission
of the Department is clear: to enforce the law and defend the
interests of the United States according to the law; to provide
leadership in preventing and controlling crime; to seek just
punishment for those guilty of unlawful behavior; to administer and
enforce the nation's immigration laws fairly and effectively; and to
ensure fair and impartial administration of justice for all Americans.
The FY 2002 budget includes $1.057 billion in program increases to
enable the Department to carry out its mission, particularly in the
areas of detention and incarceration, antiterrorism, cybercrime, and
counterintelligence.

Increased Detention and Incarceration Capacity

The number of inmates in the Federal Prison System has more than
doubled since 1990 as a result of tougher sentencing guidelines,
mandatory minimum sentences, the abolition of parole, and increased
federal law enforcement efforts. This surge in the prison population
continually tests the limits of our detention and incarceration
capacity. The FY 2002 budget for the Department of Justice includes a
$949.5 million increase in funding to support the federal
responsibility of detaining individuals awaiting trial or sentencing
in federal court, and incarcerating inmates who have been sentenced to
prison for federal crimes.

The rapid growth in the federal inmate population is expected to
continue. Despite the investment of nearly $5 billion for prison
construction over the past decade, the prison system is 

RE: layered deception

2001-04-29 Thread Ray Dillinger



On Sun, 29 Apr 2001, Declan McCullagh wrote:

Right, in most circumstances you're not required to keep logs. But there 
are some cases, albeit a fairly narrow subset, in which you'd want to have 
log files that are available to you but not an adversary using legal process.

-Declan


If you need your logs for technical debugging, do your technical 
debugging diligently and daily, and erase them immediately after. 
Until the moment they are erased, they are vulnerable to theft, 
whether the thief has a subpeona or not.

If you want to preserve relevant information from your logfiles, 
just lift out the relevant information and nothing else.  Mung 
it into a completely different form (so it's not a logfile 
anymore), encrypt it, and save it to a private directory. With 
any luck, a regular data thief won't find it.  Short of making a
bad mistake, even if they do find it they won't be able to decrypt.
If you're forced to guide a thief with a subpeona to it, there's 
no guarantee that the info *you* found relevant is the same info 
they want and also the precedent on whether you can be jailed 
for refusing to reveal a key you keep in your head is fuzzy at 
best.

Bear






Re: Choate - Enough is Enough

2001-04-29 Thread Nomen Nescio


Will someone at lne.com finally decide that he qualifies as spam and start 
filtering?  That simple act would improve the signal to noise ratio dramatically.

Internet is a self-service establishment.

Full-service has too much undesirable luggage attached to it.

I haven't seen choatian posts for months, because I'm filtering him out.
The only time it fails is when he changes the originating address,
which is infrequent. So stop whining and do it yourself.

Hushmail won't let you do it ? Tough shit. You need a better service.




RE: layered deception

2001-04-29 Thread Matthew Gaylor

Declan McCullagh [EMAIL PROTECTED] wrote:
Right, in most circumstances you're not required to keep logs. But 
there are some cases, albeit a fairly narrow subset, in which you'd 
want to have log files that are available to you but not an 
adversary using legal process.

-Declan

Which would/could get you charged with obstruction of 
justice/contempt/conspiracy etc, etc.  You can protect your log files 
safely enough by not having any-  But protecting your real ASSets is 
a bit more difficult.

Regards,  Matt-


**
Subscribe to Freematt's Alerts: Pro-Individual Rights Issues
Send a blank message to: [EMAIL PROTECTED] with the words subscribe FA
on the subject line. List is private and moderated (7-30 messages per week)
Matthew Gaylor, 2175 Bayfield Drive, Columbus, OH 43229
(614) 313-5722  ICQ: 106212065   Archived at http://groups.yahoo.com/group/fa/
**




RE: layered deception

2001-04-29 Thread Declan McCullagh

Right, in most circumstances you're not required to keep logs. But there 
are some cases, albeit a fairly narrow subset, in which you'd want to have 
log files that are available to you but not an adversary using legal process.

-Declan


At 01:15 AM 4/29/01 -0400, Phillip H. Zakas wrote:

there is no requirement for maintaining log files (unless specifically
directed otherwise.)  log files contain either marketing value or sysadmin
value -- in both cases specific ip addr info isn't necessary to maintain
that value (except in case of anomalous activity). one could collect info
without identifying information.

same principle applies to e-mail. once mail is deleted from a pop or imap or
whatever server, there is no requirement to keep the backup tapes of e-mail.
in fact the larger isps no longer keep deleted e-mail...they maintain only
e-mail headers for up to six months.  smaller isps should follow in these
steps (though i'd argue you shouldn't even keep header info.)

don't save it if you don't really truly need it.

phillip

  -Original Message-
  From: [EMAIL PROTECTED]
  [mailto:[EMAIL PROTECTED]]On Behalf Of Declan McCullagh
  Sent: Saturday, April 28, 2001 11:46 PM
  To: Anonymous
  Cc: [EMAIL PROTECTED]
  Subject: Re: layered deception
 
 
 
  I rather like the idea of encrypting the logs on the fly and shipping them
  offshore. Your offshore partner will be instructed to turn over the
  logs only if you are not asking for them under duress. (A reasonable
  protocol can probably be worked out. Would a court order instruct you
  to lie? If so, would it be valid?)
 
  -Declan
 
 
  On Sat, Apr 28, 2001 at 03:45:38PM -0600, Anonymous wrote:
   In view of the recent gimme-the-logs-or-we-fuck-you activities
   of armed men
   (http://www.indymedia.org/front.php3?article_id=36912group=webcast ,
   http://seattle.indymedia.org/display.php3?article_id=3013 )
   what would be the legal consequence of the following:
  
   1. A virus is designed that spreads itself in some standard way and that
   deletes log files of popular http server implementations.
  
   2. Files are deleted when virus receives a packet on a known port.
  
   3. Detection of virus requires more than average admin can do.
  
   So when logs are requested an outside 3rd party can maliciously
   remove logs. The first several ISPs to contract this virus will
   probably get fucked, but by then it should become obvious that the
   ISP cannot effectively control the virus.
 
 




RE: layered deception

2001-04-29 Thread Declan McCullagh

I think Matt is a bit too quick to conclude a court will charge the 
operator with contempt and that the contempt charge will stick on appeal. 
Obviously judges have a lot of discretion, but it doesn't seem to me like 
the question is such a clear one if a system is set up in the proper 
cypherpunkish manner.

-Declan


At 01:04 PM 4/29/01 -0400, Matthew Gaylor wrote:
Declan McCullagh [EMAIL PROTECTED] wrote:
Right, in most circumstances you're not required to keep logs. But there 
are some cases, albeit a fairly narrow subset, in which you'd want to 
have log files that are available to you but not an adversary using legal 
process.

-Declan

Which would/could get you charged with obstruction of 
justice/contempt/conspiracy etc, etc.  You can protect your log files 
safely enough by not having any-  But protecting your real ASSets is a bit 
more difficult.

Regards,  Matt-


**
Subscribe to Freematt's Alerts: Pro-Individual Rights Issues
Send a blank message to: [EMAIL PROTECTED] with the words subscribe FA
on the subject line. List is private and moderated (7-30 messages per week)
Matthew Gaylor, 2175 Bayfield Drive, Columbus, OH 43229
(614) 313-5722  ICQ: 106212065   Archived at http://groups.yahoo.com/group/fa/
**




RE: layered deception

2001-04-29 Thread Steve Schear

At 01:04 PM 4/29/2001 -0400, Matthew Gaylor wrote:
Declan McCullagh [EMAIL PROTECTED] wrote:
Right, in most circumstances you're not required to keep logs. But there 
are some cases, albeit a fairly narrow subset, in which you'd want to 
have log files that are available to you but not an adversary using legal 
process.

-Declan

Which would/could get you charged with obstruction of 
justice/contempt/conspiracy etc, etc.  You can protect your log files 
safely enough by not having any-  But protecting your real ASSets is a bit 
more difficult.

Almost anything the court does not like can get you so charged.  So what 
else is new?  Still, if the information or principle is sufficiently 
important you will eventually be released (if you are even held).

steve




Get Away on us!! Make some $$!!!

2001-04-28 Thread abwnd76


GET YOUR FREE GIFT WHEN
VISITING OUR WEB SITE!

Are you being paid what you are worth?

We are living in the most prosperous time in 
history. Now is your turn to profit. Learn to 
earn 6 Figures from home. It is easier than ever!

Plus, receive your FREE GIFT & FREE Info when
visiting our web site.

CLICK HERE!







You were sent this message because your address is in our subscriber database. 
If you wish to be removed, please click here and we will remove you from our subscriber list.








Sellin stuff without knowin what your sellin

2001-04-28 Thread lcs Mixmaster Remailer

From Eurocrypt:

   Abstract. We consider the question of protecting the privacy of
   customers buying digital goods. More specifically, our goal is
   to allow a buyer to purchase digital goods from a vendor without
   letting the vendor learn what, and to the extent possible also when
   and how much, it is buying. We propose solutions which allow the
   buyer, after making an initial deposit, to engage in an unlimited
   number of priced oblivious-transfer protocols, satisfying the
   following requirements: As long as the buyer's balance contains
   sufficient funds, it will successfully retrieve the selected item
   and its balance will be debited by the item's price. However, the
   buyer should be unable to retrieve an item whose cost exceeds its
   remaining balance. The vendor should learn nothing except what must
   inevitably be learned, namely, the amount of interaction and the
   initial deposit amount (which imply upper bounds on the quantity
   and total price of all information obtained by the buyer). In
   particular, the vendor should be unable to learn what the buyer's
   current balance is or when it actually runs out of its funds.




layered deception

2001-04-28 Thread Anonymous


In view of the recent gimme-the-logs-or-we-fuck-you activities
of armed men
(http://www.indymedia.org/front.php3?article_id=36912group=webcast , 
http://seattle.indymedia.org/display.php3?article_id=3013 )
what would be the legal consequence of the following:

1. A virus is designed that spreads itself in some standard way and that
deletes log files of popular http server implementations.

2. Files are deleted when virus receives a packet on a known port.

3. Detection of virus requires more than average admin can do.

So when logs are requested an outside 3rd party can maliciously
remove logs. The first several ISPs to contract this virus will
probably get fucked, but by then it should become obvious that the
ISP cannot effectively control the virus.




toolmakers not responsible for tooluse

2001-04-27 Thread Timothy McVeigh

http://dailynews.yahoo.com/h/ap/20010427/ts/court_handgun_liability.html

Friday April 27 10:29 AM ET
   Gun Ruling To Have National
   Impact

   By JOEL STASHENKO, Associated Press Writer

   ALBANY, N.Y. (AP) - A ruling by the state's top
   court that gun makers can't be held liable for
   shooting deaths and injuries because of their
   marketing practices is certain to have an impact on
   dozens of such cases nationwide, lawyers say.


So if gun-makers aren't responsible for how guns are used,
why is Napster held responsible for how its software is used?

Why is Felton responsible for how his thinking might be used?








The Program

2001-04-27 Thread C. Henry

Several months ago, I made a conscious decision not to
delete what I figured was just another “junk” e-mail. 
That decision has changed my life.  Here you have the
very same opportunity in front of you.  If you take
just five minutes to read through the following
program you won’t regret it.  See for yourself!

