From majordomo at hk.super.net Sun Feb 1 00:00:30 1998 From: majordomo at hk.super.net (majordomo at hk.super.net) Date: Sun, 1 Feb 1998 00:00:30 -0800 (PST) Subject: THE INFORMATION YOU REQUESTED Message-ID: <>

Hi,

About three times a week I go in and delete numerous junk e-mails from my
mailbox. Recently I decided I was going try one of these MLM "scams" just to see what would happen.  I am glad I did!!  In three weeks I have brought in $11,625, and the money keeps coming in.  I urge you to try this!!  

I have removed all of of "testimonial" text from this letter to make room for my own. 
The main thing is to read and understand the "how to part".  I have discovered a few secrets to making this thing really work, the most important being VOLUME.  The more e-mails you send out the higher % of success you will have.  

Everything below this line is what was sent to me.

                          *** Print This Now For Future Reference ***
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$                       
         PRINT this letter, read the program...  THEN READ IT AGAIN !!!
This is a legitimate LEGAL money-making opportunity.  It does not require you to come 
in contact with people, do any hard work, and best of all, you never have to leave the
house, except to get the mail.  

This electronic multi-level marketing program works perfectly...100% EVERY TIME! 

             ----------------------------------------------------------------------------------
                        OVERVIEW OF THIS EXTRAORDINARY 
              ELECTRONIC MULTI-LEVEL MARKETING PROGRAM
             ----------------------------------------------------------------------------------
The products in this program are a series of four business and financial reports costing
$5.00 each.  Each $5.00 order you receive from someone via "snail mail" will include:

  * $5.00 cash
  * The name of the report that they are ordering
  * The e-mail address of the buyer so that you can e-mail them the 
    report that they ordered.

To fill each order, you simply e-mail the product to the buyer.  THAT'S IT!... the $5.00
is yours! This is the GREATEST electronic multi-level marketing business anywhere! 

                           FOLLOW THE INSTRUCTIONS EXACTLY!
    
                         ******* I  N  S  T  R  U  C  T  I  O  N  S *******

This is what you MUST do:

1. Order all 4 reports shown on the list below.  
     
     *  For each report send $5.00 CASH, YOUR E-MAIL ADDRESS and YOUR
        RETURN POSTAL ADDRESS (in case of a problem) to the person whose 
        name appears on the list next to the report.
  
     *  When you place your order, make sure you order each of the four
        reports.  You will need all four reports so that you can save them
        to your computer and resell them.

2.  IMPORTANT-- DO NOT alter the names of the people who are listed next 
    to each report, or their sequence on the list, in any way other that is
    instructed below in steps "a" through "d" or you will not profit from this
    program the way you should.

    a.  Look below for the listing of available reports.

    b.  Replace the name and address under REPORT #1 with yours, moving
         the one that was there down to REPORT #2.  

    c.  Move the name and address under REPORT #2 to REPORT #3.  

    d.  Move the name and address under REPORT #3 to REPORT #4.  

    e.  The name and address that was under REPORT #4 is dropped off the 
         list and is NO DOUBT on the way to the bank.

    Please make certain you copy everyone's name and address
                            ACCURATELY!!!

3.  Take this entire letter, including the modified list of names, and save 
     it to your computer.

            ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS!!! 
                            
          ***Order each REPORT by NUMBER and NAME***

Note 1:
ALWAYS SEND $5 CASH (and make sure that it is very well Concealed, wrap it in several layers of paper) FOR EACH REPORT. BE SURE TO REQUEST EACH SPECIFIC REPORT BY NAME AND NUMBER.

Note 2: 
ALWAYS SEND YOUR ORDER VIA FIRST CLASS  MAIL AND BE SURE TO PROVIDE YOUR E-MAIL ADDRESS
FOR QUICK DELIVERY.
_________________________________________________________________
REPORT #1 
"HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES" 
ORDER REPORT #1 FROM:  

F & F ENTERPRISES
7708 ARGONAUT ST.
SEVERN, MD   21144
___________________________________________________________________
REPORT #2
"MAJOR CORPORATIONS AND MULTI-LEVEL SALES"
ORDER REPORT #2 FROM:

SSB MARKETING
641 NW 2nd AVENUE
WILLISTON, FL   32696
__________________________________________________________________
REPORT #3 
"SOURCES FOR THE BEST MAILING LISTS"
ORDER REPORT #3 FROM:

P.D. BERNARD
13120 NE 120th LN C-202
KIRKLAND, WA 98034
________________________________________________________________
REPORT #4 
"EVALUATING MULTI-LEVEL SALES PLANS"
ORDER REPORT #4 FROM:

MVPNOVS
1206 W 212th STREET
TORRANCE, CA 90502
_____________________________________________________________________
         --------------------------------------------------------------------------------------------------
         HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$
         --------------------------------------------------------------------------------------------------
Let's say you decide to start small just to see how it goes. Assume your goal is to get
10 people to participate on your first level. (Placing a lot of FREE ads on the internet
could EASILY get a better response.) Also assume that everyone else in YOUR BUILDING ORGANIZATION gets ONLY 10 downline members.  Follow this example for the STAGGERING results below.

1st level--your 10 members with $5......................................$50
2nd level--10 members from those 10 ($5 x 100).................$500
3rd level--10 members from those 100 ($5 x 1,000)...........$5,000
4th level--10 members from those 1,000 ($5 x 10,000).....$50,000
                                                   THIS TOTALS-----------> $55,550
                                          
                            *******TIPS FOR SUCCESS*******

 *  Send for the four reports IMMEDIATELY so you will have them when 
    the orders start coming in because:

 *  When you receive a $5 order, you MUST send out the requested
    product/report to comply with the U.S. Postal & Lottery Laws, Title
    18,Sections 1302 and 1341 or Title 18,  Section 3005 in the U.S. Code,
    also Code of Federal Regs. vol. 16, Sections 255 and 436, which state 
    that "a product or service must be exchanged for money received."

 *  ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.

                          *******YOUR SUCCESS GUIDELINE*******

You MUST receive 10 to 20 orders for REPORT #1!  THIS IS A MUST!  If you don't within two weeks, advertise more and send out more programs until you do.  Then, a couple of weeks later you should receive at least 100 orders for REPORT #2.  If you don't, advertise more and send out more programs until you do.  Once you have received 100, or more orders for REPORT #2, YOU CAN RELAX, because you will be on your way to the BANK! -OR-  You can DOUBLE your efforts!

REMEMBER: Every time your name is moved down on the list you are placed
                    in front of a DIFFERENT report.  You can KEEP TRACK of your
                    PROGRESS by watching which report people are ordering from
                    you. 
                                                IT'S THAT EASY!!!




    








From majordomo at hk.super.net  Sun Feb  1 00:00:30 1998
From: majordomo at hk.super.net (majordomo at hk.super.net)
Date: Sun, 1 Feb 1998 00:00:30 -0800 (PST)
Subject: THE INFORMATION YOU REQUESTED
Message-ID: <>



Hi,

About three times a week I go in and delete numerous junk e-mails from my
mailbox. Recently I decided I was going try one of these MLM "scams" just to see what would happen.  I am glad I did!!  In three weeks I have brought in $11,625, and the money keeps coming in.  I urge you to try this!!  

I have removed all of of "testimonial" text from this letter to make room for my own. 
The main thing is to read and understand the "how to part".  I have discovered a few secrets to making this thing really work, the most important being VOLUME.  The more e-mails you send out the higher % of success you will have.  

Everything below this line is what was sent to me.

                          *** Print This Now For Future Reference ***
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$                       
         PRINT this letter, read the program...  THEN READ IT AGAIN !!!
This is a legitimate LEGAL money-making opportunity.  It does not require you to come 
in contact with people, do any hard work, and best of all, you never have to leave the
house, except to get the mail.  

This electronic multi-level marketing program works perfectly...100% EVERY TIME! 

             ----------------------------------------------------------------------------------
                        OVERVIEW OF THIS EXTRAORDINARY 
              ELECTRONIC MULTI-LEVEL MARKETING PROGRAM
             ----------------------------------------------------------------------------------
The products in this program are a series of four business and financial reports costing
$5.00 each.  Each $5.00 order you receive from someone via "snail mail" will include:

  * $5.00 cash
  * The name of the report that they are ordering
  * The e-mail address of the buyer so that you can e-mail them the 
    report that they ordered.

To fill each order, you simply e-mail the product to the buyer.  THAT'S IT!... the $5.00
is yours! This is the GREATEST electronic multi-level marketing business anywhere! 

                           FOLLOW THE INSTRUCTIONS EXACTLY!
    
                         ******* I  N  S  T  R  U  C  T  I  O  N  S *******

This is what you MUST do:

1. Order all 4 reports shown on the list below.  
     
     *  For each report send $5.00 CASH, YOUR E-MAIL ADDRESS and YOUR
        RETURN POSTAL ADDRESS (in case of a problem) to the person whose 
        name appears on the list next to the report.
  
     *  When you place your order, make sure you order each of the four
        reports.  You will need all four reports so that you can save them
        to your computer and resell them.

2.  IMPORTANT-- DO NOT alter the names of the people who are listed next 
    to each report, or their sequence on the list, in any way other that is
    instructed below in steps "a" through "d" or you will not profit from this
    program the way you should.

    a.  Look below for the listing of available reports.

    b.  Replace the name and address under REPORT #1 with yours, moving
         the one that was there down to REPORT #2.  

    c.  Move the name and address under REPORT #2 to REPORT #3.  

    d.  Move the name and address under REPORT #3 to REPORT #4.  

    e.  The name and address that was under REPORT #4 is dropped off the 
         list and is NO DOUBT on the way to the bank.

    Please make certain you copy everyone's name and address
                            ACCURATELY!!!

3.  Take this entire letter, including the modified list of names, and save 
     it to your computer.

            ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS!!! 
                            
          ***Order each REPORT by NUMBER and NAME***

Note 1:
ALWAYS SEND $5 CASH (and make sure that it is very well Concealed, wrap it in several layers of paper) FOR EACH REPORT. BE SURE TO REQUEST EACH SPECIFIC REPORT BY NAME AND NUMBER.

Note 2: 
ALWAYS SEND YOUR ORDER VIA FIRST CLASS  MAIL AND BE SURE TO PROVIDE YOUR E-MAIL ADDRESS
FOR QUICK DELIVERY.
_________________________________________________________________
REPORT #1 
"HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES" 
ORDER REPORT #1 FROM:  

F & F ENTERPRISES
7708 ARGONAUT ST.
SEVERN, MD   21144
___________________________________________________________________
REPORT #2
"MAJOR CORPORATIONS AND MULTI-LEVEL SALES"
ORDER REPORT #2 FROM:

SSB MARKETING
641 NW 2nd AVENUE
WILLISTON, FL   32696
__________________________________________________________________
REPORT #3 
"SOURCES FOR THE BEST MAILING LISTS"
ORDER REPORT #3 FROM:

P.D. BERNARD
13120 NE 120th LN C-202
KIRKLAND, WA 98034
________________________________________________________________
REPORT #4 
"EVALUATING MULTI-LEVEL SALES PLANS"
ORDER REPORT #4 FROM:

MVPNOVS
1206 W 212th STREET
TORRANCE, CA 90502
_____________________________________________________________________
         --------------------------------------------------------------------------------------------------
         HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$
         --------------------------------------------------------------------------------------------------
Let's say you decide to start small just to see how it goes. Assume your goal is to get
10 people to participate on your first level. (Placing a lot of FREE ads on the internet
could EASILY get a better response.) Also assume that everyone else in YOUR BUILDING ORGANIZATION gets ONLY 10 downline members.  Follow this example for the STAGGERING results below.

1st level--your 10 members with $5......................................$50
2nd level--10 members from those 10 ($5 x 100).................$500
3rd level--10 members from those 100 ($5 x 1,000)...........$5,000
4th level--10 members from those 1,000 ($5 x 10,000).....$50,000
                                                   THIS TOTALS-----------> $55,550
                                          
                            *******TIPS FOR SUCCESS*******

 *  Send for the four reports IMMEDIATELY so you will have them when 
    the orders start coming in because:

 *  When you receive a $5 order, you MUST send out the requested
    product/report to comply with the U.S. Postal & Lottery Laws, Title
    18,Sections 1302 and 1341 or Title 18,  Section 3005 in the U.S. Code,
    also Code of Federal Regs. vol. 16, Sections 255 and 436, which state 
    that "a product or service must be exchanged for money received."

 *  ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.

                          *******YOUR SUCCESS GUIDELINE*******

You MUST receive 10 to 20 orders for REPORT #1!  THIS IS A MUST!  If you don't within two weeks, advertise more and send out more programs until you do.  Then, a couple of weeks later you should receive at least 100 orders for REPORT #2.  If you don't, advertise more and send out more programs until you do.  Once you have received 100, or more orders for REPORT #2, YOU CAN RELAX, because you will be on your way to the BANK! -OR-  You can DOUBLE your efforts!

REMEMBER: Every time your name is moved down on the list you are placed
                    in front of a DIFFERENT report.  You can KEEP TRACK of your
                    PROGRESS by watching which report people are ordering from
                    you. 
                                                IT'S THAT EASY!!!




    








From eureka at eureka.abc-web.com  Sun Feb  1 01:42:07 1998
From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com)
Date: Sun, 1 Feb 1998 01:42:07 -0800 (PST)
Subject: Eureka! Sun Feb 1 '98
Message-ID: <19980201082849.16255.qmail@eureka.abc-web.com>


Welcome to Sunday's issue of Eureka!

UNFAITHFUL
Just once in a while  a brand new site comes along that will
blow your mind,  and Unfaithful  is one of them.  Brought to
you by two  of the biggest  names on the web,  Intertain and
Playgal,  it offers MORE than both sites put together, which
includes  an amazing  3,000 video feeds - yes,  thousands of
hot, streaming videos, many totally live, and some even with
audio too!  With it's FREE trial offer don't miss this site!
Unfaithful ... http://www.unfaithful.com/banner_Eureka0.html

PLEASE VISIT THIS FINE EUREKA! PARTNER SITE
CyberErotica - Where Fantasy Meets Reality!
http://www.cybererotica.com/ad/welcome.cgi/raw_4006
CyberErotica now offers a free one week membership. We
currently have 1000s of videos and many 1000s more photos
and a whole lot more. Try us FREE for a week.

DONNA'S TIGHT BEAVERS
We aren't sure how tight they are, in fact some of them look
pretty loose!  There are  asian, older, tits and more.  Easy
to find thumbnail images.  Quick loading images.  It's free!
Donna's Tight ..... http://www.megaservices.com/adult/donna/

THE ROSEGARDEN
What can we say about this one?  There are some free images,
they load pretty quick.  Blowjobs,  teens, amateurs and even
bikini pictures.  The nudie pictures are pretty good.  Yeah!
The Rose ..... http://www.undergroundnet.com/rosegarden.html

QUICK LIXXX  
We have  some great  facial pictures here!  Women with juice
on their faces, chins and  tounges.  Just where you like it!
Take your best shot and surf over to this website.  Load it!
Quick Lixxx ......... http://xxx.shots.com/~babyoil/sb1.html

ELFY'S SMUT SHACK
This website took some time to load, but once it did I found
some of the hottest  looking women on the internet!  See the
woman in the red dress. Lots of hot images.  Worth the wait.
Elfy's Smut Shack ........... http://www.elfyssmutshack.com/

BRAND NEW - HOORAY! THE ADULT SEARCH ENGINE
Now adult surfers have our very own search engine,  directly
designed to  only list adult sites,  and so run fast because
all other  types of site  are ignored.  Check it out  today!
Hooray! -----------------> http://eureka.abc-web.com/hooray/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here --> http://www.netscape.com/download/
Hardcore -----------------------> http://204.244.215.7/anal/

CHAT WITH OTHER READERS
This chat is growing fast, and already there are a number of
regulars  you will meet most days.  It's good to see Eureka!
readers interacting with each other and having a great time!
Adult/Sex Chat -----------------> http://137.39.63.229/chat/
General/Fun Chat -------> http://137.39.63.229/chat/funchat/

THE BEST PHONE SEX
NEW!!!! LD Call only! - Live Hot Girls!!!!--->1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779
FREE: Live 1-on-1 (international call only)--->011-678-77416

AMATEUR SITE OF THE DAY

---------------------------> http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
XXXStories.com: The largest free  erotic  story  site on the
net. Over 400 hot sex stories  on such topics as wife sluts,
virgins, group sex and more...... http://www.xxxstories.com/

DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Every day  we bring you an exclusive  choice pic of a famous
adult porn star.  And we must tell you - these pix are abso-
luletly brilliant! ---> http://www.xxxadultstars.com/eureka/

GAYEUREKA!
The gay  newsletter is now  available.  You can get it here!
Gay Eureka! ----------> http://eureka.abc-web.com/gayeureka/

EUREKA! TRANSLATIONS
As well as English you can now choose any of these languages
DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm
ESPA�OL ------> http://eureka.abc-web.com/eureka/espanol.htm
FRAN�AIS ----> http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 --------------------------> http://137.39.63.229/?010
Pic  2 --------------------------> http://137.39.63.229/?011
Pic  3 --------------------------> http://137.39.63.229/?012
Pic  4 --------------------------> http://137.39.63.229/?013
Pic  5 --------------------------> http://137.39.63.229/?014
Pic  6 --------------------------> http://137.39.63.229/?015
Pic  7 --------------------------> http://137.39.63.229/?016
Pic  8 --------------------------> http://137.39.63.229/?017
Pic  9 --------------------------> http://137.39.63.229/?018
Pic 10 --------------------------> http://137.39.63.229/?019

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================





From 16632040 at msn.com  Sun Feb  1 02:23:24 1998
From: 16632040 at msn.com (16632040 at msn.com)
Date: Sun, 1 Feb 1998 02:23:24 -0800 (PST)
Subject: ALERT - Internet Fraud and Spying
Message-ID: 



Webmaster.... This publication has been a best seller.

I thought you would like to see it.


ARE YOU BEING INVESTIGATED ?



Learn the Internet tools that are used to investigate you, your 

friends, neighbors, enemies, Employees or anyone else!  My 

huge report "SNOOPING THE INTERNET" of Internet sites 

will give you...


* Thousands of Internet locations to look up people, credit, 

Social security, current or past employment, Driving records, 

medical information, addresses, phone numbers, Maps to city 

locations...



Every day the media (television, radio, and newspapers) are 

full of stories about PERSONAL INFORMATION being used, 

traded, and sold over the Internet... usually without your 

permission or knowledge. 


With my report I show you HOW IT'S DONE!!!
	

It's amazing..

	

Locate a debtor that is hiding, or get help in finding hidden 

assets.



*   Find that old romantic interest.


*   Find e-mail, telephone or address information on just about 

     anyone! Unlisted phone numbers can often be found 

     through some of these sites!!



Perhaps you're working on a family "tree" or history. The 

Internet turns what once was years of work into hours of 

DISCOVERY & INFORMATION.




      Check birth, death, adoption or social security records.


MILITARY

      Check service records of Army, Navy, Air Force or Marine 

      Corps. Find out who's been telling the truth and who's been 

      lying. Perhaps you can uncover the next lying politician!!!
 


FELLOW EMPLOYEES;


* Find out if your fellow employee was jailed on sex charges, 

or has other "skeletons" in the closet!!



PERFORM BACKGROUND CHECKS;
  
   Check credit, driving or criminal records, Verify income or 

   educational claims, Find out Military history and discipline, 

   previous political affiliations, etc.


YOUR KID'S FRIENDS;


   Find out the background of your children's friends & dates.


WHAT'S THE LAW? STOP GUESSING!!


* Look up laws, direct from law libraries around the world. Is 

  that new business plan legal?? 


NEW JOB?  NEW TOWN?  NEW LIFE?


   Employment ads from around the world can be found on the 

   Internet. Get a new job and disappear!



The Internet can tell you just about ANYTHING, if you know 

WHERE to look. 



BONUS REPORT!!!!


Check your credit report and use the Internet to force credit 

bureaus to remove derogatory information. My special

BONUS REPORT included as part of the "SNOOPING THE 

INTERNET" collection reveals all sorts of credit tricks, legal

and for "information purposes only" some of the ILLEGAL 

tricks.


Research YOURSELF first!


What you find will scare you.


If you believe that the information that is compiled on you 

should be as easily available to you as it is to those who 

compile it, then. . .

You want to order the SNOOPING 

THE INTERNET report.


This huge report is WHERE YOU START! Once you 

locate these FREE private, college and government 

web sites, you'll find even MORE links to information 

search engines!

YOU CAN FIND OUT ANYTHING ABOUT ANYBODY 

ANY TIME using the Internet!!!!

SEVERAL WAYS TO ORDER !!!


  1) WE TAKE:  AMERICAN EXPRESS OR
    
                          VISA <> MASTERCARD
 
        TYPE OF CARD  AMX / VISA / MC??_______________

        EXPIRATION DATE   ___________________________
 
        NAME ON CREDIT CARD________________________
 
       CREDIT CARD #________________________________
 
        BILLING ADDRESS ____________________________
 
        CITY_________________________________________
 
        STATE________________ZIP_____________________
 
        PHONE INCLUDE AREA CODE___________________
 
        WE WILL BILL 39.95 to your account

        SHIPPING  COST OF 3.00 FIRST CLASS MAIL

        SHIPPING COST OF  15.00  24 HOUR EXPRESS MAIL
 
        SALES TAX (2.90) added to CA residents 
 
  >>> Send $39.95 ($42.85 in CA) cash, check or money

order to:

  >>> CASINO CHICO
  >>> Background Investigations Division
  >>> 311 Nord Ave.
  >>> P.O. Box 4331
  >>> Chico, CA 95927-4331


  2) Send the same above requested credit card 

information to above address. 


   3) Fax the same above credit card information to 530-895-

8470

   4) Call phone # 530-876-4285.  This is a 24 hour phone 

number to place a CREDIT CARD order.

   5) FAX A COPY of your signed check to 530-895-8470.

       This is an EXCELLENT way to order without a credit card!

    
 I will RUSH back to you SAME DAY my "SNOOPING 

THE INTERNET" report!

Log on to the Internet and in moments you will fully 

understand...

 What information is available -- and exact Internet 

site to get there!

2nd BONUS!!!!


Along with the report we will send a 3 1/2" disk with 

sites already "HOT LINKED". No need to type in 

those addresses. Simply click on the URL address 

and "PRESTO" you are at the web site!!! 


Personal ads, logs of personal e-mail, mention of 

individuals anywhere on the Internet are "yours for the 

taking" with this report.


Lists of resources to find even more information 

(private Investigation companies, etc..) 


Order surveillance equipment (if legal in your state)
  

Send anonymous e-mail
   
Research companies 

Research technology

Locate military records

 
FIND INFORMATION ON CRIMINALS 

   Find Wanted fugitives - perhaps even a close 

associate!

ABSOLUTE SATISFACTION GUARANTEED:

Your satisfaction is 100% guaranteed, just return the material for
 a full refund within 30 days if you aren't 100% satisfied.

This offer is from a private company. Casino Chico / R Jon Scott Hall
 publications is not associated with or endorsed by, AOL,
MSN, or any other Internet service provider.

Copyright 1998  All Rights Reserved

R Jon Scott Hall Publications. 











From bpi at ns9.internetconnect.net  Sun Feb  1 03:26:14 1998
From: bpi at ns9.internetconnect.net (bpi at ns9.internetconnect.net)
Date: Sun, 1 Feb 1998 03:26:14 -0800 (PST)
Subject: Being a Better Educator and Parent
Message-ID: <>



Dear educator:

Today, more than ever, we need innovative new solutions to 
educational problems. 

        "Kevin Kirchman's book Aspirations is an answer 
        to education questions such as 'How do we teach 
        students to think for themselves, fulfill their 
        potential, be creative, gain self esteem, and be 
        ready for this productive world?'

        "His book is a must for all educators from pre-school
        through graduate school. I wish his book had been
        available during my 42 year teaching career."
                 Norma Silver
                 Retired teacher, Fort Lee, NJ

Introducing,
         Aspirations: The Rational Foundations of Achievement. 

The reason it is possible to have an entirely new perspective on
educational issues is because the theory behind education, called
epistemology, or the theory of knowledge, has _not_ been an empirical
science.

Epistemology is to education what physics is to engineering--
but until the basis was discovered for _principles_ of understanding,
there could be no science, and no applications that would radically
transform educational practices. 

That is until now.

        "If knowledge of the humanities is subjective, that is,  only
        valid  for the person who holds it, of what value is
        education?

        "Knowledge is not subjective. There are some conceptual 
        models that are better--more accurate and enlightening--
        than others."
                Aspirations

Aspirations will show you why, and teach you precisely how to tell the
difference. 

        "[Aspirations] lays out the foundations of clear,  critical
        thinking, that can help us to better understand ourselves,
        others, and the world around us. In the final analysis, we are
        all decision makers. Don't make many more important decisions
        before you read and grasp Aspirations."
                Frank L. David
                        Co-Principal, Business Learning Centers
                        Murrieta, CA

Perhaps the last earthly frontier, the mind, has been finally
penetrated by this wonderful new book. Aspirations won't give
you old ideas about the mind that you've seen before. It's 
radically new.

Aspirations shows how, because of an old philosophical problem, 
educators are unwittingly discouraging idea forming habits that 
occur through the mental process of induction, or generalization. The
book shows how these inductive concepts are the basis of all abilities
and character. 

Deterring concept formation has the effects of hindering 
individuality, stifling general competency and causing people to be
more dependent upon the ideas formed by others (being less able to
form them themselves). The book presents a new solution to this
dilemma which describes the mental events that occur during concept
formation that can be practiced and made habit.

Aspirations makes it clear that if you are less able to form 
concepts of your own, you necessarily have to borrow those formed by
others. This discourages individuality, creativity, and self-reliance.
It is also the basis for a host of psychological problems, from
prejudice and intolerance to low self-esteem. 

Set within the context of human intellectual history, Aspirations stands out as a unique and controversial contribution to our understanding of ourselves. 

        Fascinating reading. A journey deep into the corners of the
        mind and down the paths of civilization�s  philosophical
        development. 

The author of Aspirations, Kevin Kirchman, a Cornell University
educated Artificial Intelligence scientist, lecturer and businessman,
has actually utilized his new understanding of innovation to develop
original perspectives on

        * deduction, or what reasoning is
        * induction, the basis of all innovation and creativity
        * character formation

and these new ideas genuinely will aid you not only in teaching
better mental habits, but in improving your own. 

        "[Aspirations] is a self-motivational book for  intelligent
        people."
                Stan Irwin
                        The Producer of the Tonight Show
                        with Johnny Carson for 15 years

Rarely in human history is a book produced which has as important
implications. Rarely is a book offered which gives us such hope and
inspiration.

Aspirations will soon be promoted nationally by Rogers & Cowan,
America�s largest public relations firm. Be the first to learn and
apply these revolutionary new insights. 

                 Table of Contents:
        1    Introduction
        2    The Problem -- Why Educational Philosophy is
                 Psychologically Debilitating
        3    Concepts -- The Key to Understanding the Mind
        4    Descriptive Concepts -- The Foundation of Clear
                 Thinking
        5    Creating Ideas -- Concept Formation is Induction
        6    Character -- The Conceptual Origins of Personal
                 Qualities
        7   Motivation -- A Theoretical Defense of the
                 Principles of Achievement
        8   Reasoning -- A New and Practical Overview
        9   Goal Setting and Decision Making -- Giving
                 Yourself a Purpose
       10   Deduction -- The Connection Between Logic and
                 Common Sense
       11   Reasoning Well -- Applying the New Science of Logic
       12   The Principles of Induction -- New Solutions
                 to a Classical Challenge
       13   Conceptual Modeling -- Coming Up with the Best
                 Concepts
       14   Teaching Induction -- Overcoming the Fear of
                 Abstractions
       15   Philosophical Clarifications -- Understanding
                 the Breakthrough and Replacing Outdated
                 Technology
       16   The New Science of Logic -- Clearing the Way for a
                 Revolution in Rationality
       17   Historical Background and Philosophical Comparison --
                 Putting the Conceptual Model Theory Into
                 Perspective

If, after receiving "Aspirations", you are not completely
satisfied, return it for a prompt and full refund.

Only $16.95 plus $3.50 postage and handling
For orders of 2 or more, p&h is free. 

ORDER Aspirations NOW by calling USA 

                 International	1 310 289-2394,
                 or faxing to 	1 310 854-1840
any time with your credit card details.

Or, Mail Check, Money Order, or Credit Card details to:
        Breakthrough Publishing, Inc.
        291 S. La Cienega Blvd., Suite 107
        Beverly Hills, CA 90211

YES! __ I would like ____ copies of Aspirations * $16.95 = __________
           + $3.50
        = __________

Name ________________________________________
Title __________________
Organization_________________________________
Mailing Addr ________________________________
_____________________________________________
City ___________________ State ______________
Post Code ____________
Country ___________________________

VISA ___   MasterCard ___   American Express ___ Discovery ___

Card #	__ __ __ __   __ __ __ __   
   __ __ __ __   __ __ __ __ 

Expiration Date __________

Signature _________________________________






From bpi at ns9.internetconnect.net  Sun Feb  1 03:26:14 1998
From: bpi at ns9.internetconnect.net (bpi at ns9.internetconnect.net)
Date: Sun, 1 Feb 1998 03:26:14 -0800 (PST)
Subject: Being a Better Educator and Parent
Message-ID: <>



Dear educator:

Today, more than ever, we need innovative new solutions to 
educational problems. 

        "Kevin Kirchman's book Aspirations is an answer 
        to education questions such as 'How do we teach 
        students to think for themselves, fulfill their 
        potential, be creative, gain self esteem, and be 
        ready for this productive world?'

        "His book is a must for all educators from pre-school
        through graduate school. I wish his book had been
        available during my 42 year teaching career."
                 Norma Silver
                 Retired teacher, Fort Lee, NJ

Introducing,
         Aspirations: The Rational Foundations of Achievement. 

The reason it is possible to have an entirely new perspective on
educational issues is because the theory behind education, called
epistemology, or the theory of knowledge, has _not_ been an empirical
science.

Epistemology is to education what physics is to engineering--
but until the basis was discovered for _principles_ of understanding,
there could be no science, and no applications that would radically
transform educational practices. 

That is until now.

        "If knowledge of the humanities is subjective, that is,  only
        valid  for the person who holds it, of what value is
        education?

        "Knowledge is not subjective. There are some conceptual 
        models that are better--more accurate and enlightening--
        than others."
                Aspirations

Aspirations will show you why, and teach you precisely how to tell the
difference. 

        "[Aspirations] lays out the foundations of clear,  critical
        thinking, that can help us to better understand ourselves,
        others, and the world around us. In the final analysis, we are
        all decision makers. Don't make many more important decisions
        before you read and grasp Aspirations."
                Frank L. David
                        Co-Principal, Business Learning Centers
                        Murrieta, CA

Perhaps the last earthly frontier, the mind, has been finally
penetrated by this wonderful new book. Aspirations won't give
you old ideas about the mind that you've seen before. It's 
radically new.

Aspirations shows how, because of an old philosophical problem, 
educators are unwittingly discouraging idea forming habits that 
occur through the mental process of induction, or generalization. The
book shows how these inductive concepts are the basis of all abilities
and character. 

Deterring concept formation has the effects of hindering 
individuality, stifling general competency and causing people to be
more dependent upon the ideas formed by others (being less able to
form them themselves). The book presents a new solution to this
dilemma which describes the mental events that occur during concept
formation that can be practiced and made habit.

Aspirations makes it clear that if you are less able to form 
concepts of your own, you necessarily have to borrow those formed by
others. This discourages individuality, creativity, and self-reliance.
It is also the basis for a host of psychological problems, from
prejudice and intolerance to low self-esteem. 

Set within the context of human intellectual history, Aspirations stands out as a unique and controversial contribution to our understanding of ourselves. 

        Fascinating reading. A journey deep into the corners of the
        mind and down the paths of civilization�s  philosophical
        development. 

The author of Aspirations, Kevin Kirchman, a Cornell University
educated Artificial Intelligence scientist, lecturer and businessman,
has actually utilized his new understanding of innovation to develop
original perspectives on

        * deduction, or what reasoning is
        * induction, the basis of all innovation and creativity
        * character formation

and these new ideas genuinely will aid you not only in teaching
better mental habits, but in improving your own. 

        "[Aspirations] is a self-motivational book for  intelligent
        people."
                Stan Irwin
                        The Producer of the Tonight Show
                        with Johnny Carson for 15 years

Rarely in human history is a book produced which has as important
implications. Rarely is a book offered which gives us such hope and
inspiration.

Aspirations will soon be promoted nationally by Rogers & Cowan,
America�s largest public relations firm. Be the first to learn and
apply these revolutionary new insights. 

                 Table of Contents:
        1    Introduction
        2    The Problem -- Why Educational Philosophy is
                 Psychologically Debilitating
        3    Concepts -- The Key to Understanding the Mind
        4    Descriptive Concepts -- The Foundation of Clear
                 Thinking
        5    Creating Ideas -- Concept Formation is Induction
        6    Character -- The Conceptual Origins of Personal
                 Qualities
        7   Motivation -- A Theoretical Defense of the
                 Principles of Achievement
        8   Reasoning -- A New and Practical Overview
        9   Goal Setting and Decision Making -- Giving
                 Yourself a Purpose
       10   Deduction -- The Connection Between Logic and
                 Common Sense
       11   Reasoning Well -- Applying the New Science of Logic
       12   The Principles of Induction -- New Solutions
                 to a Classical Challenge
       13   Conceptual Modeling -- Coming Up with the Best
                 Concepts
       14   Teaching Induction -- Overcoming the Fear of
                 Abstractions
       15   Philosophical Clarifications -- Understanding
                 the Breakthrough and Replacing Outdated
                 Technology
       16   The New Science of Logic -- Clearing the Way for a
                 Revolution in Rationality
       17   Historical Background and Philosophical Comparison --
                 Putting the Conceptual Model Theory Into
                 Perspective

If, after receiving "Aspirations", you are not completely
satisfied, return it for a prompt and full refund.

Only $16.95 plus $3.50 postage and handling
For orders of 2 or more, p&h is free. 

ORDER Aspirations NOW by calling USA 

                 International	1 310 289-2394,
                 or faxing to 	1 310 854-1840
any time with your credit card details.

Or, Mail Check, Money Order, or Credit Card details to:
        Breakthrough Publishing, Inc.
        291 S. La Cienega Blvd., Suite 107
        Beverly Hills, CA 90211

YES! __ I would like ____ copies of Aspirations * $16.95 = __________
           + $3.50
        = __________

Name ________________________________________
Title __________________
Organization_________________________________
Mailing Addr ________________________________
_____________________________________________
City ___________________ State ______________
Post Code ____________
Country ___________________________

VISA ___   MasterCard ___   American Express ___ Discovery ___

Card #	__ __ __ __   __ __ __ __   
   __ __ __ __   __ __ __ __ 

Expiration Date __________

Signature _________________________________






From moisoqa at prodigy.com  Sun Feb  1 07:05:23 1998
From: moisoqa at prodigy.com (moisoqa at prodigy.com)
Date: Sun, 1 Feb 1998 07:05:23 -0800 (PST)
Subject: "Stock News ALERT" UNFC expect $50 million increase in revenues in 98'.
Message-ID: <199802013862HAA16945@post.at>


REMINGTON-HALL CAPITALIZES ON RESURGENT REAL ESTATE MARKET Company expects to acquire $50 million in assets by mid-1998

DALLAS -- UNFC ), a diversified real estate investment firm formerly known as Universal Fuels Company, is quietly acquiring over $50 million in previously undervalued, undercapitalized or mismanaged commercial properties and making this new major player one of the best moderate-risk real estate investments in 1998. Founded in 1975 as Universal Fuels, the company provided uranium to the world as an alternative fuel, but as uranium became less used as a nuclear fuel source than other more economical and useful materials, Universal Fuels' stock declined almost to extinction over several years. The stock price was less than 1� last year. Four months ago officials from Camden-Townwest, a privately held real estate investment firm, approached Universal Fuels former management about converting Universal Fuels into a publicly traded real estate conglomerate. Camden-Townwest, founded in 1994, grew from $19,000 in cash to $3 million in assets in three years without seeking any outside capital. Since the change in management and corporate mission last October, UNFC has seen its stock value increase by over 800%. Remington-Hall is now making its move to increase assets at a tremendous rate. By mid-year management expects to acquire in excess of $50 Million in office buildings and multi-family properties at a significant discount to their market value. "We have been referred to as 'Cat Burglars of Real Estate'," said Douglas Fonteno, president & chief executive officer, "and that's a title we plan to keep." Douglas T Fonteno previously Chairman of Camden-Townwest and formerly with Merrill Lynch, is Remington-Hall's new President & Chief Executive Officer. Larry Hood, formerly Chief Operating Officer of Pizza Inn and Chief Financial Officer of Reliance Mortgage Company, is Remington-Hall's Chief Financial Officer, giving the new company immediate and substantial financial integrity. Wade Hyde, previously public relations and investor relations executive for Blockbuster Video and FoxMeyer Corporation, is Vice President of Marketing & Public Relations. Currently Remington-Hall is seeking to be listed on the Pacific Stock Exchange and the Nasdaq National Market. The company anticipates announcing over $10 million in newly acquired assets by the end of January. Name: Remington-Hall Capital Corporation ( formerly Universal Fuels) Symbol: Nasdaq: UNFC Mission: To aggressively acquire steeply undervalued real estate properties due to previous mismanagement or undercapitalization. Management: Senior executives with diverse experiences, including: Fortune 500 corporations, leading stock brokerage firms, real estate companies and national marketing. Goals: To increase assets to $10M by January 98 and $50M by mid-year Address: 1401 Elm St., Ste. 1818, Dallas, TX 75202-2925 Internet: www.remington-hall.com E-Mail: InvestorRelations at remington-hall.com Quote: Yahoo! Remington-Hall Except for the historical information contained on the website, the matters set forth inthese documents are forward-looking statements within the meaning of the "safe harbour" provisions of the Private Securities Litigation Reform Act of 1995. These forward-looking statements are subject to risk and uncertainties that may cause actual results to differ materially. These forward-looking statements speak only as of the date hereof and the Company disclaims any intent or obligation to update these forward-looking This is not a solicitation to buy or sell securities and does not purport to give investment recommendations. The company featured in this advertorial pay for promotional services by issuing securities, options to purchase securities and/or cash. The information contained here has been carefully compiled and believed to be reliable, but its accuracy is not guaranteed.