Dear Friends  Future Millionaires: 
AS SEEN ON NATIONAL TV:
Making over half a million dollars every 4 to 5 months
from your home for an investment of only $25 U.S.
Dollars expense one time 
THANKS TO THE COMPUTER AGE AND THE INTERNET !
==
BE A MILLIONAIRE LIKE OTHERS WITHIN A YEAR!!!
Before you say ''Bull'', please read the following.
This is the letter you have been hearing about on the
news lately. Due to the popularity of this letter on
the Internet, a national weekly news program recently
devoted an entire show to the investigation of this
program described below, to see if it really can make
people money. The show also investigated whether or
not the program was legal. Their findings proved once
and for all that there are ''absolutely NO Laws
prohibiting the participation in the program and if
people can -follow the simple instructions, they are
bound to make some mega bucks with only $25 out of
pocket cost''. DUE TO THE RECENT INCREASE OF
POPULARITY  RESPECT THIS PROGRAM HAS ATTAINED, IT IS
CURRENTLY WORKING BETTER THAN EVER. This is what one
had to say: ''Thanks to this profitable opportunity. I
was approached many times before but each time I
passed on it. I am so glad finally joined just to see
what one could expect in return for the minimal effort
and money required. To my astonishment, I received
total $610,470.00 in 21 weeks, with money still coming
in.
Pam Hedland, Fort Lee, New Jersey.
===
Here is another testimonial: This program has been
around for a long time but I never believed in it. But
one day when I received this again in the mail I
decided to gamble my $25 on it. I followed the simple
instructions and voila . 3 weeks later the money
started to come in.  First month I only made $240.00
but the next 2 months after that I made a total of
$290,000.00. So far, in the past 8 months by
re-entering the program, I have made over $710,000.00
and I am playing it again. The key to success in this
program is to follow the simple steps and NOT change
anything.''  More testimonials later but first,
= PRINT THIS NOW FOR YOUR FUTURE REFERENCE ==
$
If you would like to make at least $500,000 every 4 to
5 months easily and comfortably, please read the
following...THEN READ IT AGAIN and AGAIN!!! 
$
FOLLOW THE SIMPLE INSTRUCTIONS BELOW AND YOUR
FINANCIAL DREAMS WILL COME TRUE, GUARANTEED!
INSTRUCTIONS:
=Order all 5 reports shown on the list below =
For each report, send $5 CASH, THE NAME  NUMBER OF
THE REPORT YOU ARE ORDERING and YOUR E-MAIL ADDRESS to
the person whose name appears ON THAT LIST next to the
report. MAKE SURE YOUR RETURN ADDRESS IS ON YOUR
ENVELOPE TOP LEFT CORNER in case of any mail problems.
=== When you place your order, make sure you order
each of the 5 reports.
You will need all 5 reports so that you can save them
on your computer and resell them. YOUR TOTAL COST $5 X
5=$25.00. Within a few days you will receive, via
e-mail, each of the 5 reports from these 5 different
individuals. Save them on your computer so they will
be accessible for you to send to the 1,000's of people
who will order them from you. Also make a floppy of
these reports and keep it on your desk in case
something happens to your computer. IMPORTANT - DO NOT
alter the names of the people who are listed next to
each report, or their sequence on the list, in any way
other than what is instructed below in steps '' 1
through 6 '' or you will loose out on a majority of
your profits. Once you understand the way this works,
you will also see how it does not work if you change
it. Remember, this method has been tested, and if you
alter it, it will NOT work!!! People have tried to put
their friends/relatives names on all five thinking
they could get all the money. But it does not work
this way. Believe us, we all have tried to be greedy
and then nothing happened. So Do Not try to change
anything other than what is instructed. Because if you
do, it will not work for you. Remember, honesty reaps
the reward!!!
1 After you have ordered all 5 reports, take this
advertisement and REMOVE the name  address of the
person in REPORT # 5. This person has made it through
the cycle and is no doubt counting their fortune.
2 Move the name  address in REPORT # 4 down TO
REPORT # 5.
3 Move the name  address in REPORT # 3 down TO
REPORT # 4.
4 Move the name  address in REPORT # 2 down TO
REPORT # 3.
5 Move the name  address in REPORT # 1 down TO
REPORT # 2.
6 Insert YOUR 

Report from NORML conference in Washington, DC

2001-04-24 Thread Declan McCullagh



http://www.wired.com/news/politics/0,1283,43232,00.html
   
   Pot Backers Call for Reeferendum
   By Declan McCullagh ([EMAIL PROTECTED])
   2:30 p.m. Apr. 23, 2001 PDT
   
   WASHINGTON -- Hundreds of drug war critics gathered here this weekend
   to share political tips, marijuana cigarettes, pipes and bowls, and a
   growing sense of optimism about the future of drug legalization.
   
   The occasion was the National Organization for the Reform of Marijuana
   Laws convention, an annual event usually held around April 20, a date
   that has the same kind of significance to cannabis users that, say,
   July 4 has to patriots.
  
   In the ranks of the legalize-weed movement, NORML has a venerable
   history. It's been around since 1970, and has held 27 annual
   conventions so far -- only to see the drug war escalate during that
   time to include military troops, longer prison terms, and the creation
   of a federal bureaucracy that has become the arch-enemy of pot
   smokers.
   
   So why were the roughly 250 conference goers sounding almost, well,
   happy?
   
   It wasn't just the plentiful herb at the event. NORML believes that
   thanks to pro-legalization politicians like Gov. Gary Johnson (R-New
   Mexico) and Rep. Barney Frank (D-Massachusetts), state action on
   medical marijuana, and the spread of the Internet, public opinion may
   be shifting.
   
   We don't live in an isolated world anymore, said Allen St. Pierre,
   the executive director of the NORML Foundation. We can be watching
   people indulge in cannabis in an Amsterdam cafe via a webcam.
   
   St. Pierre said Johnson and Frank's support is heartening. We have not
   had a major political figure since the '70s come out and endorse a
   departure from the status quo. That's important and noteworthy to say
   the least.
   
   St. Pierre is talking about what former President Carter said in 1977:
   Penalties against drug use should not be more damaging to an
   individual than use of the drug itself. Nowhere is this more clear
   than in the laws against possession of marijuana in private for
   personal use.

   [...]




Re: Amtrak The War On Drugs

2001-04-24 Thread Riad S. Wahby

Ken Brown [EMAIL PROTECTED] wrote:
 You need phone numbers to buy train tickets?

For most trains around here at least, the answer is no.  You get on
the train, and the conductor sells you a ticket to where you're going
for cash.  Or you can pay at the ticket office at the station
beforehand, if there is one, to save a little money.

--
Riad Wahby
[EMAIL PROTECTED]
MIT VI-2/A 2002

5105




Re: Reading List (for the umpteenth time....)

2001-04-20 Thread Sampo Syreeni

On Thu, 19 Apr 2001, James A. Donald wrote:

Detweiler repeatedly attempted that hack in several different newsgroups
and mailing lists, and repeatedly failed.   Everyone would come to the
conclusion that he was a loon, and that anyone who agreed with him was
either a tentacle or a fellow loon.

Hmm. I wouldn't care to advertise my ignorance (as Detweiler is certainly
part of net.legend), what *was* the final outcome of that ordeal?

(Feel free to answer offline, or to post links only.)

Sampo Syreeni, aka decoy, mailto:[EMAIL PROTECTED], gsm: +358-50-5756111
student/math+cs/helsinki university, http://www.iki.fi/~decoy/front




RE: not getting it in Quebec

2001-04-20 Thread Shaun Ollivierre

those pussies should have used pipe bombs, thats where it's at!

-
-
Shaun Ollivierre
Dream Developments/EHI
[EMAIL PROTECTED]
www.enphourell.com

On Fri, 20 Apr 2001, Trei, Peter wrote:

 
 It would be cruel to use live animals.
 Maybe they should use stuffed shirts.
 
 Peter
 
  --
  From:   Blank Frank[SMTP:[EMAIL PROTECTED]]
  By mid-afternoon, protesters tore down a section of
the concrete and chain-link security barricade and
pelted police officers in riot gear with cans, bottles,
rocks and stuffed animals. Officers responded by
lobbing canisters of tear gas.
  
  Stuffed animals? 
  
  Did they expect that the cops would use cheese-whiz instead of mace?
  
  http://dailynews.yahoo.com/h/ap/20010420/ts/summit.html
Friday April 20 4:41 PM ET
Quebec Summit Opens Amid
Protests




Privacy Prez?

2001-04-19 Thread Nomen Nescio

The Privacy President?

By WILLIAM SAFIRE


WASHINGTON Ñ In an action that left medical data-swappers sputtering with rage and the 
well-heeled intrusion lobby moaning about its "operational nightmare," President Bush 
struck a blow last week for the privacy of medical patients' records.

Few expected Bush to make good on the belated rule changes his departing predecessor 
made that so offended health-care bureaucrats. But now doctors, hospitals and insurers 
are obliged to get patients' consent before passing around intimate personal 
information.

This is only the beginning. During his campaign, Bush promised not only to uphold the 
principle of advance consent from users of the Internet and from depositors in banks, 
but to go after identity thieves and "make it a criminal offense to sell a person's 
Social Security number without his or her express consent."

His spokesman made clear to Wall Street Journal reporters that despite pressures from 
marketers, bankers, H.M.O.'s and credit snoops, Bush had told his domestic policy 
advisers he would "tend to side with the privacy point of view." He doesn't go 
overboard Ñ he thinks parents, for example, should be able to see their children's 
records Ñ but he seems to grasp the essential principle.

Meanwhile, the U.S. Court of Appeals here smacked one of the largest commercial snoops 
upside its headers. Trans Union Corporation, which has electronic dossiers on three 
out of four Americans, claimed a First Amendment right to sell credit information in 
mortgage applications to "target marketers" without the targeted consumers' 
permission. The intruder was willing to provide only an "opt-out," placing the burden 
of defending privacy on the unsuspecting victim.

The court disagreed. It held that the government, through the Federal Trade 
Commission, could require companies to get an individual's permission before selling 
credit data on that person to salesmen looking for prospects with delicious 
vulnerabilities. The far-reaching court decision affirms the role of government in 
protecting the privacy of individuals.

But what about government itself poking unnecessarily into people's private lives? 
Sure enough, with the executive and judicial branches awakening to the public's 
growing resentment of data rape, sleepy solons of the legislative branch are rubbing 
their eyes and noticing the issue.

Senator Fred Thompson discovered that 64 government Web sites place "cookies" in the 
computers of site visitors, enabling the feds to track the viewing habits of citizens 
long after they have left the government site. The irate Tennessean promised hearings 
because "the federal government should be setting the standard for privacy protection 
in the Information Age."

Rather than setting up talkathon commissions, Congress should be setting down laws, 
because banks, hospitals, colleges and dot-com enterprises have for years been paying 
lip service to privacy standards Ñ posting soothing "privacy policies" that are 
warrants for sustained snooping Ñ while making an open book of every person's health, 
personal habits and bank account.

One oughta-be-a-law applies to a problem that touches a nerve in tens of millions of 
Americans: the abuse of Social Security numbers as identifiers, contrary to the 
specific intent of the system. Ostensibly used for identity protection, Social 
Security number abuse has led to increased stalking and even murder.

And identity theft. Next on President Bush's privacy list is this spreading crime that 
ruins lives, not just credit ratings. In the Senate, Richard Shelby has been taking 
the lead on this, the D'Artagnan working with "the three privateers," Dianne 
Feinstein, Jon Kyl and Judd Gregg.

Bush's signals have given heart to Clay Shaw in the House. He says, "We'll be dropping 
a new bill to protect Social Security numbers in the next couple of weeks, hold 
hearings before Memorial Day and look for Senate partners."

Pitfall ahead: We'll see if Bush's appointee to head the Federal Trade Commission is 
as privacy-conscious as the departing chairman, Robert Pitofsky.

But the tide she is a-turning. We have a Congress that is getting the word from 
constituents; a judiciary that remembers Justice Brandeis and his "right to be let 
alone"; a press beginning to assign privacy as a beat; and a man in the White House 
who may not be averse to being thought of as the privacy president.





Re: Stalking Louis Freeh

2001-04-17 Thread Dr. Evil

Although ChoicePoint says it has records
  on nearly every American with a credit card,
  it doesn’t always provide access to that data.
  The company’s Autotrack service is popular
  with many agencies and businesses and is
  also used by reporters at The Wall Street
  Journal. But entering the name of FBI
  Director Louis Freeh into the Autotrack
  database produces an error message. A
  company spokesman says ChoicePoint
  intentionally blocks Mr. Freeh’s records as
  an act of good corporate citizenship.

I wonder if they would be willing to block my records as an act of
good corporate citizenship.




Keysigning Party, Simi Valley, CA, USA

2001-04-16 Thread V. Alex Brennen

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


LUG-Fest (Linux User's Group Festival) an expo style
event for Linux users in the bay area is going to
hold a large keysigning party. If any cypherpunks
are interested in attending here is the relevant
information:

LUG Fest April 21-22, 2001 at Nortel
Networks, Simi Valley, CA, USA!

Keysigning Party Press Release:

http://www.lugfest.org/gpg.cgi

"Sunday, April 22nd, 2001, 12:30 p.m, the Simi Valley Linux Users
 group will hold a GPG/PGP Key signing party during LUGFest IV.
 LUGFest IV will be held at Nortel Networks in  Simi Valley, CA.
 The LUGFest and the key signing party are open to the public, all
 are welcome to attend."


The lugfest press release links to the GnuPG Keysigning
Party HOWTO, which I wrote.  Constructive criticism of
that document is appreciated.  I posted in here once
before for review and got some good feed back.  It
lives at:

http://www.cryptnet.net/fdp/crypto/gpg-party.html


I've been trying to get LUGs (linux user groups) around
the country to start holding regular keysigning parties
in the last 5 minutes of their meetings.  LUGs exist in
every major metro area in the US and meet regularly.
They are capable a providing an excellent backbone
(infrastructure support) for a strong nation wide web
of trust.  Local webs of trust formed by lugs can be
linked at conferences like LUG-Fest.  I strongly
urge everyone who can to participate in the LUG-Fest
party, and to thank LUG-Fest for holding it.  Also,
if you are a member of your local LUG, I urge you to
help it establish a keysigning tradition and a strong
web of trust.


Thanks,

- VAB
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: Made with pgp4pine 1.75-6

iD8DBQE62vWt+pIJc5kqSz8RArvHAJ4+nN/IBDjWIpEUWoU61m3Eo3NzuwCeJGcg
6DiqV+fs2HWcE5oxmrtxbfc=
=bCzD
-END PGP SIGNATURE-





Re: hello, I would like to learn how to hack a bit

2001-04-16 Thread Ray Dillinger

Certainly.  Head down to the local hardware store and buy 
yourself a very large axe.  

Now find something you want to hack, lift the axe over your 
head, and bring it down edge first.  You may need to hack 
three or four times before you break all the way through. 

It's easy once you get the hang of it.