From jaqui5535 at juno.com Sun Feb 1 07:18:07 1998 From: jaqui5535 at juno.com (jaqui5535 at juno.com) Date: Sun, 1 Feb 1998 07:18:07 -0800 (PST) Subject: E-ALERT: URGENT BUY RECOMMENDATION Message-ID: <> Cronus Corporation Symbol: C R O N Recent Price: 1/2 ($.50/share) Wall Street analysis from Harvard Equity Research has issued a STRONG BUY recommendation on CRON stock. Charles Blitzer was quoted as predicting a $1.25 to $1.50 price near-term with a "thrust into the $3-$4 range sometime in 1998". Harvard Equity Research's last recommendation in October, AATK, went from $3 1/2 to $9 in ten trading days! Harvard Equity Research is so confident of their projections that they are offering their subscribers a money-back guarantee on their subscription if CRON doesn't at least double within the next year. To reiterate: an IMMEDIATE & STRONG BUY recommendation on CRON. For further information go to: http://quote.yahoo.com/ or send a SASE, for a free issue of Harvard Equity Research's latest top-rated newsletter, to H.E.R., P.O. Box 96159, Boston, MA 01742 ------------------- From jaqui5535 at juno.com Sun Feb 1 07:18:07 1998 From: jaqui5535 at juno.com (jaqui5535 at juno.com) Date: Sun, 1 Feb 1998 07:18:07 -0800 (PST) Subject: E-ALERT: URGENT BUY RECOMMENDATION Message-ID: <> Cronus Corporation Symbol: C R O N Recent Price: 1/2 ($.50/share) Wall Street analysis from Harvard Equity Research has issued a STRONG BUY recommendation on CRON stock. Charles Blitzer was quoted as predicting a $1.25 to $1.50 price near-term with a "thrust into the $3-$4 range sometime in 1998". Harvard Equity Research's last recommendation in October, AATK, went from $3 1/2 to $9 in ten trading days! Harvard Equity Research is so confident of their projections that they are offering their subscribers a money-back guarantee on their subscription if CRON doesn't at least double within the next year. To reiterate: an IMMEDIATE & STRONG BUY recommendation on CRON. For further information go to: http://quote.yahoo.com/ or send a SASE, for a free issue of Harvard Equity Research's latest top-rated newsletter, to H.E.R., P.O. Box 96159, Boston, MA 01742 ------------------- From 10666148 at 08855.com Sun Feb 1 12:18:43 1998 From: 10666148 at 08855.com (10666148 at 08855.com) Date: Sun, 1 Feb 1998 12:18:43 -0800 (PST) Subject: WANT TO KNOW A SECRET?? Message-ID: <> STOP EVERYTHING! WE PAY FOR YOU TO JOIN ! THE BUSINESS OPPORTUNITY: No other organization has our technology! Our products are needed in almost every home and business. They are currently in less than 2% of U.S. homes and very few businesses. Significant commissions (over 40%) can be made from retailing alone. THE MLM OPPORTUNITY: Your sponsor pays your $163 startup costs. You receive 3 high-tech products worth $1200 with zero money down. You sponsor one person, we approve a $1,200 check for you, you pay their $163 startup costs, and start receiving large commissions, and up to 42% residuals from your downline. PLUS - Well show you how to get qualified prospects eager to learn your money-making secret! Bill Gates said that the secret to his success was being in the right place at the right time. For our company (and you), this is it! CALL THE FOLLOWING TOLL FREE NUMBER. IT MAY CHANGE YOUR LIFE!!! Three minute recorded message: 1-800-481-3181 There are also live Conference Calls As soon as youre convinced about the great company, the state of the art products, the enormous market potential, and the huge MLM opportunity, 1. Dial Fax on Demand (409-988-0413) (press 9 during greeting message, then *, then 1) for additional information, or 2. Leave a voice message (409-988-0413), or, if lines are busy, 3. Respond by e-mail to alphaenterprises at yahoo.com. From 10666148 at 08855.com Sun Feb 1 12:18:43 1998 From: 10666148 at 08855.com (10666148 at 08855.com) Date: Sun, 1 Feb 1998 12:18:43 -0800 (PST) Subject: WANT TO KNOW A SECRET?? Message-ID: <> STOP EVERYTHING! WE PAY FOR YOU TO JOIN ! THE BUSINESS OPPORTUNITY: No other organization has our technology! Our products are needed in almost every home and business. They are currently in less than 2% of U.S. homes and very few businesses. Significant commissions (over 40%) can be made from retailing alone. THE MLM OPPORTUNITY: Your sponsor pays your $163 startup costs. You receive 3 high-tech products worth $1200 with zero money down. You sponsor one person, we approve a $1,200 check for you, you pay their $163 startup costs, and start receiving large commissions, and up to 42% residuals from your downline. PLUS - Well show you how to get qualified prospects eager to learn your money-making secret! Bill Gates said that the secret to his success was being in the right place at the right time. For our company (and you), this is it! CALL THE FOLLOWING TOLL FREE NUMBER. IT MAY CHANGE YOUR LIFE!!! Three minute recorded message: 1-800-481-3181 There are also live Conference Calls As soon as youre convinced about the great company, the state of the art products, the enormous market potential, and the huge MLM opportunity, 1. Dial Fax on Demand (409-988-0413) (press 9 during greeting message, then *, then 1) for additional information, or 2. Leave a voice message (409-988-0413), or, if lines are busy, 3. Respond by e-mail to alphaenterprises at yahoo.com. From minow at apple.com Sun Feb 1 00:45:44 1998 From: minow at apple.com (Martin Minow) Date: Sun, 1 Feb 1998 16:45:44 +0800 Subject: RIP, Carl Gorman, Code Talker In-Reply-To: Message-ID: > >- aside from the NSA sucking up everything in sight relating to >languages, doesn't Chomsky's theoretical 'Universal Syntax' (all >human languages have an identical fundamental syntax) negate the >effectiveness of the Code-Talker approach in the long run? > Not really; at its core, Chomsky's theory is a claim that every human can learn any human language -- something that 2-year old infants prove every day. I.e., nothing in language is specific to any particular human social or racial group: the differences are learned. There is a fair body of research that indicates that, after (roughly) puberty, humans do not learn foreign languages in the same way that infants learn their first language; but rather overlay the new language on top of their existing language. >- on the other hand, the lovely ambiguities of natural language >would seem to be capable of effectively obscuring the meaning of >the message even if the plaintext were revealed. The code talkers used a variety of puns and allegorical metaphors to hide the underlying meaning from someone who could translate Navaho but lacked the overall shared culture of the Navaho sailors. During the 1940's, only a handful of non-Navaho (generally linguists) were fluent in the language (probably less than two dozen). Incidently, in a recent episode of the South Bronx tv series, a crime was solved because a black policeman was fluent in Japanese. Martin Minow minow at apple.com From nobody at REPLAY.COM Sun Feb 1 04:25:51 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sun, 1 Feb 1998 20:25:51 +0800 Subject: Zero-knowledge commit Message-ID: <199802011215.NAA10211@basement.replay.com> Timmy C[unt] May carries a turd in his wallet for identification purposes. __| \ / |__ _ o ___\o \o | o/ o/___ o _ Timmy C[unt] May /\ /) | ( \ /o\ / ) | (\ /\ ___|_\______ _____/_|__ From TheSluth at kokomocowboy.com Sun Feb 1 21:22:25 1998 From: TheSluth at kokomocowboy.com (TheSluth at kokomocowboy.com) Date: Sun, 1 Feb 1998 21:22:25 -0800 (PST) Subject: Beat The IRS & PAY-NO-MORE Message-ID: <99235798_35664352> ***************************************************************** - PLEASE IGNORE THE 1st MESSAGE IF YOU LIVE OUTSIDE THE USA - BEAT-THE-IRS & PAY-NO-MORE -------------------------- Our PACKAGE, (Beat The IRS & PAY-NO-MORE) will teach you EXACTLY how to EASILY: STOP FEDERAL Income Tax Withholding, STOP April filing of 1040 Form, & STOP THE IRS EXTORTION PERMANENTLY ---------------------------------- The IRS Federal Income System is based on VOLUNTARY COMPLIANCE... We will teach you how to legally VOLUNTEER OUT OF THE SYSTEM! - PLEASE READ - *************** The Founding Fathers of The United States of America wrote our Constitution, Bill of Rights and Declaration of Indepen- dence to set us FREE from TYRANNY and TAXATION. Our Founding Fathers did not want our government to make you pay INCOME TAXES. If you study the Constitution, and the IRS tax laws, you will find that paying income taxes is not mandatory. It is based on a voluntary system. The LAWS and the SUPREME COURT and the IRS have ruled that Federal income taxes are VOLUNTARY and FILING A RETURN IS NOT REQUIRED in many cases if you properly VOLUNTEER OUT OF THE SYSTEM AND THEIR JURISDICTION.. "Our tax system is based on individual self assessment and VOLUNTARY COMPLIANCE." - M. Caplin, IRS Commissioner "OUR TAX SYSTEM IS BASED UPON VOLUNTARY ASSESSMENT AND PAYMENT AND NOT ON DISTRAINT" -Supreme Court Ruling, Flora v. U.S., 362 U.S. 145 It is very EASY and LEGAL to volunteer out of the IRS tax system, but you must know the EXACT PROCESS REQUIRED to do this simple task. If you don't know the correct way to do this, you could be FINED $500 by the IRS. If you will spend JUST $35.00 we will send you our report: "BEAT THE IRS & PAY-NO-MORE". Our report will SET YOU FREE LEGALLY! After reading our wonderful report and filling out a simple form you will be FREE from the IRS BANDITS and the graduated Federal INCOME TAX ...FOREVER. Our report is guaranteed to STOP FEDERAL INCOME TAX WITHHOLDING from your pay check!!! You will never have to pay Federal income taxes again. You will never have to file a 1040 Form again. You will never have to keep personal expense or income records. You will be completely FREE from the Federal income tax and the IRS. We send you absolute PROOF. After reading our report and following simple instructions your pay check will be free from those nasty income tax deductions. This will put an extra $20 to $200 in your pocket every week!. ISN'T IT ABOUT TIME YOU GET PAID WHAT YOUR WORTH? Now is the time to fight back. Please read on!!! ***************************************************************** Your Success is ABSOLUTELY unconditionally GUARANTEED if your were BORN in and LIVE in one of the 50 Republic States (((((( & DON'T WORK FOR A GOVERNMENT AGENCY.))))) Our methods work every time for everybody. They are 100% legal, honest and ethical. We will pay anybody $1,000 if they can prove our method is ILLEGAL, DISHONEST or UNETHICAL!!! Our method has worked for every person who has ever bought this package without exception. NOBODY HAS EVER FAILED OR ASKED FOR A REFUND!!! - Our PACKAGE includes a LIFETIME, FREE, 50% PAY OUT Dealership, PLUS ALL the marketing material master copies you will ever need. YOUR PAYCHECKS WILL BE 10% TO 30% BIGGER EVERY WEEK, within 2 weeks of filing the proper forms and affidavit. WHY NOT GIVE YOURSELF A RAISE THIS YEAR BY EXERCISING AND ENJOYING MORE OF YOUR CONSTITUTIONAL RIGHTS. SET YOURSELF FREE! Your package includes unlimited FREE phone consultations, a copy of the U.S. Constitution, The Bill of Rights, forms, affidavits, and much, much more! TO ORDER BY MAIL: Send a $35 Money Order to: LINKO --Dept. #1-BEAT-IRS, POB 66781 -- Phoenix, AZ 85082 To order by phone and Fax Check call our office at (602)267-9688 between the hours of 2 and 11pm Mountain Standard Time. You may also call just to ask questions. Thanks for reading this message! Dealer #00001 - (Unconditional Money Back Guarantee) - - Copyright 1996 Linko - ***************************************************************** From nobody at REPLAY.COM Sun Feb 1 05:44:53 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sun, 1 Feb 1998 21:44:53 +0800 Subject: 2001 Tiger Tots Message-ID: <199802011335.OAA19354@basement.replay.com> London Sunday Times February 1, 1998 Arthur C Clarke sex scandal hits Charles's Sri Lanka visit by Yvonne Ridley THE Prince of Wales's visit to Sri Lanka this week hit a new problem last night after Arthur C Clarke, the respected science fiction writer due to be knighted by Charles, allegedly confessed to being a paedophile. The investiture is due to take place on Wednesday during the prince's visit, which coincides with the celebrations for the 50th anniversary of the island's independence. Downing Street said last night: "As far as we are concerned the investiture is still going ahead as planned." A spokesman refused to comment on the possibility of a forfeiture of the honour by the 80-year-old author of 2001: A Space Odyssey. Clarke's revelations, published in today's Sunday Mirror, are bound to embarrass Tony Blair, who named him in his first new year honours as prime minister. Last night diplomats in Colombo, the island's capital, were being asked to assess the author's tabloid confession. If the report is taken at face value the ceremony is unlikely to go ahead. Buckingham Palace advisers contacted British embassy officials in Sri Lanka this year to make discreet inquiries after rumours about Clarke's sexuality and private life. They reported that, although Clarke was known to be gay, there was no evidence of paedophilia. The British-born author of more than 80 novels, who has adopted Sri Lanka as his home, was unable to travel to Britain to receive his knighthood from the Queen because he is virtually confined to a wheelchair as a result of post-polio syndrome. In 1989 he was made a CBE for his services to British cultural interests in Sri Lanka, where he enjoys a tax-free lifestyle bestowed on him by the island because of his celebrity status. He previously met Charles at the British premiere of his Odyssey film in the 1960s, for which he received an Oscar nomination. Surrey-born Clarke was married briefly in 1953 to Marilyn Mayfield, an American who has since died. The marriage lasted about six months after a whirlwind affair. After the split Clarke moved to Sri Lanka, where he now lives in a luxurious home surrounded by state-of-the-art technology and computers that allow him to keep in touch with friends around the world. His study is lined with photographs of celebrities and admirers of his work, including the Pope, Diana, Princess of Wales, Elizabeth Taylor and the astronaut Neil Armstrong. The news also threatens to cast a shadow during the royal visit for senior officials on the island as they have always been proud of the eminent author's presence during the past 40 years. Homosexuality is regarded as an offence in Sri Lanka and carries a prison sentence of up to 10 years. Charles's planned trip was already marred last week by a terrorist attack on a temple that was to have been the scene of the independence celebrations. The bomb killed 17 people, including a suicide team who drove a truck into the old hill capital of Kandy. Buddhist leaders have called for a boycott of this week's ceremonies in protest at Charles's presence. They say Britain sympathises with the island's separatist Tamil Tiger rebels. They also claim the Tamil Tigers, who carried out the bombing, have been allowed to raise money in London for terrorist campaigns. Since the bombing some Buddhist leaders have intensified demands for a formal apology from Britain for its colonial rule. A Foreign Office spokesman said last night that he fully expected Charles's visit to Sri Lanka to go ahead despite the security fears over recent terrorist activities. A report that members of the prince's royal protection squad would not be allowed to carry guns was an "administrative point" that would be resolved before the party left, he said. "It is an island where there is a history of terrorist problems with the Tamil Tigers and, from time to time, with explosions and so forth, so not unnaturally we are looking very closely at security," the spokesman said. From rah at shipwright.com Sun Feb 1 06:37:59 1998 From: rah at shipwright.com (Robert Hettinga) Date: Sun, 1 Feb 1998 22:37:59 +0800 Subject: "Cathedral and Bazzar" meeting with Silicon Valley CEO's Message-ID: --- begin forwarded text Resent-Date: Sat, 31 Jan 1998 12:26:44 -0500 From: glen at substance.abuse.blackdown.org To: 0xdeadbeef at substance.abuse.blackdown.org Cc: bostic at bsdi.com Subject: "Cathedral and Bazzar" meeting with Silicon Valley CEO's Date: Sat, 31 Jan 1998 12:26:40 -0500 Sender: glen at shell.ncm.com Resent-From: 0xdeadbeef at substance.abuse.blackdown.org X-Mailing-List: <0xdeadbeef at substance.abuse.blackdown.org> archive/latest/2692 X-Loop: 0xdeadbeef at substance.abuse.blackdown.org Precedence: list Resent-Sender: 0xdeadbeef-request at substance.abuse.blackdown.org Forwarded-by: Simon Karpen Forwarded-by: Rob Browning From: "Eric S. Raymond" We interrupt our normal programming to inform everybody that I'm likely to be a bit preoccupied and/or out of touch for the next week. The 23 Jan Netscape announcement has borne unexpected fruit. Some of you probably know by now that Netscape is now officially crediting my research paper ("The Cathedral and the Bazaar", available on my site) with having been a fundamentally important factor in their decision to release Navigator 5.0 as freeware in source. Life continues to get more interesting. This coming week I'm flying to Netscape's headquarters in Silicon Valley to meet with Netscape's top brass and technical people. We're going to be defining Netscape's followup -- licensing terms, development strategy, freeware community outreach, spreading the free-software concept. Not only that, but arrangements are being made for me to meet with other leading Silicon Valley CEOs whose names I am not yet at liberty to reveal. The mission will to convince them that the freeware-centered, open-development strategy is the only way for them to head off total Microsoft domination. This is the big time, people -- the Internet free-software culture's breakout into commercial viability at a level even Wall Street can see is happening *now*. And I'm involved it up to my ears. *Gulp!* You'll have to excuse me for being a bit distracted just now. I've got some preparation to do... (Uh...anybody who still doesn't grok what the fuss is about should surf over to and read the story "Linux Plays Large Role In Recent Netscape Announcement". The "read here" link leads to a copy of my paper on their site. Please read it there; my regular website host has been swamped by Web traffic and you get only one guess why...) -- Eric S. Raymond --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ Ask me about FC98 in Anguilla!: From shamrock at netcom.com Sun Feb 1 06:38:47 1998 From: shamrock at netcom.com (Lucky Green) Date: Sun, 1 Feb 1998 22:38:47 +0800 Subject: Need electron microscope Message-ID: <3.0.2.32.19980201063304.0077ac4c@netcom10.netcom.com> I need access to an electron microscope, or better yet, a real chip analysis lab. This is for a serious project that would result in a scientific paper. Who can help? Thanks, -- Lucky Green PGP encrypted mail preferred "I do believe that where there is a choice only between cowardice and violence, I would advise violence." Mahatma Gandhi From ghio at temp0205.myriad.ml.org Sun Feb 1 08:49:33 1998 From: ghio at temp0205.myriad.ml.org (Matthew Ghio) Date: Mon, 2 Feb 1998 00:49:33 +0800 Subject: Interesting Chemical Reaction In-Reply-To: <199801310015.BAA00313@basement.replay.com> Message-ID: <199802011642.LAA01517@myriad> Anonymous wrote: > Perpetual motion machines built on violations of thermodynamics involving > hemispherical and ellipsoidal mirrors have been around for years. They > don't work. > > The objects do not change temperature. Actually, when I did this experiment several years ago, the objects did change temperature (about 1 degree centigrade) but it may have been due to outside light getting in. From dlv at bwalk.dm.com Sun Feb 1 10:02:00 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Mon, 2 Feb 1998 02:02:00 +0800 Subject: Need electron microscope In-Reply-To: <3.0.2.32.19980201063304.0077ac4c@netcom10.netcom.com> Message-ID: Lucky Green writes: > I need access to an electron microscope, or better yet, a real chip > analysis lab. This is for a serious project that would result in a > scientific paper. Who can help? He he he - your asshole employer (C2Net) can't afford to buy equipment, so you need to beg on mailing lists like a pauper? He he he. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From ravage at ssz.com Sun Feb 1 10:10:53 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 2 Feb 1998 02:10:53 +0800 Subject: Electron Microscope... Message-ID: <199802011808.MAA25278@einstein.ssz.com> Hi, I have a couple of suggestions: - Try several of the science museums around the country. As a result of my work with Discovery Hall I know that both Chicago and the Exploratorium in San Fran. had working available electron microscopes. Course this is nearly 10 years out of date too so who knows if they still run them. - You might also try one of the 4 schools in the US who have a certified Semiconductor Technology program. There is one here in Austin, one in Phoenix (I believe), and one somewhere in Oregon. I don't remember where the fourth one is. Call Intel or AMD and ask their HR or PR people where the schools are, they'll know. Good luck. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From eureka at eureka.abc-web.com Mon Feb 2 03:32:12 1998 From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com) Date: Mon, 2 Feb 1998 03:32:12 -0800 (PST) Subject: Eureka! Mon Feb 2 '98 Message-ID: <19980202083303.6713.qmail@eureka.abc-web.com> Welcome to Monday's issue of Eureka! KARA'S ADULT PLAYGROUND With 15 live sex shows, 1,300 Hardcore XXX videos, 1,000s of Hardcore and Softcore Pix, the VaVoom monthly magazine, Kara's exclusive monthly centrefolds, adult games, erotic stories and even casino and sports betting, you won't be going out for weeks particularly now that you can get a FREE trial - your eyes will be popping out of your head! Hahaha! Kara's Playground ...... http://www.rjbtelcom.com/eplay.html PLEASE VISIT THIS FINE EUREKA! PARTNER SITE LOOKING FOR *FREE* SMUT? - SEXY SAMANTHA REVEALS ALL! http://209.50.232.36/sexysam/ I'm Sam and I've searched the web for only the very best *FREE* adult sites. None of these are preview areas for pay sites, or adult verification sites. Just surf and find thousands of the hottest photos, mpegs and audio that you'll find anywhere on the web! SULTRY WOMEN This website features two galleries of hot sexy women. The images are high quality and load fast. There are not a ton of photos, but the ones that are here will perk up your hog. Sultry Women ........... http://www.allthebeauty.com/sultry/ TITANIC TITTIES If you like women with big boobs then this is the place. The woman they feature has two of the biggest breasts I have out on the internet. Huge white tits in a lot of poses and bush too! You would be crazy to not see her melons. It is free! Titanic Titties ............... http://209.81.0.172/titanic/ WILD BANANAS Have a banana? If you do not just go here you will see one. This fruit is right between her legs. This might make for an interesting glaze. Large high quality jpeg images. There are a lot of free pictures here. Spreads, blondes, lesbian, toys, teens, and black. Get wild yourself and check it out! Wild Bananas ................... http://www.wildbananas.com/ WAITING WOMEN You have to click your mouse around a few banners but there are free pictures through out the website. These feature young looking asians, blondes and and exotic looking ladies. Waiting Women ..................... http://www.khans.com/ww/ BRAND NEW - HOORAY! THE ADULT SEARCH ENGINE Now adult surfers have our very own search engine, directly designed to only list adult sites, and so run fast because all other types of site are ignored. Check it out today! Hooray! -----------------> http://eureka.abc-web.com/hooray/ FREE STREAMING VIDEO Please note that most of these feeds require a Netscape bro- wser in order to successfully view them. Unfortunately Micr- osoft's browser does not have all the features of Netscape's yet. However, many of the feeds use the RealPlayer and will work in most browsers. If you do not have Netscape and want a free copy click here --> http://www.netscape.com/download/ Ass fucked teens ---> http://207.240.169.120/anal/start.html CHAT WITH OTHER READERS This chat is growing fast, and already there are a number of regulars you will meet most days. It's good to see Eureka! readers interacting with each other and having a great time! Adult/Sex Chat -----------------> http://137.39.63.229/chat/ General/Fun Chat -------> http://137.39.63.229/chat/funchat/ THE BEST PHONE SEX NEW!!!! LD Call only! - Live Hot Girls!!!!--->1-664-410-3912 LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779 FREE: Live 1-on-1 (international call only)--->011-678-77416 AMATEUR SITE OF THE DAY ---------------------------> http://amateurindex.com/eureka/ EROTIC STORY SITE OF THE DAY Erotic Sex Stories: Free sex stories in 5 different subjects, and the stories are illustrated with hardcore XXX pics! You'll love it! ..... http://www.eroticsexstories.com/ DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/ ADULT STAR PIC OF THE DAY Every day we bring you an exclusive choice pic of a famous adult porn star. And we must tell you - these pix are abso- luletly brilliant! ---> http://www.xxxadultstars.com/eureka/ GAYEUREKA! The gay newsletter is now available. You can get it here! Gay Eureka! ----------> http://eureka.abc-web.com/gayeureka/ EUREKA! TRANSLATIONS As well as English you can now choose any of these languages DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm ESPA�OL ------> http://eureka.abc-web.com/eureka/espanol.htm FRAN�AIS ----> http://eureka.abc-web.com/eureka/francais.htm ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm TODAY'S FREE PIX Pic 1 --------------------------> http://137.39.63.229/?020 Pic 2 --------------------------> http://137.39.63.229/?021 Pic 3 --------------------------> http://137.39.63.229/?022 Pic 4 --------------------------> http://137.39.63.229/?023 Pic 5 --------------------------> http://137.39.63.229/?024 Pic 6 --------------------------> http://137.39.63.229/?025 Pic 7 --------------------------> http://137.39.63.229/?026 Pic 8 --------------------------> http://137.39.63.229/?027 Pic 9 --------------------------> http://137.39.63.229/?028 Pic 10 --------------------------> http://137.39.63.229/?029 ============================================================ TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US. ============================================================ From nobody at REPLAY.COM Sun Feb 1 11:53:12 1998 From: nobody at REPLAY.COM (Anonymous) Date: Mon, 2 Feb 1998 03:53:12 +0800 Subject: (none) Message-ID: <199802011942.UAA02671@basement.replay.com> Subskribe cyferpunks From ravage at ssz.com Sun Feb 1 12:14:18 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 2 Feb 1998 04:14:18 +0800 Subject: [Fwd: JDC Newsletter Vol. 1 No. 6] (fwd) Message-ID: <199802012012.OAA25533@einstein.ssz.com> Forwarded message: >From owner-alg-l at lists.io.com Sun Feb 1 12:58:25 1998 Message-ID: <34D4C68B.23866D8E at bga.com> Date: Sun, 01 Feb 1998 13:01:32 -0600 From: Stu Green X-Mailer: Mozilla 4.03 [en] (X11; I; Linux 2.0.33 i586) MIME-Version: 1.0 To: alg-l at lists.io.com Subject: [Fwd: JDC Newsletter Vol. 1 No. 6] Content-Type: multipart/mixed; boundary="------------A072E7965EF9430CF4337FE8" Sender: owner-alg-l at lists.io.com Precedence: bulk Reply-To: alg-l at lists.io.com This is a multi-part message in MIME format. --------------A072E7965EF9430CF4337FE8 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit --------------A072E7965EF9430CF4337FE8 Content-Type: message/rfc822 Content-Transfer-Encoding: 7bit Content-Disposition: inline Received: from mail1.realtime.net (mail1.realtime.net [205.238.128.217]) by zoom.bga.com (8.6.12/8.6.12) with SMTP id LAA20235 for ; Sun, 1 Feb 1998 11:25:12 -0600 Received: (qmail 27152 invoked from network); 1 Feb 1998 11:51:38 -0000 Received: from sunflash.com (HELO sunflash) (38.211.163.2) by mail1.realtime.net with SMTP; 1 Feb 1998 11:51:38 -0000 Received: from fdds.com by sunflash (SMI-8.6/SMI-SVR4) id GAA11545; Sun, 1 Feb 1998 06:48:56 -0500 From: JDCNewsLetter at web2.javasoft.com Message-Id: <199802011148.GAA11545 at sunflash> To: stugreen at bga.com Date: Sun, 1 Feb 98 06:52:30 EST Subject: JDC Newsletter Vol. 1 No. 6 -WELCOME- to the Java(sm) Developer Connection(sm) Newsletter, covering Early Access software releases, new products, developer programs, the 1998 JavaOne Developer Conference(sm), and more. The JDC Team- J D C N E W S L E T T E R PRODUCT NEWS * Java Activator Release 2 Early Access * Java Foundation Classes(JFC) 0.7 Early Access * Java Accessibility API 0.7 Early Access * Java Cryptography Extension (JCE) 1.2 Early Access * PersonalJava(tm) Platform 1.0 Ships * JavaBeans(tm) in the News INSIDE THE JDC * New on the JDC * Watch for the JDC Reader Survey DEVELOPER PROGRAMS AND RESOURCES * Spring Internet World 98 * 1998 JavaOne Developer Conference * Testing Your Code to See if It's 100% Pure Java(tm)? * Secrets of Successful Java Testing * Visit java.sun.com - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - P R O D U C T N E W S JAVA ACTIVATOR RELEASE 2 EARLY ACCESS. Designed so developers can deploy JDK(tm) 1.1-based applets for Windows and Solaris users on intranet web pages, and provides support for both Internet Explorer 3.02 or later and Netscape Navigator 3.0 or later. To download, see: http://java.sun.com/jdc/earlyAccess/index.html JAVA FOUNDATION CLASSES(JFC) 0.7 EARLY ACCESS. Contains the API specification, documentation, sample code, and a demo. The Swing 0.7 release contains improved menu implementation, significant changes to the table and accessibility APIs, and bug fixes. Note: JFC supports JDK 1.1.2 or higher. To access, see: http://java.sun.com/jdc/earlyAccess/index.html JAVA ACCESSIBILITY API 0.7 EARLY ACCESS. Ensures that the Accessibility API is easily extensible, and simplifies implementation for third-party component developers. Note: This download works only with the JDK 1.1 compatible version of Swing 0.7. To access, see: http://java.sun.com/jdc/earlyAccess/index.html JAVA CRYPTOGRAPHY EXTENSION (JCE) 1.2 EARLY ACCESS. Provides a framework for encryption and key negotiation, and includes interfaces and implementations of secure Java streams, key generation, and symmetric, asymmetric, block, and stream ciphers. JCE 1.2 is designed so that other cryptography libraries can be plugged in as service providers, and new algorithms can be added seamlessly. JCE 1.2 supplements JDK 1.2, which includes interfaces and implementations of message digests and digital signatures. Note: JCE 1.2 requires that JDK 1.2 be installed, and download is restricted to the US and Canada. For more information, see: http://java.sun.com/jdc/earlyAccess/index.html PERSONALJAVA PLATFORM 1.0 SHIPS to licensees. The PersonalJava reference implementation software is designed specifically for network-connectable consumer devices used for communications, entertainment, and mobile computing. Candidates for this Java platform include set-top boxes, mobile hand-held computers, and Internet "web phones." Also announced is the beta release of Personal WebAccess, a compact web browser for devices that run the PersonalJava platform. For more information, see: http://java.sun.com/pr/1998/01/pr980108.html JAVABEANS IN THE NEWS. The draft specification for the Drag and Drop Subsystem for Java Foundation Classes(JFC) is now updated to version 0.95. For more information on JavaBeans, and to access the specification, see: http://java.sun.com/beans http://java.sun.com/beans/glasgow/index.html#draganddrop - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - I N S I D E T H E J D C NEW ON THE JDC. Technical articles covering JDK 1.2, electronic commerce, JDC registration management, building a Web crawler, and more. Plus, don't miss the JDC Tech Tips with hints on StringBuffer and using javap with .class files. To access, see: http://java.sun.com/jdc WATCH FOR THE JDC READER SURVEY coming soon at the end of technical articles. Let the JDC Team know how you like JDC articles -- and what topics you want covered in the future. Plus, earn two DukeDollars for participating. For more information, see: http://java.sun.com/jdc - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - D E V E L O P E R P R O G R A M S A N D R E S O U R C E S SPRING INTERNET WORLD 98. Focusing on industry issues and trends with emphasis on marketing, advertising, ecommerce, finance, and government. Location and date: Los Angeles Convention Center, March 9 to 13, 1998. For more information see: http://events.internet.com/spring98/spring98.html 1998 JAVAONE DEVELOPER CONFERENCE. Be sure to attend the 1998 JavaOne Developer Conference -- at Moscone Center in San Francisco, California, March 24 to 27, 1998. Leading industry speakers include Scott McNealy, CEO of Sun Microsystems, Alan Baratz, President of Sun Microsystems' JavaSoft(tm) Division, and James Gosling, inventor of the Java programming language. Conference sessions include technical tracks, an ISV track, a business track, and more. For details and registration, see: http://java.sun.com/javaone TESTING YOUR CODE TO SEE IF IT'S 100% PURE JAVA? Use JavaPureCheck(tm), the free utility that checks your code for you. And if you're thinking about getting your software certified as 100% Pure, learn why you should -- and see how easy it is. For more information, use the following: http://www.suntest.com/100percent http://java.sun.com/100percent/cert.html 100percentpure-program at java.sun.com SECRETS OF SUCCESSFUL JAVA TESTING. Find out how to write tests once and run them anywhere at "Secrets of Successful Java Testing" seminar, brought to you by SunTest(tm), the Java Testing unit of Sun Microsystems(tm). Join your colleagues, and learn the most effective tools and techniques for testing Java applications and applets. Offered in 17 cities throughout the US, Canada, and the UK. For details, schedules, and registration, see: http://www.suntest.com/seminars/ VISIT JAVA.SUN.COM. Get the latest news and information on Java technology on Sun's JavaSoft web site. Read announcements, learn about new directions, and discover products, partners, programs, and more. To access, see: http://java.sun.com . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . -- Editor's Note -- The names on the JDC mailing list are used for internal Sun Microsystems purposes only. To remove your name from the list, see Subscribe/Unsubscribe below. -- Feedback -- Comments? Send your feedback on the JDC Newsletter to: JDCNewsletter at Sun.com -- Subscribe/Unsubscribe -- To unsubscribe from JDC Email, log in to the JDC. Then click "Change account information." Type your password, and uncheck the box at the end of the form that says "It's okay to send me JDC Email." The JDC log-in address is: http://java.sun.com/jdc -- More on Java Technology -- For the latest news and information on Java technology, see Sun's Java technology site at the following address: http://java.sun.com For in-depth technical articles, tutorials, early access to software, and more, visit the JDC at: http://java.sun.com/jdc -- Archives -- You'll find the JDC Newsletter archives at the following address: http://java.sun.com/jdc/techDocs/newsletter/index.html -- Copyright -- Copyright 1998 Sun Microsystems, Inc. All rights reserved. 901 San Antonio Road, Palo Alto, California 94303 USA This document is protected by copyright. For more information, see: http://java.sun.com/jdc/copyright.html List management and distribution by The Email Channel. For more information, send email to fdds at fdds.com. JDC Newsletter Vol. 1 No. 6 January 27, 1998 --------------A072E7965EF9430CF4337FE8-- --- To unsubscribe send the message "unsubscribe alg-l" without quotes to majordomo at lists.io.com Send questions to owner-alg-l at lists.io.com From emc at wire.insync.net Sun Feb 1 13:02:17 1998 From: emc at wire.insync.net (Eric Cordian) Date: Mon, 2 Feb 1998 05:02:17 +0800 Subject: 2001 Tiger Tots In-Reply-To: <199802011335.OAA19354@basement.replay.com> Message-ID: <199802012055.OAA15665@wire.insync.net> > Arthur C Clarke sex scandal hits Charles's Sri Lanka visit Does this mean that we will get a new edition of "2001" with naked boy scenes? :) Kudos to Arthur for honking the uptight homophobic British establishment, which sees pedophile rings under every shrub and bush. Now do you think we could get James "The Amazing" Randi to issue a similar endorsement? -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From bill.stewart at pobox.com Sun Feb 1 14:27:45 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Mon, 2 Feb 1998 06:27:45 +0800 Subject: Electron Microscope... Message-ID: <3.0.5.32.19980201141920.008a9ab0@popd.ix.netcom.com> At 12:08 PM 2/1/98 -0600, Jim Choate wrote: > - You might also try one of the 4 schools in the US who have a certified > Semiconductor Technology program. There is one here in Austin, one in > Phoenix (I believe), and one somewhere in Oregon. I don't remember where > the fourth one is. Call Intel or AMD and ask their HR or PR people > where the schools are, they'll know. There's also the Cornell University Sub-Micron Research Facility, founded back when microns were still very small, with lots of IBM funds. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From kelsey at plnet.net Sun Feb 1 14:47:30 1998 From: kelsey at plnet.net (John Kelsey) Date: Mon, 2 Feb 1998 06:47:30 +0800 Subject: Chaining ciphers Message-ID: <199802012242.QAA31781@email.plnet.net> -----BEGIN PGP SIGNED MESSAGE----- [ To: Cypherpunks ## Date: 02/01/98 ## Subject: Re: Chaining ciphers ] >Subject: Re: Chaining ciphers >From: ghio at temp0201.myriad.ml.org (Matthew Ghio) >Date: 1998/01/30 >One other possibility is to encrypt with plaintext block >chaining, then superencrypt it PBC in reverse order, >starting with the last block first. An attacker would thus >have to decrypt the entire message before knowing whether >the key was correct or not. I've seen proposals along these lines before (I think there was one by Ron Rivest). If you have a hash function and any symmetric cipher, you can do this. BEAR and LION, the two arbitrary-size block cipher constructions by Ross Anderson and Eli Biham, have this property; you have to process every bit of the message to check a key guess. Using normal chaining modes for this kind of thing, at least with 64-bit block ciphers, usually exposes you to internal-collision kinds of attacks. >> One word of caution (which should be obvious, but can't >> hurt to repeat it): if you chain ciphers (e.g. DES | IDEA | >> 3DES | CAST | Blowfish), be sure to use separate keys for >> each of them; otherwise breaking the last one will give the >> key to the whole lot. >Only if the cryptanalyst knows that the decryption of the >last one was correct, which shouldn't be possible without >also decrypting all the other layers. Actually, this isn't necessarily true. The problem is that you can't guarantee that there won't be some interaction between those encryption operations unless you can assume independent keys. The classic example is this: Suppose the first cipher is double-DES encryption with DES keys (K0,K1), and the second and third encryptions are single-DES decryptions with keys K1 and K0, respectively. You now have e_0(e_1(e_2(x))) leaking all your plaintext directly. The proof for why something like E(X) = IDEA_{K_0}(3DES_{K_1}(X)) is at least as secure as 3DES is as follows: Suppose those keys are random and independent, and suppose you have a way to break E(X). Now, anytime you see a 3DES-encrypted block of data, you can break it, as well, by simply choosing a random IDEA key, encrypting it under that key, and then applying your attack on E(X). In other words, the attack on E(X) implies the attack on 3DES(X), but only if the keys are independent. If there is some dependency between K_0 and K_1 that's required for your attack on E(X), then you can't generalize that out to an attack on 3DES, since you don't know the 3DES key when you start attacking it. To take this a little further, note that an attack on E(X) also implies a chosen-plaintext attack on IDEA. If I have an attack that allows me to break E(X), then I can choose a random 3DES key, pre-encrypt all my chosen plaintexts with it, and then request the encryption of all those plaintexts under the secret IDEA key. The result is E(X), so I can now apply my attack to E(X). For more elaborate constructions, like E3(X) = 3DES_{K_1}(IDEA_{K_2}(Blowfish_{K_3}(X))), we can make the same kind of proof. Suppose I can break E3(X). Now, I can mount a chosen-plaintext attack on IDEA. I select a random encryption key and use it to encrypt all my chosen plaintexts under with Blowfish, and then I request their encryptions. When I get the ciphertexts from that, I select a random 3DES key and encrypt them again. I then apply my attack on E3(X) to break the system. Thus, an attack on E3(X) implies an attack on 3DES, IDEA, *and* Blowfish. But only if the keys are independent and random. Note: I read CP-LITE instead of the whole list. Please CC me on replies. - --John Kelsey, kelsey at counterpane.com / kelsey at plnet.net NEW PGP print = 5D91 6F57 2646 83F9 6D7F 9C87 886D 88AF -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBNNRSUiZv+/Ry/LrBAQGTgAP9EhO0wyPT0HKSXqZD61YPwId8E5C4GJK2 c/+27LBZy8WLhiD92NBc42Rzjbxbir8oWlPkSkZa565mYoaILM0CcP7S15ECyfBY yV2yCOlJdoUo2ea70uIucowxpc2zx2G2KPKBLmGS5P5cwNsx8h3i7KDiRfcWSIGN Omqf38rAy6E= =+f39 -----END PGP SIGNATURE----- From cash_mr at hotmail.com Mon Feb 2 07:26:21 1998 From: cash_mr at hotmail.com (cash_mr at hotmail.com) Date: Mon, 2 Feb 1998 07:26:21 -0800 (PST) Subject: $25.00 for every FREE membership signup Message-ID: <3.0.5.32.19971209114127.00a0983b0@alpha.net> This email is intended for Adult Webmasters only! If you are not an Adult Webmaster and want to be removed from this and any responsible bulk emailers list. Please visit Removelist.com's site for removal instructions at: http://142.176.13.105 _____________________________________________________________ MR CASH will now guarantee $25.00 for every FREE membership signup!!! We have changed the program to pay you either the regular Mr Cash rate (Up to $5.00 per raw hit) or $25.00 per sale WHICH EVER IS HIGHER (By far the highest per sale rate in the industry) Your traffic is valuable. Get paid for it every time. The 100's of Webmasters that are already on the Mr Cash program are Automatically switched to the new program retroactive to Jan.16 1998. If you are not already on the Mr Cash program then here are some more Reasons to sign up. We Now 3 Great sites for you to advertise. Advertise one or advertise Them all. You are able to offer the surfer a Free one-week trail membership To 3 Great sites. Your conversion ratio will go through the roof. Sponsors are paid BI-weekly, so they're no long waiting period to receive your check. We use the most dependable software available on the net today. For more information or to sign up automatically Signup for Pussy Paradise at- http://mr-cash.com http://www.pussyparadise.com Signup for Ultimate Hardcore at - http://mr-cash.com/ultimate http://www.ultimatehardcore.com Signup for Erotic Paradise at - http://mr-erotic--paradise.com/topcash http://www.erotic--paradise.com From eric-grey at usa.net Sun Feb 1 17:22:45 1998 From: eric-grey at usa.net (eric-grey at usa.net) Date: Mon, 2 Feb 1998 09:22:45 +0800 Subject: Would you like to join our referral program? Message-ID: <199802012012.e-mail@sparklers.com> Hello I saw your web site, which was featured on the New Business Sites at Starting Point. I was wondering if you might be interested in participating in our referral program. All you have to do is put our banner or text link on your page. We pay you $50 for every click-thru that signs up for a business credit card merchant account with us. If interested please visit: http://www.tou.com/host/mken/referal.htm Thank you. Marc Kenyon 21st Century Resources From ravage at ssz.com Sun Feb 1 19:59:55 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 2 Feb 1998 11:59:55 +0800 Subject: Updated BBS listing (fwd) Message-ID: <199802020355.VAA26725@einstein.ssz.com> Forwarded message: >From ravage at ssz.com Sun Feb 1 21:54:18 1998 From: Jim Choate Message-Id: <199802020354.VAA26715 at einstein.ssz.com> Subject: Updated BBS listing To: staff at ssz.com (Armadillo Group Staff) Date: Sun, 1 Feb 1998 21:54:17 -0600 (CST) X-Mailer: ELM [version 2.4 PL23] Content-Type: text Content-Length: 3010 Hi, I have updated the listing in Rasca's BBS list and it should show up in one of the future O'Reilly 'Learning Linux' books which we've been listed in since it was published. Jim ----------------------------------------------------------------------------- Hi Rasca, I would like to update the entry for my system, Solar Soyuz Zaibatsu (SSZ). The data that has been in the 'Learning Linux' listing has been out of date the last couple of years. I apologize for not correcting it sooner. It's pretty wild that we've been online in one manner or another since 1984 and involved in Linux since late 1992. The correct information is below: BBS Name: Solar Soyuz Zaibatsu (ssz.com) Phone Number: 512-451-6009 (28.8), 512-451-7060 (33.6) (account required) Online: ?, we're on Internet full time via ISDN Expires: ? Modem Speed (CCITT): 28.8, 33.6 City/Country/State (include region code): Austin, US, Texas (?) Whatever network it is on (i.e. FidoNet, etc.): Internet (ssz.com) First Time access to D/L Linux Files (Y/N): Y (if not request mount via staff at ssz.com) Allow File Requests - Fido style (Y/N): No, available anonymous ftp and temporary guest accounts (send request to staff at ssz.com) Free Access to Linux Files (Y/N): Y BBS Rating (1-5): 5 (what else?) We also support the 'Cypherpunks Distributed Remailer' (cypherpunks at ssz.com), 'Experimental Science Instrumentation Mailing List' (tesla at ssz.com), and are involved in the 'Austin Linux Group' (alg-l at lists.io.com). I also do consulting via 'The Armadillo Group' (consulting at ssz.com). We still support hobby/amateur science and technology via 'The Wired Society' (tws at ssz.com). We currently run Linux on x86, PPC, & SPARC machines as well as Plan 9. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From dlv at bwalk.dm.com Sun Feb 1 20:21:49 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Mon, 2 Feb 1998 12:21:49 +0800 Subject: (none) In-Reply-To: <199802011942.UAA02671@basement.replay.com> Message-ID: nobody at REPLAY.COM (Anonymous) writes: > Subskribe cyferpunks An old one for those who forgot it already... If Bill is , then who's Hillary? --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From bogus@does.not.exist.com Sun Feb 1 21:05:03 1998 From: bogus@does.not.exist.com (Dr.Dimitri Vulis KOTM) Date: Mon, 2 Feb 1998 13:05:03 +0800 Subject: Bush Gang Suspected In Assault On PresidencyBush Gang Suspected In Assault On Presidency In-Reply-To: <34cae887.ccs@ccs.covici.com> Message-ID: Bush gang suspected in new assault on Presidency by Edward Spannaus and Jeffrey Steinberg In the midst of the worst global financial crisis in modern history, the United States Presidency has come under renewed, vicious attack from a combination of British and nominally ``American'' Bush-League circles. This latest attack, which one White House official long ago appropriately dubbed ``bimbo eruptions,'' centered around a Bush ``mole'' who was, unfortunately, allowed to operate inside the Clinton administration, and who now enjoys high-level security clearances in her post at the Pentagon. Linda Tripp, the central player in the renewed assault against President Clinton--staged around a purported sex scandal involving a young White House intern, Monica Lewinsky--was a Bush administration employee from 1990, until Bush left office in January 1993. At the urging of senior Bush administration officials, including Transportation Secretary Sam Skinner, Tripp was retained by the Clinton-Gore transition team in a clerical position, and later assigned to work at the Office of the White House General Counsel, under Bernard Nussbaum and his deputy, Vincent Foster. All the while, she was operating as part of a treasonous Bush-League ``fifth column'' within the Executive branch. While the ``Get Clinton'' media have attempted to portray Tripp as ``apolitical,'' she was, in fact, an ally, from the Bush administration period on, of then-FBI agent Gary Aldrich, who, in 1996, wrote a libellous book against President Clinton, {Unlimited Access: An FBI Agent Inside the Clinton White House,} which also revolved around bogus claims of White House sexual misconduct (see {EIR,} July 26, 1996, p.|72.) Aldrich was another Bush-League mole inside the Clinton White House. His embarrassingly fantasy-ridden book has been trumpetted by the London-based Hollinger Corporation, the leading British Crown media cartel; by its subsidiary, {American Spectator} magazine; and by ``Get Clinton'' money-bags Richard Mellon Scaife. Tripp emerged in 1995 as an asset of Whitewater Independent Counsel Kenneth Starr, testifying before the Whitewater grand jury and later before a Congressional hearing on the death of Vincent Foster. When Lloyd Cutler replaced Nussbaum as White House General Counsel, Tripp, who by then had been widely identified as an unabashed political enemy of President Clinton, was reassigned to the Pentagon, where she eventually got an $80,000-a-year job, which also involved her getting top-level security clearances. Tripp claimed, to anyone who would listen, that she had been transferred from the White House because she ``knew too much about Whitewater,'' a patent lie. Commenting on the role of Tripp as the linchpin in the latest Clintongate assault, Lyndon LaRouche called on Jan. 22 for Tripp's security clearances to be immediately revoked, pending the outcome of a thorough probe of her role in the sordid affair. ``She obviously needs her security clearances immediately pulled, given her role in what has all the earmarks of an illegal attack against the President, ostensibly on behalf of partisan Republican forces. I would certainly hope that there is no one in the Pentagon who would countenance such an obvious assault against a vital American institution, the Presidency. I would expect such treachery from the editorial page writers at the {Wall Street Journal,} but not from our military.'' - An earlier `eruption' - In the summer of 1997, Tripp surfaced again as part of an effort to hit President Clinton with a ``Profumo''-style sex scandal, telling {Newsweek} that the President had sexually harassed a White House aide, Kathleen Willey. Willey denied, under oath, that Tripp's allegations were true. This prompted President Clinton's attorney, Robert Bennett, belatedly, in August 1997, to denounce Tripp as a liar. While working at the Pentagon, in late 1996, Tripp had already begun to cultivate a close relationship with a former White House junior staff aide, 22-year-old Monica Lewinsky, who had been recently transferred to the Defense Department. It is unclear how the two women came to meet, but in short order, Tripp began to exert a significant amount of control over the younger woman. Tripp should be forced, under oath, to detail the circumstance under which she met and befriended Lewinsky. Tripp soon betrayed Lewinsky's confidence by surreptitiously--and, probably, illegally--taping telephone conversations with Lewinsky. By December 1997, Tripp and Lewinsky had {both,} mysteriously, been subpoenaed to give depositions to attorneys for Paula Jones, in her civil lawsuit against the President--a lawsuit instigated by British intelligence operator and former London {Sunday Telegraph} Washington correspondent Ambrose Evans-Pritchard. How Jones's attorneys came to know of the existence of Tripp and Lewinsky is one question that may hold a key to Tripp's role in the present attack against the President. It should be recalled that, prior to being named the independent counsel in Whitewater, Kenneth Starr had been paid by Richard Mellon Scaife, through the Landmark Legal Foundation, to prepare an {amicus curiae} brief in support of Paula Jones. Tripp claims that, on Jan. 12, 1998, she took 20 hours of tape-recorded conversations with Lewinsky to Whitewater Special Prosecutor Starr. The next day, Starr arranged for Tripp to secretly tape her meeting with Lewinsky at the Ritz Carlton Hotel near the Pentagon in Arlington, Virginia. At the time that Starr arranged for the FBI to secretly tape the Tripp-Lewinsky meeting, {he had absolutely no jurisdiction to probe President Clinton's relationship to the former White House aide.} Indeed, it is critical that a full-scale probe be conducted, to determine whether Tripp, who was in league with Starr from 1995, was taping her conversations with Lewinsky on her own, or, covertly, on behalf of Starr. At minimum, Starr vastly overstepped his jurisdiction; far more likely, he himself broke the law--along with Tripp--in a flagrant attempt to entrap and destroy President Clinton. - No U.S. precedent - In the 200-year history of the American Presidency, there have been occasional sexual scandals involving top government officials; however, never has such a personal scandal brought down the chief executive. There is only one country in the world where heads of government are brought to their knees through such tabloid scandal-mongering: Great Britain. In 1963, Harold Macmillan's government was brought down by a sex scandal involving Defense Minister John Profumo. It is, therefore, not surprising that a review of the various Clintongate scandals, from the 1993 so-called ``Troopergate'' affair to the present attack, reveals that British intelligence stringer and former {Sunday Telegraph} Washington correspondent Ambrose Evans-Pritchard has been the chief instigator. As early as May 8, 1994, in a {Sunday Telegraph} column, Evans-Pritchard boasted that he had been instrumental in getting Paula Jones to file her civil suit against the President. Evans-Pritchard has elsewhere boasted that his assignment, on behalf of the British Crown's Hollinger Corporation, has been nothing less than the total destruction of the Clinton Presidency. Writing in the Jan. 22 {Daily Telegraph,} Evans-Pritchard loudly bragged of his manipulation of Paula Jones: ``My impression after befriending her four years ago, before she took the momentous step of suing the President, is that her motive was sheer rage.'' ``Paula Jones has now achieved her object of inflicting massive damage on Bill Clinton, with shortening odds that she may ultimately destroy his Presidency,'' he continued. Evans-Pritchard accuses the U.S. news media of covering up the Clinton sex scandals, so that only the {American Spectator} or the British press will print the stories. ``What Paula Jones has done is to use the immense power of legal discovery to force the scandal to the surface. She has finally done the job that the American media failed to do so miserably.'' This was precisely the strategy that Evans-Pritchard had laid out in 1994, when he acknowledged on May 8, 1994, that he had had ``a dozen conversations with Mrs. Jones over the past two months.'' He furthermore admitted that ``I happened to be present at a strategy meeting last month on a boat on the Arkansas River,'' at which Jones's attorney ``was weighing the pros and cons of legal action.'' It doesn't ``matter all that much whether Mrs. Jones ultimately wins or loses her case,'' he wrote on May 15, 1994. ``The ticking time bomb in the lawsuit lies elsewhere, in the testimony of other witnesses.'' ``Put plainly,'' Evans-Pritchard blurted, ``the political purpose of the Jones lawsuit is to reconstruct the inner history of the Arkansas Governor's Mansion, using the legal power of discovery. In effect, the two lawyers and their staff could soon be doing the job that the American media failed to do during the election campaign and have largely failed to do since.'' Evans-Pritchard's motive, in contrast to Jones's ``sheer rage,'' is a deep, abiding hatred of the United States, and particularly, the institution of its Presidency. Anyone who joins Evans-Pritchard in this unfolding assault upon the Presidency, is joining the ranks of traitor Aaron Burr. A thorough probe of the current insurrection, beginning with a spotlight on Linda Tripp, is more than appropriate. >From Executive Intelligence Review V25, #5. -- John Covici covici at ccs.covici.com From dlv at bwalk.dm.com Sun Feb 1 21:05:57 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Mon, 2 Feb 1998 13:05:57 +0800 Subject: Bush Gang Suspected In Assault On Presidency In-Reply-To: <34cae887.ccs@ccs.covici.com> Message-ID: Path: perun!news From: covici at ccs.covici.com Newsgroups: local.echorel Subject: Bush Gang Suspected In Assault On Presidency Message-ID: <34cae887.ccs at ccs.covici.com> Date: Sun, 25 Jan 1998 02:23:49 -0500 Sender: news at bwalk.dm.com Reply-To: LaRouche Issues Mailing List Organization: Covici Computer Systems Bush gang suspected in new assault on Presidency by Edward Spannaus and Jeffrey Steinberg In the midst of the worst global financial crisis in modern history, the United States Presidency has come under renewed, vicious attack from a combination of British and nominally ``American'' Bush-League circles. This latest attack, which one White House official long ago appropriately dubbed ``bimbo eruptions,'' centered around a Bush ``mole'' who was, unfortunately, allowed to operate inside the Clinton administration, and who now enjoys high-level security clearances in her post at the Pentagon. Linda Tripp, the central player in the renewed assault against President Clinton--staged around a purported sex scandal involving a young White House intern, Monica Lewinsky--was a Bush administration employee from 1990, until Bush left office in January 1993. At the urging of senior Bush administration officials, including Transportation Secretary Sam Skinner, Tripp was retained by the Clinton-Gore transition team in a clerical position, and later assigned to work at the Office of the White House General Counsel, under Bernard Nussbaum and his deputy, Vincent Foster. All the while, she was operating as part of a treasonous Bush-League ``fifth column'' within the Executive branch. While the ``Get Clinton'' media have attempted to portray Tripp as ``apolitical,'' she was, in fact, an ally, from the Bush administration period on, of then-FBI agent Gary Aldrich, who, in 1996, wrote a libellous book against President Clinton, {Unlimited Access: An FBI Agent Inside the Clinton White House,} which also revolved around bogus claims of White House sexual misconduct (see {EIR,} July 26, 1996, p.|72.) Aldrich was another Bush-League mole inside the Clinton White House. His embarrassingly fantasy-ridden book has been trumpetted by the London-based Hollinger Corporation, the leading British Crown media cartel; by its subsidiary, {American Spectator} magazine; and by ``Get Clinton'' money-bags Richard Mellon Scaife. Tripp emerged in 1995 as an asset of Whitewater Independent Counsel Kenneth Starr, testifying before the Whitewater grand jury and later before a Congressional hearing on the death of Vincent Foster. When Lloyd Cutler replaced Nussbaum as White House General Counsel, Tripp, who by then had been widely identified as an unabashed political enemy of President Clinton, was reassigned to the Pentagon, where she eventually got an $80,000-a-year job, which also involved her getting top-level security clearances. Tripp claimed, to anyone who would listen, that she had been transferred from the White House because she ``knew too much about Whitewater,'' a patent lie. Commenting on the role of Tripp as the linchpin in the latest Clintongate assault, Lyndon LaRouche called on Jan. 22 for Tripp's security clearances to be immediately revoked, pending the outcome of a thorough probe of her role in the sordid affair. ``She obviously needs her security clearances immediately pulled, given her role in what has all the earmarks of an illegal attack against the President, ostensibly on behalf of partisan Republican forces. I would certainly hope that there is no one in the Pentagon who would countenance such an obvious assault against a vital American institution, the Presidency. I would expect such treachery from the editorial page writers at the {Wall Street Journal,} but not from our military.'' - An earlier `eruption' - In the summer of 1997, Tripp surfaced again as part of an effort to hit President Clinton with a ``Profumo''-style sex scandal, telling {Newsweek} that the President had sexually harassed a White House aide, Kathleen Willey. Willey denied, under oath, that Tripp's allegations were true. This prompted President Clinton's attorney, Robert Bennett, belatedly, in August 1997, to denounce Tripp as a liar. While working at the Pentagon, in late 1996, Tripp had already begun to cultivate a close relationship with a former White House junior staff aide, 22-year-old Monica Lewinsky, who had been recently transferred to the Defense Department. It is unclear how the two women came to meet, but in short order, Tripp began to exert a significant amount of control over the younger woman. Tripp should be forced, under oath, to detail the circumstance under which she met and befriended Lewinsky. Tripp soon betrayed Lewinsky's confidence by surreptitiously--and, probably, illegally--taping telephone conversations with Lewinsky. By December 1997, Tripp and Lewinsky had {both,} mysteriously, been subpoenaed to give depositions to attorneys for Paula Jones, in her civil lawsuit against the President--a lawsuit instigated by British intelligence operator and former London {Sunday Telegraph} Washington correspondent Ambrose Evans-Pritchard. How Jones's attorneys came to know of the existence of Tripp and Lewinsky is one question that may hold a key to Tripp's role in the present attack against the President. It should be recalled that, prior to being named the independent counsel in Whitewater, Kenneth Starr had been paid by Richard Mellon Scaife, through the Landmark Legal Foundation, to prepare an {amicus curiae} brief in support of Paula Jones. Tripp claims that, on Jan. 12, 1998, she took 20 hours of tape-recorded conversations with Lewinsky to Whitewater Special Prosecutor Starr. The next day, Starr arranged for Tripp to secretly tape her meeting with Lewinsky at the Ritz Carlton Hotel near the Pentagon in Arlington, Virginia. At the time that Starr arranged for the FBI to secretly tape the Tripp-Lewinsky meeting, {he had absolutely no jurisdiction to probe President Clinton's relationship to the former White House aide.} Indeed, it is critical that a full-scale probe be conducted, to determine whether Tripp, who was in league with Starr from 1995, was taping her conversations with Lewinsky on her own, or, covertly, on behalf of Starr. At minimum, Starr vastly overstepped his jurisdiction; far more likely, he himself broke the law--along with Tripp--in a flagrant attempt to entrap and destroy President Clinton. - No U.S. precedent - In the 200-year history of the American Presidency, there have been occasional sexual scandals involving top government officials; however, never has such a personal scandal brought down the chief executive. There is only one country in the world where heads of government are brought to their knees through such tabloid scandal-mongering: Great Britain. In 1963, Harold Macmillan's government was brought down by a sex scandal involving Defense Minister John Profumo. It is, therefore, not surprising that a review of the various Clintongate scandals, from the 1993 so-called ``Troopergate'' affair to the present attack, reveals that British intelligence stringer and former {Sunday Telegraph} Washington correspondent Ambrose Evans-Pritchard has been the chief instigator. As early as May 8, 1994, in a {Sunday Telegraph} column, Evans-Pritchard boasted that he had been instrumental in getting Paula Jones to file her civil suit against the President. Evans-Pritchard has elsewhere boasted that his assignment, on behalf of the British Crown's Hollinger Corporation, has been nothing less than the total destruction of the Clinton Presidency. Writing in the Jan. 22 {Daily Telegraph,} Evans-Pritchard loudly bragged of his manipulation of Paula Jones: ``My impression after befriending her four years ago, before she took the momentous step of suing the President, is that her motive was sheer rage.'' ``Paula Jones has now achieved her object of inflicting massive damage on Bill Clinton, with shortening odds that she may ultimately destroy his Presidency,'' he continued. Evans-Pritchard accuses the U.S. news media of covering up the Clinton sex scandals, so that only the {American Spectator} or the British press will print the stories. ``What Paula Jones has done is to use the immense power of legal discovery to force the scandal to the surface. She has finally done the job that the American media failed to do so miserably.'' This was precisely the strategy that Evans-Pritchard had laid out in 1994, when he acknowledged on May 8, 1994, that he had had ``a dozen conversations with Mrs. Jones over the past two months.'' He furthermore admitted that ``I happened to be present at a strategy meeting last month on a boat on the Arkansas River,'' at which Jones's attorney ``was weighing the pros and cons of legal action.'' It doesn't ``matter all that much whether Mrs. Jones ultimately wins or loses her case,'' he wrote on May 15, 1994. ``The ticking time bomb in the lawsuit lies elsewhere, in the testimony of other witnesses.'' ``Put plainly,'' Evans-Pritchard blurted, ``the political purpose of the Jones lawsuit is to reconstruct the inner history of the Arkansas Governor's Mansion, using the legal power of discovery. In effect, the two lawyers and their staff could soon be doing the job that the American media failed to do during the election campaign and have largely failed to do since.'' Evans-Pritchard's motive, in contrast to Jones's ``sheer rage,'' is a deep, abiding hatred of the United States, and particularly, the institution of its Presidency. Anyone who joins Evans-Pritchard in this unfolding assault upon the Presidency, is joining the ranks of traitor Aaron Burr. A thorough probe of the current insurrection, beginning with a spotlight on Linda Tripp, is more than appropriate. >From Executive Intelligence Review V25, #5. -- John Covici covici at ccs.covici.com From unicorn at schloss.li Sun Feb 1 22:56:29 1998 From: unicorn at schloss.li (Black Unicorn) Date: Mon, 2 Feb 1998 14:56:29 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) In-Reply-To: Message-ID: <3.0.3.32.19980202005111.006c10d0@schloss.li> Mr. May said: >Suffice it to say that I find nearly all cases where someone is "demanding" >personal information to be cases where the government has required them to, >for various unseemly purposes, or in cases where credit is being arranged. Of late I tried to pay off a rather large American Express bill. Suddenly, AMEX won't take cash in excess of $1,000 in any single billing period (30 days). The large sign on the wall indicated the substance of the new rule (or the old rule newly enforced) and added that customers "may be required to produce two forms of identification including a government issued identification card and a social security number." Here's a situation where the payor is (theoretically) positively identified to the payee (including ssn), where credit has already been established, and where records are certain to exist for all transactions which are being paid for. The AMEX Corporate card was once a wonderful tool to preserve anonymity with. One could issue several cards for a domestic company, 100% owned by an offshore, and settle in cash. Properly done, this was perfectly legal. Well, once upon a time anyhow. I find it extremely alarming that a general transaction like this can be illegal where almost no case can be made for a danger of money laundering or some kind of support of the "underground economy" (except perhaps that I'd have Pablo Escobar pay off my Amex to compensate me for my illegal smuggling flights, but that's a bit thin in my view). Increasingly, I try and find explanations for these kinds of regulations which do not include a paranoid rant about governments making sure they maintain a firm set of records on every citizen for whenever it might be "needed," (or wanted). Increasingly, this becomes a difficult mental task. Increasingly, it is difficult to make cash transactions. In the end that seems to be the point. Make it difficult to pay with cash. Make it suspicious to pay with cash. Make it an attention getter if you pay with cash. Sound paranoid? Try this. I'd like everyone who reads this to try and go 45 days without using plastic or writing a check. Just 45 days. If you don't grow alarmist very quickly (like in the first week) I'd like to hear your experience. If nothing else, try adding up a few months of finance charges, yearly fees on your credit cards, transactions fees, check fees, interest lost on no-interest checking accounts... see what you're paying to keep people from looking at you like a criminal. There's an interesting new awakening in personal finance right now which advises, among other things, "pay in cash, die broke." I'm interested to see how this "pay in cash" advice, which I have followed religiously years before it was put in print, clashes with post-modern financial regulation. I know things have gotten really out of hand because the phrase "No, I'll pay with cash," which I find I have to use more and more often, turns more and more heads and is met more and more often with a cross look from a teller and a finger pointed at a large sign bearing the heading "Restrictions on Cash Transactions." When the question becomes "Which credit card will you be paying with?" and no longer does one hear "How will you be paying for that?" I think people better start thinking about what's happening. (I'm not on cypherpunks anymore, mail me directly). From ravage at ssz.com Sun Feb 1 23:09:37 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 2 Feb 1998 15:09:37 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) (fwd) Message-ID: <199802020709.BAA27402@einstein.ssz.com> Forwarded message: > Date: Mon, 02 Feb 1998 00:51:11 -0600 > From: Black Unicorn > Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) > Sound paranoid? Try this. I'd like everyone who reads this to try and go > 45 days without using plastic or writing a check. Just 45 days. If you > don't grow alarmist very quickly (like in the first week) I'd like to hear > your experience. I've been doing it for many years. Don't have a checking account, don't own a credit card. I do have a saving account with a local credit union and go in every 3-4 days and withdraw what I need for the next 3-4 days. Pay every bill in cash or money order. I'm not going into how I invest my excess capital. If my employer needs me to travel I do it on their plastic. The only irritating thing I find is that I can't walk into grocery stores any more and get money orders larger than $700 and many won't do it for more than $400. I have to pay my rent each month with a $400 and a $397 money order in order to meet the $797 amound due because I'm too lazy to drive the extra 6-8 blocks to the one who will do the $700 money orders. Other than that I don't have a problem at all. I'm going to go tomorrow and buy a new laptop at around $1500. I intend on paying with a wad of $100 bills. Bet you they don't look twice nor will they ask for ID. I've actualy never had a problem paying cash, never had anyone turn real money down... ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From partners at partnersnow.com Mon Feb 2 16:51:57 1998 From: partners at partnersnow.com (partners at partnersnow.com) Date: Mon, 2 Feb 1998 16:51:57 -0800 (PST) Subject: ELECTRICITY CAN MAKE YOU RICH Message-ID: <199801300133.UAA02365@partnersnow.com> All of us are constantly bombarded by people hawking "unbelievable", "once-in-a-lifetime", "get-rich-quick" business opportunities. I graduated from Yale, became Commissioner of Housing in New York City, started a real estate development company, and now own an 83-year-old diamond-cutting company. Quite bluntly, I won't waste my time even listening to the pitch. And yet right now, I am telling eveybody I know (and, obviously, hundreds of people I don't know) about an opportunity available in the deregulation of electricity that sounds just as outrageous as all the phony talk we've heard in the past. The difference is that this is real. And the urgency comes from the fact that it will never happen again. You might choose to read no further, but you will never be able to say that you weren't there when business history was being made. MAKE NO INVESTMENT AND START PART-TIME Know up front that your participation will not require start-up costs of more than about $300 nor that you leave your current full-time job. You should also know that deregulated electricity in the US, albeit a $215-billion industry, is only one component in a global master plan that will soon tap even larger markets in internet commerce, telecommunications, and energy distribution. In all these markets, our participation will be in partnership with the most respected names in the corporate world. The structure of this precedent-setting Company has already been formed and the names of our partners will be announced over the next few weeks. We intend to do for all services entering homes, offices, and factories what the supermarket did to individual food shops and what the mall did to Main Street stores. The powerful trend to consolidation will naturally successfully extend to essential modern services because the benefits will be the same: lower cost and greater convenience. This is nobody's pipe dream. This is history in the making, and you can become a very rich player by finally being in the right place at the right time and taking action. DEREGULATION CAN ONLY HAPPEN ONCE By the year 2002, the domestic electric utilities industry will be fundamentally deregulated. That means that the out-dated, costly, monopolistic utility providers, which we have always accepted like death and taxes, will be forced to compete in the open market with lower-cost, high-tech, entrepreneurial, service-oriented private companies. In many states, the process has already begun. California's $20-billion industry will be one of the first to deregulate completely in 1998, along with New Hampshire and Rhode Island. Massachusetts and Pennsylvania are right behind, with many other states scheduling to start in 1998, too. Consumers will have the right to choose the source of their power and you will have the opportunity to sell it. And it has all been done before. In the 1970's, the airline industry deregulated and the resulting competition destroyed established companies and made fortunes for others. In the 1980's, AT&T lost its monopoly and now barely holds on to 50% of the market. The significant difference in the deregulation of electricity in the 1990's is that you are right now being given a chance to participate even before it happens. Our Company has developed the multi-million-dollar infrastructure to support its goal of becoming to deregulated electricity what MCI became to deregulated telephone. And the distribution of our electricity will be made only through independent entrepreneurs empowered by the Company to profit every time a customer turns on a light. Even more eye-opening, these "electricity entrepreneurs" will profit to an even greater extent from their monthly commissions on their customers' use of all the other services the new Company will offer: internet commerce, telephony of all kinds, home security, cable TV, and many more. With three or more services "bundled" together, studies have shown that customers are lost at a rate of less than 10% a year. This is true residual income. Compensation accrues from four main sources: (1) up-front agency fees paid to the Distributor when customers subscribe to our services; (2) up-front training fees paid to the Sponsor when new Distributors join the Company; (3) residual commissions paid to the Distributor as a percentage of customers' monthly use of the Company's services; and (4) executive bonuses paid to Distributors on the total volume generated by his or her entire organization. CAPITALIZE ON A PROVEN ROCK-SOLID COMPANY As I said, we are not looking for investors. Our parent is a 13-year-old, $1.4 billion, high-tech company with a D&B 5A-1, no debt, US Olympic Committee licenses, and operations in 23 countries all over the world. It is one of nine companies in the history of the United States that grew from start-up to one billion dollars in sales in less than ten years (others include Microsoft, FEDEX, Nike, and Home Depot). Our Asian division went public on the New York Stock Exchange with Morgan Stanley and Merrill Lynch as our underwriters. Most important, the Company has established a brilliant, highly-leveraged plan for growth that has empowered over 400 associates, working on their own schedules, usually out of their own homes, to reach an income level that in 1996 averaged $561,000 a year. Significantly, that track record was achieved in industries a small fraction of the size of deregulated electricity and our other future markets. Please be aware that there will be many start-up companies hustling to be players in this historic opportunity. There will be efforts by the utility dinosaurs to hang on to their markets. Be sure that your potential in this industry isn't undermined by the failure of the insubstantial up-starts or the collapse of the prehistoric giants. LIFE IS NOT A DRESS REHEARSAL In my role as President of a diamond-cutting company, I know the frustrations of a capital-intensive, high-risk, low-margin, slow-growth industry. As an Administrator in the medical community, my wife sees the deterioration in doctors' earnings and the downsizing and closing of hospitals everywhere. While many of the old ways of making money are gone, new opportunities abound. Deregulated electricity is the next big opportunity, structured by a genius hyper-growth Company that is already allowing my wife and me to continue our professional work full-time, while enabling us to develop part-time a perpetual income with unlimited potential. The partners we are seeking for this opportunity should be independent, open-minded, self-motivated, highly-principled entrepreneurs. Such a profile might seem demanding, but the financial rewards can be gigantic. I was skeptical, too, at first. But the more I investigated, the more I realized that this is the rare, legitimate, dynamic opportunity that people, not long from now, will look back to and lament that they they missed. Electricity deregulation has never happened before and will never happen again. There is no doubt that fortunes will be made as a result of deregulation and the Company's global vision. The only question is who will be along for the ride. And it might not be for you. There are always reasons. But clearly, if you continue to do what you've always done, you'll continue to get what you've always gotten. And if you've already gotten all the time freedom and all the money you've always wanted, this opportunity is probably not for you. But if you haven't, how long are you going to wait? For more information, please call 1-800-326-9253 or email me back and leave your name and daytime and evening phone number and the best time to call. Serious inquiries only please. /////////////////////////////////////////////////////////////////////////////// We practice responsible emailing. If you wish to be removed from future mailings, please reply with remove in the subject. //////////////////////////////////////////////////////////////////////////////// From dlv at bwalk.dm.com Mon Feb 2 18:40:09 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Mon, 2 Feb 1998 18:40:09 -0800 (PST) Subject: The Continued Attack on Cash (Was: "The Right of In-Reply-To: Message-ID: Tim May writes: > At 3:52 PM -0800 2/2/98, Black Unicorn wrote: > >At 06:07 PM 2/2/98 +0000, Attila T. Hun wrote: >... > >(I'm not on cpunks, mail me). > > Sorry, if you want to read my words ya gotta subscribe. Let's collect Timmy's words of wisdom for posterity. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From dlv at bwalk.dm.com Mon Feb 2 04:57:16 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Mon, 2 Feb 1998 20:57:16 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) ( In-Reply-To: <199802020709.BAA27402@einstein.ssz.com> Message-ID: Jim Choate writes: > Don't have a checking account, don't own > a credit card. Minor nit: most people who do use credit cards don't "own" them either. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From jya at pipeline.com Mon Feb 2 04:57:45 1998 From: jya at pipeline.com (John Young) Date: Mon, 2 Feb 1998 20:57:45 +0800 Subject: BXA Meet Message-ID: <1.5.4.32.19980202124909.010275c4@pop.pipeline.com> Should anyone attend this a report would be welcome. Federal Register: February 2, 1998 (Volume 63, Number 21) Page 5353 ----------------------------------------------------------------------- DEPARTMENT OF COMMERCE Bureau of Export Administration Regulations and Procedures Technical Advisory Committee; Notice of Partially Closed Meeting A meeting of the Regulations and Procedures Technical Advisory Committee will be held February 25, 1998, 9:00 a.m., in the Herbert C. Hoover Building, Room 3884, 14th Street between Constitution and Pennsylvania Avenues, N.W., Washington, D.C. The Committee advises the Office of the Assistant Secretary for Export Administration on implementation of the Export Administration Regulations (EAR) and provides for continuing review to update the EAR as needed. Agenda Open Session 1. Opening remarks by the Chairperson. 2. Presentation of papers or comments by the public. 3. Update on implementation of the National Defense Authorization Act computer control regulations. 4. Update on the Wassenaar Arrangement implementation regulation. 5. Discussion on the ``deemed export'' rule. 6. Discussion on the encryption regulations. 7. Update on the License Process Review initiative. 8. Discussion on efforts to conform the Foreign Trade Statistics Regulations and the Export Administration Regulations on export clearance requirements. 9. Discussion on clarification of EPCI (Enhanced Proliferation Control Initiative). Closed Session 10. Discussion of matters properly classified under Executive Order 12958, dealing with the U.S. export control program and strategic criteria related thereto. The General Session of the meeting will be open to the public and a limited number of seats will be available. To the extent that time permits, members of the public may present oral statements to the Committee. Written statements may be submitted at any time before or after the meeting. However, to facilitate the distribution of public presentation materials to the Committee members, the Committee suggests that presenters forward the public presentation materials two weeks prior to the meeting date to the following address: Ms. Lee Ann Carpenter, OAS/EA/BXA MS:3886C, 14th & Pennsylvania Avenue, N.W., U.S. Department of Commerce, Washington, D.C. 20230. The Assistant Secretary for Administration, with the concurrence of the delegate of the General Counsel, formally determined on December 16, 1996, pursuant to Section 10(d) of the Federal Advisory Committee Act, as amended, that the series of meetings or portions of meetings of the Committee and of any Subcommittees thereof, dealing with the classified materials listed in 5 U.S.C. 552b(c)(1) shall be exempt from the provisions relating to public meetings found in section 10(a) (1) and (a) (3), of the Federal Advisory Committee Act. The remaining series of meetings or portions thereof will be open to the public. A copy of the Notice of Determination to close meetings or portions of meetings of the Committee is available for public inspection and copying in the Central Reference and Records Inspection Facility, Room 6020, U.S. Department of Commerce, Washington, D.C. For further information, call Lee Ann Carpenter at (202) 482-2583. Dated: January 27, 1998. Lee Ann Carpenter, Director, Technical Advisory Committee Unit. [FR Doc. 98-2393 Filed 1-30-98; 8:45 am] From vicente at certisign.com.br Mon Feb 2 05:26:06 1998 From: vicente at certisign.com.br (Vicente Silveira) Date: Mon, 2 Feb 1998 21:26:06 +0800 Subject: More on ISDN Features In-Reply-To: <1.5.4.32.19980130235837.0072cee4@pop.pipeline.com> Message-ID: <34D5C79F.A4EA70B@certisign.com.br> Btw, a report from the New Zealand Herald ( 1997-07-21 ) says that New Zealand's secret facility of Waihopai ( believed to be part of Echelon ) was being upgraded to be able to monitor an increasing volume of telecommunications on the Pacific. Even more interesting is that the NZ's Crimes Act was being modified to allow the interception of "private oral communications" ( phone calls ) of foreign states, organizations and individuals. The report : http://www.magnet.ch/serendipity/hermetic/crypto/echelon/nzh1.htm -vbs > ... > I'm much more concerned about the Echelon system which was (finally) > reported in the Sunday Telegraph just before Xmas. This system, it is > alleged, can intercept and look for keywords in ALL international comms > traffic. I believe this also gets a mention in the Europarliament report. > > Vote early and often for freely available strong encryption!! > (whatever JR mutters about 'doing him out of his livelihood' :=) ) > ... > Key escrow is another example of complete bollocks, IMHO. > ... From jya at pipeline.com Mon Feb 2 05:48:25 1998 From: jya at pipeline.com (John Young) Date: Mon, 2 Feb 1998 21:48:25 +0800 Subject: Jim Bell Update Message-ID: <1.5.4.32.19980202134213.01035a0c@pop.pipeline.com> Date: Sun, 01 Feb 1998 Hi, John. Received a letter and phone call from Jim, as below. -------------------------------------- . He had a little altercation with a fellow prisoner ("through no fault of my own" - he thinks he was set up) and his privileges were reduced for 35 days, so that he could only make one phone call each week. . In reference to the bad publicity (all those articles and news alerts) which his case received, he speculates that the government gave a copy of AP to a 'think tank' like Rand, etc., with the request to figure out how to stop or delay AP. But it is his conclusion that AP is unstoppable, although: "I think that one last (temporary) hope for government is to delay AP. Chances are good that the "think tank" decided thatt the best way to delay AP is to discredit me, its author. It was a desperate gamble, particularly because the act of harrassing me automatically gives AP more publicity. That's the reason they will fail; the more they try to "get" me, the worse it will be for them." He wants it noted that his writing and discussions of AP ideas are in the sense of a "prediction", a "warning", or even a "vision", not an advocacy of it. . Regarding his guilty plea, he said it was because he realizes that he did do a few things wrong and that, although he did think that some of the charges against him were overblown and distorted, there was enough of a risk of being found guilty that it didn't make a lot of sense to contest them. He adds, "I also felt (and still do, of course) that government had already 'lost the war' so to speak." . He expects to be out around mid-April. Upon his release he wants to go to some of his favorite restaurants, and to have several BIG pizzas. He hopes he can get his old job back as electronics designer, and has some ideas he wants to work on for a virtual reality peripheral device which will bring everyone steps closer to the Star Trek Next Generation 'holodek'. - end From anon at anon.efga.org Mon Feb 2 06:39:06 1998 From: anon at anon.efga.org (Anonymous) Date: Mon, 2 Feb 1998 22:39:06 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) In-Reply-To: <3.0.3.32.19980202005111.006c10d0@schloss.li> Message-ID: Black Unicorn wrote: > Sound paranoid? Try this. I'd like everyone who reads this to try and go > 45 days without using plastic or writing a check. Just 45 days. If you > don't grow alarmist very quickly (like in the first week) I'd like to hear > your experience. If nothing else, try adding up a few months of finance > charges, yearly fees on your credit cards, transactions fees, check fees, > interest lost on no-interest checking accounts... see what you're paying to > keep people from looking at you like a criminal. Depends on where you shop. I was recently at a store where my request to pay with a credit card instead of cash elicited a look of disappointment from the owner-operator. Normally I'd have been happy to accomodate his desire for cash, but when someone else is letting you charge it to their credit card... well... I think the real problem is dealing with big companies who want you name, address, and phone number for their marketing dept. Mom and pop shops would much prefer to cut out the middleman. From ptrei at securitydynamics.com Mon Feb 2 06:48:26 1998 From: ptrei at securitydynamics.com (Trei, Peter) Date: Mon, 2 Feb 1998 22:48:26 +0800 Subject: Dr Dobbs crypto CD Message-ID: <6B5344C210C7D011835C0000F80127668B1610@exna01.securitydynamics.com> I called them up a couple weeks ago to ask about this. The person I talked to had clearly fielded this question quite a few times. The story he gave is that preparation of the master CD was farmed out to some particular individual contractor who was stalling. I got the impression that I was being told that the contractor was apparently imcompetant, and could not turn in a usable master in a timely fashion. There was also some mention of the possiblity of 'legal difficulties', though I was given no details on that. Peter Trei ptrei at securitydynamics.com > -----Original Message----- > From: dlv at bwalk.dm.com [SMTP:dlv at bwalk.dm.com] > Sent: Saturday, January 31, 1998 12:14 PM > To: cypherpunks at toad.com > Subject: Dr Dobbs crypto CD > > The DDJ I just got (March 98) has a full-page ad for the crypto CD > (p.113) > saying inter alia "New Release! fast Search Engine" > > Has anyone received even the "old release"? > > --- > > Dr.Dimitri Vulis KOTM > Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, > 14.4Kbps [Trei, Peter] I called them up a couple weeks ago to ask about this. The person I spoke to had clearly fielded this question quite a few times. The story he gave is that preparation of the master CD was farmed out to some particular individual contractor who was stalling. I got the impression that I was being told that the contractor was apparently imcompetant, and could not turn in a usable master in a timely fashion. There was also some mention of the possiblity of 'legal difficulties', though I was given no details. I'm still waiting for my copy. Peter Trei ptrei at securitydynamics.com From raph at CS.Berkeley.EDU Mon Feb 2 07:01:14 1998 From: raph at CS.Berkeley.EDU (Raph Levien) Date: Mon, 2 Feb 1998 23:01:14 +0800 Subject: List of reliable remailers Message-ID: <199802021450.GAA00175@kiwi.cs.berkeley.edu> I operate a remailer pinging service which collects detailed information about remailer features and reliability. To use it, just finger remailer-list at kiwi.cs.berkeley.edu There is also a Web version of the same information, plus lots of interesting links to remailer-related resources, at: http://www.cs.berkeley.edu/~raph/remailer-list.html This information is used by premail, a remailer chaining and PGP encrypting client for outgoing mail. For more information, see: http://www.c2.org/~raph/premail.html For the PGP public keys of the remailers, finger pgpkeys at kiwi.cs.berkeley.edu This is the current info: REMAILER LIST This is an automatically generated listing of remailers. The first part of the listing shows the remailers along with configuration options and special features for each of the remailers. The second part shows the 12-day history, and average latency and uptime for each remailer. You can also get this list by fingering remailer-list at kiwi.cs.berkeley.edu. $remailer{'cyber'} = ' alpha pgp'; $remailer{"mix"} = " cpunk mix pgp hash latent cut ek ksub reord ?"; $remailer{"replay"} = " cpunk mix pgp hash latent cut post ek"; $remailer{"jam"} = " cpunk mix pgp hash middle latent cut ek"; $remailer{"winsock"} = " cpunk pgp pgponly hash cut ksub reord ?"; $remailer{'nym'} = ' newnym pgp'; $remailer{"squirrel"} = " cpunk mix pgp pgponly hash latent cut ek"; $remailer{'weasel'} = ' newnym pgp'; $remailer{"reno"} = " cpunk mix pgp hash middle latent cut ek reord ?"; $remailer{"cracker"} = " cpunk mix remix pgp hash ksub esub latent cut ek reord post"; $remailer{'redneck'} = ' newnym pgp'; $remailer{"bureau42"} = " cpunk mix pgp ksub hash latent cut ek"; $remailer{"neva"} = " cpunk pgp pgponly hash cut ksub ?"; $remailer{"lcs"} = " mix"; $remailer{"medusa"} = " mix middle" $remailer{"McCain"} = " mix middle"; $remailer{"valdeez"} = " cpunk pgp pgponly hash ek"; $remailer{"arrid"} = " cpunk pgp pgponly hash ek"; $remailer{"hera"} = " cpunk pgp pgponly hash ek"; $remailer{"htuttle"} = " cpunk pgp hash latent cut post ek"; catalyst at netcom.com is _not_ a remailer. lmccarth at ducie.cs.umass.edu is _not_ a remailer. usura at replay.com is _not_ a remailer. remailer at crynwr.com is _not_ a remailer. There is no remailer at relay.com. Groups of remailers sharing a machine or operator: (cyber mix reno winsock) (weasel squirrel medusa) (cracker redneck) (nym lcs) (valdeez arrid hera) This remailer list is somewhat phooey. Go check out http://www.publius.net/rlist.html for a good one. Last update: Thu 23 Oct 97 15:48:06 PDT remailer email address history latency uptime ----------------------------------------------------------------------- hera goddesshera at juno.com ------------ 5:03:45 99.86% nym config at nym.alias.net +*#**#**### :34 95.82% redneck config at anon.efga.org #*##*+#**** 2:00 95.44% mix mixmaster at remail.obscura.com +++ ++++++* 19:18 95.27% squirrel mix at squirrel.owl.de -- ---+--- 2:34:19 95.16% cyber alias at alias.cyberpass.net *++***+ ++ 11:26 95.11% replay remailer at replay.com **** *** 10:06 94.93% arrid arrid at juno.com ----.------ 8:50:34 94.41% bureau42 remailer at bureau42.ml.org --------- 3:38:29 93.53% cracker remailer at anon.efga.org + +*+*+*+ 16:32 92.80% jam remailer at cypherpunks.ca + +*-++++ 24:14 92.79% winsock winsock at rigel.cyberpass.net -..-..---- 9:59:18 92.22% neva remailer at neva.org ------****+ 1:03:02 90.39% valdeez valdeez at juno.com 4:58:22 -36.97% reno middleman at cyberpass.net 1:01:28 -2.65% History key * # response in less than 5 minutes. * * response in less than 1 hour. * + response in less than 4 hours. * - response in less than 24 hours. * . response in more than 1 day. * _ response came back too late (more than 2 days). cpunk A major class of remailers. Supports Request-Remailing-To: field. eric A variant of the cpunk style. Uses Anon-Send-To: instead. penet The third class of remailers (at least for right now). Uses X-Anon-To: in the header. pgp Remailer supports encryption with PGP. A period after the keyword means that the short name, rather than the full email address, should be used as the encryption key ID. hash Supports ## pasting, so anything can be put into the headers of outgoing messages. ksub Remailer always kills subject header, even in non-pgp mode. nsub Remailer always preserves subject header, even in pgp mode. latent Supports Matt Ghio's Latent-Time: option. cut Supports Matt Ghio's Cutmarks: option. post Post to Usenet using Post-To: or Anon-Post-To: header. ek Encrypt responses in reply blocks using Encrypt-Key: header. special Accepts only pgp encrypted messages. mix Can accept messages in Mixmaster format. reord Attempts to foil traffic analysis by reordering messages. Note: I'm relying on the word of the remailer operator here, and haven't verified the reord info myself. mon Remailer has been known to monitor contents of private email. filter Remailer has been known to filter messages based on content. If not listed in conjunction with mon, then only messages destined for public forums are subject to filtering. Raph Levien From ravage at ssz.com Mon Feb 2 07:09:01 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 2 Feb 1998 23:09:01 +0800 Subject: Clarke denies pedophilia [CNN] Message-ID: <199802021507.JAA28167@einstein.ssz.com> Forwarded message: > > AUTHOR OUTRAGED AT REPORT HE IS PEDOPHILE > > Arthur C. Clarke seeks postponement of knighthood > > Clarke Clarke > > COLOMBO, Sri Lanka (AP) -- A British newspaper report that Arthur C. > Clarke is a pedophile is false, his spokesman said Monday, and the > science fiction writer is consulting lawyers. > > "I am outraged by the Sunday Mirror's allegations, and I am seeking > legal advise," Clarke said in a brief statement read to reporters by > his secretary, Roshan Amarasekhara. > > "Mr. Clarke is very upset by the false reports," Amarasekhara added. > > Clarke was quoted at length discussing sex with young men in the > sensationalist British newspaper's report Sunday, a day before > Prince Charles was to fly to Sri Lanka to confer the honorary > knighthood Queen Elizabeth granted the author late last year. The > prince will also take part in the former British colony's 50th > independence anniversary celebrations. > ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From bill.stewart at pobox.com Mon Feb 2 08:01:27 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Tue, 3 Feb 1998 00:01:27 +0800 Subject: Bush Gang Suspected In Assault On Presidency In-Reply-To: <34cae887.ccs@ccs.covici.com> Message-ID: <3.0.5.32.19980202074638.00875dd0@popd.ix.netcom.com> EIR is one of the mouthpieces for the Lyndon Larouche cult. I ran across them in an airport recently, and was surprised to find they're now strongly behind Bill Clinton; I'd thought that a few years ago they were accusing him of being a tool of the Tri-Lateral Commission, though perhaps it was some other group of anti-TriLateralists. At 10:22 PM 2/1/98 EST, covici at ccs.covici.com wrote: >Bush gang suspected in new assault on Presidency > >by Edward Spannaus and Jeffrey Steinberg > >In the midst of the worst global financial crisis in modern history, the >United States Presidency has come under renewed, vicious attack from a >combination of British and nominally ``American'' Bush-League circles. ... >From Executive Intelligence Review V25, #5. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From guy at panix.com Mon Feb 2 09:25:00 1998 From: guy at panix.com (Information Security) Date: Tue, 3 Feb 1998 01:25:00 +0800 Subject: SmartCards in the news Message-ID: <199802021708.MAA14789@panix2.panix.com> Also see: http://www.zdnet.com/pcweek/news/0112/12bio.html ---guy --------------------------------------------------------------------- This article is from Internet Computing (http://www.zdnet.com/icom/). Visit this page on the Web at: http://www.zdnet.com/icom/content/anchors/199802/02/smarten.net/ --------------------------------------------------------------------- [ Features ] February 02, 1998 Smart Cards Smarten the Net By Albert Pang For many contractors to the U.S. Department of Defense, the Internet will become an important ally this year, helping them resolve one of the most daunting challenges when doing business with the government: Getting paid on time and with a minimal amount of hassle. Thanks to a new breed of smart cards backed by sophisticated Web applications, 200 defense contractors will start receiving electronic checks (e-check) from the government via secure Internet e-mail through a pilot program launched in January 1998. The contractors will use their smart cards to access the mail box, validate, and endorse the checks. They will then forward the checks to BankBoston or NationsBank, the two authorized banks, that will deposit them into their accounts. The smart cards, which include digital certificates developed by GTE Cybertrust, will play a critical role in helping the defense department and other agencies comply with a mandate that requires most of the 800 million payments the government makes every year be converted to electronic form by January 1, 1999. Because of the mandate, the number of smart-card applications in different stages of development within the government has doubled to more than 900 in the past year, says Jim Hagedorn, a spokesperson for the Treasury Department. That's good news for vendors such as Anthony Caputo, chairman of Information Resource Engineering (IRE) in Baltimore, which develops the smart cards and the readers for the e-check program. "It will create a nice revenue stream," Caputo says, adding that his company has issued 100,000 smart cards to government and corporate customers mostly for use in private networks. Now with the Internet, the smart card market could grow substantially, especially in Asia and Europe. "Smart cards are the ultimate personal network computers," capable of handling everything from simple tasks such as identification to complex ones such as online banking and electronic commerce, says Philip Yen, senior vice president of chip platform at Visa International in Foster City, CA. [TABLE NOT SHOWN] Both Visa and its rival MasterCard are engaged in smart-card pilots around the world, promoting the use of stored-valued chip cards that run on private networks or the Internet. For example, AT&T Universal Card is working with Mondex, the electronic cash venture majority-owned by MasterCard, to sign up a small number of online merchants for a pilot program that will allow Internet users to buy products from them using smart cards issued by AT&T. However, analysts expect acceptance of smart cards in the United States to be slower than that in other countries because of privacy concerns, interoperability issues (Visa and MasterCard use different operating systems, for example), and the desire to put as many complex applications as possible on a single card. Albert Pang is the online editor of the Internet Computing MagaSite Send e-mail to apang at zd.com. --------------------------------------------------------------------- Copyright (c) 1998 ZDNet. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of ZDNet is prohibited. ZDNet and the ZDNet logo are trademarks of Ziff-Davis Inc. From declan at well.com Mon Feb 2 09:53:52 1998 From: declan at well.com (Declan McCullagh) Date: Tue, 3 Feb 1998 01:53:52 +0800 Subject: A new crypto-campaign, from Time/Netly News Message-ID: ---------- Forwarded message ---------- Date: Mon, 2 Feb 1998 12:07:24 -0500 From: Declan McCullagh To: politech at vorlon.mit.edu ***** SHOULD THE GOVERNMENT READ YOUR CYBERMAIL? Time Magazine February 9, 1998 Page 20 A few years ago, ED GILLESPIE was busy orchestrating the Republican takeover of Congress as the G.O.P.'s top spinmeister. Now the man behind the Contract with America is shifting to high tech as he battles a new foe: a plan to ban software capable of encoding messages so securely that police can't crack them. A law proposed by the FBI would mandate an electronic peephole in all encryption programs so that government agents can read your files. The FBI claims this is necessary to protect against criminals. But Silicon Valley chiefs see this as a threat, and are equipping Gillespie with a multimillion-dollar lobbying and media budget. Joining him to woo Democrats is lobbyist JACK QUINN, former counsel to Bill Clinton and ex-chief of staff to Al Gore. --By Declan McCullagh/Washington ********** For details on the new encryption campaign, check out today's Netly News (netlynews.com) at: http://cgi.pathfinder.com/netly/opinion/0,1042,1722,00.html -Declan -------------------------------------------------------------------------- POLITECH -- the moderated mailing list of politics and technology To subscribe: send a message to majordomo at vorlon.mit.edu with this text: subscribe politech More information is at http://www.well.com/~declan/politech/ -------------------------------------------------------------------------- From emc at wire.insync.net Mon Feb 2 10:04:21 1998 From: emc at wire.insync.net (Eric Cordian) Date: Tue, 3 Feb 1998 02:04:21 +0800 Subject: Bush Gang Suspected In Assault On Presidency In-Reply-To: <3.0.5.32.19980202074638.00875dd0@popd.ix.netcom.com> Message-ID: <199802021755.LAA17199@wire.insync.net> Bill Stewart writes: > EIR is one of the mouthpieces for the Lyndon Larouche cult. We know what EIR is. While I wouldn't vote Larouche for President, he is a very bright economist, and the attacks by the Feds on organizations supporting him clearly demonstrate the lengths the government will go to silence its critics in our alleged democracy. I stopped getting "Fusion" magazine, to which I was subscribed, when the government seized it. > I ran across them in an airport recently, and was surprised to find > they're now strongly behind Bill Clinton; I'd thought that a few years > ago they were accusing him of being a tool of the Tri-Lateral > Commission, though perhaps it was some other group of > anti-TriLateralists. Willie ClitorisBum was groomed for a long time for his present position, by TriLateraloids, and others. That is not mutually exclusive with the notion that the conservatives have assisted in the creation of his current problems. Bush is well integrated into America's Secret Aristocracy, and has been a member of various associated oganizations since his college days. Interestingly enough, Reagan left Larouche alone when he was questioning the mental health of Dukakis, but when Larouche became critical of Reagan's foreign policy, it was quickly arranged for conservative asset William Weld to take him out with multiple grand juries in dispersed geographical locations, over small unrepaid campaign loans. With all the laws the government has, everyone is guilty of something. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From declan at well.com Mon Feb 2 10:05:57 1998 From: declan at well.com (Declan McCullagh) Date: Tue, 3 Feb 1998 02:05:57 +0800 Subject: Airline ticket information -- help Message-ID: I'm trying to find out what airline flight someone is taking. I have a name and know the general travel plans and likely date. How can I find out the airline, flight number, and seat number? This is somewhat urgent. (You have my assurance that the purpose is legit.) If anyone has any ideas, I'd appreciate the help. Thanks, Declan From attila at hun.org Mon Feb 2 10:09:05 1998 From: attila at hun.org (Attila T. Hun) Date: Tue, 3 Feb 1998 02:09:05 +0800 Subject: Dr Dobbs crypto CD In-Reply-To: <6B5344C210C7D011835C0000F80127668B1610@exna01.securitydynamics.com> Message-ID: <19980202.165750.attila@hun.org> -----BEGIN PGP SIGNED MESSAGE----- on or about 980202:0940, in <6B5344C210C7D011835C0000F80127668B1610 at exna01.securitydynamics.com>, "Trei, Peter" was purported to have expostulated to perpetuate an opinion: >I called them up [...] the impression that I >was being told that the contractor was apparently >imcompetant, and could not turn in a usable master in a >timely fashion. > pure bullshit. that would have been easily enough remedied --get another contractor or invest $3K for top of the line equipment (<$1K if you dont mind fiddling) and do it yourself. there may be a problem on their part to pay for the mastering and the first press run. if that's the case, a few of us should try to acquire their publshing rights and get the job over with. >There was also some mention of the possiblity of 'legal >difficulties', though I was given no details on that. > 1) the creditor lawyers? 2) more likely the Feds under EAR since there is code on the disk and they know full well the mean time to export is <60 minutes. the first option is solvable as in the contractor problems. the second option, well... you know the drill. maybe Peter Junger would like to front this and add it to his open ended actions with the Feds? whatever... but let's DO something; anytime I can get reference material in a searchable, displayable format, I've already got my wallet open. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 Comment: No safety this side of the grave. Never was; never will be iQBVAwUBNNYIT7R8UA6T6u61AQH7ngH9FNoXGpeUc3+xMfua6nVekESP1OxGkzRD 8m15vwBEniiW4WYj/2MEYYA5If1EdDfR76w9b2/EQketdCfmOJaHyw== =sttZ -----END PGP SIGNATURE----- From tcmay at got.net Mon Feb 2 10:27:41 1998 From: tcmay at got.net (Tim May) Date: Tue, 3 Feb 1998 02:27:41 +0800 Subject: The Continued Attack on Cash (Was: "The Right ofAnonymity"...) In-Reply-To: Message-ID: At 10:51 PM -0800 2/1/98, Black Unicorn wrote: >Mr. May said: > >>Suffice it to say that I find nearly all cases where someone is "demanding" >>personal information to be cases where the government has required them to, >>for various unseemly purposes, or in cases where credit is being arranged. > >Of late I tried to pay off a rather large American Express bill. > >Suddenly, AMEX won't take cash in excess of $1,000 in any single billing >period (30 days). The large sign on the wall indicated the substance of .... It's worth noting (again) that a very simple technological/social solution to the "credit card companies have records on people" problem, the one often cited by "privacy law advocates" as the reason for a Data Privacy Act, is easily found. Namely, remove any impediments to the issuance of credit or debit cards unlinkable to the True Name of a user. A card issuer could feature this as a Privacy Card, either backed by transfers of backing capital to accounts, or using Chaum-style methods. This is fully feasible using Chaumian credential-revealing mechanisms. (Cf. Chaum's seminal "Transaction Systems to Make Big Brother Obsolete," in Communications of the ACM, November 1985. Updated a few times and available in reprints or other places. Try search engines for latest locations.) However, the trends are in just the opposite direction, as both Black Unicorn and Bill Stewart have noted in this thread. Between the War on Drugs, the laws about money laundering, the fears of tax evasion, and the general burrowcrat desire to record the movements and actions of citizen-units, such a Privacy Card would be frowned-upon. Various roadblocks, ranging from "know your customer" restrictions on banks to anti-money-laundering laws, would be thrown up to stop any such Privacy Card. The real solution is easy. --Tim May The Feds have shown their hand: they want a ban on domestic cryptography ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^2,976,221 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." From tcmay at got.net Mon Feb 2 10:34:10 1998 From: tcmay at got.net (Tim May) Date: Tue, 3 Feb 1998 02:34:10 +0800 Subject: Airline ticket information -- help In-Reply-To: Message-ID: At 9:55 AM -0800 2/2/98, Declan McCullagh wrote: >I'm trying to find out what airline flight someone is taking. I have a name >and know the general travel plans and likely date. How can I find out the >airline, flight number, and seat number? This is somewhat urgent. (You have >my assurance that the purpose is legit.) > >If anyone has any ideas, I'd appreciate the help. Monica Lewinski and William Ginsburg are travelling on American Airlines Flight 420 on Wednesday, 4 February, departing Dulles Airport at 10:45 a.m., EST, and arriving LAX at 3:35 p.m., PST. Good luck reporting on them, Declan! --Tim May The Feds have shown their hand: they want a ban on domestic cryptography ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^2,976,221 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." From declan at well.com Mon Feb 2 10:42:33 1998 From: declan at well.com (Declan McCullagh) Date: Tue, 3 Feb 1998 02:42:33 +0800 Subject: Airline ticket information -- help In-Reply-To: Message-ID: Hah! Assuming this IS what I'm trying to get (and confidentiality binds me from saying if it is or not), you didn't post the seat number. Keep sleuthing, Inspector May! -Declan On Mon, 2 Feb 1998, Tim May wrote: > At 9:55 AM -0800 2/2/98, Declan McCullagh wrote: > >I'm trying to find out what airline flight someone is taking. I have a name > >and know the general travel plans and likely date. How can I find out the > >airline, flight number, and seat number? This is somewhat urgent. (You have > >my assurance that the purpose is legit.) > > > >If anyone has any ideas, I'd appreciate the help. > > Monica Lewinski and William Ginsburg are travelling on American Airlines > Flight 420 on Wednesday, 4 February, departing Dulles Airport at 10:45 > a.m., EST, and arriving LAX at 3:35 p.m., PST. > > Good luck reporting on them, Declan! > > > --Tim May > > The Feds have shown their hand: they want a ban on domestic cryptography > ---------:---------:---------:---------:---------:---------:---------:---- > Timothy C. May | Crypto Anarchy: encryption, digital money, > ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero > W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, > Higher Power: 2^2,976,221 | black markets, collapse of governments. > "National borders aren't even speed bumps on the information superhighway." > > > > > From dlv at bwalk.dm.com Mon Feb 2 10:57:51 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Tue, 3 Feb 1998 02:57:51 +0800 Subject: Bush Gang Suspected In Assault On Presidency In-Reply-To: <3.0.5.32.19980202074638.00875dd0@popd.ix.netcom.com> Message-ID: Bill Stewart writes: > EIR is one of the mouthpieces for the Lyndon Larouche cult. The only remaining one that I know of. :-) I read their mailing list; it's actually interesting. He certainly was right about predicting the credit problems in the far east and their spread to Russia. > I ran across them in an airport recently, and was surprised to find > they're now strongly behind Bill Clinton; I'd thought that a few I found this so amusing that I forwarded it to the list. Yes, LaRouche likes Clinton. Also laRouche has a math ph.d. as does Ted Kachynzki. Do you know any other kookie math PhDs around here? > years ago they were accusing him of being a tool of the > Tri-Lateral Commission, though perhaps it was some other group > of anti-TriLateralists. > > At 10:22 PM 2/1/98 EST, covici at ccs.covici.com wrote: > >Bush gang suspected in new assault on Presidency > > > >by Edward Spannaus and Jeffrey Steinberg > > > >In the midst of the worst global financial crisis in modern history, the > >United States Presidency has come under renewed, vicious attack from a > >combination of British and nominally ``American'' Bush-League circles. > ... > >From Executive Intelligence Review V25, #5. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From attila at hun.org Mon Feb 2 11:03:51 1998 From: attila at hun.org (Attila T. Hun) Date: Tue, 3 Feb 1998 03:03:51 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) In-Reply-To: <199802020709.BAA27402@einstein.ssz.com> Message-ID: <19980202.180706.attila@hun.org> -----BEGIN PGP SIGNED MESSAGE----- on or about 980202:0109, in <199802020709.BAA27402 at einstein.ssz.com>, Jim Choate was purported to have expostulated to perpetuate an opinion: >I've been doing it for many years. Don't have a checking account, don't >own a credit card. I do have a saving account with a local credit union >and go in every 3-4 days and withdraw what I need for the next 3-4 days. >Pay every bill in cash or money order. first, the use of the credit union includes your SSN and they have a total cash transaction at least on your primary expenses. if you have "consulting" income which can be converted to cash, and dont deposit it, then you can do you 'high on the hawg' living with the cash --until they bring the IRS CID along and look at your 'imputed' income which is almost indefensible in their kangaroo courts. secondly, you have not dealt with a federal case where there is implied evidence as they find a clerk in the usual store you use... [snip] >I'm going to go tomorrow and buy a new laptop at around $1500. what are you getting for $1500? out here in the boonies we dont see those kind of prices. >I intend >on paying with a wad of $100 bills. Bet you they don't look twice nor >will they ask for ID. well, in the first place, you live in Texas where the attitude to the Feds is rather strong --not as strong as our attitude in rural Utah where the usual transaction is in cash. out here, a Fed is the same as a revenuer in Eastern Kentucky or Tennessee. reminds me of the Fed approaching a child and telling him he'd give him $5 if he took him to his father (still) --the boy asked for the money up front. when the Fed asked why, the boy said: "...'cause you aint coming back". >I've actualy never had a problem paying cash, never had anyone turn real >money down... I did-- tried to lay $14K out for a Mercedes (25 years ago). they wouldnt take it. so I went and picked up two $7K cashiers from two different banks. same thing with a pair of Lycoming IO540 aircraft engines: 2 8s and a 9 --stay under the $10K transaction. of course, if you want to take care of the problem: use a chartered blind "Queens' trust over an Antilles NV, a Dutch BV, and an FL AG --of course with a friendly banker who just arranges to have the bill paid from a correspondent US bank --and who pays your European American Express card for you... need cash under $10K? use an FL bank card. Both the Antilles and Dutch banks are porous, so they remain shells paid from the bottom up. so where is digital cash? probably the most amusing article on digital cash is the Neal Stephenson article: "The Great Simolean Caper" which was in: Time Mag's Special Issue, Spring 1995 Volume 145, No. 12. yes, it presents "our" side of it, but shows the backside and obvious ammo for Freeh... it does not seem to be available on the Time server, so anyone who wants to read it: http://www.primenet.com/~attila/pages/simolean.html until we really do have a virtual country and virtual cash, they will always be able to trace it. As I understand it, the banks keep a record on anything over $1k cash which means there is a master list which can be sorted and filtered. over $10K you must fill out the IRS form; for international you are required to file Dept of the Treasury form 515. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 Comment: No safety this side of the grave. Never was; never will be iQBVAwUBNNYWmLR8UA6T6u61AQH8+AH9Gr63vhMsfdIXXod5nBpqVzgHDqqWqNq6 sQ7LaI13D2joj9g2crHABfP37G8RnTOekaK4y5CCy1aG0Wa6PgJvDA== =3nUk -----END PGP SIGNATURE----- From ravage at ssz.com Mon Feb 2 11:16:12 1998 From: ravage at ssz.com (Jim Choate) Date: Tue, 3 Feb 1998 03:16:12 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) (fwd) Message-ID: <199802021912.NAA29247@einstein.ssz.com> Forwarded message: > From: "Attila T. Hun" > Date: Mon, 02 Feb 98 18:07:57 +0000 > Subject: Re: The Continued Attack on Cash (Was: "The Right of Anonymity"...) > >I've been doing it for many years. Don't have a checking account, don't > >own a credit card. I do have a saving account with a local credit union > >and go in every 3-4 days and withdraw what I need for the next 3-4 days. > >Pay every bill in cash or money order. > > first, the use of the credit union includes your SSN and > they have a total cash transaction at least on your primary > expenses. Wrong. I go in once a week and pull out money in a lump sum. I then budget that money myself. The only thing they have is a sequence of deposits from paychecks and withdrawals to cash. > if you have "consulting" income which can be > converted to cash, and dont deposit it, then you can do you > 'high on the hawg' living with the cash --until they bring > the IRS CID along and look at your 'imputed' income which is > almost indefensible in their kangaroo courts. I either take the fees in check and deposit them or else take 'in kind' trade (eg I did a job if installing Win95 for a customer on some laptops he'd bought via auction. There was a Tadpole 3XP Sparcbook on there. I took it for my fee). > >I'm going to go tomorrow and buy a new laptop at around $1500. > > what are you getting for $1500? out here in the boonies > we dont see those kind of prices. Looks like a Toshiba Satellite 445CTX (133MHz Pentium). > well, in the first place, you live in Texas where the > attitude to the Feds is rather strong --not as strong as our > attitude in rural Utah where the usual transaction is in > cash. out here, a Fed is the same as a revenuer in Eastern > Kentucky or Tennessee. reminds me of the Fed approaching a > child and telling him he'd give him $5 if he took him to his > father (still) --the boy asked for the money up front. when > the Fed asked why, the boy said: "...'cause you aint coming > back". You don't know Texas or Texans very well... ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From nelson at crynwr.com Mon Feb 2 11:34:01 1998 From: nelson at crynwr.com (Russell Nelson) Date: Tue, 3 Feb 1998 03:34:01 +0800 Subject: whit diffie on national radio Message-ID: <19980202191942.113.qmail@desk.crynwr.com> FWIW, Whit Diffie is on NPR's Talk of the Nation RIGHT NOW. Find your local NPR affiliate, usually in the low end of the dial. -- -russ http://web.crynwr.com/~nelson Crynwr Software supports freed software | PGPok | Freedom is the primary 521 Pleasant Valley Rd. | +1 315 268 1925 voice | cause of Peace, Love, Potsdam, NY 13676-3213 | +1 315 268 9201 FAX | Truth and Justice. From fnorky at geocities.com Mon Feb 2 13:52:32 1998 From: fnorky at geocities.com (Douglas L. Peterson) Date: Tue, 3 Feb 1998 05:52:32 +0800 Subject: Spyking snips: Police MDT's + cia/russian spying In-Reply-To: Message-ID: <34d73c32.9887174@smtp.ix.netcom.com> On Wed, 28 Jan 1998 13:03:42 -0500 (EST), you wrote: > >2)From: "Brandon Robinson" >Subject: Re: Monitoring MDT's > >>14)From: "self destruct" < >>Subject: Monitoring MDT's >>hi all,....i am wondering if there is a way to monitor police MDT's >>(mobile display terminals) >>i have the frq. that they use but i dont know how to hook up a scanner to >>p/c. any thoughts would be appreciated thank you > >Since no one else seemed to respond to this, I guess I will...first off >M.D.T. stands for (Mobile Data Terminals), I got this posting off some >group I can't really remeber where from, but it is informative, and was >the >subject of a Feb, '97 "911Dispatcher Magazine" story. It should answer all >of your questions, I also have a list of some places where you can buy the >unit pre-made, or a kit to make your own. I have left the Source code out >on purpose as it is rather lengthy, if you want it I can send it to you. > >-BBR [BIG SNIP of story] After reading all the stuff on MDT's, a got an idea. How about a central monitoring web site (out of the US). This system would run a small server program that could accept input, via the net, from MDT monitors around the country. Each MDT monitor would collect data and send it in once every 5 minutes. A person could goto a web site and see what is going on around the country. Hmmm. Watching the watchers?? -Doug ------------------- Douglas L. Peterson mailto:fnorky at geocities.com http://www.geocities.com/SiliconValley/Heights/1271/ From Jon.Cooper at Eng.Sun.COM Mon Feb 2 14:15:24 1998 From: Jon.Cooper at Eng.Sun.COM (Jon Cooper) Date: Tue, 3 Feb 1998 06:15:24 +0800 Subject: distributed cryptographic attack demo Message-ID: hi, i'm trying to do a demo of a distributed object technology and it seems to me that many cryptographic attacks would be facilitated by our approach. do you have any ideas for what a neat distributed effort might be? the ones i've thought of just don't seem too exciting: * GNFS of RSA modulus * attacking SSL * brute-force RC5 attack i'm looking for something that would be a sort of viscerally engaging attack, something that will make people who aren't necessarily number theorists or cryptographers take note. any input would be helpful! *jon PS - note that I'm not on cypherpunks so a direct reply would be most highly appreciated. From eureka at eureka.abc-web.com Tue Feb 3 06:28:47 1998 From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com) Date: Tue, 3 Feb 1998 06:28:47 -0800 (PST) Subject: Eureka! Tue Feb 3 '98 Message-ID: <19980203083236.13637.qmail@eureka.abc-web.com> Welcome to Tuesday's issue of Eureka! PINKBITS Voted the #1 Teen (18+) site on the web, this is one pay site you don't want to miss out on! Here's just one quote from a satisfied member: "This site delivers awesome value. I have been a member of 3 other sites, and this is the best by far. It has the best pics, more live video, younger girls and more hardcore cumshots than the other sites put tog- ether". And we have negotiated a special FREE trial member- ship for Eureka subscribers, so don't take our word, go see! PinkBits .. http://207.33.10.198/cgi-bin/gate1/pbm/pb_0024/0 PLEASE VISIT THIS FINE EUREKA! PARTNER SITE Playgal - No.1 in Internet Hardcore! http://www.playgal.com/playgal/banner_eureka.html Playgal presents FREE LIVE FUCKING, and over 2,000 FREE XXX MOVIES! XXX 4 EVERY 1 Overall this site looks pretty good. Click on the View Free Sample Pics to get to the good stuff. Once over that fence your in! There are thumbnails of some hot looking babes! Wet bush filled with hard dick. Not a bad combination! XXX 4 Every 1 .................... http://www.xxx4every1.com DO ME LIVE Do me too! Do this, do that and do the other. If she lets you! This is a paysite but they have a pretty juicy free picture section. Girl on girl, shaved pussy, dildo, panties, and clit rubbing images. Stroke your browser over there! Do Me Live ........................ http://www.domelive.com/ CYBERJOY Basic text links that deliver! Check out first time, that is one big black log, and she is enjoying it! Cum shots and links that will take you all over the place. See the Hungry for pussy picture. That tramp looks possessed! Take a look. Cyberjoy .......... http://www.cyberjoy.inter.net/adult3.htm ADULT CHARTS Here is one to see. Go there right now. Tons of free pix! Click on the free pictures area and your in. Take your pick of anal, cum shots, oral sex, girlgirl, teens, group action, I could go on more but you get the idea. High quality jpeg images that load quickly! These are some of the best free porno pix on the internet. Grab your mouse and get surfing! Adult Charts .................... http://www.adultcharts.com BRAND NEW - HOORAY! THE ADULT SEARCH ENGINE Now adult surfers have our very own search engine, directly designed to only list adult sites, and so run fast because all other types of site are ignored. Check it out today! Hooray! -----------------> http://eureka.abc-web.com/hooray/ FREE STREAMING VIDEO Please note that most of these feeds require a Netscape bro- wser in order to successfully view them. Unfortunately Micr- osoft's browser does not have all the features of Netscape's yet. However, many of the feeds use the RealPlayer and will work in most browsers. If you do not have Netscape and want a free copy click here --> http://www.netscape.com/download/ College teens -----> http://207.240.169.122/teens/start.html CHAT WITH OTHER READERS This chat is growing fast, and already there are a number of regulars you will meet most days. It's good to see Eureka! readers interacting with each other and having a great time! Adult/Sex Chat -----------------> http://137.39.63.229/chat/ General/Fun Chat -------> http://137.39.63.229/chat/funchat/ THE BEST PHONE SEX NEW!!!! LD Call only! - Live Hot Girls!!!!--->1-664-410-3912 LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779 FREE: Live 1-on-1 (international call only)--->011-678-77416 AMATEUR SITE OF THE DAY Octavia: "Caught you looking" is the motto of this sweet 23- year-old coed's web page. She loves to show off, and claims that she gets off thinking about all the horny guys checking her out. Her photos exhibit her exhibitionist streak and are of extremely high quality. Get caught looking at Octavia - it's well worth sneaking a peak! ---------------------------> http://amateurindex.com/eureka/ EROTIC STORY SITE OF THE DAY T-Bone's Sex Club: T-Bone gives you a new selection of erotic stories illustrated with nasty hardcore pics! Last week was Slut Wife week... what will it be this week? Visit T-Bone and find out! ............... http://www.rawsexx.com/ DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/ ADULT STAR PIC OF THE DAY Every day we bring you an exclusive choice pic of a famous adult porn star. And we must tell you - these pix are abso- luletly brilliant! ---> http://www.xxxadultstars.com/eureka/ GAYEUREKA! The gay newsletter is now available. You can get it here! Gay Eureka! ----------> http://eureka.abc-web.com/gayeureka/ EUREKA! TRANSLATIONS As well as English you can now choose any of these languages DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm ESPA�OL ------> http://eureka.abc-web.com/eureka/espanol.htm FRAN�AIS ----> http://eureka.abc-web.com/eureka/francais.htm ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm TODAY'S FREE PIX Pic 1 --------------------------> http://137.39.63.229/?030 Pic 2 --------------------------> http://137.39.63.229/?031 Pic 3 --------------------------> http://137.39.63.229/?032 Pic 4 --------------------------> http://137.39.63.229/?033 Pic 5 --------------------------> http://137.39.63.229/?034 Pic 6 --------------------------> http://137.39.63.229/?035 Pic 7 --------------------------> http://137.39.63.229/?036 Pic 8 --------------------------> http://137.39.63.229/?037 Pic 9 --------------------------> http://137.39.63.229/?038 Pic 10 --------------------------> http://137.39.63.229/?039 ============================================================ TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US. ============================================================ From nobody at privacynb.ml.org Mon Feb 2 14:41:15 1998 From: nobody at privacynb.ml.org (Anonymous Sender) Date: Tue, 3 Feb 1998 06:41:15 +0800 Subject: County Mounties Spit on the 4th Amendment Message-ID: <695e7d4cd89037ab6c4e383c56f8fa6b@privacynb.ml.org> >Oh! The 4th amendment? That dusty old thing? When the scumbags >are kicking in your door which would you rather have protecting >you: a raggedy old piece of paper or a Prince George County >Mountie SWAT team in full ninja dress and the latest high-tech >law-enforcement goodies? Thought so. Cup's at the end of the >counter comrade. Have a nice day. You couldn't be talking about Prince George, Canada, could you? "Mounties" are Royal Canadian Mounted Police (RCMP), and are limited to Canada, and Disney World. From Jon.Cooper at Eng.Sun.COM Mon Feb 2 14:49:07 1998 From: Jon.Cooper at Eng.Sun.COM (Jon Cooper) Date: Tue, 3 Feb 1998 06:49:07 +0800 Subject: distributed computing Message-ID: I'm in the planning phase of a demo which should demonstrate the power of a distributed object technology which I'm working with. Any ideas for neat crypto-related distributed computation demos would be much appreciated. I've thought of: * brute forcing RC5 (lots of people are doing this already) * factoring attack on RSA modulus * Certicom's ECC challenge But I'm looking for something with more of a sort of gut-level appeal. Cracking SSL packets might be good. Hrmm. thanks for any input ... *jon From mixmaster at remail.obscura.com Mon Feb 2 15:43:38 1998 From: mixmaster at remail.obscura.com (Mix) Date: Tue, 3 Feb 1998 07:43:38 +0800 Subject: No Subject Message-ID: <199802022253.OAA27023@sirius.infonex.com> subskribe cyferpunks bill at whitehouse.gov From unicorn at schloss.li Mon Feb 2 16:14:56 1998 From: unicorn at schloss.li (Black Unicorn) Date: Tue, 3 Feb 1998 08:14:56 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) Message-ID: <3.0.3.32.19980202175241.006c95d4@schloss.li> At 06:07 PM 2/2/98 +0000, Attila T. Hun wrote: > I did-- tried to lay $14K out for a Mercedes (25 years ago). > they wouldnt take it. so I went and picked up two $7K > cashiers from two different banks. same thing with a pair > of Lycoming IO540 aircraft engines: 2 8s and a 9 --stay > under the $10K transaction. Careful. This may well be illegal now. Structuring transactions to avoid reporting requirements is a felony. (I'm not on cpunks, mail me). From tcmay at got.net Mon Feb 2 16:51:40 1998 From: tcmay at got.net (Tim May) Date: Tue, 3 Feb 1998 08:51:40 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) In-Reply-To: <3.0.3.32.19980202175241.006c95d4@schloss.li> Message-ID: At 3:52 PM -0800 2/2/98, Black Unicorn wrote: >At 06:07 PM 2/2/98 +0000, Attila T. Hun wrote: >> I did-- tried to lay $14K out for a Mercedes (25 years ago). >> they wouldnt take it. so I went and picked up two $7K >> cashiers from two different banks. same thing with a pair >> of Lycoming IO540 aircraft engines: 2 8s and a 9 --stay >> under the $10K transaction. > >Careful. This may well be illegal now. Structuring transactions to avoid >reporting requirements is a felony. > Maybe illegal _now_, but Attila didn't say _when_. Further, even our former prosecutor, Brian, told us that prosecutions are only made when some larger crime is involved. (For example, if I made two sub-$10K deposits or withdrawals, and then later _admitted_ this was to bypass reporting requirements, *BUT* no real criminal activity or tax evasion was involved, no prosecutor in the land would bother with something so transparently trivial as this. Unless, of course, they saw an opportunity to take a thought criminal off the streets. Which is why I don't describe my financial transactions here.) > >(I'm not on cpunks, mail me). Sorry, if you want to read my words ya gotta subscribe. --Tim May The Feds have shown their hand: they want a ban on domestic cryptography ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^2,976,221 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." From mclow at owl.csusm.edu Mon Feb 2 17:18:10 1998 From: mclow at owl.csusm.edu (Marshall Clow) Date: Tue, 3 Feb 1998 09:18:10 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) In-Reply-To: <3.0.3.32.19980202175241.006c95d4@schloss.li> Message-ID: At 3:52 PM -0800 2/2/98, Black Unicorn wrote: >At 06:07 PM 2/2/98 +0000, Attila T. Hun wrote: >> I did-- tried to lay $14K out for a Mercedes (25 years ago). >> they wouldnt take it. so I went and picked up two $7K >> cashiers from two different banks. same thing with a pair >> of Lycoming IO540 aircraft engines: 2 8s and a 9 --stay >> under the $10K transaction. > >Careful. This may well be illegal now. Structuring transactions to avoid >reporting requirements is a felony. > Some of the reporting requirements have been changed last year from $10,000 to $750. Check out >May 21, 1997 > >SUMMARY: The Financial Crimes Enforcement Network (``FinCEN'') is >proposing to amend the regulations implementing the Bank Secrecy Act to >require money transmitters and their agents to report and retain >records of transactions in currency or monetary instruments of at least >$750 but not more than $10,000 in connection with the transmission or >other transfer of funds to any person outside the United States, and to >verify the identity of senders of such transmissions or transfers. The >proposed rule is intended to address the misuse of money transmitters >by money launderers and is in addition to the existing rule requiring >currency transaction reports for amounts exceeding $10,000. -- Marshall Marshall Clow Adobe Systems Warning: Objects in calendar are closer than they appear. From ravage at ssz.com Mon Feb 2 17:32:08 1998 From: ravage at ssz.com (Jim Choate) Date: Tue, 3 Feb 1998 09:32:08 +0800 Subject: INFO-RUSS: Israel Issues Iraq Warning (fwd) Message-ID: <199802030130.TAA30591@einstein.ssz.com> Forwarded message: >From INFO-RUSS-request at smarty.ece.jhu.edu Mon Feb 2 19:00:52 1998 Message-Id: <9802022059.AA22808 at smarty.ece.jhu.edu> Errors-To: INFO-RUSS-request at smarty.ece.jhu.edu Sender: INFO-RUSS-request at smarty.ece.jhu.edu Date: Sun, 1 Feb 1998 19:32:58 +0200 (IST) To: info-russ at smarty.ece.jhu.edu From: info-russ at smarty.ece.jhu.edu Subject: INFO-RUSS: Israel Issues Iraq Warning --------------------------------------------------------------------- This is INFO-RUSS broadcast (1200+ subscribers). Home page, information, and archives: http://psi.ece.jhu.edu/~kaplan/IRUSS/inforuss.html To post, or to subscribe/unsubscribe, mail to info-russ at smarty.ece.jhu.edu INFO-RUSS assumes no responsibility for the information/views of its users. --------------------------------------------------------------------- Reuters, Sunday February 1 3:34 PM EST Israel Issues Iraq Warning JERUSALEM (Reuters) - Prime Minister Benjamin Netanyahu Sunday reserved the option of retaliating for any Iraqi missile attack on Israel, despite assurances the United States would step in quickly to punish Iraq. "The only ones who will make decisions, the only ones who make decisions, are us and us alone," Netanyahu said in remarks on the Iraq crisis in a speech to visiting American Jews. During the 1991 Gulf war, Israel held its fire in the face of 39 Iraqi Scud missile attacks, bowing to U.S. pressure not to take action that could push Arab states out of a U.S.-led alliance to drive Iraq out of Kuwait. On a visit to Israel Sunday, U.S. Secretary of State Madeleine Albright spoke of a U.S. "iron-clad commitment" to Israel's security and gave notice any Iraqi threat to countries in the region in the current crisis would not go unpunished. "If they do threaten their neighbors or do damage to them our response to it will be swift and forceful," she said. But in apparent reply, Netanyahu said in his speech: "One thing has to be understood -- that we will do whatever is necessary to defend Israel and strengthen Israel's national security." He said Israelis should view the Iraqi crisis "calmly because there is a government here that handles matters professionally and with reason." Netanyahu spoke after convening cabinet ministers to discuss the possibility that a U.S. assault on Iraq would push Baghdad to launch missiles against Israel tipped with biological weapons. After the session, Deputy Defense Minister Silvan Shalom declined to comment on the deliberations but he said earlier that Israelis were thronging to army distribution centers to exchange old gas masks. Israel's Ha'aretz newspaper reported Sunday the United States had agreed in principle to send Israel vaccines against anthrax and other biological agents Iraq is believed to possess. The newspaper report, attributed to U.S. sources, said Israeli leaders asked Washington to store hundreds of thousands of doses of the vaccines in Israel. Asked if Israel had ordered the vaccines, Defense Minister Yitzhak Mordechai told reporters: "Some things are done in coordination between us and the United States to be able to defend ourselves today and in the future against the possibility that non-conventional weapons will be possessed by someone who wants to endanger us." Israeli officials have said the probability was low that Iraq would launch a strike but authorities have made clear they are preparing for the worst. The United States is rallying support from allies for a possible attack on Iraq to punish President Saddam Hussein for not complying with U.N. arms inspectors searching for documents and materials related to its weapons programs. Iraq says it has no nuclear, chemical or biological weapons or ballistic missiles -- banned under terms of the cease-fire that ended the Gulf War in which U.S.-led forces drove Iraqi troops out of Kuwait. ---------------------------------------------------------------------------- From nobody at REPLAY.COM Mon Feb 2 17:42:41 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 3 Feb 1998 09:42:41 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) In-Reply-To: <199802020709.BAA27402@einstein.ssz.com> Message-ID: <199802030132.CAA01785@basement.replay.com> Attila T. Hun wrote: > until we really do have a virtual country and virtual > cash, they will always be able to trace it. As I > understand it, the banks keep a record on anything over > $1k cash which means there is a master list which can > be sorted and filtered. over $10K you must fill out the > IRS form; for international you are required to file > Dept of the Treasury form 515. Ironically, the reglations may be their own undoing here. It seems most banks have decided to recoup the expense of all that paperwork by charging per-transaction ATM fees. And customers hate transaction fees, so they tend to take out as much money as possible each time they use the ATM. From ravage at ssz.com Mon Feb 2 17:49:58 1998 From: ravage at ssz.com (Jim Choate) Date: Tue, 3 Feb 1998 09:49:58 +0800 Subject: VMM question - reply (fwd) Message-ID: <199802030146.TAA30693@einstein.ssz.com> Forwarded message: > Date: Mon, 02 Feb 1998 01:39:47 -0600 > From: Lenny Blumberg > Subject: VMM question - reply > Hmmmm..... > I would imagine that the OS would keep a disk map in memory and > mark it with a flag to indicate if it's been paged into memory. This is a function of the "Look Aside Buffer" and the actual operation is a bit more complicated. The vmm must keep up with which processes have it mapped, where in their indipendant memory maps it shows up at, what the status is in each of those maps, whether it's sharable or not (though the Linux vmm doesn't seem to do any write locking), and probably some functions that I've missed. > At > that point, instead of updating the disk drive - It looks up the page in > memory and updates that copy. There are two ways to do this in general... Write-through: means the vmm goes ahead and not only updates the vmm copy but the copy on the drive. Note that this may or may not actualy update other copies if a process has one that isn't sharable (ie has its own private copy). This has a lot of over-head in that there is lots of i/o. Write-back: means that the data in the individual pages doesn't get written to the drive until the page is either swapped out of active memory (and written to swap) or is closed. This is a form of 'lazy propogation'. Again, this doesn't address how other processes may have their images effected. > The only problem is that at that point, > you're now running into a mess of lock problems that carry their own > overhead. One easy way, at least on a Unix machine, is to keep the system clock setting when the page is created. Then close them in chronological sequence. This obviously has it's problems. The first person to open isn't guaranteed to be the first person done. Another method would be to select via a PRNG the 'first' process to update the page. Then each following would take their turn according to the spin of the wheel. This leaves us with two options, as each process closes it only writes the changes that it has made; which could overwrite the previous user if they edited the same part of the file. The alternative would be to force each user to create a different file with some filename convention to differentiate them. Then leave it up to some unknown method to arbitrate the file propogations at that point by some 'compare and share' method perhaps. > Another alternative would be to track the disk map and force a > write for a page that is pending a read. How do you know ahead of a read that a process is going to read that page? Or are you saying that before another process can open a file we force the first process to go ahead and write its changes? What happens once two or more have the page mapped and begin editing? How do you propose to manage the file closure writes that will occur? ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From remailer at htp.org Mon Feb 2 18:01:03 1998 From: remailer at htp.org (Anonymous) Date: Tue, 3 Feb 1998 10:01:03 +0800 Subject: Bush Gang Suspected In Assault On Presidency In-Reply-To: Message-ID: <19980203014502.13306.qmail@nsm.htp.org> dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) writes: > Also laRouche has a math ph.d. as does Ted Kachynzki. Do you know any > other kookie math PhDs around here? I heard a certain Dr. Vulis got his degree in mathematics. From otoole at lcs.mit.edu Mon Feb 2 18:17:38 1998 From: otoole at lcs.mit.edu (James O'Toole) Date: Tue, 3 Feb 1998 10:17:38 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) Message-ID: <01BD301E.4FCC8EC0@slip-james.lcs.mit.edu> Tim, Maintaining anonymity in the face of the regulatory framework is certain to be difficult, and anything difficult is usually rare, expensive, or both. An interesting question about the Privacy Card product is whether the social pressure against it is strong enough to defeat its privacy whenever the product is well advertised. In other words, will a privacy product survive in spite of its own publicity in our current environment, or can privacy products only exist when their own existence is relatively unknown. This is interesting because in the latter case, we have only a very very weak form of privacy/anonymity because it is hard to be sure how much privacy backs a product whose very existence is semi-secret. Maybe we should consider putting up, and encouraging existing privacy-enhanced institutions to put up, challenge prizes based on privacy/anonymity preservation. Just as we've seen prizes set for the cracking of specific composites and encrypted messages, we could ask Credit Suisse to put $1M in an escrow account at their main branch (Zurich?). This escrow account would be a numbered account held by a trustee selected by the bank. Let's say they wire $1000 per week to RSA Data Security in California, or to EFF.ORG, or to me, for that matter, and I wire it back. I publish the full text of any documentation I can get from my bank account (an empty account I would maintain for this anonymity challenge). Credit Suisse would promise to release the contents of the account to the first person to arrive at their main branch and present the name of the trustee. That's not a very creative challenge...this could use more thought. The point is that as far as I know, we haven't yet seen any really solid rewards placed to validate, advertise, or demonstrate the weakness of, well-known privacy-enhanced financial systems. I don't even know that Digicash, which would be another logical sponsor, has put up such a challenge. Have they? --Jim ---------- From: Tim May[SMTP:tcmay at got.net] Sent: Monday, February 02, 1998 1:18 PM To: Black Unicorn Cc: rotenberg at epic.org; nym at vorlon.mit.edu; dcsb at ai.mit.edu; cypherpunks at Algebra.COM Subject: Re: The Continued Attack on Cash (Was: "The Right of Anonymity"...) At 10:51 PM -0800 2/1/98, Black Unicorn wrote: >Mr. May said: > >>Suffice it to say that I find nearly all cases where someone is "demanding" >>personal information to be cases where the government has required them to, >>for various unseemly purposes, or in cases where credit is being arranged. > >Of late I tried to pay off a rather large American Express bill. > >Suddenly, AMEX won't take cash in excess of $1,000 in any single billing >period (30 days). The large sign on the wall indicated the substance of .... It's worth noting (again) that a very simple technological/social solution to the "credit card companies have records on people" problem, the one often cited by "privacy law advocates" as the reason for a Data Privacy Act, is easily found. Namely, remove any impediments to the issuance of credit or debit cards unlinkable to the True Name of a user. A card issuer could feature this as a Privacy Card, either backed by transfers of backing capital to accounts, or using Chaum-style methods. This is fully feasible using Chaumian credential-revealing mechanisms. (Cf. Chaum's seminal "Transaction Systems to Make Big Brother Obsolete," in Communications of the ACM, November 1985. Updated a few times and available in reprints or other places. Try search engines for latest locations.) However, the trends are in just the opposite direction, as both Black Unicorn and Bill Stewart have noted in this thread. Between the War on Drugs, the laws about money laundering, the fears of tax evasion, and the general burrowcrat desire to record the movements and actions of citizen-units, such a Privacy Card would be frowned-upon. Various roadblocks, ranging from "know your customer" restrictions on banks to anti-money-laundering laws, would be thrown up to stop any such Privacy Card. The real solution is easy. --Tim May The Feds have shown their hand: they want a ban on domestic cryptography ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^2,976,221 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." For help on using this list (especially unsubscribing), send a message to "dcsb-request at ai.mit.edu" with one line of text: "help". From jkwilli2 at unity.ncsu.edu Mon Feb 2 18:23:18 1998 From: jkwilli2 at unity.ncsu.edu (Ken Williams) Date: Tue, 3 Feb 1998 10:23:18 +0800 Subject: Hacker group battles child porn [c|net News, 2/2/98] Message-ID: Hacker group battles child porn C|NET News.Com News Story: http://www.news.com/News/Item/0,4,18717,00.html?st.cn.fd.tkr.news CNET Radio Interview: http://www.news.com/Radio/Index/0,55,,00.html?st.cn.fd.tb.ne By Courtney Macavinta February 2, 1998, 1:10 p.m. PT A secret society that hunts the Net to reveal the identities of alleged pedophiles and child pornographers has a message for those who think there's too much media hype about the problem: Believe what you hear. Members of a group called Ethical Hackers Against Pedophilia (EHAP - http://www.hackers.com/ehap/index2.htm) are using their high-tech cracking talents to find out the identity and physical location of people they say post child pornography within newsgroups, chat rooms, and Websites. The 17-member nonprofit group also says it tries to determine the sources of video streaming sites that feature children being sexually assaulted in real time. "The pedophiles that are distributing child pornography online are skirting the law by remaining anonymous. We decided to use the skills that we possess as hackers, engineers, and teachers to educate the public that hackers aren't all bad guys, and to help law enforcement in apprehending the child pornographers," said EHAP's secretary, "Oracle," who asked that his real name not be published. "As long as the people are arrested and the kids aren't hurt anymore, every one of us is willing to accept responsibility for our actions as long as one kid is helped," he added. EHAP may go so far as to dig up the Social Security numbers of people it suspects are producing and distributing child porn on the Net. Under the guise of a confidential informant, EHAP then passes on these details to various law enforcement agencies, such as the FBI. It's virtually impossible to know if EHAP's tips have led to any investigations or arrests, though the group says its information has been put to work. Still, its vigilante tactics raise privacy concerns, as well as serious questions about law enforcement's possible use of information that could have been obtained illegally. According to the FBI, the Net increasingly is being used to lure children to physical meetings, which could lead to abduction or abuse, and there has been a boom in child pornography being trafficked online. These acts violate federal law. During two congressional hearings last year, FBI officials told lawmakers they are working to stop the rise in these illegal acts through the bureau's Crimes Against Children initiative. "The FBI has investigated more than 70 cases involving pedophiles traveling to meet undercover agents or officers posing as juveniles for the purpose of engaging in an illicit sexual relationship," Stephen Wiley, chief of the FBI's violent crime and major offenders section, testified in November before the House Judiciary Subcommittee on Crime. The FBI has launched other special programs, such as Innocent Images, in which agents go online and portray themselves as children and crack down on those who solicit encounters with them. The program, which is run by the Baltimore, Maryland, FBI field office, also serves as a clearinghouse for tips and information regarding suspected online crimes against children. The program was started in 1994 after local agents uncovered an online child porn ring while searching for an abducted boy. The 13-year-old boy, George Burdynski of Prince Georges County, Maryland, has never been found. But the program has lead to more than 90 arrests as well as the development of online crime fighting techniques. For instance, in October, three Californians were collectively sentenced to 60 years in prison for running the so-called Orchid Club, an international service that used the Net to distribute child pornography to its members. Despite growing efforts by the FBI and organizations such as the National Center for Missing and Exploited Children, EHAP says its private campaign is vital, as these agencies don't have the full-time resources to combat online child pornography. EHAP also readily admits that it would be unconstitutional for law enforcement to use some of its methods. "We're extremely careful about who we hack. There are so many people trading child porn out there, but we go after the people who are producing the material. That's who we hunt," Oracle said. "Law enforcement are restricted in ways we're not--but I'm not saying that we break the law." EHAP is not the first group to use its own devices in an effort to assist law enforcement in tracking down people who they suspect use the Net to perpetrate crimes. For example, a worldwide network of Internet users known as the CyberAngels provide online safety tips and work with law enforcement to stop the trading of online pornography. Other Net users have been known to shut down chat rooms or flame those who they deem pedophiles or sexual predators. CyberAngels doesn't support the electronic harassment of others. EHAP keeps its methods confidential. "Although we would appreciate any information these individuals may have, to violate the law to get the information is not acceptable," said George Grotz, a spokesman for the FBI's San Francisco office. "But how many pedophiles would come to us and say their site had been broken into?" Still, the FBI and other child protection agencies say they need all the help they can get. "Here in the San Francisco office, we have neither the time or resources to surf the Net looking for child pornography," Grotz added. "That said, we do respond aggressively when information is brought to our attention from outside sources, or if we develop information during the process of another investigation." The National Center for Missing and Exploited Children, which is supported by the Justice Department, also expanded its efforts to encompass online activity. As announced in December at the White House-endorsed Children's Internet Summit in Washington, the center will launch a Web site on March 1 to collect tips regarding online child porn and suspected crimes against children. "It's a huge problem that is as new as the Internet. For law enforcement, it's not easy to handle," Todd Mitchell, program advocate for the exploited child unit, said today. "Parents can't leave their child in front of a computer for hours and hours where they can stumble upon pornography or be solicited in a chat room. They have to teach their kids some safety guidelines," he said. Regarding private citizens' groups such as EHAP and CyberAngels, he said there are legitimate concerns, but that community activism is needed. "If they work in conjunction with law enforcement, it can be something that is a nice partnership between law enforcement and the community. If they take the law into their own hands, it could do more harm that good," Mitchell said. [EOF] -- For more information about EHAP, go to http://www.hackers.com/ehap/index2.htm or send email to ehap at hackers.com Regards, TATTOOMAN Vice President of Ethical Hackers Against Pedophilia http://www.hackers.com/ehap/ ehap at hackers.com http://152.7.11.38/~tattooman/ From tcmay at got.net Mon Feb 2 18:25:53 1998 From: tcmay at got.net (Tim May) Date: Tue, 3 Feb 1998 10:25:53 +0800 Subject: The Continued Attack on Cash (Was: "The Right ofAnonymity"...) In-Reply-To: <01BD301E.4FCC8EC0@slip-james.lcs.mit.edu> Message-ID: At 6:01 PM -0800 2/2/98, James O'Toole wrote: >Tim, > >Maintaining anonymity in the face of the regulatory framework is certain >to be difficult, and anything difficult is usually rare, expensive, or >both. ??? >An interesting question about the Privacy Card product is whether the >social pressure against it is strong enough to defeat its privacy whenever >the product is well advertised. In other words, will a privacy product >survive in spite of its own publicity in our current environment, or can >privacy products only exist when their own existence is relatively >unknown. This is interesting because in the latter case, we have only a >very very weak form of privacy/anonymity because it is hard to be sure how >much privacy backs a product whose very existence is semi-secret. If a Privacy Card is legal, and can be issued by Visa, Mastercard, American Express, Discover, or some new issuer, and if merchants sign on (as would presumably be the case by default with Visa and so on), then what is the "social pressure" you speak of? Corporate cards are already widely accepted...most of you probably have a card issued to you through your employing institution. I see no "social pressure" to block usage of my Institute of Applied Ontology corporate AmEx card. The real roadblock is that government makes such privacy-protecting measures either difficult or illegal. --Tim May The Feds have shown their hand: they want a ban on domestic cryptography ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^2,976,221 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." From nobody at REPLAY.COM Mon Feb 2 18:54:41 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 3 Feb 1998 10:54:41 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) In-Reply-To: Message-ID: <199802030242.DAA10101@basement.replay.com> Tim May wrote: > The real solution is easy. Easier said than done. Designing digital cash software is easy. (Several prototypes exist.) Getting people to accept it as having value is not. But let's suppose that we build a complete fault-tolerant digital cash system with multiply-redunant servers all over the world, and you can sit at your computer and trade crypto-credits with whoever you want. You've got a small fortune worth of e$. What are you going to buy with it? Seriously. Are you going to buy groceries at the local supermarket with cypherbucks? I doubt it. Surely you can't use the system to pay for your house or car, or other government-traceable assets. And certainly not airline tickets. Perhaps you could buy a new computer. That would work, if you could arrange delivery anonymously (which I doubt). Or maybe you could pick it up in person, but you don't need e-cash for that. About the only practical thing you could buy would be a pre-paid phone card. Anything else, you'd need to arrange delivery for, and if you can have contraband mailed to you, then you can have other things that you don't want sent to you. The problem is not digital cash. The problem is delivering the goods bought with it. Solve the delivery problem and digital cash will follow. From kent at songbird.com Mon Feb 2 19:26:37 1998 From: kent at songbird.com (Kent Crispin) Date: Tue, 3 Feb 1998 11:26:37 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) In-Reply-To: <3.0.3.32.19980202175241.006c95d4@schloss.li> Message-ID: <19980202191736.02027@songbird.com> On Mon, Feb 02, 1998 at 04:46:19PM -0800, Tim May wrote: > At 3:52 PM -0800 2/2/98, Black Unicorn wrote: > >At 06:07 PM 2/2/98 +0000, Attila T. Hun wrote: > >> I did-- tried to lay $14K out for a Mercedes (25 years ago). > >> they wouldnt take it. so I went and picked up two $7K > >> cashiers from two different banks. same thing with a pair > >> of Lycoming IO540 aircraft engines: 2 8s and a 9 --stay > >> under the $10K transaction. > > > >Careful. This may well be illegal now. Structuring transactions to avoid > >reporting requirements is a felony. > > > > Maybe illegal _now_, but Attila didn't say _when_. Further, even our former > prosecutor, Brian, told us that prosecutions are only made when some larger > crime is involved. > > (For example, if I made two sub-$10K deposits or withdrawals, and then > later _admitted_ this was to bypass reporting requirements, *BUT* no real > criminal activity or tax evasion was involved, no prosecutor in the land > would bother with something so transparently trivial as this. Unless, of > course, they saw an opportunity to take a thought criminal off the streets. > Which is why I don't describe my financial transactions here.) > > > > > >(I'm not on cpunks, mail me). > > Sorry, if you want to read my words ya gotta subscribe. That's precisely his point,isn't it? -- Kent Crispin "No reason to get excited", kent at songbird.com the thief he kindly spoke... PGP fingerprint: B1 8B 72 ED 55 21 5E 44 61 F4 58 0F 72 10 65 55 http://songbird.com/kent/pgp_key.html From dlv at bwalk.dm.com Mon Feb 2 19:29:01 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Tue, 3 Feb 1998 11:29:01 +0800 Subject: Bush Gang Suspected In Assault On Presidency In-Reply-To: <19980203014502.13306.qmail@nsm.htp.org> Message-ID: Anonymous writes: > dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) writes: > > > Also laRouche has a math ph.d. as does Ted Kachynzki. Do you know any > > other kookie math PhDs around here? > > I heard a certain Dr. Vulis got his degree in mathematics. You heard right. And you know what oranization is by far the biggest employer of math phds... --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From tcmay at got.net Mon Feb 2 19:35:51 1998 From: tcmay at got.net (Tim May) Date: Tue, 3 Feb 1998 11:35:51 +0800 Subject: The Continued Attack on Cash (Was: "The Right ofAnonymity"...) In-Reply-To: Message-ID: At 6:42 PM -0800 2/2/98, Anonymous wrote: >Tim May wrote: >> The real solution is easy. > > >Easier said than done. > >Designing digital cash software is easy. (Several prototypes exist.) >Getting people to accept it as having value is not. The thrust of my arguments, in my several posts in this thread, has been simply removing the laws which require True Names to be attached to transactions, bank account, credit cards, etc. No digital cash is needed. The rest of Mr. Anonymous' argument is a straw man, based on the difficulty of implementing digital cash. When I say the real solution is easy, I mean it. Get rid of the laws telling people how often and in what amounts they may take money out of their bank account, get rid of laws telling banks they must narc out customers who remove "too much" money, and get rid of any laws restricting the use of names customers and their financial partners may use. (BTW, until these actions happen, no widespread use of digital cash is likely to be accepted as legal. This has a lot to do, I think, with why d.c. projects are moving so slowly.) --Tim May The Feds have shown their hand: they want a ban on domestic cryptography ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^2,976,221 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." From guy at panix.com Mon Feb 2 19:57:49 1998 From: guy at panix.com (Information Security) Date: Tue, 3 Feb 1998 11:57:49 +0800 Subject: Bush Gang Suspected In Assault On Presidency Message-ID: <199802030341.WAA06374@panix2.panix.com> > From cypherpunks-errors at toad.com Mon Feb 2 22:33:28 1998 > > Anonymous writes: > > > dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) writes: > > > > > Also laRouche has a math ph.d. as does Ted Kachynzki. Do you know any > > > other kookie math PhDs around here? > > > > I heard a certain Dr. Vulis got his degree in mathematics. > > You heard right. And you know what oranization is by far the biggest > employer of math phds... The Neurotic Society of Assholes. ---guy [Vulis replied to himself (what a loser!), I couldn't help myself] From nobody at REPLAY.COM Mon Feb 2 20:12:43 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 3 Feb 1998 12:12:43 +0800 Subject: Airline ticket information -- help In-Reply-To: Message-ID: <199802030405.FAA19763@basement.replay.com> Tim May wrote: > Monica Lewinski and William Ginsburg are travelling on American Airlines > Flight 420 on Wednesday, 4 February, departing Dulles Airport at 10:45 > a.m., EST, and arriving LAX at 3:35 p.m., PST. > > Good luck reporting on them, Declan! I assume Tim is joking here, but this info really isn't too hard to find. Just as an example, call USAir at 1-800-428-4322, press 1 for automated service. It will give you options to check scheduled flights and departure times. After you find the flight number, select the option to confirm your reservation or select a seat. It will ask for your frequent flyer account number, but if you don't enter one, the helpful computer will let you enter the passenger's last name instead. Several other airlines have similar services.. Happy hunting! From nobody at REPLAY.COM Mon Feb 2 20:17:27 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 3 Feb 1998 12:17:27 +0800 Subject: Bork Message-ID: <199802030402.FAA19488@basement.replay.com> Once-a, zeere-a ves thees keed vhu, tuuk, a treep tu seengepure-a, und bruooght elung hees sprey peeent.... Und vhee.... he-a feenelly ceme-a beck. He-a, hed... cune-a merks ell oofer hees buttum.... he-a seeed thet is ves frum vhere-a zee verdee vhecked it su... herd..... Bork Bork Bork! From ghio at temp0207.myriad.ml.org Mon Feb 2 20:42:32 1998 From: ghio at temp0207.myriad.ml.org (Matthew Ghio) Date: Tue, 3 Feb 1998 12:42:32 +0800 Subject: Jim Bell Update Message-ID: <199802030430.XAA29097@myriad> Jim Bell wrote: > "I think that one last (temporary) hope for government is to delay AP. > Chances are good that the "think tank" decided thatt the best way to delay > AP is to discredit me, its author. It was a desperate gamble, particularly > because the act of harrassing me automatically gives AP more publicity. > That's the reason they will fail; the more they try to "get" me, the worse > it will be for them." The government already has plans for dealing with AP (what do you think all those secret service guys in DC are supposed to be doing?) Whether AP is inevitable or not, if people don't know where you are, they can't come kill you. This is why privacy is so important in the digital era. Of course, there are still nukes, but as has been pointed out already many times, the use of a nuclear weapon is likely to kill more friends than enemies. From ravage at ssz.com Mon Feb 2 21:37:29 1998 From: ravage at ssz.com (Jim Choate) Date: Tue, 3 Feb 1998 13:37:29 +0800 Subject: Memory Management (fwd) Message-ID: <199802030535.XAA32230@einstein.ssz.com> Forwarded message: > Date: Mon, 02 Feb 1998 23:01:16 -0600 > From: Stu Green > Subject: Re: Memory Management > > > I would imagine that the OS would keep a disk map in memory and > > > mark it with a flag to indicate if it's been paged into memory. > > > > This is a function of the "Look Aside Buffer" and the actual operation is a > > bit more complicated. > Jim - I'm familiar with the 'translation look aside'buffers > on > RISC chips, especially on the MIPS where it provides a > method > of managing cache flushes and reloads on writes and does act > like a page fault to intiate the writes. I haved seen TLBs > associated with disk operations, but that don't mean shit to > a > tree. It turns out, I've been doing more reading on vmm on NT, that the model that's implimented in NT is a hybrid of the MIPS 4000 model and the 386 model. That rationale is that this allows the actual code in the HAL to be much smaller by taking advantage of the different hardware aspects of the cpu architetures (this means speed). Don't know if I am going to get this right since I still haven't figured out all the intricacies. But this is what I *think* is going on (in NT)... The TLB (Translation Lookaside Buffer) is used in NT to determine if the page frame is currently in memory or swapped out. It does this by marking a frame 'invalid' if it's swapped out and listing it's actual page frame number if it's a valid page. Invalid does *not* mean that it can't still be in memory. The reason is that each process has a 'Page Frame Directory' which lists all the valid Page Table Pages for that process. Each of these Page Table Pages lists where each Page Frame Page is within that processes memory map (and that's a whole nother issue with various parts being pageable and non-pageable as well as system or user level). Each Page Frame Page knowns where the individual pages are (ie in memory or swapped out). There is a rather tedious mechanism that translates the virtual addresses to PFD's, PTP's, and finaly to PFP's. That's what I'm trying to get a handle on now. Now these various page related structures get quite big and themselves need to be swapped out. So there is a level of recursion in here. There is also a Page Table Page structure called a 'Prototype PTE Address' (a PTE is a Page Table Entry - ie a valid page frame, these things seem to have several different names making it confusing to follow at times) which is used to allow processes to share a PTE across PFD's. Once we get to a PTE we actualy have a 4k chunk of code or data that a cpu can operate on/with. So, there is where I'm at right now... Hope that makes it clear as mud. Naslajdyatciya! ps. I am enjoying my Toshiba 445CDX, it's a pretty cool machine. Anyone got any suggestions on a PCMCIA ethernet card? pss. Next Saturday is the 1st Saturday in Feb. so the Dallas 1st. Saturday Sale will be going on. Anyone interested? It's basicaly about 20 sq. blocks of computer equipment of every make, model, and age imaginable as well as lots of other stuff (time before last some guy had Cobra Helicopter IR cameras for $500 ea., would make a great IR telescope.). We usualy leave Saturday morning around 2am and get there a bit before 7am. The sale usualy starts about midnite Friday nite and goes until Saturday evening. The best deals are early Saturday morning (my experience over about 5 years of going anyway). ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From anon at anon.efga.org Mon Feb 2 21:54:41 1998 From: anon at anon.efga.org (Anonymous) Date: Tue, 3 Feb 1998 13:54:41 +0800 Subject: Airline ticket information -- help Message-ID: > Just as an example, call USAir at 1-800-428-4322, press 1 for automated > service. It will give you options to check scheduled flights and > departure times. After you find the flight number, select the option to > confirm your reservation or select a seat. It will ask for your frequent > flyer account number, but if you don't enter one, the helpful computer > will let you enter the passenger's last name instead. I figured you could probably BS such info out of a helpful customer service agent, but this is just too fucking easy. Now I know why Kaczynski wanted to bomb all those airlines and computer companies. I wish he'd gotten these idiots. From nobody at REPLAY.COM Mon Feb 2 22:36:29 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 3 Feb 1998 14:36:29 +0800 Subject: Exon oxen gored Message-ID: <199802030625.HAA07572@basement.replay.com> Exon and his ilk have loose bowels and bladder control problems. They shit all over the populace and urinate all over the Constitution. From honig at otc.net Mon Feb 2 23:25:42 1998 From: honig at otc.net (David Honig) Date: Tue, 3 Feb 1998 15:25:42 +0800 Subject: distributed cryptographic attack demo In-Reply-To: Message-ID: <3.0.5.32.19980202230929.007e1a30@otc.net> At 01:28 PM 2/2/98 -0800, Jon Cooper wrote: >hi, > >i'm trying to do a demo of a distributed object technology and it seems >to me that many cryptographic attacks would be facilitated by our >approach. > Oh, you mean like Counterpane's screen saver or the various international key cracking escapades. Well, duh. Want to impress the masses? Order "The joy of sex" using Clinton's mastercard and forward complete documentation to the Wash Post. David Honig honig at alum.mit.edu --------------------------------------------------- If we can prevent the government from wasting the labours of the people under the pretense of caring for them, they will be happy. -TJ From MAILER-DAEMON at chemistry.ohio-state.edu Tue Feb 3 15:35:50 1998 From: MAILER-DAEMON at chemistry.ohio-state.edu (Mail Delivery Subsystem) Date: Tue, 3 Feb 1998 15:35:50 -0800 (PST) Subject: Returned mail: Host unknown (Name server: eureka.abc-web.co: host not found) Message-ID: <199802032335.SAA06316@chemistry.mps.ohio-state.edu> The original message was received at Tue, 3 Feb 1998 18:35:44 -0500 (EST) from ts14-8.homenet.ohio-state.edu [140.254.113.47] ----- The following addresses had permanent fatal errors ----- ----- Transcript of session follows ----- 550 ... Host unknown (Name server: eureka.abc-web.co: host not found) Reporting-MTA: dns; chemistry.mps.ohio-state.edu Received-From-MTA: DNS; ts14-8.homenet.ohio-state.edu Arrival-Date: Tue, 3 Feb 1998 18:35:44 -0500 (EST) Final-Recipient: RFC822; eureka-unsubscribe at eureka.abc-web.co Action: failed Status: 5.1.2 Remote-MTA: DNS; eureka.abc-web.co Last-Attempt-Date: Tue, 3 Feb 1998 18:35:47 -0500 (EST) To: eureka-unsubscribe at eureka.abc-web.co Subject: Re: Eureka! Tue Feb 3 '98 From: Cypherpunks at toad.com Date: Tue, 06 Jan 1998 01:54:08 -0800 Welcome to Tuesday's issue of Eureka! PINKBITS Voted the #1 Teen (18+) site on the web, this is one pay site you don't want to miss out on! Here's just one quote from a satisfied member: "This site delivers awesome value. I have been a member of 3 other sites, and this is the best by far. It has the best pics, more live video, younger girls and more hardcore cumshots than the other sites put tog- ether". And we have negotiated a special FREE trial member- ship for Eureka subscribers, so don't take our word, go see! PinkBits .. http://207.33.10.198/cgi-bin/gate1/pbm/pb_0024/0 PLEASE VISIT THIS FINE EUREKA! PARTNER SITE Playgal - No.1 in Internet Hardcore! http://www.playgal.com/playgal/banner_eureka.html Playgal presents FREE LIVE FUCKING, and over 2,000 FREE XXX MOVIES! XXX 4 EVERY 1 Overall this site looks pretty good. Click on the View Free Sample Pics to get to the good stuff. Once over that fence your in! There are thumbnails of some hot looking babes! Wet bush filled with hard dick. Not a bad combination! XXX 4 Every 1 .................... http://www.xxx4every1.com DO ME LIVE Do me too! Do this, do that and do the other. If she lets you! This is a paysite but they have a pretty juicy free picture section. Girl on girl, shaved pussy, dildo, panties, and clit rubbing images. Stroke your browser over there! Do Me Live ........................ http://www.domelive.com/ CYBERJOY Basic text links that deliver! Check out first time, that is one big black log, and she is enjoying it! Cum shots and links that will take you all over the place. See the Hungry for pussy picture. That tramp looks possessed! Take a look. Cyberjoy .......... http://www.cyberjoy.inter.net/adult3.htm ADULT CHARTS Here is one to see. Go there right now. Tons of free pix! Click on the free pictures area and your in. Take your pick of anal, cum shots, oral sex, girlgirl, teens, group action, I could go on more but you get the idea. High quality jpeg images that load quickly! These are some of the best free porno pix on the internet. Grab your mouse and get surfing! Adult Charts .................... http://www.adultcharts.com BRAND NEW - HOORAY! THE ADULT SEARCH ENGINE Now adult surfers have our very own search engine, directly designed to only list adult sites, and so run fast because all other types of site are ignored. Check it out today! Hooray! -----------------> http://eureka.abc-web.com/hooray/ FREE STREAMING VIDEO Please note that most of these feeds require a Netscape bro- wser in order to successfully view them. Unfortunately Micr- osoft's browser does not have all the features of Netscape's yet. However, many of the feeds use the RealPlayer and will work in most browsers. If you do not have Netscape and want a free copy click here --> http://www.netscape.com/download/ College teens -----> http://207.240.169.122/teens/start.html CHAT WITH OTHER READERS This chat is growing fast, and already there are a number of regulars you will meet most days. It's good to see Eureka! readers interacting with each other and having a great time! Adult/Sex Chat -----------------> http://137.39.63.229/chat/ General/Fun Chat -------> http://137.39.63.229/chat/funchat/ THE BEST PHONE SEX NEW!!!! LD Call only! - Live Hot Girls!!!!--->1-664-410-3912 LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779 FREE: Live 1-on-1 (international call only)--->011-678-77416 AMATEUR SITE OF THE DAY Octavia: "Caught you looking" is the motto of this sweet 23- year-old coed's web page. She loves to show off, and claims that she gets off thinking about all the horny guys checking her out. Her photos exhibit her exhibitionist streak and are of extremely high quality. Get caught looking at Octavia - it's well worth sneaking a peak! ---------------------------> http://amateurindex.com/eureka/ EROTIC STORY SITE OF THE DAY T-Bone's Sex Club: T-Bone gives you a new selection of erotic stories illustrated with nasty hardcore pics! Last week was Slut Wife week... what will it be this week? Visit T-Bone and find out! ............... http://www.rawsexx.com/ DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/ ADULT STAR PIC OF THE DAY Every day we bring you an exclusive choice pic of a famous adult porn star. And we must tell you - these pix are abso- luletly brilliant! ---> http://www.xxxadultstars.com/eureka/ GAYEUREKA! The gay newsletter is now available. You can get it here! Gay Eureka! ----------> http://eureka.abc-web.com/gayeureka/ EUREKA! TRANSLATIONS As well as English you can now choose any of these languages DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm ESPA�OL ------> http://eureka.abc-web.com/eureka/espanol.htm FRAN�AIS ----> http://eureka.abc-web.com/eureka/francais.htm ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm TODAY'S FREE PIX Pic 1 --------------------------> http://137.39.63.229/?030 Pic 2 --------------------------> http://137.39.63.229/?031 Pic 3 --------------------------> http://137.39.63.229/?032 Pic 4 --------------------------> http://137.39.63.229/?033 Pic 5 --------------------------> http://137.39.63.229/?034 Pic 6 --------------------------> http://137.39.63.229/?035 Pic 7 --------------------------> http://137.39.63.229/?036 Pic 8 --------------------------> http://137.39.63.229/?037 Pic 9 --------------------------> http://137.39.63.229/?038 Pic 10 --------------------------> http://137.39.63.229/?039 ============================================================ TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US. ============================================================ From nobody at REPLAY.COM Tue Feb 3 00:19:02 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 3 Feb 1998 16:19:02 +0800 Subject: Inquiry Message-ID: <199802030745.IAA15801@basement.replay.com> Dimitri "Buttfuck" Vulis' reheated, refurbished, and regurgitated cud is completely inappropriate for the mailing lists into which it is cross-ruminated. ,,, -ooO(o o)Ooo- Dimitri "Buttfuck" Vulis (_) From MAILER-DAEMON at toad.com Tue Feb 3 16:46:22 1998 From: MAILER-DAEMON at toad.com (MAILER-DAEMON at toad.com) Date: Tue, 3 Feb 1998 16:46:22 -0800 (PST) Subject: Liquidation Message-ID: <199801260457.WAA04312@quick.notfalse.com> Forwarding this message to you because I thought the following 3 items would be of real interest to you. I wanted to get it out to you ASAP. This information is only going to be available for a few more days. Deal is, right now, you can get still it for free. Here is what you can get: 1) The contact names and private phone number of a company that is PAYING CASH for unwanted used material handling equipment. This company is one of the largest used equipment BUYERS in the nation and even pays finders fees. 2) Wouldn't it be nice to save as much as 80% on items you're probably buying at full retail currently? We've uncovered the Web address to one of the Internet's top "Liquidation Specials of the Month" web site . Now you'll have the insider's track on buying at wholesale like the pros do. It's really a cool site! But don't take my word for it, check it out for yourself. 3) Get the #1 hottest material handling product catalog on the market today. No, I'm not exaggerating. This catalog has everything you could possibly want and they offer new, used or reconditioned items that almost every business uses each and every day. All the information, the catalog, the names, phone numbers, contacts in one complete package . You don't even pay postage! ************************************************************************ So how can you take advantage of this risk free offer? It's as easy as 1-2-3, here is all you have to do: Step 1) Simply call the " Equipment Buyers Guide" at 205-941-4795 Monday-Friday during regular business hours. This offer is ending Friday. Seriously gang, don't delay. Step 2) Tell them you want the "INSIDERS BUYING GUIDE PACKAGE #32" sent to you immediately. (Make sure you stress you want "PACKAGE #32" as this is the BIG package which includes all the key numbers and names .) Step #3) After we get the proper mailing information, you'll see it in a day or two! I know this package will save you and your company hundreds, maybe even thousands of dollars.Pick up the phone now and get the INSIDERS BUYERS GUIDE PACK #32 sent to you now. ------------------------------------------------------------------------ If this message is of no interest to you it is not necessary to reply for "removal" This is a one time mailing of a very limited offer and WILL NOT be sent again. ------------------------------------------------------------------------ From 71440094 at ix.netcom.com Tue Feb 3 19:21:57 1998 From: 71440094 at ix.netcom.com (71440094 at ix.netcom.com) Date: Tue, 3 Feb 1998 19:21:57 -0800 (PST) Subject: Better Choice for Airport Transportation Message-ID: GERMANY - Airport Shuttle Services - the Better Choice for Airport Transportation to and from 18 German Airports 24 hours per day, 365 days per year Door to door service to and from your residence, business or hotel. Complete online Reservations at��� http://www.airport-shuttle.com Using our services can greatly reduce your company�s ground transportation expenses. You will see your exact costs on reservation form - no hidden surprises Comfortable, clean, air conditioned passenger cars .