Bear


On Mon, 16 Apr 2001, roland wrote:

but I'm not verry good jet, 
can u tell me how
pls answer me quick





Misc p2p article

2001-04-16 Thread George

Also, today's NYT has an article about national security
needs for more language experts.



http://interactive.wsj.com/articles/SB987356381635082061.htm
#
#April 16, 2001
#
#Asian Technology
#
#Two New Peer-to-Peer Programs Aim High, but Still Have Glitches
#
#By JEREMY WAGSTAFF Staff Reporter of THE WALL STREET JOURNAL
#
#Time to grovel. I was hoping this week to be able to trumpet 
#a bunch of new programs that free you from some of the physical 
#constraints of modern computing. I was hoping to be able to say 
#that, at last, you were free of shackles such as overprotective 
#technical staff, the corporate Intranet and endless e-mail 
#attachments.
#
#But paradise, I'm afraid to say, has to be postponed for a while. 
#The two programs I've been toying with, new versions of which 
#were both released last week, are Groove Networks Inc.'s Groove 
#(www.groove.net1 ) and GoToMyPC (www.gotomypc.com2 ) from 
#Expertcity Inc.
#
#Groove is the first serious attempt to introduce peer-to-peer 
#computing to the business marketplace, giving employees a chance 
#to communicate and share files by setting up their own online 
#work groups. GoToMyPC offers the first Web-based -- and legal 
#-- method of accessing and controlling another computer. Both, 
#in theory, are great ideas, elegant in their simplicity and 
#genuinely useful. But neither worked perfectly.
#
#Peer-to-peer computing -- where multiple users can interact 
#directly, rather than through a server -- is probably the next 
#great thing for the Internet. Best known as a way to swap music 
#over the Net via Napster, so-called P-to-P applications allow 
#much more, such as letting users share files, messages or 
#calendars, or collaborate in real time on a document or drawing.
#
#As I've mentioned before, the Web will start coming into its 
#own once people stop obsessing about how to make money out of 
#other users and start capitalizing on the intrinsic benefits 
#of having millions of people all sharing a network.
#
#Peer-to-peer computing offers users the chance to set up their 
#own personalized networks atop the public Web. Without these 
#P-to-P systems, people have to use a number of imperfect 
#alternatives. For instance, users can rely on their Internet-
#service providers to provide the tools (but they may be held 
#hostage to proprietary programs or HTML); or use corporate 
#networks (jealously guarded by techies rightly afraid of viruses 
#and other abuses); or shuffle e-mail messages among team members 
#(a cumbersome process).
#
#In practice, Groove isn't quite mature yet. The preview edition 
#looks and feels professional, and carries loads of useful 
#features, including instant messaging, file sharing, even a 
#doodling pad. It also supposedly works behind a firewall, and 
#around problems such as connecting to computers that share the 
#same Internet connection.
#
#Although the program is sturdier than its beta ancestors, I found 
#it unstable and unreliable. On one computer it wouldn't load 
#properly; on another it behaved erratically through the company 
#firewall and offered no easily accessible options that I could 
#tweak to make it perform better.
#
#Disappointing, but not fatal. Groove, or something like it, is 
#definitely the wave of the future: Freeing up employees to set 
#up their own peer groups without cluttering the corporate Intranet 
#makes sense. Pharmaceutical company GlaxoSmithKline, for one, 
#agrees: Last week it bought 10,000 licenses for more than 100,000 
#employees world-wide, making it Groove Networks' first paying 
#customer.
#
#GoToMyPC, meanwhile, tackles a similar problem from a slightly 
#different angle, and is a unilateral peer-to-peer system, rather 
#than the more common variety that lets anyone talk to anyone 
#else. Whether on the Net or not, users have been hamstrung by 
#the fact that generally they only can run one computer at a time. 
#Working from home? Chances are you only can access the office 
#network with difficulty. Forget a vital file at home? There are 
#only one or two programs available that allow you to access a 
#remote computer, and most of them aren't Internet-based. Instead, 
#these programs rely on actually dialing into the computer via 
#a phone line.
#
#GoToMyPC aims to make the process simpler by harnessing the 
#Internet to link computers. It sounds simple, and it is: Assuming 
#the two computers are connected to the Internet (and most office 
#computers permanently are hooked up, as are PCs on a cable modem 
#or other high-speed Internet connection), the software merely 
#links them together. It establishes 

Epilogue: U.S. v. Jim Bell trial in federal court in Tacoma

2001-04-16 Thread Declan McCullagh

Four articles are excerpted below:
  Wired News on government's motion to seal public court records
  Sierra Times: "IRS Prosecutes Outspoken Dissident"
  About.com: "Jim Bell's show trial"
  Cluebot.com on how government surveillance killed the cypherpunks list

-Declan

***

http://www.wired.com/news/politics/0,1283,43064,00.html

   The U.S. government wants to seal public court records in a trial of
   an Internet essayist for privacy reasons.
   
   Assistant U.S. Attorney Robb London this week asked a federal judge to
   seal all documents -- including exhibits and transcripts -- that might
   include personal information and home addresses about people who
   testified in the trial of Jim Bell. A jury found Bell guilty of two
   counts of interstate stalking.
   
   London said: "We are concerned that information in these exhibits not
   be published... (We) don't need to have that information posted on the
   Internet."
   
   While the charges are crucial to understanding the case against Bell,
   the government feels uneasy about the home addresses of federal agents
   being easily accessible to the public. London cited the addresses of
   agents dozens of times in open court, and displayed digital
   photographs of the homes Bell visited.
   
   U.S. District Judge Jack Tanner thought about London's request for a
   moment, then denied it. "I don't think I have the authority to do
   that," Tanner said.

   [The meaning was changed slightly in editing. The fourth paragraph
   should be "addresses of people Bell *believed* to be federal agents
   but were not. One was, for instance, a real estate agent. --DBM]

***

http://www.sierratimes.com/archive/files/apr/13/arst041301.htm

   IRS Prosecutes Outspoken Dissident 
   SierraTimes 04.13.00
  
   James Dalton Bell may remind you of somebody you know. He's very
   bright, dresses and looks like a nerd and,
   most importantly, he dislikes the IRS. In that last respect, he is not
   in a minority.
   
   Where Jim Bell does fall into a minority is that instead of merely
   grumbling quietly, he decided to do something
   about it. And that's why he was just convicted in the Washington
   Federal District Court in Tacoma on Tuesday
   [4/10/2001].
  
   Jim Bell has been a lifelong libertarian, ever since he was a
   teenager. Bell's view of government was that it was unnecessary. Is he
   an anarchist? Only, as he puts it, in the sense of "I believe in
   order; I do not believe in orders." He disparaged the huge hierarchies
   that have evolved in current bureaucracies, and believed that such
   hierarchies were unresponsive and dehumanizing. And, as Bell would
   personally learn, such a hierarchy creates two classes as outlined in
   George Orwell's Animal Farm: those who are part of the government
   hierarchy, and those who are not.

   [...]
  
   Bell, in his defense, stated that he had signed the LP oath that he
   would not initiate violence. And there was absolutely no direct
   evidence that he had ever initiated violence against anyone. People
   that he had come in contact with in his 2000 investigation
   characterized him as polite, and did not see him as threat. And Bell
   had obviously taken no discernible steps that would equip him to
   initiate violence.
  
   So what the government was left with was prosecuting a thought crime:
   intent. Because Bell had used his freedom of political speech to write
   such items as "Assassination Politics" and disclose IRS agents' home
   addresses, he obviously had to have the intent to harass federal
   agents. And the harassment was loosely construed. Any attempt to find
   or disclose any personal information about an agent can be made to fit
   federal law against "intention to harass or injure" an agent.
  
   Several times during the trial, the prosecutor made it clear that such
   an investigation was inappropriate and illegal merely on the basis
   that the subjects of such investigation were federal agents. Numerous
   times he cited the special privilege that agents hold that ordinary
   citizens don't possess. Federal agents are, indeed, a breed apart and
   must be specially protected, he insisted. While they could surveil and
   investigate ordinary citizens, it was illegal for ordinary citizens to
   do the same to them.

   [...]

***

http://civilliberty.about.com/newsissues/civilliberty/library/weekly/aa041101a.htm

   Jim Bell's show trial
   Cypherpunk Jim Bell was found guilty of making the feds nervous
   Dateline: 4/11/01
   
   Jim Bell has been probed, raided and arrested. He spent time in prison
   for "obstructing" Internal Revenue Service agents and using a false
   Social Security number. Now Bell has been convicted for get this
   stalking government 

DoD's Counterdrug Technology Office Launches Biometrics Catalog

2001-04-16 Thread Matthew Gaylor

NATIONAL INSTITUTE OF JUSTICE (NIJ)

Biometrics Catalog Online

NIJ has teamed with the U.S. Department of Defense's Counterdrug 
Technology Development Program Office to launch the online Biometrics 
Catalog. Biometrics consist of automated methods for recognizing a 
person based on physiological or behavioral characteristics such as 
fingerprints, voice patterns, facial recognition, etc.

The catalog provides a single location to find information about 
biometric technologies and allows the Biometrics community to share 
information about commercial products, development efforts, and 
government evaluations. To visit the Biometrics Catalog online, 
please go to the following:

http://www.biometricscatalog.org/

You can search in the following categories: Fingerprint, hand 
geometry, eye-retinal, eye-iris, facial recognition, speaker, dynamic 
signature, multiple biometric, and other types.

I did a sample search on facial recognition and commercially 
available products and got these hits.

BioANTS-Face 4/3/01
FaceIt  7/28/00
FaceMail4/2/01
FaceVACS3/30/01
HNeT Acsys FRS...4/2/01
MindsEye 4/5/01
President 4/2/01

Here's the info for the "President" package:

Modified: 4/2/01 9:01:00 PM
Category: Commercially Available Products
Biometric Type: Facial Recognition
Vendor: Biometrica
Title: President
Description: Biometrica Systems, Inc. supplies facial recognition 
technology to casinos worldwide. In addition, their software is used 
by law enforcement and other surveillance departments worldwide.
Additional References Related sites: Biometrica Systems, Inc. 
http://www.biometrica.com

Now I'm just going to have to make sure I remember to invest in those 
theatrical mask companies...Or I could just celebrate Halloween all 
year long.

Regards,  Matt-


**
Subscribe to Freematt's Alerts: Pro-Individual Rights Issues
Send a blank message to: [EMAIL PROTECTED] with the words subscribe FA
on the subject line. List is private and moderated (7-30 messages per week)
Matthew Gaylor, 2175 Bayfield Drive, Columbus, OH 43229
(614) 313-5722  ICQ: 106212065   Archived at http://groups.yahoo.com/group/fa/
**




Re: Starium?

2001-04-16 Thread Dr. Evil


Peter,

Thanks for the tip on that.  I'll be looking out for it, although at
that price, it's cheaper to buy a dedicated PC and run SpeakFreely, as
you point out.

Linux PDAs with good sound chips are just around the corner,
apparently, and it seems that it shouldn't be too big a feat to get
SpeakFreely or something similar running on them.  These PDAs are a
lot cheaper than the dedicated encryption hardware, such as Starium,
which was going to price at around $500, last I heard.  Also, because
everything in the PDA is open source, it would be easier to trust it.
Maybe when I have time and money to do it, and the PDAs with the
necessary hardware are really shipping, I'll do some project like
this.  Basically, all it needs would be a full-duplex sound chip, and
a built-in modem, and a reasonably fast CPU.

It's just a shame that we have encryption all over the place, except
for the one medium which we probably use the most: voice.




Re: hello, I would like to learn how to hack a bit

2001-04-16 Thread Daniel J. Boone

It's very simple.

Go to a military surplus store or your local Wall-Mart and buy a machete.  If
you buy a surplus one, you may want to sharpen it and polish the rusty blade,
although this step is not essential because one may hack quite noisily and
dramatically with a rusty dull machete.

Go out in your back yard and find some brush or small trees.  (Bamboo works
well but may not be available in your area.)

Hack away -- it's that simple!

Disclaimer:  In many states, if you hack at decorative trees or shrubs that do
not belong to you, you may be liable for a sum in damages equal to thrice the
actual value of the vegetation destroyed.

-- Daniel

- Original Message -
From: roland [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Monday, April 16, 2001 5:02 AM
Subject: CDR: hello, I would like to learn how to hack a bit


 but I'm not verry good jet,
 can u tell me how
 pls answer me quick






RE: Starium?

2001-04-16 Thread Trei, Peter

Here it is

http://www.L-3Com.com/cs-east/programs/infosec/privatel.htm

3DES, 1024 bit D-H, TEMPEST compliant. Handles both voice
and data.

 --
 From: Trei, Peter
 Reply To: Trei, Peter
 Sent: Monday, April 16, 2001 1:35 PM
 To:   Dr. Evil; 'Declan McCullagh'
 Cc:   [EMAIL PROTECTED]
 Subject:  RE: Starium?
 
 At the RSA conference I saw a company selling Starium-equivalent
 units, both for voice and data encryption. The voice only units were
 about $1400 apiece. (frankly, at that price, you could plug a PC
 with an A/D converter card between the handset and the base, and
 roll your own). 
 
 I'm still decompressing, and have not unpacked all my bumph, else
 I'd have more specific data.
 
 Peter Trei
 
  --
  From:   Declan McCullagh[SMTP:[EMAIL PROTECTED]]
  Reply To:   Declan McCullagh
  Sent:   Sunday, April 15, 2001 1:46 PM
  To: Dr. Evil
  Cc: [EMAIL PROTECTED]
  Subject:Re: Starium?
  
  I have a pair of their preproduction units they sent me in December.
  --Declan
  
  
  On Sun, Apr 15, 2001 at 02:01:10AM -, Dr. Evil wrote:
   Does anyone know if Starium is ever going to release anything?  I
   noticed on their News section that they have engaged an MA
   specialist.  That's probably not a good sign for them operating as a
   stand-alone company.  email to them bounces.




Starium?

2001-04-14 Thread Dr. Evil


Does anyone know if Starium is ever going to release anything?  I
noticed on their News section that they have engaged an MA
specialist.  That's probably not a good sign for them operating as a
stand-alone company.  email to them bounces.




John Walsh broadcasts Most Wanted sans underwear! (horrors!)

2001-04-13 Thread George

Something I've never bought before - "Globe" 4/17/2001 - has
compromising photos of John Walsh and another babe.

"Caught! America's most perverted host"

He's been married 29 years, but apparently his new fame (Wanted)
has led him to keep mistresses and take pictures of them when
he gets head! Alrighty!

Yet another person claiming to be morally superior, exposed.

Of course, he's shirtless in one photo, and holding up his
tee shirt in another to flash his nipple (like a girl)!

snicker

When will they show Jeff Gordon fucking himself with his gun?
BANG oops...one too many anal clenches.

Next time you see Walsh covering one of the FBI's 10 most wanted,
remember that he's not wearing any underwear - he's too sexy for that.



A magazine without an URL? I guess so.

Found some interesting stuff at an unrelated globe.com.

Articles are snipped.



http://www.globe.com/news/daily/13/indian_names.htm
#
#Civil rights panel urges end to Indian sports names at schools
#
#By Greg Toppo, Associated Press, 04/13/01
#
#WASHINGTON -- Saying the use of Indian names and mascots may 
#violate anti-discrimination laws, the U.S. Commission on Civil 
#Rights called for an end to their use by non-Indian schools, 
#colleges and universities.
#
#The commission said Indian names and mascots could be viewed 
#as "disrespectful and offensive" by Indian groups and can create 
#"a racially hostile educational environment that may be 
#intimidating to Indian students."

How about a fire-breathing Reno?



http://www.globe.com/news/daily/13/smiley.htm

Creator of Smiley Face icon dies at 79

By Associated Press, 04/13/01

WORCESTER -- Harvey R. Ball, whose simple drawing of a smiling 
face on a yellow background became a cultural icon, died Thursday 
after a short illness. He was 79.

Ball, who co-owned an advertising and public relations firm in 
Worcester, designed the Smiley Face in 1963 to boost the morale 
of workers in two recently merged insurance companies.

Ball was paid $45 for his artwork by State Mutual Life Assurance 
Cos. of America -- now Allamerica -- in 1963.

He never applied for a trademark or copyright, something his 
son, Charles Ball, said his father never regretted.

"He was not a money-driven guy," Charles Ball told the Telegram 
and Gazette of Worcester. "He used to say, `Hey, I can only eat 
one steak at a time, drive one car at a time."'



http://www.globe.com/news/daily/13/bush_game.htm

Bush virtual pet game popularity soars in China

By D. Ian Hopper, Associated Press, 04/13/01

WASHINGTON -- In the aftermath of the downed U.S. spy plane, 
the Chinese apparently have found a new way to ridicule President 
Bush -- a virtual pet modeled after him.

While the U.S.-made PortaBush software for handheld computers 
wasn't released with much fanfare last week, it became a big 
hit in China very quickly.

The software's American designers noticed a huge traffic spike 
Thursday coming from China, at one point reaching about 2,000 
downloads in an hour and threatening to overwhelm their servers.

"About 80 percent of the downloads were coming from China," 
Eruptor Entertainment President Brad Foxhoven said Friday. "We 
just got too much traffic in such a short period of time that 
wasn't letting up."

Released a week ago by Marina Del Ray, Calif.-based Eruptor 
Entertainment, the software toy is similar to the faded Tamagotchi 
craze. Players feed their PortaBush, keep him happy and help 
him make vital national decisions like whether to bomb teen singer 
Britney Spears.




Fwd: REQUESTED LINKS

2001-04-13 Thread denvertoken


Hello, 
I was just recently introduced to this company but within 2 weeks I was cashing my 
first check for over 1000 dollars! And two weeks later I received a check for even 
more.  Folks this company is blowing up right now! Remember Microsoft, and 
Amazon.com Givin the chance to get involved ground floor now, you would never pass 
it up but back then you may have as many did. 

DON'T LET THIS ONE PASS YOU BUY  YOU OWE IT TO YOURSELF TO AT LEAST TAKE A GOOD 
LOOK!

CLICK THE LINK BELOW
http://www.geocities.com/tellmemore1232/networkpage.html


OR... If you already found the company you call home, we offer custom leads qualified 
for your opportunity, every thing is 33% off this next week only! 
CLICK THE LINK BELOW
http://www.geocities.com/bemyguest421/leadpage.html










*
THIS EMAIL COMPLIES WITH ALL REGULATIONS.  TO BE REMOVED WITHIN 
24 Hours, SIMPLYEMAIL [EMAIL PROTECTED] FOR IMMEDIATE 
REMOVAL FROM ANY FUTURE EMAILS FROM OUR COMPANY.
*




Used Exercise Equipment

2001-04-13 Thread Notify

"ATTENTION Therapy Center Operators."
Join FREE 
--
Exercise Equipment for Physical Therapy, Rehabil-
itaion Centers. Save thousands of dollars on 'Gym' 
quality exercise equipment.  Get photo links, specif-
ications and all the information you need to save money.
--
Fitness Equipment On A 'Budget'
Get notified by email when Fitness Equipment is on 
sale. A 'Fitness Center' goes out of business or when
a huge Factory Closeout sale is going to take place.
--
Get: Treadmills, Stair machines, Elliptical trainers,
Exercise bikes, UBE ergometers. Weight lifting machines.
--
Many valuable resources will be sent to you by email.
--
   Dealers Welcome
--
To join this FREE 'Notification Service' click here.
http://www.LegalNotification.org/submit.php
--
Someone has subscribed you to receive this 
information. To unsubscribe click this link 
http://www.LegalNotification.org/remove.php
(Do not click "reply" to be removed)
--



  



mail forwarders

2001-04-13 Thread Public Anonymous_Account

There's a good smtp forwarder at 127.0.0.1

At 02:36 AM 04/13/2001 -0500, Charles wrote:
hello cyberpunks,

I want to know if yo know a good free( or low cost) bulk email program to
send massive email or a good SMTP  servers to can send many emails
without problems, what you recommend me? or if you want to recommend me
something?

charles.





Re: Cypherpunks, Feds, and Pudgyfaced Voyeurism

2001-04-12 Thread arcanum

Quoting Ray Dillinger [EMAIL PROTECTED]:
 On Wed, 11 Apr 2001, Declan McCullagh wrote:
 
 
 It's all so sad and predictable and sad again. The cypherpunks list
 had its glory days: Wired magazine cover stories, blossoming
 technology, and, yes, even those damnable tentacles. Now it's become
 a
 convenient way for the Feds to land convictions.
 
 Perhaps it is time to consider a new and different mailing 
 list which accepts messages ONLY from remailers.  It would 
 be publicly archived and unmoderated just as cypherpunks is, 
 and monitored by the lions just as cypherpunks is, but now 
 that the thought-crime laws are setting in full force, it 
 could provide a forum where there wouldn't be such a simple 
 evidentiary chain from post to poster. 

But how are we going to filter Choatian messages?




Re: Cypherpunks, Feds, and Pudgyfaced Voyeurism

2001-04-12 Thread Dr_Strangelove

Unindictedcoconspiritors? Tentaclenet? Targetzone? Shootmeplease?

-- DS

"Y'know, if the earth were flat, all the Chinese would fall off..."
 -- Firesign Theatre





One produces an access device by designing it..

2001-04-12 Thread Norm D'Plume

Found this.  Its a model jury instruction re counterfeit access
devices.  Interesting
thing is that mere 'design' supposedly counts (see near bottom).

 [How do you show 'fraud' when all you have is a napkin with a design?]

Ninth Circuit Model Criminal Jury Instructions
   8.68 COUNTERFEIT ACCESS DEVICES—
   PRODUCTION, USE, OR TRAFFICKING
(18 U.S.C.  1029(a)(1))

The defendant is charged in [Count ___ of] the indictment with
[production of] [use of] [trafficking in] [a]
counterfeit access device[s] in violation of Section 1029(a)(1) of Title
18 of the United States Code. In order
for the defendant to be found guilty of that charge, the government must
prove each of the following elements
beyond a reasonable doubt:

First, the defendant knowingly [used] [produced] [trafficked in] a
counterfeit [access device] [specific type
device, e.g., card number, plate number, code number, account number,
personal identification number,
etc.];

Second, the defendant acted with intent to defraud; and

Third, the defendant's conduct in some way affected commerce between one
state and [an]other state[s], or
between a state or the United States and a foreign country.

An "access device" means any card, plate, code, account number,
electronic serial number, mobile identification
number, personal identification number, or other telecommunications
service, equipment, or instrument
identifier, or other means of account access that can be used, alone or
in conjunction with another access
device, that can be used alone or in conjunction with another access
device, to obtain money, goods, services, or
any other thing of value, or that can be used to initiate a transfer of
funds (other than a transfer originated solely
by paper instrument).

[A "counterfeit access device" is any access device that is counterfeit,
fictitious, altered or forged, or an
identifiable component of an access device or a counterfeit access
device.]

[One "produces" an access device by designing it, altering it,
authenticating it, duplicating it, or assembling it.]

[One "traffics" in an access device by transferring it or otherwise
disposing of it to another, or by obtaining
control of it with intent to transfer or dispose of it.]

http://207.41.19.15/web/sdocuments.nsf/dcf4f914455891d4882564b40001f6dc/bbf68d26da5ebee2882564ba007da0b0?OpenDocument




Re: How do we expect to even find them ...

2001-04-11 Thread Anonymous


How do we expect to even  find them, when they're using mixmasters to
remain anonymous? Do you know what a mixmaster is?   This is exactly the
problem.

from "Can hackers help stop child porn on the Net?"

I see now, this is why ICC is enlisting cypherpunks.

---
High Commissioner of the Cypherpunk Party
Enforcement Division

The target list for April 20 operation:

$M"#HAO'BGQ$K*!H^F-;@LT!4W3%DB'/"MC$07/5)%1KRREE6+BH:,Y#@[MQ
3USJ`0XP:8XYKJC\V$*6L%KI_%,HX5Y+[1;9_/5(FU_?0;-6VRJUY5"CF
M#SL;;QV?5!Q+XH3I-7Q^.;K01,FH#'NAWR#V2G)VT5O?I$\=MKGD6$C)Q
!H=MN:ZO.7%]_L@CJ_K35;'H[J73]FG[IZLF1]8+U6*/\!DGQ`38VOGL4@8
3=W^'%BHP6'XR,-)!T,G1.N%T2^"CAG3RL)L`D^L)3+IQJ=*LO(_R%
P@L]4B*5W8Q57/.!N%^O]GTZOQS3'86R2ULAU"'5)UU4CVKSG#%P[?'RF
;R)]_=%6!CGH4GP/CF`:\E^LN6KVPN%'G`(\9.E%A+.#_@$?E63YW@
O3A*W]0L$)*==N),`-C,S8*(,#TE6H?59X[!4?I43A6$-!^\LVH2\]9-NL
==`/\^GC8_T!UEJE'9O5`G,#O-)_%E\T+^9AW7P(E8BQ\`4@59#-5#AAJ8
2GY"=X/$A@DFS6_JME?PU=NG4$^1J*UP;4T%+A*"\:2,Z"P8O@2S[E9:A
7G[%.1C._/%TPA$:]HDNK?*P(O\+)H8%\TZ)E)(:9/:8Y;X24U'NV7AQ"@3
;"R''OSM%\@,[267:MK^)?%./*/\H,4N%R!_5D%@,0D)HX#_GPG.I?Z/.TA
A2*HD$OIB!4H$QN`.E,$"$8B`\!E+I1$P4$?#Z6+YE9I"D_MR=YCH!#0X
UDB(@9B4::+162)G%Q',@CN]Y2S=\!D@4M\]O-1H'Z'#2OB?(S__5WJ




Re: Cypherpunks, Feds, and Pudgyfaced Voyeurism

2001-04-11 Thread Ray Dillinger



On Wed, 11 Apr 2001, Declan McCullagh wrote:


It's all so sad and predictable and sad again. The cypherpunks list
had its glory days: Wired magazine cover stories, blossoming
technology, and, yes, even those damnable tentacles. Now it's become a
convenient way for the Feds to land convictions.