� Courteous, safe drivers. Exclusive transfer - no additional pick up Reliable, Convenient , Cost Effective, Punctual We also provide transportation for all situations, occasion and/or events Join us now� http://www.airport-shuttle.com From MAILER-DAEMON at toad.com Tue Feb 3 19:33:20 1998 From: MAILER-DAEMON at toad.com (MAILER-DAEMON at toad.com) Date: Tue, 3 Feb 1998 19:33:20 -0800 (PST) Subject: FDA Registered and FDA Certified Message-ID: <199802011811.MAA23195@mail.t-1net.com> Exclusive New Oral Transmucosal Weight Control Disc & Transdermal Patch, both FDA Certified & Registered with National Drug Code #'s. Developed by 10 year old Pharmaceutical Company. For detailed information reply to: timcoent at usa.net From pgut001 at cs.auckland.ac.nz Tue Feb 3 04:56:30 1998 From: pgut001 at cs.auckland.ac.nz (Peter Gutmann) Date: Tue, 3 Feb 1998 20:56:30 +0800 Subject: An update on MS private key (in)security issues Message-ID: <88650932615058@cs26.cs.auckland.ac.nz> A fortnight ago I posted a message exposing a number of weaknesses in the way various Microsoft security products handle users private keys. A few days before I was due to vanish for a security conference (where it was very difficult to contact me), the article started getting a bit of attention. This is a general response which clarifies several issues relating to the original message. First, Russ Cooper (moderator of the NT Bugtraq mailing list) made some wildly inaccurate claims about the article. I've had a bit of feedback which indicated that it wasn't even worth dignifying this stuff with a response but I've written one anyway, at least for the original NT Bugtraq messages he posted (the stuff he put on a web page is just more of the same). You can find it at http://www.cs.auckland.ac.nz/~pgut001/pubs/breakms2.txt (even if you don't want to plough through the whole thing, you might want to read the last two paragraphs for a giggle). After this, Microsofts spin doctors leaped into action and posted a response to the article. I've replied to this one in a bit more detail, since it raises several important issues. Comments on Microsofts Response ------------------------------- >Microsoft's Response to Recent Questions on the Recovery of Private Keys from >various Microsoft Products >[...] >With the exception of the details about a possible PKCS-12 attack, all the >issues raised in the recent discussions are specifically aimed at Microsoft's >base CSPs, not at CryptoAPI. The base CSPs are the royalty-free, >software-based CSPs provided with Windows NT 4.0, Windows 95, and Internet >Explorer. These attacks do not apply in general to other CryptoAPI CSPs and do >not indicate any fundamental concerns with the security of the CryptoAPI >architecture or applications built upon it. This statement is mere obfuscation. As Microsoft have said, every single (recent) copy of Windows NT, Windows'95, and MSIE (and, presumably, other products like IIS and Outlook, which rely on them) ship with these CSP's, therefore every recent system comes with this security hole installed by default. In addition, the CryptExportKey() function is a standard CryptAPI function, which is described by Microsoft with the text "The CryptExportKey function is used to export cryptographic keys out of a cryptographic service provider in a secure manner" (obviously some new use of the term "secure" with which I wasn't previously familiar). There's nothing in there that says "Only the Microsoft CSP's support this" (some may not support it, but by Microsofts own admission the default used on any recent system does indeed exhibit this flaw). >Microsoft products do not "store" private key material using PKCS-12, contrary >to recent descriptions on the Internet. I was unfortunately somewhat unclear in my article, I've fixed up the online version at http://www.cs.auckland.ac.nz/~pgut001/pubs/breakms.txt. To summarise, if you want to get at an exported key stored on disk, you can use the pre-4.0 key file/PKCS #12 key file flaws. If you want to get at the current users key, you can use the CryptExportKey() flaw. >The example of breaking a PKCS-12 data blob, which was given in discussion on >the Internet, is not an attack on the "weak" cryptography of PKCS-12. Rather, >it is simply a dictionary attack (long known and well understood in >cryptography), This statement is accurate. As Microsoft have said, dictionary attacks have been known to the computer industry for a long, long time (several decades). For example the Unix password encryption uses 25 iterations of DES to protect users passwords from dictionary attacks (this is rather inadequate now, but was appropriate more than two decades ago when it was introduced). If this is a well-known flaw which the entire industry has known about for decades, why are Microsoft's very latest "security" products so extremely vulnerable to it? As I mentioned in my writeup, I published an attack on the exact format used in older MS products more than 1 1/2 years ago, but Microsoft made no attempt to fix this problem at the time. It wasn't until I published the current writeup that they finally addressed it. >One statement by the original poster argues that Microsoft managed to design a >security format that actually makes it easier to break into the protected >data. As stated above, a number of well respected companies were involved >extensively in the design and review of PKCS-12 before it became a standard. The problem is that Microsoft ignored the other companies recommendations for increasing security. I'll refer people back to the original writeup for mention of the various security features which were added to PKCS #12 and subsequently ignored by Microsoft. PKCS #12 is just a basic modification of PFX, which was a purely Microsoft invention, and Microsofts implementation of PKCS #12 does indeed make it very easy to perform the attack I described (you'd have to read my writeup for the full technical details in which I describe each individual flaw which, as each is exploited in turn, make it progressively easier and easier to recover a users private key). In addition (as I mentioned in my original message), Microsoft use RC2/40 to encrypt the private keys, which means that no matter how good a password you choose, the default PKCS #12 format private key produced by MSIE can be recovered in a few days with fairly modest computing power. There already exists a Windows screen saver which will recover RC2/40 keys for S/MIME messages, and the prize of an RSA private key is a much higher motivating factor than the "Hello, how are you?" typically found in an S/MIME message. As Microsoft point out, Netscape can indeed handle RC2/40-encrypted files, however they usually use triple DES and not RC2/40 (they encrypt the private key components - the really valuable part of the PKCS #12 payload - with triple DES and the other odds and ends with RC2/40). Since Netscape also iterate the password and MAC processing, they aren't vulnerable to the attacks which the Microsoft software is vulnerable to, even though both are based on the same PKCS #12 standard. >Exploiting Internet Explorer > >One of the fundamental requirements to perform any possible cryptographic >attack discussed in the recent postings is the assumption that a malicious >entity could somehow access to data on a user's computer system, without the >permission or knowledge of the user. This is a large leap of faith. > >Users that are using Public Key Certificates today are generally sophisticated >and savvy users, Bwahahahahaha! Sorry, I guess I should explain that in more precise terms. Now I'm not trying to claim that the average Win95 user isn't as sophisticated and savvy as Microsoft seem to think, or that relying entirely on the sophistication of the average Win95 user for security is a dangerous move. However these statements do seem to completely ignore the reality of the situation. Let me go into the background of the weaknesses a bit further. When I tested the weaknesses, I asked some "guinea pig" users to send me their exported keys, with the promise that I'd destroy the keys and not keep any record of where the keys came from and so on. Because of this I can't give exact figures, however here are a few data points: - More than half the keys (I can't remember the exact figure) were in the older, pre-4.x format. This indicates that the majority of users (or at least of the crypto-using guinea pigs) are still running old versions of MSIE which contain a number of widely-publicised problems, including precisely the weaknesses required to run arbitrary code on the machine or read files off the machine. One of the respondents commented that the key was "the key I use with Outlook", I'm not sure what that says about the origins of the key. Another key was one used with IIS for a web site which runs an online commerce service that processes credit-card based orders. This must have been an older version of IIS since the key was in the pre-4.x format. - When I asked two of the people why they were still using an old version, the responses were "It came installed with the machine when we bought it" and "It does what I want, so I haven't upgraded". I expect most users of the older version would have a similar reason for using it. In a company of 20 people (some of whom participated in this test), only two were running 4.x. These people are all highly competent software developers (presumably this includes them in the group of "sophisticated and savvy users" which MS were referring to), however none of the remaining 18 wanted to risk installing MSIE 4 because of the extent with which it messed with their system, possibly jeopardising their development work. Therefore most of these "sophisticated and savvy users" were still running old, insecure versions of MSIE, and weren't going to upgrade any time soon. - For the two remaining 4.x users in the company, both are still using straight, unpatched 4.0 because they considered it painful enough to download all of 4.0 and they didn't want to bother with an upgrade just yet. This makes them vulnerable to the bug pointed out in the l0pht advisory. - When I informed one of the guinea pigs of the recovered password, his response was "Now I'll have to change my login password" (the others generally restricted themselves to some variation of "Oops"). This comment confirms that users do indeed sometimes use their login password to protect their private keys, so that a successful attack recovers not only their private keys but their login password as well. - One respondent commented that most of the code they downloaded from the net was unsigned, but they ran it anyway. This is probably typical of the average user. Although I've only been back for two days, I haven't yet managed to find anyone who has applied all the latest patches and kludges to their system which makes them immune to these problems. This includes at least one person who has a code signing key which could be used to sign malicious ActiveX controls. Therefore all of the guinea pigs could in theory have their private keys stolen. >Attacks against Authenticode signing keys > >[...] > >However, it is extremely unlikely anyone could be successful with a simplistic >strategy for stealing Authenticode signing keys and then using them. See my comments about about this. I could, right now, obtain at least one Authenticode signing key with which I could create a malicious ActiveX control. I'm sure that if I were serious about this I could obtain a number of others. >Second, anyone signing code using Authenticode technology is extremely >unlikely to leave their key material sitting on an end user machine routinely >used for browsing the Internet. I see no basis for this claim. Every developer I know uses the same machine for both code development and web browsing (in fact a number of users keep a copy of MSIE or Netscape permantly running on their machine so that they'll have something to do between compiles). Microsoft's statement seems to imply that users will be running two machines, one dedicated entirely to web browsing and the other to code signing. I find this extremely unlikely. >Attacks on Encrypted Key material > >There is some confusion over the algorithms and methods that Microsoft uses to >provide protection of encrypted key material in Internet Explorer when using >the standard Microsoft base CSPs. There were changes between Internet Explorer >3.0x and Internet Explorer 4.x specifically to address any possible concern. And the astounding thing was that, despite a complete rewrite of the code, the newer version offers no extra security at all, as my article points out. Both are equally weak, you just need to attack them in slightly different ways. >Key export attacks > >The original Internet posting raises concern about the CryptoAPI interface >CryptExportKey(). This function is fully documented and does indeed export >private key material in an encrypted format. The statement from Microsoft omits one important point here. Myself and another security researcher have been trying to tell Microsoft for more than four months (probably a lot longer, I didn't log the earlier mail) that this is a very serious security flaw. In all cases Microsoft's response was some variation of "We don't see this as a flaw". It wasn't until my warning was published that they finally addressed the problem, and even in this case (the program to set the CRYPT_USER_PROTECTED flag) it's only a quick hack to plaster over the cracks and allow them to declare the problem fixed. In fact it doesn't fix the problem at all. I'll post details in a fortnight or so when I've had time to test things, please don't ask me about this until then. >The presence of the CryptExportKey() function is to support functionality such >as migrating key material between machines for a user or creating a backup >copy of a key. It should be noted however, that many CSPs, including most >hardware based CSPs, do not allow exportable private keys and will return and >error in response to a CryptExportKey() request. However the CSP's installed by default on every recent system do allow the export. The fact that there may exist, somewhere, an implementation which doesn't exhibit this flaw really doesn't help the majority of users. >The posting also asserts that an ActiveX control could be downloaded from a >web page, simply ask for the current users key, ship the key off for >collection by an unscrupulous person, and then delete itself without a trace. > >If users run unsigned code, or code from an unknown origin, a number of >unpleasant things can happen. This could indeed occur if the key as been >marked exportable and the CRYPT_USER_PROTECTED flag is not set. Which was, until my warning, the automatic default action for Verisign, and is still the automatic default for many other CA's. This means that keys generated right up until a few days ago (and in some cases keys being generated right now) have, by default, no protection whatsoever. In addition I've just been sent mail to say that CRYPT_USER_PROTECTED still isn't the default with Verisign, you have to click a box asking for extra security or you get the usual default of no protection. To add to the confusion, a lot of documentation (including the Microsoft Developer Network (MSDN) online documentation on Microsofts web site) describes the CRYPT_USER_PROTECTED flag with "The Microsoft RSA Base Provider ignores this flag", which can cause programmers to leave it out when it is *essential* it is always included. Incidentally, MSDN also claims that Microsoft are "supporting" PFX, which is in direct contrast with the claims in their press release. >There was also discussion of 16 dialog boxes appearing to the user for their >password if the CRYPT_USER_PROTECTED flag is set. Certainly asking the user >too many times would be better than too few times, however in our tests, under >extreme (and uncommon cases), a user might be asked for their password at most >four times when a key is used with the Microsoft base CSPs. Perhaps the claim >came from an early beta release. The 16 dialog boxes problem was present in 4.0, and it's been confirmed as still being present in 4.01. This was apparently verified on Microsoft's own CryptoAPI mailing list (the claimed "beta" version was actually MSIE 4.0 final). >Microsoft is constantly working to improve the security of our products. Myself and another person had been trying to convince Microsoft for more than four months that things like CryptExportKey() are a major security hole. Their response each time has been some variation of "We don't see this as a problem". It simply wasn't possible to get them to acknowledge these flaws, therefore my posting of the details wasn't "irresponsible" (as some have claimed) but a necessity in order to get them fixed. When I pointed out several months ago that Microsoft were using, in their pre-4.x products, an exported key format which was identical to the one which I broke more than 1 1/2 years ago, their response was "What's the problem with this?". I would have liked to have included URL's for the CryptoAPI mailing list archives to prove that Microsoft were warned of these problems some time ago, but the CryptoAPI archive seems to be temporarily offline. Risks of a Private Key Compromise --------------------------------- One or two respondents have tried to play down the seriousness of a private key compromise, saying that I exaggerated the dangers in my original message. What I wanted to point out was how extremely valuable a users private key is, and how disappointingly little concern Microsoft seem to have for protecting this valuable resource. For example Garfinkel and Spaffords "Web Security and Commerce" (O'Reilly, 1997) contains the warning: "Today's PC's are no better at storing private keys once they have been generated. Even though both Navigator and Internet Explorer can store keys encrypted, they have to be decrypted to be used. All an attacker has to do is write a program that manages to get itself run on the users computer (for example by using [...] Microsoft's ActiveX technology), waits for the key to be decrypted, and then sends the key out over the network" (p.120). Including a function like CryptExportKey() (which hands over a users private key) makes this very attack possible. The potential damage which can be caused with a misappropriated private key is enormous. Consider the relative risks in the compromise of a logon password and a private key. With a logon password, the worst an attacker can do (apart from stealing possibly valuable data) is to trash the victims hard drive, which involves reinstalling the operating system (an action which many users are intimately familiar with). In contrast an attacker who obtains a private key can potentially drain the victims credit card, clean out their bank account (if the victim uses one of the emerging online banking services), sign documents in their name, and so on. The implications of that last point can be quite serious. Take for example the Utah digital signature act, which was used as a model by a number of other states who implemented or are implementing digital signature legislation. Under the Utah act, digitally signed documents are given the same evidentiary weight as notarised documents, and someone trying to overcome this has to provide "clear and convincing evidence" that the document is fraudulent, which is difficult since it bears a valid signature from the users key (this fact has been used in the past to criticise digital signature laws based on this act). In addition, under the Utah act and derived acts, anyone who loses their private key bears unlimited liability for the loss (in contrast, consumer liability for credit card loss is limited to $50). This leads to the spectre of a malicious attacker who has the ability to issue notarised documents in your name for which you carry unlimited liability. This is a lot more important than someone reformatting your hard drive, or stealing last months sales figures. Peter. From ariel.jl.1917 at mx3.redestb.es Tue Feb 3 05:36:49 1998 From: ariel.jl.1917 at mx3.redestb.es (Pepe) Date: Tue, 3 Feb 1998 21:36:49 +0800 Subject: No Subject Message-ID: <199802031315.FAA00642@toad.com> From jya at pipeline.com Tue Feb 3 06:15:58 1998 From: jya at pipeline.com (John Young) Date: Tue, 3 Feb 1998 22:15:58 +0800 Subject: Scientists in Black Message-ID: <1.5.4.32.19980203140145.00756490@pop.pipeline.com> In "Scientists in Black,"Jeffrey Richelson, noted intel author, surveys use of vast archives of classified intelligence data by select civilian scientists under the Medea program (SciAm, Feburary 1998). http://jya.com/sib.htm (40K with 4 images) Thanks to PJP for pointing. From cmefford at avwashington.com Tue Feb 3 06:32:07 1998 From: cmefford at avwashington.com (Chip Mefford) Date: Tue, 3 Feb 1998 22:32:07 +0800 Subject: Spammers In-Reply-To: <34c704c2.971366@128.2.84.191> Message-ID: Good day list. I was just in the process of mailing off a copy of the GNU junk email contract to some sammer or another, and it occured to me; It would certainly be nice to collect that 10buks a hit for this crap, It will never happen, Seems alot the spam I recieve originates with a node from uu.net and I am no big fan of Ubermesiter John Sidgmore, Wouldn't it be nice to hold uu.net culpable for all their spamming ways. They want to own the internet, let them hang for it. Just a thought, anyone intested in doing a class action to recover email processing fees? luv chipper From mhw at wittsend.com Tue Feb 3 06:32:17 1998 From: mhw at wittsend.com (Michael H. Warfield) Date: Tue, 3 Feb 1998 22:32:17 +0800 Subject: County Mounties Spit on the 4th Amendment In-Reply-To: <695e7d4cd89037ab6c4e383c56f8fa6b@privacynb.ml.org> Message-ID: <199802031425.JAA23565@alcove.wittsend.com> Anonymous Sender enscribed thusly: > >Oh! The 4th amendment? That dusty old thing? When the scumbags > >are kicking in your door which would you rather have protecting >you: a raggedy old piece of paper or a Prince George County >Mountie SWAT team in full ninja dress and the latest high-tech >law-enforcement goodies? Thought so. Cup's at the end of the >counter comrade. Have a nice day. > You couldn't be talking about Prince George, Canada, could you? > "Mounties" are Royal Canadian Mounted Police (RCMP), and are > limited to Canada, and Disney World. "County Mounties" is a CB (Citizens Band Radio for those not familiar with US radio) slang term in the US for local police. Conversely "Supertroupers" refers to State Patrol. The term "Smokie" (coined from the movie Smokie and the Bandit) refers to all police. Mike -- Michael H. Warfield | (770) 985-6132 | mhw at WittsEnd.com (The Mad Wizard) | (770) 925-8248 | http://www.wittsend.com/mhw/ NIC whois: MHW9 | An optimist believes we live in the best of all PGP Key: 0xDF1DD471 | possible worlds. A pessimist is sure of it! From billp at nmol.com Tue Feb 3 06:47:32 1998 From: billp at nmol.com (bill payne) Date: Tue, 3 Feb 1998 22:47:32 +0800 Subject: Gilbert Vernam Message-ID: <34D7287E.1752@nmol.com> Tuesday 2/3/98 7:02 AM John Young J Orlin Grabbe The crypto problem was solved in 1918. Vernam and Maugborne [sp?] did the work. Gilbert Vernam in 1918. Vernam used two tapes of random characters to generate the additional characters. With the same tapes at each end set to the same start position this system was unbreakable. The Germans decided that the distribution of these key tapes presented too great an operational problem and the Lorenz machine uses a complicated mechanical gearing and cam system to generate a pseudo random sequence with very long period and 10^19 complexity. They thought this was good enough to ensure unbreakability, it wasn't! Fushimi's implementation of Lewis and my GFSR algorithm has period of 2^521 - 1. And LOTS of possible starting seeds. John Young kindly posted my article on putting non-singular binary matrices in one-to-one correspondence with the natural numbers. Although the period of a shift register can be 2^521 - 1, 521 bits determines THE EXACT SEQUENCE of the remaining 2^521 - 522 bits. Pseudorandom numbers generators have an easier job than bits used for cryptography. Pseudorandom number generators merely have to deceive statistical tests. Orlin Recall the GIANT radio transmitter in the south of Russia, perhaps Baku. I heard on PBS TV that it was transmitting a shift register sequence. The Russians were apparently trying to communicate with underwater submarines. NSA crypto algorithms mostly rely on shift register sequences - both linear and NON-LINEAR. The R register in my SAND report posted at jya.com implements a non-linear SECRET/NSI feedback algorithm. Perhaps someone may have to put NSA's SECRET/NSI R register non-linear feedback function out on the web some time. So that every one can have a good laugh, of course. Like for the SECRET/NSI number 31 algorithm step. John Young Judge Svet made a ruling. I sent a copy to you by snail mail. Later, bill Title: Colossus Rebuild The Colossus Rebuild Project by Anthony E Sale, FBCS A bit of History Colossus was designed and built at the Post Office Research Laboratories at Dollis Hill in North London in 1943 by a team led by Dr Tommy Flowers to help Bletchley Park in decoding the intercepted German telegraphic cipher traffic enciphered using the Lorenz SZ42 cipher machine. Lorenz SZ42 cipher machine at Bletchley Park This cipher machine enciphered electrical teleprinter signals which used the international 5 bit Baudot teleprinter code. It enciphered the input plain text by adding to it successively two characters before transmission. Because this addition was bit by bit modulo 2, at the receiving end with the Lorenz machine set to the same start position, the same two characters were added again to the received characters revealing the original plain text. This scheme had been developed in America by Gilbert Vernam in 1918. Vernam used two tapes of random characters to generate the additional characters. With the same tapes at each end set to the same start position this system was unbreakable. The Germans decided that the distribution of these key tapes presented too great an operational problem and the Lorenz machine uses a complicated mechanical gearing and cam system to generate a pseudo random sequence with very long period and 10^19 complexity. They thought this was good enough to ensure unbreakability, it wasn't! A bibliography of works discussing the Lorenz cipher has been compiled by Frode Weierud is availabe here by permission. As is a book chapter describing the Swedish effort to crack Lorenz. The German high command thought that the Lorenz machine was completely unbreakable and used it for their most secret messages, literally from Hitler to his generals and between generals. The interception and deciphering of these messages gave Generals Eisenhower and Montgomery vital information prior to and after D Day in 1944. Colossus was the world's first large electronic valve programmable logic calculator, not just one but ten of them were built and operational in Bletchley Park the home of Allied WW II codebreaking. The question of what is the worlds first computer is less a question of history than a question of definition. The Mark 1 at Manchester (1948) is a strong contender. A view of Colossus Colossus found the wheel settings used by the German Lorenz machine operator for a particular message. When these had been found, which took about two hours, they were plugged up on the Tunny machine. It was this machine which actually deciphered the message. This is the Tunny room in Bletchley Park in 1945. Colossus, hardware details Input: cipher text punched onto 5 hole paper tape read at 5,000 characters per second by optical reader Output: Buffered onto relays: Typewriter printing onto paper roll Processor: Memory 5 characters of 5 bits held in a shift register. Clock speed 5kc/s derived from input tape sprocket holes. Internally generated bit streams totalling 501 bits in rings of lengths equal to the number of mechanical lugs on each of the 12 Lorenz wheels. A large number of pluggable logic gates. 20 decade counters arranged as 5 by 4 decades. 2,500 valves. Power supplies +200v to -150v at up to 10A. Power consumption 4.5KWatt Size: Two banks of racks 7ft 6inches high by 16ft wide spaced 6 ft apart. Bedstead, 7ft 6inches high 4ft wide by 10ft long Colossus, operating cycles The basic machine cycle: read a character from tape, get bits from bit stream generators, perform up to 100 logic operations, clock result into decade counters. The cycle determined by the input tape: The intercepted enciphered text tape is joined into a continuous loop with about 150 blank characters in the join. Specially punched start and stop holes indicate the beginning and end of the cipher text. On receipt of start hole pulse: Start bit stream generators and send sampling pulses to reader output. Execute basic machine cycle until receipt of stop hole pulse: Staticise counter states onto relays. After a delay, reset counters and reset bit stream generators to a new start position. Colossus programming All programmes hard wired, some permanently, some pluggable. Conditional jumping possible between alternative programmes depending on counter outputs. The Rebuild Work on the rebuild started two years ago with the collection of all available information about Colossus, including a series of official photographs taken in 1945. The first stage was to produce accurate machine drawings of the frames for Colossus (all the original machine drawings had been burnt in 1960). This involved three months of eyestrain pouring over the photographs and using 3D projections to transfer the details to a CAD system, EasyCad running on a 486 PC. Next problem was the optical paper tape reader system. The details of this are not shown in any of the photographs. However I managed to locate Dr Arnold Lynch who designed the reader system in 1942. Although well into his 80's Dr Lynch came to my house and using my CAD system we re-engineered the reader system to his original specifications. Then I built it and here it is. It uses original Colossus hard vacuum photocells, shown here on the left and a mask onto which the image of the tape is projected by a Colossus lense. All the racks are now in place. Here are some of the decade counters. We are also rebuilding the Tunny machine. The current state of Colossus: Jan 96 Examples of most of the circuit panels are now working and the whole machine is working at one bit level. We are now rapidly cloning circuit panels to populate all the racks. I need lots more valves: EF36, 37 or 37A pentodes, 6J5 triodes, 6V6 tetrodes and GT1C gas filled triode thyratrons. The 6J5's and 6V6's should be the large glass versions to look right. Please send any contributions, valves or money, to me (Tony Sale) at "The Colossus Rebuild Project, 15 Northampton Road, Bromham, Beds MK43 8QB" tel: 01234 822788 email: TSale at qufaro.demon.co.uk Come and see the Colossus Rebuild, the Lorenz machine and codebreaking exhibitions in Bletchley Park. This page was created by Tony Sale (tsale at qufaro.demon.co.uk) of the Bletchley Park Trust, and has been modified by Jeff Goldberg (J.Goldberg at Cranfield.ac.uk) of the Cranfield University Computer Centre. Title: Cryptome Cryptome � JYA/Urban Deadline OpEd _______________________________________________________________________________________ File Topic Date _______________________________________________________________________________________ sib.htm Scientists in Black February 3, 1998 CAP The Cryptographic Analysis Program (offsite) February 2, 1998 Arne Beurling The Geheimschreiber Secret (offsite) February 2, 1998 Army Stegano US Army Steganography (offsite) February 2, 1998 Colossus Rebuilding Colossus (offsite) February 2, 1998 Frode Crypto Cryptology Papers (offsite) February 2, 1998 jimbell9.htm Jim Bell Update February 2, 1998 echelon-boost NSA Surveillance System Boosted (offsite) February 2, 1998 cn020298.txt Crypto News February 2, 1998 bxa020298.txt BXA Meet on Export Rules and Procedures February 2, 1998 cs020298.txt Rules to Challenge Customs Seizures (63K) February 2, 1998 usg020298.txt USG Secret Meets February 2, 1998 echelon.htm NSA Global Surveillance System February 2, 1998 cathedral.htm The Cathedral and the Bazaar February 1, 1998 natsec-rule.htm Protection of National Security Information February 1, 1998 47cfr216.txt National Communications Issuance System (106K) February 1, 1998 47cfr213.txt Emergency Telecomms Precedence System (17K) February 1, 1998 47cfr202.txt National Security Emergency Plans & Ops (27K) February 1, 1998 47cfr201.txt Policy for Telecomms During Emergencies (12K) February 1, 1998 44cfr336.txt Facilities for National Security Emergency (14K) February 1, 1998 44cfr334.txt FEMA Graduated Mobilization Response (14K) February 1, 1998 32cfr322.txt Privacy Act Exemption for NSA Records (40K) February 1, 1998 32cfr299.txt National Security Agency FOIA Program (8K) February 1, 1998 32cfr2101.txt National Security Council FOIA Requests (24K) February 1, 1998 32cfr185.txt Military Support to Civil Authorities (52K) February 1, 1998 31cfr9.txt Effects of�Imported Articles on National Security February 1, 1998 22cfr124.txt Contracts, Off-Shore Buys, Defense Services (42K) February 1, 1998 22cfr123.txt Licenses for the Export of Defense Articles (51K) February 1, 1998 22cfr121.txt United States Munitions List (92K) February 1, 1998 _______________________________________________________________________________________ ntia-dnsdrft.htm Draft Proposal for New Domain Name System January 30, 1998 korczak.txt Boris Korczak: CIA Agent Seeks Payment January 30, 1998 pm87.txt Prez on Terrorist Threat to Middle East Peace January 30, 1998 leahy-wipo.txt Senator Leahy on Ratifying WIPO Treaties January 30, 1998 32cfr147.txt DoD: Policies for Access to Classified Info January 30, 1998 32cfr148.txt DoD: Facilities for Storing Classified Info January 30, 1998 32cfr149.txt DoD: National Policy on Technical Surveillance January 30, 1998 ntia012798.htm RFC: Self-Regulation for Privacy Protection January 30, 1998 cylinked.htm Latest: Cylinked to Organized Crime? January 29, 1998 websoft-warn.htm Web Software Warning January 29, 1998 scant-peril.htm U.S. Spy Agencies Pauline Peril January 29, 1998 mossburg.htm E-Comm Forum on E-Authentication and DigSig January 29, 1998 pollard.htm Bankers O Table on E-Authentication and DigSig January 29, 1998 brown.htm Secret Service on Financial Instruments Fraud Janaury 29, 1998 rpk-hack.htm Invite to Hack RPK InvisiMail January 29, 1998 nrc012998.txt Generic Letter on Y2K Readiness for Nuke Plants January 29, 1998 fc012998.txt FinCEN RFC on Information Collection January 29, 1998 dtc012998.txt Arms Export to Saudi Arabia January 29, 1998 nsa-etc-nf.htm NSA, Echelon, Trade & Crypto/Netscape & Fortify January 28, 1998 dod012898.txt DoD Blacklist of Higher Education January 28, 1998 47usc1002.txt Interception of Digital and Other Communications January 28, 1998 cn012898.txt Crypto News January 28, 1998 cn012798.txt Crypto News January 27, 1998 bxa-fy98.txt BXA Funding FY 1998 January 27, 1998 cia-tsang.htm CIA Concedes Spying on Americans January 26, 1998 atpc.htm EU-Parliament: Technologies of Political Control January 26, 1998 us-crypto.htm US Crypto Policy January 25, 1998 pg-nzcrypto.htm New Zealand Crypto Policy January 24, 1998 ra-ukcrypto.htm UK Crypto Policy January 24, 1998 whp012398.htm Payne/Morales vs. NSA: Reply to Defendant January 23, 1998 kellner.htm Intellectuals and New Technologies (66K) January 23, 1998 bxa012398.txt BXA Penalizes Export Violator January 23, 1998 osd012398.txt Compensation of North Viet-Imprisoned Operatives January 23, 1998 dod012398.txt Defense Dept Secret Meets January 23, 1998 walton-pk.htm GCHQ: The Pre-History of Public Key Cryptography January 22, 1998 primer The Proliferation Primer (offsite) January 22, 1998 sh105-238.txt Proliferation and US Export Controls (196K) January 22, 1998 sh105-267.txt Safety and Reliability of US Nukes (347K) January 22, 1998 acda012298.txt Arms Control Secret Meet January 22, 1998 pd012298.txt Prez Notice on Mideast Terrorism Emergency January 22, 1998 bia012298.txt Rule on Indian Casinos January 22, 1998 cn012198.txt Crypto News January 21, 1998 fc98.htm Financial Cryptography '98 January 20, 1998 doj-ssgsup.htm Supplement to Fed Guide for Seizing Computers January 20, 1998 cn-netreg.htm New Chinese Internet Regulations January 20, 1998 pg-get-MSkey.htm How to Recover Private Keys for Microsoft Wares January 20, 1998 ietf-dea-97.htm IETF Draft Encryption Algorithms 1997 January 20, 1998 radio-rec.htm Update: Locating Radio Receivers; Encoder Stolen January 20, 1998 pipenet.htm PipeNet Description January 20, 1998 dod012098.txt Defense Dept Secret Meets January 20, 1998 bernstein12.htm Transcript of Bernstein Hearing January 19, 1998 fbi-umbc.htm Barry Smith (FBI) to Speak on Encryption Policy January 18, 1998 de-snoop.htm Update: German Surveillance State January 17, 1998 bxa-wa-rule.htm Update 2: BXA Rule on the Wassenaar Arrangement January 16, 1998 pd98-10.htm Prez OKs China's Nuclear Controls January 16, 1998 tcryptol Theory of Cryptography Library (offsite) January 16, 1998 cn011698.htm Crypto News January 16, 1998 nsasuit8.htm USA/NSA Responds to Payne/Morales Motion Janaury 16, 1998 dod011698.txt Defense Dept Secret Meets January 16, 1998 bxa011398.txt Materials Advisory Meet January 15, 1998 crypto-kong.htm Announcing Crypto Kong January 15, 1998 occ-dstc.htm OCC OKs CA as Authorized Banking Activity January 14, 1998 aes-980820 Advanced Encryption Standard Conference (offsite) January 14, 1998 ustr010898.txt Update: Telecommunications Trade Agreements January 14, 1998 rc2.htm Rivest Describes RC2 Encryption Algorithm January 13, 1998 fc011398.txt FinCEN Regulates Card Clubs January 13, 1998 ta011298.txt Key Management Infrastructure Meet January 12, 1998 nist011298.txt Transmission-Electron Microscopy Meet January 12, 1998 doa011298.txt Army Hazard Containment Invention January 12, 1998 gps-jam.htm GPS Jamming January 11, 1998 arthur.htm The Force of An Idea: Theory of USA v. Microsoft January 10, 1998 RSA-stego.htm Batch RSA for Stego Data January 9, 1998 batch-DSA.htm Batch DSA January 9, 1998 cell-track.htm Update 2: Mobile Cell Phone Surveillance January 9, 1998 fiat-rsa.htm Fiat's Batch RSA January 9, 1998 aes010798.htm Update: Advanced Encryption Standard January 9, 1998 doj010998.txt RFC: USA v. IBM/STK Antitrust Suit January 9, 1998 bmd010898.txt Ballistic Missile Defense Secret Meet January 9, 1998 nih010898.txt Commercialization of Medical Data January 9, 1998 fas-pde Prez Directives/Executive Orders (offsite) January 7, 1998 ussc-ecopy.htm Sentencing for Electronic Copyright Violations January 6, 1998 ussc010698.txt RFC: US Sentencing Guidelines (254K) January 6, 1997 mercier.htm Terrorists, WMD, and the US Army Reserve January 6, 1998 terror-rnd.htm US Counterterrorism R&D Program January 6, 1998 belet Bob East Letter on AP/Jim Bell/IRS (offsite) January 6, 1998 pitfalls Schneier: Security Pitfalls in Crypto (offsite) January 5, 1998 dsb010598.txt Defense Science Board Secret Meets January 5, 1998 ntia010598.txt Funds for Public Telecommunications January 5, 1998 cn010598.txt Electronic Surveillance News January 5, 1998 csda.htm Cypherpunks Smartcard Developer Association January 4, 1998 aimd-98-21.htm Executive Guide: Info Security Management (139K) January 3, 1998 blast-mono.htm Blast Resistant Doors Monograph January 3, 1998 tempest-door.htm Electromagnetic Shielding/TEMPEST Door January 3, 1998 ehj.htm Banned Basque Video: Democratic Alternative January 3, 1998 fda010298.htm Policy for External Penile Rigidity Devices January 2, 1998 doe010298.htm Defense Nuclear Facilities Safety Plan January 2, 1998 dos010298.txt Meet on Global Communications and Info Policy January 2, 1998 doa010298.txt Army Science Board Meet January 2, 1998 _______________________________________________________________________________________ Cryptomb 2 June-December 1997 Cryptomb 1 To May 31 1997 � � � � (site stats) � DoE: Pay Bill Payne�� DoJ: Free Jim Bell From simonf at uk.uu.net Tue Feb 3 06:48:39 1998 From: simonf at uk.uu.net (Simon Fraser) Date: Tue, 3 Feb 1998 22:48:39 +0800 Subject: Spammers In-Reply-To: Message-ID: Note: What I write here are my own views, not necessarily those of my company. On Tue, 3 Feb 1998, Chip Mefford wrote: > Wouldn't it be nice to hold uu.net culpable for all their spamming ways. They > want to own the internet, let them hang for it. http://www.us.uu.net/support/usepolicy/ It would be nice to differentiate between the spammers themselves and the ISP they use. Simon. From otoole at lcs.mit.edu Tue Feb 3 09:20:06 1998 From: otoole at lcs.mit.edu (James O'Toole) Date: Wed, 4 Feb 1998 01:20:06 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) Message-ID: <01BD308B.1A566960@slip-james.lcs.mit.edu> Tim, the "social pressure" I was referring to is the process through which the obstacles to privacy-protecting measures are created and enforced. Examples include both government regulation, which derives part of its support from publicity connecting cash with money laundering with drugs and/or crime, as well as finality/liability rules within non-government financial consortiums, which may strongly encourage proof-of-identity. Let's take your example of the Institute of Applied Ontology (IAO) corporate Amex card (Ax)... Even with no relevant government regulations, we may find that Ax's agreement with merchants requires Ax to at least either pay the merchant or reveal to the merchant all relevant information known to Ax about the cardholder. The right contract terms between the merchant and Amex will be good for them, and may be good for most consumers, and could easily be sub-optimal for the subset of consumers who highly value privacy. The impracticality of negotiating special terms with each merchant means that the best plan to get the privacy/anonymity you want may be to set up a card such that Amex will be willing to operate without knowing much about the cardholder. I assume that's the intent of your IAO corporate Ax card. What allocation of the liability for card usage do you expect among Amex, IAO, and the cardholder? Amex will want the liability allocated to IAO and the cardholder, and if Amex does not possess traceable identity information on the cardholder, then Amex will want an enforceable promise to pay from IAO. To get this, or even to get funds in advance from IAO, we will find that Amex ends up knowing a lot about the identity of IAO or one of its officers. Pretty soon we'll run up against the problem of whether Tim May can configure a corporate in the U.S. to be operated by people who don't know who he is, and who can't find out who he is (when properly encouraged to cooperate by Ken Starr...). With or without government regulation, the most reliable people you can hire to operate that corporation for you may only want to do so if they are given the opportunity to somehow "know" you. I think you can probably use a bank in a privacy-enhancing-locale such as Switzerland as an effective intermediary in Amex card issuance, but if you really don't want the bank to know who you are, you'll probably need a corporate intermediary between you and the bank, with nominee officers. The real trick is probably to structure the whole thing so that neither the bank nor the nominee officers have anything to lose, including their reputations. As long as part of their reputation is that they don't act as front men for drug dealers and criminals, we may find that they keep trying to find out enough about who you are to satisfy themselves that you are a good guy. That's the social pressure flexing its muscles. >An interesting question about the Privacy Card product is whether the >social pressure against it is strong enough to defeat its privacy whenever >the product is well advertised. In other words, will a privacy product >survive in spite of its own publicity in our current environment, or can Corporate cards are already widely accepted...most of you probably have a card issued to you through your employing institution. I see no "social pressure" to block usage of my Institute of Applied Ontology corporate AmEx card. The real roadblock is that government makes such privacy-protecting measures either difficult or illegal. --Tim May The Feds have shown their hand: they want a ban on domestic cryptography ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^2,976,221 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway." From tcmay at got.net Tue Feb 3 09:23:59 1998 From: tcmay at got.net (Tim May) Date: Wed, 4 Feb 1998 01:23:59 +0800 Subject: UrsinePunks (Re: County Mounties Spit on the 4th Amendment) In-Reply-To: <695e7d4cd89037ab6c4e383c56f8fa6b@privacynb.ml.org> Message-ID: At 6:25 AM -0800 2/3/98, Michael H. Warfield wrote: >"Supertroupers" refers to State Patrol. The term "Smokie" (coined from >the movie Smokie and the Bandit) refers to all police. Nope, not coined from the movie. Just the reverse. Highway cops were called "smokies" (or "smokeys") when I was growing up in Virginia in the 60s, long before the movie. I haven't checked the derivation, but had always assumed it came from the Smokey the Bear figure, who wore a tall, broad-brimmed hat (also known as a campaign hat). The hat worn by many state highway patrols. Ergo, "smokeys." (I used to see the _real_ Smokey the Bear at the Washington Zoo. I think he died of old age in the 1970s.) (A URL with a few details is http://www.4j.lane.edu/websites/roosevelt/Connections/smokey.html) --Tim May, posting from the Bear State "National borders aren't even speed bumps on the information superhighway." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From emc at wire.insync.net Tue Feb 3 09:38:08 1998 From: emc at wire.insync.net (Eric Cordian) Date: Wed, 4 Feb 1998 01:38:08 +0800 Subject: The War on Some Debts Message-ID: <199802031640.KAA18766@wire.insync.net> In a further blatant erosion of Constitutional rights, the California Supreme Court has ruled that a person owing child support who fails to seek or accept work may be jailed and fined for contempt of court, and that this does not violate any Constitutional bans on involuntary servitude or imprisonment for debt. This reverses nearly a century of contrary rulings. Look for this "improved" interpretation to be expanded to other kinds of debts and judgments as well, as soon as massive public acceptance of it for the carefully picked child support issue is engineered. The credit card companies are no doubt carefully analyzing this decision as we speak. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From rah at shipwright.com Tue Feb 3 09:39:33 1998 From: rah at shipwright.com (Robert Hettinga) Date: Wed, 4 Feb 1998 01:39:33 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) In-Reply-To: <199802030242.DAA10101@basement.replay.com> Message-ID: At 10:31 pm -0500 on 2/2/98, Tim May wrote: > At 6:42 PM -0800 2/2/98, Anonymous wrote: > >Tim May wrote: > >> The real solution is easy. > > > > > >Easier said than done. > When I say the real solution is easy, I mean it. Get rid of the laws Nope. Making or repealing laws won't mean too much for the privacy of transactions, except to reallocate who gets screwed in some kind of political zero-sum game. Anyway, laws are there because there's an economic incentive for them to be there. Reality is not optional. Physics creates economics which creates laws. Not the other way around. Even morality and ethics come from culture, which itself is a physical phenomenon, the collective response of humans to the resources on hand, which is an economic process if there ever was one. So, only when digital bearer certificate technology like blind signatures is proven to be *cheaper* than the current privacy-invasive book entry transaction regime will there be any demand for digital bearer settlement of assets, debt, and cash transactions. Personally, I believe that that time is coming sooner than most people realize. That's because when someone figures out how to save everyone a bunch of money with digital bearer certificates, they're going to make a bunch of money doing it, and the race to the bottom-line will begin. As I've said here several times before, the paradox will prove to be that digital bearer settlement will be cheaper to use *because* they're physically anonymous. You don't *care* what the biometric identity of someone is, as long as you're protected from bad economic actors, and can do reputation damage to people who you can prove have damaged you financially. Which, as we all know here, is simply a matter of financial cryptography. The cost of anything is the foregone alternative. People will only demand more privacy when it's cheaper than not having it. I believe that that time is coming, rather quickly. Cheers, Bob Hettinga ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ Ask me about FC98 in Anguilla!: From attila at hun.org Tue Feb 3 09:39:50 1998 From: attila at hun.org (Attila T. Hun) Date: Wed, 4 Feb 1998 01:39:50 +0800 Subject: the best justice money can buy --Lessig suspended Message-ID: <19980203.154218.attila@hun.org> -----BEGIN PGP SIGNED MESSAGE----- >>> the best justice money (and politics) can buy I really do not believe this --this is bought justice as appeals courts never, or at least rarely such as a blatant in the case of a blatant error in a capital murder criminal trial, interfere with a sitting federal judge. the damage is immense; it delays the first round of adjudication by at least 5 months. if I were Joel Klein I would go for the jugular and file action for an immediate divestiture of M$ including injunctions against operations and management by Bill Gate$ and Steve Ballmer. the appeals court would probably suspend the actions, but they would still be there and on the table. Jackson at this point will be furious --hopefully he keeps total cool. the obvious next move on the part of M$ will be to have Jackson disqualified for bias. that will make 2 judges in the DC circuit who M$ has wasted. Royce Lambert refused to accept the 1994 plea bargain --obviously M$ would ask him to recuse if his name came out of the barrel; theoretically, cases are assigned by lottery --in reality, you can influence the choice of a judge as the cases are assigned at the time of filing by rotation. --M$ obviously is capable of shopping for a judge. at this point, I would say M$ has won the game. W98 will be released with IE4 as the desktop, complete with push channels and www.msn.com --at that point, Jackson --if he is still the sitting judge-- will be forced to make a bad law decision if he tries to block it on the 1994 agreement: the product is 'integrated' --M$ had the foresight to hoodwink the DOJ --Royce Lambert saw through the smoke screen but the appeals court removed him from the case. so... we will have multiple choice of OS: M$ on Intel, M$ on SGI, M$ on Alpha --and SUN goes down the tubes as they will never capitulate. M$ will bury IBM with their NT alliance with Ahmdal who clones all the IBM iron --which is fading against the clustered servers. IBM long since gave in on OS/2 versus M$ --it may figure in their corporate strategy, but unless they are willing to update past Netscape 2.02 they will lose that as well --in fact you can no longer any of the IBM PCs with OS/2 preloaded --except by special order: in quantity. Bill Gate$ for President? might as well... maybe Lee Harvey Oswald will come to the rescue. Lessig appointment suspended By Dan Goodin, C|Net February 2, 1998, 6:40 p.m. PT A federal appeals court has immediately suspended the appointment of a contested computer expert charged with collecting and weighing evidence in the antitrust case the Justice Department has brought against Microsoft. In a ruling handed down late Monday, the U.S. Court of Appeals for the District of Columbia granted Microsoft's request to halt, pending further review, the proceedings before visiting Harvard Law School professor Lawrence Lessig. U.S. District Judge Thomas Penfield Jackson appointed Lessig a "special master" in mid December, giving the computer and Internet law expert until May 31 to recommend factual and legal findings in the high-profile case. The one-page ruling is a significant--but by no means final--win for Microsoft, which repeatedly has objected to Lessig's appointment. In briefs filed first in district court and then with the court of appeals, Microsoft strenuously has opposed the designation of any special master in the case, but has argued further that Lessig is an inappropriate choice because he appears to be biased against the software giant. In a sternly worded order issued two weeks ago, Jackson denied Microsoft's request, calling the allegations of bias "trivial" and "defamatory." Today's ruling by the court of appeals is in stark contrast to Jackson's order, and may indicate that the three-judge panel assigned to hear matters in the case sees things in a different light. Rather than permanently halting the proceedings, today's ruling is an agreement only to consider Microsoft's challenge to the special master--known in legal parlance as a writ of mandamus. In a sign that the judges may be inclined to agree with Microsoft's arguments on the issue, however, they handed Redmond an additional win by immediately halting the proceedings scheduled to take place before Lessig while the challenge is being heard. "It is extremely unusual for a court of appeals to reach down and stop what a district court has ordered," said Rich Gray, an antitrust attorney at Bergeson, Eliopoulos, Grady & Gray. "The court of appeals is saying, 'We're interested in hearing more about this, and in the meantime, we're going to put the special master on hold.'" A Microsoft spokesman agreed. "This is a very positive step, but it's only one small step in a long process," said Jim Cullinan. "We look forward to presenting our evidence to the appeals court as well as the trial court." The court of appeals already had agreed to hear a separate appeal, in which Microsoft is fighting a preliminary injunction Jackson issued in December that requires Microsoft to separate browser software from its Windows products. Today's ruling consolidates both motions into the same April 21 hearing. It also requires both sides to file additional briefs concerning the special master challenge by April 7. Moreover, the government must file its opposition to Microsoft's appeal of the preliminary injunction by March 2, and Microsoft must respond to that brief by March 9. Justice Department representatives were not immediately available for comment. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 Comment: No safety this side of the grave. Never was; never will be iQBVAwUBNNc8R7R8UA6T6u61AQH3swIAtVNkbSk80Crg/dseQOP4pPpIbEDGchsl rWj/sEmXn/2EnWxXBTp4OnkRpJlFbobhbkT3lJqE4Jj2V+MnEGUFzw== =9S7I -----END PGP SIGNATURE----- From attila at hun.org Tue Feb 3 09:40:48 1998 From: attila at hun.org (Attila T. Hun) Date: Wed, 4 Feb 1998 01:40:48 +0800 Subject: too little too late: SPA takes on M$ Message-ID: <19980203.151905.attila@hun.org> -----BEGIN PGP SIGNED MESSAGE----- >>> too little and too late, SPA takes on Microsoft this might have been a good action in so much as they are well entrenched, in part on M$' money, as Washington lobbiests. now, with Lessig's role as the court appointed expert suspended by the appeals court until a 21 Apr hearing (submissions due in early April), their voice will be lost in the court action. any action they stimulate with Orrin Hatch's judiciary is a) too late; too slow --at least two years; 3) of little consequence as Congress can not legislate against a specific company --they can legislate by regulation against an industry; and, 4) more importanty, the Appeals Court castrated Johnson's order for the special administrator. still, it is another voice; even though the guidelines are bland, there is no mistalking who the target is; and, in typical M$' fashion they are threatening to drop their membership instead of renewing in August. there are three areas where M$ is exercising monetary influence, even control of the agenda, in legislation or justice: the DOJ action with their crying to Daddy (the appeals court), the SPA guidelines which they intend to force SPA to withdraw, and as part of the closed circle negotiating the rules on intellectual property and trade for the Western Hemisphere free trade zone --closed meetings. as I said: Gate$ makes Cornelius Vanderbilt look like a choir boy. Software group takes on Microsoft By Courtney Macavinta February 2, 1998, 5:05 p.m. PT As the federal antitrust lawsuit against Microsoft barrels forward, a prominent high-tech trade association tomorrow will release a list of competition principles that strike at the heart of the case and angered the software giant. The Software Publishers Association (SPA) hasn't officially responded to the Justice Department's accusations that Microsoft violated a 1995 consent decree by requiring computer makers to bundle its Internet Explorer browser as a condition of licensing its Windows 95 operating system. But the new guidelines echo some of its smaller members' and the government's complaints regarding Microsoft. The SPA's guidelines come one day after New York State's attorney general said he and ten other state prosecutors subpoenaed Microsoft for evidence of potentially illegal bundling of Windows and Internet software. In addition, the Senate Judiciary Committee and regulatory agencies from Japan and the European Union also are looking into Microsoft's business practices. (See related story) The SPA says it set out to develop the principles to define its role in the fair competition debate, which focuses on its largest member. The SPA has been sought for advice by lawmakers in the past, and it states that the new principles are intended to "guide government officials" in antitrust enforcement. Hitting home with Microsoft foes, the SPA principles state: "Operating systems should not be used to unfairly favor its own products and services, or its favored partners, over those competing vendors. The operating system vendor should not include its own services or products as part of the operating system or user interface unless it gives the same ability to integrate products and services into the operating system to competing vendors." The SPA went on to state that "the tying of certain applications to the sale of other applications has the effect of restraining competition among independent software vendors for the 'virtual shelf space' of [PC makers]." Dominant operating systems also should not "favor Internet content" that it owns or licenses, according to the guidelines. The principles say that healthy competition is reliant on equal access to retail customers. On the other hand, pre-announcing products that do not exist yet, so-called vaporware, stifles competition. Prior to developing the principles, the 1,200-member group surveyed its domestic members. Of the 164 that responded, anticompetitive activity was a top concern. As reported in January, the issue also took the spotlight at two scheduled meetings in Santa Clara, California. The SPA's Government Affairs Committee even met with Joel Klein, the Justice Department's lead attorney in the lawsuit against Microsoft. Microsoft fired back today, calling the SPA's process "short-sighted" and the publication of the principles "self-destructive." The company also quipped that it is undecided on whether it will renew its SPA membership, which expires in August. Although Microsoft was present at the SPA's California meetings last month, so were some of its main competitors, such as Novell, Netscape Communications, Apple Computer, and Oracle Corporation. "It's unfortunate that a handful of Microsoft's competitors are trying to use the SPA to drive a wedge into the software industry. This whole process has been such an obvious attack on Microsoft," Mark Murray, a spokesman for the company, said today. "I think the primary impact of this is that the SPA will be discredited, and that it will weaken their ability to serve as a legitimate voice," he added. The SPA knew its principles would be searched for hidden meaning regarding the Microsoft case, but the group contends it wasn't targeting the company. "The principles are not intended to prescribe remedies that might be applied by federal and state antitrust enforcers to any particular company or set of circumstances," SPA president Ken Wasch said in a statement. "Nor are these principles a call for general regulation of our industry. Rather, the principles reflect an industry consensus of how some business practices promote or impair strong competition." Still, for a group with no regulatory power, the SPA's opinion will hold some weight. The group is expected to testify before the Senate Judiciary Committee when it holds hearings on issues of competition in the high-tech industry this year. Moreover, the new principles amend the organization's existing guidelines, which were presented to the Federal Trade Commission during a hearing two years ago. During the hearing, the SPA advised the government to carefully scrutinize companies that allegedly impede others from getting space on retail store shelves. The SPA also took the position that owners of dominant operating systems should release essential technical information to other developers. Both points remain in the new eight-point plan. The remaining SPA competition principles include: Maximize innovation to benefit consumers. The owners of dominant operating systems should license their "interface specifications to any third party for the purposes of developing application software." "Barriers" should not be put up by dominant operating systems that limit consumers' or hardware makers' ability to reconfigure their desktops or utilize any software or online content services. Software vendors "should not intentionally disable, cripple, or otherwise interfere with the intended functionality and execution of other products." Operating systems should not prohibit Web sites from "exploiting the access capabilities of competing products" or force sites to display and promote their products. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 Comment: No safety this side of the grave. Never was; never will be iQBVAwUBNNc1UbR8UA6T6u61AQHEQwH/cpSHIdQwCR0XVoxqEVya3E15ZBrmI5M8 hln8Dm2qFF39UjsNVLJhp4J4xDnyTdeRCDkGDixzI5qJqDwChz5prw== =sN0q -----END PGP SIGNATURE----- From Mia.Westerholm at DataFellows.com Wed Feb 4 01:43:42 1998 From: Mia.Westerholm at DataFellows.com (Mia Westerholm) Date: Wed, 4 Feb 1998 01:43:42 -0800 (PST) Subject: Data Fellows wins another acclaimed award Message-ID: <3.0.2.32.19980204104606.00bf56bc@smtp.DataFellows.com> Data Fellows Ltd. Media Release For immediate release 4 February 1998 DATA FELLOWS WINS ANOTHER ACCLAIMED AWARD International Success Recognized by Head of State The developer of F-Secure data security products, Data Fellows Ltd., has received the President of Finland�s Export Award. This award is granted annually to the most outstanding export companies in the country. This is the first time a developer of commercial software packages has been granted the award. Data Fellows is one of the world�s leading developers of data security products. It has offices in San Jose, California, and Espoo, Finland, as well as distributors in over 50 countries all around the world. Its products have been translated to over 30 languages. The company�s annual growth in net sales has been over 100% since it was founded in 1988. "The award is a recognition of our status as a leading international data security development company," says the Chief Executive Officer of Data Fellows Ltd., Mr. Risto Siilasmaa. "I believe our success is based on two things: excellent products and high quality services." The most successful product group of the company is its F-Secure Anti-Virus products. Data Fellows is the developer of the revolutionary CounterSign Technology, which enables the use of several scanning engines simultaneously. Due to this groundbreaking technology, the theoretical chances of a virus slipping through to a computer or a network are smaller than ever. F-Secure Anti-Virus offers unrivalled protection by combining the best available single scanning engine F-PROT with the AVP anti-virus engine, which also ranks among the best in the world. Another fast growing business area for Data Fellows is its F-Secure cryptography software products. The F-Secure product family uses the best available military strength encryption and authentification algorithms to protect confidential data. F-Secure products are based on the SSH protocol, which provides a generic transport-layer encryption mechanism for network connections. The SSH protocol provides both host authentication and user authentication, together with privacy and integrity protection. The products of Data Fellows have already won numerous international tests and competitions, including the 1996 European Information Technology Prize; Data Communications Magazine�s Hot Product of the Year 1997; SVM Magazine, May 1997, Best Anti-Virus; and SECURE Computing�s Editor�s Choice. Data Fellows belongs to an elite group of companies that have a triple-A rating from Dun&Bradstreet. Triple-A is the highest possible credit rating. For further information, please contact: Data Fellows Ltd. Mr. Risto Siilasmaa, Chief Executive Officer Tel. +358-9-859 900 e-mail: Risto.Siilasmaa at DataFellows.com or visit the Data Fellows web site at http://www.DataFellows.com ���������������������������������������������������� Mia.Westerholm at DataFellows.com http://www.DataFellows.com Data Fellows Ltd. PL 24 FIN-02231 ESPOO, FINLAND Tel. +358 9 859 900 Fax. +358 9 8599 0599 From sorrin at syndata.com Tue Feb 3 09:48:49 1998 From: sorrin at syndata.com (steve) Date: Wed, 4 Feb 1998 01:48:49 +0800 Subject: BSAFE 4.0 to force GAK?! Message-ID: <34D75774.6036@syndata.com> FYI Jan. 26's Network World has an article on page 33 titled "RSA blasts (but also supports) Government encryption policy". The paragraph of note is the fourth paragraph which reads:"The next version of the RSA encryption toolkit, BSAFE 4.0, will force those building products with anthing over 56 bit strength encryption to use a key-recovery center for exportable products...." I haven't been able to confirm this with other sources yet but the glaring question is how will this be enforced and how will it affect domestic products that wish to use BSAFE 4.0 for their crypto. Further what ramifications does this hold for their S/Mail toolkit for S/MIME? and I haven't seen this discussed on the list yet. Steve O -- A picture tells a thousand words. Stego -----BEGIN GEEK CODE BLOCK----- Version: 3.1 GCS/IT/S d--() s+: a-- C++++(++)$ ULS+++@ P++@ L+(++)$ E- W+(+++)$ N++$ !o K-? w++(+++)$ !O+>++ !M !V PS+(+++)@ PE(++)@ Y++$ PGP@ t+@ 5++@ X++>$ R+++>$ tv+@ b+@ DI+++>$ D+++@>$ G@ e++@>++++ h r* y+ ------END GEEK CODE BLOCK------ From Bill at rumplestiltskin.com Tue Feb 3 09:50:23 1998 From: Bill at rumplestiltskin.com (Bill at rumplestiltskin.com) Date: Wed, 4 Feb 1998 01:50:23 +0800 Subject: A fatal flaw in PGP 6.0 Message-ID: <235883DCF38CD011963A0060972DBB4D20720A@mail.executive.com> This was posted anonymously to alt.security.pgp last night >Subject: PGP 6.0 alpha3 >Date: 3 Feb 1998 00:15:56 +0100 > >Anyone else having problems with the alpha of PGP 6.0? When I try to encrypt e-mail I get an error: > >FATAL ERROR > >Unable to find key "ghost at nsa.gov" >Please obtain a new key from Network associates. > > >Other than that it's pretty slick! I'm not sure I'd have the default cypher as ROT-13 though! I changed mine to RC-2 255-bit. > >Anyone else? Anyone like to confirm this? From mhw at wittsend.com Tue Feb 3 10:33:51 1998 From: mhw at wittsend.com (Michael H. Warfield) Date: Wed, 4 Feb 1998 02:33:51 +0800 Subject: UrsinePunks (Re: County Mounties Spit on the 4th Amendment) In-Reply-To: Message-ID: <199802031748.MAA24574@alcove.wittsend.com> Tim May enscribed thusly: > At 6:25 AM -0800 2/3/98, Michael H. Warfield wrote: > >"Supertroupers" refers to State Patrol. The term "Smokie" (coined from > >the movie Smokie and the Bandit) refers to all police. > Nope, not coined from the movie. > Just the reverse. > Highway cops were called "smokies" (or "smokeys") when I was growing up in > Virginia in the 60s, long before the movie. Point conceded. Quite correct. > I haven't checked the derivation, but had always assumed it came from the > Smokey the Bear figure, who wore a tall, broad-brimmed hat (also known as a > campaign hat). The hat worn by many state highway patrols. Ergo, "smokeys." Yeah, I think that's true as well, now that you remind me. > (I used to see the _real_ Smokey the Bear at the Washington Zoo. I think he > died of old age in the 1970s.) > (A URL with a few details is > http://www.4j.lane.edu/websites/roosevelt/Connections/smokey.html) > --Tim May, posting from the Bear State > "National borders aren't even speed bumps on the information superhighway." > ---------:---------:---------:---------:---------:---------:---------:---- > Timothy C. May | Crypto Anarchy: encryption, digital money, > ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero > W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, > Higher Power: 2^3,021,377 | black markets, collapse of governments. Mike -- Michael H. Warfield | (770) 985-6132 | mhw at WittsEnd.com (The Mad Wizard) | (770) 925-8248 | http://www.wittsend.com/mhw/ NIC whois: MHW9 | An optimist believes we live in the best of all PGP Key: 0xDF1DD471 | possible worlds. A pessimist is sure of it! From tcmay at got.net Tue Feb 3 11:08:59 1998 From: tcmay at got.net (Tim May) Date: Wed, 4 Feb 1998 03:08:59 +0800 Subject: The War on Some Debts In-Reply-To: <199802031640.KAA18766@wire.insync.net> Message-ID: At 8:40 AM -0800 2/3/98, Eric Cordian wrote: >In a further blatant erosion of Constitutional rights, the California >Supreme Court has ruled that a person owing child support who fails to >seek or accept work may be jailed and fined for contempt of court, and >that this does not violate any Constitutional bans on involuntary >servitude or imprisonment for debt. Oh, things like this have been common in California, and elsewhere, for a long time. It's a big part of the reason many guys I know don't fall into the marriage trap. Not only does the court demand that fathers (and, in 0.001% of cases, mothers) go back to work, they also calculate what the "expected compensation level" is of a person and assess them alimony and child support based on _that_ number. As one example, a friend of mine at Intel was working at home to set up his own business. His wife left him (cleaning out the checking account and having movers cart the furniture away while he was on a trip) and then sued for outlandish alimony and child support benefits. The court based the amount he owed on what he _had been_ earning as an engineer at the company, and what the court figured would have been his current earnings there, not on what he was actually earning doing his startup company. His "earning potential." (Wait til the IRS and Congress figure they can start taxing folks based on their peak earnings potential...) He had to fold his business startup and go back to work. And not just at a job he liked...he had to find one that paid enough to pay off the bitch, based on his peak earning potential. This is also known as "supporting her in the lifestyle to which she had become accustomed"...never mind that when they were married my friend made damned sure she didn't spend money the way she wanted to...in her case, she presumably saw the divorce as a way to get half of all the saved assets, plus an extremely lucrative alimony/child support deal. (Meanwhile, the bitch took her property settlement, blew it on an expensive new car, lots of new furniture, expensive vacations, and, of course, didn't do a lick of work...until the money ran out. And now that the alimony has run out, she's now reduced to working as a technician for a disk drive company. My friend worked his butt off, saved his money, invested wisely, and is now once again "retired." He doesn't plan to make the same mistake again. He's mostly hoping she doesn't hire some new lawyers and try to get another piece of his newly-accumulated assets!) >This reverses nearly a century of contrary rulings. Look for this >"improved" interpretation to be expanded to other kinds of debts and >judgments as well, as soon as massive public acceptance of it for the >carefully picked child support issue is engineered. And, by the way, this whole mess about child support, alimony, and such is a big reasons for citizen-unit tracking programs. Many levels of government, from local social services to national agencies, want to know where the father-units are so that money can be siphoned off to the mother-units and child-units. All of the talk about "privacy laws" is mooted by the desire by Big Brother to track and trace "deadbeat dads" and others who BB thinks need tracking (everyone). I'm generally in favor of fathers paying for their children, but not the way things are done now. Where the father may have no visitation or custody rights, where the mother is often free to just kick back and watch soap operas on t.v. while the father works his butt off to pay for both households, where "community property" is divided without regard for who put the money in in the first place, and so on. If women want to look at why fewer and fewer men are "prepared to make a commitment," their favored psychobabble term, they need only look at how the courts have declared marriage + divorce to be a golddigger's dream. Marry a guy, divorce him a few years later, which he can't even contest, and have half of all of his accumulated assets, plus a lucrative benefits package. Such a deal. And even being a queer doesn't save someone...I hear that in California the gays and lesbians are pushing for community property "rights" to be established. The whole system needs to be nuked. --Tim May "National borders aren't even speed bumps on the information superhighway." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From anon at anon.efga.org Tue Feb 3 11:38:22 1998 From: anon at anon.efga.org (Anonymous) Date: Wed, 4 Feb 1998 03:38:22 +0800 Subject: A fatal flaw in PGP 6.0 Message-ID: This was posted anonymously to alt.security.pgp last night >Subject: PGP 6.0 alpha3 >Date: 3 Feb 1998 00:15:56 +0100 > >Anyone else having problems with the alpha of PGP 6.0? When I try to encrypt e-mail I get an error: > >FATAL ERROR > >Unable to find key "ghost at nsa.gov" >Please obtain a new key from Network associates. > > >Other than that it's pretty slick! I'm not sure I'd have the default cypher as ROT-13 though! I changed mine to RC-2 255-bit. > >Anyone else? Anyone like to confirm this? From lutz at taranis.iks-jena.de Tue Feb 3 12:08:28 1998 From: lutz at taranis.iks-jena.de (Lutz Donnerhacke) Date: Wed, 4 Feb 1998 04:08:28 +0800 Subject: A fatal flaw in PGP 6.0 In-Reply-To: Message-ID: * Anonymous wrote: >>FATAL ERROR >> >>Unable to find key "ghost at nsa.gov" >>Please obtain a new key from Network associates. >Anyone like to confirm this? No the key requested is 'snoop at microsoft.com'. But the ROT13 encoding is true even for PGP5. If you move or rename the randseed.bin to an other location (i.E. to install pgp2.6.3(i)n and pgp5 simultanusly) the file will be modified, but all encrypted messages have the same session key. On the other hand pgp5 does not confirm the OpenPGP draft. A converter can be found at ftp://ftp.iks-jena.de/pub/mitarb/lutz/crypt/software/pgp/OpenPGP/ From tcmay at got.net Tue Feb 3 12:34:08 1998 From: tcmay at got.net (Tim May) Date: Wed, 4 Feb 1998 04:34:08 +0800 Subject: the best justice money can buy --Lessig suspended In-Reply-To: <19980203.154218.attila@hun.org> Message-ID: I very strongly disagree with Attila the Hun on his views about Microsoft. But I won't argue the case here. My comments below are just on some specific points. His general outlook I am completely at odds with. At 7:49 AM -0800 2/3/98, Attila T. Hun wrote: > at this point, I would say M$ has won the game. W98 will > be released with IE4 as the desktop, complete with push > channels and www.msn.com --at that point, Jackson --if On this we agree. Microsoft cannot lose at this point. NT 5.0 and Windows 98 are presumably coming, and will be on 97% of all desktops. The issue of Netscape's browser is mostly meaningless, anyway, from a revenue standpoint. Navigator is now free for all users. Unless Big Brother tells MS what it must sell its browser for--shades of the "Anti Dog-eat-Dog Law" in "Atlas Shrugged"--it is likely to remain this way. (The real issue is going to be Web servers. Whether Netscape can prosper in the world that is coming is unclear.) > so... we will have multiple choice of OS: M$ on Intel, > M$ on SGI, M$ on Alpha --and SUN goes down the tubes as I wouldn't be so sure about these choices, either! SGI is hedging their bet on the MIPS processor family by porting to Intel processors and NT. (I predict SGI will drop the MIPS line for workstations and desktops, leaving the MIPS chips for Nintendo 64 and other such controller-oriented uses.) And Compaq has announced plans to acquire DEC, so the future of the Alpha processor is even more in doubt than before. (News reports are that the deal Intel made with DEC may be killed by this Compaq deal...and even if both deals go through, Compaq is unlikely to deviate in a major way from the Intel processor line.) Even Sun has announced major plans to port Solaris to the Intel Merced line. (They've long had ports...I mean a _serious_ port. Probably meaning a move away from the SPARC line.) So, we've got: -- MS on Intel-based systems from all major PC makers -- MS on Intel-based systems from DEC -- MS on Intel-based systems from SGI -- MS on Intel-based systems from H-P -- Solaris and H-PUX (or whatever H-P's UNIX is called) on Intel Merced And so on. (I've left out the PowerPC, as it appears now to be limited solely to the Macintosh market...even IBM and Motorola appear to have acknowledged its failure.) Looks to me like Intel is the real winner here. (And even Intel's competitors in the "Intel compatible" market are struggling, unable to make the chips. I've written about this several times. Just yesterday National Semiconductor admitted that its Cyrix chip unit was losing sales, falling further behind, having huge losses, and not producing needed new chips. Meanwhile, PC makers who foolishly committed designs to the AMD design are unable to deliver....CyberMax committed to the K6 line and is now unable to ship its only product, as the limited number of chips AMD can make are trickled out to other companies.) As for Attila's calls to break up MS...could make Bill Gates immensely wealthier, as he'd then have a piece of the 5 most successful software companies! (I assume Attila is not arguing for simply seizing his property and giving it to others, or running it as a government company, or just padlocking the doors....) --Tim May "National borders aren't even speed bumps on the information superhighway." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From nobody at REPLAY.COM Tue Feb 3 12:35:08 1998 From: nobody at REPLAY.COM (Anonymous) Date: Wed, 4 Feb 1998 04:35:08 +0800 Subject: A fatal flaw in PGP 6.0 Message-ID: <199802032021.VAA18446@basement.replay.com> This was posted anonymously to alt.security.pgp last night >Subject: PGP 6.0 alpha3 >Date: 3 Feb 1998 00:15:56 +0100 > >Anyone else having problems with the alpha of PGP 6.0? When I try to encrypt e-mail I get an error: > >FATAL ERROR > >Unable to find key "ghost at nsa.gov" >Please obtain a new key from Network associates. > > >Other than that it's pretty slick! I'm not sure I'd have the default cypher as ROT-13 though! I changed mine to RC-2 255-bit. > >Anyone else? Anyone like to confirm this? From schear at lvdi.net Tue Feb 3 12:40:33 1998 From: schear at lvdi.net (Steve Schear) Date: Wed, 4 Feb 1998 04:40:33 +0800 Subject: New RAND IW Study Message-ID: A non-text attachment was scrubbed... Name: not available Type: text/enriched Size: 964 bytes Desc: not available URL: From eureka at eureka.abc-web.com Wed Feb 4 04:59:38 1998 From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com) Date: Wed, 4 Feb 1998 04:59:38 -0800 (PST) Subject: Eureka! Wed Feb 4 '98 Message-ID: <19980204083315.11433.qmail@eureka.abc-web.com> Welcome to Wednesday's issue of Eureka! PUSSY PARADISE Yet again Eureka! has managed to negotiate a special week's free access to one of the web' s premier porn sites. Pussy Paradise is simply packed with 100s of videos (many live), thousands of photos, and so much more. You will need your credit card as adult verification but it will not be charged for your free week! So check it out - there's smut a plenty! Pussy Paradise .... http://www.pussyparadise.com/eureka.html Playgal - No.1 in Internet Hardcore! http://www.playgal.com/playgal/banner_eureka.html Playgal presents FREE LIVE FUCKING, and over 2,000 FREE XXX MOVIES! THE REAL NETWORK Every now and then we come across a real winner. This is one of those places. Click on the Real Amateur Wives, Lovers & Girlfriends. Then click enter, then find Sarah. Ahh Sarah, she starts out slow but later you'll see what I mean. This is one must see amateur! A sexy young brunette with just the right amount of baby fat. Raw and real. Surf it now! The Real Network ................. http://www.ilynx.com/raw/ ANAL BABES Make a stop on the information super highway if you want to see some hot amateur action. Quick loading thumbnail pix, there for all to see. Check out the strange object pictures for one sexy blonde who love to show off her pink, and I'm not talking about her blouse either. You'd hate to miss it! Anal Babes ........................ http://www.analbabes.com LA LA LEGS Well, it's a leg thing, and a pantyhose thing, a babe thing a pussy, pussy, pussy thing! See their two galleries for the free pix. Dig the sexy school girl in the plaid skirt! Yum! La La Legs ......................... http://www.lalalegs.com NC17 Go to the site then to the enter here link at the bottom, then click on the index 2 photo gallery. Your in! Click on page one for one hot tasty blonde bombshell! The photos say lick me all over! Great tits, legs and ass! See the bush on the black haired beauty, page 4. It'll straighten your dick! NC17 .......................... http://www.nc17.com/nc2.html READ THIS!! WIN ,000 and a Fantasy Date - Click Here Now! ,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A HOORAY! THE ADULT SEARCH ENGINE Now you can search for the sex sites you are looking for and fast! This new search engine is setting the standard others will follow. It offers pop-up search and detailed listings! Hooray! -----------------> http://eureka.abc-web.com/hooray/ FREE STREAMING VIDEO Please note that most of these feeds require a Netscape bro- wser in order to successfully view them. Unfortunately Micr- osoft's browser does not have all the features of Netscape's yet. However, many of the feeds use the RealPlayer and will work in most browsers. If you do not have Netscape and want a free copy click here --> http://www.netscape.com/download/ Teenage lesbian -> http://207.240.169.120/lesbian/start.html CHAT WITH OTHER READERS Hey, if you haven't checked out the Eureka! Chat sites yet, you're missing out on some great stuff. Every day you'll find hundreds of other readers just like you looking to chat have fun and maybe a little 'cyber'. We know you'll love it! Adult/Sex Chat -----------------> http://137.39.63.229/chat/ General/Fun Chat -------> http://137.39.63.229/chat/funchat/ HOT LIVE PHONE SEX TO MAKE YOU CUM! LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912 LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779 FREE: Live 1-on-1 (international call only)--->011-678-77416 NEW! CENTERFOLD PIC OF THE DAY Exclusive! We proudly present unpublished Pictures of your favorite Centerfolds. Featured This Week: Dec 80-PMOY Terri Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri Kendall, Rebecca Ferratti, Lydia Schone and many more too! ---------------------------> http://www.gatefold.com/eureka/ AMATEUR SITE OF THE DAY Shannon: An up and coming magazine model, this young thing has the dimensions of a Greek goddess - 36. 24. 32. This 22 year old whose turn-ons include candles and posing nude also loves to go 4x4ing, camping and rollerblading. Visit her to find out how much fun 4x4ing can be! ---------------------------> http://amateurindex.com/eureka/ EROTIC STORY SITE OF THE DAY Adult Story of the Day: Read something for a change! Every day the Adult Story of the Day offers you a free erotic sex story for your reading pleasure............................. ............................... http://www.adultstories.com/ DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/ ADULT STAR PIC OF THE DAY Woah, our Adult Star pics are getting hotter and hotter, so make sure you stop by and check out today's - definitely not to be missed! --------> http://www.xxxadultstars.com/eureka/ OTHER EUREKAS! GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/ DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm ESPA�OL ------> http://eureka.abc-web.com/eureka/espanol.htm FRAN�AIS ----> http://eureka.abc-web.com/eureka/francais.htm ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm TODAY'S FREE PIX Pic 1 --------------------------> http://137.39.63.229/?040 Pic 2 --------------------------> http://137.39.63.229/?041 Pic 3 --------------------------> http://137.39.63.229/?042 Pic 4 --------------------------> http://137.39.63.229/?043 Pic 5 --------------------------> http://137.39.63.229/?044 Pic 6 --------------------------> http://137.39.63.229/?045 Pic 7 --------------------------> http://137.39.63.229/?046 Pic 8 --------------------------> http://137.39.63.229/?047 Pic 9 --------------------------> http://137.39.63.229/?048 Pic 10 --------------------------> http://137.39.63.229/?049 ============================================================ TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US. ============================================================ From dlv at bwalk.dm.com Tue Feb 3 14:02:41 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Wed, 4 Feb 1998 06:02:41 +0800 Subject: The War on Some Debts In-Reply-To: <199802031640.KAA18766@wire.insync.net> Message-ID: Eric Cordian writes: > > In a further blatant erosion of Constitutional rights, the California > Supreme Court has ruled that a person owing child support who fails to > seek or accept work may be jailed and fined for contempt of court, and > that this does not violate any Constitutional bans on involuntary > servitude or imprisonment for debt. > > This reverses nearly a century of contrary rulings. Look for this > "improved" interpretation to be expanded to other kinds of debts and > judgments as well, as soon as massive public acceptance of it for the > carefully picked child support issue is engineered. > > The credit card companies are no doubt carefully analyzing this decision > as we speak. Ah yes; once it's established that a parent owing alimony can be forced to work "to protect the children", expect similar treatments for taxes and credit card debt and judgments. The credit card issues are also lobbying very hard to exempt credit card debts from bankrucpy. For most of humanity's history, interest rates on loans to individuals were around 100-200% per annum; default rate was proportionate; bad debtors were jailed or enslaved; children inherited debt; etc. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From anon at anon.efga.org Tue Feb 3 15:07:56 1998 From: anon at anon.efga.org (Anonymous) Date: Wed, 4 Feb 1998 07:07:56 +0800 Subject: Microsoft Message-ID: <485f03d3211e0c7c6edc431cbfc8dc87@anon.efga.org> > so... we will have multiple choice of OS: M$ on Intel, > M$ on SGI, M$ on Alpha --and SUN goes down the tubes as > they will never capitulate. M$ will bury IBM with their > NT alliance with Ahmdal who clones all the IBM iron > --which is fading against the clustered servers. IBM > long since gave in on OS/2 versus M$ --it may figure in > their corporate strategy, but unless they are willing to > update past Netscape 2.02 they will lose that as well > --in fact you can no longer any of the IBM PCs with OS/2 > preloaded --except by special order: in quantity. I really am not so worried about Microsoft's software strategy as I am about their communication infrastructure strategy. Every time I go to a computer show or swap meet, I see stacks of Linux CDs selling like hot cakes. Most anyone with a clue who doesn't like Billy's crapware knows precisely where to find something better. What concerns me more is the partnerships that Billy & Co. are making with internet providers, especially cable & DSL. Many of the cable modem service providers have notoriously bad reputations for using packet filters to block stuff they don't like. These days, any internet provider who tries that shit usually finds its customers going elsewhere, but when there's only one or two cable providers and Mickeysoft owns them all, then what? The solution, of course, is encrypted IP, something which has been moving far too slowly. Frankly I'm pretty disappointed with the apparent unwillingness of several IETF members to address the obvious MITM attacks, such as CBC cut-and-paste. It is going to royally suck when we have to redo it because the protocol didn't work the first time. From tulii at ak.planet.gen.nz Wed Feb 4 08:03:01 1998 From: tulii at ak.planet.gen.nz (tulii at ak.planet.gen.nz) Date: Wed, 4 Feb 1998 08:03:01 -0800 (PST) Subject: BULK EMAIL FOR PROFIT Message-ID: <19980203997SAA14722@post.com.au> ****************************************************** MAIL THOUSANDS OF EMAIL MESSAGES PER HOUR - NO KIDDING !! SEND YOUR EMAIL MESSAGES OUT, AT 1,000's MESSAGES / HOUR (28.8K modem) YES, 1,000's Of Messages An Hour ****************************************************** 30 MILLION EMAIL ADDRESSES ******** $100.00 ******* ****************************************************** YOU'LL RECEIVE 2 HIGH-SPEED EMAIL SOFTWARE PROGRAMS Introducing...."FLOODGATE BULK EMAIL LOADER" AND...."GOLDRUSH STEALTH MASS MAILER" This is the same software that all bulk emailing services use! ---------------------------------------------------- Floodgate Bulk Email Loader Version 6.0 AND Goldrush Stealth Mass Mailer Version 3.215 for Windows 95 and Windows 3.1 now Supports 17 (really more with the free form filter) File Formats ---------------------------------------------------- SEND OUT 20,000+ MARKETING LETTERS EVERY SINGLE DAY! Or...every few days. In fact, when I send out just a few thousand marketing letters each day, it doesn't take long before I'm completely swamped with email inquiries and phone calls. This is very easy to do. And each one of these bulk mailings costs me nothing. I can teach you how to do this and provide you with the tools you'll need. If you've got a good marketing letter, I'll show you how to open the floodgates. You'll be deluged with inquiries, leads, and real sales, using nothing but email alone. Writing a good marketing letter is not easy. I often have to rewrite my marketing letters a half dozen times before I get the results I'm looking for. But once you have a good letter, as you probably know, you can use the same letter over and over again, predictably and consistently, closing sales, week after week, month after month. It takes me about one hour to send my marketing letter to THOUSANDS of fresh email addresses. I can do this, thanks to a Windows program I use. It's called Floodgate and Goldrush Stealth Mass Mailer. It's a bulk email loader and an email software program. If you're interested in electronic marketing, you should know about these programs. PROGRAM #1: FLOODGATE FOR WINDOWS The Floodgate Bulk Email Loader imports simple text files that anyone can download from CompuServe, Prodigy, Delphi Genie, or the Internet. These text files contain classified ads, forum messages, or data from the member directory. Each of these files is filled with email addresses. Floodgate is designed to read these files and strip out the email addresses. It then sorts the addresses, removes any duplicates, and formats them into an output file, with 10, 20 or 30 addresses per line. This is all done in one simple step. Just point and click. You'll need either a Windows based Internet account or an America On-line account to send out your marketing letters. Neither AOL nor the Internet charges to send email. Send your letter to 1,000 people or 10,000 people -- the cost is always the same. NOTHING! NEW! PREPARE A MAILING OF 50,000+ IN LESS THAN A 1/2 HOUR If you open an Internet account, you can send each letter to 20,000+ people. The new Floodgate now directly writes distribution lists. Some people are always collecting new addresses, but if you publish a newsletter or adsheet, you'll be using the same addresses over and over again. That's real power! When using addresses you've previously collected, you can press a few buttons and prepare a mailing of 50,000+ in less than a half hour. (To get a list of all the Internet access providers in your local calling area goto: http://thelist.com and click on your area code.) The Floodgate Users Guide will teach you, step by step, how to download the right files, how to strip the addresses, and finally, how to cut and paste the formatted addresses into your marketing letter. Or, if you have an Internet account, how to create distribution lists. One you've done this a few times you won't even have to think. It's that simple! FOR THE BRAVE & DARING: PUSHING TECHNOLOGY TO ITS LIMITS As you may know, the practice of sending unsolicited email is usually frowned upon, and most service providers have rules against it. But, like jay-walking, there is little enforcement. It's not illegal. If someone tells you that it is, ask them to provide the citation (and don't let them give you some nonsense about faxes - that's not email). They can't do it because it's not there. Sometimes, when a lot of people complain, I get a warning letter. And that's about it. About 1 in 200 will write back and tell me, "take me off the list", which I can do, thanks to Floodgates Remove List feature. Many people reply back thanking me for sending them my informative letter. That's always nice. Most people though, just reply and say, "send me more info." In this way, it usually takes me two or three letters to close a sale. The Floodgate Users Guide will provide you with proven formats for writing a successful marketing letter. You'll test and rewrite, test and rewrite. Then, once you've got it, just push a few buttons, and open the floodgates!!! THE FLOODGATE BULK EMAIL LOADER CURRENTLY SUPPORTS 17+ FILE FORMATS 1. CompuServe Classifieds: Send your marketing letter to everyone who is running a classified ad. I'll teach you how to download all the classifieds from any single ad category. This is one of the most responsive list of buyers. They check their email every day and they're already in business. 