Perhaps it is time to consider a new and different mailing 
list which accepts messages ONLY from remailers.  It would 
be publicly archived and unmoderated just as cypherpunks is, 
and monitored by the lions just as cypherpunks is, but now 
that the thought-crime laws are setting in full force, it 
could provide a forum where there wouldn't be such a simple 
evidentiary chain from post to poster. 

Given the recent spate of events, and the fact that some forms 
of political speech now seem to be a crime, or at least grounds 
for legal harassment and admissible as evidence of other crimes, 
I will probably have to set up such a list -- more info when 
it's ready to accept posts.

The best name (cypherpunks) seems to be taken.  Hmm.  I will 
have to consider.  The naming of things is a ticklish business.

Bear




Re: Cypherpunks, Feds, and Pudgyfaced Voyeurism

2001-04-11 Thread Declan McCullagh

Hmm. Anyone know what are some extant web-to-email remailers,
and what Type I remailers exist?

-Declan


On Wed, Apr 11, 2001 at 06:43:10PM -0700, Ray Dillinger wrote:
 On Wed, 11 Apr 2001, Declan McCullagh wrote:
 
 
 It's all so sad and predictable and sad again. The cypherpunks list
 had its glory days: Wired magazine cover stories, blossoming
 technology, and, yes, even those damnable tentacles. Now it's become a
 convenient way for the Feds to land convictions.
 
 Perhaps it is time to consider a new and different mailing 
 list which accepts messages ONLY from remailers.  It would 
 be publicly archived and unmoderated just as cypherpunks is, 
 and monitored by the lions just as cypherpunks is, but now 
 that the thought-crime laws are setting in full force, it 
 could provide a forum where there wouldn't be such a simple 
 evidentiary chain from post to poster. 
 
 Given the recent spate of events, and the fact that some forms 
 of political speech now seem to be a crime, or at least grounds 
 for legal harassment and admissible as evidence of other crimes, 
 I will probably have to set up such a list -- more info when 
 it's ready to accept posts.
 
 The best name (cypherpunks) seems to be taken.  Hmm.  I will 
 have to consider.  The naming of things is a ticklish business.
 
   Bear




Tanner Tannerwatch

2001-04-11 Thread Ann Fibian

You can be sure that Tanner has learned all about the "TannerWatch"
website, and is hardly amused by it.

A public figure, on the taxpayer's dime no less, who is 'hardly amused'
by a collection of freely-obtainable documents, some of which were
written by his misguided admirers, and some by more astute observers?

Awww, poor widdle baby.

If you can't take the heat get out of the kitchen, boy.






















Re: Seth Finkelstein, reluctant cypherpunk?

2001-04-04 Thread Ray Dillinger



On Tue, 3 Apr 2001, Declan McCullagh wrote:


Obviously there are going to be some points of agreement. Seth is a liberal 
and a programmer who is going to like strong crypto, free speech (only the 
types the ACLU approves of, naturally), and so on. But on cases involving 
free trade, commercial speech, critiques of government regulation, Seth is 
an aggressive anti-cypherpunk and proud of it.

Huh?  That's like being for an atmosphere but against gravity.  
If there is strong crypto, then everybody, including traders, 
government critics, etc, is going to do whatever the hell they 
want to do with information.

Being in favor of something but against its consequences is a 
state of fundamental conflict, and people who hold such conflicted 
views are generally ignorable without loss of information in the 
long run. 

So if that's the case, why should we even care what he thinks? 
He's wrong, that's all. 

Bear




Re: How the Justice Department screws with a reporter

2001-04-03 Thread Anonymous


I found out that Worldtravel had moved my flight to a Tuesday departure 
that would get into the city that afternoon, *after* the proceedings had 
begun. That could (understandably) piss off the judge -- I'd be violating a

This is my worst nightmare.

We are ruled by infantile idiots.

Oh, the shame, the shame !




RE: DOJ steps up child porn fight, plan regulates digital cameras

2001-04-03 Thread David Honig

At 08:59 PM 4/2/01 -0700, Alan Olsen wrote:
On Mon, 2 Apr 2001, David Honig wrote:

 but while working
 for aol i remember companies trying to sell me on the concept of
'anti-porn'
 pic filtering software.  it worked by looking for a high percentage of
flesh
 tones in a pic.  
 
 Yeah but all that blue latex and black leather screws up the pinkfilter.
 To say nothing of the feathers, whipped cream, or blood.

Or that not all people are pink.

Yeah, if your porn-AI can parse
http://www.mccullagh.org/theme/dazzle-dancers.html
you're a better heurist than I.








 






  







No Subject

2001-04-03 Thread ptrei

ics.com
From: "Trei, Peter" [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
X-Orig-To: "'[EMAIL PROTECTED]'" [EMAIL PROTECTED]
Subject: RSA Conference Expo Free Passes
Date: Tue, 3 Apr 2001 16:39:37 -0400 
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2650.21)
Content-Type: text/plain
Approved: LISTMEMBER CPUNK

Sorry for the late notice, but I just found out that
the deadline for obtaining free passes has been
extended. 

While the website puts the free pass period as ending
a month ago, they are actually still available, but will
probably end today.

What: Expo section at the RSA Security 2001 Conference 
Where:  Moscone Center, San Francisco 
When: 9am-5pm 10-11 April 2001
How:   Regsiter at www.rsaconference.com

Peter Trei




Re: Seth Finkelstein, reluctant cypherpunk?

2001-04-03 Thread Eric Cordian

Declan writes:

 It's important for cypherpunks to understand why Seth Finkelstein has 
 (apparently) recently subscribed to the list. Seth is essentially an 
 anti-cypherpunk, someone who violently disagrees with free-market points of 
 view and has spent (a conservative estimate) hundreds of hours arguing 
 against them.

Thanks, Declan.  I think we've all figured that out by now.
 
"Libertarians are people who think the only legitimate function
 of police is to protect them from their slaves."
--Lots of People

Most people get sucked into Libertarianism because it sounds like the word
"liberty."  After learning more about it, and meeting real Libertarians,
they go "Icky-Poo" and run swiftly in the opposite direction.

Libertarians don't mind this, because most of them also feel the exact
same way about other Libertarians.

Libertarian "philosophy" provides no mechanism whatsoever for arguing that
there can't, for instance, be a death penalty.  Or that "child abuse"
should be defined by anything other than what the majority of non-children
think it is ok to do to kids.

I doubt you'll see any Libertarians protesting either when Sally Mann and
Jock Sturges are hauled off to the Sex Offender Re-Education Camp either.  
In fact, Libertarians are real good at letting everyone have whatever
rights they can personally defend, without anyone else lifting a finger.

Foo on Libertarians.  I have no use for them.  Can you imagine what
Libertarian foreign policy would look like, or a Libertarian space
program?

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"




RE: DOJ steps up child porn fight, plan regulates digital cameras

2001-04-02 Thread David Honig

At 05:55 PM 4/2/01 -0400, Phillip H. Zakas wrote:

ya know this does sound like an april fools joke (esp. the part about
encouraging the photographer to enter into counseling.) 

Particularly if you only ran across it Monday.  Got Mr. Bear, too.
There are some cute RFCs dated 1.4.x too.

but while working
for aol i remember companies trying to sell me on the concept of 'anti-porn'
pic filtering software.  it worked by looking for a high percentage of flesh
tones in a pic.  

Yeah but all that blue latex and black leather screws up the pinkfilter.
To say nothing of the feathers, whipped cream, or blood.









 






  







Join Shopping Investing Club...

2001-03-22 Thread Specialty Online Sales
Title: Join Shopping  Investing Clubs...





This is not Junk 
Mail. See our Anti-Spam Alert below...
This is an invitation for you to review the newest concepts in both Shopping and Investing. Visit our web site at SpecialtyOnlineSales.com and review these concepts to see if they fit into your style. Click on the link to seamlessly explore.


 

SHOPPING:

 

Each month SpecialtyOnlineSales.com will present a category of products (usually four to six items), direct from the manufacturer to you. There will be a limited quantity of these items available for a limited time. You can review and make a selection by clicking onto our store at Yahoo.com. Your purchase will be shipped directly to your home or office. Then, each month, we will send you an e-mail itemizing the newest selections.




 
 


INVESTING:

 

 
Are you an online investor? Do you want to gain an edge on the big boys? SpecialtyOnlineSales.com is a clearinghouse for an Investing Consortium. You still do all of your own investing and handle all of your own money, but you do it in consort with many other club members. SOS2001.net is a consortium of independent traders interested in maximizing their investment potential by acting as a collective block. Volume of trading can influence price and subsequent participation. Click on our site to review this newest concept.





 

ANTI-SPAM ALERT:

 

This e-mail invitation was sent to you because at some time you opted-into a list and asked to receive information on special offers. If this e-mail is not acceptable to you, please reply by clicking the link below and we will remove you immediately from any further mailings. Click here: SpecialtyOnlineSales.com





Re: PGP flaw found by Czech firm allows dig sig to be forged

2001-03-22 Thread Ray Dillinger



In article [EMAIL PROTECTED],
Declan McCullagh  [EMAIL PROTECTED] wrote:

   Pretty Good Privacy that permits digital signatures to be forged in
   some situations.
   
   Phil Zimmermann, the PGP inventor who's now the director of the
   OpenPGP Consortium, said on Wednesday that he and a Network Associates
   (NETA) engineer verified that the vulnerability exists.
   
   ICZ, a Prague company with 450 employees, said that two of its
   cryptologists unearthed a bug in the OpenPGP format that allows an
   adversary who breaks into your computer to forge your e-mail
   signature.

A "vulnerability" that requires the opponent to have write access 
to your private key in order to exploit?  

Okay.  What was PGP's threat model again?  I'd have sworn that this 
was squarely outside it.  

As far as I can tell, *NOBODY* offers security tools that offer real 
protection in the event your opponent has physical access to the 
machine. 

Bear




Re: PGP flaw found by Czech firm allows dig sig to be forged

2001-03-22 Thread dmolnar


 A "vulnerability" that requires the opponent to have write access 
 to your private key in order to exploit?  
 
 Okay.  What was PGP's threat model again?  I'd have sworn that this 
 was squarely outside it.  

Probably. Do you need only write access? What does that do for smart
cards - if anything?

-David




RE: PGP flaw found by Czech firm allows dig sig to be forged

2001-03-22 Thread Phillip H. Zakas


"...As far as I can tell, *NOBODY* offers security tools that offer real
protection in the event your opponent has physical access to the
machine...  Bear"

I completely agree.  Even if they didn't have access to the machine, losing
the private key is a huge problem.

I should point out a similar problem exists with microsoft's crypto api
(capi).  by replacing rsaenh.dll (and one other i could name later...details
are on my research laptop and not on this machine) one could dummy down
encryption or eliminate encryption control across all crypto api-compliant
applications (like ms outlook, explorer, etc.)  in fact this 'crack' is
simiar to the 'upgrade' ms offers users to go from 56 to 128 bit encryption.
interestingly, in order to gain export assurance for a crypto product, it's
usually enough to state that your product's crypto relies on the MS crypto
api.  this is because the ms crypto api architecture has already received an
"ok" for export (with caveats re: 128 bit encryption.)  i've been through
this process so I know the 'crack' and the export license information is
correct (as of one year ago anyway).

the most significant problem with pki, imho, is the fact one can't verify
the publisher of the key.  the public key could have been stolen/modified,
or the issuer of the key may not have verified the true identity of the
requestor.  i could, right now, buy for $14.95, a digital cert from verisign
claiming I'm napoleon bonaparte.  and it would be published in their digital
cert. directory as true.  ya know, i'm going to do that right now.

anyway, as many have already echoed here, gaining access to an adversary's
machine provides more interesting possibilities than simply modifying a
user's secret key.  i would hope the cnsa would try to be more creative than
that.

phillip


In article [EMAIL PROTECTED],
Declan McCullagh  [EMAIL PROTECTED] wrote:

   Pretty Good Privacy that permits digital signatures to be forged in
   some situations.

   Phil Zimmermann, the PGP inventor who's now the director of the
   OpenPGP Consortium, said on Wednesday that he and a Network Associates
   (NETA) engineer verified that the vulnerability exists.

   ICZ, a Prague company with 450 employees, said that two of its
   cryptologists unearthed a bug in the OpenPGP format that allows an
   adversary who breaks into your computer to forge your e-mail
   signature.

A "vulnerability" that requires the opponent to have write access
to your private key in order to exploit?

Okay.  What was PGP's threat model again?  I'd have sworn that this
was squarely outside it.

As far as I can tell, *NOBODY* offers security tools that offer real
protection in the event your opponent has physical access to the
machine.

Bear





E-Mail Marketing at its Best

2001-03-21 Thread america1





 PROMOTIONS OF AMERICA


 ENTERPRISES INC.


 


 IMPACT ADVERTISEMENT AT ITS BEST


 
 
 PROMOTIONS OF AMERICA ENTERPRISES INC. OFFERS AN EXCITING NEW WAY TO ADVERTISE YOUR PRODUCTS THROUGH THE INTERNET. EXCLUSIVE E-MAIL MARKETING DIRECT TO YOUR CONSUMER BASE. CHOOSE YOUR GEOGRAPHICAL LOCATION BY STATE OR CITY. HAVE US CREATE YOUR AD WITH COLOR AND FUNCTIONING HYPER LINKS. WE WILL SEND YOUR E-MAIL AD FOR YOUR BUSINESS.
ALL LISTS ARE OPT-IN INCLUDING OUR CONSUMER AND BUSINESS DATABASE.
 