2. America On-line Classifieds: Download 1,000 addresses in 15 minutes. These are excellent lists for business to business sales. 3. CompuServe Forums: You can join a forum and download hundreds of forum messages in a matter of minutes. 4. America On-line Forums: Choose from dozens of forums. All good targeted lists. 5. Prodigy Forums: Prodigy allows you to easily export any group of forum messages. More targeted lists. 6. Internet Newsgroups: These are all targeted lists. You'll be able to send your marketing letter to everyone who posts a message in any newsgroup. Easily collect 1,000's of addresses per hour. 7. America On-line Member Directory: Most member directories only allow you to search by city and state. With AOL, you can search by business type, hobbies, computer type, etc. This is the gem of all member directories. Build huge targeted lists. 8. CompuServe Member Directory: This is a major resource. If you're willing to target your mailing to a single city, you can collect about 1,000 email addresses an hour. 9. Delphi Member Directory: The Delphi member directory allows you to search for people based on key words. These are good targeted mailing lists. A single search can easily generate 5,000 addresses. 10. Genie Member Directory: Similar to the CompuServe member directory, only you can download names much quicker. You can easily pull hundreds of thousands of addresses out of each of these member directories. 11. CompuServe File Cabinet: If you run classified ads, and save the responses in the CIM file cabinet, you'll be able to easily reuse these addresses. You can send your marketing letter to everyone in any single folder. Build master lists and clean UP your hard drive. 12. Free Form: If you have a text file with email addresses that floodgate does not support, chances are the Free Form filter will be just what you need. Just enter a key word to search for. 13. CompuServe Form Profiles (Forum Membership Directories): Easy to build targeted lists here. Each search can easily bring you 500+ addresses. 14. Genie Profiles: If you're building targeted lists, you'll get a lot of addresses very quickly from Genie. 15. Plain Addresses: Read Floodgate Master Files back into Floodgate to merge files and do selective mailings. Also useful for the management of email address lists that you might purchase. Floodgate also has filters to allow you to include or exclude any groups of addresses in your final distribution lists. For example, you could include only email addresses that ended in .com or exclude all with .gov. You could exclude all noc, root, and other addresses that almost guarantee a negative response. These filters are fully configurable and can be used together. BUILD REUSABLE MASTER FILES Floodgate maintains Master Files for each of your marketing letters. If you download from the same place on a regular basis, you only want to send your letter to the new people. Floodgate will compare the new addresses with those in the Master File, and prepare a mailing list of only new people. The new addresses are, of course, then added to the Master File. With each new mailing your Master File grows and grows. You may create as many Master Lists as you need. When you start a new marketing campaign, you'll want to send your new letter to everyone on your Master List. If you write a newsletter, each time you send your newsletter, you'll send it to everyone on a Master List. THE REMOVE LIST Very often, people will reply and tell you to take them off your mailing list. Place these addresses in the REMOVE.MST file and they will never receive another letter from you again. In this way, you will be operating your business with the most professionalism possible. DON'T BE FOOLED We have some new competitors that have tried to copy Floodgate. The following list describes why Floodgate is BETTER....... **Floodgate is a mature, bug free product. Not an initial release. **Floodgate comes with over 100 pages of step by step documentation. **Floodgate is the only one offering a money back guarantee. **Floodgate has more testimonials. **Filter for filter, Floodgate offers more capabilities, way more. **Floodgate does everything all the others *combined* claim. **Floodgate is by far the easiest to use. **There is NO *cutting and pasting* with Floodgate. **We have by far, the BEST technical support. SOME QUICK MATH Floodgate can pay for itself in a few days. It can also cut your advertising costs down to almost nothing. Think of what the competition will do when they get their Floodgate program. Don't be left in the dust - there are 75 million people out there, just a few keystrokes away. Let's do the math: - Email 50,000 sales letters (takes about 1-2 hours) - Let's say your product will bring you $5 profit per sale. - Let's also say you only get a 1% response(occasionally higher). * That's 500 orders x $5 = $2,500 profit !! Now imagine what 500,000 letters would do for your business !! WHAT CAN I MARKET ON-LINE? You can market anything on-line using direct email, that can be marketed using conventional postal direct mail marketing. The possibilities are practically endless. If it sells off-line, you can sell it on-line. EASY TO INSTALL AND EASY TO LEARN The Floodgate Email Loader requires Windows. The SUPPLIED MANUAL tells you where to go, what to do, and how to do it. All you need are basic computer skills that can be learned with a little practice or help from our computer savvy technicians. PROGRAM #2: GOLDRUSH STEALTH MASS MAILER Do not get this program confused with other slow speed programs that call themselves "STEALTH". This program is the only one in the world that can send email out at HIGH SPEEDS with one single connection to the internet. This is NEW, Cutting Edge Email Technology. First Of It's Kind.. The Most Powerful BULK EMAIL SENDER In The World.. NOTHING CAN EVEN COME CLOSE! Thanks to our top programmer's, this technology is NOW available and we are the only place you can get it from! *ONLY "ONE" DIAL-UP OR ISDN CONNECTION NEEDED. *NO MORE TERMINATED CONNECTIONS. *NO MORE WAITING TO SEND LARGE AMOUNTS OF EMAIL. *IMMEDIATE RESPONSE TO YOUR MASS MAILINGS. *YOU WILL HAVE ALL THE CONTROL AND CONFIDENCE OF SENDING EMAIL THE WAY IT SHOULD BE SENT... IN HUGE AMOUNTS! *SEND YOUR WHOLE LIST IN ONE DAY, WHETHER IT BE 500,000 OR 5 MILLION - AND JUST SIT BACK AND WAIT FOR YOUR ORDERS TO POUR IN. *NO MORE DOWNLOADING UNDELIVERABLE NAMES. Bulk Emailer's Dream Come True!!! - >>>GOLDRUSH STEALTH MASS MAILER<<< Connect to multiple mail servers (20 or more), make multiple connections to a single server or any combination of the two ( All Simultaneously ) with one single dial-up connection. SEND MULTIPLE SIMULTANEOUS MAILINGS... View complete details about your mailings. Shows each server your connected to, the status of that connection, how many messages are going out through that connection, etc... We show you ALL the tricks all the mass e-mailers don't want you to know... Here are just a few features the GOLDRUSH STEALTH MASS MAILER offers to you... *Forge the Header - Message ID - ISP's will Spin their wheels. *Add's a Bogus Authenticated Sender to the Header. *Add's a complete bogus Received From / Received By line with real time / date stamp and recipient to the Header. *Does NOT require a valid POP Account be entered in order to send your mailings. *Easy to use and operate *Plus much more! All this, at speeds of up to 1,000's messages/hour (28.8k modem). SPECIAL INTRODUCTORY PRICE... NOW YOU CAN HAVE BOTH THE FLOODGATE AND GOLDRUSH STEALTH MASS MAILER FOR JUST $499.00! UPDATE ... SAVE $149.05 AND ORDER NOW, BE ONE OF THE FIRST 100 ORDERS! Step up to the plate and play with the big boys TODAY and receive the COMPLETE 2 SOFTWARE PACKAGE for the unbelievably low price of ONLY $349.95! (Other bulk email software has sold for as much as $2,500 and can't even come close to the cutting edge technology of EASE, ACCURACY AND SPEED ... SPEED ... SPEED!) Try the Goldrush Stealth Mass Mailer & Floodgate Bulk Email Loader for 10 days FREE. And receive UNLIMITED technical support for 30 days. ************************************************************** 30 MILLION EMAIL ADDRESSES MILLIONS AND MILLIONS OF EMAIL ADDRESSES CD with MILLIONS of email addresses separated by domain name. All addresses are simple text format one per line. Addresses from the following domains: Pipleline, MSN, MCI, Juno, Delphi, Genie, AOL, Compuserve, Internet, .com & .net, MILLIONS OF THEM! Not available on diskette or download. ===> WANT THE MILLIONS OF ADDRESSES FOR $100.00? <=== Just buy our Floodgate / Goldrush software package (with ALL the bonuses INCLUDED), and the MILLIONS of addresses are yours for just $100.00 additional. These addresses will be delivered to you in simple text files that any bulk emailing program can use, on CD Rom. With this CD, YOU CAN BEGIN MAKING MONEY IMMEDIATELY!!! *************************************************************** ***SPECIAL BONUS #1:*** STOP Losing ISP Dial Up Accounts! If you order The FLOODGATE / GOLDRUSH software within the next 5 days - When you receive your program, you will also receive: *Complete instructions on "how to keep your dial up account from showing up in the header", plus everything you will need to get started doing this. IMPORTANT NOTICE! We will initially only be offering 100 copies of the program for sale, First come / First Served basis only. We are doing this because of the extreme power that these programs offer. ***SPECIAL BONUS #2*** When you receive your two programs, you will also receive: OVER 250 REPRINT AND RESELL RIGHTS REPORTS YOU CAN START TO MARKET AND MAKE MONEY IMMEDIATELY!!! These HOT sellers include: 1) How to Get a Top Rating in the Search Engines 2) 70 Money Making Reports 3) 75 MONEY MAKING PLANS & TRADE SECRETS and MUCH MUCH MORE!!! ($200 RETAIL VALUE - FREE!!!) ***SPECIAL BONUS #3*** With your two software programs, you will also receive our NEW "Address Grabber" utility program that enables you to grab 100's of THOUSANDS of email addresses from newsgroups in minutes ($100 RETAIL VALUE - FREE). ***SPECIAL BONUS #4*** RECEIVE CHECKS BY EMAIL, PHONE OR FAX MACHINE. With this software program, you can receive payment for your product or service INSTANTLY!! There is no more waiting for your customers check to arrive. This software will no doubt, add to your sales, for customers who don't have credit cards, as well as the impulse buyers. With this software, you can print up your payments as soon as your customer gives you his/her checking information. You will then add the information given, to the proper blank check spaces, then just print and go to the bank!! *************************************************** To get your FREE demo and "test drive" our state-of-the-art software, fax us your email address and request to: 1-561-966-6839 **************************************************** HURRY ... RESERVE YOURS TODAY! So, if you are interested in taking advantage of the most powerful bulk email software in the world and start making money hand over fist..... Print out the EZ ORDER form below and FAX or MAIL it to our office. If you have any questions don't hesitate to call us at: 1-561-965-6139 SYSTEM REQUIREMENTS 386 or larger Windows 95 OR Windows 3.1 with 8 meg ram Extra 5 MB hard drive space Floodgate & Goldrush can be run on a fast Mac with 24 MB RAM and SoftWindows. NOTES FROM SATISFIED USERS "It is everything you said it was. Within one week of my first mailing, I received a record number of orders. All you need to print money is a decent sales letter. Thanks." Randy albertson, Wolverine Capital. "After using Floodgate and your utility program all day today, let me say these are as two of the finest programs I have ever bought in my 52 years! Your support has been superb. Thank You!" Vernon Hale, Prime Data Systems "My first day and I just used Floodgate and Pegasus to send 1,469 sales letters. So far I've got about 25 positive responses. It works GREAT!!! Thanks." Donald Prior "Floodgate is awesome!. I recently started a new business on-line. I stripped the addresses of the AOL & CIS classifieds. I sent out 3,497 email letters and got over 400 people to join my company in 5 days! Needless to say, it pays for itself." David Sheeham, OMPD "I was able to use Floodgate to extract the names from the Internet news groups. It works perfectly. Needless to say, I am very excited about the use of this new technology." Mark Eberra, Inside Connections "This is a great piece of software and an invaluable marketing tool." Joe Kuhn, The Millennium Group "I just thought you'd like to know that this program is fantastic. After loading it on my system, I wanted to test it out. In my first hour of using this, I collected 6,092 email addresses!" Richard Kahn, LD Communications "I just love the Floodgate program. It saves me hours and hours of time. This is the beginning of a wonderful FUN time marketing on-line. Thank you so much for writing this program." Beth O'Neill, Eudora, KS "Your software is brilliant, and from the technical support I've received, I can see you have a genuine love and respect of people...Floodgate is a divine package. Wish I had found it sooner." Tom Sanders, Peoria, IL "I really like the way the Floodgate software package works. It is very easy to use, and really does the trick. It has already saved me an incredible amount of time and energy." John Berning, Jr., Fairfield, NJ "It's going great with FLOODGATE! I like using Delphi. I just collected 50,000+ addresses within 20 minutes on-line." Richard Kahn, R&B Associates ------------------------------------------------- E-Z ORDER FORM: Please print out this order form and fill in the blanks...... Please send order form and check or money order, payable to: Ted Keller P.O. Box 741342 Boynton Beach, FL 33474-1342 (561)-965-6139 ______Yes! I would like to try your cutting-edge software so that I can advertise my business to thousands of people on-line whenever I like! I understand that I have 10 days to trial the software. If I am not fully delighted, I will cheerfully be refunded the purchase price, no questions asked! Please rush me the FLOODGATE and GOLDRUSH package now! ______I am ordering within 72 hours! That qualifies me to receive the FLOODGATE and GOLDRUSH package at a substantial discount! I am ordering BOTH software packages for only $349.95. (Save $150 off the retail price....Software has sold for as much as $2,499.95) ______I am ordering within 72 hours! That qualifies me to receive UNLIMITED technical support for 30 days. ______I want to receive the package OVERNIGHT. I'm including $18.00 for shipping charges. ______I want to receive the package 2nd DAY. I'm including $10.00 (includes insurance & return receipt) for shipping charges. ______I'm ordering Floodgate / Goldrush software and want to order the MILLIONS of email addresses as well. My additional cost is $100.00 enclosed. ______I'm NOT ordering your Floodgate / Goldrush software, but I want to order your MILLIONS of email addresses on CD. Enclosed is $249.00. (CHECKS: ALLOW 1 WEEK FOR BANK CLEARANCE) YOUR NAME_________________________________________________ COMPANY NAME_________________________________________________ YOUR POSITION_____________________________________________ STREET ADDRESS______________________________________________ CITY, STATE, ZIP____________________________________________ PHONE NUMBERS_______________________________________________ FAX NUMBERS_________________________________________________ EMAIL ADDRESSES_____________________________________________ ************************************************************ We accept Checks, Money Orders, MasterCard, Visa, American Express. You can either mail your order to us OR fax your order to: (561)-966-6839 ************************************************************ Today's date:_____________ Visa____MasterCard____American Express____Discover_______ Card #:____________________________________________________ Expiration date:___________________________________________ Name on card:______________________________________________ Billing address:___________________________________________ Amount to be charged: $________________ Signature:___________________________________________ I agree to pay Ted Keller an additional $29 fee if my check is returned for insufficient or uncollectable funds. SIGNATURE: X________________________________DATE:_______________ Please send all order forms and check or money order to payable to: Ted Keller P.O. Box 741342 Boynton Beach , FL 33474-1342 (561)-965-6139 *************************************************** OR: PLEASE PASTE YOUR CHECK HERE (If you fax a check, there is no need for you to send the original check by mail. We will draft up a new check, with the exact information from your original check that you faxed to us) Please fax the above order form and check to: 1-561-966-6839 C From MAILER-DAEMON at toad.com Wed Feb 4 08:41:00 1998 From: MAILER-DAEMON at toad.com (MAILER-DAEMON at toad.com) Date: Wed, 4 Feb 1998 08:41:00 -0800 (PST) Subject: FDA Registered and FDA Certified Message-ID: <199802011821.MAA25009@mail.t-1net.com> Exclusive New Oral Transmucosal Weight Control Disc & Transdermal Patch, both FDA Certified & Registered with National Drug Code #'s. Developed by 10 year old Pharmaceutical Company. For detailed information reply to: alt at sierranv.net From billp at nmol.com Tue Feb 3 18:52:45 1998 From: billp at nmol.com (bill payne) Date: Wed, 4 Feb 1998 10:52:45 +0800 Subject: Jim Omura Message-ID: <34D7D1DC.4EC6@nmol.com> Tuesday 2/3/98 7:22 PM Jim Let's get this settled. I have not read cylinked.htm Latest: Cylinked to Organized Crime? January 29, 1998 YET. Hope you liked the SAND report, now posted at jya.com, I sent you in 1992. I listened carefully at the breakfast you, I, Lou {lew?} Morris had. Later bill Title: Cryptome Cryptome � JYA/Urban Deadline OpEd _______________________________________________________________________________________ File Topic Date _______________________________________________________________________________________ In Athena's Camp Preparing for Conflict in the Info Age (offsite) February 3, 1998 cylink-sins.htm Cylink Secures SINS February 3, 1998 pg-get-MSkey.htm Update: How to Recover Private Keys for MS Wares February 3, 1998 bxa020398.txt Exports of High Performance Computers February 3, 1998 sib.htm Scientists in Black February 3, 1998 CAP The Cryptographic Analysis Program (offsite) February 2, 1998 Arne Beurling The Geheimschreiber Secret (offsite) February 2, 1998 Army Stegano US Army Steganography (offsite) February 2, 1998 Colossus Rebuilding Colossus (offsite) February 2, 1998 Frode Crypto Cryptology Papers (offsite) February 2, 1998 jimbell9.htm Jim Bell Update February 2, 1998 echelon-boost NSA Surveillance System Boosted (offsite) February 2, 1998 cn020298.txt Crypto News February 2, 1998 bxa020298.txt BXA Meet on Export Rules and Procedures February 2, 1998 cs020298.txt Rules to Challenge Customs Seizures (63K) February 2, 1998 usg020298.txt USG Secret Meets February 2, 1998 echelon.htm NSA Global Surveillance System February 2, 1998 cathedral.htm The Cathedral and the Bazaar February 1, 1998 natsec-rule.htm Protection of National Security Information February 1, 1998 47cfr216.txt National Communications Issuance System (106K) February 1, 1998 47cfr213.txt Emergency Telecomms Precedence System (17K) February 1, 1998 47cfr202.txt National Security Emergency Plans & Ops (27K) February 1, 1998 47cfr201.txt Policy for Telecomms During Emergencies (12K) February 1, 1998 44cfr336.txt Facilities for National Security Emergency (14K) February 1, 1998 44cfr334.txt FEMA Graduated Mobilization Response (14K) February 1, 1998 32cfr322.txt Privacy Act Exemption for NSA Records (40K) February 1, 1998 32cfr299.txt National Security Agency FOIA Program (8K) February 1, 1998 32cfr2101.txt National Security Council FOIA Requests (24K) February 1, 1998 32cfr185.txt Military Support to Civil Authorities (52K) February 1, 1998 31cfr9.txt Effects of�Imported Articles on National Security February 1, 1998 22cfr124.txt Contracts, Off-Shore Buys, Defense Services (42K) February 1, 1998 22cfr123.txt Licenses for the Export of Defense Articles (51K) February 1, 1998 22cfr121.txt United States Munitions List (92K) February 1, 1998 _______________________________________________________________________________________ ntia-dnsdrft.htm Draft Proposal for New Domain Name System January 30, 1998 korczak.txt Boris Korczak: CIA Agent Seeks Payment January 30, 1998 pm87.txt Prez on Terrorist Threat to Middle East Peace January 30, 1998 leahy-wipo.txt Senator Leahy on Ratifying WIPO Treaties January 30, 1998 32cfr147.txt DoD: Policies for Access to Classified Info January 30, 1998 32cfr148.txt DoD: Facilities for Storing Classified Info January 30, 1998 32cfr149.txt DoD: National Policy on Technical Surveillance January 30, 1998 ntia012798.htm RFC: Self-Regulation for Privacy Protection January 30, 1998 cylinked.htm Latest: Cylinked to Organized Crime? January 29, 1998 websoft-warn.htm Web Software Warning January 29, 1998 scant-peril.htm U.S. Spy Agencies Pauline Peril January 29, 1998 mossburg.htm E-Comm Forum on E-Authentication and DigSig January 29, 1998 pollard.htm Bankers O Table on E-Authentication and DigSig January 29, 1998 brown.htm Secret Service on Financial Instruments Fraud Janaury 29, 1998 rpk-hack.htm Invite to Hack RPK InvisiMail January 29, 1998 nrc012998.txt Generic Letter on Y2K Readiness for Nuke Plants January 29, 1998 fc012998.txt FinCEN RFC on Information Collection January 29, 1998 dtc012998.txt Arms Export to Saudi Arabia January 29, 1998 nsa-etc-nf.htm NSA, Echelon, Trade & Crypto/Netscape & Fortify January 28, 1998 dod012898.txt DoD Blacklist of Higher Education January 28, 1998 47usc1002.txt Interception of Digital and Other Communications January 28, 1998 cn012898.txt Crypto News January 28, 1998 cn012798.txt Crypto News January 27, 1998 bxa-fy98.txt BXA Funding FY 1998 January 27, 1998 cia-tsang.htm CIA Concedes Spying on Americans January 26, 1998 atpc.htm EU-Parliament: Technologies of Political Control January 26, 1998 us-crypto.htm US Crypto Policy January 25, 1998 pg-nzcrypto.htm New Zealand Crypto Policy January 24, 1998 ra-ukcrypto.htm UK Crypto Policy January 24, 1998 whp012398.htm Payne/Morales vs. NSA: Reply to Defendant January 23, 1998 kellner.htm Intellectuals and New Technologies (66K) January 23, 1998 bxa012398.txt BXA Penalizes Export Violator January 23, 1998 osd012398.txt Compensation of North Viet-Imprisoned Operatives January 23, 1998 dod012398.txt Defense Dept Secret Meets January 23, 1998 walton-pk.htm GCHQ: The Pre-History of Public Key Cryptography January 22, 1998 primer The Proliferation Primer (offsite) January 22, 1998 sh105-238.txt Proliferation and US Export Controls (196K) January 22, 1998 sh105-267.txt Safety and Reliability of US Nukes (347K) January 22, 1998 acda012298.txt Arms Control Secret Meet January 22, 1998 pd012298.txt Prez Notice on Mideast Terrorism Emergency January 22, 1998 bia012298.txt Rule on Indian Casinos January 22, 1998 cn012198.txt Crypto News January 21, 1998 fc98.htm Financial Cryptography '98 January 20, 1998 doj-ssgsup.htm Supplement to Fed Guide for Seizing Computers January 20, 1998 cn-netreg.htm New Chinese Internet Regulations January 20, 1998 ietf-dea-97.htm IETF Draft Encryption Algorithms 1997 January 20, 1998 radio-rec.htm Update: Locating Radio Receivers; Encoder Stolen January 20, 1998 pipenet.htm PipeNet Description January 20, 1998 dod012098.txt Defense Dept Secret Meets January 20, 1998 bernstein12.htm Transcript of Bernstein Hearing January 19, 1998 fbi-umbc.htm Barry Smith (FBI) to Speak on Encryption Policy January 18, 1998 de-snoop.htm Update: German Surveillance State January 17, 1998 bxa-wa-rule.htm Update 2: BXA Rule on the Wassenaar Arrangement January 16, 1998 pd98-10.htm Prez OKs China's Nuclear Controls January 16, 1998 tcryptol Theory of Cryptography Library (offsite) January 16, 1998 cn011698.htm Crypto News January 16, 1998 nsasuit8.htm USA/NSA Responds to Payne/Morales Motion Janaury 16, 1998 dod011698.txt Defense Dept Secret Meets January 16, 1998 bxa011398.txt Materials Advisory Meet January 15, 1998 crypto-kong.htm Announcing Crypto Kong January 15, 1998 occ-dstc.htm OCC OKs CA as Authorized Banking Activity January 14, 1998 aes-980820 Advanced Encryption Standard Conference (offsite) January 14, 1998 ustr010898.txt Update: Telecommunications Trade Agreements January 14, 1998 rc2.htm Rivest Describes RC2 Encryption Algorithm January 13, 1998 fc011398.txt FinCEN Regulates Card Clubs January 13, 1998 ta011298.txt Key Management Infrastructure Meet January 12, 1998 nist011298.txt Transmission-Electron Microscopy Meet January 12, 1998 doa011298.txt Army Hazard Containment Invention January 12, 1998 gps-jam.htm GPS Jamming January 11, 1998 arthur.htm The Force of An Idea: Theory of USA v. Microsoft January 10, 1998 RSA-stego.htm Batch RSA for Stego Data January 9, 1998 batch-DSA.htm Batch DSA January 9, 1998 cell-track.htm Update 2: Mobile Cell Phone Surveillance January 9, 1998 fiat-rsa.htm Fiat's Batch RSA January 9, 1998 aes010798.htm Update: Advanced Encryption Standard January 9, 1998 doj010998.txt RFC: USA v. IBM/STK Antitrust Suit January 9, 1998 bmd010898.txt Ballistic Missile Defense Secret Meet January 9, 1998 nih010898.txt Commercialization of Medical Data January 9, 1998 fas-pde Prez Directives/Executive Orders (offsite) January 7, 1998 ussc-ecopy.htm Sentencing for Electronic Copyright Violations January 6, 1998 ussc010698.txt RFC: US Sentencing Guidelines (254K) January 6, 1997 mercier.htm Terrorists, WMD, and the US Army Reserve January 6, 1998 terror-rnd.htm US Counterterrorism R&D Program January 6, 1998 belet Bob East Letter on AP/Jim Bell/IRS (offsite) January 6, 1998 pitfalls Schneier: Security Pitfalls in Crypto (offsite) January 5, 1998 dsb010598.txt Defense Science Board Secret Meets January 5, 1998 ntia010598.txt Funds for Public Telecommunications January 5, 1998 cn010598.txt Electronic Surveillance News January 5, 1998 csda.htm Cypherpunks Smartcard Developer Association January 4, 1998 aimd-98-21.htm Executive Guide: Info Security Management (139K) January 3, 1998 blast-mono.htm Blast Resistant Doors Monograph January 3, 1998 tempest-door.htm Electromagnetic Shielding/TEMPEST Door January 3, 1998 ehj.htm Banned Basque Video: Democratic Alternative January 3, 1998 fda010298.htm Policy for External Penile Rigidity Devices January 2, 1998 doe010298.htm Defense Nuclear Facilities Safety Plan January 2, 1998 dos010298.txt Meet on Global Communications and Info Policy January 2, 1998 doa010298.txt Army Science Board Meet January 2, 1998 _______________________________________________________________________________________ Cryptomb 2 June-December 1997 Cryptomb 1 To May 31 1997 � � � � (site stats) � DoE: Pay Bill Payne�� DoJ: Free Jim Bell Title: Payne/Morales vs. NSA: Reply to Defendant's Response 23 January 1998 Source: William H. Payne See related documents: http://jya.com/whpfiles.htm FILED UNITED STATES DISTRICT COURT DISTRICT OF NEW MEXICO 98 JAN 20 AM11:26 ROBERT M. MARSH CLERK/ALBUQUERQUE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF NEW MEXICO William H. Payne ) Arthur R. Morales ) ) Plaintiffs, ) ) v ) CIV NO 97 0266 ) SC/DJS ) Lieutenant General Kenneth A. Minihan, USAF ) Director, National Security Agency ) National Security Agency ) ) Defendant ) REPLY TO DEFENDANT'S RESPONSE TO PLAINTIFFS' MOTION FOR SUMMARY JUDGMENT BASED ON EVIDENCE FROM ADMISSIONS 1 COMES NOW plaintiffs Payne [Payne] and Morales [Morales] [Plaintiffs], pro se litigants to exercise their rights guaranteed under the Constitution, Rules of Civil Procedure, and Local Civil Rules to respond to Defendant's MOTION filed on 98 JAN-5 within the 14 days allowed by local rule 7.3(b)(4). 2 US Attorney Mitchell [Mitchell] writes, Counsel for Defendant was not served with copies of any of said Requests for Admissions until sometime after the individuals had been served.2 Mitchell WAS SERVED PLAINTIFFS' FIRST SET OF REQUEST FOR ADMISSION TO NSA DIRECTOR KENNETH MINIHAN I HEREBY CERTIFY that a copy of the foregoing request for admissions was mailed to Jan Elizabeth Mitchell, Assistant US Attorney, 525 Silver SW, ABQ, NM 87102 this Monday November 3, 1997. Michell was not served with any other admissions since Mitchell is not representing others. Plaintiffs' served Defendant Minihan properly. And Minihan failed to respond to Minihan's admissions within the time 1 allotted by law. 3 US Attorney Mitchell writes, As grounds for the Motion and Memorandum, Defendant argued that Plaintiffs had blatantly disregarded this Court's Order pertaining to the conduct of discovery and the deadline for discovery in this Freedom of Information Act action. Judges Svet and Campos willfully violated Plaintiffs' right to Discovery. And thereby earned criminal complaint affidavits filed with judge Scalia of the Supreme Court. 4 US Attorney Mitchell writes, In Defendant's Motion and Memorandum, Counsel for Defendant also objected to Plaintiffs' sua sponte decision to modify the Court's June 11 Order to reflect the delay of the Court's October 7 Order and the establishment, without leave of this Court, of new deadlines for discovery, motions practice, and the filing of the PreTrial Order. (Motion and Memorandum 9, at 4.) Judge Svet and Campos attempt to deny Plaintiffs' right to Discovery, again, earned Svet and Campos criminal complaint affidavits. Plaintiffs exercise their right under the Federal Rules of Civil Procedure and the Constitution to conduct Discovery WITHOUT LEAVE OF COURT! 5 US Attorney Mitchell writes, By their own request, Plaintiffs sought to stay a ruling on the Defendant's Motion and Memorandum. Absent any ruling on either the Motion and Memorandum or Plaintiffs' Response, Defendant Minihan, employees of NSA, and employees of Sandia National Laboratory, were not obligated to respond to the Requests for Admissions as provided by Fed.R.Civ.P. 36.3 For Plaintiffs to now assert in their "Motion for Summary Judgment On Based On Evidence From Admissions" that because the individuals have not responded to the Requests for Admissions they are deemed admitted, flies in the face of their own prayer to this Court to stay a ruling on the Defendant's Motion to strike the Requests for Admissions until the Supreme Court takes action. 2 Plaintiffs' have REPEATEDLY asked judge Svet and Campos to disqualify themselves from any rulings on this case because Campos and Svet do NOT obey the Federal Rules of Civil Procedure. Replace judges Svet and Campos because these judges have demonstrated, IN WRITING, they do not follow the Federal Rules of Civil Procedure. Plaintiffs' pleas are directed a[t] replacement judge[s]. Not Svet and Campos. Therefore, Svet and Campos' failure to remove themselves does not stop the legal process. Mitchell cites NO law to support her claim that time constraints imposed under Fed.R.Civ.P. 36.3 are inapplicable as a result of Svet's and Campos' failure to remove themselves. 6 US Attorney Mitchell writes, Defendant requests that this Court either rule upon Defendant's Motion and Memorandum granting the request to strike the Requests for Admissions, or grant Plaintiffs' request to stay this action pending the issuance of the order sought by Plaintiffs in another forum. Should this Court deny Defendant's Motion and Memorandum, Defendant respectfully requests that the individuals to whom Requests for Admissions are appropriate in this action be given the thirty days to respond to said admissions as provided by the Federal Rules of Civil Procedure. REPLACEMENT JUDGES of the Court should realize the outcome of the lawsuit has attained international interest as a result of the 1 bungled NSA spy sting on Iran 2 US government agencies NSA, NIST, and the FBI's attempt to control cryptography. Mitchell's DEFENDANT'S RESPONSE TO PLAINTIFFS' MOTION FOR SUMMARY JUDGMENT BASED ON EVIDENCE FROM ADMISSIONS was posted on Internet at jya.com, click cryptome 3 nsasuit8.htm USA/NSA Responds to Payne/Morales Motion January 16, 1998 Importance of this posting is summed-up in the Toronto Sun, Jan. 11, 1998 US, Iran Need Each Other by Eric Margolis Iran launched a surprise charm offensive last week, throwing Washington into serious confusion. In a lengthy interview on CNN, Iran's new president, Mohammad Khatami, skillfully analyzed the bitter relations between the two nations and cautiously extended an olive branch to Washington, calling for an end to their 19-year cold war. Khatami's diplomatic ju-jitsu flummoxed the Clinton administration, which was busy trying to rally international support against Tehran - and to overthrow Iran's elected government. Both capitals are split over the question of relations. In Washington, the military establishment and conservative Republicans have inflated Iran into a bogeyman to justify military budgets and keep U.S. forces in the Mideast. ... America incited Iraq to invade Iran in 1980. They did this to crush the Islamic revolution, then provided massive war aid to Saddam Hussein. Half a million Iranians died. The US got caught involved in genocide. Using high tech. This is one subject of this lawsuit. Albuquerque Journal Tuesday 1/13/98 carried the editorial. Khatami Move Is Profile in Courage Richard Reeves Syndicated Columnist LOS ANGELES - If an American leader had done what Iranian President Mohammed Khatami did last Wednesday, it would have been hailed as a profile in courage. ... Miscalculation! We armed and pampered Saddam Hussein in the hope that Iraq would destroy Iran. Now that's policy and behavior to think about. Here is something to think about: If Presidents Eisenhower and Kennedy had pursued any kind of sensible policy toward Cuba and Fidel Castro - opposed to 4 the policy of trying to assassinate him - there never would have been a Cuban missile crisis. I think Iranians have financed and encouraged terrorism against the interests of the United States and Israel. I would not be surprised at all if something like proof emerges soon, perhaps anonymously, from the CIA and other government agencies, where many officials have built their careers on sanctioning and isolating Iran, to try to straighten the backbones of the president and people of the United States. If they succeed, America fails. What would be more effective in closing down Iranian terrorism? More hostility, sanctions and charges? Or beginning the process toward more normal relations with a country positioned and born to be great? ... Clearly genocide fits into [missing text] Now that's policy and behavior to think about. The wired world is watching what this Court, hopefully minus judges Svet and Campos, will do. What is there to be? A series of possibly unfortunate events? Or does this Court order release the lawfully requested documents to help settle this American tragedy? WHEREFORE. 7 Have replacement judges of this Court DENY Mitchell's Plaintiffs requested a stay. Absent a ruling from this Court denying their request, they cannot proceed to assert that the Requests for Admissions are deemed admitted. Accordingly, Plaintiffs' "Motion For Summary Judgment On Based On Evidence From Admissions" must be denied. for reason that Mitchell's request to subvert both the Discovery processes and its time limits have no basis in law. And appears to plead to judges who do not obey the Federal Rules of Civil Procedure. [No 8] 9 IMMEDIATELY ORDER Defendant to release the requested documents in the interest of national safety so that this 5 matter can be settled. Aggrieved victims of US genocide are reading these pleadings. Respectfully submitted, [Signature] _________________________ William H. Payne 13015 Calle de Sandias NE Albuquerque, NM 87111 [Signature] _________________________ Arthur R. Morales 1024 Los Arboles NW Albuquerque, NM 87107 Pro se litigants CERTIFICATE OF SERVICE I HEREBY CERTIFY that a copy of the foregoing memorandum was mailed to Lieutenant General Kenneth A. Minihan, USAF, Director, National Security Agency, National Security Agency, 9800 Savage Road, Fort George G. Meade, MD 20755-6000 and hand delivered to John J. Kelly, US Attorney, 525 Silver SW, ABQ, NM 87102 this Tuesday January 20, 1997. [Arthur R. Morales signature] 6 [End] Title: Cylink Corporation ! ! ! ! ! EmploymentCylink Corporation NewsLearn more about Algorithmic ResearchPrivateWire FAQCylink's Critical Weapon in the Drug WarBank Leumi Selects PrivateWire Cylink Opens Service Centers in India and ChinaCylink Extends Service to Remote AreasCylink Gains RUS Acceptance for Airlink T1 Product From ryan at michonline.com Tue Feb 3 18:57:17 1998 From: ryan at michonline.com (Ryan Anderson) Date: Wed, 4 Feb 1998 10:57:17 +0800 Subject: the best justice money can buy --Lessig suspended In-Reply-To: Message-ID: On Tue, 3 Feb 1998, Tim May wrote: > > (I've left out the PowerPC, as it appears now to be limited solely to the > Macintosh market...even IBM and Motorola appear to have acknowledged its > failure.) Unless I've missed some absolutely major announcement, IBM is betting on the PowerPC in all their servers. Well, at least in their RS/6000 and AS/400, which is pretty much their entire high-end market. The PowerPC never had a serious entry into the desktop market anywhere but the Macintosh to my knowledge. Ryan Anderson - Alpha Geek PGP fp: 7E 8E C6 54 96 AC D9 57 E4 F8 AE 9C 10 7E 78 C9 print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 On 2/3/98 9:45 PM, Ryan Anderson (ryan at michonline.com) passed this wisdom: >On Tue, 3 Feb 1998, Tim May wrote: > >> >> (I've left out the PowerPC, as it appears now to be limited solely >> to the Macintosh market...even IBM and Motorola appear to have >> acknowledged its failure.) > >Unless I've missed some absolutely major announcement, IBM is >betting on the PowerPC in all their servers. Well, at least in >their RS/6000 and AS/400, which is pretty much their entire >high-end market. > >The PowerPC never had a serious entry into the desktop market >anywhere but the Macintosh to my >knowledge. ... and while Intel is not so quietly making noises about the soon to be available 333MHz Pentium IIs, Motorola quietly announced 400/433 MHz PPC chips two weeks earlier. Brian B. Riley --> http://members.macconnect.com/~brianbr For PGP Keys "Fate favors the prepared mind." (from "Under Siege 3") From guy at panix.com Tue Feb 3 19:30:44 1998 From: guy at panix.com (Information Security) Date: Wed, 4 Feb 1998 11:30:44 +0800 Subject: Whoa: British SmartCard rollout Message-ID: <199802040323.WAA16673@panix2.panix.com> > From: bill payne > To: webmaster at cylink.com > CC: federico pena <" Federico.F.Pena"@hq.doe.gov>, jy at jya.com, > john gilmore , j orlin grabbe , > cypherpunks at toad.com > Subject: Jim Omura > cn010598.txt Electronic Surveillance News January 5, 1998 2 January 1998, Newsbytes: British Govt Announces Smart Card Plans for UK Citizens London, England: Amid the quiet of the Christmas and New Year break, the British government revealed plans for a "citizen's smart card" that will streamline the interfacing of British people with their government. In plain English, that translates to a smart card that can be used to allow people to pay all of their taxes, including income tax, national insurance, and local taxes, as well as apply for passports, state benefits, and other forms of government welfare. The idea behind the smart card, according to Peter Kilfoyle, the British public services minister, is that people will be able to use the card to identify themselves to the various government computers, all of which will be interlinked with each other. Kilfoyle claims that there are "huge potential savings" to be had from the introduction of the smart card, although he revealed that possessing a card will be voluntary. When questioned further on this, he admitted, however, that people could find it difficult to operate in the future without such a card. Initially, the citizen's smart card will rely on traditional PIN protection systems to allow a person to ID themselves alongside the card to the government computer systems. In the longer term, and certainly within the next five years, the plan is to allow an individual to use a fingerprint or similar biometric system for positive identification. ---- Fingerprinting everyone on the planet: those of you in CA and a handful of other states have already been fingerprinted "so you can drive". Police will eventually be able to stop anyone and demand to check their fingerprints via cheap small portable scanners. EFF/EPIC etc need to specifically target these biometric systems as being way over the top. Totally unnecessary. ---guy How did you CA cypherpunks feel about being fingerprinted? From alan at clueserver.org Tue Feb 3 21:02:28 1998 From: alan at clueserver.org (Alan) Date: Wed, 4 Feb 1998 13:02:28 +0800 Subject: The War on Some Debts In-Reply-To: <199802031640.KAA18766@wire.insync.net> Message-ID: On Tue, 3 Feb 1998, Eric Cordian wrote: > In a further blatant erosion of Constitutional rights, the California > Supreme Court has ruled that a person owing child support who fails to > seek or accept work may be jailed and fined for contempt of court, and > that this does not violate any Constitutional bans on involuntary > servitude or imprisonment for debt. > > This reverses nearly a century of contrary rulings. Look for this > "improved" interpretation to be expanded to other kinds of debts and > judgments as well, as soon as massive public acceptance of it for the > carefully picked child support issue is engineered. Expected targets: -- Student loans (There are already a number of nasty collection methods made legal to "crack down" on those who are behind in their payments.) -- State and local taxes -- Garnishments of wages > The credit card companies are no doubt carefully analyzing this decision > as we speak. As well as anyone else in the collections business. alan at ctrl-alt-del.com | Note to AOL users: for a quick shortcut to reply Alan Olsen | to my mail, just hit the ctrl, alt and del keys. From honig at otc.net Tue Feb 3 21:26:42 1998 From: honig at otc.net (David Honig) Date: Wed, 4 Feb 1998 13:26:42 +0800 Subject: Spammers In-Reply-To: Message-ID: <3.0.5.32.19980203203912.007c0e10@otc.net> At 02:37 PM 2/3/98 +0000, Simon Fraser wrote: > >On Tue, 3 Feb 1998, Chip Mefford wrote: > >> Wouldn't it be nice to hold uu.net culpable for all their spamming ways. They >> want to own the internet, let them hang for it. > >http://www.us.uu.net/support/usepolicy/ >It would be nice to differentiate between the spammers themselves and the >ISP they use. > > >Simon. Yes. Otherwise an ISP loses common-carrier status and is thus responsible for the content of its traffic. Blame the junk-faxers, not the telcos. David Honig honig at alum.mit.edu --------------------------------------------------- Is Monica Lewinsky endorsing kneepads for Nike yet? From anon at anon.efga.org Tue Feb 3 21:29:11 1998 From: anon at anon.efga.org (Anonymous) Date: Wed, 4 Feb 1998 13:29:11 +0800 Subject: RSA? ElGamal? Message-ID: <50c47d8978815f7c5bf17e92e5e71bcc@anon.efga.org> Is ElGamal secure than RSA ? From honig at otc.net Tue Feb 3 21:36:05 1998 From: honig at otc.net (David Honig) Date: Wed, 4 Feb 1998 13:36:05 +0800 Subject: potus manipulation for fun and profit Message-ID: <3.0.5.32.19980203211801.007ef3c0@otc.net> Given the Head of State's alleged affinitity for "covert personal operations", consider the potential for manipulating him by any three-letter-agency skilled in surveillance. E.g., getting the Clinton administration behind Clipper, supporting our man Freeh, etc. There are advantages to having a POTUS who's a security risk, after all :-< -Gedanken memo, no such agency. David Honig honig at alum.mit.edu --------------------------------------------------- Is Monica Lewinsky endorsing kneepads for Nike yet? From bill.stewart at pobox.com Tue Feb 3 22:18:17 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Wed, 4 Feb 1998 14:18:17 +0800 Subject: County Mounties Spit on the 4th Amendment In-Reply-To: <695e7d4cd89037ab6c4e383c56f8fa6b@privacynb.ml.org> Message-ID: <3.0.5.32.19980203094020.0084dce0@popd.ix.netcom.com> At 09:25 AM 2/3/98 -0500, Michael H. Warfield wrote: > "County Mounties" is a CB (Citizens Band Radio for those not >familiar with US radio) slang term in the US for local police. Conversely >"Supertroupers" refers to State Patrol. The term "Smokie" (coined from >the movie Smokie and the Bandit) refers to all police. Argh - get your history right, kid! The movie Smokey and the Bandit used the already-current slang for cops, which was based on the Smokey The Bear hats that many police uniforms use. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From bill.stewart at pobox.com Tue Feb 3 22:23:50 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Wed, 4 Feb 1998 14:23:50 +0800 Subject: Spammers In-Reply-To: Message-ID: <3.0.5.32.19980203093050.0084dce0@popd.ix.netcom.com> >> Wouldn't it be nice to hold uu.net culpable for all their spamming ways. >> They want to own the internet, let them hang for it. > >http://www.us.uu.net/support/usepolicy/ >It would be nice to differentiate between the spammers themselves and the >ISP they use. You'd lose a class action suit. More important is to get them to close any open sendmail relays at their dialup sites (maybe they have by now), since those formerly-useful servers are a major tool for spammers. The other problem is just that they're big enough that if even a small fraction of their customers are spammers, lots of spam comes from their customers; at least they don't encourage it, unlike some providers. If you want to cut way down on spam, there's Paul Vixie's Realtime BlackHole List service at maps.vix.com. It uses DNS as a convenient query/response server and some short sendmail scripts to block mail from any site known to have an open smtp relay. They're fairly zealous, and don't mind throwing away a few extra babies to get rid of lots of bathwater, so if you don't want to block everybody that they block you'll need to hack some sendmail configs. My main frustration is that they block mail from the ix.netcom.com smtp servers, which blocked mail from me to the PGP-users list, but I've found another relay at Netcom that they don't know about :-) Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From adam at homeport.org Tue Feb 3 23:14:21 1998 From: adam at homeport.org (Adam Shostack) Date: Wed, 4 Feb 1998 15:14:21 +0800 Subject: BSAFE 4.0 to force GAK?! In-Reply-To: <34D75774.6036@syndata.com> Message-ID: <199802040709.CAA03985@homeport.org> One would hope that this simply drives the market towords using DSA/DH from toolkits like those available with support from Baltimore, PGP, CryptoMathic, etc. (I maintain a list of free and commercial crypto libraries at www.homeport.org/~adam/crypto. The list is oriented at hackers and cypherpunks, and so gives far more detail on the free libraries.) Theres no reason to be using BSAFE if it enforces Uncle Sam's ludicrous political requirements. Use a library from the free world. Use algorithms that are not encumbered. Theres no longer any reason not to. Adam steve wrote: | FYI | | Jan. 26's Network World has an article on page 33 titled "RSA blasts | (but also supports) Government encryption policy". | | The paragraph of note is the fourth paragraph which reads:"The next | version of the RSA encryption toolkit, BSAFE 4.0, will force those | building products with anthing over 56 bit strength encryption to use a | key-recovery center for exportable products...." | | I haven't been able to confirm this with other sources yet but the | glaring question is how will this be enforced and how will it affect | domestic products that wish to use BSAFE 4.0 for their crypto. Further | what ramifications does this hold for their S/Mail toolkit for S/MIME? | and I haven't seen this discussed on the list yet. | Steve O | -- | A picture tells a thousand words. | Stego | | | -----BEGIN GEEK CODE BLOCK----- | Version: 3.1 | GCS/IT/S d--() s+: a-- C++++(++)$ ULS+++@ P++@ L+(++)$ E- W+(+++)$ | N++$ !o K-? w++(+++)$ !O+>++ !M !V PS+(+++)@ PE(++)@ Y++$ PGP@ t+@ | 5++@ X++>$ R+++>$ tv+@ b+@ DI+++>$ D+++@>$ G@ e++@>++++ h r* y+ | ------END GEEK CODE BLOCK------ | -- "It is seldom that liberty of any kind is lost all at once." -Hume From attila at hun.org Wed Feb 4 00:34:57 1998 From: attila at hun.org (Attila T. Hun) Date: Wed, 4 Feb 1998 16:34:57 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) In-Reply-To: <199802040735.CAA04108@homeport.org> Message-ID: <19980204.080636.attila@hun.org> -----BEGIN PGP SIGNED MESSAGE----- Black Unicorn wrote: > At 06:07 PM 2/2/98 +0000, Attila T. Hun wrote: > > I did-- tried to lay $14K out for a Mercedes (25 years ago). > > they wouldnt take it. so I went and picked up two $7K > > cashiers from two different banks. same thing with a pair > > of Lycoming IO540 aircraft engines: 2 8s and a 9 --stay > > under the $10K transaction. > > Careful. This may well be illegal now. > Structuring transactions to avoid > reporting requirements is a felony. > statute of limitations has run. at the time, I did not give it much thought except the aggravation of filing the paperwork for what was a common business transaction. It was actually easier to get cash in las vegas than a cashiers check as the banks were so pissy. the casinos were far better than the banks once you established out of town credit with them --and they were 24 hours a day, 7 days a week. I wanted those aircraft engines bad --the vendor in Chicago had the only two available for close to six months and he had agreed to sell them to Canada but was waiting on the letter of credit --the casinos wired the money direct which turned the deal --the engines were on a return flight the next morning --a Saturday. transferring money from a casino is not the best place in the world for obvious reasons, despite its expediency. structuring transactions is certainly illegal now, but I have not seen that kind of money since retiring after having had a run of bad luck with my health a few years back (and lost my FAA medical cert). -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 Comment: No safety this side of the grave. Never was; never will be iQBVAwUBNNgm3rR8UA6T6u61AQET5gH6An6jxz5lkdghl6BXbHZ3tFCGu7iam32F knFYLLWGSYngkRH6k4x7/zXA0SH7ghZ5b33gKlX98oWx7NKyOXLZuw== =5RqA -----END PGP SIGNATURE----- From jacket9 at primenet.com Wed Feb 4 17:35:58 1998 From: jacket9 at primenet.com (Tony O. AKA College Guy) Date: Wed, 4 Feb 1998 17:35:58 -0800 (PST) Subject: PLEASE READ! YOULL BE GLAD YOU DID, MONEY MONEY Message-ID: <199802050132.SAA13178@smtp03.primenet.com> >>>> >>>>TO: MASSAOL at aol.com >>>>FROM: GatesBeta at microsoft.com >>>>ATTACH: Tracklog at microsoft.com/Track883432/~TraceActive/On.html >>>> >>>>Hello Everyone, >>>>And thank you for signing up for my Beta Email Tracking Application or (BETA) >>>>for short. My name is Bill Gates. Here at Microsoft we have just compiled an >>>>e-mail tracing program that tracks everyone to whom this message is forwarded >>>>to. It does this through an unique IP (Internet Protocol) address log book >>>>database. >>>>We are experimenting with this and need your help. Forward this >>>>to everyone you know and if it reaches 1000 people everyone >>>>on the list you will receive $1000 and a copy of Windows98 at my expense. >>>>Enjoy. >>>> >>>>Note: Duplicate entries will not be counted. You will be notified by email >>>>with further instructions once this email has reached 1000 people. Windows98 >>>>will not be shipped unitl it has been released to the general public. >>>> >>>>Your friend, >>>>Bill Gates & The Microsoft Development Team. >>>> >>> >> >> >Madeline > > > From lutz at belenus.iks-jena.de Wed Feb 4 01:43:52 1998 From: lutz at belenus.iks-jena.de (Lutz Donnerhacke) Date: Wed, 4 Feb 1998 17:43:52 +0800 Subject: Spammers In-Reply-To: Message-ID: * Bill Stewart wrote: >If you want to cut way down on spam, there's Paul Vixie's >Realtime BlackHole List service at maps.vix.com. It uses DNS as a >convenient query/response server and some short sendmail scripts >to block mail from any site known to have an open smtp relay. I prefer teergrubing. It does increase the realtime costs of spamming. A lot of professional spammers are teergrube aware and do not spam to such hosts. Unsecure relays die by a lack of ressources after catched by some teergrubes, so the admin has to do something to deal with the problem. From lutz at belenus.iks-jena.de Wed Feb 4 01:44:25 1998 From: lutz at belenus.iks-jena.de (Lutz Donnerhacke) Date: Wed, 4 Feb 1998 17:44:25 +0800 Subject: RSA? ElGamal? In-Reply-To: <50c47d8978815f7c5bf17e92e5e71bcc@anon.efga.org> Message-ID: * Anonymous wrote: >Is ElGamal secure than RSA ? It's different. That's all. From pegasusgroup at emailconcepts.net Wed Feb 4 17:50:56 1998 From: pegasusgroup at emailconcepts.net (pegasusgroup at emailconcepts.net) Date: Wed, 4 Feb 1998 17:50:56 -0800 (PST) Subject: Free Roger Clemens Lithograph Message-ID: <199802031406.JAA25545@emailconcepts.net> Free Roger Clemen's Lithograph ($200 Value) with purchase of the Roger Clemens Collectors Ring http://www.pegasusgroup.com/rogerclemens/roger.htm Limited Edition Collectors Lithograph Limited Edition Collectors Ring In honor of Roger's fourth Cy Young Award, Diamond Distributors of America, Inc. has commissioned Ray Vincent Delaney, to capture the essence of Roger in an original lithograph. Each lithograph has been signed by Roger and is numbered. The ring is designed and made by the Herff Jones Company, designers and makers of the Heisman Trophy, Heisman Rings, Indy 500 Rings, NCAA Bowl Rings, NCAA Championship Rings and the Congressional Medal of Honor. Each ring comes complete with Certificate of Authenticity signed and numbered by Roger himself. Only 1000 rings will be made. http://www.pegasusgroup.com/rogerclemens/roger.htm Within 2 weeks Watch for: **** The new Roger Clemens Monthly Sweepstakes!! and ***** The Collectors Set of 12 Special Signature Series of Roger Clemens Baseballs /////////////////////////////////////////////////////////////////////////////// This Message was Composed using Extractor Pro Bulk E- Mail Software. If you wish to be removed from this advertiser's future mailings, please reply with the subject "Remove" and this software will automatically block you from their future mailings. //////////////////////////////////////////////////////////////////////////////// From ls6Q1MOb7 at yahoo.com Wed Feb 4 19:21:32 1998 From: ls6Q1MOb7 at yahoo.com (ls6Q1MOb7 at yahoo.com) Date: Wed, 4 Feb 1998 19:21:32 -0800 (PST) Subject: Subliminally Seduce Women Instantly! Message-ID: Win over any woman you want in less than an hour. GUARANTEED! Start dating women that until now were 'out of your league' GUARANTEED! I know it sounds too good to be true, but it is now� possible for you to achieve in minutes, what typically takes most men days, months, and sometimes even years to accomplish...SEDUCING A WOMAN! Skeptical? Read this. Then visit our web site to learn the FACTS! Scientists worldwide agree that, in certain applications, subliminal mind control can accomplish amazing things. You might have heard how in the 1950s subliminal advertising was used in movie theaters to induce an unnatural craving for popcorn and an unquenchable desire for Coke. There are many types of subliminal thought control.� Certain subliminal influence techniques work AMAZINGLY well, while others hardly work at all! If you don't think modern subliminal technology can change your life, THINK AGAIN! For less than the cost of a single good meal you can instantly and permanently change the way women treat you. GUARANTEED! And the best part is that (due to a legal loophole) this is perfectly legal! If your luck with women has been anything other than GREAT, find out the FACTS by visiting our web site. Once you have received and tested one of our audio tapes you will be AMAZED! Don't make the mistake of confusing the antiquated technology used in the past with newly developed digital mastering techniques. We have spent years developing computer enhanced techniques that enable us to produce mood altering products that work on any woman, anywhere, anytime... GUARANTEED! You cannot turn women into mindless sex slaves with this or any other technology. You can, however, induce at will, natural urges that would otherwise lie dormant. It is simply a fact that any natural human desire such as sleep, hunger or sexual impulses can be GREATLY INTENSIFIED by using subliminal commands. When you play these recordings in the presence of any female who has a normal sexual appetite, look out!� She won't know what has come over her! It is completely undetectable! Even women you barely know, when subjected to this invisible aphrodisiac will find you more interesting and better looking. They will find themselves mysteriously drawn and sexually attracted to you. GUARANTEED!! Each of our musical recordings comes with a second 'demo' tape (free of charge) that has the subliminal messages brought forward for you to hear loud and clear. Don't let your girlfriend hear this one! WARNING: We have given you the opportunity to be more successful with any woman you choose. If you do not at least check out the facts for yourself, you will only be cheating yourself out of happiness and romance. To find out more about these AMAZING tapes at our web site at: http://www.ivpco.com/~speccass/index.html or, if your mail reader supports hyper-links, CLICK HERE If you have any problems accessing our main page, try our new mirror site at: http://www.emptyshell.com MIRROR SITE ********************************************************************** This message was sent by Overseas Internet Promotions, Inc. of Miami. If you have a product or service you want to market on the Internet, call us today @ 305-668-7502 ********************************************************************** From nobody at REPLAY.COM Wed Feb 4 09:51:11 1998 From: nobody at REPLAY.COM (Anonymous) Date: Thu, 5 Feb 1998 01:51:11 +0800 Subject: Internic may be required to return money Message-ID: <199802041740.SAA28340@basement.replay.com> Holy shit. > > Court: Domain fees appear illegal > By Brock N. Meeks > > WASHINGTON, Feb. 2 - A federal court Monday issued a > temporary injunction barring the federal government from > spending some $50 million it has collected from the > registration of Internet domain names. That money forms a > pool of funds intended to be spent for improving the > Internet. On Monday, the court sided with the plaintiffs in a > lawsuit that claims those fees constitute an illegal tax. > > The money is part of a so-called "intellectual infrastructure > fund," which is funded by 30 percent of all fees paid to > register an Internet domain name. Initial domain names cost > $100; renewal of domain names is $50 annually. The > remainder of registration fees goes to Network Solutions > Inc. (NSOL) to cover its cost of maintaining the registration > service. > > Network Solutions operates as a monopoly, stemming from > a National Science Foundation government grant. That > grant is supposed to end in March; the White House issued > a proposal Jan. 30 that would move domain name > registration into the private sector. > > In October, six domain-name holders filed suit in U.S. > District Court alleging that the National Science Foundation > had no authority to allow Network Solutions to collect any > money in excess of its cost of providing the registration > service. Further, the suit charged, the 30 percent > set-aside amounts to an unconstitutional tax. > > Judge Thomas Hogan said Monday that the plaintiffs "have > made a significant showing that the (intellectual > infrastructure fund) is an illegal tax." > > Hogan said there is "no litmus paper onto which the Court > can drop a regulatory assessment such as this one, hoping > to see whether the paper comes up blue for tax or pink for > fee." Justice Department lawyers had argued in court that > the domain-name registration fee was exactly that, a fee, > because it was paid voluntarily and therefore couldn't be > considered a tax. > > But Hogan disagreed, writing that "there is no dispute that > the assessment (registration fee) is involuntary - it is > automatically charged to every domain registration." > > In 1995 Network Solution's contract was amended to allow > it to begin collecting fees for the registration process, > which it had done for free since 1993, when its contract > was issued. The registration fees set off a firestorm of > criticism in the Internet community. The Intellectual > Infrastructure Fund was supposed to be used for the > betterment of the Internet for the community as a whole; > however, no plan has ever developed on how to spend the > money, which is held in escrow. > > Because no plan had been developed to spend the fund > money, Congress rushed into the vacuum late last year > and simply appropriated some $23 million. Congress > earmarked that money to be spent on the Next Generation > Internet project, which President Bill Clinton highlighted in > his recent State of the Union speech. > > "Under federal law, no independent executive agency - > such as the National Science Foundation - can collect > fees that exceed the cost of providing the service they are > administering," said William Bode, attorney for the plaintiffs. > "NSI, the agent of NSF, spends less than $5 to register > domain names, yet it charges a registration fee of $100 and > renewal fees of $50 per year," he said. > > Network Solutions did not return calls for comment. > > Bode also argued that only Congress has the authority to > tax and that no such authorization has taken place. The > Justice Department argued that because Congress > appropriated the $23 million from the infrastructure fund, it > had essentially ratified the tax. > > Bode argued that ratification of a tax can't take place in > authorization bills. Judge Hogan agreed, noting that > ratification is a legislative function and that "it is well known > that Congress does not normally legislate through > appropriations bills." Hogan added: "Congress may have > intended to grant NSF the authority to collect the > assessment, but it has not effected a legal ratification." > > The suit also is seeking antitrust damages, alleging that the > NSF violated the competition in contracting act when it > allowed Network Solutions to begin collecting the $100 fee. > Bode says the competition act requires the NSF to re-bid a > new contract, not simply amend it. > > The temporary injunction "paves the way for our motion, > which we'll file in two days, to require NSI to return all > registration renewal fees which exceed the cost of > providing that service," attorney Bode said. "We think that > cost [to NSI for the registration process] is significantly less > than $10, probably $2 to $3," he said, "which would mean > that there would be a refund of approximately $100 million > in our judgment." From guy at panix.com Wed Feb 4 10:33:23 1998 From: guy at panix.com (Information Security) Date: Thu, 5 Feb 1998 02:33:23 +0800 Subject: Rogue EFF Dir Brad Templeton Message-ID: <199802041809.NAA09228@panix2.panix.com> This jerk should be kicked out of EFF. Brad had stated he wants to eliminate one-way anonymous remailers, make two-way anonymous remailer users identify themselves as the same person every time they use one, and: o require digital signature identification for all email o require digital signature identification for all Usenet posts --------- previously shown ------------- Brad Templeton emailed: * Information Security emailed: * > Nor does your digital signature idea do anything to prevent * > throw-away accounts from doing major spams; you'll have to * > put even MORE controls on people. * * Correct, no throw away accounts. It's coming. * * > The digital signature idea is an astonishingly bad idea, that * > only frustrated control-freaks will accept. * * You are mistaken. I surveyed a roomful of usenet admins at a * conference last year. They were 95% in favor of it. [I replied that those were the control-freaks I was talking about] Brad Templeton emailed, formatted by guy: > As far as I am concerned, no fake addresses is one of my non-negotiable > requirements, because > > the eventual USENET is going to have digital signature requirements. > > It's the only way to stop [people from] posting under fake addresses > where we can't find them, and that means stopping honest users from > doing it too. [I said false: ALL problem posters are locateable to their ISP] http://www.clari.net/brad/spam.html [snipped] [by Brad] Solutions... First, improve internet mail systems and protocols to identify mail with a fake or forged return address. There are some simple steps to do this, and eventually digital signature allows complete verification of the sender. http://polka.clari.net/usenet-format/cert.html Q: What about anonymous remailers? A: A person with an anonymous address that sends mail back will probably be able to get a certificate. They can post without revealing their name, except perhaps to the person who gives them a certificate. Digital signature works fine to prove the same person sent two messages without saying at all who that person is in the real world. Forced to authenticate they are the same person, even through the anonymous remailer. --------- end of previously shown ------------- What's new is Brad has inserted his declaration that access to the Net must require you to authenticate yourself with a digital signature to post to Usenet in the draft text for the new Usenet RFC, which he is heading: Brad's draft Usenet digital signature text: # Systems MAY insist that an article be signed, at least the # body and the minimal header set, or they MAY reject the # article. This policy may vary from group to group and # subnet to subnet. Eventually it is expected that a site # SHOULD reject any article that is not signed. Hey, fine if an individual group wants to vote it in. But ALL OF USENET??? I asked him if he would change the wording to: # An individual group MAY insist that an article be signed, # at least the body and the minimal header set. This is # subject to the normal news standards of users of a group # deciding this issue themselves. Dead silence. He REFUSES TO DISCUSS the last statement: # Eventually it is expected that a site # SHOULD reject any article that is not signed. It is a purely political statement on his part, pushing his vision of a tightly authenticated Net, like they have in China. In fact, it is utterly clueless of him, especially since he was one of the original CDA plaintiffs. [Not to mention it is an "agreement to make an agreement"] NONE of the other list participants has said they agree everyone should authenticate themselves using digital signatures for all Usenet posts, which is the language I am contesting. Yet, he won't even discuss the ramifications. Yep, power corrupts: he's running the show, and answers to no one. ------- begin Crypto Manifesto excerpt ------- * Sandia and Coms21, currently engaged in an agreement to support the * People's Republic of China's driver license and national ID card * program, have partnered to create a fraud-proof solution for on-the-spot * positive identification of card bearers. * "China Tells Internet Users To Register With Police" * The New York Times, 2/15/1996 * * China ordered all users of the Internet to register with the police, as * part of an effort to tighten control over information. * * The order came from the Ministry of Public Security. * * Network users have been warned not to harm national security, or to * disseminate pornography. Well, there's a new way to control Internet users: require them to identify themselves, no doubt your U.S.-created National ID Card will be required for access. That ought to stop pornography: identify each and every user. # "The Great Firewall of China", by Geremie R. Barme & Sang Ye, Wired, 6/97 # # Xia Hong, China InfoHighway's PR man: "The Internet has been an important # technical innovator, but we need to add another element, and that is # control. The new generation of information superhighway needs a traffic # control center. It needs highway patrols; USERS WILL REQUIRE DRIVER'S # LICENSES. THESE ARE THE BASIC REQUIREMENTS FOR ANY CONTROLLED ENVIRONMENT." The Supreme Court's CDA ruling: Once most people are fingerprinted, a cheap (say $50) fingerprint scanner that attaches a timestamp and government digital signature will be sold for allowing Internet access to "adult" locations---chat rooms, USENET, WWW sites---and it will be mandatory. The Chief Justice of the U.S. Supreme Court said as soon as the "Internet driver's license" is technically feasible, CDA becomes legal. "Such technology requires Internet users to enter information about themselves--perhaps an adult identification number or a credit card number--before they can access certain areas of cyberspace, 929 F. Supp. 824, 845 (ED Pa. 1996), much like a bouncer checks a person's driver's license before admitting him to a nightclub." ------- end Crypto Manifesto excerpt ------- If everyone has a digital signature, CDA becomes legal. I do wish EFF would kick him out! ---guy From WebWarrior3 at InfoWar.Com Wed Feb 4 10:57:46 1998 From: WebWarrior3 at InfoWar.Com (WebWarrior3 at InfoWar.Com) Date: Thu, 5 Feb 1998 02:57:46 +0800 Subject: Cryptography empowering human rights. Message-ID: <34D8B729.36322685@InfoWar.Com> Looking for opinions and leads to resources about human rights and the potential abuse of said rights with public key 'escrow' or recovery agents. Please send info to: mailto:webwarrior3 at infowar.com Thanks in advance, Scott R. Brower Electronic Fronteirs Florida http://www.efflorida.org effla at efflorida.org From ravage at ssz.com Wed Feb 4 11:05:05 1998 From: ravage at ssz.com (Jim Choate) Date: Thu, 5 Feb 1998 03:05:05 +0800 Subject: Fountain of youth found? [SciAm] (fwd) Message-ID: <199802041901.NAA05823@einstein.ssz.com> Forwarded message: >From owner-tesla at ssz.com Wed Feb 4 13:00:02 1998 From: Jim Choate Message-Id: <199802041857.MAA05778 at einstein.ssz.com> Subject: Fountain of youth found? [SciAm] To: tesla at ssz.com (Experimental Instrumentation) Date: Wed, 4 Feb 1998 12:57:23 -0600 (CST) X-Mailer: ELM [version 2.4 PL23] Content-Type: text Content-Length: 2511 Sender: owner-tesla at ssz.com Precedence: bulk Reply-To: tesla at ssz.com Note this file has been edited. Forwarded message: > X-within-URL: http://www.sciam.com/explorations/1998/020298telomere/ > Telomere Image: Southwestern Medical Center > > LIFE'S CLOCK. Telomeres are repeating DNA strings (TTAGGG) that cap > chromosomes. Each time a mortal cell divides, its telomeres become > shorter. When they reach a preset length, the cell ceases to divide, > ages and dies. > > Scientists have found a major factor > that controls whether a cell dies or thrives > > It may not sound as appetizing as aquavit, but telomerase--an enzyme > discovered only a decade ago in a single-celled protozoan--may well be > the elixir of youth. This chemical acts in immortal cancer cells, > sperm and ovum to repair telomeres, the strands of DNA that tie up the > ends of chromosomes. And now it seems that activating telomerase in > sundry other cells grants them a longer lease on life as well. > > The finding, which was published in the January 16 issue of Science, > finally proves what was a highly controversial model linking telomeres > to cellular aging. More important, it opens up new avenues for > research into diseases that occur when cells grow old, including > macular degeneration in the eye and atherosclerosis, and those that > arise when cells don't age at all, such as cancer. [text deleted] ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From sorrin at syndata.com Wed Feb 4 11:10:43 1998 From: sorrin at syndata.com (Steve Orrin) Date: Thu, 5 Feb 1998 03:10:43 +0800 Subject: HUMOR: Bill Gates gets it, True CNN Story!! Message-ID: <19980204190827281.AAA314.381@endor.syndata.domain> http://www.cnn.com/TECH/computing/9802/04/belgium.gates.ap/ A Picture Tells A Thousand Words. STEGO From rdew at el.nec.com Wed Feb 4 11:53:57 1998 From: rdew at el.nec.com (Bob De Witt) Date: Thu, 5 Feb 1998 03:53:57 +0800 Subject: RIP, Carl Gorman, Code Talker Message-ID: <199802041932.LAA02327@yginsburg.el.nec.com> Oh-Oh! Us "newbies" slipped up. Except, when I signed up, my entry notice said: "To post to the whole list, send mail to cypherpunks at toad.com" Soooo, maybe you want we should send it elsewhere, to the same lists you send to, you should publish the correction, not just flame ... Until then, we just have to do as told by the list-admin ... On Sat Jan 31 12:20:56 1998 Dr.Dimitri Vulis wrote: > From dlv at bwalk.dm.com Sat Jan 31 12:20:56 1998 > To: cypherpunks at toad.com > Subject: Re: RIP, Carl Gorman, Code Talker > From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) > Comments: All power to the ZOG! > Date: Sat, 31 Jan 98 14:23:21 EST > > Tim May writes: > > > (As Gary seems to be a newcomer, let me remind him and others that > > "cypherpunks at toad.com" is not the place to send messages to the list. > > Please use one of the distributed addresses. It's been a year since the > > list moved off of toad.com. I wish John would just start bouncing messages > > sent to toad.com and be done with it.) > > When are cocksuckers John Gilmore and Guy Polis planning to die from AIDS? > > --- > > Dr.Dimitri Vulis KOTM > Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps > Ciao, Bob De Witt, rdew at el.nec.com From anon at anon.efga.org Thu Feb 5 04:21:19 1998 From: anon at anon.efga.org (Anonymous) Date: Thu, 5 Feb 1998 04:21:19 -0800 (PST) Subject: Changing to Moderated Cypherpunks -- How? In-Reply-To: <199802050343.DAA46984@out5.ibm.net> Message-ID: On Tue, 03 Feb 98 21:27:46 -0800 "James F. Marshall" wrote: >Too much noise in the unedited list. > >How does one change to the moderated list? Easy From eureka at eureka.abc-web.com Thu Feb 5 04:31:32 1998 From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com) Date: Thu, 5 Feb 1998 04:31:32 -0800 (PST) Subject: Eureka! Thu Feb 5 '98 Message-ID: <19980205083129.13871.qmail@eureka.abc-web.com> Welcome to Thursday's issue of Eureka! FRESHTEENS! Is there no end to it? Yet again we have succeeded in obtai- ning a FREE one week trial, for all Eureka! subscribers at another of the net's finest websites. Freshteens offers over 200 video feeds, hot live, sex shows, hard XXX movies, hot XXX stories, exclusive Texas Teens, and a comprehensive gay area too. You need a credit card to verify you are an adult, but will not be charged for your FREE membership. Excellent! Freshteens ........... http://www.freshteens.com/cproot/1217 Oriental Beauty http://www.orientalbeauty.com/entry.phtml 100% Free site with softcore and (some) hardcore pictures of the most beautiful Asian women I have ever seen! All pictures can be found in easy to navigate picture galleries with thumbnail previews, so you only download the pictures that you like! There are two fresh pictures every single day. Finally, there is also an extensive links section with links to other Asian sites worthy of a visit. More than enough reasons to visit us! SINK THE PINK Go there now if you want to see a lot of great free pix. They have so much brown bush in here we may have to call in a weed wacker! This is a cool site, easy to navigate thumb- nails of high quality images and tons of great pix. Featur- ing group sex, asian, anal, oral and brunettes and more! Sink The Pink ................... http://www.sinkthepink.com CYBERJOY Yes, this is yet another great site for some free pix! Text links on a light colored background lead you to double dicks in one box, blowjobs, cumshots and all that jazz! Just the way you like it. Point your browser over there and see it! Cyberjoy ......... http://www.cyberjoy.inter.net/accept1.htm ASSES & PUSSIES We got butts and bush. Not a bad mix. This webmaster has built a quick loading website with a good interface. By that I mean that you will have great looking butts and pussy in your face really fast! High resolution and high desire. Yes! Asses & Pussies ................... http://www.asspussy.com/ HOT CAMILLE There is a membership in here but to entice us there are a few free pix of one hot little sexpot! She likes showing us her pussy and ass and she love dick. Not a bad way to go. There are even two free videos, small but some serious pink! Hot Camille ..................... http://www.hotcamille.com/ #READ THIS!! WIN $25,000 and a Fantasy Date - Click Here Now! #$25,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A # HOORAY! THE ADULT SEARCH ENGINE Now you can search for the sex sites you are looking for and fast! This new search engine is setting the standard others will follow. It offers pop-up search and detailed listings! Hooray! -----------------> http://eureka.abc-web.com/hooray/ FREE STREAMING VIDEO Please note that most of these feeds require a Netscape bro- wser in order to successfully view them. Unfortunately Micr- osoft's browser does not have all the features of Netscape's yet. However, many of the feeds use the RealPlayer and will work in most browsers. If you do not have Netscape and want a free copy click here --> http://www.netscape.com/download/ Max Hardcore --------> http://207.240.169.121/max/start.html CHAT WITH OTHER READERS Hey, if you haven't checked out the Eureka! Chat sites yet, you're missing out on some great stuff. Every day you'll find hundreds of other readers just like you looking to chat have fun and maybe a little 'cyber'. We know you'll love it! Adult/Sex Chat -----------------> http://137.39.63.229/chat/ General/Fun Chat -------> http://137.39.63.229/chat/funchat/ HOT LIVE PHONE SEX TO MAKE YOU CUM! LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912 LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779 FREE: Live 1-on-1 (international call only)--->011-678-77416 NEW! CENTERFOLD PIC OF THE DAY Exclusive! We proudly present unpublished Pictures of your favorite Centerfolds. Featured This Week: Dec 80-PMOY Terri Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri Kendall, Rebecca Ferratti, Lydia Schone and many more too! ---------------------------> http://www.gatefold.com/eureka/ AMATEUR SITE OF THE DAY Jan: She is what excites all of us about amateurs. This gal is hot and raw! Her web page design and graphics may not be the best, but she loves to show off. A wife and mother of three, she wants the entire world to see her great body! Not only is she a babe, but she has a very active imagination. Stop by and see if you can be her next fantasy! ---------------------------> http://amateurindex.com/eureka/ EROTIC STORY SITE OF THE DAY VoyeurStories.com: Want some sizzling free voyeur erotic stories accompianied by GENUINE hidden camera pics? Satisfy your peeping tom curiosity by visiting VoyeurStories.com.... .............................. http://www.voyeurstories.com/ DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/ ADULT STAR PIC OF THE DAY Woah, our Adult Star pics are getting hotter and hotter, so make sure you stop by and check out today's - definitely not to be missed! --------> http://www.xxxadultstars.com/eureka/ OTHER EUREKAS! GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/ DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm ESPA�OL ------> http://eureka.abc-web.com/eureka/espanol.htm FRAN�AIS ----> http://eureka.abc-web.com/eureka/francais.htm ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm TODAY'S FREE PIX Pic 1 --------------------------> http://137.39.63.229/?050 Pic 2 --------------------------> http://137.39.63.229/?051 Pic 3 --------------------------> http://137.39.63.229/?052 Pic 4 --------------------------> http://137.39.63.229/?053 Pic 5 --------------------------> http://137.39.63.229/?054 Pic 6 --------------------------> http://137.39.63.229/?055 Pic 7 --------------------------> http://137.39.63.229/?056 Pic 8 --------------------------> http://137.39.63.229/?057 Pic 9 --------------------------> http://137.39.63.229/?058 Pic 10 --------------------------> http://137.39.63.229/?059 ============================================================ TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US. ============================================================ From attila at hun.org Wed Feb 4 13:04:25 1998 From: attila at hun.org (Attila T. Hun) Date: Thu, 5 Feb 1998 05:04:25 +0800 Subject: the best justice money can buy --Lessig suspended In-Reply-To: Message-ID: <19980204.181907.attila@hun.org> -----BEGIN PGP SIGNED MESSAGE----- on or about 980203:1222, in , Tim May was purported to have expostulated to perpetuate an opinion: >As for Attila's calls to break up MS...could make Bill Gates immensely >wealthier, as he'd then have a piece of the 5 most successful software >companies! after they extract the usual treble damages in antitrust litigation, Bill will probably retain significant assets, but he probably would not top the list of the very wealthy, and might not even make it. >(I assume Attila is not arguing for simply seizing his property and >giving it to others, or running it as a government company, or just >padlocking the doors....) no, in fact, if there were a free market remedy for M$' monopoly, I would be in favour of it --and there is _no_ free market remedy and failure to act promptly conceivably wipe out all, or virtually all, of the viable competitors. the purpose of antitrust legislation is solely to remedy an injustice caused by a private market segment which became a monopoly. divestiture for M$ would generally be along the lines of AT&T except it would focus on divisions rather than regions; secondly, it would obviously restrict Gate$ involvement in more than one despite any stock ownership and might require Bill: a) to sell all stock in units he does not control; b) take his payout in stock from one unit only (less negative market); or, c) he may not have enough left after Sherman Act penalties to be a major stockholder --he might actually need to suffer through stockholders meetings like the rest of the CEOs. I would never advocate seizing assets for redistribution vis a vis Mugabe or whatever the despot's name is --what a waste-- if uncle Sam redistributed we would have Microsoft-Harlem, Microsoft-Watts, etc. shit, I had to stop typing after the mirth of that thought! as for the government running _anything_ --how far do we need to look for the nearest government excess and total mismanagement, featherbedding, and corruption? not far (you, Tim, on a non-clear day cant see very much from your hilltop --out here on the high desert ridges in So. Utah it is CAVU the vast majority of the time-- and I still cant see any as Feds are like Revenuers in KY). there are multiple issues: 1. Microsoft's almost good enough (for the market) operating systems which probably should be considered what we called firmware 25 years ago. at this point >90% of the platforms run M$ in one form or another and as you acknowledge, SGI, DEC, and so on are all hedging their bets --which will become reality as soon as they open the floodgates. in software, the sheeple follow the Judas goat to Redmond. 2. Microsoft "software" a) office suite --already 95% of desktop market b) data base --maybe should be included in a) but Oracle, Sybase, IBM, etc have large installed bases at a much higher cost per unit on servers c) browser --certainly will be at 80% before year end as all OEMs so far have indicated they will not cross M$ and switch. that leaves the rest of it up to the ISPs who could care less. d) back office --M$ moving in on this one real fast and it is now part of NT distribution-- which then requires the browser and webserver for installation and maintenance. e) web servers, firewalls, routers, etc. --M$ is already getting the web servers with NT distributions and is poised to tackle firewalls and router dominance. I question that they can ever configure NT on any hardware to do routing/switching effectively, efficiently, or competitively against dedicated hardware given the new >1G switches. 3. M$ in cable systems. cable systems are always cash poor from infrastructure expense. M$ is buying in and therefore influencing the choice of settops --and their format-- witness TCI. this further establishes M$ in the determination of standards --obviously to the detriment of everyone else-- and the FCC has mandated the boxes must be compatible across the board in a couple years and we all know who negotiates dirty and hard the only saviour in this one may be Time-Warner which so far is moving ahead with its 2way cable system from Scientific Atlanta with a sparc chip, etc. T-W has 2.5 million boxes on order and is planning extensive deployment 3rd quarter which is at least 12 months before M$ can even beta test with TCI 4. content... a) msn which so far is harmless, but what would happen if Gate$ absorbed Assholes on Line? or really pushed MSN at POS and OEM. b) msnbc which apparently still enjoys editorial censorship only from the usual channels of our non-free press. c) reference bookshelf in which the latest revision of the EnCarta encyclopediae described Gate$ as a "philanthropist" --cheap son of bitch only coughed $100 million towards school internet as long as it was M$ product. he may have been better termed a misogynist (before he was married) given his terms of usage.... content is where we really start to worry more than Bill's money, which has already bought influence: the WSJ editorial page article by Bill striking back at the DOJ, the NYTimes column, the books, and the rest of the demigod worshipping media. Gate$' fortunes have been changing: Gate$ now has for more enemies than his money can buy friends. even the SPA has turned against him with their white paper on fair competition which is a direct shot across Gate$' bow --and Gate$' response was that their membership in SPA might not be renewed in August --economic threat. The DOJ has expanded their scope and will probably file significant actions shortly (hopefully before the 21 Apr appeals court hearing) next are the states, eleven so far including NY, TX, IL and CA where they have very definitely aggressive AGs. and CA's is pissed over the sweetheart deal the CSU system gave M$ to supply everything as the "official vendor" of the CSU system which has 20+ campi and how many million students? complain about a McDonalds' generation? shit, that's only your stomach, not your mind --and at least there are other choices for food --I personally have never eaten at McDonalds; of course, that does not say much as I have never owned a television, either. we already have an M$ generation. they all learned on PCs and they all programmed to PCs and windows with their private APIs. this is exactly what creating a positive feedback, self-enhancing market place does: McDonalds grabbed their stomachs with their playgrounds, etc. and M$ twists their minds. BOTTOM LINE: Gate$ manipulation, scheming, red-dog contracts, etc. make Cornelius Vanderbilt look like a choir boy. Gate$ style of management with Steve Ballmer as the heavy and Gate$ trying to cover his geekness as the "aw shucks" boy next door has had the curtain pulled to show what technically amounts to a legal "conspiracy" to dominate multiple markets, both vertically and horizontally. as such, M$ and their executives actions fall directly under the guidelines of part B of the Sherman Antitrust act which includes the usual penalties of divestiture, treble damages, and _criminal_ penalties. secondly, M$ and Gate$, if convicted of violating part 2, could then be construed as a "corrupt" meaning malicious intent the difference between misfeasance and malfeasance is that in the latter you were intentionally fucked which qualifies for RICO prosecution as well. in addition to the extremely severe criminal penalties, RICO does provide for confiscation of ill gotten assets --this would apply to Gate$ monetary gains, including his stock, which could be forfeited. frankly, I think it would be most amusing to see Gate$ and Ballmer receiving the customary "3 hots and a cot" for such offenders and to need to work for a living like the rest of us when they earn their freedom. the fact that RICO could apply does not mean that it will be trundled out --but it would be fitting justice. I will never denigrate Gate$ determination to build M$ and to proliferate the computer, which he did, a little too well. --but Gate$ crossed the line: Gate$' instinct set him on the path that competition means forcing everyone and their ideas (those that he did not steal, literally or figuratively) from the marketplace --Bill can not compete; he must "own" the market. William Henry Gates III expects to be crowned "William III" --see my rant on 16 Oct. on DejaVu or: http://www.primenet.com/~attila/rants/gates/7a16-ms_monopoly.html not to be crass about it, but Gate$ has served his purpose and outlived his usefulness --his defense against the DOJ, his further market actions while under attack, and his intent to trump the moot with Win98 are actions of a petty dictator; give Bill a shiny new uniform from a Napoleanic banana republic and let him prance around. any more of Gate$ not only becomes tiresome, but hazardous to our health. give me the hook... there is no free market remedy for M$' control of the market place as the consumer will not boycott something which a) costs them money do so; and, b) for which there is no ready substitute. the only alternative is to apply the anti-trust laws in the general interests of society which does not mean government ownership or management. M$ stockholders may either make or lose money depending on the valuations the market assigns to each of the divested divisions --but that is a risk you take in the market if your greed exceeds your wisdom. ask any VC, whose greed is only exceeded by his fear. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 Comment: No safety this side of the grave. Never was; never will be iQBVAwUBNNjTgbR8UA6T6u61AQE9SAH/ZE9BRgenWbxD1mFsqj6qgHJ3hzKXbT6l wpDQd5U3sFje7QEMLVS7KzTRXLchMF+JYcHeuiB3hV3dmCCG7n8yRA== =JspT -----END PGP SIGNATURE----- From attila at hun.org Wed Feb 4 13:43:29 1998 From: attila at hun.org (Attila T. Hun) Date: Thu, 5 Feb 1998 05:43:29 +0800 Subject: HUMOR: Bill Gates gets it, PRESERVED for the FUTURE! In-Reply-To: <19980204190827281.AAA314.381@endor.syndata.domain> Message-ID: <19980204.213032.attila@hun.org> -----BEGIN PGP SIGNED MESSAGE----- >http://www.cnn.com/TECH/computing/9802/04/belgium.gates.ap/ >A Picture Tells A Thousand Words. yes, it does. he still looks like a geek. and since CNN archives are spotty, it is now preserved for the future. (available tonight) http://www.primenet.com/~attila/rants/gates/8204-belgium_gates.html made my day! -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 Comment: No safety this side of the grave. Never was; never will be iQBVAwUBNNjfC7R8UA6T6u61AQEE/AH9EWvCnUmxs8e/+KynguU8mu+Pmbc/f525 N1EK9hdp5HgGHBiVBmENP78iNCF1miREtKTvBGmSqpH0DEAzpHprEA== =NKvr -----END PGP SIGNATURE----- From ptrei at securitydynamics.com Wed Feb 4 13:58:34 1998 From: ptrei at securitydynamics.com (Trei, Peter) Date: Thu, 5 Feb 1998 05:58:34 +0800 Subject: FW: SEC Rule Announcement Message-ID: <6B5344C210C7D011835C0000F8012766010035B2@exna01.securitydynamics.com> I haven't been able to confirm this report. Note that it refers to monitoring employee's HOME computers. Peter Trei > -----Original Message----- > From: Larry Layten [SMTP:larry at ljl.com] > Sent: Wednesday, February 04, 1998 11:04 AM > To: cryptography at c2.net > Subject: SEC Rule Announcement > > I received information in an Electronic Mail Association (EMA) > bulletin that said the Securities and Exchange Commission > approved a rule that would go into effect February 15th that > requires securities employers to have the ability to monitor > electronic communications between employees and customers > on employees' home computers or through third party systems. > > Does anyone have any more information on this and how it > might apply to encrypted email? > > Larry From attila at hun.org Wed Feb 4 14:05:07 1998 From: attila at hun.org (Attila T. Hun) Date: Thu, 5 Feb 1998 06:05:07 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) In-Reply-To: Message-ID: <19980204.215246.attila@hun.org> -----BEGIN PGP SIGNED MESSAGE----- on or about 980203:1053, in , Robert Hettinga was purported to have expostulated to perpetuate an opinion: >The cost of anything is the foregone alternative. People will only demand >more privacy when it's cheaper than not having it. I believe that that >time is coming, rather quickly. > that, and "Americans do not buy for quality, they buy for price" as John Ruskin said: 1. those who buy for price alone are this man's lawful prey. 2. the price of oats is significantly cheaper when it has been processed by the horse. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 Comment: No safety this side of the grave. Never was; never will be iQBVAwUBNNjj0LR8UA6T6u61AQF/VgH+I8k5TPa9u0mjBOZbhB+zl+C6Eo0yH4gY 9fgqICC+hmhzIQe1l1a9Y/3n0rWu5K6cWsTSzSF8KC4XyyLwH8fGQQ== =tQT9 -----END PGP SIGNATURE----- From rah at shipwright.com Wed Feb 4 14:19:04 1998 From: rah at shipwright.com (Robert Hettinga) Date: Thu, 5 Feb 1998 06:19:04 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) In-Reply-To: Message-ID: At 4:56 pm -0500 on 2/4/98, Attila T. Hun wrote: > "Americans do not buy for quality, they buy for price" Which must explain our gross national product, then. Cheaper, as always, *is* better. > > as John Ruskin said: > > 1. those who buy for price alone are this man's lawful prey. Those who *don't* buy for price alone are usually somebody's lunch sooner or later. > 2. the price of oats is significantly cheaper when it has been > processed by the horse. It ain't oats, then. It's horseshit. Aparently aristocratic horseshit, if I remember Mr. Ruskin's bio right... ;-). Cheers, Bob ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ Ask me about FC98 in Anguilla!: From ptrei at securitydynamics.com Wed Feb 4 14:21:50 1998 From: ptrei at securitydynamics.com (Trei, Peter) Date: Thu, 5 Feb 1998 06:21:50 +0800 Subject: FW: SEC Rule Announcement Message-ID: <6B5344C210C7D011835C0000F8012766010035B3@exna01.securitydynamics.com> [sorry if you get this twice - pt] I have not been able to confirm the claim in this letter - the EMA does not seem to have a web site. Note that it refers to employers monitoring employee's HOME computers. Peter Trei > -----Original Message----- > From: Larry Layten [SMTP:larry at ljl.com] > Sent: Wednesday, February 04, 1998 11:04 AM > To: cryptography at c2.net > Subject: SEC Rule Announcement > > I received information in an Electronic Mail Association (EMA) > bulletin that said the Securities and Exchange Commission > approved a rule that would go into effect February 15th that > requires securities employers to have the ability to monitor > electronic communications between employees and customers > on employees' home computers or through third party systems. > > Does anyone have any more information on this and how it > might apply to encrypted email? > > Larry From attila at hun.org Wed Feb 4 14:28:09 1998 From: attila at hun.org (Attila T. Hun) Date: Thu, 5 Feb 1998 06:28:09 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) In-Reply-To: <01BD308B.1A566960@slip-james.lcs.mit.edu> Message-ID: <19980204.220302.attila@hun.org> -----BEGIN PGP SIGNED MESSAGE----- on or about 980203:1003, in <01BD308B.1A566960 at slip-james.lcs.mit.edu>, "James O'Toole" was purported to have expostulated to perpetuate an opinion: >Pretty soon we'll run up against the problem of whether Tim May can >configure a corporate in the U.S. to be operated by people who don't know >who he is, and who can't find out who he is (when properly encouraged to >cooperate by Ken Starr...). With or without government regulation, the >most reliable people you can hire to operate that corporation for you may >only want to do so if they are given the opportunity to somehow "know" >you. in the U.S. the _best_ you will ever do is run a smokescreen >I think you can probably use a bank in a privacy-enhancing-locale such as >Switzerland as an effective intermediary in Amex card issuance, but if >you really don't want the bank to know who you are, you'll probably need >a corporate intermediary between you and the bank, with nominee >officers. dont use Switzerland; it has been translucent for at least 20 years and is fast approaching transparency. Lichtenstein --if you can get an introduction into Landesbank from a local 'truehand' --even better, if you can get into the PrivatBank. just remember, if it is the former, as you enter the main circle in Vaduz from the south, get out and kiss the bricks. if you can not get the introduction, dont count on the extra services. secondly, you can not own anything in Lichtenstein without a residency permit and good luck on that one. as they say: no further information available.... -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 Comment: No safety this side of the grave. Never was; never will be iQBVAwUBNNjnjrR8UA6T6u61AQEpvwH6Aia+pitmw1OyX9y5A8D9cWRGMUTTa3EC wJTuUErBab1sWqJihJ755LHiyqpktBBVMO84TBtJPHnHMJoQqGIXNg== =fsE0 -----END PGP SIGNATURE----- From ravage at ssz.com Wed Feb 4 14:28:27 1998 From: ravage at ssz.com (Jim Choate) Date: Thu, 5 Feb 1998 06:28:27 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) (fwd) Message-ID: <199802042228.QAA06832@einstein.ssz.com> Forwarded message: > From: "Attila T. Hun" > Date: Wed, 04 Feb 98 22:14:36 +0000 > Subject: Re: The Continued Attack on Cash (Was: "The Right of Anonymity"...) > >You don't know Texas or Texans very well... > > well, I do, real well --but you dont know rural Utahns. Actualy I do, know quite a few people in Utah; both in and out of the Mormon Church and in and outside the handfull of cities. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From attila at hun.org Wed Feb 4 14:29:08 1998 From: attila at hun.org (Attila T. Hun) Date: Thu, 5 Feb 1998 06:29:08 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) In-Reply-To: <199802021912.NAA29247@einstein.ssz.com> Message-ID: <19980204.221436.attila@hun.org> -----BEGIN PGP SIGNED MESSAGE----- on or about 980202:1312, in <199802021912.NAA29247 at einstein.ssz.com>, Jim Choate was purported to have expostulated to perpetuate an opinion: >> well, in the first place, you live in Texas where the >> attitude to the Feds is rather strong --not as strong as our >> attitude in rural Utah where the usual transaction is in >> cash. out here, a Fed is the same as a revenuer in Eastern >> Kentucky or Tennessee. reminds me of the Fed approaching a >> child and telling him he'd give him $5 if he took him to his >> father (still) --the boy asked for the money up front. when >> the Fed asked why, the boy said: "...'cause you aint coming >> back". >You don't know Texas or Texans very well... well, I do, real well --but you dont know rural Utahns. in reality, it's probably a tradeoff. one of the reasons the Democrats use Utah as a dumping ground or national park is we dont give them any votes. you also need to remember that the first day of deer hunting season here is a holiday --and the number of firearms/capita leads the nation --keep in mind how many kids us Mormons have --5 is considered a slacker.... -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 Comment: No safety this side of the grave. Never was; never will be iQBVAwUBNNjpy7R8UA6T6u61AQH0sgH/d41HFQhKoLNqaIbgOr8Cl/SoPPq22R14 u6U2LuACWTwTfl/0zM1K8B7GmX87Mdx9xPysfeyf/y6d4wSyDwNjKg== =7Ewg -----END PGP SIGNATURE----- From ravage at ssz.com Wed Feb 4 14:31:14 1998 From: ravage at ssz.com (Jim Choate) Date: Thu, 5 Feb 1998 06:31:14 +0800 Subject: The Continued Attack on Cash (Was: "The Right of (fwd) Message-ID: <199802042230.QAA06881@einstein.ssz.com> Forwarded message: > Date: Wed, 4 Feb 1998 17:07:19 -0500 > From: Robert Hettinga > Subject: Re: The Continued Attack on Cash (Was: "The Right of > Anonymity"...) > > 1. those who buy for price alone are this man's lawful prey. > > Those who *don't* buy for price alone are usually somebody's lunch sooner > or later. There is *always* somebody higher up the foodchain. No matter how big or tough sooner or later you end up somebodies lunch. Price is irrelevant except in regards the time frame. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From jfrancis at netscape.com Wed Feb 4 14:40:15 1998 From: jfrancis at netscape.com (Joe Francis) Date: Thu, 5 Feb 1998 06:40:15 +0800 Subject: implementing an export control policy on a web site Message-ID: <34D8EB6F.3B6EA5C8@netscape.com> I am seeking information on what constitutes legal conformance to U.S. ITAR when webserving encryption software from within the U.S. I have read pretty much everything I can find online that looked like it might be relavent. Apologies if this is a FAQ that I have some how missed. Part of my confusion stems from the different policies implemented by different vendors on their sites, and also by how those policies have changed over time. For instance, at Netscape one has to provide a tremendous amount of personal info in order to download the domestic version of Communicator. Phone number is required, and there appears to be some automated sanity checking on the phone number/address supplied. This is a sharp contrast to the Cypherpunks Home Page (ftp://ftp.csua.berkeley.edu/pub/cypherpunks/Home.html), where a simple request not too export and an explanation of the ITAR appears to be all that is done. PGP has yet a different standard, directing you to the MIT page which eventually leads to a form (at http://bs.mit.edu:8001/pgp-form.html) that forces you to affirm your citizenship, agree to obry ITAR and obey the RSAREF license, and state that you will only use PGP for noncommercial use. It then appears to do some minimal checking of your ip name/address (it would allow me to download from netscape.com but not from ricochet.net). If anyone can point me at any legal analysis of these different approaches, or has any info to offer on the matter, I'd love to hear about it. thanks, Joe Francis From ravage at ssz.com Wed Feb 4 14:40:56 1998 From: ravage at ssz.com (Jim Choate) Date: Thu, 5 Feb 1998 06:40:56 +0800 Subject: IBM cpu breaks 1GHz barrier [CNN] Message-ID: <199802042241.QAA06983@einstein.ssz.com> Forwarded message: > IBM breaks 1,000 MHz > > More related sites... NEW YORK (CNNfn) - Engineers at an International > Business Machines Corp. research facility in Austin, Texas, Wednesday > demonstrated the world's first computer chip to break the 1,000 MHz > barrier. > [INLINE] The chip operates at 1 billion cycles per second. The fastest > commercial microprocessors today operate at around 300 MHz. However, > computer users won't be able to run out and buy a PC containing the > chip anytime soon. IBM isn't expected to make it available > commercially for at least two years. > [INLINE] The news comes just days after rival Digital Equipment > introduced a new version of its Alpha chip that it said would break > the 1,000 MHz barrier. Digital Equipment, which hasn't yet hit that > mark, also said it would take at least two years for the chip to be > available. > [INLINE] IBM will issue a research paper detailing the chip, along > with two related microprocessor papers, at the International Solid > State Circuit Conference in San Francisco Friday. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ravage at ssz.com Wed Feb 4 14:44:26 1998 From: ravage at ssz.com (Jim Choate) Date: Thu, 5 Feb 1998 06:44:26 +0800 Subject: IRS Technology Chief Resigns [CNN] Message-ID: <199802042242.QAA07077@einstein.ssz.com> Forwarded message: > > IRS TECHNOLOGY CHIEF TO RESIGN > > > WASHINGTON (AP) -- Arthur Gross, the IRS official heading efforts to > update the agency's outmoded computer systems, plans to leave the > agency this spring. > > Gross, chief information officer at the IRS, won wide respect from > congressional Republicans for his computer modernization efforts > even as they grilled the agency for mistreatment of taxpayers last > year. > > He announced his plans to resign Tuesday. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ravage at ssz.com Wed Feb 4 14:44:47 1998 From: ravage at ssz.com (Jim Choate) Date: Thu, 5 Feb 1998 06:44:47 +0800 Subject: Pepsi a tad anal? [CNN] Message-ID: <199802042243.QAA07160@einstein.ssz.com> Forwarded message: > DRINKING THE COMPETITION LEADS TO LAWSUIT > > POMONA, California (AP) -- Just because he delivers Pepsi doesn't > mean he has to drink it. > > Michael Dillon has filed a discrimination lawsuit against the > soft-drink giant after he was reprimanded for drinking Gatorade on > the job and was publicly chastised for drinking a non-Pepsi product > during a meeting. > > Dillon says both claims invaded his privacy. > > A spokesman for Pepsi says the company doesn't forbid workers from > downing other soft drinks, but expects them to be team players when > it comes to being loyal. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ravage at ssz.com Wed Feb 4 14:45:54 1998 From: ravage at ssz.com (Jim Choate) Date: Thu, 5 Feb 1998 06:45:54 +0800 Subject: Yeltsin: Clinton to cause next World War? [CNN] Message-ID: <199802042244.QAA07241@einstein.ssz.com> Forwarded message: > > YELTSIN: CLINTON'S IRAQ ACTIONS COULD CAUSE WORLD WAR > > Yeltsin Yeltsin warns Clinton against use of force in > Iraq February 4, 1998 > Web posted at: 11:52 a.m. EST (1652 GMT) > > MOSCOW (CNN) -- Russian President Boris Yeltsin on Wednesday issued > the Kremlin's strongest criticism yet of U.S. threats to launch > military strikes against Iraq, saying such action could trigger > another world war. > > "By his actions, (U.S. President Bill) Clinton might run into a > world war," a somber Yeltsin said at a televised meeting in the > Russian capital. > > "He is behaving too loudly on this -- too loudly", Yeltsin said. And > he added, "Well, now (some are saying) let us flood it all with > planes and bombs. No, frankly speaking, it is not like Clinton at > all." > > "One must be more careful in this world saturated with allsorts of > weapons which are sometimes in terrorists' hands," the Kremlin chief > said, occasionally gripping his desktop andgrimacing. "It's all very > dangerous." ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From root at iguana.be Wed Feb 4 15:39:42 1998 From: root at iguana.be (Kris Carlier) Date: Thu, 5 Feb 1998 07:39:42 +0800 Subject: HUMOR: Bill Gates gets it, PRESERVED for the FUTURE! In-Reply-To: <19980204.213032.attila@hun.org> Message-ID: > made my day! yeah right... First of all, Bill Gates was received overhere like a king. He talked to a bunch of ministers, the prince, and above all, he got something that can be considered as the biggest honor one can get: a whipped cream cake in the face. If you're considered unimportant, you don't get one in the face at all. I think he didn't mind though: BG signed a contract with Mr Vanden Brande, the Flemish number one minister, for the PC Kadee project: M$ will -happily- install 40.000 (fourty thousand !!) PC's with their software on it. The project is for K12 and up (pre-college) schools. M$ will not donate this of course, we in Belgium are dumb enough to gladly PAY (a so-called reduced price) for this kind of joke. So no, I'm not too happy at all about this incident. Would have been better if he didn't get this kind of attention. kr= \\\___/// \\ - - // ( @ @ ) +---------------oOOo-(_)-oOOo-------------+ | kris carlier - carlier at iguana.be | | Hiroshima 45, Tsjernobyl 86, Windows 95 | | Linux, the choice of a GNU gener8ion | | SMS: +32-75-61.43.05 | +------------------------Oooo-------------+ oooO ( ) ( ) ) / \ ( (_/ \_) From bill.stewart at pobox.com Wed Feb 4 15:41:31 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Thu, 5 Feb 1998 07:41:31 +0800 Subject: Feds Approve Bank to Certify Digital Signatures Message-ID: <3.0.5.32.19980204153030.0084c570@popd.ix.netcom.com> There was a note to Dave Farber's list that the Office of the Comptroller of Currency has approved Zion's First National Bank to certify digital signatures. Since they're in Utah, Zion's has a certain amount of legal infrastructure in place. The text version of the story is at http://www.occ.treas.gov/ftp/release/98-4.txt and the 20-page PDF with gory details is at http://www.occ.treas.gov/ftp/release/98-4att.pdf They're going to offer digital signature certificates with the usual binding of a key to a body plus papers, and provide software to support it. Some of their software can be used for encryption, and unfortunately they're going to offer key escrow, though as a separate business service, with keys encrypted by the key's corporate owner as well as by the bank for protection, but it's not going to be a mandatory service, and they have no intention of offering escrow for signature keys, only encryption keys. Their documentation does talk a good bit about crypto technology, in layman's terms, and about risk management and Y2000 compliance, and also in great detail about how things like this are standard banking functions applied in a digital environment (to convince the OCC to let them offer it, since they're a bank and aren't supposed to offer non-bank-related services). There's also a story in Network World at http://www.nwfusion.com/news/0202rsa.html about Verisign and Entrust CAs plans for IPOs. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From guttman at media.mit.edu Wed Feb 4 15:54:18 1998 From: guttman at media.mit.edu (Robert H Guttman) Date: Thu, 5 Feb 1998 07:54:18 +0800 Subject: The Continued Attack on Cash (Was: "The Right of Anonymity"...) Message-ID: <199802042348.SAA17496@ml.media.mit.edu> > > "Americans do not buy for quality, they buy for price" > > Which must explain our gross national product, then. Cheaper, > as always, *is* better. > > > as John Ruskin said: > > 1. those who buy for price alone are this man's lawful prey. > > Those who *don't* buy for price alone are usually somebody's > lunch sooner or later. I somehow missed the full thread on this topic, but I disagree that "cheaper, as always, *is* better." There are many markets and situations where people (Americans included) shop by "value" (perceived or otherwise), not just price. This is what VARs and "branding" are about and what enables market power. For example, Gerry Heller, CEO of FastParts - an online auction for semiconductors, was quoted in a recent Forrester Research report as admitting that even in this commodity-like market "availability is more important than price" when it comes to auctioning semiconductors. - Rob ----------------------------------------------------------------- Robert H Guttman voice:617-253-9603 mailto:guttman at media.mit.edu MIT Media Laboratory http://www.media.mit.edu/~guttman Software Agents Group http://ecommerce.media.mit.edu/ Agent-mediated E-Commerce ----------------------------------------------------------------- From attila at hun.org Wed Feb 4 16:19:33 1998 From: attila at hun.org (Attila T. Hun) Date: Thu, 5 Feb 1998 08:19:33 +0800 Subject: Fingerprinting in CA [was Whoa: British SmartCard rollout] In-Reply-To: <199802040323.WAA16673@panix2.panix.com> Message-ID: <19980205.000739.attila@hun.org> -----BEGIN PGP SIGNED MESSAGE----- on or about 980203:2223, in <199802040323.WAA16673 at panix2.panix.com>, Information Security was purported to have expostulated to perpetuate an opinion: > How did you CA cypherpunks feel about being fingerprinted? well, I would have gone up to Nevada to get a license, but they have been doing it longer than CA. now Utah is doing it.... it will be universal before long. when I asked in CA if I could refuse to be fingerprinted, they said; "sure... as long as you dont want a license" --real white of 'em. Utah said basically the same thing. that and they already have us feeling like. when cash is outlawed, only outlaws will have cash. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 Comment: No safety this side of the grave. Never was; never will be iQBVAwUBNNkD37R8UA6T6u61AQGIrgH+JJ0ZcKx52zDG9VKAA1t02Qvlp0D2Jq7A /jx1FBDn0pydATuRVItBXZvv8rP4RjaRgrBqtM7duPDg2MA0ctgWeQ== =nWmP -----END PGP SIGNATURE----- From jya at pipeline.com Wed Feb 4 16:27:31 1998 From: jya at pipeline.com (John Young) Date: Thu, 5 Feb 1998 08:27:31 +0800 Subject: STOA Assessment of Techno-Control Message-ID: <1.5.4.32.19980205002157.006c1454@pop.pipeline.com> We've transcribed the Euro-Parliament STOA report, "An Appraisal of the Technologies of Political Control," 6 January 1998, a portion of which was offered earlier by Axel Horns and Ulf M�ller. http://jya.com/stoa-atpc.htm (295K text + 210K images) Zipped version: http://jya.com/stoa-atpc.zip (314K) It's a grim assessment, revealing more than most of us want to face about the dark side of high technology, especially what the most technologically advanced nations are deploying, and building to sell to the worst of humanity, and how export laws are flaunted to cut criminal deals in defiance of high-minded law and public policy. It demonstrates that he national security heritage continues, sharing military technology with governmental outlaws around the globe. And the US is leading the market. It would be cathartic for this report was widely read, pondered, then acted upon, in the US and globally. Kudos to the European Parliament for sponsoring it. And congratulations to the authors and the beleaguered organizations who've been trying for years to diminish this over civilized madness, to jolt us out of techno-narcosis. There's much in the report that's been discussed here, and much more that has not but deserves to be. The full report is 112 pages, 50 pages of main body, 13 pages of notes and 25 pages of bibliography. We've not yet transcribed the detailed bibliography. As noted earlier, the contents are: Abstract Executive Summary Acknowledgements Tables and Charts 1 Introduction 2 Role and Function of Political Control Technologies 3 Recent Trends and Innovations 4 Developments in Surveillance Technology 5 Innovations in Crowd Control Weapons 6 New Prison Control Systems 7 Interrogation, Torture Techniques and Technologies 8 Regulation of Horizontal Proliferation 9 Conclusions 10 Notes and References 11 Bibliography [Not yet transcribed] Appendix 1. Military, Security & Police Fairs. [Not provided with report] From ravage at ssz.com Wed Feb 4 18:14:44 1998 From: ravage at ssz.com (Jim Choate) Date: Thu, 5 Feb 1998 10:14:44 +0800 Subject: Sun takes over Netscape? [CNN] Message-ID: <199802050211.UAA00178@einstein.ssz.com> Forwarded message: > February 4, 1998: 7:27 p.m. ET > > More related sites... NEW YORK (CNNfn) - Shares of Netscape > Communications Corp. shot up Wednesday amid rumors that the company is > being eyed as a possible takeover target by Sun Microsystems Inc. > [INLINE] The takeover scuttlebut drove Netscape (NSCP) stock up 1-1/16 > to 19-1/4 in active trading. The surge capped a four-day trading > period in which the Internet software company's shares have jumped > roughly 20 percent from a Friday close of 16-1/16. > [INLINE] Despite the leap, Netscape stock remains sharply down in > 1998, having dropped nearly 20 percent in the first 23 trading days of > the year. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From guy at panix.com Wed Feb 4 18:36:03 1998 From: guy at panix.com (Information Security) Date: Thu, 5 Feb 1998 10:36:03 +0800 Subject: Fingerprinting in CA [was Whoa: British SmartCard rollout] Message-ID: <199802050220.VAA21403@panix2.panix.com> How come there is no organized opposition to fingerprinting everyone in the nation? [U.S.-centric talk, but applies to Britain too] There was just a news report on "KidsSafe", a smartcard for holding kids' health details for an emergency. "Eventually, they won't have to carry the card, we can instantly look up the information from their fingerprints". Excerpts from the Cryptography Manifesto follows... BTW, it's finally online! I need to update it for the past 6 months of activity, but... http://www.erols.com/paulwolf/cointelpro/cointel.htm (scroll down) ---- Fingerprinting everyone in the USA - nay, the planet - is a known plot by the NSA: see (the 2nd) "The Body as Password" below. Are we all going to silently roll over and accept this NSA crap??? It's our tax money, but we NEVER got to vote on it. How about some cypherpunk with money challenging it on the basis shown below of violating Privacy Act of 1974? ---guy Sure, government can give debate reasons for requiring fingerprinting for driver's licenses... But it is still a violation of the minimization requirement of the Privacy Act of 1974. Biometric data on citizens is FAR BEYOND any reason government can give. Notice how no citizens in any state ever got to vote on such an important escalation of personal data collection by the government. Indeed, it seems to be accomplished in the quietest way possible, giving citizens the least amount of opportunity to choose their fate. Odd, since tax-payer paid-for government services is what gives them the power. But elected representatives will do, you say? Did you hear any of them mention it during campaigning? Did Alabama elected officials even mention it with their press release of a new driver's license, despite that being the plan? No. What does that tell you? We need a cabinet-level Privacy Commission, with the power to intervene nationwide. Power to protect us little people from fanatical personal data collection. We are losing it piece by piece. Who would have thought the United States would collect fingerprints from all citizens? This is the main way our Federal Government is rolling out the National ID Card, using a Universal Biometric Card: driver's licenses. Divide and Conquer, state by state. It is the beginning of the end. Don't think the biometric driver's licenses are the exact equivalent of a National ID Card? Check out this phrasing from an unimplemented law: # Privacy Journal, By Robert Ellis Smith, October 1983 issue # # Senator Bob Dole wants the government to conduct a three-year study to # unify federal and local requirements for personal identity. # # The bill, S1706, would amend the Federal False Id Act of 1982, to require # a comprehensive identity scheme for the U.S., either THROUGH UPDATING # EXISTING IDs TO BE MORE SECURE, UNIFYING THEM, or creating a new identity # document for all Americans. Collect biometric information from everyone... law enforcement's Evil Holy Grail. * "U.S. Has Plan to Broaden Availability tests of DNA Testing" * By Fox Butterfield, The New York Times, undated but 1996 implied. * * In a little known provision of the Clinton Administration's 1994 Crime * Control Act was a call for the establishment of a nationwide DNA data * bank like the current national system for fingerprints, run by the FBI. * * In the two years since then, 42 states have passed laws requiring prison * inmates give blood or saliva samples for a "DNA fingerprint." * * In a report today, the Justice Department said it is stepping up efforts * to make such DNA biometric capture "as common as fingerprinting" and that * they expect the test in five years to go from $700 each to a mere $10 and * take only hours or minutes to accomplish. And how much hardware is a handheld fingerprint device? * "Lucent in New Identification Joint Venture" * The New York Times, 5/22/97 * * Lucent Technologies [Bell Labs is their research and development arm] and * U.S. Venture Partners said today that they had formed a company that would * make products to help people prove their identities through electronic * fingerprinting technology. * * The first product of the company, Veridicom Inc., will be a postage-size * fingerprint sensor used to retrieve information, authorize purchases or * allow entry into restricted areas. * * The postage-size sensor will measure the ridges and valleys on the skin * when a finger is pressed against a silicon chip, and then check the * measurements against the user's profile. Not big at all, is it? # "Faster, More Accurate Fingerprint Matching" # By Andrea Adelson, The New York Times, October 11 1992 # # "We think there will be a revolution in fingerprinting," said David F. # Nemecek, a deputy for the FBI's Information Service Division. # # The next step is for manufacturers to make a single-finger mobile scanner # for use in patrol cars. Some FBI cars are expected to get them next year. $ "The Body As Password", By Ann Davis, Wired Magazine, July 1997 $ $ In October 1995, the Federal Highway Administration awarded a $400,000 $ contract to San Jose State University's College of Engineering to develop $ standards for a "biometric identifier" on commercial driver's licenses and $ for use in a centralized national database. A centralized national database of biometric information for cross-state driver's licenses, and all individual state driver's license fingerprints available via the FBI's NCIC. * "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5 * * News reports indicate that, like California, practically all of the 50 * states are in the process of installing news systems for drivers licenses, * often incorporating biometric measurements such as digitization of finger- * prints. That these systems are linked together gives us an indication of * the powerful grip our hidden controllers have on this nation. * * All federal agencies are being integrated into this data net. These Police * State agencies constitute a clear and present danger, not only to the * privacy and constitutional rights of Americans but to our very lives! * * A Hitler, a Pol Pot, or a Stalin would have loved to have had the * microchips, surveillance cameras, lasers, computers, satellites, weapons, * wiretap circuits and communications gadgetry of today's Dick Tracy Police * State. * * Perhaps FBI Director Louis Freeh said it best shortly after his * appointment to the Federal Bureau of Investigation in 1993. Referring * to the incredible array of computerized control and battle gadgetry * available to federal law enforcement, Freeh, stressing cooperation * between his own FBI and the other alphabet police agencies, sardonically * remarked, "LET'S SHARE OUR TOYS." * * Dick Tracy, of course, was a good guy. But Dick Tracy would have * recognized as unconstitutional the worldwide comprehensive Orwellian * system that has been installed, and reject it as a menace to true law * and order. ! "Welfare Recipients Lose Benefits Through Glitches in Computers" ! By Joe Sexton, The New York Times, 5/16/96 ! ! The fingerprint-imaging system that is a central element of the Giuliani ! administration's effort to crack down on welfare fraud has resulted in ! hundreds of recipients cases being closed. ! ! The public advocate's office has been inundated with complaints from ! improper case closings. ! ! The failure seems to stem from the local offices not transmitting the ! fingerprints to Albany's central computer. This resulted in AUTOMATICALLY ! TERMINATING BENEFITS OF PEOPLE THE COMPUTER THOUGHT WERE NOT FINGERPRINTED. ---- Prior to the fingerprint "final solution" of control over us, there were other attempts---which would have required a vote---which tried to roll out a National ID Card. * "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5 * * Since total and absolute control can be obtained only by a Police State * bureaucracy, efforts have escalated in recent years to require a National * ID Card. * * Upon Bill Clinton's election as President, Secretary of Health and Human * Services Donna Shalala and Massachusetts Senator Edward Kennedy jointly * developed a $100 million plan to require all children and babies to have * a dossier established in a national computer registry to insure "universal * mandatory vaccinations." * * When patriotic Americans rose up to protest, the U.S. Senate quietly * shelved the deceptive Shalala-Kennedy proposal. * * The Clinton administration next surfaced with its mandatory health care * plan. A key component of this plot to socialize medical care was the * requirement of a computer I.D. card for every American, linked to a master * computer network. * * Martin Anderson, writing in The Washington Times: * * President Clinton held the pretty red, white and blue "smart card" in * his hand when he addressed the nation, proudly waving it like a small * American flag. * * Only it wasn't a flag; it was a "health security card"---his slick * name for a national identity card. Under his plan a new National * Health Board would establish "national, unique identifier numbers" * for every single one of us. * * Fortunately, President Bill Clinton's healthcare scam never made it * into law. Sadly, few of the complainers were upset about the potential * for abuse by Big Brother. * * Shortly after being elected, one Clinton advisor promoting the biochip * 'mark' is Dr. Mary Jane England, a member of Hillary Clinton's ill-fated * socialized, national healthcare initiative. Addressing a conference * sponsored by computer giant IBM [IBM's Lotus division takes hand biometrics * of employees who use their childcare facilities] in Palm Springs, * California, in 1994, England not only endorsed the proposed mandatory * national I.D. smart card, but went one scary step further: * * The smart card is a wonderful idea, but even better would be the * capacity to not have a card, and I call it "a chip in your ear," * that would actually access your medical records, so that no matter * where you were, even if you came into an emergency room unconscious, * we would have some capacity to access that medical record. * * We need to go beyond the narrow conceptualization of the smart card * and really use some of the technology that's out there. * * California Governor Pete Wilson has actively stumped for a National I.D. * Card system, using the straw man of California's pervasive immigration * problem. California Senators Diane Feinstein and Barbara Boxer support * it too. The latest proposal is to mandate I.D. cards for all school * children under the Goals 2000 national education program. Another plan * by the U.S. Labor Department would have required it for all users of a * National Job Training and Employment database. * * George Orwell, in 1984, his classic novel of Big Brother and a coming * totalitarian state, observed that very few people are awake and alert * to the machinations and manipulations of the controllers. Thus, the * people, as a whole, fall victim to a colossal conspiracy out of ignorance * and because of apathy and denial of reality: * * The people could be made to accept the most flagrant violations of * reality, because they never fully grasped the enormity of what was * demanded of them, and were not sufficiently interested in public * events to notice what was happening. [ By Walter Cronkite: "Orwell's '1984'---Nearing?", NYT, June 5 1983 In our world, where a Vietnam village can be destroyed so it can be saved; where the President names the latest thing in nuclear missiles "Peacekeeper"---in such a world, can the Orwellian vision be very far away? Big Brother's ears have plugs in them right now (or they are, by law, supposed to), at least on the domestic telephone and cable traffic. But the National Security Agency's ability to monitor microwave transmissions, to scoop out of the air VAST numbers of communications, including telephone conversations, store them in computers, play them back later, has a truly frightening potential for abuse. George Orwell issued a warning. He told us that freedom is too much taken for granted, that it needs to be carefully watched and protected. His last word on the subject was a plea to his readers: "Don't let it happen. It depends on you." ] * * The National Security Agency's Project L.U.C.I.D., with all its * technological wizardry, is a future, planetary dictator's dream---and a * Christian and national patriot's nightmare. Someday, the Holy Bible * prophesies, that planetary dictator will emerge on the scene, lusting * for blood... * * There can be no doubt about it. * * The REAL Chief Executive Officer of the NSA is not a human being. * * The CEO MUST be Lucifer himself. Amen. ---- It is technology driving the capabilities, it is our government using them ruthlessly: without letting us vote on it. Never before could someone walk up to you and number you by scanning your fingerprints. A number that is yours and yours alone. You have been numbered for all time. No ID card needed once portable fingerprint scanners are deployed all over! If the government suddenly ordered all citizens to be numbered with an indelible invisible ink on their arms so they were permanently numbered; so law enforcement could scan them at will: there would be a revolt. Yet that is what is happening. Fingerprints, scanned into a computer, are a number. The number is inescapably yours. Modern technology means they don't have to put the number on you, they can read it off of you by minutely examining your body. And: it is the NSA driving the fingerprint-rollout of the national ID card. # "The Body As Password", By Ann Davis, Wired Magazine, July 1997 # # Currently housed at the National Security Agency, a working group of # federal bureaucrats founded the Biometric Consortium in the early 1990s. # Its 1995 charter promises to "promote the science and performance of # biometrics for the government." # # Consortium mumbers include state welfare agencies, driver's license # bureaus, the Immigration and Naturalization Service, the Social Security # Administration, and the Internal Revenue Service. If my attempts to show how bad a thing this is have been too rambling, too abstract, here is a simple and accurate analogy: * "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5 * * It was Martin Anderson who, in his book, Revolution, revealed that during * the Reagan administration during the 1980s, several top cabinet officials * were urging President Ronald Reagan to implement a computerized National * I.D. Card. * * The rationale for the proposal was that such a system would help put a lid * on illegal immigration. [Reagan had been Governor of California] * * But Anderson, who at the time was a domestic advisor to the President and * sat in on this particular cabinet meeting, spoke up and gave the group * something to think about. * * "I would like to suggest another way that I think is a lot better," he * told them, serious in demeanor but clearly being facetious. "It's a lot * cheaper, it can't be counterfeited. It's very lightweight, and it's * impossible to lose. It's even waterproof." * * "All we have to do," Anderson continued, "is tattoo an identification * number on the inside of everybody's arm." * * His reference was to the tattooing of numbers on victims in Nazi * concentration camps. Survivors still bear the dreaded tattoo markings * to this day. * * Mr. Anderson described the stunned reaction of those present, "There were * several gasps around the table. A couple cabinet members looked as if they * had been slapped. No one said anything for a long time." * * Ronald Reagan, a consummately wise politician who professed a belief in * Bible prophecy, caught the implication [about The Mark of the Devil]. * * He then hushed the cabinet and efficiently dismissed the National ID Card * proposal by sardonically remarking, "Maybe we should just brand all babies." "Those that give up essential liberty for a little security, deserve neither liberty nor security." - Ben Franklin "When ID's are mandatory, it is time to leave the planet." - Robert Heinlein * "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5 * * In the November 1994 publication of the FBI Law Enforcement Bulletin, * the FBI advocated BIOMETRIC CAPTURE FOR ALL NEWBORN BABIES AND * SIMULTANEOUSLY THEIR MOTHERS. From ravage at ssz.com Wed Feb 4 19:37:01 1998 From: ravage at ssz.com (Jim Choate) Date: Thu, 5 Feb 1998 11:37:01 +0800 Subject: Rogue root domain reconfiguration [CNN] Message-ID: <199802050334.VAA00469@einstein.ssz.com> Forwarded message: > ADMINISTRATION SAYS INTERNET RECONFIGURATION WAS ROGUE TEST > > graphic February 4, 1998 > Web posted at: 9:29 p.m. EST (0229 GMT) > > WASHINGTON (AP) -- The Clinton administration said Wednesday it was > confident a researcher in California won't repeat his rogue > reconfiguration of the Internet -- a test that few users noticed but > that raised concerns about how the worldwide network is run. > > Jon Postel, who runs the Internet Assigned Numbers Authority at the > University of Southern California under a Defense Department > contract, last week redirected half the Internet's 12 > directory-information computers to his own system. > > Normally, those so-called "root servers" help users find addresses > on the Internet by pulling data from Network Solutions Inc., a > private company in northern Virginia that operates under a federal > government contract. From Site.Feedback at FT.com Wed Feb 4 19:52:26 1998 From: Site.Feedback at FT.com (Site.Feedback at FT.com) Date: Thu, 5 Feb 1998 11:52:26 +0800 Subject: FT.com Registration Message-ID: <9802050344.AA44748@svr1en0.ft.com> This mail is to confirm your registration with FT.com, the Financial Times' web site. Please keep this note of your username and password in a safe place to look up should you forget them. If you have any problems getting into and around the site at any time please first try our help pages at http://www.ft.com/about/index.htm . These are open pages which don't require you to log in. If after reading them you still have difficulties, then contact us by email at site.feedback at ft.com . User name - hackworth Password - writecode The Internet Team @ FT.com. From marshall at ibm.net Wed Feb 4 19:53:32 1998 From: marshall at ibm.net (James F. Marshall) Date: Thu, 5 Feb 1998 11:53:32 +0800 Subject: Changing to Moderated Cypherpunks -- How? Message-ID: <199802050343.DAA46984@out5.ibm.net> -----BEGIN PGP SIGNED MESSAGE----- Too much noise in the unedited list. How does one change to the moderated list? - -- James F. Marshall, Esq., Pasadena, California Subject "JFM Public Key" for PGP Public Key - -- OS/2 is to Windows as Stradivarius is to Yamaha -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBNNf8UjbjGennrhqZAQETXgP/WFshRowrhi7qMnUZHUIADA7cCV0fEYFA WiAlynovwU9dyvc/gygz9N6aeJO/ghqiQl2/NqCSsKn5H1nTr1MHbK2iYJwt6AXh ZhMSfz5p1QzVWwm9lIFETipPayuJ+WzCkaakMZP3PPZXG8XUT/48NZG5hJgjfIM7 vqzMkCcHr+A= =2N5t -----END PGP SIGNATURE----- From nobody at REPLAY.COM Thu Feb 5 12:17:41 1998 From: nobody at REPLAY.COM (Anonymous) Date: Thu, 5 Feb 1998 12:17:41 -0800 (PST) Subject: Changing to Moderated Cypherpunks -- How? In-Reply-To: <199802050343.DAA46984@out5.ibm.net> Message-ID: <199802052017.VAA02584@basement.replay.com> On Thu, 5 Feb 1998 07:24:11 -0500 Anonymous wrote: >>Too much noise in the unedited list. >> >>How does one change to the moderated list? > >Easy > > Wow! Thanks for that tip! The cypherwatch list looks great. I suggest you all subscribe now!! :-) From dlv at bwalk.dm.com Wed Feb 4 20:23:58 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Thu, 5 Feb 1998 12:23:58 +0800 Subject: Changing to Moderated Cypherpunks -- How? In-Reply-To: <199802050343.DAA46984@out5.ibm.net> Message-ID: <5aueke19w165w@bwalk.dm.com> "James F. Marshall" writes: > Too much noise in the unedited list. > > How does one change to the moderated list? You ask John Gilmore and Sandy Sandfart if you can suck their cocks. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From ravage at ssz.com Wed Feb 4 20:36:04 1998 From: ravage at ssz.com (Jim Choate) Date: Thu, 5 Feb 1998 12:36:04 +0800 Subject: Fingerprinting... Message-ID: <199802050435.WAA00790@einstein.ssz.com> Hi, Check out 'Super Cop' on TLC... ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From guy at panix.com Wed Feb 4 21:20:11 1998 From: guy at panix.com (Information Security) Date: Thu, 5 Feb 1998 13:20:11 +0800 Subject: Changing to Moderated Cypherpunks -- How? Message-ID: <199802050505.AAA01452@panix2.panix.com> Dimitry "I've been like this since my prostrate operation" The Dim wrote: > You ask John Gilmore and Sandy Sandfart if you can suck their cocks. I'd be glad to handle it. The only criteria is to delete Dr. Dim and his nyms. Would toad.com give me a mail hook to send back to, or am I supposed to setup my own majordomo? First: how many people are interested? I suppose I could split it in two: the other for actual crypto comments. I'd not suggest it myself, because our concerns have to be wider than just that. Regarding everyone in the US being fingerprinted in a sneakily-rolled-out manner: CCC... We can't encrypt our fingerprints, dammit. ---Information Security From wombat at mcfeely.bsfs.org Wed Feb 4 21:27:04 1998 From: wombat at mcfeely.bsfs.org (Rabid Wombat) Date: Thu, 5 Feb 1998 13:27:04 +0800 Subject: Airline ticket information -- help In-Reply-To: Message-ID: Or you could just call up the airline and pretend you are Tim May, and they will tell you. ;) On Mon, 2 Feb 1998, Tim May wrote: > At 9:55 AM -0800 2/2/98, Declan McCullagh wrote: > >I'm trying to find out what airline flight someone is taking. I have a name > >and know the general travel plans and likely date. How can I find out the > >airline, flight number, and seat number? This is somewhat urgent. (You have > >my assurance that the purpose is legit.) > > > >If anyone has any ideas, I'd appreciate the help. > > Monica Lewinski and William Ginsburg are travelling on American Airlines > Flight 420 on Wednesday, 4 February, departing Dulles Airport at 10:45 > a.m., EST, and arriving LAX at 3:35 p.m., PST. > > Good luck reporting on them, Declan! > > > --Tim May From ravage at ssz.com Wed Feb 4 21:28:26 1998 From: ravage at ssz.com (Jim Choate) Date: Thu, 5 Feb 1998 13:28:26 +0800 Subject: Changing to Moderated Cypherpunks -- How? (fwd) Message-ID: <199802050525.XAA01010@einstein.ssz.com> Forwarded message: > Date: Thu, 5 Feb 1998 00:05:08 -0500 (EST) > From: Information Security > Subject: Re: Changing to Moderated Cypherpunks -- How? > I'd be glad to handle it. > > The only criteria is to delete Dr. Dim and his nyms. > > Would toad.com give me a mail hook to send back to, > or am I supposed to setup my own majordomo? I'll provide you a feed if you find that acceptable, unfortunately I am not able to provide an account on SSZ to run it off of. My suspicion is that you'll need a majordomo or similar remailer package (possibly with procmail for duplicate filtering). I also strongly suggest you get your feed as a CDR member and not a subscriber to a given list. That way if one node goes down it won't leave you out in the cold (necessarily). You also probably don't want to use a system that hosts a CDR node in case that site drops off the net. Good luck. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From 42412260 at via.net Thu Feb 5 14:28:16 1998 From: 42412260 at via.net (42412260 at via.net) Date: Thu, 5 Feb 1998 14:28:16 -0800 (PST) Subject: Lose Weight - FAST & EASY, with "The PATCH" Check it out!! Message-ID: <8241033777bur.543167.fpes> In an ongoing study, 100 people between the ages of 19-67 who weighed 17 - 163 pounds in excess of their normal body weight, LOST weight! 56% of those in the study, LOST at least 20 pounds. FAST & EASY. Just apply "The Patch" to your arm, and LOSE weight! From cypherlist-watch-owner at joshua.rivertown.net Thu Feb 5 15:08:15 1998 From: cypherlist-watch-owner at joshua.rivertown.net (Cypherlist-Watch Moderator) Date: Thu, 5 Feb 1998 15:08:15 -0800 (PST) Subject: Changing to Moderated Cypherpunks -- How? In-Reply-To: <199802050343.DAA46984@out5.ibm.net> Message-ID: FYI, here is the welcome message from cypher-list watch. If you are interested, subscription details follow at the end of the message. ================================================================ The CYPHER-LIST WATCH PLEASE retain this message for future reference. When you need to unsubscribe, change your address for purposes of the list or reach the list owner for an administrative request, you will find this message valuable. About the list: The Cypher-list watch is a digest only list featuring information regarding many aspects of privacy in the electronic age, such as encyption technology, electronic privacy, anonymous remailers and related issues. The posts from the list may originate from other mailing lists to cover the broad topics featured on the list. All material forwarded is done so with prior consent of the origining list owner. The list is suitable for many levels of user. Sometimes the topics will be *very* technical; others may just be *very* interesting! (Many will hopefully be both!) ----------------------------------- CYPHER WATCH IS MODERATED! In order to maintain a high level of quality, this is a moderated list. If you have ever subscribed to a mariginally informative list, I am sure you will appreciate the decision to present this material in this format. The listowner spends innumerable hours every week culling through every post from a pletorea of mailing lists to bring you the best of each. The concept of the list could not be delivered in any other format. One way to think of this as a Cypherpunk list without the noise! If you want to stay informed but you don't want to wade through 20 messages to read one useful post, this list is for you. Of course, moderating a list such as this involves a level of judgment, as the Cypherlist Watch will not be a mere repetition of its origniating lists. As such, some topics listmembers may think are important may not be covered or may not be covered in the depth a member desires. List members should feel free to bring such matters to the list owners attention, however, the decision of the listowner redarding the topics to be feature is final. ------------------------------ Administrivia: Submissions should be directed to the moderator at: If a post is rejected I may or may not give a reason. As long as you use your common sense there should be no problems. Attacks on idividuals or companies are not permitted, so don't do it! Continued requests to post previously rejected material may also result in your being unsubscribed from the list. To contact the list owner in an emergency (Unsubscription requests are *not* an emergency). How to Subscribe/Unsubscribe: Receive future messages sent to the cypherlist-watch mailing list. Stop receiving messages for the cypherlist-watch mailing list. Alternatively, you can e-mail: cyperlist-watch-digest-request at joshua.rivertown.net and put 'subscribe' or 'unsubscribe' on the "Subject:" line. Resources: Applied Cryptography (2nd edition) by Bruce Schneier; published by John Wiley & Sons, Inc.; ISBN 0-471-11709-9. PGP Users list and web site http://pgp.rivertown.net/ ================================================================ ================================================================ From aba at dcs.ex.ac.uk Thu Feb 5 05:21:15 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Thu, 5 Feb 1998 21:21:15 +0800 Subject: Changing to Moderated Cypherpunks -- How? In-Reply-To: <199802050505.AAA01452@panix2.panix.com> Message-ID: <199802051047.KAA01376@server.eternity.org> Information Security > I'd be glad to handle it. > > The only criteria is to delete Dr. Dim and his nyms. How are you going to recognize Dimitri's nyms if he has any. Adam From ravage at ssz.com Thu Feb 5 06:23:53 1998 From: ravage at ssz.com (Jim Choate) Date: Thu, 5 Feb 1998 22:23:53 +0800 Subject: update.357 (fwd) Message-ID: <199802051415.IAA01650@einstein.ssz.com> Forwarded message: > Date: Wed, 4 Feb 1998 11:01:53 -0500 (EST) > From: physnews at aip.org (AIP listserver) > Subject: update.357 > > A QUANTUM TUNNELING TRANSISTOR, an on-off switch > that exploits an electron's ability to pass through normally > impenetrable barriers, has been built by Sandia researchers (Jerry > Simmons, 505-844-8402), opening possibilities for record-speed > transistors that can be mass-produced with current nanotechnology. > In their device, the researchers control the flow of electrons > between two GaAs layers (each only 15 nm thick) separated by an > AlGaAs barrier (12 nm). Although the electrons in GaAs > ordinarily do not have enough energy to enter the AlGaAs barrier, > the layers are so thin (comparable in size to the electron > wavelength) that the electrons, considered as waves rather than > particles, can spread into the barrier and, with an appropriate > voltage applied, out the other side. In the process, the electron > waves do not collide with impurity atoms, in contrast to a > traditional transistor's particlelike electrons, which are slowed > down by these collisions. Transistors that switch on and off a > trillion times per second--5 times faster than the current record--are > possible with this approach. Although quantum tunneling > transistors were first built in the late 1980s, it was originally > infeasible to mass-produce them. Previous researchers engraved > the ultrathin GaAs and AlGaAs features side-by-side on a surface, > something hard to do reliably with present-day lithography. > Therefore the Sandia researchers stacked the features vertically, by > using readily available techniques such as molecular beam epitaxy > which can deposit layers of material with single-atom thicknesses. > Having made quantum-tunneling memory devices and digital logic > gates operating at 77 K, the researchers expect room-temperature > devices in the next year. (J.A. Simmons et al., upcoming article > in Applied Physics Letters; figure at > www.aip.org/physnews/graphics) > [text deleted] ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From cyber at ibpinc.com Thu Feb 5 06:25:34 1998 From: cyber at ibpinc.com (Roger J Jones) Date: Thu, 5 Feb 1998 22:25:34 +0800 Subject: No Subject Message-ID: <199802051403.IAA12716@pc1824.ibpinc.com> > > > I'm here to ask > > > As you'll soon see > > > Did you grope > > > Miss Lewinsky? > > > Did you grope her > > > in your house? > > > Did you grope > > > Beneath her blouse? > > > > > > I did not do that > > > Here nor there > > > I did not do that > > > Anywhere! > > > I did not do that > > > Near nor far > > > I did not do that > > > Starr-You-Are. > > > > > > Did you smile? > > > Did you flirt? > > > Did you peek > > > Beneath her skirt? > > > And did you tell > > > The girl to lie > > > When called upon > > > To testify? > > > > > > I do not like you > > > Starr-You-Are > > > I think that you > > > Have gone too far. > > > I will not answer > > > Anymore > > > Perhaps I will go > > > Start a war! > > > > > > The public's easy > > > To distract > > > When bombs are > > > Falling on Iraq! > > > > > > From ajhh4 at worldnet.att.net Thu Feb 5 23:09:02 1998 From: ajhh4 at worldnet.att.net (ajhh4) Date: Thu, 5 Feb 1998 23:09:02 -0800 (PST) Subject: No Subject Message-ID: <19943672.886214@relay.comanche.denmark.eu> Authenticated sender is Subject: Friday Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit EMAIL MARKETING WORKS!! Bull's Eye Gold is the PREMIER email address collection tool. This program allows you to develop TARGETED lists of email addresses. Doctors, florists, MLM, biz opp,...you can collect anything...you are only limited by your imagination! You can even collect email addresses for specific states, cities, and even countries! All you need is your web browser and this program. Our software utilizes the latest in search technology called "spidering". By simply feeding the spider program a starting website it will collect for hours. The spider will go from website to targeted website providing you with thousands upon thousands of fresh TARGETED email addresses. When you are done collecting, the spider removes duplicates and saves the email list in a ready to send format. No longer is it necessary to send millions of ads to get a handful of responses...SEND LESS...EARN MORE!!! A terrific aspect of the Bull's Eye software is that there is no difficult set up involved and no special technical mumbo-jumbo to learn. All you need to know is how to search for your targeted market in one of the many search engines and let the spider do the rest! Not familiar with the search engines? No problem, we provide you with a list of all the top search engines. Just surf to the location of a search engine on your browser then search for the market you wish to reach...it's that easy! For instance if you were looking for email addresses of Doctors in New York all you would do is: 1) Do a search using your favorite search engine by typing in the words doctor(s) and New York 2) Copy the URL (one or more)...that's the stuff after the http://... for instance it might look like http://www.yahoo.com/?doctor(s)/?New+York 3) Press the START button THAT's IT!!! The Bull's Eye spider will go to all the websites that are linked, automatically extracting the email addresses you want. The spider is passive too! That means you can let it run all day or all night while you are working on important things or just having fun on your computer. There is no need to keep a constant watch on it, just feed it your target market and give it praise when it delivers thousands of email addresses at the end of the day! Features of the Bull's Eye Software: * Does TARGETED searches of websites collecting the email addresses you want! * Collects Email addresses by City, State, even specific Countries * Runs Automatically...simply enter the Starting information, press The Start Button, and it does the rest * Filters out duplicates * Keeps track of URLs already visited * Can run 24 hours per day, 7 days per week * Fast and Easy List Management * Also has built in filtering options...you can put in words that it "Must" have while searching,...you can even put in criteria that it "Must NOT Have"...giving you added flexibility * Also imports email addresses from any kind of files (text files, binary files, database files) * List editor handles Multiple files to work on many lists simultaneously * Has a Black-Book feature... avoid sending emails to people who do not want to receive it * Built-in Mail program...send email directly on the internet with just a click of your mouse * Personalized Emails...if the email address has the user's name when it is collected,..you can send Personalized emails!!! * Sort by Location, Server, User Name, Contact Name * Advanced Operations: � Email address lists export in many different formats (HTML, Comma delimited, text file) � Advanced editing...Transfer, Copy, Addition, Delete, Crop, Move to Top/Bottom � Operations between lists...Union, Subtraction, Comparison * Program is Passive,...meaning you can run other programs at the same time CALL FOR MORE INFORMATION 213-980-7850 CALL FOR MORE INFORMATION 213-980-7850 ORDERING INFORMATION Customer Name Company Name Address City State Zip Phone Fax Email Address ______ BULL'S EYE SOFTWARE $259.00 Includes Software, Instructions, Technical Support ______ Shipping & Handling (2-3 Day Fedex) $10.00 (Fedex Overnite) $20.00 ______ TOTAL (CA Residents add applicable sales tax) *All orders are for Win 95 and Win NT *****CREDIT CARDS ACCEPTED***** MASTERCARD VISA AMEX PLEASE CALL 213-980-7850 to process your order 9am-5pm Pacific Time Checks or Money Orders send to: WorldTouch Network Inc. 5670 Wilshire Blvd. Suite 2170 Los Angeles, CA 90036 Please note: Allow 5 business days for all checks to clear before order is shipped. From mark at unicorn.com Thu Feb 5 08:36:19 1998 From: mark at unicorn.com (mark at unicorn.com) Date: Fri, 6 Feb 1998 00:36:19 +0800 Subject: the best justice money can buy --Lessig Message-ID: <886695836.699.193.133.230.33@unicorn.com> Atilla wrote: >no, in fact, if there were a free market remedy for M$' >monopoly, I would be in favour of it --and there is _no_ >free market remedy and failure to act promptly >conceivably wipe out all, or virtually all, of the >viable competitors. Of course there's a free-market remedy for Microsoft; eliminate copyright. If anyone can copy Microsoft software for free, it would be forced to compete on real benefits rather than installed base. This is why I have no sympathy with those who claim Microsoft is the victim in the anti-trust suits, even though I'm opposed to such action in general; those whose profits depend on the 800-pound gorilla can hardly complain when it falls on them. Mark From ravage at ssz.com Thu Feb 5 08:41:09 1998 From: ravage at ssz.com (Jim Choate) Date: Fri, 6 Feb 1998 00:41:09 +0800 Subject: the best justice money can buy --Lessig (fwd) Message-ID: <199802051634.KAA02262@einstein.ssz.com> Forwarded message: > Date: Thu, 5 Feb 1998 08:23:58 -0800 (PST) > From: mark at unicorn.com > Subject: Re: the best justice money can buy --Lessig > Of course there's a free-market remedy for Microsoft; eliminate copyright. If > anyone can copy Microsoft software for free, it would be forced to compete > on real benefits rather than installed base. If there were no copyright nobody would have any reason to market software or much else for that matter. I would predict that much of the technology and infrastructure we have now wouldn't exist. It would also stiffle creativity and new methodologies because there would be no profit in it to recoup development costs. Those who would survive in such a market would be the 800-lb gorillas because only they would have the resources to squash the smaller companies. Free markets monopolize. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From jim.burnes at ssds.com Thu Feb 5 08:46:43 1998 From: jim.burnes at ssds.com (Jim Burnes) Date: Fri, 6 Feb 1998 00:46:43 +0800 Subject: Fingerprinting in CA In-Reply-To: <19980205.000739.attila@hun.org> Message-ID: <34D9EBBB.EF470B19@ssds.com> Attila T. Hun wrote: > > -----BEGIN PGP SIGNED MESSAGE----- > > on or about 980203:2223, in <199802040323.WAA16673 at panix2.panix.com>, > Information Security was purported to have > expostulated to perpetuate an opinion: > > > How did you CA cypherpunks feel about being fingerprinted? > > well, I would have gone up to Nevada to get a license, but they > have been doing it longer than CA. now Utah is doing it.... > it will be universal before long. when I asked in CA if I could > refuse to be fingerprinted, they said; "sure... as long as you > dont want a license" --real white of 'em. Utah said basically > the same thing. > If your interested in this problem, I believe that the Georgia wing of the EFF is mounting a campaign against fingerprinting on driver's licenses. Can't remember the URL for it though... jim burnes From sunder at brainlink.com Thu Feb 5 08:53:33 1998 From: sunder at brainlink.com (sunder) Date: Fri, 6 Feb 1998 00:53:33 +0800 Subject: Changing to Moderated Cypherpunks -- How? In-Reply-To: <199802050343.DAA46984@out5.ibm.net> Message-ID: <34D9E920.7BF3739B@brainlink.com> James F. Marshall wrote: > Too much noise in the unedited list. > How does one change to the moderated list? Hi there, as requested, here's some info about the filtered cypherpunks list which I run (by hand with the help of a couple of mailbots) This list is NOW running from: sunder at sundernet.com GZIPped versions of the digests are available from: http://www.sundernet.com/fdigest.html Basically, I use the 'bots to keep the list of recipients, then forward any message to this list of usernames which I find interesting, and usually noise-free... Since, I do this by hand, AND since there is no majordomo mailing list software, and since I get a lot of mail, it's a good idea to make sure the subject of any messages you send to me stand out. i.e. make the subject line: "***000 Personal junk mail for the human, not the bots ***" (The 0's are there to make sure that when Pine sorts the messages on this side, they come up on top, making sure I'll see them immediatly.) There is no automated filtering of any sort... Whatever message I find to be interesting, news-worthy, or technical (theoretical crypto, actual code, etc) gets handed over to the bots, which send it to this list. If you use some sort of filtering program to move messages to a folder, look for the string "FCPUNX:" (without quotes) in the subject field. There will usually be a propagation delay of one day to a week days - sometimes as long as two weeks between the messages on the actual cypherpunks list, and this filtered one. This is because I may not always get the chance to log in every day, and also because I may have to wade through tons of noise/spam/flames from the real list. :-) Occasionally, if I see something interesting from another list (such as Cyber Rights, coderpunks, etc) I will forward it here if I feel that it pertains to Cypherpunk interests, or that you'd like to see it. You should unsubscribe yourself from the real list by sending an "unsubscribe cypherpunks" message to majordomo at toad.com - that is send a message with no subject and just that single line - no signature either, so as to unsubscribe. - Unless you wish to continue to receive messages from the real list as well as copies of those messages from here. :-) All filtering is again according to my whims so if you dislike what I send you, sorry. I might eventually work something out where this list will be broken up into many tiny lists so you'd subscribe to whatever subjects you're interested in. This is a free service, no strings attached, just tons o'mail, but less mail than the unfiltered list... Also note that the bots I run may sometimes be slightly buggy and may do unexpected weird things. Appologies in advance if this happens. But please by all means do report any such runaway bot occurances. If you wish to unsubscribe yourself from this list, just send a message with the subject "unsubscribe fcpunx" (no quotes) and the next time I log in, one of the bots will handle the ubsubscribe. You can re-subscribe yourself as many times as you like, you'll only get one copy of each message, but as many copies of the request response as you've sent.The 'bots hone in on your address and send mail only there, so subscribe yourself from whatever account you want to receive mail. If by accident you subscribe from two different machines, the bots won't know the difference and you'll get two copies of each filtered message, so be careful. This also means that you can only unsubscribe yourself from the same address you subscribed from. To get help, send a message with the subject "help fcpunx." To subscribe yourself (if you see this, you are subscribed) send a message with the *SUBJECT* "subscribe fcpunx" NOTE: THE BOTS ONLY RESPOND TO THE SUBJECT LINE, NOT TO TEXT IN THE BODY OF YOUR MESSAGE! The bots only look at your message's subject and your mailing address so it doesn't matter what you put in the body. Whenever the 'bots honor a request from you, you'll see a response mailed from them (under my name.) Since the bots are only active when I log in and run them by hand, the message acknowledging your request may take several days to get to you. *ALL COMMANDS MUST BE SENT IN THE SUBJECT OF THE MESSAGE! The body (text) of the message are ignored. Commands available: subscribe fcpunx - subscribes you to the list and you are visible to fcpunx who requests subscribe invisible fcpunx - subscribe but don't let others know digest fcpunx - receive the digest version (visibly) digest invisible fcpunx - receive the digest invisibly unsubscribe fcpunx - unsubscribe from the list or digest undigest fcpunx who fcpunx - receive a list of (visible) subscribed users * THIS IS DISABLED CURRENTLY FOR PRIVACY PROTECTIONS OF THE SUBSCRIBERS ON THIS LIST * help fcpunx - sends a help file (you're looking at it) If you're already subscribed to the list and want to switch to the digest version, you can do this by sending a digest fcpunx message; the reverse is also true. Notice that you cannot subscribe to both the digest and the list. Sorry. If you'd like that feature either use two different accounts to receive them, or complain to me and I'll add it in. The unsubscribe and undigest commands do the same thing, they take you off the list no matter which version you're subscribed to. Note: I do not claim any responsability for the content, fitness to a purpose or usefulness of any of the messages forwarded to, archived to, or stored on this web site. The responsability of these messages lies solely on the shoulders of their respective authors. No attempt is made at censoring this information for or from a legal standpoint. This information is relayed to you as an expression of the First Amendment of the Constitution of the United States of America. Certain restrictions may apply depending on your locale, the political nature of your respective governments, etc. Any copyrighted information forwarded by this filtering service is the property of its owners and/or creators. The original senders of these messages are responsible for their content, etc. This filtering services disclaims all such responsability. Should you take offense to any of the messages forwarded by this service, take it up with the original posters of the messages. You may also unsubscribe from this service. Subscription to this filtering services means acceptance to these terms and disclaimers. ============================================================================= + ^ + | Ray Arachelian |FL| KAOS KERAUNOS KYBERNETOS |==/|\== \|/ |sunder at brainlink.com|UL|__Nothing_is_true,_all_is_permitted!_|=/\|/\= <--+-->| ------------------ |CG|What part of 'Congress shall make no |=\/|\/= /|\ | Just Say "No" to |KA|law abridging the freedom of speech' |==\|/== + v + | Janet Reno & GAK |AK| do you not understand? |======= ===================http://www.brainlink.org/~sunder/========================= ActiveX! ActiveX! Format Hard drive? Just say yes! From eureka at eureka.abc-web.com Fri Feb 6 01:39:29 1998 From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com) Date: Fri, 6 Feb 1998 01:39:29 -0800 (PST) Subject: Eureka! Fri Feb 6 '98 Message-ID: <19980206082121.11843.qmail@eureka.abc-web.com> Welcome to Friday's issue of Eureka! PLAYGAL This is truly a breathtaking site. Well-designed and easy to use with excellent content. The tour alone has hotter porn than many other 'free' sites - go see it now. It's explicit, comprehensive and top quality. There are 2,000 video feeds online, free live fucking with sound, 10,000 erotic stories, 1,000s of top quality pix, adult and arcade games, real ama- teur competitions and much more. Click now and be astounded! Playgal --> http://www.playgal.com/playgal/banner_email.html Ultra Hardcore -FREE XXX Samples - We push the limit of legal pictures! http://www.ultrahardcore.com/ultracash/ultracash.cgi?eureka2 Get FREE XXX Samples from *ultrahardcore.com*. We have exclusive Max Hardcore pictures - that's right - Fisting, Spread Assholes, Cum Shots and more. *NEW* Get live fucking with Sound! Even get to see live bizarre stuff like live PISSING shows! We have it all!!!! NYCBBS ADULT EMPORIUM'S Over 200 free pix all clearly listed with text descriptions! Such as, w ould you let a chubby amateur suck your cock, or you can ride me tonight! You name it, it's in here. You will be glad you stopped by. Don't miss this one. Cruise on by! Nycbbs Adult .......... http://www.nycbbs.com/adult/picpost/ 69 FREE PICS No I did not count them, but the number sounds good. There are some pictures from a strip show showing some really hot babes with whipped cream all over their boobs. Super tight bodies with neatly trimmed pussies. Have a beer and maybe you will feel like your over at a hot Canadian strip club? 69 Free Pics .................... http://www.69freepics.com/ ANAL DESIRES This is a paysite. They do give you a few free pictures to entice you to join in the fun. Up the butt with one or two cocks is the flavor here! Major butt action! You have to see this one image of this pussy. Major labia in a big way! Anal Desires .................... http://web.wa.net/~plunge/ GALAXSHE Cool website featuring five free galleries of hot looking ladies. There is great tits, long legs and high heels, all spread wide. Just the way we like it! The images load fast and are all thumbnailed for quick access. Take a look at it! Galaxshe .......................... http://www.galaxshe.com/ #READ THIS!! WIN $25,000 and a Fantasy Date - Click Here Now! #$25,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A # HOORAY! THE ADULT SEARCH ENGINE Now you can search for the sex sites you are looking for and fast! This new search engine is setting the standard others will follow. It offers pop-up search and detailed listings! Hooray! -----------------> http://eureka.abc-web.com/hooray/ FREE STREAMING VIDEO Please note that most of these feeds require a Netscape bro- wser in order to successfully view them. Unfortunately Micr- osoft's browser does not have all the features of Netscape's yet. However, many of the feeds use the RealPlayer and will work in most browsers. If you do not have Netscape and want a free copy click here --> http://www.netscape.com/download/ Bizarre ----------------------> http://204.244.215.7/teens2/ CHAT WITH OTHER READERS Hey, if you haven't checked out the Eureka! Chat sites yet, you're missing out on some great stuff. Every day you'll find hundreds of other readers just like you looking to chat have fun and maybe a little 'cyber'. We know you'll love it! Adult/Sex Chat -----------------> http://137.39.63.229/chat/ General/Fun Chat -------> http://137.39.63.229/chat/funchat/ HOT LIVE PHONE SEX TO MAKE YOU CUM! LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912 LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779 FREE: Live 1-on-1 (international call only)--->011-678-77416 NEW! CENTERFOLD PIC OF THE DAY Exclusive! We proudly present unpublished Pictures of your favorite Centerfolds. Featured This Week: Dec 80-PMOY Terri Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri Kendall, Rebecca Ferratti, Lydia Schone and many more too! ---------------------------> http://www.gatefold.com/eureka/ AMATEUR SITE OF THE DAY Katie: A alluring blonde with a penchant for dildos, this young gal is seductive! Bold and petite, this sexy little girl knows what men & women want. She loves to please, and to be pleased. This gal is the kind of girl Bill Clinton would want to have as an intern! Visit her now and get off! ---------------------------> http://amateurindex.com/eureka/ EROTIC STORY SITE OF THE DAY Very Sexy Erotic Stories: Ready for lots of hot, free sex stories? Look no further than Very Sexy Erotic Stories. All different subjects, all free. ..... http://www.verysexy.com/ DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/ ADULT STAR PIC OF THE DAY Woah, our Adult Star pics are getting hotter and hotter, so make sure you stop by and check out today's - definitely not to be missed! --------> http://www.xxxadultstars.com/eureka/ OTHER EUREKAS! GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/ DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm ESPA�OL ------> http://eureka.abc-web.com/eureka/espanol.htm FRAN�AIS ----> http://eureka.abc-web.com/eureka/francais.htm ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm TODAY'S FREE PIX Pic 1 --------------------------> http://137.39.63.229/?060 Pic 2 --------------------------> http://137.39.63.229/?061 Pic 3 --------------------------> http://137.39.63.229/?062 Pic 4 --------------------------> http://137.39.63.229/?063 Pic 5 --------------------------> http://137.39.63.229/?064 Pic 6 --------------------------> http://137.39.63.229/?065 Pic 7 --------------------------> http://137.39.63.229/?066 Pic 8 --------------------------> http://137.39.63.229/?067 Pic 9 --------------------------> http://137.39.63.229/?068 Pic 10 --------------------------> http://137.39.63.229/?069 ============================================================ TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US. ============================================================ From jim.burnes at ssds.com Thu Feb 5 13:49:32 1998 From: jim.burnes at ssds.com (Jim Burnes) Date: Fri, 6 Feb 1998 05:49:32 +0800 Subject: the best justice/kinds of monopolies In-Reply-To: <199802051634.KAA02262@einstein.ssz.com> Message-ID: <34DA3157.1FF4FA7A@ssds.com> Jim Choate wrote: > > Forwarded message: > > > Date: Thu, 5 Feb 1998 08:23:58 -0800 (PST) > > From: mark at unicorn.com > > Subject: Re: the best justice money can buy --Lessig > > > Of course there's a free-market remedy for Microsoft; eliminate copyright. If > > anyone can copy Microsoft software for free, it would be forced to compete > > on real benefits rather than installed base. > > If there were no copyright nobody would have any reason to market software > or much else for that matter. I would predict that much of the technology > and infrastructure we have now wouldn't exist. Thats pretty obvious. I'm usually the last person to defend Microsoft, but cancelling copyright is throwing the baby out with the proverbial bathwater. There are a couple of obvious free market solutions. The first that comes to mind is to stop buying Microsoft product. This needs to be restated because even though obvious, it has a number of important follow-on conclusions. (1) There are other usable operating systems. (linux, mac-os, os/2) (2) There are other usable applications. (applix, macwrite?, whatever) Why won't people stop buying microsoft product? (1) FUD helped along by a microsoft reality-altering marketing budget (2) The *applications* they write are sometimes quite usable. (3) Their applications only work on *their* OS (mostly)? Why is that? (4) Their OS, even considering its questionable quality has, until this point, hornswaggled a bunch of developers because its the *defacto* desktop applications API. Why that is the case is probably a topic for endless speculation -- though it probably comes down to some version of the "stack 'em deep and sell 'em cheap" philosophy -- something that Apple still hasn't learned. (5) ...and most importantly of all...it hasn't become painfull enough yet to stop purchasing Microsoft software. > > Free markets monopolize. > Hmmm. Thats a rather sweeping generalization. Perhaps it would be more enlightening to discuss the nature of monopolies. It is rarely possible to enforce a monopoly that isn't a natural monopoly. A company will tend to keep a lion's share of the market as long as continued investment in more efficient production gives them greater market share -- bringing you cheaper goods and larger quantities of them. At that point nobody cares because quality goods are being sold as low prices. When that breaks down all natural monopolies start to crumble or revert to their previous market share. Having said that, let me follow it with a big "all other things being equal". One of the reasons NT became popular is because they priced their NT server not "by the client" as Novell used to, but at a flat-price (if memory serves -- which it is doing more infrequently these days ;-) In doing so Novell's market share took a serious hit. To some extent I say good riddance. Novell server's IMOHO suck as a server architecture (not to mention truly horrible and snotty tech support). Novell didn't react quickly enough and lost tremendous market share. Are we suggesting that Novell be protected by the US Justice Department? I certainly hope not. You are welcome to go back to those days. The only other kinds of monopolies are cartels, and government enforced monopolies of both the public and private kind (the latter being the most heinous). Cartels always collapse because one of the partners will eventually see the increasing profits to be made by breaking the cartel. When this happens the company that breaks the cartel is the winner and the last one to leave the cartel may well collapse financially. If members of a Cartel get together and use guns to prevent the breakup of the cartel then that is a lot more like a government enforced private monopoly -- bad news. Government-enforced public monopolies like the US Post office and public education are wasteful, out of touch with their markets (because of the lack of competitive price feedback) and thus inefficient. They have no valid function in a free society and are a waste of taxpayer dollars. The USPS will tell you that everything is hunky-dory because they don't use taxpayer dollars. What they don't tell you is that the difference between the price you pay for their stamps and what you would in a free market is your tax. (this and the strange tendency of workers to "go postal" -- you rarely hear about FedEX employees going on an AK47 rampage, must be the water ;-) Goverment-enforced private monopolies teeter dangerously close to the pure definition of fascism. Fascism, from the latin "fascia" means "to bind together" (perhaps you remember the "fascia" tissue from high-school biology class during dissection of frogs, cats and other unlucky animals). In this case they bind a force monopoly with a yet-to-be-named monopoly. Classic examples of Fascism^h^h^h^h^h^h^h government enforced-private-monopolies in the US are the Federal Reserve System, the AMA, and the local Bar associations. Why is this? All these monopolies depend on FUD and govt to enforce their services. "What would happen if we didn't regulate xyz is that all hell would break loose and many people would lead lives of horrible desperation. 'There oughta be a law!' etc...blah blah..." You know the drill. Now that we have a perspective on monopolies, perhaps we can take a look a microsoft. Microsoft is not a force monopoly (usually), its not run by the government (thank god), it doesn't appear to be a cartel (usually) so unless further information comes in it looks like a natural monopoly. What does it take to undo a natural monoply? Build something cheaper, better and more reliable. Its just possible (and this might be a stretch, but only by a little) that Linux, Free Netscape Sources, Java etc might acheive this. Certainly Apache is more popular than any other webserver. How you come up with a new product in this type of market without M$ "re-inventing it" and giving it away is anyone's guess. (1) Hope that Linux/Scape/Java/KDE do something big (2) Write a Win95/NT compatible operating system that is faster and cheaper. If you can clone a Pentium, you can clone Windoze. (visions of a QNX like OS with Win32 API dance in my head). A GPL'd VSTa-based Win32 OS would be pretty amazing. This would be necessary because games are a big market and the Linux kernel just doesn't have what it takes to do realtime without a major hack. How about VSTa/a free DOS emulator/Wine. If Sun would fund this effort it could take a lot of wind out of M$ sails. Probably more than Java. McNeally would have to hop down from his high-horse. When will this happen? When the market gets tired of M$ practices and some lucky competitor comes to the fore. Until then there is no devine right to a percentage of the operating system market share. We can only code and hope. (donning flame retardant vest) jim burnes From ravage at ssz.com Thu Feb 5 16:20:43 1998 From: ravage at ssz.com (Jim Choate) Date: Fri, 6 Feb 1998 08:20:43 +0800 Subject: Feds warm spammers [CNN] Message-ID: <199802060018.SAA03566@einstein.ssz.com> Forwarded message: > FEDS WARN SUSPECTED E-MAIL SCAMMERS > > graphic February 5, 1998 > Web posted at: 6:51 p.m. EST (2351 GMT) > > WASHINGTON (AP) -- The Federal Trade Commission and postal > inspectors have issued more than 1,000 warnings to businesses > suspected of sending illegal junk mail and operating shady > moneymaking schemes over the Internet. [text deleted] ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From dlv at bwalk.dm.com Thu Feb 5 17:16:38 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Fri, 6 Feb 1998 09:16:38 +0800 Subject: the best justice money can buy --Lessig (fwd) In-Reply-To: <199802051634.KAA02262@einstein.ssz.com> Message-ID: Jim Choate writes: > > Forwarded message: > > > Date: Thu, 5 Feb 1998 08:23:58 -0800 (PST) > > From: mark at unicorn.com > > Subject: Re: the best justice money can buy --Lessig > > > Of course there's a free-market remedy for Microsoft; eliminate copyright. > > anyone can copy Microsoft software for free, it would be forced to compete > > on real benefits rather than installed base. > > If there were no copyright nobody would have any reason to market software > or much else for that matter. I would predict that much of the technology > and infrastructure we have now wouldn't exist. It would also stiffle > creativity and new methodologies because there would be no profit in it to > recoup development costs. Those who would survive in such a market would be > the 800-lb gorillas because only they would have the resources to squash the > smaller companies. Software development seems to be thriving in countries that aren't very keen on enforcing copyright laws - do you care to explain why? > > Free markets monopolize. Hmm... There's no copyright on perfumes. There are market leaders in perfumes, but no monopoly; hardly even an olygopoly. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From dlv at bwalk.dm.com Thu Feb 5 17:17:46 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Fri, 6 Feb 1998 09:17:46 +0800 Subject: Changing to Moderated Cypherpunks -- How? In-Reply-To: <199802051047.KAA01376@server.eternity.org> Message-ID: Adam Back writes: > > Information Security > > I'd be glad to handle it. > > > > The only criteria is to delete Dr. Dim and his nyms. > > How are you going to recognize Dimitri's nyms if he has any. Guy Polis thinks that anyone smarter than him (and that's 99.99% of the population) is my tentacle. He thinks everything on this list except him and Timmy May is my tentacle, including you too, Adam. Guy Polis (guy at panix.com, eviljay at bway.net) is a pedophile child molester who was fired from his consulting position at Salomon Brothers after he was caught masturbating in his cubicle at the child pornography JPEGs that he downloaded from the Internet. In retaliation, Guy Polis spammed the firewalls mailing list with megabytes of e-mail logs that he "intercepted" at Salomon Brothers, and accused several of his former co-workers and supervisors of various crimes. As far as I can determine, Guy Polis has been unemployed since the time he was fired from Salomon. If anyone knows otherwise, please let me know. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From ravage at ssz.com Thu Feb 5 17:57:31 1998 From: ravage at ssz.com (Jim Choate) Date: Fri, 6 Feb 1998 09:57:31 +0800 Subject: the best justice money can buy --Lessig (fwd) Message-ID: <199802060155.TAA03984@einstein.ssz.com> Forwarded message: > Subject: Re: the best justice money can buy --Lessig (fwd) > From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) > Date: Thu, 05 Feb 98 16:26:45 EST > > > Of course there's a free-market remedy for Microsoft; eliminate copyright. > > > anyone can copy Microsoft software for free, it would be forced to compete > > > on real benefits rather than installed base. > > > > If there were no copyright nobody would have any reason to market software > > or much else for that matter. I would predict that much of the technology > > and infrastructure we have now wouldn't exist. It would also stiffle > > creativity and new methodologies because there would be no profit in it to > > recoup development costs. Those who would survive in such a market would be > > the 800-lb gorillas because only they would have the resources to squash the > > smaller companies. > > Software development seems to be thriving in countries that aren't very keen > on enforcing copyright laws - do you care to explain why? Oh yeah... Software development is a long way from selling software, not the same animal at all. I mean when I go down to the dozen computer stores within a mile or so of my house I am truly deluged by software from countries outside of the US and Canada. I mean we have all heard of the Indian and Bulgarian software billionares haven't we? And all those folks in Turkey just rolling in cash... Further, who do the majority of these folks who actualy make a reasonable living work for either directly or under contract? Large US and Eurpean countries thats who. That's why those folks can make a living developing (not selling) software. > > Free markets monopolize. > Hmm... There's no copyright on perfumes. There are market leaders in perfumes, > but no monopoly; hardly even an olygopoly. I can tell how often you buy perfume, the ones I buy for my girlfriend certainly have a little 'c' on them... And as to the number of companies that are actualy developing perfume versus reselling it under their own house brands...there might be a couple dozen succesful (say stay in business more than 5 years) in the whole world and I would go so far as to hypothesize that if one were motivated to plot the number of companies per year over the last say 50 years you would see the number go *down*. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From dean at intergal.com Fri Feb 6 10:34:42 1998 From: dean at intergal.com (dean at intergal.com) Date: Fri, 6 Feb 1998 10:34:42 -0800 (PST) Subject: Major Launch Message-ID: <199802051301.IAA03296@modelsincorporated.com> THIS EMAIL IS INTENDED FOR ADULT WEBMASTERS WHO HAVE SIGNED UP FOR OUR MAILING LIST Hi from Dean at Playgal, I have sent this email to advise you of a major change and opportunity. As you may be aware both Intertain ( the nets first paysite ) and Playgal have formed a partnership. Together we form one of the largest adult networks on the Internet - our newly formed operation is Intergal. We have now combined our click through programs and launched the new Intergal advertising programs. We have a unique hit based click through which will guarantee a minimum payout http://www.intergal.com/nfa and offers huge conversion rate bonuses which means you can earn up to $5 a unique hit. Or we have the no frills NO FUCKING ABOUT campaign IN THE RAW - the click through which pays you 5.5 cents a raw hit - no conversion rates, just good old RAW hits. http://www.intergal.com/nfa/nfa.html You can select from our banner farm or use your own banners - we allow text links. It is up to you to send us as much traffic as possible - we encourage you to do it. Please feel free to use any marketing initiative you wish to maximize traffic sent to our sites - we understand the fact that you know your sites better than us . ( virtually the only thing we dont approve of is cheating ). We have one of the highest raw hit counts of any click through on the net - undisputed. We dont filter hits ! A great suppliment to your Intergal program is to advertise the nets newest and freshest site http://www.unfaithful.com you can sign up for the click through at http://www.unfaithful.com/easycash . Thanks for taking the time to read our announcement i have outlined below some services available to adult webmasters. Paysite Operators We have a few deals for you and offers for you. It will be worthwhile your time reading below. 1. FREE VIDEO FEEDS 10 rotating feeds an hour - 240 new feeds a day for FREE Check it out at http://www.virtualgirlz.com or for Gay go to http://www.virtualgirlz.com/freeholio/gay.html (YOU CAN EVEN PUT IT IN A FRAME!!!) and it works with AOL , IE and Netscape to sign up for free for 240 Free feeds each day. Go to: http://www.zanepix.com/240free.html 2. PASSWORD PROTECTOR Does your site get hit with password traders - we have the solution - if you run a unix operating system then you can stop password sites crashing your servers. The answer is Pennywize and it is only 99.95 - if you have a password posted on a big password site it will cost you much more than that in bandwidth. http://www.pennywize.com . Download it now - free tech support always available and you get all future updates. The best thing is it is so easy to install. 