 

 100,000 CONSUMER E-MAILS $550.00
300,000 CONSUMER E-MAILS$1100.00
  50,000 CONSUMER E-MAILS   $300.00 
 (LIMITED TIME OFFER)

 


 CALL FOR MORE DETAILS 1-877-970-1777



 

 TO BE REMOVED FROM THIS E-MAIL LIST TYPE REMOVE IN THE REPLY TO BOX

 


 

 

 





Re: PGP flaw found by Czech firm allows dig sig to be forged

2001-03-21 Thread Nikita Borisov

In article 99b89r$lgd$[EMAIL PROTECTED],
Ian Goldberg [EMAIL PROTECTED] wrote:
If p is wrong, the result S' will be correct mod q but incorrect mod p.
so S' ^ e mod q = M mod q, but S' ^ e mod p != M mod p.

Therefore GCD(S' ^ e mod n, M) = q, and we're done.

I think you meant GCD((S'^e mod n)-M, n) = q.  I don't think what you
said is true, since q does not necessarily divide M.

- Nikita




Re: PGP flaw found by Czech firm allows dig sig to be forged

2001-03-21 Thread Ian Goldberg

In article [EMAIL PROTECTED],
Declan McCullagh  [EMAIL PROTECTED] wrote:


http://www.wired.com/news/politics/0,1283,42553,00.html
   
   Your E-Hancock Can Be Forged
   by Declan McCullagh ([EMAIL PROTECTED])
   10:20 a.m. Mar. 21, 2001 PST
   
   WASHINGTON -- A Czech information security firm has found a flaw in
   Pretty Good Privacy that permits digital signatures to be forged in
   some situations.
   
   Phil Zimmermann, the PGP inventor who's now the director of the
   OpenPGP Consortium, said on Wednesday that he and a Network Associates
   (NETA) engineer verified that the vulnerability exists.
   
   ICZ, a Prague company with 450 employees, said that two of its
   cryptologists unearthed a bug in the OpenPGP format that allows an
   adversary who breaks into your computer to forge your e-mail
   signature.

Of course, if someone can modify your private keyring, I'd suspect your
TCB is toast.  (Unless you're in the habit of shipping your private keyring
around the Internet.)

For the interested, this is my guess at the attack.

Modify the encrypted value of p, somewhere near the middle.
When decrypted, depending on the chaining mode, it's possible that
only a couple of blocks of p will be mangled, and the remainder
of the private key file will decrypt successfully.  Here's where
PGP fails to do a MAC to verify integrity of the data.

Then, it behaves just like DFA (Differential Fault Analysis).
The idea is that to calculate a signature M^d mod n, we calculate
M^d mod p and M^d mod q, and use the CRT to combine them to S = M^d mod n.

If p is wrong, the result S' will be correct mod q but incorrect mod p.
so S' ^ e mod q = M mod q, but S' ^ e mod p != M mod p.

Therefore GCD(S' ^ e mod n, M) = q, and we're done.

   - Ian




Natural And Wonderful

2001-03-21 Thread firebart
SWEET 
SENSATIONS ! (tm) 
The #1 BEST SELLING  100% ALL 
NATURAL APHRODISIAC IN AMERICA!   - HARDCOPY 
EPISODE- "The Story you 
have been waiting for that's making men and women go wild!  Men and Women 
who are taking this powerful little natural pill are loving what it's doing to 
their libido!"  - 
EYEWITNESS  NEWS -  
"Americas Number 1 Natural Love Pill and It's Selling Like Hot Cakes!" 
 For more details please  CLICK HERE  To be Removed please Hit Reply and Put REMOVE in 
the subject line. 
  
 



GOT INK ?? 6703

2001-03-20 Thread simon1

GOT INK? Free Bonus Ink Offer for your Inkjet Printer


*ATTENTION ALL COMPUTER USERS*

Tired of paying $20, $30, $40 or even $50 for inkjet cartridges?
Tired of your printer running out of ink AGAIN?
Tired of running from store to store looking for the right cartridge?
Tired of having to wait until morning to get your printer working?

Just Tired of being Tired?

IT'S NOT YOUR FAULT THERE IS A SOLUTION!!

Throwing away the cartridge when you run out of ink is like throwing away
your car when you run out of gas! Don't throw your CASH in the trash!!!

*Refill your Ink Jet*

It works on any type of inkjet printer,any

printer, any brand, any C O L O R

With Our refill kit you get all the ink  tools you need to refill your inkjet

cartridge up to 10 times. Our refill is fast, easy  simple to use.

Your Ink Jet Refill Kit includes:

1 Bottle of Black ink.
1 Bottle of Magenta ink
1 Bottle of Cyan ink
1 Bottle of Yellow ink
All the tools you need
A detailed instruction booklet
Also a Tutorial CD

A Toll Free 800# for your use with live 24 hour per day, 5 day per week.

Technical assistance
All this for only

$29.95+SH

Be one of the first 1000 orders in this promotion receive a free bonus bottle of Black 
Ink

*ABSOLUTELY FREE*

Call toll-free (800) 346-5421

Change your life for the better.

Our friendly order line representatives are available 24 hours per day 7 days per week 
for
your convenience.

Your Ink Jet Refill Kit comes with a 30-day money back guarantee, so remember with
Ink Jet Refill you're not buying it, you're trying it

Call toll-free (800) 346-5421

And start saving time   today





Rated Strong Buy

2001-03-20 Thread heatherl26
Title: Untitled Document





  

  For
The Serious Investor 
News Flash: Important Press Release 
THIS IS A STOCK TO PURCHASE! 

  


  

  March 20, 2001 

  


  
Symbol
LIQD (OTCBB)
  
  
 Shares Outstanding
9,000,000
  
  
Float
2,100,000
  
  
Recent Price
 $0.32
  
  
52 Week High
$2.62
  
  
Target Price
$2.25
  


  

  The Market:We belive that the nasdaq
has done a full turn since dec 1998 has totally bottomed and ready to
catapualtand . Historically speaking the small-cap stocks have made a
faster and quicker recovery and we belive we have a great opportunity
at hand right now.

THE OPPORTUNITY:The stock that we are currently recommending
is (OTCBB: LIQD) Liquidics, Inc. With two divisions creating products
in the high-growth semiconductor market, Liquidics, Inc. is a front-runner
in microchip design and manufacturing and if the stock goes back to its
52 week high, we have a 700% return on our money.

Liquidics, Inc.industrial divisions is currently marketing magnetic fluids,
created in the sixties under the sponsorship of NASA, to semiconductor
manufacturing industry.

Their consumer product division is producing a new generation of improved
performance shock absorbers for offroad vehicles using techology developed
by the company's very heralded RD team. 

  

  
FOR MORE INFORMATION
   
  CLICK HERE
  

  
  

  

 To be removed CLICK
  HERE 












Click to win $100K (53591)

2001-03-19 Thread [EMAIL PROTECTED]

!!! News Flash !!!

Online CASINO at http://www.desirescasino.com is giving away FREE $ 10 in Casino CHIPS 
to every signup.
Signup here and explore your chance to win $100,000 !!!

CNDC Reporter Julia Rogers reported that this casino is backed by a huge investment 
company and is extremely credible. Desires Casino is 
the winner of Best Casino and Most Recommanded online Casino in various reviews.

They have specials running for everyone from March Madness basketball gamblers to 
Blackjack/Poker/Craps/Roulette/Slots players.
They also have 20 odd other games like Keno, Video Poker etc. in NO DOWNLOAD JAVA 
FORMAT.

There toll free number is 1-888-527-2982 and their website is 
http://www.desirescasino.com

We recommend you check them out!


You have received this email because you have requested to receive sport and gaming 
information
Please reply with REMOVE in the subject line to unsubscribe from the list

10978




Subscribe

2001-03-17 Thread john . medved

SUBSCRIBE
Free, encrypted, secure Web-based email at www.hushmail.com


Re: What is the recommended variant of PGP.

2001-03-17 Thread David E. Smith

On Sat, 17 Mar 2001, Alan Olsen wrote:

 Gnu Privacy Guard is an Open Source PGP replacement.

 I have not examined interoperability with older versions of PGP though.
 (I will be doing that soon though.)

The short version is this: GPG will work more-or-less transparently with
PGP 5.x and 6.x, at least for all versions I've played with (most of 'em).
It won't play nicely with PGP 2.6.x (or, AFAIK, any older version).

...dave




Now if Gilmore would provide an open phone relay...

2001-03-16 Thread George

UniBlab ran up a $500 LD bill using my calling card.
The little darling.



http://www.securityfocus.com/news/172
#
#Spam war gags Gilmore
#
#Verio cuts off EFF co-founder John Gilmore over open mail server. 
#By Kevin Poulsen March 15, 2001 5:19 PM PT
#
#Aggressive anti-spam measures by Dallas-based ISP Verio have 
#stripped some of the Internet's digerati of the ability to send 
#email, and EFF co-founder John Gilmore is calling it censorship.
#
#Gilmore's home network includes what anti-spam crusaders call 
#an "open relay" -- a mail server that accepts and forwards email 
#from anyone. For decades, the practice was considered central 
#to good network citizenship. But in recent years, spammers have 
#begun hijacking open relays to multiply, sometimes a thousand 
#fold, the number of junk messages they can send at once.
#
#That abuse sparked a campaign by anti-spam activists to close 
#the open relays, a campaign that Gilmore, an entrepreneur, 
#electronic civil libertarian, and co-founder of the Electronic 
#Frontier Foundation (EFF), has little use for.
#
#"It reminds me of the X-ray machines they have in airports and 
#the security checks they put people through," says Gilmore. "It 
#doesn't actually solve the problem, it just infringes on the 
#rights of the innocent."
#
#Even as commercial ISPs began tightening down their mail servers 
#-- rejecting outgoing mail from non-subscribers, and forcing 
#subscribers to electronically prove their identity before sending 
#mail -- Gilmore kept his own mail server open to the world, a 
#service he says his friends have come to rely on.
#
#"Part of the reason my friends are using my machine is their 
#own ISPs' anti-spam measures prevent them from sending email 
#as they move around in the world," says Gilmore. "If one user 
#connects to my machine from an unknown address and sends a 
#message, my machine forwards it on. It's happy to. That could 
#be John Perry Barlow sending email from Africa to his girlfriend."
#
#Gilmore says he shuts down spammers when he detects them, but 
#acknowledges that some junk mail gets through his system. Late 
#last month, one such spam message -- from a would-be entrepreneur 
#offering professional spamming services to the public -- resulted 
#in a complaint to Gilmore's ISP, Verio, from an anti-spam group.
#
#Verio's sweeping acceptable-use policy prohibits open relays. 
#When Gilmore refused to put fetters on his mail server, the 
#company's security department slapped a filter on Gilmore's T1 
#net connection Wednesday, blocking outgoing email from his 
#network.
#
#A Verio spokesperson did not return a telephone call Thursday. 
#Verio security team leader Darren Grabowski declined to comment. 
#"What we do is between us and our customer," said Grabowski.
#
#Anti-spam pressure Gilmore believes anti-spam efforts have gone 
#too far, and impact the rights of innocent people. "Verio is 
#filtering me because they were pressured by a pressure group, 
#and they don't have enough intelligence to stand up against that 
#pressure."
#
#But the head of the anti-spam business that forwarded the 
#complaint to Verio last month says the ISP did the right thing.
#
#"It's been a very long time since open relays were considered 
#acceptable on the net," says Julian Haight, owner of SpamCop.net. 
#"On today's Internet, things have changed considerably."
#
#SpamCop.net lets netizens easily and automatically track and 
#report spammers and open relays, and maintains a blacklist of 
#network addresses the company considers spam-friendly. Haight 
#acknowledges the influence his organization, and other anti-spam 
#efforts, can exert on an ISP, but he says no one has a right 
#to operate a service that lends a hand to spammers.
#
#"Freedom of speech is not 100 percent," says Haight. "You're 
#not allowed to come into my home to preach to me... Open servers 
#are responsible for making copies of unsolicited commercial emails 
#and sending it to people who don't want it."
#
#Gilmore argues that by making decisions about what to allow or 
#disallow over their network, ISPs risk losing the common carrier 
#status that protects them from legal liability for their 
#customer's actions.
#
#"Ultimately, they should be a pipe. They shouldn't care what 
#content goes through. For them to say, well, we'll send your 
#IP packets... except when you send this particular type of IP 
#packet, it takes them out of the realm of a common carrier," 
#says Gilmore. "That puts the entire Internet in jeopardy."



6/13/2000 Hannity  Colmbes, Representive Dan Burton, giving his
URL to where he put 

Re: firewall

2001-03-16 Thread Sampo Syreeni

On Thu, 15 Mar 2001, cory ertle wrote:

I want to see if my girl is cheating on me by hacking into her e-mail
account at school. Now i know enough about here to bypass her pass pretty
easily but i however don't know the best way to go about getting to her
account.

I would suggest social engineering, but in this case...