3. FREE TRAFFIC TO YOUR SITE AND GROWING EVERYDAY - NO LINK BANK REQUIRED Sign up for this today - surfers dont leave your site but you will get traffic back every day in return. http://eureka.abc-web.com/eureka/ This is the most innovative product to hit adult webmasters in years. 4. More Free Traffic Intergal have just recently bought Picturepost http://www.picturepost.com - it is ranked at number 7 on websidestory with about 90,000 uniques a day . Add a picture post text link to your front page and you are eligible to submitt a pic and get back about 10,000 hits in a week - for FREE. 5. We also highly recommend some of our feed suppliers 1. http://www.ibroadcast.net email - joey at ibroadcast.net and add 1,300 feeds to your site 2. http://www.megahardcore.com email andy at wd.com and add streaming videos with sound and they have a fantastic new virtual world package available. 3. Live fucking with sound email opm at pusi.com 4. 1,200 searchable feeds email davidk at xtv.com works with AOL , IE and Netscape 6. For cc processing we have had a very successful relationship with Ibill http://www.ibill.com or email the VP kmiller at ibill.com 7. For bandwidth we thoroughly recommend exodus.net contact jennifer at exodus.net for special attention and pricing. If you have received this email in error please put remove in the subject field and reply. Thanks for your time and for supporting our group of sites. regards Dean From honig at otc.net Fri Feb 6 10:39:13 1998 From: honig at otc.net (David Honig) Date: Fri, 6 Feb 1998 10:39:13 -0800 (PST) Subject: "The Internet needs a chastity chip." ---James Traficant, Dem-Ohio Message-ID: <3.0.5.32.19980206104015.00794d50@otc.net> http://www.yahoo.com/headlines/980206/wired/stories/cybersex_1.html Friday February 6 10:07 AM EST Lawmaker warns of cybersex "pregnancy danger" WASHINGTON (Reuters) - Citing the case of a woman who claims she got pregnant from e-mail, an Ohio Democrat called Wednesday for a "chastity chip" for the Internet. Rep. James Traficant, known for his flamboyant rhetoric, gave a brief floor speech about a woman named Frances who claimed to have gotten pregnant through an e-mail exchange with a paramour 1,500 miles away. "That's right -- pregnant," the Congressman proclaimed, warning of the dangers of "immaculate reception." He called on Congress to go beyond "v-chips" that would protect kids from sexual content on the Internet, saying: "Its time for Congress to act. The computers do not need a v-chip. The Internet needs a chastity chip." Although Traficant did not say whether he believed the woman's account, he did say it was "enough to crash your hard drive." ------------------------------------------------------------ David Honig Orbit Technology honig at otc.net Intaanetto Jigyoubu Lewinsky for President '2012 From mail at reba.com Thu Feb 5 19:20:00 1998 From: mail at reba.com (mail) Date: Fri, 6 Feb 1998 11:20:00 +0800 Subject: RebaNews Message-ID: <199802060306.WAA00901@www.video-collage.com> Reba will join Rosie O'Donnell as her special co-host February 16, as The Rosie O'Donnell Show continues its broadcasts from Los Angeles. In addition to pulling co-hosting duties, Reba will also perform "What If," her tribute song to the Salvation Army. Fresh off her wins at both the Peoples Choice Awards (which she hosted and won Favorite Female Musical Performer) and the American Music Awards (Favorite Female Country Artist), the February 16th appearance marks the second time Reba has appeared on The Rosie O'Donnell Show. Later this month, Reba will begin work on the CBS-TV movie, "Forever and Always," tentatively scheduled to air in May. From ravage at ssz.com Thu Feb 5 20:12:57 1998 From: ravage at ssz.com (Jim Choate) Date: Fri, 6 Feb 1998 12:12:57 +0800 Subject: Free-market monopolization features... Message-ID: <199802060335.VAA04271@einstein.ssz.com> Hi, This is the theory in its current working version: An unregulated (free-market) economy will inherently monopolize when, but not necessarily only if, the following are present: - the market is saturated, in other words the number of consumers at any given time are equal to or less than the service providers ability to provide that service (or resource). This means the long-term survival of firms is a function of retained market share and raw resource share control/ownership. - the technology and/or start-up costs are high in material and intellectual factors. This minimizes the potential for new providers to start up. Providers will also require non-disclosure and other mechanisms to reduce sharing of information and cross-communications except under controlled conditions. Expect an increase in certifications and implimentation standards required to do business with the more succesful of these providers. - an individual or small group of service providers have a small but distinct efficiency advantage in technology, manufacturing, or marketing. Over a long-enough time this market advantage will grow and as a result widen the 'technology gap' between firms. - expect the most efficient firms to share their profit with the critical intellectual contributors. This further reduces the problem of cross-communication and new provider start-up. - expect to see the more successful providers to join in co-ops with the less succesful providers. This will be under the surreptitous goal of 'developing technology'. It's actual goal will be to cause these smaller firms to commit resources to such enterprises. As soon as it is strategicaly advantagous the primary providers will break-off the co-op. This has the effect of further reducing the ability of the smaller providers to react in a timely manner to market changes or develop new technology due to resource starvation. - expect to see the less efficient providers to combine in an effort to reap the benefits of shared market share and resources. Unless this partnering provides a more efficient model and there is sufficient time for that efficiency to develop these new providers will eventualy fail or be joined with other providers. - expect to see the primary provider buy those less efficient providers that don't fail completely. These purchases will be as a result of some new or unexpected technology that will significantly increase the market share of the primary provider -or- it will be with the goal of eliminating this secondary technology and forcing those market shares to do without or use the primary providers technology. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ravage at ssz.com Thu Feb 5 20:36:48 1998 From: ravage at ssz.com (Jim Choate) Date: Fri, 6 Feb 1998 12:36:48 +0800 Subject: Free-market monopolization features... (fwd) Message-ID: <199802060436.WAA04618@einstein.ssz.com> Hi, I left one out... Forwarded message: > From: Jim Choate > Subject: Free-market monopolization features... > Date: Thu, 5 Feb 1998 21:35:16 -0600 (CST) > An unregulated (free-market) economy will inherently monopolize when, but > not necessarily only if, the following are present: - initialy prices for services will be low to promote purchasing but as providers obtain larger market shares their prices will increase over time and out of step with inflation and other market forces in order to widen the profit gap. The strategy is one of 'use it or starve'. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ravage at ssz.com Thu Feb 5 20:45:14 1998 From: ravage at ssz.com (Jim Choate) Date: Fri, 6 Feb 1998 12:45:14 +0800 Subject: New Credit Rating System Coming [CNN] Message-ID: <199802060405.WAA04465@einstein.ssz.com> Forwarded message: > NEW CREDIT RATING SYSTEM ON HORIZON > > graphic February 5, 1998 > Web posted at: 2:38 p.m. EST (1938 GMT) > > NEW YORK (AP) -- Within months, retailers will be able to use a new > computerized credit-rating system to decide not only whether they'll > take your check or debit card, but how big a check you can write. > > Banks will be able to use the system to determine whether they will > let you open a checking account, and what kind of fees you will pay. > > Deluxe Corp., the nation's biggest check printer, has joined Fair, > Isaac & Co., a credit scoring company, and Acxiom Corp., a data > warehouse, to create the system for rating a merchant's risk of > accepting checks and debit cards. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From attila at hun.org Thu Feb 5 21:24:02 1998 From: attila at hun.org (Attila T. Hun) Date: Fri, 6 Feb 1998 13:24:02 +0800 Subject: New Credit Rating System Coming [CNN] In-Reply-To: <199802060405.WAA04465@einstein.ssz.com> Message-ID: <19980206.045903.attila@hun.org> -----BEGIN PGP SIGNED MESSAGE----- on or about 980205:2205, in <199802060405.WAA04465 at einstein.ssz.com>, Jim Choate was purported to have expostulated to perpetuate an opinion: > NEW CREDIT RATING SYSTEM ON HORIZON > > graphic February 5, 1998 > Web posted at: 2:38 p.m. EST (1938 GMT) > > NEW YORK (AP) -- Within months, retailers will be able to use a new > computerized credit-rating system to decide not only whether they'll > take your check or debit card, but how big a check you can write. > > Banks will be able to use the system to determine whether they will > let you open a checking account, and what kind of fees you will pay. > > Deluxe Corp., the nation's biggest check printer, has joined Fair, > Isaac & Co., a credit scoring company, and Acxiom Corp., a data > warehouse, to create the system for rating a merchant's risk of > accepting checks and debit cards. > so where is the First Virtual Bank of Cyberspace? let's get crackin' basically, this says I can not write a check against an available balance that has not been overnight posted. when TTI (transaction technology), a CitiBank division in Santa Monica, started working on the ATM implementations in the mid-70, all the last, bad crop of hired guns were contracting --they were paying 50-80/hr _then_ for high end --we all took there money and speculated that eventually there a) would be no cash; and b) checks would be castrated --or, if you did not have plastic, you did not eat as big brother wanted to know what you had for dinner-- yup, sounds just like cybercredits --except for the audit trail fed directly to the IRS who precomputed your tax for you-- and took it out of your account with or without your permission. well, how close are we getting to what those of us working on it in the mid-70s feared? -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 Comment: No safety this side of the grave. Never was; never will be iQBVAwUBNNqbr7R8UA6T6u61AQGscAH/cDmpNgdaMuZAdB+bBZRXzz5EjM40RhBD wgolht1512aKcXCfXv0LmNbsIPwv6fFCKpldrMyFag0RRdgt+qslUQ== =UvQI -----END PGP SIGNATURE----- From attila at hun.org Thu Feb 5 21:44:09 1998 From: attila at hun.org (Attila T. Hun) Date: Fri, 6 Feb 1998 13:44:09 +0800 Subject: the best justice/kinds of monopolies In-Reply-To: <34DA3157.1FF4FA7A@ssds.com> Message-ID: <19980206.052451.attila@hun.org> -----BEGIN PGP SIGNED MESSAGE----- on or about 980205:1438, in <34DA3157.1FF4FA7A at ssds.com>, Jim Burnes was purported to have expostulated to perpetuate an opinion: >Jim Choate wrote: >> >> Forwarded message: >> >> > Date: Thu, 5 Feb 1998 08:23:58 -0800 (PST) >> > From: mark at unicorn.com >> > Subject: Re: the best justice money can buy --Lessig >> [snip] >so unless further information comes in it looks like a >natural monopoly. What does it take to undo a natural monoply? >Build something cheaper, better and more reliable. >Its just possible (and this might be a stretch, but only by a little) >that Linux, Free Netscape Sources, Java etc might acheive this. >Certainly Apache is more popular than any other webserver. >How you come up with a new product in this type of market without >M$ "re-inventing it" and giving it away is anyone's guess. >(1) Hope that Linux/Scape/Java/KDE do something big >(2) Write a Win95/NT compatible operating system that is > faster and cheaper. If you can clone a Pentium, you > can clone Windoze. (visions of a QNX like OS with Win32 > API dance in my head). A GPL'd VSTa-based Win32 OS > would be pretty amazing. This would be necessary because > games are a big market and the Linux kernel just doesn't > have what it takes to do realtime without a major hack. > How about VSTa/a free DOS emulator/Wine. If Sun would > fund this effort it could take a lot of wind out of > M$ sails. Probably more than Java. McNeally would have > to hop down from his high-horse. > When will this happen? When the market gets tired of > M$ practices and some lucky competitor comes to the > fore. Until then there is no devine right to a percentage > of the operating system market share. >We can only code and hope. >(donning flame retardant vest) >jim burnes dont need a flame retardent vest for my direction. I agree in theory that all it takes is a better product --unless the 800 lb gorilla steals it, borrows it, whatever and puts it out for free which they have been know to do on more than one occasion. and, the fact M$ has such enormous leverage in the market to command the pole position for any product they promote (even vapourware), is why society does have a responsibility to its members to level the playing field. until the sheeple stop following the Judas to the Micro$lop slaughter house, the law must finally step in and break it up --or as Orrin Hatch said: "if M$ does monopolize the net, look for an "Federal Internet Commission" --using the law to surgically dismember M$ into logical divisions is one thing --living with another regulatory commission is another, and certainly not very "tasty". -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 Comment: No safety this side of the grave. Never was; never will be iQBVAwUBNNqhIrR8UA6T6u61AQErYgIAlBOGfnn/R9IuZD42Yl2hRb2amKY8049s bLaD3SdJd4ulqoTkvl/UiM3hF6vhs3bbe0N1PN4xpZrgW5GxSCoGPA== =B0dD -----END PGP SIGNATURE----- From wombat at mcfeely.bsfs.org Thu Feb 5 22:12:25 1998 From: wombat at mcfeely.bsfs.org (Rabid Wombat) Date: Fri, 6 Feb 1998 14:12:25 +0800 Subject: the best justice money can buy --Lessig (fwd) In-Reply-To: Message-ID: On Thu, 5 Feb 1998, Dr.Dimitri Vulis KOTM wrote: > Jim Choate writes: > > > > > Forwarded message: > > > > > Date: Thu, 5 Feb 1998 08:23:58 -0800 (PST) > > > From: mark at unicorn.com > > > Subject: Re: the best justice money can buy --Lessig > > > > > Of course there's a free-market remedy for Microsoft; eliminate copyright. > > > anyone can copy Microsoft software for free, it would be forced to compete > > > on real benefits rather than installed base. > > > > If there were no copyright nobody would have any reason to market software > > or much else for that matter. I would predict that much of the technology [SNIP] > > Software development seems to be thriving in countries that aren't very keen > on enforcing copyright laws - do you care to explain why? Would you care to explain where? There's a big difference between a "flourishing" market for custom, in-house-only software (especially in a language that is not high on the list for US developers), and a commercial software market consisting of widely distributed applications. The in-house stuff doesn't need copyright protection; it's never allowed out, and even if it were, what are the odds it could be used by others without access to source code? Custom software is more a matter of selling a service than a "product", and it's a lot harder to "bootleg" services. What software products can you come up with that have the same level of market penetration as those engineered in the US or Canada? How many of those are from nations that do not honor copyright? > > > > Free markets monopolize. > Hmm... There's no copyright on perfumes. There are market leaders in perfumes, > but no monopoly; hardly even an olygopoly. > That's because the primary product is the image built by advertising, not the scent which is often fairly accurately duplicated (not that I'd know - my favorite scent is hallertau). One of my professors defined advertising as "creating demand for that which is inherently worthless." From WebWarrior3 at InfoWar.Com Thu Feb 5 22:31:06 1998 From: WebWarrior3 at InfoWar.Com (WebWarrior3 at InfoWar.Com) Date: Fri, 6 Feb 1998 14:31:06 +0800 Subject: RE Fingerprints and EF Georgia Message-ID: <34DAABBC.3BCF1ED5@InfoWar.Com> Yup, EF-Georgia http://www.efga.org has had an ongoing project dealing with fingerprinting for DL's This is in reply to Jim Burns' post: "If your interested in this problem, I believe that the Georgia wing of the EFF is mounting a campaign against fingerprinting on driver's licenses. Can't remember the URL for it though..." EF Georgia has consistantly had some mighty fine information on their mail list, still on topic too for the most part. Scott R. Brower Electronic Frontiers Florida http://www.efflorida.org BTW...neither EFGA nor EFFlorida, or as far as I know, any other EF group... is affiliated with EFF in any way but certain principals which bind us together in a common cause. From frantz at netcom.com Fri Feb 6 00:05:19 1998 From: frantz at netcom.com (Bill Frantz) Date: Fri, 6 Feb 1998 16:05:19 +0800 Subject: the best justice/kinds of monopolies In-Reply-To: <199802051634.KAA02262@einstein.ssz.com> Message-ID: At 1:38 PM -0800 2/5/98, in a generally right on post, Jim Burnes wrote: >(this and the strange tendency of >workers >to "go postal" -- you rarely hear about FedEX employees going on >an >AK47 rampage, must be the water ;-) No, the problem is the US Postal Service's willingness to tolerate assholes as managers. There may be an argument for pinning that on the government monopoly aspects of the USPS as well. ------------------------------------------------------------------------- Bill Frantz | Market research shows the | Periwinkle -- Consulting (408)356-8506 | average customer has one | 16345 Englewood Ave. frantz at netcom.com | teat and one testicle. | Los Gatos, CA 95032, USA From doorlist at doors.com Fri Feb 6 16:12:27 1998 From: doorlist at doors.com (doorlist at doors.com) Date: Fri, 6 Feb 1998 16:12:27 -0800 (PST) Subject: The Doors: Strange Days #3 Message-ID: <199802070010.RAA03551@quasar.fiber.net> WELCOME to The Doors Collectors Magazines Strange Days News Emailer Vol. 3 The Celebration Has Just Begun! STRANGE DAYS MEMORABILIA NEWS ITEMS: Congratulations to the five Doors Autographed Box Set winners! These Doors box sets were signed by Ray, John, and Robby on the front cover of the inside book and were given away to random people from our Strange Days Email List. The winners were: Jim Kearns (Camillus, NY), Ainslee Rogers (Hamilton, Canada), Suzie Williams (Harrogate, TN), and Barry Abbott (Ermington, Austrailia), and Laura Pritchett (Missoula, MT). This contest added over 1,000 people to our email list, so watch out for promotions similar to this in the future! The Doors Tour Equipment from our last emailer is still available. One envious person on the net is saying that these items aren't authentic... Vince Treanor (The Doors Road Manager) wanted me to pass along the message that he would be happy to talk to any prospective buyers who believe this bullshit. Call me to set up a three way call to Vince. Prospective buyers only please! Recently lots of new memorabilia items have turned up due to the release of the box set. The rest of this issue of the Strange Days News Emailer is dedicated solely to new items that are both "Wanted" and are "For Sale". If you aren�t into collecting Doors memorabilia, you still might want to read on; I�ve tried to put a little news into each entry. Enjoy! For more info about how to order, please go to: http://www.doors.com/door_mem/ STRANGE DAYS MEMORABILIA ITEMS FOR SALE: *** The Doors Albums on Postage Stamps! Late last month the island of St. Vincent issued a set of six stamps which commemorated the 30th anniversary of The Doors first LP. Never before has any country issued such a complete set of stamps to honor an artists complete catalogue of studio material before! Each stamp for each Doors album! The Doors Collectors Magazine has a number of these stamp sets available right now for $10 per sheet (eight stamps per sheet.) While supplies last we will also give you a FREE collector portfolio ($20 value) to keep your stamps in if you buy the complete set of six stamps at the same time ($60 + $4.50 s&h). For more information, please see: http://www.doors.com/door_mem/other/sv_stamp.html *** Autographed Box Sets (w/ Ray, John, and Robby�s sigs) We have a few of them available for sale at $175 plus postage. Please email first because our supply won�t last long! *** "A New Epitaph For Pere-Lachaise" Poster with poem by Jan Eloise Morris. This 24x36 poster is in its fourth year of world-wide distribution. The photograph was taken in 1968 by Doors photographer, Paul Ferrara. Jim was captured in a rare moment with sunlight falling on his shoulders in front of the Observatory in Griffith Park in Los Angeles, California. The poster's publication in 1994 marked the only time another artist's poetry has been authorized to appear with Morrison's image. Jan�s association with The Doors Collectors Magazine affords us the exclusive opportunity to offer signed, dated copies only through this web site. Price: $20 includes shipping U.S. (please add $5 for delivery outside of the U.S.) For more information, please see: http://www.doors.com/door_mem/posters/epitaph.html *** "My Eyes Have Seen You" The most visually important book on The Doors that was ever published is now available through The Doors Collectors Magazine! This limited edition book (of 1,500 copies) was put together by Jerry Prochnicky (author, Break On Through) and Joe Russo (lead singer, The Soft Parade). 150 pages of both color and B&W photos. Highly recommended! Price: $20 (plus $4.50 s&h) For more information, please see: http://www.doors.com/door_mem/books/myeyes.html *** Autographed 5" x 7" B&W Promotional Photo of The Doors signed by all four Doors: Given away to members of The Doors official fan club back in 1968. Very rare! Framed. Excellent condition. While some of these photos have been suspect to not being all they�re cracked up to be, this one comes with Doors Collectors Magazine Guarantee & Certificate of Authenticity. Price: $2,500 (plus $4.50 s&h) *** Original "Jim Morrison Film Festival" / HWY Poster Even if you don�t want (or can�t afford) this poster, you have to check it out! It is the most incredible original Jim Morrison poster ever made �and one of the rarest! This poster was folded as it was stored so it does have damage, but looks great framed even still. Price: $2,200 (plus $4.50 s&h) For more information, please see: http://www.doors.com/door_mem/posters/hwyposter.html *** An American Prayer Acetate. We have a private collection that we are offering for sale which includes test pressings of An American Prayer LP. These copies came from someone who was directly responsible for many production decisions on the An American Prayer LP release. Acetates are temporary albums good for playing only a few times that are necessary to check how the sound will be when the tape gets pressed onto the actual vinyl. There are probably only these copies for the entire An American Prayer release in existence! Both have their original Capital Records Mastering Jackets and are individually are described below: Copy #1: dated 9-20-78 Exc. Condition. One double sided album that contains all songs. Price $500 (plus $4.50 s&h) Copy #2: dated 10-13-78 Exc. Condition. A pair of two single sided albums that are missing two songs on each side. Price: $650 (plus $4.50 s&h) For a complete listing of ALL OTHER items from this same private collection, check out: http://www.doors.com/door_mem/museum/private_collection.html *** The Church of The Doors� Deadly Doorknell If you�re a hard core Doors fan you�ll remember former Church of The Doors High Mojomuck, Anthony Spurlock when he made headlines in 1992 inside Newsweek magazine. He also made news again when he single handedly thwarted off a public attack from radio station evangelist, Bob Larson. Sadly after this the church closed it�s doors forever. For years I�ve been trying to get permission to reprint these. Finally I�ve done it! You can now obtain quality reprints direct from the masters of their best (and last) two issues (Spring 1992 & Winter 1992-93) for the same $5 each (plus postage) that they originally cost. For more information on The Church, check out the new article on our website�s On-Line Magazine written back in 1993 for our first printed magazine by their High Mojomuck, Anthony Spurlock located at: http://www.doors.com/magazine/ To read more about the actual Church of the Doors fanzines (The Deadly Doorknell) go to: http://www.doors.com/door_mem/fanzines *** Oakley Krieger Band performing LIVE w/ Robby Krieger at the Whisky-A-Go-Go in Los Angeles (3-15-97) It's their complete performance on video�and what a great performance! The OK Band features Robby Krieger�s son Waylon on guitars and Berry Oakley�s son, Berry Oakley Jr. on vocals. Videotaped and produced by the OK Band, this electrifying performance is now available on video tapes that are autographed on their label by both Waylon and Berry! Price: $25 (plus $4.50 s&h) Autographed copies available at no extra charge only while supplies last! For more information, please go to: http://www.doors.com/door_mem/videos/OKBand.html *** FREE LIVE SHOW TAPE*** During the months of February & March if you mention this ad, we will give one FREE 90 minute cassette volume from our trade list with every $100 spent on Doors MEMORABILIA from our list at: http://www.doors.com/door_mem/ Or you can check out our list of LIVESHOW audio cassette tapes for trade at: http://www.doors.com/liveshow/ *** ATTENTION EUROPEAN DOORS FANS*** We now have capabilities to dub our trade videos directly in PAL at no additional trade value. *** Original hard cover copies of Wild Child by Linda Ashcroft were pulled from the shelves in the UK when it�s controversial writings were challenged in court. Linda informed The Doors Collectors Magazine that her publisher will be re-issuing an edited book in paperback form sometime in mid-June. If any of you have *hardcover copies* for sale, please email me! *** MEMORABILIA ITEMS WANTED: If you have any of these items and are interested in selling them at a reasonable price or if you have an item that you�re looking for and would like to have it included on our next "Want List", please call or email me your price or price range! I have tentative buyers for all of the following items. BOOKS WANTED "Riders On The Storm" Audio Book "Jim Morrison & The Doors" book by Mike Jahn "The American Night" Hard Cover (only) book by Jim Morrison "Wild Child" hard cover book by Linda Ashcroft All privately published editions of all three of Morrison�s poetry books LPS WANTED (Exc condition or better only) Doors: "13" LP Doors: "Absolutely Live" LP Doors: "Full Circle" LP Doors: "Other Voices" LP Doors: "Strange Days" LP (mono issue only) Doors: "The Doors" LP (mono issue only) Doors: "Waiting For The Sun" LP (mono issue only) Doors: "Weird Scenes Inside The Goldmine" LP Doors: "LA Woman" LP (original issue only) Doors: "�The Doors� movie soundtrack" LP Ray Manzarek�s "Carmina Burana" LP Ray Manzarek�s "Nite City Golden Days Diamond Nights" LP Ray Manzarek�s "Nite City" LP "Comfortable Chair" LP "Phantoms Divine Comedy" LP "Phantoms Lost Album" LP Any PROMO issued LPs for The Doors or the solo members OTHER DOORS ITEMS WANTED: 1968 Doors Tour Book All Doors Bootleg LPs and CDs Doors RIAA Gold & Platinum Awards "Tribute to Jim Morrison" Video "Dance On Fire" Video Doors Tickets or Ticket Stubs (esp. Miami �69) All Doors 45s that have Picture Sleeves (both foreign & domestic) Any Doors 8-Track Tapes (exc cond. only) OTHER NON-DOORS ITEMS WANTED: Milkwood: "How�s The Weather" LP 3-D Stereo Cameras or Projectors 3-D Stereo Cards or Slides Collectable Cameras THIS IS THE END MY FRIEND... TILL NEXT TIME! Kerry (kerry at doors.com) The Doors Collectors Magazine c/o TDM Inc PO Box 1441 Orem, UT 84059 *********** Thanks you for reading The Doors Collectors Magazine's Strange Days Email Newsletter. It is sent ONLY to subscribers. If you were subscribed by someone other than yourself and wish to be removed from our list please 1) accept our apologies and 2) return this message back to doorlist at doors.com with "REMOVE" in the subject line or go to http://www.doors.com/cgi-bin/email_list.cgi and unsubscribe. *********** From mark at unicorn.com Fri Feb 6 03:22:46 1998 From: mark at unicorn.com (mark at unicorn.com) Date: Fri, 6 Feb 1998 19:22:46 +0800 Subject: the best justice money can buy --Lessig (fwd) Message-ID: <886763578.16480.193.133.230.33@unicorn.com> Jim Choate (ravage at ssz.com) wrote: >If there were no copyright nobody would have any reason to market software >or much else for that matter. So I presume that Linux doesn't exist[1]? And, for that matter, I make my living writing software which is given away for free... Mark [1] Yes, I'm aware the GPL uses copyright to enforce its conditions, but it's copright-free in the important sense: anyone can copy Linux and use it with no fear of black ninjas at their door. From jya at pipeline.com Fri Feb 6 05:07:52 1998 From: jya at pipeline.com (John Young) Date: Fri, 6 Feb 1998 21:07:52 +0800 Subject: BXA Crypto Meet Message-ID: <1.5.4.32.19980206125248.00721fd0@pop.pipeline.com> A report on this would be welcomed. Does anyone know who are the subcommittee members? ---------- Federal Register: February 6, 1998 (Volume 63, Number 25) Page 6153 --------------------------------------------------------- Bureau of Export Administration President's Export Council Subcommittee on Encryption; Partially Closed Meeting A partially closed meeting of the President's Export Council Subcommittee on Encryption will be held February 23, 1998, 2 p.m., at the U.S. Department of Commerce, Herbert C. Hoover Building, Room 4832, 14th Street between Pennsylvania and Constitution Avenues, NW., Washington, DC. The Subcommittee provides advice on matters pertinent to policies regarding commercial encryption products. Public Session 1. Opening remarks by the Chairman. 2. Presentation of papers or comments by the public. 3. Update on Administration commercial encryption policy. 4. Discussion of task force development and work plan. Closed Session 5. Discussion of matters properly classified under Executive Order 12958, dealing with the U.S export control program and strategic criteria related thereto. Dated: February 3, 1998. William V. Skidmore, Acting Deputy Assistant Secretary for Export Administration. FR Doc. 98-3001 Filed 2-5-98; 8:45 am From adam at homeport.org Fri Feb 6 05:44:18 1998 From: adam at homeport.org (Adam Shostack) Date: Fri, 6 Feb 1998 21:44:18 +0800 Subject: Feds Approve Bank to Certify Digital Signatures In-Reply-To: <199802051901.LAA19858@comsec.com> Message-ID: <199802061333.IAA22492@homeport.org> I'm not sure it is unfortunate that they'll be offering escrow. If its a complete flop, then we'll be able to point to the complete failure of the released system. Time for some Big Brother inside stickers to be printed out, slapped on flyers for the program, and remailing to potential customers. :) Anyone work at ZNB? Want help quitting? Adam Bill Stewart wrote: | There was a note to Dave Farber's list that the Office of the | Comptroller of Currency has approved Zion's First National Bank | to certify digital signatures. Since they're in Utah, Zion's has | | They're going to offer digital signature certificates | with the usual binding of a key to a body plus papers, | and provide software to support it. Some of their software | can be used for encryption, and unfortunately they're | going to offer key escrow, though as a separate business | service, with keys encrypted by the key's corporate owner | as well as by the bank for protection, but it's not | going to be a mandatory service, and they have no intention | of offering escrow for signature keys, only encryption keys. -- "It is seldom that liberty of any kind is lost all at once." -Hume From ravage at ssz.com Fri Feb 6 06:17:56 1998 From: ravage at ssz.com (Jim Choate) Date: Fri, 6 Feb 1998 22:17:56 +0800 Subject: the best justice money can buy --Lessig (fwd) Message-ID: <199802061414.IAA05746@einstein.ssz.com> Forwarded message: > Date: Fri, 6 Feb 1998 03:13:00 -0800 (PST) > From: mark at unicorn.com > Subject: Re: the best justice money can buy --Lessig (fwd) > Jim Choate (ravage at ssz.com) wrote: > >If there were no copyright nobody would have any reason to market software > >or much else for that matter. > > So I presume that Linux doesn't exist[1]? And, for that matter, I make my > living writing software which is given away for free... So do I, and I bet both our incomes combined doesn't add up to 15 minutes of Bill G's and it won't. From a market perspective we're flies on the back of great elephant. Please be so kind as to describe how and why this marketing mechanism (copyleft) will succed? I've been using and supporting Linux since 1993 (SSZ is listed as a source site in the back of 'Running Linux' since day one) in this manner neither I or anyone else has gotten rich. Linus made so much money off it that he went to work for a company in So. Cali. writing fully commercial software... > [1] Yes, I'm aware the GPL uses copyright to enforce its conditions, but > it's copright-free in the important sense: anyone can copy Linux and use > it with no fear of black ninjas at their door. It's copyrighted in the important sense in that it uses the copyright to enforce its conditions. That is just as important as the marketing decisions made by it. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ravage at ssz.com Fri Feb 6 06:27:32 1998 From: ravage at ssz.com (Jim Choate) Date: Fri, 6 Feb 1998 22:27:32 +0800 Subject: the best justice money can buy --Lessig (fwd) Message-ID: <199802061421.IAA05806@einstein.ssz.com> Forwarded message: > Date: Fri, 6 Feb 1998 03:13:00 -0800 (PST) > From: mark at unicorn.com > Subject: Re: the best justice money can buy --Lessig (fwd) > Jim Choate (ravage at ssz.com) wrote: > >If there were no copyright nobody would have any reason to market software > >or much else for that matter. > > So I presume that Linux doesn't exist[1]? And, for that matter, I make my > living writing software which is given away for free... > > [1] Yes, I'm aware the GPL uses copyright to enforce its conditions, but > it's copright-free in the important sense: anyone can copy Linux and use > it with no fear of black ninjas at their door. A couple of other points. I've never claimed the monopolization would exist over nite or that it wouldn't be filled with short term conflicts and ups-n-downs. Only that the *long-term* result is a monopolized market. A point you seem to gloss over as irrelevant. Let's give the market another 5-10 years and see where Linux stands. Right now the estimate is 6-10 million users world wide use it. Share wise that isn't a lot. The reason that Linux garners so much press right now is that it is in fact an exception when an organization uses the software (eg NASA). The test will be whether it grows significantly over the long run and not the 5 years that Linux has been a serious os. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ravage at ssz.com Fri Feb 6 06:44:25 1998 From: ravage at ssz.com (Jim Choate) Date: Fri, 6 Feb 1998 22:44:25 +0800 Subject: slashdot.org news update... Message-ID: <199802061438.IAA05946@einstein.ssz.com> Forwarded message: > X-within-URL: http://www.slashdot.org/ > John Ousterhout leaves SunScript Contributed by CmdrTaco on Thu Feb 5 > 23:38:53 1998 EST > [Sun Microsystems] From the other-disappearing-acts Dept > Markus Fleck (aka python) wrote in to say "John Ousterhout, author of > the Tcl language and the Tk toolkit, also of Spring OS fame, has left > SunScript to form his own company, called Scriptics, to promote the > use and further development of Tcl. - I suppose that Sun didn't find > paying for Tcl development worthwhile any more, because there has > hardly been any revenue from it yet (even the source for the Tcl > Plugin for web browsers was made freely available when a poll showed > that too few people would be willing to pay for being able to execute > "Tclets" in their browsers)." > Be x86 Coming Contributed by CmdrTaco > [Be] Thu Feb 5 16:26:43 1998 EST > From the mr-be-sharp dept. > Sean Simmons wrote in to tell us that BeOS for x86 should be released > at SD98. Check out this TechWeb Story for more details. I would love > to get my hands on a copy. > Read More... > 21 comment(s) > Should Netscape Sell Linux? Contributed by Justin > [Netscape] Thu Feb 5 16:11:27 1998 EST > From the not-a-bad-idea dept. > An article at the Boston Globe presents an interesting solution to > Netscape's recent losses in the browser war. The author suggests > Netscape create and sell their own Linux distribution, the reason > being that Microsoft will be able to leverage their control of the > operating system for some time. Read on. > Read More... > 38 comment(s) > 2600 In Danger Contributed by CmdrTaco > Thu Feb 5 10:56:14 1998 EST > From the sounds-familiar dept. > I)ruid wrote in to say " 2600 The Hacker Quarterly, has recently been > having financial problems due to it's previous distributor. To find > out the whole story, check out this page. 2600 needs our help, but > will not accept donations. However, there is a LOT of merchandice in > stock, and buying up their overstock will definately help, as well as > going down to your local bookstore and requesting that they carry > 2600. So if you appreciate 2600 as much as I do, let's help give them > the help they need." My sentiments exactly. > Read More... > 8 comment(s) > Cooking pot markets Contributed by CmdrTaco > Thu Feb 5 10:27:02 1998 EST > From the must-read dept. > Hackworth sent us a link to an article entitled Cooking pot markets. > The article is an extremely good read, and addresses issues like What > Motiviates Free Software guys. I suspect most of us free software guys > already know what is said here, but this article puts it very clearly > for people who might understand it a bit less can be clued it. > Read More... > 3 comment(s) > Des2, Bovine and Slashdot Contributed by CmdrTaco > [Encryption] Thu Feb 5 10:09:40 1998 EST > From the bits-and-bytes dept. > Distributed.net has been working hard to crack the Des2 contest inside > the 22 day limit, but it doesn't look like it's going to happen, > despite Team Slashdot's rising in the ranks to #13. Thanks to the > 125-150 of you who have been contributing keys in our name! > Editorials > > Slashdot is participating in RC5. Read who's helping, and why. Check > out Our Current Rank. > > Read Rob's Solution to the Browser Battle and a followup with comments > from a Netscape Engineer. Interesting especially now that Netscape > Agreed! ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From guy at panix.com Fri Feb 6 06:53:34 1998 From: guy at panix.com (Information Security) Date: Fri, 6 Feb 1998 22:53:34 +0800 Subject: Changing to Moderated Cypherpunks -- How? Message-ID: <199802061422.JAA00615@panix2.panix.com> Soon I won't see you anymore, using the moderated list. > Thu Feb 5 20:22:33 1998 > Dimitry "Totally Impotent Since Prostrate Operation" The Dim wrote: > > Adam Back writes: > > > Information Security > > > I'd be glad to handle it. > > > > > > The only criteria is to delete Dr. Dim and his nyms. > > > > How are you going to recognize Dimitri's nyms if he has any. > > Guy Polis thinks that anyone smarter than him (and that's 99.99% of the > population) is my tentacle. He thinks everything on this list except > him and Timmy May is my tentacle, including you too, Adam. > > Guy Polis (guy at panix.com, eviljay at bway.net) is a pedophile child > molester who was fired from his consulting position at Salomon Brothers > after he was caught masturbating in his cubicle at the child pornography > JPEGs that he downloaded from the Internet. > > In retaliation, Guy Polis spammed the firewalls mailing list with megabytes > of e-mail logs that he "intercepted" at Salomon Brothers, and accused > several of his former co-workers and supervisors of various crimes. > > As far as I can determine, Guy Polis has been unemployed since the time > he was fired from Salomon. If anyone knows otherwise, please let me know. All you'll get is resounding silence, especially since you're so clueless as to get my name wrong: hint...not even 'guy' is correct. What a loser! You must love everyone seeing the old traffic analysis report on you: You'll have to go to URL 'www.dejanews.com/home_ps.shtml' to pick it up. Select "old database" and use this in their search box: ~g soc.culture.jewish & ~dc 1997/08/04 & ~s Brighton Beach Perhaps it should be updated and delivered to everyone in your neighborhood and the building you give classes in? You're just a ButtHead who never grew up, still gets a kick out of saying "cocksucker". Your brother Michael had to do your math thesis for you! ---guy You couldn't even cut it in Manhatten. From paulmerrill at acm.org Fri Feb 6 07:14:31 1998 From: paulmerrill at acm.org (Paul H. Merrill) Date: Fri, 6 Feb 1998 23:14:31 +0800 Subject: the best justice money can buy --Lessig (fwd) In-Reply-To: <199802060155.TAA03984@einstein.ssz.com> Message-ID: <34DB522F.5DE@acm.org> > > Hmm... There's no copyright on perfumes. There are market leaders in perfumes, > > but no monopoly; hardly even an olygopoly. > > I can tell how often you buy perfume, the ones I buy for my girlfriend > certainly have a little 'c' on them... The names of perfumes are (generally copyrighted. The perfumes (fragrances) themselves are not. This leaves the door open for knock-offs of the scent that then market under their own names -- and in some cases, claims of being just like "whoever". The situation is not parallel to sw because noone but a linux freak hopes to swep anyone off their feet by putting a ribbon around a tiny bit of sw and giving it for a BDay or VDay or whatever, astheydo with the top name parfums. PHM From ravage at ssz.com Fri Feb 6 08:51:21 1998 From: ravage at ssz.com (Jim Choate) Date: Sat, 7 Feb 1998 00:51:21 +0800 Subject: Test (cypherpunks@minder.net) [No Reply Please] Message-ID: <199802061642.KAA06469@einstein.ssz.com> Test [No Reply Please] ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From bmm at minder.net Fri Feb 6 09:43:24 1998 From: bmm at minder.net (BMM) Date: Sat, 7 Feb 1998 01:43:24 +0800 Subject: new CDR node Message-ID: A cypherpunks distributed list node is now available at cypherpunks at minder.net. I would appreciate it if the current CDR ops would add a feed to this address. Thanks. -BMM - bmm at minder.net From foupe%compuserve.com at oscsystems.com Sat Feb 7 02:12:50 1998 From: foupe%compuserve.com at oscsystems.com (foupe%compuserve.com at oscsystems.com) Date: Sat, 7 Feb 1998 02:12:50 -0800 (PST) Subject: Young Hot Girls New Site Message-ID: <199802074293XAA44563@post.99.231.3> >>Young Hot Girls New Site Can you handle 2 young, hot, sexy girls? Cum watch us at: http://www.livewhorehouse.com Where you can complete our menage-a-trois. We really hate it when you don't cum. Luv Nadia and Alexa XOXOXOXOXOXO ====================================== WE HONOR ALL REMOVE REQUESTS!! JUST MAIL YOUR REQUESTS TO: jackpotx at ix.netcom.com ====================================== 2 From eureka at eureka.abc-web.com Sat Feb 7 02:46:05 1998 From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com) Date: Sat, 7 Feb 1998 02:46:05 -0800 (PST) Subject: Eureka! Sat Feb 7 '98 Message-ID: <19980207083702.2795.qmail@eureka.abc-web.com> Welcome to Saturday's issue of Eureka! ULTIMATE HARDCORE If you're looking for over 200 live strip shows and sex crazed video feeds - 24 hours a day! - thousands of XXX photos - hundreds of Videos (Avis, Movs and Mpegs) - and all totally free for a trial period, then look no further. The only place you need to visit is Ultimate Hardcore. TRY FREE! .. http://www.mr-cash.com/cgi-bin/ult-program.cgi/raw_3171/A Tunnel Hotel pics and chat http://www.tunnel.com Have you ever wished for a site that doesn't run you in circles with more ads than content, blind links, or pop up consoles? A site that doesn't force you to jump hoops to get access. We have no AVS, blind links, or consoles. We have 11,000 completly FREE pictures gathered from the news groups and categorized for your easy viewing. We have free XXX multi roomed chat. DON'T MISS THIS CHANCE! BIG SEX TOYS Sometimes when surfing for porn you have to get a little scared, just for fun. Like when you call your friend over and say out loud, no fucking way, look at that! This is one of those. Click on the free area, then Star's pics, then see the two candle dildo image. She has enough hair on her legs, thighs and bush to make a fucking sweater! You have to see! Big Sex Toys .................... http://www.bigsextoys.com/ READ OTHER PEOPLES DIRTY EMAIL This is a graphically busy site with wierd colors. Let me guide you to the carrot. It's wierd shit day here! Click on enter, then the grey enter button, then click Ambers button, then to the bottom click the nice erect nipple, then at last click on the fourth green radioactive barrel for a wild jpeg of a red haired pussy with a carrot shoved in! I guess the little bunny is a vegetable lover and wants a carrot bad! Read Other Peoples .............. http://pp256.com/email.htm AUSSIE SHOWGIRLS Well good day mate! After the warning page click the try before you buy. Here you will find a sexy mix of images to check out. Pussy, blondes, anal, and nice tits and asses! Aussie Showgirls .............. http://www.showgirls.com.au/ ADULT MEGAPLEXXX There are tons of daily picture links here. As you click on them you are given a free picture then another link, that will lead you to more free pix. Try the daily pic from free xxx pics, then the all free pics, then the amateur gallery. There you will find the gallery with lots of hot sex images! Adult Megaplexxx ............. http://www.darkside.inter.net #READ THIS!! WIN $25,000 and a Fantasy Date - Click Here Now! #$25,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A # HOORAY! THE ADULT SEARCH ENGINE Now you can search for the sex sites you are looking for and fast! This new search engine is setting the standard others will follow. It offers pop-up search and detailed listings! Hooray! -----------------> http://eureka.abc-web.com/hooray/ FREE STREAMING VIDEO Please note that most of these feeds require a Netscape bro- wser in order to successfully view them. Unfortunately Micr- osoft's browser does not have all the features of Netscape's yet. However, many of the feeds use the RealPlayer and will work in most browsers. If you do not have Netscape and want a free copy click here --> http://www.netscape.com/download/ Anal --------------------------> http://204.244.215.7/anal2/ CHAT WITH OTHER READERS Hey, if you haven't checked out the Eureka! Chat sites yet, you're missing out on some great stuff. Every day you'll find hundreds of other readers just like you looking to chat have fun and maybe a little 'cyber'. We know you'll love it! Adult/Sex Chat -----------------> http://137.39.63.229/chat/ General/Fun Chat -------> http://137.39.63.229/chat/funchat/ HOT LIVE PHONE SEX TO MAKE YOU CUM! LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912 LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779 FREE: Live 1-on-1 (international call only)--->011-678-77416 NEW! CENTERFOLD PIC OF THE DAY Exclusive! We proudly present unpublished Pictures of your favorite Centerfolds. Featured This Week: Dec 80-PMOY Terri Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri Kendall, Rebecca Ferratti, Lydia Schone and many more too! ---------------------------> http://www.gatefold.com/eureka/ AMATEUR SITE OF THE DAY Tina: A 23-year-old female swinger/exhibitionist who loves posing for erotic photos, is into hot phone sex and meeting for casual discreet encounters. Tina stands 5 ft 2 inches tall and weighs 105 lbs. This babe is a wet dream waiting to happen. ---------------------------> http://amateurindex.com/eureka/ EROTIC STORY SITE OF THE DAY TabooStories.com: Nasty alert! TabooStories.com gives you the hardest, nastiest sex stories on the net, all free! We have the stories that the other sites don't dare to post! Don't say we dindn't warn you.. http://www.taboostories.com/ DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/ ADULT STAR PIC OF THE DAY Woah, our Adult Star pics are getting hotter and hotter, so make sure you stop by and check out today's - definitely not to be missed! --------> http://www.xxxadultstars.com/eureka/ OTHER EUREKAS! GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/ DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm ESPA�OL ------> http://eureka.abc-web.com/eureka/espanol.htm FRAN�AIS ----> http://eureka.abc-web.com/eureka/francais.htm ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm TODAY'S FREE PIX Pic 1 --------------------------> http://137.39.63.229/?070 Pic 2 --------------------------> http://137.39.63.229/?071 Pic 3 --------------------------> http://137.39.63.229/?072 Pic 4 --------------------------> http://137.39.63.229/?073 Pic 5 --------------------------> http://137.39.63.229/?074 Pic 6 --------------------------> http://137.39.63.229/?075 Pic 7 --------------------------> http://137.39.63.229/?076 Pic 8 --------------------------> http://137.39.63.229/?077 Pic 9 --------------------------> http://137.39.63.229/?078 Pic 10 --------------------------> http://137.39.63.229/?079 ============================================================ TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US. ============================================================ From MAILER-DAEMON at toad.com Sat Feb 7 03:50:59 1998 From: MAILER-DAEMON at toad.com (MAILER-DAEMON at toad.com) Date: Sat, 7 Feb 1998 03:50:59 -0800 (PST) Subject: 145 Million Message-ID: <199801260540.XAA10977@mail.t-1net.com> Removal instructions below. If someone with an 8th grade education can make a personal fortune of $145 million in network marketing with herbs, why can't you? Especially when this person has just decided to come out of retirement to launch an upstart company, marketing products that were used by the Russians to win all those gold medals at the Olympic Games. With more scientific research than anything else on the market, it's no wonder why so many doctors are joining our company and offering these products to their patients. Why not do something different to change your life? Join in with the person who knows how to make things happen big and fast. He has just joined our company and is willing to help you learn how to 'set yourself free'. Someday maybe you can throw the alarm clock out the window. For good. For additional information, please check out the following: http://www.prime-1.com Thanks For guaranteed removal call 1-800-555-9205, ext. 3256, 24 hours a day. From declan at well.com Fri Feb 6 12:14:24 1998 From: declan at well.com (Declan McCullagh) Date: Sat, 7 Feb 1998 04:14:24 +0800 Subject: Software Money Message-ID: http://cgi.pathfinder.com/netly/editorial/0,1012,1722,00.html The Netly News (http://netlynews.com/) February 2, 1998 Software Money by Declan McCullagh (declan at well.com) Successful political campaigns follow a simple formula: 1) Spend heaps of money; 2) Puzzle out how to squeeze your message into one sentence, or, better yet, a bumper sticker. Silicon Valley finally got the first part right. Software chieftains, historically eager to squander cash on doomed marketing campaigns but loath to spend the same opposing government regulations, are about to ante up millions to detangle the skein of rules that restrict sales of data-scrambling encryption software. Sure, it's pocket change to California's zillionaires, but it may be just enough to get their deregulatory point across in the nation's capital. [...] Together the duo will coordinate the lobbying and media efforts of a new industry coalition, as yet unnamed but likely to be dubbed something like the Alliance for Computer Privacy. The soon-to-be-announced project (contracts haven't been signed yet) grew out of the Alliance for a Secure Tomorrow, which firms hurriedly created last fall to battle FBI-backed legislation banning software such as PGP, which is capable of encoding messages so securely that police can't crack them. But the AST languished. Soon CEOs of more than a dozen high-tech companies started talking about a more aggressive approach. "The only time you're going to win this battle is when you put money on the table," says Lauren Hall of the Software Publishers Association. [...] From declan at well.com Fri Feb 6 12:18:04 1998 From: declan at well.com (Declan McCullagh) Date: Sat, 7 Feb 1998 04:18:04 +0800 Subject: FW: SEC Rule Announcement In-Reply-To: <6B5344C210C7D011835C0000F8012766010035B3@exna01.securitydynamics.com> Message-ID: Peter is quite right that the interesting part is HOME computers. It's the Electronic Messaging Association, BTW. My article with comments from them, SEC, NASD, ACLU, etc. is at: http://cgi.pathfinder.com/netly/opinion/0,1042,1731,00.html The SEC may have approved a rule that violates federal law. -Declan At 17:00 -0500 2/4/98, Trei, Peter wrote: >[sorry if you get this twice - pt] > >I have not been able to confirm the claim in this letter - the EMA >does not seem to have a web site. Note that it refers to >employers monitoring employee's HOME computers. > >Peter Trei > >> -----Original Message----- >> From: Larry Layten [SMTP:larry at ljl.com] >> Sent: Wednesday, February 04, 1998 11:04 AM >> To: cryptography at c2.net >> Subject: SEC Rule Announcement >> >> I received information in an Electronic Mail Association (EMA) >> bulletin that said the Securities and Exchange Commission >> approved a rule that would go into effect February 15th that >> requires securities employers to have the ability to monitor >> electronic communications between employees and customers >> on employees' home computers or through third party systems. >> >> Does anyone have any more information on this and how it >> might apply to encrypted email? >> >> Larry From guy at panix.com Fri Feb 6 12:24:39 1998 From: guy at panix.com (Information Security) Date: Sat, 7 Feb 1998 04:24:39 +0800 Subject: FW: SEC Rule Announcement Message-ID: <199802061953.OAA04651@panix2.panix.com> > From cypherpunks-errors at toad.com Fri Feb 6 14:41:14 1998 > > Peter is quite right that the interesting part is HOME computers. It's the > Electronic Messaging Association, BTW. My article with comments from them, > SEC, NASD, ACLU, etc. is at: > > http://cgi.pathfinder.com/netly/opinion/0,1042,1731,00.html > > The SEC may have approved a rule that violates federal law. > > -Declan It was quite unnecessary: all a company has to do is require all company business email contact go through the company's systems, even if home. Furthermore, brokers send email during the work day - like the list of AXEs they have for that day - and send it in the morning. Home email directly to clients is basically non-existent. ---- Stange, how monitoring home email to third parties would be illegal, but Deutsche Bank showing up at a random time to demand (and watch) you give a urine sample is completely legal. ---guy From jya at pipeline.com Fri Feb 6 12:52:25 1998 From: jya at pipeline.com (John Young) Date: Sat, 7 Feb 1998 04:52:25 +0800 Subject: STOA Report Bibliography Message-ID: <1.5.4.32.19980206202304.0071da54@pop.pipeline.com> We've transcribed the 26-page bibliography of STOA's "An Appraisal of the Technologies of Political Control:" http://jya.com/stoa-bib.htm (85K) Zipped version: http://jya.com/stoa-bib.zip (32K) The substantiating details of the cited literature -- study after study of the consequences of inhumane policy and savage commerce eager to oblige it -- are grimmer than the main report. A steady drumbeat for ever more ingenious technology to enforce submission. From emc at wire.insync.net Fri Feb 6 12:52:56 1998 From: emc at wire.insync.net (Eric Cordian) Date: Sat, 7 Feb 1998 04:52:56 +0800 Subject: Krauts Weaken Constitutional Privacy Message-ID: <199802062017.OAA23205@wire.insync.net> BONN, Germany (AP) -- Germany reduced constitutional guarantees of privacy Friday to fight organized crime, ceding historical concerns over past dictatorships to present-day realities. By a one-vote margin, parliament's upper house approved changes to the constitution necessary for eventual passage of a law allowing electronic surveillance in private households. Before approving the measure, however, the opposition Social Democrats won a promise that a parliamentary committee would re-examine the proposed law to include protection for some groups -- including journalists, doctors and some lawyers. The proposed law has raised warnings about reviving the police state tactics of the Nazi regime and former communist East Germany. Mostly, though, critics are worried about breaching confidentiality essential to some professions, such as doctors. Outside of government, journalists and doctors have been the most vocal critics of the draft law, which currently shields conversations between suspects and clergy, parliamentarians, and defense lawyers. Journalists view the proposed law as an attack on press freedom. ``It's not about privilege for journalists,'' the chairman of the German Journalist Association, Hermann Meyn, wrote in an open letter to parliament. ``It's about protection of news room secrets, essential press freedoms.'' The vote Friday weakened the constitutional guarantee of the sanctity of ones home by defining situations when police could bug homes: during investigation of serious crimes -- such as murder, kidnapping, extortion, arms and drug trafficking -- with the approval of three judges. The changes necessary for the law also would allow electronic eavesdropping on suspects after a crime has been committed -- not just to prevent crime -- and for the first time allows information from bugging devices to be entered as evidence. Organized crime has risen sharply in Europe since the collapse of communist regimes in Russia and Eastern Europe, which loosened previously closed borders. Drug trafficking, car theft and smuggling of cigarettes, illegal immigrants and even nuclear material has increased. The law must be passed by both houses of parliament. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" From declan at well.com Fri Feb 6 14:14:24 1998 From: declan at well.com (Declan McCullagh) Date: Sat, 7 Feb 1998 06:14:24 +0800 Subject: The schizophrenic White House and the Internet Message-ID: ---------- Forwarded message ---------- Date: Fri, 6 Feb 1998 13:01:05 -0800 (PST) From: Declan McCullagh To: politech at vorlon.mit.edu Subject: The schizophrenic White House and the Internet Carl makes a good point. When it comes to the Internet, the Clinton-Gore administration is schizophrenic. Ira Magaziner and other White House officials say their attitude towards the Internet is "hands off" and "deregulatory" -- a line that certainly makes for good copy from journalists who don't know any better and don't take the time to learn more. But in truth White House policy is far from hands off. Here are a few areas where the Clinton-Gore administration is calling for greater regulation, subsidies, taxes, and government control of the Internet and related technology: -- Criminal copyright (share software, go to jail) -- Encryption regulations (export ctrls and proposed domestic rules) -- CALEA / Digital Telephony wiretapping funding -- Gore Commission talking about extending FCC rules to Net -- Universal service (taxes and spending for Net access) -- Rating systems (Clinton: "every Internet site" should self-label) -- Net-taxation (has Clinton enorsed Cox-Wyden?) -- Rapacious government databases (DoD recently demanded more access) -- Subsidies for government-approved technologies -- FTC considering banning spam (what about technical solutions?) -- FTC actions on "children's privacy" -- Clinton calling for V-Chip for Internet These are hardly the actions of a deregulatory administration. -Declan ---------- Forwarded message ---------- Date: Fri, 06 Feb 1998 15:33:44 -0500 From: Carl Ellison To: declan at well.com Subject: Re: FC: Magaziner says "No regulation!" at Cato-Brookings event -----BEGIN PGP SIGNED MESSAGE----- Of course, this means gov't hands off crypto policy, too, right? -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.5.3 iQCVAwUBNNtzpxN3Wx8QwqUtAQFYHwP/XpBnkplWMZpc0bIfbNhEnlhzmUsXyMXa rjfgnJGW8jX31fkbXZqcILcURPA31HfHu0K8y/FmmcoD5rcz9my3J785EL5903iS gwm2zvF2uKMdIqACF7BP2pb1bmJvJYWWqXQP7SNjkQpbzFz0XGF4LHAFhbPf24Tw e7694fdXoc4= =vK41 -----END PGP SIGNATURE----- +------------------------------------------------------------------+ |Carl M. Ellison cme at cybercash.com http://www.clark.net/pub/cme | |CyberCash, Inc. http://www.cybercash.com/ | |207 Grindall Street PGP 08FF BA05 599B 49D2 23C6 6FFD 36BA D342 | |Baltimore MD 21230-4103 T:(410) 727-4288 F:(410)727-4293 | +------------------------------------------------------------------+ From tcmay at got.net Fri Feb 6 15:07:30 1998 From: tcmay at got.net (Tim May) Date: Sat, 7 Feb 1998 07:07:30 +0800 Subject: the best justice/kinds of monopolies In-Reply-To: <34DA3157.1FF4FA7A@ssds.com> Message-ID: At 11:52 PM -0800 2/5/98, Bill Frantz wrote: >At 1:38 PM -0800 2/5/98, in a generally right on post, Jim Burnes wrote: >>(this and the strange tendency of >>workers >>to "go postal" -- you rarely hear about FedEX employees going on >>an >>AK47 rampage, must be the water ;-) > >No, the problem is the US Postal Service's willingness to tolerate assholes >as managers. There may be an argument for pinning that on the government >monopoly aspects of the USPS as well. Not just the managers, but the ordinary employees... The Postal Service is effectively bound to keep employees on that any normal business would have simply given the boot to. The benefits of government service.... (Yes, yes, I know some of you will be tempted to cite the official line that the Postal Service is no longer a government agency. Well, this is a distinction without a difference. The USPS retains governmental protections against competition, has government-like powers and protections, and is still run by a "Postmaster General," not a Chairman of the Board or President or CEO. It ain't FedEx or Airborne. Or even UPS, which emulates government agencies.) --Tim May "National borders aren't even speed bumps on the information superhighway." ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From guy at panix.com Fri Feb 6 16:21:03 1998 From: guy at panix.com (Information Security) Date: Sat, 7 Feb 1998 08:21:03 +0800 Subject: Fingerprinting in CA [was Whoa: British SmartCard rollout] Message-ID: <199802070004.TAA27622@panix2.panix.com> > From bill.stewart at pobox.com Fri Feb 6 18:50:28 1998 > > >> How did you CA cypherpunks feel about being fingerprinted? > > Well, if I'd been thinking about it, I'd have put some rubber cement and > whiteout on my thumb before getting the license :-) > More the issue at the time was that the politicians were > busy deciding that your ability to drive safely obviously depended > on whether your citizenship papers were in order (the month > I got it they'd temporarily stopped doing that.) But it is being rolled out all over, state-by-state, never a vote. They don't have problems with illegal aliens in Georgia, USA. A mercifully brief CM excerpt: * Dr. Linda Thompson: * YOUR STATE IS NEXT AND DON'T THINK OTHERWISE. Sandia and other defense * contractors, without a war elsewhere, are OUT OF WORK, so they're * creating job security for themselves by helping fascists wage war in the * United States on us and our rights!! * * Georgia, Texas and Oregon ALREADY require fingerprints for licenses. > California is already fingerprinting drivers, and many places outside of > the US are creating identity cards with barcoded information. > > Also, AmSouth and Compass Banks will soon introduce fingerprinting of > people who cash checks and have no account with their bank. This is > now standard practice in Texas and will soon be nation-wide. Oregon? It's like Wired magazine reported: the NSA is behind it all. The DMV records are online 24 hours for FBI access. > I recently renewed the license, and they didn't ask for papers > or thumbprints... They already got your number. When will some group express organized opposition to this? ---guy Your fingerprint tattoo. From bill.stewart at pobox.com Fri Feb 6 16:23:23 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Sat, 7 Feb 1998 08:23:23 +0800 Subject: Fwd: e-commerce and rights management list Message-ID: <3.0.5.32.19980206074313.0085b190@popd.ix.netcom.com> This showed up on a bunch of lists, not including cypherpunks or cryptography; Phil Agre added some interesting commentary and sent it to the Red Rock Eater list so I'm forwarding that version. >From: Phil Agre >To: rre at weber.ucsd.edu >Subject: e-commerce and rights management >X-URL: http://communication.ucsd.edu/pagre/rre.html >X-Mailing-List: archive/latest/1815 > >[When Judie sent me the announcement for her new mailing list on practical >aspects of deploying rights management and e-commerce technologies, I >was incredulous that such a list doesn't already exist. She persuaded me >by means of the following catalog of related lists, which may be of some >interest. I assume that you can track down subscription info with the >standard search tools. encryption/certificates: ieft-pkix, ieft-open-pgp, >ieft-ldapext, cert-talk, spki, kerberos, dcsb, alice; digital signatures: >temple, california, georgia, texas; copyright: cni-copyright, ecup; legal: >cyberia, law-ipr, euro-lex; rights: cyber-rights, web-rights; e-commerce: >e-commerc, ica, e-payments; digital libraries: liblicensing, diglib, ifla.] > >=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= >This message was forwarded through the Red Rock Eater News Service (RRE). >Send any replies to the original author, listed in the From: field below. >You are welcome to send the message along to others but please do not use >the "redirect" command. For information on RRE, including instructions >for (un)subscribing, send an empty message to rre-help at weber.ucsd.edu >=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= > >Date: Wed, 4 Feb 1998 12:36:26 -0500 (EST) >From: Judie Mulholland >Subject: announcing E-CARM, a new mailing list (fwd) > >[...] > >---------------------------------------------------------------------- > Announcing the creation of a new mailing list: > > ***E-COMMERCE AND RIGHTS MANAGEMENT (E-CARM)*** > >---------------------------------------------------------------------- > >This mailing list has been established to foster and support an on-line >discussion forum where we can: > > * debate (non) technical, administrative and managerial issues > pertaining to: secure transactions, competing rights management > models (e.g. ECMS, PICS, certificates, FIRM, etc.), evolving > standards, supporting technologies and other approaches for > enabling electronic commerce; > * inform each other about upcoming conferences, workshops, etc. > * point to online papers, resources/links, new apps, web > sites, etc. > * identify the critical factors relevant to design, development > and implementation of a rights management infrastructure; > * raise questions, share problems, relate concerns; > * share success/horror stories; > * and much, much more ... > >If you are interested in subscribing to this list, please send a message >to: > > > >with the following line in body of the message (NOT the subject): > >subscribe e-carm "FirstName LastName" (without the quotation marks) > >and after you are notified that you have been subbed, we would ask that >you send a short note to the list, briefly introducing yourself and your >interests in e-commerce and rights management so that we can begin to come >together as a community of shared interest(s). > >E-CARM is intended to be a member-driven, open, collaborative mailing >list. However, its success in creating a viable on-line forum will >depend on individual contributions. As a step in this direction, we >encourage you to share this announcement with other mailing lists or >anyone who may be interested in getting involved. > >Looking forward to seeing all of you on E-CARM, > >Judie Mulholland >Rajiv Kaushik > >List Moderators > > > > > > > > > > > > > > > > > > > > > > > > > > Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From bill.stewart at pobox.com Fri Feb 6 16:27:28 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Sat, 7 Feb 1998 08:27:28 +0800 Subject: Fingerprinting in CA [was Whoa: British SmartCard rollout] In-Reply-To: <199802040323.WAA16673@panix2.panix.com> Message-ID: <3.0.5.32.19980206074009.0085b8c0@popd.ix.netcom.com> >> How did you CA cypherpunks feel about being fingerprinted? Well, if I'd been thinking about it, I'd have put some rubber cement and whiteout on my thumb before getting the license :-) More the issue at the time was that the politicians were busy deciding that your ability to drive safely obviously depended on whether your citizenship papers were in order (the month I got it they'd temporarily stopped doing that.) I recently renewed the license, and they didn't ask for papers or thumbprints, but they still don't print the license at the remote DMV offices; they print them centrally because it simplifies verifying your information with the INS thugs. The citizenship papers issue has basically doubled the market for counterfeit licenses; it's not just excessively bad drivers who bribe DMV employees any more. Back when I lived in New Jersey, the cops would set up traffic stops not only to look for drunk drivers (at 9am?!), but also to check if your papers were in order. I haven't seen much of that in California, but presumably the Southern part of the state does it more often to catch Spanish speakers who are loose in the population. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From shadow at tfs.net Fri Feb 6 16:27:48 1998 From: shadow at tfs.net (sphantom) Date: Sat, 7 Feb 1998 08:27:48 +0800 Subject: Lets check this out Message-ID: <34DBA006.46743131@tfs.net> Here is something for us to check out. Was just emailed to me today. I am curious how this person does it. Dear Friends, If someone named SandMan asks you to check out his page on the WEB DO NOT!!! It is at www.geocities.com/vienna/6318 This page hacks into your C:/ drive. DO NOT GO THERE HE WILL REQUEST A CHAT WITH YOU....don't do it. FORWARD THIS TO EVERYONE... From tcmay at got.net Fri Feb 6 17:30:58 1998 From: tcmay at got.net (Tim May) Date: Sat, 7 Feb 1998 09:30:58 +0800 Subject: Fingerprinting in CA [was Whoa: British SmartCard rollout] In-Reply-To: <19980205.000739.attila@hun.org> Message-ID: At 7:40 AM -0800 2/6/98, Bill Stewart wrote: >>> How did you CA cypherpunks feel about being fingerprinted? > >Well, if I'd been thinking about it, I'd have put some rubber cement and >whiteout on my thumb before getting the license :-) >More the issue at the time was that the politicians were >busy deciding that your ability to drive safely obviously depended >on whether your citizenship papers were in order (the month >I got it they'd temporarily stopped doing that.) >I recently renewed the license, and they didn't ask for papers >or thumbprints, but they still don't print the license at the >remote DMV offices; they print them centrally because it simplifies >verifying your information with the INS thugs. And don't forget the "Department of Deadbeat Dads" thugs. As I recall things, there was a bill passed in the California legislature to beef up computerized tracking of driver-units so that deabeat-units can be identified and marked for collection. The invasions of privacy in the driver's license process is just symptomatic of a larger problem: * government claims that some activity is a "privilege, not a right," and so claims that normal constitutional protections are irrelevant. (One wonders if they believe the First Amendment doesn't apply, that Big Brother may monitor what drivers are saying and deny licenses to political troublemakers: "driving is a privilege, not a right.") * government claims that the "regulation of commerce" language applies much more broadly than the original interstate commerce and very general rule-making language. (One abuse of this was to say that if a student received federal loans, a college could not practice certain of its normal practices...and the college was forbidden from stopping the student from receiving these loans! Catch-22. At this rate, churches will come under federal regulation because they receive Postal Service deliveries. Or because government roads are their only access. And so on.) >Back when I lived in New Jersey, the cops would set up traffic stops >not only to look for drunk drivers (at 9am?!), but also to check >if your papers were in order. I haven't seen much of that in California, >but presumably the Southern part of the state does it more often >to catch Spanish speakers who are loose in the population. Warrantless roadblocks are in place in my town, and, according to the local newspaper, any driver who is seen turning around so as to avoid the roadblock check will have his vehicle subject to detailed search. --Tim May Just Say No to "Big Brother Inside" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From guy at panix.com Fri Feb 6 17:34:11 1998 From: guy at panix.com (Information Security) Date: Sat, 7 Feb 1998 09:34:11 +0800 Subject: Most elegant wording against privacy/law-enforcement "balance" Message-ID: <199802070106.UAA01015@panix2.panix.com> What are the most elegant rebuttals to politicians saying we need Key Recovery as a "reasonable balance between the needs of law enforcement vs. freedom of crypto"? I wasn't too elegant in the Crypto Manifesto. ---guy From nobody at REPLAY.COM Fri Feb 6 18:03:21 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sat, 7 Feb 1998 10:03:21 +0800 Subject: Lets check this out In-Reply-To: <34DBA006.46743131@tfs.net> Message-ID: <199802070148.CAA26783@basement.replay.com> sphantom wrote: > If someone named SandMan asks you to check out his page on the WEB > > DO NOT!!! > > It is at www.geocities.com/vienna/6318 > > This page hacks into your C:/ drive. DO NOT GO THERE All I see there is a few midi files and some badly-written HTML. Nothing there to hack into my C:/ drive. I don't even have a C: drive. If you were running a more secure operating system, you wouldn't either. > I am curious how this person does it. > You obviously haven't been reading this list very long. There are lots of way to do nasty things to microslob windoze, including: Buffer overruns in IE, javascript bugs in web browsers, launching applications thru mime-types, SMB bugs (oob-attack, cd ..\, and others), macro (and other) viruses, buffer overruns in the tcp stack (oversized pings, etc), as well as the near infinite number of possible active-x exploits. From jim at mentat.com Fri Feb 6 18:09:00 1998 From: jim at mentat.com (Jim Gillogly) Date: Sat, 7 Feb 1998 10:09:00 +0800 Subject: Most elegant wording against privacy/law-enforcement "balance" Message-ID: <9802070144.AA11833@mentat.com> Guy skribis: > What are the most elegant rebuttals to politicians saying we > need Key Recovery as a "reasonable balance between the needs of > law enforcement vs. freedom of crypto"? I don't know how elegant it is, but here's my response: Compromising the public's right to privacy gives away not only our own rights, but those of our descendants. The government must make an extraordinary case to justify undermining those rights, and so far it has not done so. The most detailed research on the issue is a study by Dorothy Denning and William Baugh investigating the extent to which crypto has interfered with law enforcement's ability to get convictions: their bottom line was that crypto has not in fact interfered: law enforcement has been able to complete their investigations using other means. There's no demonstrated need for Government Access to Crypto Keys (GACK), so there's no need to compromise away our privacy. Jim Gillogly jim at acm.org From tcmay at got.net Fri Feb 6 18:25:02 1998 From: tcmay at got.net (Tim May) Date: Sat, 7 Feb 1998 10:25:02 +0800 Subject: Most elegant wording against privacy/law-enforcement "balance" In-Reply-To: <199802070106.UAA01015@panix2.panix.com> Message-ID: At 5:06 PM -0800 2/6/98, Information Security wrote: >What are the most elegant rebuttals to politicians saying we >need Key Recovery as a "reasonable balance between the needs of >law enforcement vs. freedom of crypto"? > >I wasn't too elegant in the Crypto Manifesto. I like this for starters: "Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances. " Of course, some in Washington consider this to be a seditious sentiment. But serious, "Information Security" is asking for too much. He is asking us to give our personal opinions about the "most elegant" arguments. Debates about key escrow have been raging for almost five years now. He's not likely to get new arguments here, or newly-written articles. I urge him to either consult the archives of this list or the thousands of articles in many places. Search engines are a good way to find them. Of course, I expect various folks will answer his call and write down their reasons. I just doubt strongly that they'll be arguments as good as what was written years ago. --Tim May Just Say No to "Big Brother Inside" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From ASCOM at hx3em6.net Sat Feb 7 10:48:28 1998 From: ASCOM at hx3em6.net (ASCOM at hx3em6.net) Date: Sat, 7 Feb 1998 10:48:28 -0800 (PST) Subject: Make $50,000+ through the mail for FREE! Message-ID: <68354425_85875416> Subject: GET LEGAL CASH IN MAIL W/ ONLY $5.00 READ THIS YOU WON'T BE SORRY, I WASN'T This will be the quickest way to get cash in the mail.If you follow these instructions carefully, you will be able to receive within two months nearly $50,000.00. The great part is is that $5.00 isn't really a whole lot and it could just be worth a try. I am currently 6 months pregnant and my husband and I are in debt. We both have really good professions but he has massive student loans and credit card bills (I was lucky and my father helped me through college). Needless to say, since we are married to one another I acquired his debt also. In any case, I followed these easy steps thinking that I really had nothing to lose and guess what? The first week I started getting money in the mail! I was shocked! I still figured it would end soon. The money just kept coming in. In my first week, I made about $20.00 to $30.00 dollars. By the end of the second week I had made a total of over $1,000.00!!!!!! In the third week I had over $10,000.00 and it's still growing. This is now my fourth week and I have made a total of just over $42,000.00 and it's still coming in ....... You send $1.00 to each of the 5 names and address stated in the article. You then place your own name and address in the bottom of the list at #5, and post the article in at least 200 newsgroups. (There are thousands) and that is all. Let me tell you how this works and most importantly, Why it works....also, make sure you print a copy of this article NOW, so you can get the information off of it as you need it. The process is very simple and consists of 3 easy steps: Like most of us, I was a little skeptical and a little worried about the legal aspects of it all. So I checked it out with the U.S. Post Office (1-800-725-2161) and they confirmed that it is indeed legal! Seriously, your story will sound like this one if you participate by doing the following: STEP 1: Get 5 separate pieces of paper and write your address on each piece of paper along with "PLEASE PUT ME ON YOUR MAILING LIST." Now get 5 $1.00 bills and place ONE inside EACH of the 5 pieces of paper so th e bill will not be seen through the envelope to prevent thievery. Next, place one paper in each of the 5 envelopes and seal them. You should now have 5 sealed envelopes, each with a piece of paper stating the above phrase and a $1.00 bill. What you are doing is creating a service by this. THIS IS PERFECTLY LEGAL! Mail the 5 envelopes to the following addresses: #1 Corey McNear 233 Olive st. West Reading, PA 19611 #2 R. M. 66 Navesink Drive Monmouth Beach, NJ 07750 #3 Sam 27248 Grano Avenue Saugus, CA 91350 #4 Pat anderson 41 pilote st-ambroise Pq #5 Nick Austin 12318 Dollar Lk dr Fenton, MI 48430-9734 STEP 2: Now take the #1 name off the list that you see above, move the other names up (2 becomes 1, 3 becomes 2, etc...) and add YOUR Name as number 5 on the list. STEP 3: Change anything you need to, but try to keep this article as close to original as possible. Now, post your amended article to at least 200 newsgroups. (I think there is close to 18,000 groups) All you need is 200, but remember, the more you post, the more money you make! Don't know HOW to post in the newsgroups? Well do exactly the following: FOR NETSCAPE USERS: 1) Click on any newsgroup, like normal. Then click on "To News", which is in the top left corner of the newsgroup page. This will bring up a message box. 2) Fill in the SUBJECT with a flashy title, like the one I used, something to catch the eye!!! 3) Now go to the message part of the box and retype this letter exactly as it is here, with exception of your few changes. (remember to add your name to number 5 and move the rest up) 6 4) When your done typing in the WHOLE letter, click on 'FILE' above the send button. Then, 'SAVE AS..' DO NOT SEND YOUR ARTICLE UNTILL YOU SAVE IT. (so you don't have toype this 200 times :-) 5) Now that you have saved the letter, go ahead and send your first copy! (click the 'SEND' button in the top left corner) 6) This is where you post all 200! OK, go to ANY newsgroup article and click the 'TO NEWS' button again. Type in your flashy subject in the 'SUBJECT BOX', then go to the message and place your cursor here. Now click on 'ATTACHMENT' which is right below the 'SUBJECT BOX'. Click on attach file then find your letter wherever you saved it. Click once on your file then click 'OPEN' then click 'OK'. If you did this right , you should see your filename in the 'ATTACHMENT BOX' and it will be shaded. NOW POST AWAY! FOR INTERNET EXPLORER: It's just as easy, holding down the left mouse button, highlight this entire article, then press the 'CTRL' key and 'C' key at the same time to copy this article. Then print the article for your records to have the names of those you will be sending $1.00 to. Go to the newsgroups and press 'POST AN ARTICLE' type in your flashy subject and click the large window below. Press 'CTRL' and 'V' and the article will appear in the message window. **BE SURE TO MAKE YOUR ADDRESS CHANGES TO THE 5 NAMES.** Now re-highlight the article and re-copy it so you have the changes.... then all you have to do for each newsgroup is 'CTRL' and 'V' and press 'POST'. It's that easy!! THAT'S IT! All you have to do is jump to different newsgroups and post away, after you get the hang of it, it will take about 30 seconds for each newsgroup! **REMEMBER, THE MORE NEWSGROUPS YOU POST IN, THE MORE MONEY YOU WILL MAKE!! BUT YOU HAVE TO POST A MINIMUM OF 200** **If these instructions are too complex to follow, try Forte's "Free Agent." It is freeware for noncommercial use. To download it, simply use a search utility and type "Forte Free Agent". You should be able to find it.** That's it! You will begin receiving money from around the world within days! You may eventually want to rent a P.O. Box due to the large amount of mail you receive. If you wish to stay anonymous, you can invent a name to use, as long as the postman will deliver it. **JUST MAKE SURE ALL THE ADDRESSES ARE CORRECT.** Now the WHY part: This entire principle works because it is in a format of an upside down tree with thousands of branches. Everyone below you will see to it that the tree continues because they want to get money. Those below THEM will continue because THEY want to get the cash etc. Out of 200 postings, say I receive only 5 replies (a very low example). So then I made $5.00 with my name at #5 on the letter. Now, each of the 5 persons who just sent me $1.00 make the MINIMUM 200 postings, each with my name at #4 and only 5 persons respond to each of the original 5, that is another $25.00 for me, now those 25 each make 200 MINIMUM posts with my name at #3 and only 5 replies each, I will bring in an additional $125.00! Now, those 125 persons turn around and post the MINIMUM 200 with my name at #2 and only receive 5 replies each, I will make an additional $626.00! OK, now here is the fun part, each of those 625 persons post a MINIMUM of 200 letters with my name at #1 and they each only receive 5 replies, that just made me $3,125.00!!! With a original investment of only $5.00! AMAZING! And as I said 5 responses is actually VERY LOW! Average is probable 20 to 30! So lets put those figures at just 15 responses per person. Here is what you will make: at #5 $15.00 at #4 $225.00 at #3 $3,375.00 at #2 $50,625.00 at #1 $759,375.00 When your name is no longer on the list, you just take the latest posting in the newsgroups, and send out another $5.00 to names on the list, putting your name at number 5 and start posting again. The thing to remember is that thousands of people all over the world are joining the Internet and reading these articles everyday, JUST LIKE YOU are now!! And this will go on and on and on and on.... get the picture? Well, there's 5,000,000,000 people on the world and most of them will eventually end up being hooked into the internet. So there are virtually unlimited resources. Of course this will work the best at the very beginning so the faster you post, the better for YOU! People have said, "what if the plan is played out and no one sends you the money? So what! What are the chances of that happening when there are tons of new honest users and new honest people who are joining the Internet and newsgroups everyday and are willing to give it a try? Estimates are at 20,000 to 50,000 new users, every day, with thousands of those joining the actual Internet. Remember, play FAIRLY and HONESTLY and this will work. You just have to be honest. Make sure you print this article out RIGHT NOW, also. Try to keep a list of everyone that sends you money and always keep an eye on the newsgroups to make sure everyone is playing fairly. Remember, HONESTY IS THE BEST POLICY. You don't need to cheat the basic idea to make the money!! GOOD LUCK to all and please play fairly and reap the huge rewards from this, which is tons of extra CASH. **By the way, if you try to deceive people by posting the messages with y name in the list and not sending the money to the rest of the people already onhe list, you will NOT get as much. Someone I talked to knew someone who did that and he only made about $150.00, and that's after seven or eight weeks! Then he sent the 5 $1.00 bills, people added him to their lists, and in 4-5 weeks he had over $10k. This ishe fairest and most honest way I have ever seen to share the wealth of the world without costing anything but our time!!! You also may want to buy mailing and e-mail lists for future dollars. Please remember to declare your extra income. Thanks once again... From tcmay at got.net Fri Feb 6 18:53:59 1998 From: tcmay at got.net (Tim May) Date: Sat, 7 Feb 1998 10:53:59 +0800 Subject: Most elegant wording against privacy/law-enforcement "balance" In-Reply-To: <9802070144.AA11833@mentat.com> Message-ID: I strongly, emphatically, disagree with the reasoning used here by Jim Gillogly: At 5:44 PM -0800 2/6/98, Jim Gillogly wrote: >Guy skribis: >> What are the most elegant rebuttals to politicians saying we >> need Key Recovery as a "reasonable balance between the needs of >> law enforcement vs. freedom of crypto"? > >I don't know how elegant it is, but here's my response: > >Compromising the public's right to privacy gives away not only our own >rights, but those of our descendants. The government must make an >extraordinary case to justify undermining those rights, and so far it >has not done so. "So far it has not done so." This "argument based on utilitarian need" is at odds with the First Amendment. The notion that a form of speech in letters and phone calls and conversations could be compelled because, say, the government concludes that it is needed to stop some criminal actions, is ludicrous. A policy requiring certain forms of speech is no different from a policy saying the government may enter a house when it wishes. I am drawing the parallel with the Fourth deliberately: no amount of "study," even a study by such august persons as Denning and Baugh, could ever conclude that wholesale, unwarranted searches are permissable. The Fourth was put in just to stop such broad conclusions. Likewise, the First is clearly directed against such broad restrictons on speech (and religion, and assembly, and complaining (petitioning)) so that no "study" can be used to broadly restrict speech. And make no mistake about it, whatever the accepted arguments for restricting certain types of speech (notoriously, the "Fire!" example) are, they are not consistent with a broad requirement that persons face imprisonment if they speak in codes, or fail to use transparent envelopes, or disconnect the microphones in their homes! >The most detailed research on the issue is a study by Dorothy Denning >and William Baugh investigating the extent to which crypto has >interfered with law enforcement's ability to get convictions: their >bottom line was that crypto has not in fact interfered: law enforcement >has been able to complete their investigations using other means. >There's no demonstrated need for Government Access to Crypto Keys >(GACK), so there's no need to compromise away our privacy. Bluntly pu, "FUCK "DEMONSTRATED NEED"!" And what if Denning and Baugh had reached other conclusions? (As well they might, next year, when crypto is more widely deployed.) I have strongly argued over the years against ever using some "government study" as the basis for our arguments, even when the studies appear to support our position. What the studies giveth, the studies can taketh away. --Tim May Just Say No to "Big Brother Inside" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From ravage at ssz.com Fri Feb 6 19:09:31 1998 From: ravage at ssz.com (Jim Choate) Date: Sat, 7 Feb 1998 11:09:31 +0800 Subject: Most elegant wording against privacy/law-enforcement "balance" (fwd) Message-ID: <199802070250.UAA09222@einstein.ssz.com> Forwarded message: > Date: Fri, 6 Feb 1998 18:31:49 -0800 > From: Tim May > Subject: Re: Most elegant wording against privacy/law-enforcement "balance" > >Compromising the public's right to privacy gives away not only our own > >rights, but those of our descendants. The government must make an > >extraordinary case to justify undermining those rights, and so far it > >has not done so. > > "So far it has not done so." > > This "argument based on utilitarian need" is at odds with the First > Amendment. It's at odds with the entire concept of 'inalienable rights' and 'government instituted by the governed'. > I am drawing the parallel with the Fourth deliberately: no amount of > "study," even a study by such august persons as Denning and Baugh, could > ever conclude that wholesale, unwarranted searches are permissable. The > Fourth was put in just to stop such broad conclusions. I would say more broadly the Constitution and in particular the Bill of Rights was implimented to eliminate these issue from the federal level. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From WebWarrior3 at InfoWar.Com Fri Feb 6 19:21:51 1998 From: WebWarrior3 at InfoWar.Com (WebWarrior3 at InfoWar.Com) Date: Sat, 7 Feb 1998 11:21:51 +0800 Subject: Lets check this out *yawn* In-Reply-To: <34DBA006.46743131@tfs.net> Message-ID: <34DBCD51.E7B8DC7B@InfoWar.Com> This person doesn't do it...there is nothing on the site that is in the least bit out of the ordinary. Here is the HTML. There IS a great hacking page run by a guy named Sandman... http://www.unitedcouncil.org is the URL for that one. -Scott Brower http://www.infowar.com http://www.efflorida.org Index of /Vienna/6318