Sampo Syreeni [EMAIL PROTECTED], aka decoy, student/math/Helsinki university




loverscaughtontape.com First Amendment Woes

2001-03-16 Thread Matthew Gaylor

[Note from Matthew Gaylor:  loverscaughtontape.com are the producers 
of the most successful selling adult titles worldwide.  If you're 
easily offended or are not legally able to view adult only material, 
don't click on their link.  Eric [EMAIL PROTECTED] who owns 
loverscaughtontape.com and who subscribes to Freematt's Alerts, was 
kind enough to send me me a box full of their DVD's and videos.  Eric 
has appeared on the Howard Stern show and The New York Times did an 
article recently on what happens when an adult business gives money 
to a charity, in this case St. Jude's Children's Hospital in Memphis. 
St. Jude didn't like it when loverscaughtontape.com posted their 
thank you letter on their website.  BTW, the videos are just what 
you'd expect-  People having sex, while being filmed by surveillance 
cameras.]


Date: Tue, 06 Mar 2001 10:08:49 -0800
From: Eric [EMAIL PROTECTED]
Subject: On-topic?
To: Matthew Gaylor [EMAIL PROTECTED]

Hey Matt-

LOVE Freematt's Alerts; please keep it coming.

This may be a little off your beaten path, but it has affected us 
strongly, and I believe there's a first-amendment issue here. We run 
an adult site (well, more a 'risque' site), and had a good year - 
then donated some money to charity, and being very self-satisfied, 
linked to the charities from our site. They got wind of it (because 
of rants from some religious-righties we were battling with), and 
threatened to send the legal goon squads after us. The story is here:

http://www.loverscaughtontape.com/nytimes.html

A fan of ours entered the fray also:

  http://www.tdavis.org/stjude/

I hope you find it suitable to run, but thanks either way!

Best,

Eric

**
Subscribe to Freematt's Alerts: Pro-Individual Rights Issues
Send a blank message to: [EMAIL PROTECTED] with the words subscribe FA
on the subject line. List is private and moderated (7-30 messages per week)
Matthew Gaylor, 2175 Bayfield Drive, Columbus, OH 43229
(614) 313-5722  ICQ: 106212065   Archived at http://groups.yahoo.com/group/fa/
**




Re: Paternity tests [was: WSJ: NSA Computer Upgrade]

2001-03-15 Thread Trei, Peter

 John Young[SMTP:[EMAIL PROTECTED]]
 
 Men usually got a hangup about paternity, and
 many don't want to know the truth, so the 28% is
 surely way low, in particular to protect the kids and
 the wives and to keep the men in harness. Them's 
 the facts of biology and culture and healthy
 workplace economies.
 
[...]

 Never, ever have your blood tested, nor your brain.
 Keep your head up where the sun don't go. Read
 the papers, call what you see lies, distortions of
 your motherless bastardy.
 
The Bard dealt with this issue, as he did so
many others:

 Pedro. You embrace your charge too willingly: I 
thinke this is your daughter.
  Leonato. Her mother hath many times told me so.
  Bened. Were you in doubt that you askt her?
  Leonato. Signior Benedicke, no, for then were you a
childe.
  Pedro. You haue it full Benedicke, we may ghesse by
this, what you are, being a man, truely the Lady fathers
her selfe: be happie Lady, for you are like an honorable
father.
  Ben. If Signior Leonato be her father, she would not 
haue his head on her shoulders for al Messina, as like him
as she is.

- Much Ado About Nothing, Actus primus, Scena prima

... and he here also points out why many men don't 
bother with testing - family resemblence is convincing
enough. I have two daughters. One is the image of my 
sister as a child, and the other looks so much my 
mother did at that age that people mistake childhood 
photos of one for the other.

In the absence of any particular reason for doubt, blood
tests would be a waste of time and money.

Peter Trei




RE: WSJ: NSA Computer Upgrade

2001-03-15 Thread Ray Dillinger



On Thu, 15 Mar 2001, David Honig wrote:

The motivation for this is that the legals have decided
that supporting the children is more important than
fairness.  Its that simple; some legals will even admit it.

"Fairness" is such a slippery word.  Is it fair for a child 
to have no support available?  Remember, it's not because of 
anything the child did. 

I think the criterion here is that the adult is more capable 
of coping with the unfairness than the child, hence in a 
situation where you have to be unfair to one or the other, 
you favor the child's interests over the adult's.

There are similarly motivated restrictions on how much you can deny your
spouse when you die.

This one I don't hang with.  Your spouse is presumably an adult, 
and ought to be able to cope with not getting the estate.  

But that certainly doesn't stop it from being a serious shitheel 
type maneuver to leave your spouse in the lurch when you go, and 
since you're dead at that point you don't really have that much 
of a compelling interest in the estate any more...  

But anyway, this has little to do with crypto...

Bear





Email Address Extract Expert from Internet

2001-03-15 Thread [EMAIL PROTECTED]


[ This is  the last email to you. After you receive this mail,
 your email has been remove from our mailing list .  ]
 
Recommend Software:
   Email Spider Easy 
   -Targeted Email Address Extract Software.
http://www.emailspidereasy.com

  
Key Features: 
1 It is very simple and easy to use. 

2 Search and Spider from a starting url such as web url, search engine,
  message board to extract bulk email addresses. Nearly can spider 
  any  web url, including search engine, newsgroup, message board. 

3 Integrate with 18 top search engines and directories such as Yahoo,
  Google, Altavista, AOL, MSN, Lycos, Alltheweb, Hotbot, Mamma, 
  Northernlight, Directhit, Go,Iwon. 

4 Search and Extract speed is very fast. 
  Allow up to 500 threads to search and extract emails  simultaneously.

5 Simple config some parameters to specify which email address is
   you want and which not.  And which urls not need to search
 
6 Both Web and Url are extracted.

For more info,please access url:  http://www.emailspidereasy.com




RE: WSJ: NSA Computer Upgrade

2001-03-14 Thread John Young

It is likely that a principal reason for the new NSA system is
to be able to more efficiently spy on its users, as with intelink,
siprnet and niprnet -- and our own beloved Internet whose
users and hackers know not what is being logged. 

Counterintelligence has become a more important function 
of the intel agencies than intelligence, as with corporations, 
educational institutions and families who face internal attacks.

Exposing threats to kids, church and nation is a hot market.
Counterintelligence in all its forms is riding high as a savior
of the commonweal.

Still there are dark sides to knowing the truth.

The reports of DNA evidence showing that up to 28% of 
fathers are not the biological fathers of children for whom they
are legal parents is a reminder that revisionist intelligence is 
not limited to the spooks as data mining becomes more 
widely available.

And what will come of government as it becomes more
subject to internal attacks due to greater access to snooping
technology and counter-snooping attempts to hold onto
the privilege of knowing what underlings do not?

Deutch thought he knew why it was wise to work at home, 
to avoid the counter-snoops watching him, but the 
counter-snoops knew what he did not -- they work for
themselves not the bosses.

Sys admins may well become the power mongerers of
the future, or is that already the case. Hayden is dreaming
if he thinks he will be able to watch his troops without 
their knowing and counteracting it.

What is worrisome is the prospect of a coup by the 
info hi-technoids, most of who work for the military or 
have contracts with them -- out contracts.

SAIC, BBN, Mitre, RAND, the telecomms, the satcomms,
operators of the thick connections worldwide, coupled
with the wizards at the NSA, NRO, USAF, DIA, and so,
could put on a formidable putsch, while the oversight
committees remain, as ever, three monkied.





Re: the link doesn't work......

2001-03-13 Thread Declan McCullagh

We would be delighted to help you for our usual consulting fees.

-Declan


On Tue, Mar 13, 2001 at 07:54:18AM -0500, [EMAIL PROTECTED] wrote:
 I was trying to check out the link on your "code cracking" page maybe you 
 could help me. I was trying to find out if this is a page containing info. on 
 how to "crack codes" if it is, or if you have some info for me regarding 
 "code cracking" e mail me back and let me know. thanx...
 




biochemwmdterror in DC today

2001-03-13 Thread Declan McCullagh


HOUSE SELECT INTELLIGENCE COMMITTEE Terrorism Briefing Full committee 
Speaker's Working Group on Terrorism holds briefing on intelligence 
matters. Location: H-405 U.S. Capitol. 12;30 p.m. Contact: 202-225-4121 
http://www.house.gov/select **NEW/CLOSED**




fun with the CIA

2001-03-13 Thread Declan McCullagh

Speculation over why aliens would want to observe us:
http://www.foia.ucia.gov/scripts/cgiservlets/NavigatorServlet.pl?docNumber=44116partNumber=2method=generateFrameSettotalNumber=2

CIA reports on Russian police scrambling over UFO sighting:
http://www.foia.ucia.gov/scripts/cgiservlets/NavigatorServlet.pl?docNumber=98713partNumber=2method=generateFrameSettotalNumber=2

CIA report on Barbados sighting:
http://www.foia.ucia.gov/scripts/cgiservlets/NavigatorServlet.pl?docNumber=43362partNumber=2method=generateFrameSettotalNumber=2

CIA summarizes news articles on UFOs in ancient China:
http://www.foia.ucia.gov/scripts/cgiservlets/NavigatorServlet.pl?docNumber=42351partNumber=1method=generateFrameSettotalNumber=4




WSJ: NSA Computer Upgrade

2001-03-13 Thread Bill Stewart

NSA COMPUTER UPGRADE - [The Wall Street Journal, B1.]  What does it take to
send an e-mail to all 38,000 employees at the government's premier computing
center, the supersecret National Security Agency?  "An act of God," says the
agency's director since 1999, Lt. Gen. Michael Hayden.  The NSA, he
discovered to his chagrin last year, has 68 e-mail systems.  He has three
computers on his desk - none of which can communicate with the others.  To
deal with those frustrations, Hayden is now plunging into one of the U.S.
government's biggest information-technology outsourcing deals ever.  More
than 15 companies, including ATT, Computer Sciences, IBM, General Dynamics
and OAO, have formed three teams to compete for a contract set to be valued
at as much as $5 billion over 10 years.  Requests for proposals went out
last week; the winner will be chosen by July.  Project Groundbreaker, as the
job is called, will be a curious venture by any measure.  The winning
consortium will take over running the NSA's office-technology
infrastructure, including thousands of desktop computers and a Medusa-like
tangle of software and internal communications systems.  Hayden describes
the current setup as "anarchic, convoluted and complex."  It is a holdover
from the days when the NSA, for security reasons, was broken into dozens of
sealed-off compartments.  Each bought its own computers, developed its own
software and built its own networks, intentionally cut off from the rest of
the organization.  Hayden now wants to open the place up, at least
internally.  Whoever wins the Groundbreaker contract will have to meld the
current mess into one seamless network, so that for the first time the
agency can move around top-secret files as any company would, but without
fear of an external security breach.  If Groundbreaker succeeds, industry
experts predict it could set off a wave of other big outsourcing deals
within the federal government.  Likely next candidates include the
departments of Energy and Defense, and even the Central Intelligence Agency.
"This will set the standard for how all similar deals proceed," says Thomas
Robinson, president of CSC's Defense Group, which is leading one team that
also includes General Dynamics and Verizon.  The leaders of the other two
competing consortia are ATT and OAO.




Re: cypherpunks - Make $2000 a Week -ATES

2001-03-12 Thread Andrew Alston



On Mon, 12 Mar 2001, EarnMor wrote:

 Over the last couple weeks I've been telling you about a unique way to earn up to or 
over $2000 a 
 week with minimal effort on your part.  All you need to do is advertise our 
toll-free number, and 
 our professional sales staff will take care of the rest.  And they pull in about 20% 
of all calls 
 received as sales for you.  Think of the possibilities!
 
 - No Selling
 - No Talking to Anyone
 - No Inventory
 - No Monthly Purchases
 - No Hassles
 - Weekly Checks
 
 Your weekly checks will be delivered faithfully to your home, made up of $100 per 
direct sale, and 
 $50 for each sale made by someone in your downline.  Once you start, your weekly 
income just 
 keeps rising!
 
 But that's not the only reason to join.  Even if you're not interested in the 
business opportunity 
 (but why wouldn't you be?!!), the opportunity to join this discount club is too good 
to pass up.  
 Everyday items like groceries and film are discounted, along with larger, more 
occasional 
 purchases.  In itself, this membership is worth it.  Go to my web site TODAY and 
find out more!
 
 http://www.earnmor.com/5131
 
 
 




Re: Toy gun ban: This is pleasantly insane

2001-03-12 Thread drevil

 Such replicas can be bought in shops or by mail order and are frequently used
 by criminals.
 
 The minister said replicas posed a "real threat" to society. 

I would have thought that they posed a "replica of a real threat" to
society.




RE: Toy gun ban: This is pleasantly insane

2001-03-12 Thread Alan Olsen

On Mon, 12 Mar 2001, Phillip Hallam-Baker wrote:

 
  Next thing you know, it will be considered assault to hold your finger
  like a gun and say "bang".  (If it is not already.)
 
 Try it in Heathrow airport and you will get ten years.

Airports are already a "no humour zone", so that is to be expected...

  Zero tollerance requires a zero IQ.
 
 So with Dufus in the Whitehouse zero tollerance in the US will be comming
 soon.

When Bush Sr. was running for office many people voted for Clinton because
"anyone was better".

They were wrong.

History repeated itself in some sort of sick self-referential joke.

I expect that the coming Ashcroft years will make us look back fondly at
the Meese and Reno days.

[EMAIL PROTECTED] | Note to AOL users: for a quick shortcut to reply
Alan Olsen| to my mail, just hit the ctrl, alt and del keys.
"In the future, everything will have its 15 minutes of blame."




corporate espionage

2001-03-10 Thread Becky

Read your article.  Most of the examples involve pharm companies.  I am
interested in examples that involve a prime companies that have an
outsourcing relationship.  Any thoughts?


begin:vcard 
n:Busch;Rebecca 
tel;cell:630-816-3648
tel;fax:630-574-2755
tel;work:630-574-2756
x-mozilla-html:FALSE
org:MBA Inc.
adr:;;1301 West 22nd street Suite 215;Oak Brook;IL;60523;
version:2.1
email;internet:[EMAIL PROTECTED]
title:CEO
note;quoted-printable:Note:  The information contained in this message may be privileged and confidential=0D=0A and protected from disclosure.  If the reader of this message is not=0D=0A the intended recipient, or an employee or agent responsible for=0D=0A delivering this message to the intended recipient, you are hereby=0D=0A notified that any dissemination, distribution or copying of this=0D=0A communication is strictly prohibited. If you have received this=0D=0A communication in error, please notify us immediately by replying =0D=0Ato the message and deleting it from your computer.  Thank you.=0D=0A***=0D=0A
fn:Rebecca Busch, RN, MBA, CCM, CFE, FHFMA,
end:vcard



Re: corporate espionage

2001-03-10 Thread Jim Choate


Hi Becky,

Which if the several hundred subscribers to the 8+ CDR nodes and
potentialy thousands of associated webpages might you be refering to?

You seem to have a fuzzy understanding of the concept 'mailing list'.

On Sat, 10 Mar 2001, Becky wrote:

 Read your article.  Most of the examples involve pharm companies.  I am
 interested in examples that involve a prime companies that have an
 outsourcing relationship.  Any thoughts?



Liberty means responsibility. That is why most men dread it.

   Locke

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   -~~mm-'`-```-mm --'-





Re: corporate espionage

2001-03-10 Thread Becky

I was doing an internet search on cor esp.  your article was on my hit list.
At this point I cannot recall the page.  Are you the right person for the
subject?

Jim Choate wrote:

 Hi Becky,

 Which if the several hundred subscribers to the 8+ CDR nodes and
 potentialy thousands of associated webpages might you be refering to?

 You seem to have a fuzzy understanding of the concept 'mailing list'.

 On Sat, 10 Mar 2001, Becky wrote:

  Read your article.  Most of the examples involve pharm companies.  I am
  interested in examples that involve a prime companies that have an
  outsourcing relationship.  Any thoughts?

 

 Liberty means responsibility. That is why most men dread it.

Locke

The Armadillo Group   ,::;::-.  James Choate
Austin, Tx   /:'/ ``::/|/  [EMAIL PROTECTED]
www.ssz.com.',  `/( e\  512-451-7087
-~~mm-'`-```-mm --'-
 


begin:vcard 
n:Busch;Rebecca 
tel;cell:630-816-3648
tel;fax:630-574-2755
tel;work:630-574-2756
x-mozilla-html:FALSE
org:MBA Inc.
adr:;;1301 West 22nd street Suite 215;Oak Brook;IL;60523;
version:2.1
email;internet:[EMAIL PROTECTED]
title:CEO
note;quoted-printable:Note:  The information contained in this message may be privileged and confidential=0D=0A and protected from disclosure.  If the reader of this message is not=0D=0A the intended recipient, or an employee or agent responsible for=0D=0A delivering this message to the intended recipient, you are hereby=0D=0A notified that any dissemination, distribution or copying of this=0D=0A communication is strictly prohibited. If you have received this=0D=0A communication in error, please notify us immediately by replying =0D=0Ato the message and deleting it from your computer.  Thank you.=0D=0A***=0D=0A
fn:Rebecca Busch, RN, MBA, CCM, CFE, FHFMA,
end:vcard



Re: corporate espionage

2001-03-10 Thread Jim Choate


Ok, let me say this again

You are sending a note to a distributed mailing list. It has 8 core nodes
with each node hosting their own set of independent subscribers. The total
number of subscribers is potentaily several hundred. You are acting like
you're sending a note to an individual. You are NOT. I happen to be the 
operator of the ssz.com node and I'm trying to get you to understand that
you're request is worthless as worded. ssz.com is NOT the same computer
(not even in the same state) as cyberpass.net. We simply share cross-feeds
on our traffic.

If you would like more info as to why, please visit:

http://einstein.ssz.com/cdr

The Cypherpunks are a group of people discussing cryptography, civil
liberty, and economics. If you're question is in one of those areas then
feel free to expand upon your problem. If not you should probably go
someplace else.

On Sat, 10 Mar 2001, Becky wrote:

 I was doing an internet search on cor esp.  your article was on my hit list.
 At this point I cannot recall the page.  Are you the right person for the
 subject?
 
 Jim Choate wrote:
 
  Hi Becky,
 
  Which if the several hundred subscribers to the 8+ CDR nodes and
  potentialy thousands of associated webpages might you be refering to?
 
  You seem to have a fuzzy understanding of the concept 'mailing list'.
 
  On Sat, 10 Mar 2001, Becky wrote:
 
   Read your article.  Most of the examples involve pharm companies.  I am
   interested in examples that involve a prime companies that have an
   outsourcing relationship.  Any thoughts?



Liberty means responsibility. That is why most men dread it.

   Locke

   The Armadillo Group   ,::;::-.  James Choate
   Austin, Tx   /:'/ ``::/|/  [EMAIL PROTECTED]
   www.ssz.com.',  `/( e\  512-451-7087
   -~~mm-'`-```-mm --'-





No Subject

2001-03-10 Thread owner-cypherpunks
 KDLADCKD.EXE


RE: OK, which node is down? [WAS: Re: Denial of Service Attackon Cypherpunks?]

2001-03-09 Thread Trei, Peter

I received no postings from cyberpass from sometime Monday through
this morning. It seems to be back now.

Peter


 --
 From: Bill Stewart home email[SMTP:[EMAIL PROTECTED]]
 
 
 As far as I can tell, I've been receiving this discussion via
 cyberpass.net,
 so it must be ok
 
   Bill
 
 Harmon Seaver wrote:
  
  I was subscribed to cyberpass.net, been gone for two days and
  came home to no cpunks mail. Subscribed to lne and it started flowing
  again.
 Pretty weird -- even wierder is what happened to openpgp -- I was
  subscribed to that one, it went down, came back up, went down again and
  never a word from the owner since.




Bell Trial Schedule

2001-03-09 Thread John Young

From: Gordon Jeff  TIGTA [EMAIL PROTECTED]
To: "'[EMAIL PROTECTED]'" [EMAIL PROTECTED]
Subject: Bell trial schedule
Date: Fri, 9 Mar 2001 10:13:02 -0500 
:
:

John

You will need to be present at the Tacoma Courthouse at 9:00am on Tuesday,
4/3/01.  We anticipate you will testify on Tuesday, but it may extend to
Wednesday 4/4/01, depending on the pace of the trial, so the return flight
should not be scheduled prior to 5pm on 4/4/01.  In order to be reimbursed
for travel, all travel arrangements need to be made through the Dru Mercer
at the US Attorney's office, (206) 553-7970.  Let me know if you have any
questions.

Jeff 

-

To: Gordon Jeff  TIGTA [EMAIL PROTECTED]
From: John Young [EMAIL PROTECTED]
Subject: Bell trial schedule
Date: Fri, 9 Mar 2001 10:15 -0500 
:
:

Jeff,

Thanks for the information.

Could you find out if I can buy a transcript of my grand jury 
testimony before the trial? Robb London has not answered 
my three inquiries. The court reporters office told me it
can be released only with Robb's approval.

John






No Subject

2001-03-09 Thread London, Robb

Attorney General Ashcroft personally approved your subpoena, and that of another 
reporter who published admissions by James Dalton Bell.  

The Government is not seeking any source material, notes, or other unpublished 
material from you by virtue of this subpoena.  The limited purpose of the subpoena is 
to have you review two of your published articles, acknowledge your authorship, review 
several of the statements which you attributed to Bell in your articles, and have you 
verify that he in fact told you those things.  That's all.  We're only interested in 
having you testify about statements of his that you published.  If your subpoena could 
have been avoided, it would have been.  Unfortunately, the Federal Rules of Evidence 
do not permit a news article to be admitted into evidence for these purposes unless 
the person who wrote it can attest to its authorship and the accuracy of its content.  
This must be done in open court, at trial, and cannot be accomplished by affidavit, 
unless the defendant is willing to stipulate that your appearance can be avoided and 
that your articles can be admitted into evidence witho!
ut!
 your appearance as a foundation witness.  Mr. Bell is not interested in any such 
stipulations.  I regret any inconvenience that a trip to Tacoma may cause.  

I am extremely sensitive to the intrusiveness of any subpoena and the potential 
negative impact that press subpoenas can have on the news gathering function.  The 
subpoena that has been served on you, is, in my experience, as minimally intrusive as 
any such subpoena can be.

Robb London
Assistant United States Attorney
Western District of Washington




DoJ and Cypherpunks...

2001-03-09 Thread A. Melon


-BEGIN PGP SIGNED MESSAGE-

Wow.  I thought this list was dead and gone, yet here we have an
Assistant US Attorney apologist copying the list to explain the
Subpoena of one of our own.

How interesting.

-BEGIN PGP SIGNATURE-
Version: PGP 7.0.1

iQEVAwUBOqkXES1onm9OaF05AQHfnwgAkS6G1DmZrG4tCnQCI+pFKimbq4DHH+/u
S/OoaQFZdARydiN0aHqpA9BLdEgPuT3naEwBvTVLAD0tZ/GzoUEcgY/IlBC3La1G
G7X2Hpd2FTfuC5tJM4/rkPGHleIMtHMP5U9QTYsXkZiBz2RaVRgxT2PuZTa+Z8/n
m2z9p+XU2pOYXSNXCigP/FEXXUl4ZvXgf4nDfDQy6MDUkvx6qRT0vNqKuW5vPwI9
C6muV2hMAyvHxLmzx/Iq0Pf8e69OJmzQQ1lu1Q5Z22ohLwbm6K1iZ8cwZMinmeMH
TFJb9ntGxnUEndgmOmcaNYuFYu3pdHhrSBScYd/5eY1HW/UNMuVm+A==
=48sr
-END PGP SIGNATURE-




Ellison vs. Gnutella

2001-03-08 Thread Blank Frank

With the second amended complaint, we were able to add a complaint for
vicarious infringement against AOL for the,development of the Gnutella
file transfer protocol by its Nullsoft division. Gnutella is Napster
without a central processing hub.,By setting up a “sting” operation, one
of our investigators was able to track the infringement of several works
by Harlan and,Isaac Asimov using Gnutella. This presents interesting
issues regarding the responsibility for the release of software
which,effectively pollutes the intellectual property environment.

http://www.speculations.com/kick.htm




marines on chicks' leg hair

2001-03-08 Thread Blank Frank

D. (1) AGENDA ITEM. REQUEST FOR REVISION OF UNIFORM REGULATIONS TO
REQUIRE THE REMOVAL OF LEG HAIR ON FEMALE MARINES IF SUCH HAIR IS
VISIBLE.
(2) DISCUSSION. THE UNIFORM BOARD RECOMMENDED THAT THE FOLLOWING
GROOMING REGULATION POLICY BE INCLUDED IN CHAPTER 1 OF THE UNIFORM
REGS: "NO FEMALE MARINE WILL BE REQUIRED TO REMOVE LEG HAIR EXCEPT
WHERE CONSIDERED UNSIGHTLY AND CANNOT BE COVERED WITH APPROPRIATE
HOSIERY AS DESCRIBED IN SUBPARAGRAPH 3027.5."
(3) CMC DECISION. APPROVED.

http://www.usmc.mil/almars/almararc.nsf/ab422d0547928f548525683900589a0d/9c3d36d73d174b898525683800535c2d?OpenDocumentHighlight=2,352%2F96




DeCSS in perl -- test vectors?

2001-03-08 Thread Adam Back

Keith Winstein and Marc Horowitz implemented DeCSS in perl.

http://www.cs.cmu.edu/~dst/DeCSS/Gallery/qrpff-fast.pl

There is some description of using it here:

http://www.cs.cmu.edu/~dst/DeCSS/Gallery/

Does anyone have test vectors for DeCSS.  If one had a DVD player and a
content scrambled DVD one could use the example they give:

% /mnt/dvd/VOB_FILE_NAME | qrpff 153 2 8 105 225 | \
extract_mpeg2 | mpeg2dec -

Someone want to extract a few frames from a DVD and include the associated
plaintext for testing purposes.  I'd like to try reduce the size of the
program.

Adam




  1   2   3   4   5   6   7   8   9   10   >