Index of /Vienna/6318

      Name
Last modified     Size  Description

[DIR]
Parent Directory 06-Feb-98 14:23 - [SND] ACDC.MID 10-Sep-97 05:12 21k [SND] AXEL-F.MID 10-Sep-97 05:13 35k [SND] GANGSTA.MID 10-Sep-97 05:13 60k [SND] HCALIF.MID 10-Sep-97 05:14 136k [TXT] INDEX.HTML 10-Sep-97 05:12 4k [SND] ISWEAR.MID 10-Sep-97 04:53 20k [IMG] MAILX.GIF 10-Sep-97 04:53 3k [IMG] MURLK.JPG 10-Sep-97 04:53 6k [IMG] ROCKET.GIF 10-Sep-97 04:53 2k [TXT] SDFDB.HTM 10-Sep-97 05:01 4k [SND] STAIRWAY.MID 10-Sep-97 05:02 28k
sphantom wrote: > Here is something for us to check out. Was just emailed to me today. > > I am curious how this person does it. > > Dear Friends, > > If someone named SandMan asks you to check out his page on the WEB > > DO NOT!!! > > It is at www.geocities.com/vienna/6318 > > This page hacks into your C:/ drive. DO NOT GO THERE > > HE WILL REQUEST A CHAT WITH YOU....don't do it. > > FORWARD THIS TO EVERYONE... From 1gI93TS23 at juno.com Sat Feb 7 13:43:57 1998 From: 1gI93TS23 at juno.com (1gI93TS23 at juno.com) Date: Sat, 7 Feb 1998 13:43:57 -0800 (PST) Subject: Subliminally Seduce Women Instantly Message-ID: <6ORJuc63p6U> Win over any woman you want in less than an hour. GUARANTEED! Start dating women that until now were 'out of your league' GUARANTEED! I know it sounds too good to be true, but it is now� possible for you to achieve in minutes, what typically takes most men days, months, and sometimes even years to accomplish...SEDUCING A WOMAN! Skeptical? Read this. Then visit our web site to learn the FACTS! Scientists worldwide agree that, in certain applications, subliminal mind control can accomplish amazing things. You might have heard how in the 1950s subliminal advertising was used in movie theaters to induce an unnatural craving for popcorn and an unquenchable desire for Coke. There are many types of subliminal thought control.� Certain subliminal influence techniques work AMAZINGLY well, while others hardly work at all! If you don't think modern subliminal technology can change your life, THINK AGAIN! For less than the cost of a single good meal you can instantly and permanently change the way women treat you. GUARANTEED! And the best part is that (due to a legal loophole) this is perfectly legal! If your luck with women has been anything other than GREAT, find out the FACTS by visiting our web site. Once you have received and tested one of our audio tapes you will be AMAZED! Don't make the mistake of confusing the antiquated technology used in the past with newly developed digital mastering techniques. We have spent years developing computer enhanced techniques that enable us to produce mood altering products that work on any woman, anywhere, anytime... GUARANTEED! You cannot turn women into mindless sex slaves with this or any other technology. You can, however, induce at will, natural urges that would otherwise lie dormant. It is simply a fact that any natural human desire such as sleep, hunger or sexual impulses can be GREATLY INTENSIFIED by using subliminal commands. When you play these recordings in the presence of any female who has a normal sexual appetite, look out!� She won't know what has come over her! It is completely undetectable! Even women you barely know, when subjected to this invisible aphrodisiac will find you more interesting and better looking. They will find themselves mysteriously drawn and sexually attracted to you. GUARANTEED!! Each of our musical recordings comes with a second 'demo' tape (free of charge) that has the subliminal messages brought forward for you to hear loud and clear. Don't let your girlfriend hear this one! WARNING: We have given you the opportunity to be more successful with any woman you choose. If you do not at least check out the facts for yourself, you will only be cheating yourself out of happiness and romance. To find out more about these AMAZING tapes at our web site at: http://www.ivpco.com/~speccass/index.html or, if your mail reader supports hyper-links, CLICK HERE If our main web site is busy, try our new mirror site: http://www.emptyshell.com MIRROR ********************************************************************** This message was sent by Overseas Internet Promotions, Inc. of Miami. If you have a product or service you want to market on the Internet, call us today @ 305-668-7502 ********************************************************************** From nobody at REPLAY.COM Fri Feb 6 22:46:42 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sat, 7 Feb 1998 14:46:42 +0800 Subject: BBN Message-ID: <199802070630.HAA00869@basement.replay.com> Timothy C[unt] May is the living proof that anal sex causes pregnancy. ____ \ _/__ Timothy C[unt] May \\ / \/ From nobody at REPLAY.COM Fri Feb 6 23:02:10 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sat, 7 Feb 1998 15:02:10 +0800 Subject: <> Message-ID: <199802070635.HAA01426@basement.replay.com> -----BEGIN PGP MESSAGE----- Version: 2.6.2 pgAADLnWeabhI+0ORYNMU/lAjji9vyEXXFdij7LrQ3IiyJVTUhZcq0tebm1ghqo0 tazql+yg+RCY3vyHTYw1NsNdbCbimEQV/iOGt6C37R/GbtjTbGynyS5ZaYm7h0tD MmyLxHn1VMtyrm/V42fkLEIxiIdV4/CyI1G+hMCOg1Z3f8n96ddzTShPNw3AjKF2 0iXKAzUW5oC0Fd50WyEmNL2LyGMpJ2FDYGILSV1bKtxIEUPDemhq54HjnxCaBw8Y zdNUSEgAv3SeXJZKKIIm5/cVfZ4cxiw/JahuvV02X9NFLLaSaQPV6fBjhXYH28bH SaEpdpKaMT4Ldjpun6UYYpI6CXqI47ABoL3+I/17ycKWuoU4cpqN3cD7dOOamf+w oArX+bo2npyd47Q/ZEsJI4Hrx2E00tcKbZ/Umx02SkkjDlFNdvjuoWgmnWl0+zrn gSDjCBDDFcEbG2WNlnlFYNA94dYQPI+L9PcR3iCe1BPyku3M5/fb5VpGpeK1HtYr lAH/rrH8+sMP40nkcxirlgdgrw6G8cEl4V+DHfxRMup4Zht2b1zG7igXDKdqg7Bg /Dve+ZSumEpmBf0n3f83APtlPeeSmfG6C3xzmUtCxtE9GGJx678I7etIx2KVs326 zFQPMgOF6ij+JdtF0QQEZ0vKWvec0z1syrsR4ZJzqgcOg50EVa95uhIkYypZCuSy 0jDZerDmwjdlAEhIIEP9JVTR7GjgfiST5qAIJ5tfKAjDDBcPpv/trNFOIBu6TXJn gQH2G8NlB2Hs23Ja76bdwcT+K7GYmqLnrM38pEX3LRBvAGnPkIhwpfzijNmVD5CE Tne1dHgz+hTtEBzFK4zXSrZNU0rhL8baGirc68yM9U0V91ritC0BJXeUOM4uw/mu N6WhGvYd9DI6ZBZHZqXmIyb0oYTbmNn8MMtZtIbSPseyzIZaVTmgeaLSwTa5zERz Z19yFb10wLFRHkqfCV3Jt7gRhGpHiQCpzlzmyDSLHjPRx+pPAqv2+RwMFEapRyIJ DIj+RqG8aTc2OK4rOjOWCKD2yf7+naqYSC1YEsix+voWWCZ7Jpn3pAZy8EMnevaF FsXwdgqrSEgAxrc+f1MXn3Nl3gyE0mOVQ3n29OgkCM6NNvfuA+w7y6G3njDidk5f P6l3Y0iRc+OQH/TC4EF0aQ5y4QEJQykLc2dtiH/Cn9bcwCMLvOGpRsfiiPqGMTNO Atngp2e4OTLLTuAZNvHNZxTe4DAHNMHOGDKOIuF1Jp+5UQzNfuKble5y8BNauJDB sRpgzc3jndODxNnKpQy03RPFqR9XPwk2Gxl1IdSSf1NhvGwLaWrfyNpCnDj3aWmb ce9jGITKYvZZlg2w5u0U9v+xSrnAH2GSWWLnIEHsfGKTxY2peqsLUwm6zEvijrsY 1Xvl7obQtucTxz6QZdo56wkUO6Qmr8x6TBvr0D3IUtd+pDbwy3jQlaOvQgKjUJpy e+JtxeyB4/GLhBAW7kyYThr2FSKxWGo+t7ADJFGjYmgEuCZDQ7noZiLFuLeTCSVu GQGsDHilKlZFnDAWBhN0BVxcMvrbYd+SNM3UIx/ZZ7bASp7PPgEh6xc45nxNkTwM D9jybrsMT6pthHSzWT9irnKP88ffM0bpOAKsmyvb3C/vPR2vcKeGQd55KmgTA9AO hqu5nqpNHjcmqEQgwv1i3cq5PS7Sb3hpJfItaYnRTGn6WEnVHjSU6qKK8dlAKuFL BMeKgn6oZd2Ykfpfl5yYQNmSxxJyeH2ohgoIPrsMM00VxLmLqpjm8ZEo9Bhle2is ni+NI3oruVJf//TUy5FYXIhw0BTo7ZOVjNVzdf7bMfJ6CsutYvQ0Ok6a5jehH3vb fwMirrsU7tMMQWm8tQg1ODwJYCrQxucuugXkWz7z3IOG2Dzd8O3JV0KEs3uFuBAi JV5f2wSabRli5bb33ZsJrIePojnjDWE6202KjSh4m7RyjczMjE+ImUEEqK6SshFa 8CWucQrr2B0NpyrDkPMSi1sOT4QUGGhM6HmST1aEOo4/OoesIH70rJ6wdJ24WDDb NlTOzN2SZetIjHW81RE7KUl6xLRlC/P9tF92HrS/KZz+/WZV3nBkUMMrojZaTwsR e/OwNwIUGj/X/bZbaxrYX7l90eGXNhwGu0zzAJluhg5/7pC2hrZIbDYLpILirCTa l/ArMao2FibzMAzdFX4hpFI9n2aoPsM2ac5unJzomZxg2+BFtdi4e6o2Rl3vocPi df7m21HsSsei2q7skYL8hEE2x5e8fhAyRL+OkCJQeu5wFko2e5DOlCtMUmHInq6Z pSFK3w8B6reIkCJ0957DdgUf8PeS+DibO4FjuWgRKt3PpB9ySKawmQ1fssVFUpDc P/nIn0QXihma7KVT6acUL5IivI2XBJS5aK24Fs2R+/3hncbN0SIk5UZf2UOxMKFX heHf0+7yi+i98FI+6DEioIObdgRR8bVBjIK/2iVj/U89UsKGUimYSlHuREDwUEA7 7x7+Jhyaf3Mwygi4XQAwgQR1PZDTu+66AMvJJQoXXEGRSxwIc+6x6coZCMvI67r5 9eFnj4VWjrljrylYN5CZvmBj3E8SZEYrGKpuvawJ1hSVV0OLZYasNVVOQe83/0Lx oE6lF8bZRnGqxykyTqFXveGt6nK5QJophfG/gS2rd4oEsgL3UDYMygKBvH4m1IB+ MjEfckXXjhnSvTXTP4qfCEbqd3nm6dLRsS7fIRCM2HHm7EJ1KZpuNg0XXqAplkqs x58P0cyUlzDfg/sJqyj7LidWiatRsRuC95i7c6KuZwkmVWKuL1ZNLtgPAL4Fjwik 2vbDd1c7TmqpiHWqdX2IeITY0K9Ob+FquZhuT4gEGDbH5/T8RANNNosJ7ck8eBog PjBVvddG0XN9CeFQ5zrMgtMJHtixlEPFStd79CU5HvI5rUW9XKorGEdwGjt/QnMR vHMXq8ruEjlZpr/WKY+klzF8qhh6IsUD2SEnQrc/BvuIY+3cQzrsEf4UWEKX2j82 fbd9JZ6ehQP0UfASHODezmtKIwcAJOWO7qPZlAGxqECiTAK0GHyYGofvHM/2h3wU 83/y4DGcWkktqzSEwMTU5kBe78ORKigDEymsX9GWsBjbhQLnDQStUk1kYPd1mpY8 SWCwIRx0OvsOTlTl9qpHfeKxaDZXIxWngJ3M9FnXLuaVkKerd09h0FQDlFgpu49m bV7rZeh95/yma8yCM1TyZp++aQZZNuvSlmIvuUUodsb3oXoDsVZpfhEW4ZBng4+U 1ORy2gEQArPAsmDc2thk6M9jT4HEO0uWQC6ok1amNu4XKEseSi60tpITwSy1KlGm odZL+nyPQPyHJMVmGFxx+iiIWHxmXgInBpMZMcRYDnDP6rwBchit1uO7QVuxvwUx 5O/b4CxgD3bZPVeWeayXCEwAa/pZIktVh/Bgco0+OBRvyOaoPvLh5H1X91dWzipk D1A5f0fkLbBeNm09EJNaL9oZmzc9vGrr+yjHQwvS7M5pS3YY9BPW5wI0AOCdy0nF LUr//uYMAOtkzxU66JTfwGt8FwKHxZcSQeaC1e3QRQF1/s78UILvUTWOiqu0Fo/r FMa4QAxwL5Uifs4jLo7RXPdwpZFN6VnPG7lZtq+jHvXXoLm3NotixXkgZhyUInMm JUHZZ1NguZjSpLUXGmnNl8gTmstZk9JIgz1A2LjN9W7U3zF8i9BGS8T2t5xalKgk TqmR9+sWiYynxCh+O43L8vmn8zjosO3h34H0BuT+6rWN8h8jOaZ9j6arPhqzk+w2 8sPR1DHpNQtaa1PQI5RVmsgoZ6YQfbJbL9YBzDv+wmp3uuLTAiNYLRmPsMfdRB4t 9pPVyRIjhrLGUGRroV8a8syRdofNZKx4f2s8o5R+rwihlTa+pkdB0F4oqr8HP3nz 6RjfRzSVpAH5HnfzkaaAkn9F19ztNTRbueMsZY2QtdHa/8B5qrHXZTd9fZ0AbiqR ScBTctOftLyHx44XbCjtUpNXyt0Dc/wnvLKfZsyq3OkttAFZsfJJaf7MLgqnuBMZ hEbfTF4+NIhPvOTaknUOQmIv0HUeghEHpRJpSK4S9/YltDRh2ARYRDbJhno/kDbF ZiquLTnMaK8ipdgiG0wOMQ/9JmWiv94xC8vj4lEudBkePSjOgMQ/ydZFySsLAC8i CA0HbL7UXToBDG9ML78DB8KXfGHcxA7ggo12733ob2vXbY93SPvDw6xT6PpCrcck LpE19Y7s3Ji7TvSBpvASXvcK/1Pl7IFFDE4VGXuqZYMPQqdLSnAm31YXO2yODn44 qcVUnXTbHDoO+8vw5AU7AXb1QRilt7RUMYOD+ZMvjRwviun+e81CWJopCswOFA== =wNBG -----END PGP MESSAGE----- From bill.stewart at pobox.com Fri Feb 6 23:02:24 1998 From: bill.stewart at pobox.com (bill.stewart at pobox.com) Date: Sat, 7 Feb 1998 15:02:24 +0800 Subject: the best justice money can buy --Lessig (fwd) In-Reply-To: <199802051634.KAA02262@einstein.ssz.com> Message-ID: <3.0.5.32.19980206181238.007b4ac0@popd.ix.netcom.com> At 10:34 AM 2/5/98 -0600, Jim Choate wrote: >If there were no copyright nobody would have any reason to market >software or much else for that matter. I would predict that much of >the technology and infrastructure we have now wouldn't exist. >It would also stiffle [sic] creativity and new methodologies because >there would be no profit in it to recoup development costs. If there were no copyright, markets for information and entertainment would definitely have evolved differently than they have in the US and Europe, and would use much different mechanisms for getting money to the producers of information, such as standard sale contracts.* On the other hand, if there were no colonialism, markets for sheep in New Zealand would have evolved much differently than they did, a problem they're now gradually working their way out of. The music business, for example, handles paying authors when their works are performed by performers through mechanisms other than just charging big bucks for sheet music. The Free Software Foundation found that with a bit of academic and military socialism to jump start it, there are a lot of reasons for people to create value and beauty, and you can even talk corporations into paying money for support. Van Gogh found good reasons to paint, in spite of being broke. Michaelangelo found good reasons to paint, and Gutenberg found good reasons to print, in spite of not having copyright protection. Newspapers eveolved in an environment where copyright wasn't a big deal; if your competitors ripped off your stories, they were a day late, and you could rag them about it in your own paper. Mainframe software evolved in an environment where contracts covered use of the software, and copyright was seldom relevant; that has gradually changed with mass-market computers, but it took a while for courts to accept the idea of copyrighting software, and the industry didn't refrain from writing the stuff. Copyright is certainly a major market convenience, because it means that individual authors, middlemen, and readers don't have to negotiate contracts each time they trade information for money, or having to read the annoying shrink-wrap licenses on books the way they did for a while on packaged software. It also makes it more difficult for alternative mechanisms to evolve, because it's got an 800-pound well-armed gorilla subsidizing it. >Those who would survive in such a market would be >the 800-lb gorillas because only they would have the resources >to squash the smaller companies. If I read Mark's note correctly, the gorilla he was talking about wasn't MicroSloth, it was the government. We may joke about Gates being the Evil Empire, but it's clearly a joke; we've seen the real thing. >Free markets monopolize. and in a following note, Jim says that that's true mainly for the long run, not necessarily for the short run. It's not only incorrect, especially as expanded upon, it's irrelevant to the moral question. If your alternatives are free markets, where you and I can offer to buy or sell products without anybody beating us up for it, versus non-free markets, where some gang can beat us up for not going along with the program (whether the gang is the Mafia, the Pinkertons, the KGB, or "your neighbors in a democracy"), there's no question which is morally acceptable - even if the violence-based market is often more convenient for some goods. But morality aside, monopoly, in the sense of a single player or small group of players domination the sales of a commodity, is something that can certainly happen in the short run but is unstable in the long run unless the competition can be prevented by threats of violence (whether by the monopoly or the government.) If people are free to offer competing products, maintaining market share is difficult, and the market leader not only has to contend with the other big dogs, but with being nipped to death by Chihuahuas, and with being made obsolete by better technologies. Who monopolizes tabletop radios these days? (Who cares?) Who monopolizes Video Cassette Recorders? They're both relatively free markets, in spite of the FCC's attempts to enforce standards, and Sony's attempts to monopolize the BetaMax market. On the other hand, radio and TV broadcasting are near-monopolies, because the Feds have been "helping" protect our public airwaves. ------------ * Some Libertarians and some Libertarian-bashers will argue that using government courts to enforce contracts is still hiring the 800-pound well-armed gorilla to carry out your private business activities.... Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From dlv at bwalk.dm.com Sat Feb 7 17:31:02 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Sat, 7 Feb 1998 17:31:02 -0800 (PST) Subject: Washington on the verge of being nuked? In-Reply-To: <1.5.4.32.19980208003515.00744198@pop.pipeline.com> Message-ID: John Young writes: > Manhattan would be easily blown, remotely. Place a time-charge > beneath a car at the head each principal subway line (which > commence in other boroughs), set to blow at the main stations. > > For the West Side, supplement with a charge in the PATH train > from Jersey. > > For the East Side, supplement with another in the LI Railroad > from the Island. Also Metronorth coming into Grand Central on 42nd st.., But: Most subways are underground in Manhattan. A device that gives off enough bang to be felt above ground has to be at least as big as a suitcase. How likely is a suitcase unaccompanied by a human to go unnoticed on NYC subway? Not very. Under a bus seat? A little less noticeable. A smaller timed device would be limited to blowing up or gassing or incinerating only whoever's on the subway - and the worthy victims don't take the subway. I think a parked car (or a car driven by a suicidal driver) is more likely for delivering a suitcase or larger. > Forget anything above 86th Street, they'll applaud; like the > WVA and VA hillfolks will hooray the destruction of see-navel > DC and its high-pitch babbling wonks. I object to any terrorist plans that don't include the complete destruction of Columbia University and the City College too. :-) --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From nobody at REPLAY.COM Sat Feb 7 09:00:56 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sun, 8 Feb 1998 01:00:56 +0800 Subject: Ziff-Davis on AP Message-ID: <199802071651.RAA08477@basement.replay.com> http://www.zdnet.com/zdnn/content/zdnn/0206/282755.html > Pie attack has executives worried > By Charles Cooper > February 6, 1998 12:10 PM PST > ZDNN > > This time it was a custard pie in the face. Could it just have > easily been a bullet in the gut? > > That is the subject du jour among startled industry > executives following the bizarre assault in Brussels > Wednesday against Bill Gates. While en route to deliver a > speech on technology and education, Microsoft's chief > executive was nailed in the kisser by a local prankster who > has made a reputation for pulling similar stunts. Gates, who > was unhurt, suffered no more than a wound to his pride, > soggy glasses, and an unexpected charge on his weekly > cleaning bill. > [snip for fair use] From tcmay at got.net Sat Feb 7 10:36:54 1998 From: tcmay at got.net (Tim May) Date: Sun, 8 Feb 1998 02:36:54 +0800 Subject: Galombos and a World where Ideas can be Protected In-Reply-To: <199802051634.KAA02262@einstein.ssz.com> Message-ID: At 6:12 PM -0800 2/6/98, bill.stewart at pobox.com wrote: >At 10:34 AM 2/5/98 -0600, Jim Choate wrote: >>If there were no copyright nobody would have any reason to market >>software or much else for that matter. I would predict that much of >>the technology and infrastructure we have now wouldn't exist. >>It would also stiffle [sic] creativity and new methodologies because >>there would be no profit in it to recoup development costs. > >If there were no copyright, markets for information and entertainment >would definitely have evolved differently than they have in the US >and Europe, and would use much different mechanisms for getting money >to the producers of information, such as standard sale contracts.* .... It's always hard to say how reality would look in a different universe, one with, say, no copyright laws. However, we have some indications, because there are some things which are very much like "intellectual property" which, in fact, have no protection in the courts. Namely, _ideas_. For better or for worse, ideas are not protected against copying, use, etc. (Before anyone jumps in and cites patents, by "ideas" I mean scientific discoveries, philosophical expressions, aphorisms, and so on, not _expressions_ of ideas in the form of working gadgets. And not "software patents" (with which I disagree, as do many of us). And not _specific_ instances of ideas in the form of essays or stories or whatever, which of course _can_ be copyrighted.) In our society, and in all societies with which I'm familiar, having a good idea is not protectable. (Again, not counting inventions and such.) And yet society works fine. Those who keep coming up with ideas find ways to keep coming up with ideas, and often to prosper, as writers, consultants, etc., often because of their ability to generate ideas. (There is a radical, and bizarre, subsect of libertarians called "Galambosians," who argue that even ideas are property. In their view, I could charge people 10 cents or a dollar or such for their usage of "crypto anarchy" ideas, or "Big Brother Inside" ideas, or for being influenced by my ideas in other ways. Hard to enforce, I'd say. Which is probably why the ideas of Galombos are not copied by many others. In his system, he'd be a pauper.) Think about an alternate world where ideas are protectable before saying a world without copyrights would collapse inevitably. --Tim May Just Say No to "Big Brother Inside" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From ghio at temp0209.myriad.ml.org Sat Feb 7 11:12:29 1998 From: ghio at temp0209.myriad.ml.org (Matthew Ghio) Date: Sun, 8 Feb 1998 03:12:29 +0800 Subject: the best justice money can buy --Lessig suspended In-Reply-To: <19980203.154218.attila@hun.org> Message-ID: <199802071906.OAA06180@myriad> Tim May wrote: > (The real issue is going to be Web servers. Whether Netscape can prosper > in the world that is coming is unclear.) [snip] > Looks to me like Intel is the real winner here. Apache currently represents over 50% of the web servers in use. Even Microsoft can't compete with that. Microsoft's growth in web servers has been largely at Netscape's expense. So Netscape's move to the freeware market is not unexpected, but it's a bit late; they should have been pushing Linux/FreeBSD/etc to their NT customers long ago. The issue of differing tactics of Intel versus Microsoft has a lot to do with why Microsoft is getting scrutinized while Intel is largely being left alone, despite their similiar market share. The first difference is product quality. I have an Intel Pentium which has been working flawlessly for months. Microsoft Windows, on the other hand, can't go two days without getting screwed up in one way or another. Intel has had two or three major flaws in their products in the last few years (FDIV, F00F, and the fpu flag problem). Microsoft gets blamed for new flaws every week. Guess which company I have a higher opinion of? I am certainly not the only one who feels this way. Second, Microsoft is rude, arrogant, and offensive. They absolutely do not know when to quit, no matter how much bad publicity it gets them. Intel's behaviour hasn't been exemplary recently either, but they do know when to back off. Intel got in a little argument with Robert Collins a few years ago, but once the bad PR started, they left him alone. Microsoft, in contrast, has repeatedly harassed anti-microsoft web sites (such as www.micr0soft.com) kicked anti-microsoft people out of comdex, and so on. Like Scientology, such tactics usually only increase the attacks from critics. Intel's handling of the "slot 1" was a major mistake. Intel came off appearing to be a bully trying to squash competition, which earned them a lot of bad press. Settling with Cyrix/NatSemi was a smart move (which they should have done earlier). But at least Intel knew when to cut their losses and move on to other things. Contrast that with Microsoft's adamant, pig-headed pursuit of their bundling strategy; no matter how much bad publicity it gets them, they keep doggedly trying to shove it down people's throats. So next time you're meeting with Intel management, remind them that if they make quality products, their customers will be happy. If they sell lousy products and attack their opponents, they will get attacked back. (And Intel- please stop telling us about how great your secret proprietary bus interfaces are, we don't want to hear it, and it makes you look bad.) From eureka at eureka.abc-web.com Sun Feb 8 03:44:27 1998 From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com) Date: Sun, 8 Feb 1998 03:44:27 -0800 (PST) Subject: Eureka! Sun Feb 8 '98 Message-ID: <19980208083853.9584.qmail@eureka.abc-web.com> Welcome to Sunday's issue of Eureka! BLACK LABEL Get yourself a FREE two day pass to Black Label! They have over 2,000 hardcore movies, FREE live fucking - over 200 with sound, 10,000 hot sex stories, Top-quality hardcore pictorials, and so much more you'll be amazed. Check it out! Black Label ---------> http://www.xxx69.com/banner_mail.html Playgal - No.1 in Internet Hardcore! http://www.playgal.com/playgal/banner_eureka.html Playgal presents FREE LIVE FUCKING, and over 2,000 FREE XXX MOVIES! VELVET-LIPS This is a hot website. It is also a paysite. But there are some great free pix for you to check out before you join up. Quick loading and thumbnailed for easy access. These images are high resolution and open in their own frame. This one may cause a stir in you pants. Oh yes, you betcha, uh huh! Velvet Lips .................... http://www.velvet-lips.com/ ANNA'S ORIGINAL PICTURE GALLERY Careful, each and every image will toss you to a signup page but the ones that you do see are impressive. Super young girls fucking and sucking and spreading their pussy for you! Anna's Original Picture ......... http://www.supergirls.com/ SUBLIME Spanky BDSM pix! After entering the site click on, Sublime Bondage Sluts. Down at the bottom of the page there are a few quick loading thumbnailed images of some sweet pain pix! Sublime ...................... http://sublime.wizardtech.net AMATEUR SITE Everyone like a good looking amateur! This site delivers a lot of young ladies. Quick loading thumbnailed images. Here you will find some nice looking natural tits, pussy and ass. Amateur ........................ http://www.amateursite.com/ #READ THIS!! WIN $25,000 and a Fantasy Date - Click Here Now! #$25,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A # HOORAY! THE ADULT SEARCH ENGINE Now you can search for the sex sites you are looking for and fast! This new search engine is setting the standard others will follow. It offers pop-up search and detailed listings! Hooray! -----------------> http://eureka.abc-web.com/hooray/ FREE STREAMING VIDEO Please note that most of these feeds require a Netscape bro- wser in order to successfully view them. Unfortunately Micr- osoft's browser does not have all the features of Netscape's yet. However, many of the feeds use the RealPlayer and will work in most browsers. If you do not have Netscape and want a free copy click here --> http://www.netscape.com/download/ 20vids+Chat -> http://209.1.31.175/chat/videochat.cgi?eureka CHAT WITH OTHER READERS Hey, if you haven't checked out the Eureka! Chat sites yet, you're missing out on some great stuff. Every day you'll find hundreds of other readers just like you looking to chat have fun and maybe a little 'cyber'. We know you'll love it! Adult/Sex Chat -----------------> http://137.39.63.229/chat/ General/Fun Chat -------> http://137.39.63.229/chat/funchat/ HOT LIVE PHONE SEX TO MAKE YOU CUM! LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912 LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779 FREE: Live 1-on-1 (international call only)--->011-678-77416 NEW! CENTERFOLD PIC OF THE DAY Exclusive! We proudly present unpublished Pictures of your favorite Centerfolds. Featured This Week: Dec 80-PMOY Terri Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri Kendall, Rebecca Ferratti, Lydia Schone and many more too! ---------------------------> http://www.gatefold.com/eureka/ AMATEUR SITE OF THE DAY Renee: An amateur fan's ultimate dream! Renee' possesses everything you could possibly want in a woman: head turning looks, a beautiful body, a gorgeous face, and a sweet disposition with a penchant for being nasty! ( She likes girls too, and has the photos on her page to prove it). Her site is well done and easy to navigate with TONS of FREE pictures. Visit Renee' now to visit perfection. ---------------------------> http://amateurindex.com/eureka/ EROTIC STORY SITE OF THE DAY HotStories.com: Tired of all those pics? Hot Stories lets you use your imagination to is full potential. Over 100 free sex stories in 8 different categories. Our stories are worth a thousand pics! ................ http://www.hotstories.com/ DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/ ADULT STAR PIC OF THE DAY Woah, our Adult Star pics are getting hotter and hotter, so make sure you stop by and check out today's - definitely not to be missed! --------> http://www.xxxadultstars.com/eureka/ OTHER EUREKAS! GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/ DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm ESPA�OL ------> http://eureka.abc-web.com/eureka/espanol.htm FRAN�AIS ----> http://eureka.abc-web.com/eureka/francais.htm ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm TODAY'S FREE PIX Pic 1 --------------------------> http://137.39.63.229/?080 Pic 2 --------------------------> http://137.39.63.229/?081 Pic 3 --------------------------> http://137.39.63.229/?082 Pic 4 --------------------------> http://137.39.63.229/?083 Pic 5 --------------------------> http://137.39.63.229/?084 Pic 6 --------------------------> http://137.39.63.229/?085 Pic 7 --------------------------> http://137.39.63.229/?086 Pic 8 --------------------------> http://137.39.63.229/?087 Pic 9 --------------------------> http://137.39.63.229/?088 Pic 10 --------------------------> http://137.39.63.229/?089 ============================================================ TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US. ============================================================ From contest at compbroker.com Sat Feb 7 11:58:26 1998 From: contest at compbroker.com (contest at compbroker.com) Date: Sun, 8 Feb 1998 03:58:26 +0800 Subject: Monthly memory giveaway - now win up to 64 Megabytes of Memory! Message-ID: <854712721210.8391275815@compbroker.com> For the February 1st Drawing, our grand prize winner of the 64MB Memory is Michael Rowe of Akron, OH You could be the next lucky winner! The Memory Broker has increased it's prizes. Every month we will select 3 random winners from our contest database. The First Place winnner (i.e. first name drawn) wins an incredible 64Mb of RAM, 2nd place wins 32MB of EDO RAM, and the third lucky winner gets 16MB of RAM. You can also apply the winning memory as credit towards a future order. No purchase is necessary to win. Winners are selected by a random drawing, so the more times you enter (once per day only please), the better your chances to win! Enter Now at http://www.compbroker.com/ Good Luck! The Memory Broker Inc. http://www.compbroker.com contest at compbroker.com From tcmay at got.net Sat Feb 7 12:17:16 1998 From: tcmay at got.net (Tim May) Date: Sun, 8 Feb 1998 04:17:16 +0800 Subject: Washington on the verge of being nuked? In-Reply-To: <3.0.5.32.19980206181238.007b4ac0@popd.ix.netcom.com> Message-ID: Remember to stay well clear of soft targets as the war with Albania, er, Iraq starts in the next few weeks. Yeltsin warns the U.S. publically that an attack on Iraq could have grave consequences, perhaps even leading to another world war. He was almost certainly _not_ threatening to use his own nukes against the U.S. So what was he talking about? Maybe he and his intelligence services have a clearer idea of where some of those 50 to 70 missing suitcase nukes have ended up. Saddam still had a lot of money even after the Gulf War. Mightn't he have bought some of those surplus nukes? Plenty of time over the past couple of years to get them into major U.S. cities. Especially cities like Washington and New York. If Iraq's cities and palaces and such are bombed, as expected, he may put out the order to hit the enemy where it will hurt. A timer set for an hour and the agents are well away from the blast. Biological agents are, I think, less likely to do widespread damage. In a few years, perhaps, when the technology is more widely available, but for now it looks like U.S.-class bioweapons are not yet available to so-called terrorists. Of course, after such an attack, though hundreds of thousands of criminals may be disposed of in Washington, martial law and a suspension of the Constitution can be expected. So it won't be all good news. And financial chaos may reign if business centers are hit. Downtown Washington is the last place I'd want to be. For multiple reasons. --Tim May Just Say No to "Big Brother Inside" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From declan at well.com Sat Feb 7 13:34:12 1998 From: declan at well.com (Declan McCullagh) Date: Sun, 8 Feb 1998 05:34:12 +0800 Subject: Washington on the verge of being nuked? In-Reply-To: Message-ID: At 12:02 -0800 2/7/98, Tim May wrote: >Of course, after such an attack, though hundreds of thousands of criminals >may be disposed of in Washington, martial law and a suspension of the >Constitution can be expected. So it won't be all good news. And financial >chaos may reign if business centers are hit. > >Downtown Washington is the last place I'd want to be. For multiple reasons. I live in Adams Morgan, perhaps a mile from downtown Washington. Of course I work in the heart of DC, in the lobbyist corridor, blocks from the White House and agencies like the FCC. (Note to terrorists: the Pentagon is miles away, on the other side of the Potomac. Take the blue or yellow Metro lines. You can lug your H-bomb through the handicapped turnstiles for no additional fee.) I've tentatively decided against moving all the way to West Virginia, which is 60 miles away. I'm now thinking of moving around 40 miles out, close to the WV border tho still in Virginia. Main reason is the commute. But it'll still be in farm country. Still, as I've said before, if terrorists are going to blow anything up, it makes more sense for them to go after Manhattan. Though it is on an island, which might make logistics and escape (?) difficult. -Declan From tcmay at got.net Sat Feb 7 14:10:18 1998 From: tcmay at got.net (Tim May) Date: Sun, 8 Feb 1998 06:10:18 +0800 Subject: Washington on the verge of being nuked? In-Reply-To: Message-ID: At 1:31 PM -0800 2/7/98, Declan McCullagh wrote: >I live in Adams Morgan, perhaps a mile from downtown Washington. Of course >I work in the heart of DC, in the lobbyist corridor, blocks from the White >House and agencies like the FCC. (Note to terrorists: the Pentagon is miles >away, on the other side of the Potomac. Take the blue or yellow Metro >lines. You can lug your H-bomb through the handicapped turnstiles for no >additional fee.) (Tariq, make note of this!) >I've tentatively decided against moving all the way to West Virginia, which >is 60 miles away. I'm now thinking of moving around 40 miles out, close to >the WV border tho still in Virginia. Main reason is the commute. But it'll >still be in farm country. Someplace like Leesburg? Horse country. >Still, as I've said before, if terrorists are going to blow anything up, it >makes more sense for them to go after Manhattan. Though it is on an island, >which might make logistics and escape (?) difficult. Depends on what the goal is. I would assume Iraq would be a lot more interested in making a symbolically important statement by hitting the capital of the Great Satan (Tariq, help me out here). If the goal is simple disruption of finances, NYC is probably a better goal (though a hit on D.C. would trigger lots of chaos, too). If the goal is killing people, I'm not sure what the best target would be...it might be some other city completely, depending on wind conditions, presence of refineries and oil storage tanks, dams, etc. But I would bet on D.C. being Ground Zero for all the various freedom fighters the U.S. colonialist/paternalistic superpower actions have pissed off. Of course, hitting _both_ D.C. and NYC might make a lot of sense. Especially in case one bomb fizzles. If they have several suitcase nukes, it makes more sense to deploy them in several cities than to have the damge zones overlap (or even have one blast affect the later bombs). Timing could be within seconds easily enough, but even spaced hours apart there would be virtually no chance for NEST to find them. Just Say No to "Big Brother Inside" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From nobody at REPLAY.COM Sat Feb 7 14:16:29 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sun, 8 Feb 1998 06:16:29 +0800 Subject: Monthly memory giveaway - now win up to 64 Megabytes of Memory! In-Reply-To: <854712721210.8391275815@compbroker.com> Message-ID: <199802072158.WAA15417@basement.replay.com> Thank you for contacting us to request a security audit of your web site. Based on the information you provided, we have determined that you were running an insecure operating system (Microsoft Windows NT) as evidenced by the blue screen currently visible on your computer monitor. Should you wish further investigation of your site vulnerabilities, please continue to send us annoying spam requests. contest at compbroker.com wrote: > For the February 1st Drawing, our grand prize winner of the > 64MB Memory is > > Michael Rowe of Akron, OH > > You could be the next lucky winner! > > The Memory Broker has increased it's prizes. Every month > we will select 3 random winners from our contest database. > The First Place winnner (i.e. first name drawn) wins an incredible 64Mb of > RAM, > 2nd place wins 32MB of EDO RAM, and the third lucky winner gets 16MB of RAM. > You can also apply the winning memory as credit towards a future order. > > No purchase is necessary to win. Winners are selected by a random drawing, > so the more times you enter (once per day only please), the better your > chances to win! > > Enter Now at http://www.compbroker.com/ > > Good Luck! > > The Memory Broker Inc. > http://www.compbroker.com > contest at compbroker.com From dlv at bwalk.dm.com Sat Feb 7 16:25:21 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Sun, 8 Feb 1998 08:25:21 +0800 Subject: Washington on the verge of being nuked? In-Reply-To: Message-ID: Tim May writes: > Depends on what the goal is. I would assume Iraq would be a lot more > interested in making a symbolically important statement by hitting the > capital of the Great Satan (Tariq, help me out here). > > If the goal is simple disruption of finances, NYC is probably a better goal > (though a hit on D.C. would trigger lots of chaos, too). If the goal is > killing people, I'm not sure what the best target would be...it might be > some other city completely, depending on wind conditions, presence of > refineries and oil storage tanks, dams, etc. > > But I would bet on D.C. being Ground Zero for all the various freedom > fighters the U.S. colonialist/paternalistic superpower actions have pissed > off. NYC is the seat of the United Nations. It would make a good nuke target during one of those UN events when a bunch of heads of state visit. For an impact on the financial markets, nuke NYC and London at least. NYC is also vulnerable to chemicals in the water system. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From jya at pipeline.com Sat Feb 7 16:40:08 1998 From: jya at pipeline.com (John Young) Date: Sun, 8 Feb 1998 08:40:08 +0800 Subject: Washington on the verge of being nuked? Message-ID: <1.5.4.32.19980208003515.00744198@pop.pipeline.com> Manhattan would be easily blown, remotely. Place a time-charge beneath a car at the head each principal subway line (which commence in other boroughs), set to blow at the main stations. For the West Side, supplement with a charge in the PATH train from Jersey. For the East Side, supplement with another in the LI Railroad from the Island. Forget anything above 86th Street, they'll applaud; like the WVA and VA hillfolks will hooray the destruction of see-navel DC and its high-pitch babbling wonks. As will anyone of any capital (or high-tech vale), globally, not drunk with power or mad to get it. That's what horrifies the powerful about of terrorists: they're both spitting images of their opponents. Both willing to kill indiscriminately for vainglory of blind faith and ambition. Both willing to betray their kind for a step up. Probably the stealth bombers will led by a highly trained ex-, or covert member, or Top Gun grad, of a duly authorized terrorist, wing, sub, cell set up to kill for a culture's honor and commerce -- for blood-drenched national security. USG and IraqG, any G, joined at birth, never separated, working in concert. From nibor55 at juno.com Sat Feb 7 17:21:55 1998 From: nibor55 at juno.com (robin parker) Date: Sun, 8 Feb 1998 09:21:55 +0800 Subject: "Ken and Brenda Kingston" : Telephone Scam Alert Message-ID: <19980207.180654.3166.6.nibor55@juno.com> --------- Begin forwarded message ---------- From: "Ken and Brenda Kingston" To: "Bill Manago" ,"Ken Kingston" ,"Mark & Kay Barrett" ,"Mike & Dianne Higgs" ,"Mike Roberts" , "Rachel M Parker" ,"Robin Parker" Subject: Telephone Scam Alert Date: Fri, 6 Feb 1998 20:07:14 -0700 Message-ID: <001601bd3375$82a232a0$b037c5a9 at pc1> I want to let all my friends know about this scam going around. It does not matter who your local or long distance carrier is, this can cost you a lot of money. Please read and if you get a call like this, report it to the police and the FCC. If you have a caller ID, get the number too. Subject: High Priority message High Priority ** On Saturday, 24 January 1998, Naval Air Station, Joint Reserve Base, New Orleans' Quarterdeck received a telephone call from an individual identifying himself as an AT&T Service Technician that was running a test on our telephone lines. He stated that to complete the test the QMOW should touch nine (9), zero (0), pound sign (#) and hang up. Luckily, the QMOW was suspicious and refused. Upon contacting the telephone company we were informed that by pushing 90# you end up giving the individual that called you access to your telephone line and allows them to place a long distance telephone call, with the charge appearing on your telephone call. We were further informed that this scam has been originating from many of the local jails/prisons. Please "pass the word". Brenda --------- End forwarded message ---------- _____________________________________________________________________ You don't need to buy Internet access to use free Internet e-mail. Get completely free e-mail from Juno at http://www.juno.com Or call Juno at (800) 654-JUNO [654-5866] From foupe at compuserve.com Sun Feb 8 09:54:38 1998 From: foupe at compuserve.com (foupe at compuserve.com) Date: Sun, 8 Feb 1998 09:54:38 -0800 (PST) Subject: Young Hot Girls New Site Message-ID: <199802081631RAA1411@post.120.165.41> >>Young Hot Girls New Site Can you handle 2 young, hot, sexy girls? Cum watch us at: http://www.livewhorehouse.com Where you can complete our menage-a-trois. We really hate it when you don't cum. Luv Nadia and Alexa XOXOXOXOXOXO ====================================== WE HONOR ALL REMOVE REQUESTS!! JUST MAIL YOUR REQUESTS TO: jackpotx at ix.netcom.com ====================================== From ATU5713 at compuserve.com Sat Feb 7 19:39:31 1998 From: ATU5713 at compuserve.com (Alan Tu) Date: Sun, 8 Feb 1998 11:39:31 +0800 Subject: What's the latest in factoring? Message-ID: <199802072222_MC2-3262-79F5@compuserve.com> -----BEGIN PGP SIGNED MESSAGE----- Hi all, First, I want to say that because I've heard that traffic on this list is heavy, and I don't have time to file away 40 messages a day, you must write to me personally in order for me to see the message. My PGP key is provided at the end of this message. What is the latest factoring breakthrough (at least in the civilian world?) I had heard a while back that the most recent event was accomplished by Samuel Wagstaff of Purdue University, whose team factored (3^349-1)/2, which is a 167-digit number (about 552 bits). Is there anything more recent? Also, whereas 1024 bits was the commonly accepted threshhold for key lengths more than two years ago, what's the threshhold now? Because I have DOS (and like it) I use PGP 2.63ix, when should I retire my 1024-bit key? I don't expect anybody to answer that I should do so immediately, but can someone give me an idea on what people are doing in regard to key length? Sincerely, Alan Tu -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv Comment: Requires PGP version 2.6 or later. iQCVAwUBNN0kkJezmBrl2RXhAQGxnAP9HyIvtTcOeN77s3p80OmSefhagtfxQGEm H3NqWzxrqEvfODat63UFDVxcf28cSSog3666Icys1nLY9JhNSFZrruejbRIJ6P4o AKHfxBwUSO00GvSyCl9nI5VjJDoRG2elDZf7iPP1M9h+IoTXuSDpdWnL9uBpqhvi SFg4sXOKEOA= =co6G -----END PGP SIGNATURE----- Type Bits/KeyID Date User ID pub 1024/E5D915E1 1997/04/27 Alan Tu Alan Tu <102534.2165 at compuserve.com> -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.3i Comment: Requires PGP version 2.6 or later. mQCNAzNivkwAAAEEALdGUXD3j+RioIirVG46N6LaGD3YMMVVT5Mjwr5JojQsDICy 856I06Ugo/Fqid2A/os7v/gwE+Sj/WhMERgTsTejUZtsucTpS9sae+cc27Fjjq1l hOnqcLZqnHDDNyn3+jesVFPLnRlSoHbmcBK1XDW/SJT1anZz55ezmBrl2RXhAAUR tCBBbGFuIFR1IDxhdHU1NzEzQGNvbXB1c2VydmUuY29tPokAlQIFEDOguk6Xs5ga 5dkV4QEBBF8D/1B0ePqlMavWEUMP0uTmyvWFI7jooAcih6uHZFo2u+u3EzE2Is8X EoLHg39DhjleTHPu6TnGsWIiwDYEslzYeVw/Cglx6eliYIr/qs7peEywuhtZsEFH ln6yR9IE6rX3b3GCvPSQ5uPhXWrd2kWaZvG4rQ4Oj1m3yTrFaPRqCBPvtCRBbGFu IFR1IDwxMDI1MzQuMjE2NUBjb21wdXNlcnZlLmNvbT6JAJUDBRAzyUJWl7OYGuXZ FeEBAc4TBACT8gLtyE0C8NBGs9aDa9kHfeNzN8VbNfUpoOiWi4duAAZFiAt/e+ji J2BUMLIY8kzm2WX4mVzpKYjvea5TtHeQgbESV1HVZ5k7abENMUYz5nSMloOE+bb+ XRzgGgFF3htGXDJNywlLNgoYi5vTMT0pbGlCzOu215Cc4mFls2w1iA== =CM85 -----END PGP PUBLIC KEY BLOCK----- From guy at panix.com Sat Feb 7 19:39:36 1998 From: guy at panix.com (Information Security) Date: Sun, 8 Feb 1998 11:39:36 +0800 Subject: BBN Message-ID: <199802080315.WAA06152@panix2.panix.com> Haven't met a cypherpunks digest I like yet. In the mean time, I'm going to have a little fun. ---- > From dlv at bwalk.dm.com Sat Feb 7 01:46:44 1998 > To: cypherpunks at toad.com > Subject: BBN > > I have decided to come out of my cave and say it: > > I want to suck John Gilmore's cock. > > Dr.Dimitri Vulis KOTM > Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps That's understandable Dimitry...Marina must taste like dead fish. ---guy From whgiii at invweb.net Sat Feb 7 20:38:51 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Sun, 8 Feb 1998 12:38:51 +0800 Subject: An update on MS private key (in)security issues In-Reply-To: <88650932615058@cs26.cs.auckland.ac.nz> Message-ID: <199802031440.JAA09009@users.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In <88650932615058 at cs26.cs.auckland.ac.nz>, on 02/04/98 at 01:35 AM, pgut001 at cs.auckland.ac.nz (Peter Gutmann) said: >The implications of that last point can be quite serious. Take for >example the Utah digital signature act, which was used as a model by a >number of other states who implemented or are implementing digital >signature legislation. Under the Utah act, digitally signed documents are >given the same evidentiary weight as notarised documents, and someone >trying to overcome this has to provide "clear and convincing evidence" >that the document is fraudulent, which is difficult since it bears a >valid signature from the users key (this fact has been used in the past >to criticise digital signature laws based on this act). In addition, >under the Utah act and derived acts, anyone who loses their private key >bears unlimited liability for the loss (in contrast, consumer liability >for credit card loss is limited to $50). This leads to the spectre of a >malicious attacker who has the ability to issue notarised documents in >your name for which you carry unlimited liability. This is a lot more >important than someone reformatting your hard drive, or stealing last >months sales figures. I have raised concerns in the past over the rush to pass Digital Signature Laws in various states. These laws have not been well though out nor did they stand the rigors of peer-review of the crypto community before they were passed into law. IIRC one of the states considered *encryption* alone to be a *legal* signature!!! I will not be using digital signatures for anything other than authentication of messages. For legal documents I will stick to the old fashion pen and paper with witnesses and a notary. Just as a side note: Micro$loth is unfit to secure an outhouse let alone somthing as important as network and data security (are these fools still claiming C2 for NT?). I have never seen such overwhelming incompetence and complete arrogance than what is centered in Redmond (IBM may be arrogant but at least they are technically competent). - -- - --------------------------------------------------------------- William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html - --------------------------------------------------------------- Tag-O-Matic: Windows? WINDOWS?!? Hahahahahehehehehohohoho... -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNNcZF49Co1n+aLhhAQHZGAP/d5qdnlJYEt6uXh2srSf2ELc4rAle9aX5 p49t7PgGIaCpMY8YIYsFS5+nFoeHwUmlBNrEvUJQoQ2jrEgUp7B7Xv+VZB38qLma L0oeyICDe7bw6iMjKJ88gsqcHSghPhu7qhSI68e7CffwBWDh3N4Uc5PMQSMzztLZ GdKH6QmvN7k= =NV74 -----END PGP SIGNATURE----- From KurtBantelmann at compuserve.com Sun Feb 8 12:52:48 1998 From: KurtBantelmann at compuserve.com (Kurt Bantelmann) Date: Sun, 8 Feb 1998 12:52:48 -0800 (PST) Subject: Global Ethics Cosmosofy Message-ID: <199802081552_MC2-326E-5452@compuserve.com> To: Cypherpunks, editor. We are impressed by your social commitment on the Internet and think you may find that Global Ethics Cosmosofy would even better support your activities and spiritual concerns since universal values have precedence over limited group moral codes in cases of conflict and its peaceful resolution in a cooperating information oriented and interdependent world community. The better arguments can be yours free, to be viewed on the Cosmosofy Institute Foundation website: But there is more to it: (1) Global Ethics and the overall doctrine tentatively termed COSMOSOFY (similar to 'globalism') will not only assist you in ethics to identify the higher and highest values to which priority consideration must be given in each case, in particular where a psychological or social conflict has to be resolved rationally and peacefully. It also helps to avoid and cure psychic disorders most of which are attributable to dogmatic indoctrination methods during childhood but which tend to remain unconscious, since people usually deny they feel indoctrinated. A severe conflict potential for humanity in the present historical moment is its more or less unconscious subjugation to outdated arbitrary moral precepts and codes imposed and indoctrinated during adolescence (where spiritual maturity is low), thus obstructing later undogmatic moral and ethical updating flexibility and development. However, any change of this unwholesome and dangerous situation is considered a political TABOO for social and cultic stability reasons and social control in the absence of GLOBAL ETHICS and a UNIVERSAL UNDOGMATIC RELIGION, although now possible at this historical junction. Cosmosofy Universal Ethics provides interdisciplinary thinking and action patterns, not of the usual type of non-merging interdisciplinary exchange programs but of the new type to be merged in one�s own mind which is now accessible for everybody due to interactive feedback information structures. (2) COSMOSOFY UNIVERSAL ETHICS Subject: Interdisciplinary, linking religion, law, sociology, philosophy, politics, sciences. The so far missing universal ethics is provided by the interdisciplinarian author Bert Tellan, founder of COSMOSOFY and undogmatic religion (Cyber-Religion) as a doctrine designed to constitute the so far missing foundation for the legal and religious system's priority values in a peacefully cooperating and closely communicating global community. So far mankind was dependent only on particularistic morals that were mutually exclusive and could therefore not be validated universally: of importance for peace, conflict resolution competence and qualification, and ecological issues. (3) You will find that Global Ethics Cosmosofy & Undogmatic Religion has been constructed with the aim to solve dogmatic 'religions' (regarded as cults acc. to Kant if used as an end in itself instead of a means)seen as a social PROBLEM (to be solved instead of being merely studied) for a modern global society and world culture in order to avoid continuing antagonism instead of promoting real peace in the sense of absolute pacifism. So far nations, cultures or religious organizations favored peace conditionally under their own moral terms (excepting the need of �holy� for Islamic or �just� wars for Christians). This is no longer possible in a world saturated with means of push-button mass destruction. In this historical context dogmatic religious cult is no longer seen as an unending study subject for scientifically detached sociologists or psychologists of religion (just wondering as William James did at the great variety of religions) while making a living from it and get research funds - while, on the other end, no church or other educational institution ever bothered to even make an attempt of funding the 'further development or advancement of religion and of religiousness'. All the while the Advancement of Science is considered a respectable institution: another grave cultural inconsistency we have been indoctrinated not to notice. To the contrary, all through history any 'further development of religious thought' was condemned, persecuted as heretic or apostasy, philosophers or reformers (including Jesus) having been murdered to this day. This is due to a flawed idea of unchanging 'religion' (=false religion) which is to be regarded as a problem and not as an endless subject of study or even of tolerance while cannibalism and illiteracy are also no longer being tolerated, in the very name of an improved, in-depth understanding of dynamic religion. The solution, thus, does not advocate atheism, non-belief or arbitrary values as is wrongly suggested for post-modernism, since, quite to the contrary, the arbitrariness of cultural relativistic values is hereby overcome having the whole of humanity, individual justice and human rights for all in mind, and not for some privileged classes or groups only. And thus to establish true peace for mankind and be prepared for a new era of common cosmic adventure or communication instead of continuous strife with the risk of self-extinction. View the Cosmosofy Institute Foundation Website (featuring around 100 new articles on unresolved modern and prognosticized issues and the consistent application of global ethics to their solution in each case): Cosmosofy Institute Foundation. Kurt C. Bantelmann, editor. More details on request. Fax:(49)211.489533. E-mail: 106562.2403 at compuserve.com From frissell at panix.com Sat Feb 7 21:28:27 1998 From: frissell at panix.com (Duncan Frissell) Date: Sun, 8 Feb 1998 13:28:27 +0800 Subject: PGP/McAfee no longer allowing downloads In-Reply-To: <34DBA006.46743131@tfs.net> Message-ID: <3.0.2.32.19980206222052.0378ca48@panix.com> Has anyone else noticed that PGP Inc. has stopped allowing downloads (even for money) from pgp.com? If you go to buy, all you get is the promise of a mailed CD. DCF From frissell at panix.com Sat Feb 7 21:28:59 1998 From: frissell at panix.com (Duncan Frissell) Date: Sun, 8 Feb 1998 13:28:59 +0800 Subject: Fingerprinting in CA In-Reply-To: <19980205.000739.attila@hun.org> Message-ID: <3.0.2.32.19980206223532.03713264@panix.com> -----BEGIN PGP SIGNED MESSAGE----- At 07:40 AM 2/6/98 -0800, Bill Stewart wrote: >>> How did you CA cypherpunks feel about being fingerprinted? > >Well, if I'd been thinking about it, I'd have put some rubber cement and >whiteout on my thumb before getting the license :-) A person of my acquaintance was recently involved in a traffic accident in a Northeast state. Out-of-state (but in country) car registered in someone else's name and carrying a drivers license issued by a NATO ally. Ticketed for running a red light. No further problems. Could have been a deadbeat dad for all I know... As legal as church on a Sunday. DCF "Has anyone noticed that there are *more* foreigners around here than there used to be before they started cracking down on illegals." -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQCVAwUBNNvWgoVO4r4sgSPhAQEvvAQAshcy4goUXXpkNqTqjyuUtI6afHXfxnn+ yRQ6yoCGXnp/eBxqKjvYiPzNjGj/wHwBOyVRQIvvvtZ4HXEKAffQ7PbNu19/DlSV h5c7g8YVYTEsG2nqymfi919dAWDzPKN7JRpfkZxSw50zYsZ5dlIBnOe+3twj5jW6 +auNqh0o8YQ= =3kId -----END PGP SIGNATURE----- From ravage at ssz.com Sat Feb 7 21:40:08 1998 From: ravage at ssz.com (Jim Choate) Date: Sun, 8 Feb 1998 13:40:08 +0800 Subject: Galombos and a World where Ideas can be Protected (fwd) Message-ID: <199802080535.XAA12696@einstein.ssz.com> Forwarded message: > Date: Sat, 7 Feb 1998 10:33:41 -0800 > From: Tim May > Subject: Galombos and a World where Ideas can be Protected > >If there were no copyright, markets for information and entertainment > >would definitely have evolved differently than they have in the US > >and Europe, and would use much different mechanisms for getting money > >to the producers of information, such as standard sale contracts.* > .... > > It's always hard to say how reality would look in a different universe, one > with, say, no copyright laws. Agreed, however the motivations that drive people to creative or constructive acts wouldn't change. > However, we have some indications, because there are some things which are > very much like "intellectual property" which, in fact, have no protection > in the courts. > > Namely, _ideas_. > > For better or for worse, ideas are not protected against copying, use, etc. Agreed, but the ability to carry through on them *is* criticaly dependant upon the social and technological infrastructure of the participants. > And yet society works fine. Those who keep coming up with ideas find ways > to keep coming up with ideas, and often to prosper, as writers, > consultants, etc., often because of their ability to generate ideas. True, but what you are leaving out is their ability to impliment those ideas, which most certainly depends upon the infrastructure that surrounds them. Ideas abhor a vacuum. In such an environment it is reasonable to assume that people would not loose their basic instincts, among them greed. So it is clear that people would not stop having ideas, but the milieu of those ideas would be restrictive and most probably very paranoid. If you learned of a particular process or idea it would not be in your best interest to pass it around. Further it would be very difficult to trust others because there would be no consequence to them taking your idea and using their resources (which the creator was depending on to actualize the concepts) to create the end product themselves. Remember the prisoners dilema here... > Think about an alternate world where ideas are protectable before saying a > world without copyrights would collapse inevitably. This is a straw man. We are discussing the issue of what would be reasonable to expect considering human nature in an environment where there was *no* protection of ideas and no redress of grievances through a legal system. Intellectual anarchy if you will. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ravage at ssz.com Sat Feb 7 21:46:15 1998 From: ravage at ssz.com (Jim Choate) Date: Sun, 8 Feb 1998 13:46:15 +0800 Subject: the best justice money can buy --Lessig (fwd) Message-ID: <199802080545.XAA12816@einstein.ssz.com> Forwarded message: > Date: Fri, 06 Feb 1998 18:12:38 -0800 > Original-From: Bill Stewart > Subject: Re: the best justice money can buy --Lessig (fwd) > >If there were no copyright nobody would have any reason to market > >software or much else for that matter. I would predict that much of > >the technology and infrastructure we have now wouldn't exist. > >It would also stiffle [sic] creativity and new methodologies because > >there would be no profit in it to recoup development costs. > > If there were no copyright, markets for information and entertainment > would definitely have evolved differently than they have in the US > and Europe, and would use much different mechanisms for getting money > to the producers of information, such as standard sale contracts.* > On the other hand, if there were no colonialism, markets for sheep in > New Zealand would have evolved much differently than they did, > a problem they're now gradually working their way out of. The point is that it would *not* effect single instances or markets, it would effect the very fabric of trust that is inherent in a society that rewards creativity. If there were no copyrights and by extension no protection for the creator or implimentor of an idea we would have a situation where the groups with the resources would be the ones able to best actualize and therefore reap the benefits of ideas. In such an environment why would some individual choose to go head to head in a battle they couldn't win due to resources and a lack of a standard infrastructure? They wouldn't, they'd go back home and grow food and mind their own business. They wouldn't exchange ideas because it could be taken as a given that mail and other forms of non-direct communications would be insecure. >From this we can deduce that the actual target of delivery would very likely not receive it and that some intermediary would in fact take possession of that material and take advantage of it. So we can assume that people would not work on colaborations bigger than their immediate neighborhood. Now it is also clear that within that neighborhood some will have more resources to actualize ideas in respect to many of those who actualy create the ideas. In such an environment why would the individual increase this parties resource share to their own detriment? They wouldn't. > Copyright is certainly a major market convenience, because it means > that individual authors, middlemen, and readers don't have to > negotiate contracts each time they trade information for money, > or having to read the annoying shrink-wrap licenses on books > the way they did for a while on packaged software. It also > makes it more difficult for alternative mechanisms to evolve, > because it's got an 800-pound well-armed gorilla subsidizing it. The protection of ideas and the reaping of the actualization of the creation going to the creator is the issue, copyright is simply one of many mechanisms that impliment this fundamental belief of who should benefit. If we do away with this we are also doing away with a much deeper and fundamental aspect of modern society, trust that our toil will benefit us in the end. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From adam at homeport.org Sun Feb 8 00:25:05 1998 From: adam at homeport.org (Adam Shostack) Date: Sun, 8 Feb 1998 16:25:05 +0800 Subject: Most elegant wording against privacy/law-enforcement "balance" In-Reply-To: Message-ID: <199802080814.DAA03319@homeport.org> Tim May wrote: |Jim wrote: | >The most detailed research on the issue is a study by Dorothy Denning | >and William Baugh investigating the extent to which crypto has | >interfered with law enforcement's ability to get convictions: their | >bottom line was that crypto has not in fact interfered: law enforcement | >has been able to complete their investigations using other means. | >There's no demonstrated need for Government Access to Crypto Keys | >(GACK), so there's no need to compromise away our privacy. | | Bluntly pu, "FUCK "DEMONSTRATED NEED"!" | | And what if Denning and Baugh had reached other conclusions? (As well they | might, next year, when crypto is more widely deployed.) Its a utilitarian, and useful argument to point out that the Clipper Chick has been forced to change her position based on observed reality. Its not the basis of our moral argument, only pointing out that the only academic to hold a position not in line with ours was intellectually honest enough to say she's unsupported by the facts. This is not to say that crypto is ok as long as it doesn't matter, or the police have legitamate needs that they may define, but that when their own spokespeople reject them, its a powerful argument. Much as you rejoice in terrorist use of encryption, I rejoice in being able to quote Dorothy Denning. :) (I have a great deal of respect for Dorothy Denning's willingness to take and argue unpopular positions, and change her mind when proven wrong.) Adam -- "It is seldom that liberty of any kind is lost all at once." -Hume From bill.stewart at pobox.com Sun Feb 8 02:20:18 1998 From: bill.stewart at pobox.com (bill.stewart at pobox.com) Date: Sun, 8 Feb 1998 18:20:18 +0800 Subject: the best justice money can buy --Lessig (fwd) In-Reply-To: <199802061421.IAA05806@einstein.ssz.com> Message-ID: <3.0.5.32.19980206211343.007b4ac0@popd.ix.netcom.com> At 08:21 AM 2/6/98 -0600, Jim Choate wrote: > Let's give the market another 5-10 years and see where Linux >stands. Right now the estimate is 6-10 million users world wide use it. Share >wise that isn't a lot. The reason that Linux garners so much press right now >is that it is in fact an exception when an organization uses the software >(eg NASA). The test will be whether it grows significantly over the long >run and not the 5 years that Linux has been a serious os. Sharewise, that's not bad for a system that had 1 million users a year or two ago, though of course it gains a lot of extra slack because it's quasi-free Unix on an affordable platform. Getting that much desktop support without running MSOffice is impressive. Getting lots of support for servers is a different issue; we've known for a decade and a half that if you want to actually build a system that will _do_ real work for you, you use Unix*, even if you use a different desktop GUI. NT has been improved enough that you can occasionally build services on it if you're desperate enough, though its stability is still less than ideal. (I never had it crash except for hardware mismatch reasons, but its networking stuff reflects the fact that MS still doesn't understand what networks are.) --- * In a few environments you'd use VMS, because for all DEC's faults, they were very strong on making sure they had software environments to support the applications their customers wanted, like factory control. Or you could use LispMachines, because they were nice. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From bill.stewart at pobox.com Sun Feb 8 02:23:23 1998 From: bill.stewart at pobox.com (bill.stewart at pobox.com) Date: Sun, 8 Feb 1998 18:23:23 +0800 Subject: the best justice/kinds of monopolies In-Reply-To: Message-ID: <3.0.5.32.19980206174114.007b4ac0@popd.ix.netcom.com> At 02:47 PM 2/6/98 -0800, Tim May wrote: >(Yes, yes, I know some of you will be tempted to cite the official line >that the Postal Service is no longer a government agency. Well, this is a >distinction without a difference. The USPS retains governmental protections >against competition, has government-like powers and protections, and is >still run by a "Postmaster General," not a Chairman of the Board or >President or CEO. It ain't FedEx or Airborne. Or even UPS, which emulates >government agencies.) I don't care if they call their boss Grand Wazoo Snail Mail Evangelist; there are software and ice cream companies that use non-standard titles too. "Postal Inspector" is a much more serious problem title, since they seem to have quasi-police powers to do criminal investigations of postal offenses like pornography and pyramid scams and running competing formatted-tree-product information delivery services. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From MAILER-DAEMON at toad.com Sun Feb 8 22:09:07 1998 From: MAILER-DAEMON at toad.com (MAILER-DAEMON at toad.com) Date: Sun, 8 Feb 1998 22:09:07 -0800 (PST) Subject: FDA Certified & Registered Message-ID: <199802090444.WAB01261@mail.t-1net.com> Exclusive New Oral Transmucosal Weight Control Disc & Transdermal Patch both FDA Certified & Registered with National Drug Code #'s Developed by 10yr old Pharmaceutical Company. For detailed information reply to: bodyperfect at mailrobot.com To Remove you address from future mailings reply to: Remove at rmjent.com From rah at shipwright.com Sun Feb 8 06:16:14 1998 From: rah at shipwright.com (Robert Hettinga) Date: Sun, 8 Feb 1998 22:16:14 +0800 Subject: SEC Rule Announcement Message-ID: --- begin forwarded text From: jmuller at brobeck.com X-Server-Uuid: b0fe6c76-9e59-11d1-b373-00805fa7c2de MIME-Version: 1.0 Date: Thu, 5 Feb 1998 14:39:08 -0800 Subject: Re[2]: SEC Rule Announcement To: "Robert Hettinga" , , "Arnold G. Reinhold" X-WSS-ID: 18C49FCB618-18C49FCB619-01 Sender: bounce-dcsb at ai.mit.edu Precedence: bulk Reply-To: jmuller at brobeck.com This is actually an NASD rule change; the SEC reviews proposed NASD rule changes and almost always approves them. The NASD rule change is in Notice to Members 98-11 (available at http://www.nasdr.com/2610.htm), and was approved by the SEC on December 31, 1997, effective February 15. The NASD views the change as simply clarifying a requirement that was already in place: the rule previously required that NASD member broker/dealers establish procedures for the review of all correspondence relating to solicitation or execution of securities transactions. The rule as amended will state that these procedures must apply to all incoming and outgoing written and electronic correspondence with the public relating to the firm's investment banking or securities business. The rule itself does not say anything about home offices, but in the introduction to the rule, the NASD says that it will "expect members to prohibit correspondence with customers from employees' home computers or through third party systems unless the firm is capable of monitoring such communications." My mama taught me if I can't say anything nice, I shouldn't say anything at all, so I will not comment on the rule. If you're interested enough to go to the NASD Web site shown above, you will probably also want to look at Notice to Members 98-3, which sets out general principles for electronic delivery of information between brokers and their customers. John Muller mailto:jmuller at brobeck.com For help on using this list (especially unsubscribing), send a message to "dcsb-request at ai.mit.edu" with one line of text: "help". --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ Ask me about FC98 in Anguilla!: From frissell at panix.com Sun Feb 8 07:07:29 1998 From: frissell at panix.com (Duncan Frissell) Date: Sun, 8 Feb 1998 23:07:29 +0800 Subject: the best justice/kinds of monopolies In-Reply-To: Message-ID: <3.0.2.32.19980208100314.03723538@panix.com> At 05:41 PM 2/6/98 -0800, bill.stewart at pobox.com wrote: >I don't care if they call their boss Grand Wazoo Snail Mail Evangelist; >there are software and ice cream companies that use non-standard titles too. >"Postal Inspector" is a much more serious problem title, since they >seem to have quasi-police powers to do criminal investigations of >postal offenses like pornography and pyramid scams and running competing >formatted-tree-product information delivery services. A few years ago, they actually said that they stopped the armed raids on corporate mailrooms to investigate the crime of using Fedex for non-critical First Class deliveries. The Postal Inspectors are still Peace Officers, however. But then so are the Railroad Police. DCF From jya at pipeline.com Sun Feb 8 08:00:57 1998 From: jya at pipeline.com (John Young) Date: Mon, 9 Feb 1998 00:00:57 +0800 Subject: Soft Tempest Message-ID: <1.5.4.32.19980208154341.00728278@pop.pipeline.com> To: ukcrypto at maillist.ox.ac.uk Subject: It is really me - the story of Soft Tempest Date: Sun, 08 Feb 1998 15:09:40 +0000 From: Ross Anderson Bruce Sterling, and others, have asked of the Washington Post story [see below]: > Is this story correct? The Washington Post gives a highly distorted account of some very important scientific work we have done. I suggest that list members read our paper - - for themselves before getting carried away. The story is as follows. Bill G gave our department $20m for a new building, and his people said that what they really wanted from our group was a better way to control software copying. So it would have been rather churlish of us not to at least look at their `problem'. Now the `final solution' being peddled by the smartcard industry (and others) is to make software copying physically impossible, by tying program execution to a unique tamper-resistant hardware token. We wouldn't like to see this happen, and we have already done a lot to undermine confidence in the claims of tamper-proofness made by smartcard salesmen. So Markus and I sat down and tried to figure out what we could do for the Evil Empire. We concluded that (1) large companies generally pay for their software; (2) if you try to coerce private individuals, the political backlash would be too much; so (3) if the Evil Empire is to increase its revenue by cracking down on piracy, the people to go after are medium sized companies. So the design goal we set ourselves was a technology that would enable software vendors to catch the medium-sized offender - the dodgy freight company that runs 70 copies of Office 97 but only paid for one - while being ineffective against private individuals. We succeeded. In the process we have made some fundamental discoveries about Tempest. Army signals officers, defence contractors and spooks have been visibly flabberghasted to hear our ideas or see our demo. In the old days, Tempest was about expensive hardware - custom equipment to monitor the enemy's emissions and very tricky shielding to stop him doing the same to you. It was all classified and strictly off-limits to the open research community. We have ended that era. You can now use software to cause the eavesdropper in the van outside your house to see a completely different image from the one that you see on your screen. In its simplest form, our technique uses specially designed `Tempest fonts' to make the text on your screen invisible to the spooks. Our paper tells you how to design and code your own. There are many opportunities for camouflage, deception and misconduct. For example, you could write a Tempest virus to snarf your enemy's PGP private key and radiate it without his knowledge by manipulating the dither patterns in his screen saver. You could even pick up the signal on a $100 short wave radio. The implications for people trying to build secure computer systems are non-trivial. Anyway, we offered Bill G the prospect that instead of Word radiating the text you're working on to every spook on the block, it would only radiate a one-way function of its licence serial number. This would let an observer tell whether two machines were simultaneously running the same copy of Word, but nothing more. Surely a win-win situation, for Bill and for privacy. But Microsoft turned down our offer. I won't breach confidences, but the high order bit is that their hearts are set on the kind of technology the smartcard people are promising - one that will definitively prevent all copying, even by private individuals. We don't plan to help them on that, and I expect that if they field anything that works, the net result will be to get Microsoft dismembered by the Department of Justice. Meantime we want our Soft Tempest technology to be incorporated in as many products as possible - and not just security products! So to Rainier Fahs, who asked: > If these rumors are true, I guess we will face a similar discussion on > free availability in the area of TEMPEST equipment. Does privacy > protection also include the free choice of protection mechanism? I say this: our discovery, that Tempest protection can be done in software as well as hardware, puts it beyond the reach of effective export control. So yes, you now have a choice. You didn't before, Ross Anderson ---------- http://www.washingtonpost.com/wp-srv/WPlate/1998-02/07/060l-020798-idx.html British Technology Might Flush Out Software Pirates By John Burgess Washington Post Foreign Service Saturday, February 7, 1998; Page H01 CAMBRIDGE, England� It's a technique that intelligence agencies have used for years: Park a van filled with monitoring gear near an embassy and listen for the faint radio signals that computers routinely emit when they are on. Analyze those signals for clues to the data that are on the computers. Now researchers at the University of Cambridge, home of groundbreaking work in intelligence over the years, are trying to adapt this technology to the fight against software piracy. With special code written into software, they say, computers could be made to broadcast beacons that would carry several hundred yards and identify the software they were running, complete with serial numbers of each copy. Vans run by anti-piracy groups could pull up outside a company's office and count the number of software signals emanating from it. If, say, 50 beacons for a particular title were detected but the company had licensed only two copies of the software, that could become evidence on which a court would issue a search warrant. Ross Anderson, a University of Cambridge lecturer who is overseeing the project, said the idea originated last year when Microsoft Corp. Chairman Bill Gates visited the university after his private foundation announced a $20 million donation to the school. Gates told officials that, among other things, he would love the university to come up with new anti-piracy techniques. So far, Microsoft isn't enthusiastic about the university's approach, Anderson said. "They have some reservations. Obviously there are Big Brother aspects," he said. A Microsoft spokeswoman said the company has no plans to adapt the technology. Emilia Knight, a vice president at BSA Europe, a trade group that combats software piracy, said such an anti-piracy system might be technically feasible. But she noted many practical questions on the legal side, such as how the system would differentiate between companies pirating software and those legally using multiple copies of programs. Knight said that concerns of privacy and consumer rights might make the system a no-go for industrialized countries. But in places like Eastern Europe, she suggested, where piracy is rampant and there is no tradition of such protections, the software signal detectors might be acceptable. Richard Sobel, a political scientist who teaches at Harvard University and researches privacy issues, called it "an appalling idea." "If the technology is there to identify what software people are using, there's the prospect to figure out what people are doing. . . . It sounds like a horrible violation of privacy," Sobel said. In Britain, however, it might seem less controversial. Here authorities have long used similar techniques to ferret out people who fail to pay the annual license fee of about $150 that the law requires for each TV set in the country. Cruising the streets here are vans carrying equipment that can detect emissions from a TV set's "local oscillator," the part that turns a station's signal into a picture. If the gear senses a TV set inside a house from which there is no record of a license payment, this is used as evidence to levy fines. The system also can tell what channel people are watching because the oscillator gives off a slightly different signal for each one. Anderson's researchers have built a prototype that can detect the type of software running on a machine from short range -- the hallway outside the room where the computer is running. Anderson said they are ready to build prototype hardware with a longer range, at a cost of about $15,000-$30,000 -- if the lab can find a customer. So far, none has stepped forward. � Copyright 1998 The Washington Post Company ---------- Date: Sat, 7 Feb 1998 13:05:45 -0500 From: Stewart Baker To: ukcrypto Subject: Ross, Is that really you? Today's Washington Post claims that a Cambridge research team led by one Ross Anderson is developing technology that would require all personal computers to broadcast the identity of all programs they are running so that anti-piracy investigators can sit outside universities and businesses and check to see whether the folks inside are running more programs than their licenses allow. The article says that even Microsoft thinks this might go too far in invading the privacy of computer users. But advocates for the technology claim that it will work fine in benighted Eastern European countries where piracy is rampant and the natives are used to having their privacy invaded. This raises at least three questions: 1. Is this story correct? 2. If so, is the Ross Anderson it describes the same Ross Anderson known on this list for his attacks on Big Brother? 3. If so, are we to understand that Ross objects not so much to invading privacy as to government competition in that endeavor? Stewart Baker From eureka at eureka.abc-web.com Mon Feb 9 01:01:14 1998 From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com) Date: Mon, 9 Feb 1998 01:01:14 -0800 (PST) Subject: Eureka! Mon Feb 9 '98 Message-ID: <19980209081732.24447.qmail@eureka.abc-web.com> Welcome to Monday's issue of Eureka! PURE HARDCORE For a limited time only, Pure Hardcore is giving away FREE 3 day memberships! Unlimited Access to over 250 Channels of Live Video! Unlimited Access to over 2000 Hardcore XXX Photos! Unlimited Access to over 200 Steamy XXX Stories! Unlimited Access to the Live Java Chat Room! Don't miss it! Hard City ---> http://www.purehardcore.com/partners/H001.cgi SINFUL'S 20 FREE XXX PICS http://www.sinful.net/cgi-bin/topvlog.cgi?eureka 20 FREE HARDCORE, CUMSHOT, GROUPSEX, AND FREE ANALSEX PHOTOS UPDATED WEEKLY PLUS LINKS TO 700+ FREE ADULT PICTURE SITES. CATEGORIES INCLUDE: ASIAN, HARDCORE, SOFTCORE, BABES, AND PIC LINKS. YOU GET ALL OF THIS FOR FREE!! VISIT US NOW!! SCARLET HARLOT Hot graphics, hot site. Choose from a wide spread of sex. Maybe asians, blondes, brunettes, lesbians or good ol' pumping XXX grabs your interest. The site looks good. The pix load in fast. Get ready to show your appreciation. Scarlet Harlot ............ http://www.sexontap.com/scarlet/ THE PUSSY WAGON Well wagons ho! An interesting site featuring a curious mix of high resolution images. There are celebrities, anal asian coeds and even some amateurs. Grab your mouse and go there, you may just end up with a woody! Bookmark the wagon! The Pussy Wagon .................... http://www.weg.net/~pw/ WUZFUZZY'S PLACE We all know the story about fuzzy wuzzy. Well this web site features all of the pretty ladies who have lost their pussy hair! Not a pubic hair in the bunch! Nice and smooth! Yes, I know that is the way you like it. Lick some pussy people! WuzFuzzy's Place .......... http://www.sisnaaz.com/wuzfuzzy/ ANALLY YOURS Nice clean well built website. It delivers the porno, big time! Lots of free pix, thumbnailed for your convenience! Also, a free video or two. See the photo album for some hot butt action. Pussies dripping with sex juice in a big way! Anally Yours ....................... http://151.196.204.209/ #READ THIS!! WIN $25,000 and a Fantasy Date - Click Here Now! #$25,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A # HOORAY! THE ADULT SEARCH ENGINE Now you can search for the sex sites you are looking for and fast! This new search engine is setting the standard others will follow. It offers pop-up search and detailed listings! Hooray! -----------------> http://eureka.abc-web.com/hooray/ FREE STREAMING VIDEO Please note that most of these feeds require a Netscape bro- wser in order to successfully view them. Unfortunately Micr- osoft's browser does not have all the features of Netscape's yet. However, many of the feeds use the RealPlayer and will work in most browsers. If you do not have Netscape and want a free copy click here --> http://www.netscape.com/download/ Just 18 -----------------------> http://204.244.215.7/teens/ CHAT WITH OTHER READERS Hey, if you haven't checked out the Eureka! Chat sites yet, you're missing out on some great stuff. Every day you'll find hundreds of other readers just like you looking to chat have fun and maybe a little 'cyber'. We know you'll love it! Adult/Sex Chat -----------------> http://137.39.63.229/chat/ General/Fun Chat -------> http://137.39.63.229/chat/funchat/ HOT LIVE PHONE SEX TO MAKE YOU CUM! LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912 LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779 FREE: Live 1-on-1 (international call only)--->011-678-77416 NEW! CENTERFOLD PIC OF THE DAY Exclusive! We proudly present unpublished Pictures of your favorite Centerfolds. Featured This Week: Dec 80-PMOY Terri Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri Kendall, Rebecca Ferratti, Lydia Schone and many more too! ---------------------------> http://www.gatefold.com/eureka/ AMATEUR SITE OF THE DAY Angel: Angelsweb is this redhead's home turf. She's a sweet looking 19 year old who displays plenty of close-ups of her private parts and is proof that blondes aren't the only ones who have fun! Her turn ons include soft lips and a sexy smile. Her goal is to become a veterinarian - I would let her check out my chicken any day! ---------------------------> http://amateurindex.com/eureka/ EROTIC STORY SITE OF THE DAY Planet Mojo: Mojo brings you the juiciest erotic stories weekly! Every week all new exciting erotic stories are posted for your pleasure. Visit Mojo today! ................ ................................. http://www.planetmojo.com/ DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/ ADULT STAR PIC OF THE DAY Woah, our Adult Star pics are getting hotter and hotter, so make sure you stop by and check out today's - definitely not to be missed! --------> http://www.xxxadultstars.com/eureka/ OTHER EUREKAS! GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/ DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm ESPA�OL ------> http://eureka.abc-web.com/eureka/espanol.htm FRAN�AIS ----> http://eureka.abc-web.com/eureka/francais.htm ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm TODAY'S FREE PIX Pic 1 --------------------------> http://137.39.63.229/?090 Pic 2 --------------------------> http://137.39.63.229/?091 Pic 3 --------------------------> http://137.39.63.229/?092 Pic 4 --------------------------> http://137.39.63.229/?093 Pic 5 --------------------------> http://137.39.63.229/?094 Pic 6 --------------------------> http://137.39.63.229/?095 Pic 7 --------------------------> http://137.39.63.229/?096 Pic 8 --------------------------> http://137.39.63.229/?097 Pic 9 --------------------------> http://137.39.63.229/?098 Pic 10 --------------------------> http://137.39.63.229/?099 ============================================================ TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US. ============================================================ From ravage at ssz.com Sun Feb 8 09:06:35 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 01:06:35 +0800 Subject: the best justice money can buy --Lessig (fwd) Message-ID: <199802081704.LAA14031@einstein.ssz.com> Forwarded message: > Date: Fri, 06 Feb 1998 21:13:43 -0800 > Original-From: Bill Stewart > Subject: Re: the best justice money can buy --Lessig (fwd) > At 08:21 AM 2/6/98 -0600, Jim Choate wrote: > > Let's give the market another 5-10 years and see where Linux > >stands. Right now the estimate is 6-10 million users world wide use it. Share > >wise that isn't a lot. The reason that Linux garners so much press right now > >is that it is in fact an exception when an organization uses the software > >(eg NASA). The test will be whether it grows significantly over the long > >run and not the 5 years that Linux has been a serious os. > > Sharewise, that's not bad for a system that had 1 million users a > year or two ago, though of course it gains a lot of extra slack > because it's quasi-free Unix on an affordable platform. I agree. > Getting that much desktop support without running MSOffice is > impressive. Is it? The vast majority of those users are non-commercial users. The number of US users, currently estimated at 6M is *not* significantly different than the number of home users of C64's and Amiga's (both machines had a very poor commercial market penetration) and also had maximum market penetrations in the 6M range. This consistency would seem to indicate to me that there is a significant overlap in the home users and the Linux community and that this community stays reasonably stable as a constant percentage of total population and not the software alone. The question at this point is how will this number change over the next 2 years or so. If we don't see a significant rise in this percentage then I would suspect Linux will never succeed in making a serious bid for MS parity. It is still a rare thing for an employer to provide Linux as a the default os on a new-hires pc. How many companies do you know that when a person comes in and configures their pc it contains Linux by default? Not many. Further that percentage is *not* increasing at any sort of significant rates. I would prophecy that you will have to wait a long(!) time before you can expect your local grocery store (HEB here uses Win95 and various Unix'es for back-office and check-out) or bank to be using it as a de facto standard. Also, considering that the folks who are making money on Linux are the distributors. How have they faired over the last 4-5 years? If you go to your 1st year Linux Journals (only 12/yr. and the Feb. 98 is #46) and compare it to your current issue how do the number of distributors fair? It turns out there are only a few major distirbutors (Red Hat, Slackware, InfoMagic, Walnut Creek, SuSE) and some of the early distributors have seen a significant decrease in their market share (eg Ygddrasil). So even in the Linux community we have seen a *decrease* in the *commercial* enterprises who have succeeded? Why? Because users like to have the same distribution as their friends so that they have some hope of resolving their problems. So what you see (and this is from my 4+ years working with Linux user groups) is that the majority of members of a given user group will have only 1 or 2 distributions and unless you have one of those most of them will be very hesitant to work on it because of the ignorance factor of the special features and changes of each distribution. The local Austin Linux Group (alg-l at lists.io.com) for example is moving currently from Red Hat to SuSE because of the superior, and propietary - I would add, X-windows and RPM modifications they have made. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From jya at pipeline.com Sun Feb 8 09:13:44 1998 From: jya at pipeline.com (John Young) Date: Mon, 9 Feb 1998 01:13:44 +0800 Subject: Soft Tempest Message-ID: <1.5.4.32.19980208170553.0074d0bc@pop.pipeline.com> Much praise is due Markus and Ross for their astonishing accomplishment in long-neglected Tempest research. Their paper is surely causing sleeplessness in dens of TEMPESTed security agencies accustomed to having singular self-privacy and others-invasiveness via this technology. Microsoft is to be praised for funding the right thing for the wrong reasons, or perhaps Mr. Gates foresaw what the outcome would be and merely needs intel deniability, nicely aided by Ross's zipperedness -- that, too, well done. The Wash Post spin of the story is itself complicitous, as was Mr. Baker's enticement. Thanks to both for aiding the incovert global revelation. From veral at geocities.com Sun Feb 8 09:24:38 1998 From: veral at geocities.com (Veral) Date: Mon, 9 Feb 1998 01:24:38 +0800 Subject: No Subject Message-ID: <199802081713.LAA09053@harper.uchicago.edu> CAn I join? Your Pal, V. From ravage at ssz.com Sun Feb 8 10:05:00 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 02:05:00 +0800 Subject: Another Linus market observation... Message-ID: <199802081806.MAA14516@einstein.ssz.com> Hi, Another Linux market observation that would indicate that the total impact of Linux is going to be less than what we as Linux supporters would want is the literature that has arisen about Linux. In particular the count of monthly magazines. Linux has a roughly 6M user market penetration yet there is only a single Linux specific magazine available. In the comparative markets of C64 and Amiga there were several (eg Amiga World, Info, Compute!) magazines. Even today there are at least 3 Amiga magazines on the market yet that machine hasn't been actively manufactured in over 2 years. Why is the Linux magazine market limited to The Linux Journal? And what does that mean for the long term strength of the market (and by extension the hurdles other OS's would face in the future)? ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ichudov at Algebra.COM Sun Feb 8 10:06:15 1998 From: ichudov at Algebra.COM (Igor Chudov @ home) Date: Mon, 9 Feb 1998 02:06:15 +0800 Subject: the best justice money can buy --Lessig (fwd) In-Reply-To: <199802081704.LAA14031@einstein.ssz.com> Message-ID: <199802081759.LAA15724@manifold.algebra.com> Jim Choate wrote: > succeed in making a serious bid for MS parity. It is still a rare thing for > an employer to provide Linux as a the default os on a new-hires pc. How many > companies do you know that when a person comes in and configures their pc it > contains Linux by default? Not many. Further that percentage is *not*S This is true, but you have to keep it in the right perspective. The much more interesting question is a broader one: how widespread is GNU copyrighted freeware? One can configure a Sun workstation so that it looks, works and feels like a Linux system, runs things like elm, fvwm2, vim, GNU utilities, and so on. I have seen a lot of such configurations, and in fact I do use one like that myself. How many millions more of these do exist? [I think that Sun workstations in their default configurations suck big time as far as user friendliness is concerned. They have the balls to ship an OS where the Page Up key does not work with the default editor] - Igor. From ravage at ssz.com Sun Feb 8 10:22:20 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 02:22:20 +0800 Subject: the best justice money can buy --Lessig (fwd) Message-ID: <199802081824.MAA14700@einstein.ssz.com> Forwarded message: > Subject: Re: the best justice money can buy --Lessig (fwd) > Date: Sun, 8 Feb 1998 11:59:01 -0600 (CST) > From: ichudov at algebra.com (Igor Chudov @ home) > Jim Choate wrote: > > succeed in making a serious bid for MS parity. It is still a rare thing for > > an employer to provide Linux as a the default os on a new-hires pc. How many > > companies do you know that when a person comes in and configures their pc it > > contains Linux by default? Not many. Further that percentage is *not*S > > This is true, but you have to keep it in the right perspective. The > much more interesting question is a broader one: how widespread is GNU > copyrighted freeware? Outside of Linux applications? Very small. I have never worked for a company nor dealt with a customer who as a matter of course used GNU software and was in fact the accepted cannon of that companies computer use policies. Students, individual hobbyist, and small companies (one of the reasons I focus on SOHO in my consulting) are the marked exceptions. The reason these folks can get away with it is their customers if they have any are concerned about the end product and not the process. This isn't true of larger companies who are as concerned with the process because of the impact of budgets, quality control, purchasing, etc. > One can configure a Sun workstation so that it looks, works and feels like > a Linux system, runs things like elm, fvwm2, vim, GNU utilities, > and so on. I have seen a lot of such configurations, and in fact I do > use one like that myself. As I do, I have a ELC and a Tadpole 3XP that I use Linux on as well as Solaris. I also have a IBM N40 RS/6000 laptop that I run AIX 3.x and PPC Linux on. I've been waiting 2 years for the Linux68k to be ported to the Sun 4/380 platform so I can get rid of BSD on that machine, and the /dev/fb for the Tadpole on Linux SPARC has been in the wings about that long as well. In the Austin area (1M pop.), I have yet to find a single other soul who as a matter of course uses Linux on those platforms. At best I know of about a dozen people who play with it and every case I am the one who got them the CD and prompted their activity. My experience would indicate the interest and by extension future is not there for these platforms except as a point of esoteric interest. Believe me, I *wish* I had more people to talk to and work with on these platforms. I can kill just about any discussion in a Linux user group meeting by asking about SPARC or PPC versions, nobody (figuratively) uses them and nobody is really interested in learning about them. I know of only a couple of articles in the Linux Journal that has even discussed SPARC Linux (and that would indicate a lot of folks don't use it) and have never seen a PPC article. > How many millions more of these do exist? Very few. The total number of SPARC or PPC (not Mac mkLinux) is measured in the 10's of thousands at best. Consider that out of all the Linux distributors only a couple carry SPARC or PPC versions. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ravage at ssz.com Sun Feb 8 10:33:51 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 02:33:51 +0800 Subject: GNU market penetration... Message-ID: <199802081837.MAA14861@einstein.ssz.com> Hi, I have a question, after going to the GNU homepage (www.gnu.org) I have not been able to find out the numbers of how many if any corporate subscribers and participants to the GNU Foundation. Is there anyone out there who might have a pointer to this information, or better yet is an actual participant in the GNU heirarchy and can discuss these and related issues? Thanks. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From WebWarrior3 at InfoWar.Com Sun Feb 8 10:39:50 1998 From: WebWarrior3 at InfoWar.Com (WebWarrior3 at InfoWar.Com) Date: Mon, 9 Feb 1998 02:39:50 +0800 Subject: SOFT TEMPEST Message-ID: <34DDEB81.65726105@InfoWar.Com> Several of the servers where I work have multiple monitors. While it is rare that I have several instances of the same application being displayed on these monitors, I do, at times, do just that. Easier for cutting and pasting large blocks from one to the other as well as other editing of code. So, when the software police pull up outside of my place of business see that there are six instances of a program being displayed with one license I can expect a warrant to be issued? That would suck. Unfortunatley, I do not have the time to read through the entire document at the URL provided, and can't save it either from the .pdf ... the defensive measures sound interesting. Also, does this only work with CRTs or can it detect LCD too? Furthermore, it was written: >So Markus and I sat down and tried to figure out what we could do for >the Evil Empire. We concluded that >(1) large companies generally pay for their software; >(2) if you try to coerce private individuals, the political backlash > would be too much; >so >(3) if the Evil Empire is to increase its revenue by cracking down on > piracy, the people to go after are medium sized companies. I have worked on contract with several 'large' companies who are running illegal copies of software, often without the knowledge of the sys admin...better check those 'findings.' Scott R. Brower http://www.infowar.com http://www.efflorida.org From ravage at ssz.com Sun Feb 8 11:03:32 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 03:03:32 +0800 Subject: New x86 clones & Linus Torvalds (Linux fame) Message-ID: <199802081857.MAA15107@einstein.ssz.com> Forwarded message: > X-within-URL: http://techweb.cmp.com/eet/column1/wintel19.html > HOT X86 CHIPS FOR '98 AND BEYOND > > > [INLINE] Launching yet another x86 microprocessor into a field already > crowded with clones isn't a good way to bet your company's future. But > that's just what two startups and one CPU stalwart are doing, in a bid > to beat Intel at its own game. > > The new ventures--Centaur Technology Inc. (Austin, Texas) and > Transmeta Corp. (Santa Clara, Calif.)--and long-time player Advanced > Micro Devices Inc. (Sunnyvale, Calif.) each has its own twist on what > it will take to survive in the cutthroat x86 world in 1998 and beyond. > Let's take them one at a time. > > Centaur, founded by renowned microprocessor architect Glenn Henry, is > focusing on the low end of the market, where sub-$1,000 desktop > machines and sub-$2,000 notebooks rule. Centaur's offering, launched > only a few months ago, is called the IDT WinChip C6 ("IDT" stands for > Integrated Device Technology Inc., which owns Centaur). It's a > Pentium-class processor that supports the MMX multimedia > instruction-set extensions, a Socket-7 interface, and comes in speed > grades of 180-MHz and 200-MHz. Centaur is positioning the C6 as a > direct alternative to Intel's Pentium with MMX, AMD's K6, and Cyrix's > 6x86MX microprocessors. > > From a design standpoint, what's interesting about the C6 is that > Henry chose not to follow the reigning trends in chip architecture. > Instead, he took a downsized approach, implementing just those > features he needed to deliver decent performance in a high-volume, > low-cost CPU. > > "The biggest thing we did is throw out conventional thinking," Henry > told me when we met recently. "We came to the conclusion that the > added benefit of a lot of computer-science things wasn't worth the > effort. We're not superscalar--we don't do out-of-order execution. > Everyone else is designing 4-way superscalar processors, so we did a > 6-way chip." > > In designing the C6, Henry said his team found that, as CPU clock > speeds approach 200-MHz, nearly half the time is spent waiting on the > bus. So, Henry outfitted the C6 with a huge translation-look-aside > buffer, as well as a second-level TLB, to reduce bus utilization and > cut that wait-time to the bone. > > Also notable is the fact that Centaur is a tiny outfit that began life > a scant two years ago. "Intel would like the world to believe it takes > tens of years and dozens of people to design a microprocessor," Henry > said. Looking at the results rolling out of Centaur, it's obvious what > a dedicated group of engineers can accomplish. > > Over at AMD, a somewhat larger engineering team is already burning the > midnight oil to design the K7 (code-named "Argon"), which will compete > with Intel's upcoming 64-bit Merced CPU. > > AMD has a project team hard at work on K7, but has leaked few details. > Publicly, AMD wants to talk more about its new MMX-enhanced K6 > processors. But K7 will be the key to AMD's long-term future, since a > 64-bit chip is a must-have for any company that wants to remain a > viable alternative to Intel. > > The few details we do know emerged in October in a keynote speech at > the Microprocessor Forum by AMD chairman Jerry Sanders. He said that > the K7 will run at clock speeds in excess of 500-MHz and will come in > a module that's mechanically--though not electrically--interchangeable > with Intel's Slot 1 connector. Most interesting was the news that K7 > will use the bus protocol developed by Digital Equipment Corp. for its > Alpha EV-6 processor. > > It's not clear how far along AMD is with the K7. Indeed, it will be a > daunting task. But AMD has two things going for it in its quest. > First, it is very strong in the simulation and verification > department--an important factor in avoiding design flaws like the > floating-point bug that struck Intel and its Pentium. > > More important, AMD knows what it's like to wrestle with design > delays, which struck its K5 project. Concerns on the K6 job were > reportedly behind AMD's decision to purchase NexGen in January, 1996. > Indeed, the NexGen team provided the Nx586 core, which became the > basis for the K6. > > The third, and potentially most interesting, effort involves > Transmeta, a startup formed less than three years ago by former Sun > Microsystems chip architect David Ditzel. Initial word had Transmeta > at work on a PowerPC clone. Then, the buzz was that the company was > designing a Java chip aimed at the nascent market for low-cost network > computers. Now, it seems that Transmeta's effort is focused more on an > x86 alternative that boasts either low-power, multimedia or > network-computer capabilities. Or perhaps all three. > > One interesting tidbit to emerge from Transmeta is the news that it > has hired Linus Torvalds, the designer of the Linux operating system. > Apart from Torvalds' considerable software skills, he's plugged into > an influential community of Unix programmers, which could give > Transmeta a big leg up in any effort to design a processor tuned to > handle real-world networked applications. > > Alexander Wolfe is EE Times' Managing Editor for computers and > communications ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ravage at ssz.com Sun Feb 8 11:37:05 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 03:37:05 +0800 Subject: Another Linus market observation... (fwd) Message-ID: <199802081936.NAA15377@einstein.ssz.com> Forwarded message: > Subject: Re: Another Linus market observation... > From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) > Date: Sun, 08 Feb 98 13:38:30 EST > Jim Choate writes: > > monthly magazines. Linux has a roughly 6M user market penetration yet there > > is only a single Linux specific magazine available. ... > > I disagree. There are plenty of printed publications about the hardware > that Linux runs on (i.e. Intel and compatible boxes) (not that I read them). > There are also rags about Unix, which are almost entirely applicable to Linux. The problem with this interpretation of the market is that AmigaWorld, Info, Compute!, etc. didn't cover the hardware to that great a degree. What they did do was discuss the programming and applications of those machines to problem solving, education, programming, etc. This point isn't the hardware and it isn't selling magazines on related os's that can be applied to Linux because of its similarity. The issue *is* increasing Linux' market share, magazines that discuss issue about AIX or HP/UX that can be applied to Linux don't do that. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From dlv at bwalk.dm.com Sun Feb 8 11:37:34 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Mon, 9 Feb 1998 03:37:34 +0800 Subject: Another Linus market observation... In-Reply-To: <199802081806.MAA14516@einstein.ssz.com> Message-ID: Jim Choate writes: > monthly magazines. Linux has a roughly 6M user market penetration yet there > is only a single Linux specific magazine available. ... I disagree. There are plenty of printed publications about the hardware that Linux runs on (i.e. Intel and compatible boxes) (not that I read them). There are also rags about Unix, which are almost entirely applicable to Linux. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From dlv at bwalk.dm.com Sun Feb 8 11:38:08 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Mon, 9 Feb 1998 03:38:08 +0800 Subject: Guy Polis is a pedophile In-Reply-To: <199802081713.LAA09053@harper.uchicago.edu> Message-ID: Veral writes: > CAn I join? No. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From remailer at htp.org Sun Feb 8 11:49:42 1998 From: remailer at htp.org (Anonymous) Date: Mon, 9 Feb 1998 03:49:42 +0800 Subject: Driver Licenses Message-ID: <19980208194501.10692.qmail@nsm.htp.org> Recently had to renew my DL here in Florida. While we are not forced to give up our fingerprints (yet)we have a new little magnetic strip similar to those on a credit card or ATM card and I can see this as a way for the State to start holding more and more data about us on these I.D.'s (like fingerprints, criminal records, etc... Coincidentally, that day when I went into my grocery store to get a six pack of brew, I got carded. I handed my new little card over and the teller and rather than looking at my date of birth she started to swipe the damn thing through her credit card reader machine! I stopped her, grabbed my DL back and told her to manually enter the date as they have always done. When she explained that it is against store policy and that she 'had' to swipe any IDs that had the strip I got my keys outta my pocket and all but removed the strip from the back of my little nemesis. Handed it back to her and told her to swipe away; it is against MY policy to provide ! ! ! the store with my address. I don't want any damn pepsi coupons mailed to me each time I buy coke, or northern tissue coupons when I buy charmin. Nor do I want the store collecting information on how much beer I buy. Sure, I want my alchohol purchases going to the Dept of Motor Vehicles and the other State departments...like hell. My question is, how much information can be stored on these strips? From whgiii at invweb.net Sun Feb 8 12:06:34 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Mon, 9 Feb 1998 04:06:34 +0800 Subject: Driver Licenses In-Reply-To: <19980208194501.10692.qmail@nsm.htp.org> Message-ID: <199802082027.PAA00347@users.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In <19980208194501.10692.qmail at nsm.htp.org>, on 02/08/98 at 07:45 PM, Anonymous said: >Recently had to renew my DL here in Florida. While we are not forced to >give up our fingerprints (yet)we have a new little magnetic strip similar >to those on a credit card or ATM card and I can see this as a way for the >State to start holding more and more data about us on these I.D.'s (like >fingerprints, criminal records, etc... Coincidentally, that day when I >went into my grocery store to get a six pack of brew, I got carded. I >handed my new little card over and the teller and rather than looking at >my date of birth she started to swipe the damn thing through her credit >card reader machine! I stopped her, grabbed my DL back and told her to >manually enter the date as they have always done. When she explained >that it is against store policy and that she 'had' to swipe any IDs that >had the strip I got my keys outta my pocket and all but removed the strip >from the back of my little nemesis. Handed it back to her and told her to >swipe away; it is against MY policy to provid! > e ! >! >the store with my address. I don't want any damn pepsi coupons mailed to >me each time I buy coke, or northern tissue coupons when I buy charmin. >Nor do I want the store collecting information on how much beer I buy. >Sure, I want my alchohol purchases going to the Dept of Motor Vehicles >and the other State departments...like hell. >My question is, how much information can be stored on these strips? My question is what is the best way to remove this information from the cards? A few passes over a strong magnet sufficient or should a chemical solvent be used? - -- - --------------------------------------------------------------- William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html - --------------------------------------------------------------- Tag-O-Matic: I'm an OS/2 developer...I don't NEED a life! -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNN4BX49Co1n+aLhhAQHVkQQAmJ3D8E7bu7FUZRT7EU1YSXEsZtiP81fB nz3VNExa7D5Ctdz/2qmfnwiQY7S9yI0UUxfkkDdWJcYhQc45NFMghP+lcwz6x+cX 3KKmBob0Gf1gt62HkttyH/w5+yW0Sxo6CZYeRWQob8e22BjgvZ3N2kFlIEELwtB8 7hB+C8T5aiQ= =iUxA -----END PGP SIGNATURE----- From ATU5713 at compuserve.com Sun Feb 8 12:38:33 1998 From: ATU5713 at compuserve.com (Alan Tu) Date: Mon, 9 Feb 1998 04:38:33 +0800 Subject: Latest in Factoring Message-ID: <199802081525_MC2-3277-70EE@compuserve.com> Jeff Lawrence wrote: >>>>> Well, my opinion is only one of many, but I just finished installing PGP 5.5 and it allows both RSA keys (max of 2048) as well as DS/DHH keys (max of 4096). Most keys I'm seeing these days are running at 2048, so 1024 could be considered as "below average". Just my $0.02 <<<<< First, I do have a 2048 RSA key I generated with 2.6.3ix, but its in hibernation and not on a key server, yet. (g) Second, what is 5.5 compared to 5.0? Let alone 5.5.3 as displayed in your key block? Third, I think its arrogant that PGP Inc. (and many many other software companies) have left dos/win 3.x users behind. The people, like me, who still use DOS/Win 3.x obviously like it, not to mention people not in the USA. Then, because of the lack of conventional encryption, and other options not in pgp 5.0 (I don't know about 5.5), and because its not freeware (freeware doesn't fully support RSA), people on the Internet had reached the concensus that they weren't going to stop using pgp 2.6.xxxx. When I complained about 5.0, one person asked me if my 2.6.3ix version had stopped working. Anyway, I think that PGP Inc. should release a version of PGP for DOS that lets you generate longer keys, be it RSA or otherwise. Finally, there are a lot of people in other countries (where PGP has spread as widely as in the US, if not more so) who are not compatible with Win95 users using PGP 5.0 freeware. --Alan Tu Type Bits/KeyID Date User ID pub 1024/E5D915E1 1997/04/27 Alan Tu Alan Tu <102534.2165 at compuserve.com> -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.3i Comment: Requires PGP version 2.6 or later. mQCNAzNivkwAAAEEALdGUXD3j+RioIirVG46N6LaGD3YMMVVT5Mjwr5JojQsDICy 856I06Ugo/Fqid2A/os7v/gwE+Sj/WhMERgTsTejUZtsucTpS9sae+cc27Fjjq1l hOnqcLZqnHDDNyn3+jesVFPLnRlSoHbmcBK1XDW/SJT1anZz55ezmBrl2RXhAAUR tCBBbGFuIFR1IDxhdHU1NzEzQGNvbXB1c2VydmUuY29tPokAlQIFEDOguk6Xs5ga 5dkV4QEBBF8D/1B0ePqlMavWEUMP0uTmyvWFI7jooAcih6uHZFo2u+u3EzE2Is8X EoLHg39DhjleTHPu6TnGsWIiwDYEslzYeVw/Cglx6eliYIr/qs7peEywuhtZsEFH ln6yR9IE6rX3b3GCvPSQ5uPhXWrd2kWaZvG4rQ4Oj1m3yTrFaPRqCBPvtCRBbGFu IFR1IDwxMDI1MzQuMjE2NUBjb21wdXNlcnZlLmNvbT6JAJUDBRAzyUJWl7OYGuXZ FeEBAc4TBACT8gLtyE0C8NBGs9aDa9kHfeNzN8VbNfUpoOiWi4duAAZFiAt/e+ji J2BUMLIY8kzm2WX4mVzpKYjvea5TtHeQgbESV1HVZ5k7abENMUYz5nSMloOE+bb+ XRzgGgFF3htGXDJNywlLNgoYi5vTMT0pbGlCzOu215Cc4mFls2w1iA== =CM85 -----END PGP PUBLIC KEY BLOCK----- From nobody at REPLAY.COM Sun Feb 8 12:46:23 1998 From: nobody at REPLAY.COM (Anonymous) Date: Mon, 9 Feb 1998 04:46:23 +0800 Subject: Driver Licenses In-Reply-To: <19980208194501.10692.qmail@nsm.htp.org> Message-ID: <199802082039.VAA10619@basement.replay.com> > Coincidentally, that day when I went into my grocery store to get a six > pack of brew, I got carded. I handed my new little card over and the > teller and rather than looking at my date of birth she started to swipe > the damn thing through her credit card reader machine! > I stopped her, grabbed my DL back and told her to manually enter the date > as they have always done. When she explained that it is against store > policy and that she 'had' to swipe any IDs that had the strip I got my > keys outta my pocket and all but removed the strip from the back of my > little nemesis. Handed it back to her and told her to swipe away; it is > against MY policy to provide the store with my address. I don't want any > damn pepsi coupons mailed to me each time I buy coke, or northern tissue > coupons when I buy charmin. Nor do I want the store collecting > information on how much beer I buy. Odd. When I first got a card with the stripe, I was a little paranoid so I took a bar magnet and erased it. Actually, I don't know whether my eraser worked because nobody has ever asked to swipe my card thru a reader. I got a wallet with a plastic fold-out so if someone asks to see my id, I open my wallet and show it to them, then put it away. From guy at panix.com Sun Feb 8 13:02:10 1998 From: guy at panix.com (Information Security) Date: Mon, 9 Feb 1998 05:02:10 +0800 Subject: Guy Polis is a pedophile Message-ID: <199802082051.PAA28824@panix2.panix.com> Heh-heh-heh: it's so funny so see how high Dimitry jumps when he sees people being made aware of his body of work. > From: dlv at bwalk.dm.com > > I have perfected sucking my own cock! Call me for a video! Oh, Dimitry, we already know you are in love with yourself. ---guy And what a pathetic Net researcher... ;-) From ichudov at Algebra.COM Sun Feb 8 13:02:16 1998 From: ichudov at Algebra.COM (Igor Chudov @ home) Date: Mon, 9 Feb 1998 05:02:16 +0800 Subject: GNU market penetration... In-Reply-To: <199802081837.MAA14861@einstein.ssz.com> Message-ID: <199802082043.OAA16928@manifold.algebra.com> Jim Choate wrote: > I have a question, after going to the GNU homepage (www.gnu.org) I have not > been able to find out the numbers of how many if any corporate subscribers > and participants to the GNU Foundation. Is there anyone out there who might > have a pointer to this information, or better yet is an actual participant > in the GNU heirarchy and can discuss these and related issues? Jim, The number of subscribers bears almost no relation to the number of users. - Igor. From nobody at REPLAY.COM Sun Feb 8 13:08:09 1998 From: nobody at REPLAY.COM (Anonymous) Date: Mon, 9 Feb 1998 05:08:09 +0800 Subject: Software Reverse Engineering Message-ID: <199802082100.WAA13567@basement.replay.com> Hi All - I've recently been disassembling some software written by idiots who never heard of operating systems other than messy-windows, so that I can re-implement it on my favorite platform (and fix numerous bugs). I know many of you have done work in this area so maybe you can give me a few tips. I ran the program and traced its execution, which quickly showed what parts were significant, and it's pretty easy to figure out what the relevant functions are and what they do. I was able to recompile sections of the code into my own program and make it work without too much difficulty. What is bugging me is this: The program contains huge amounts of 'junk code' such as the following (disassembled with gdb): movl 0x7c58c,%eax movl %eax,0xffffffa8(%ebp) movl 0xffffffa8(%ebp),%eax movl %eax,0x7c590 movl 0x7c590,%eax movl %eax,0xffffffa8(%ebp) movl 0xffffffa8(%ebp),%edx This segment of code accomplishes nothing execpt to move the same value around into different locations, which are never again read. At least half of the instructions consist of similiar garbage, writing data into locations that are never read, duplicating constants, copying values that are never used, and so on. The only thing saving the program from running out of memory is that the programmer mostly used static buffers, only sparingly doing dynamic allocation. I'm quite surprised that I haven't found any buffer overruns or security holes yet. So, does anyone have reccomendations of what is the best way to seperate the wheat from the chaff, so to speak? I can use the program as is, but the sheer amount of junk tends to make it run slowly, so I'd much prefer to completely rewrite it. From ravage at ssz.com Sun Feb 8 13:34:49 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 05:34:49 +0800 Subject: GNU market penetration... (fwd) Message-ID: <199802082136.PAA16474@einstein.ssz.com> Forwarded message: > Subject: Re: GNU market penetration... > Date: Sun, 8 Feb 1998 14:43:51 -0600 (CST) > From: ichudov at algebra.com (Igor Chudov @ home) > Jim Choate wrote: > > I have a question, after going to the GNU homepage (www.gnu.org) I have not > > been able to find out the numbers of how many if any corporate subscribers > > and participants to the GNU Foundation. Is there anyone out there who might > > have a pointer to this information, or better yet is an actual participant > > in the GNU heirarchy and can discuss these and related issues? > > The number of subscribers bears almost no relation to the number of users. Here is what I am thinking... - commercial success at larger commercial enterprises can be seen by looking at their gross orders of software. Consider that if a company decides they want to use Win95 and WinNT for their systems. Are they going to buy them one at a time? No, they are going to purchase either large quantities or site licenses. - Since GPL doesn't really support site licenses in the normal sense they won't be there to look at. In other words the total number of site licenses from corporations for software is a measure of its penetration. - Since GPL doesn't prohibit buying one copy and then making as many subsequent copies as you desire it is not likely that a given company is going to buy great quantities of GPL'ed software. What they'll do is have each department, through their own budget disbursement and orders, purchase such software as required. So we can expect to see one or more, but relatively few overall, purchases of software. Since this does not seem, to me anyway, to allow for a differentiation between one hacker purchasing the software in a comany or an entire department this also will not be a clear indication of penetration. - Large companies faced with the above situations and having committed to the continued survival of those sources of software will want to create a situation where they minimize their need to keep re-ordering software as its needed (expensive in people and process time) the reasonable thing is to subscribe for annual terms or similar programs. What I would like to know is what is the percentage of subscriptions by companies in regards to the total number of subscriptions of GNU software. I couldn't find any way to get this info on the www.gnu.org page. Since the question is at what point is current penetration of Linux into commercial entities as a standard business environment this seemed relevant. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From dlv at bwalk.dm.com Sun Feb 8 13:53:37 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Mon, 9 Feb 1998 05:53:37 +0800 Subject: Cypherpunks share cookies Message-ID: <1mPLke4w165w@bwalk.dm.com> I've updated the cookie-sharing page at: http://www.geocities.com/CapeCanaveral/Hangar/6354/cookies.html Please share your cookies! I'm having a bit of a problem with the cookie from Firefly.com and other sites that use their passport software (parts of barnes&noble, quitnet.org, mylaunch.com, filmfinder.com, etc). After a log in (as cypherpunks:cypherpunks, naturally), the server sends a FIREFLYTICKETV3 cookie which appears to contain the username and a timestamp. After about 24 hours the cookie expires and one has to log in again. If someone can set the expiration date far in the future, I'll add the cookie to the shared cookie list; otherwise they're useless. Here's a sequence of "firefly ticket" cookies over a few days: FIREFLYTICKETV3=WWKKILVVLLXVbVHKOHSNMH_\SVIHHHEGIIWRWUFIJI WWKKILVVLLXVbVHKOHSNMH_\SVGHJHLGMISRUUNIGI WWKKILVVLLXVbVHKOHTNFHa\WVHHGHKGFISRYUOILI WWKKILVVLLXVbVHKOHTNFHa\WVHHHHEGOIVR[UKIII WWKKILVVLLXVbVHKOHTNFHa\WVHHHHFGIIXRZUKIOI WWKKILVVLLXVbVHKOHTNFHa\WVHHGHKGFISRYUOILI WWKKILVVLLXVbVHKOHTNFHa\WVHHHHEGOIVR[UKIII WWKKILVVLLXVbVHKOHTNFHa\WVHHHHFGIIXRZUKIOI WWKKILVVLLXVbVHKOHTNFHa\WVJHGHEGJITRUUNIMI WWKKILVVLLXVbVHKOHTNFHa\XVEHLHJGKIXRRUNIHI WWKKILVVLLXVbVHKOHTNFHa\XVEHLHKGJIVRUUKIMI ^^^^^^ ********** The expiration is triggered by the piece I marked ^^^. Munging the end of the cookie (marked ***) doesn't seem to invalidate the cookie. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From MSDNFlashEditor_001527 at Newswire.Microsoft.com Sun Feb 8 14:07:26 1998 From: MSDNFlashEditor_001527 at Newswire.Microsoft.com (MSDNFlash Editor) Date: Mon, 9 Feb 1998 06:07:26 +0800 Subject: MSDNFlash, Volume 2, Number 3, February 9, 1998 Message-ID: <837CDED67A3AD111B59200805F3118C1087401C7@bulkengine.dns.microsoft.com> *** MSDN Flash *** A Twice-Monthly Newsletter for the Microsoft Developer Community Visit us today on the World Wide Web at: http://www.microsoft.com/msdn/ In this issue: PRODUCT AND TECHNOLOGY NEWS *Customers Choose Visual Studio *VBA PowerTools *New MSDN Online Feature - HelpDesk Code Sample *Dr. GUI on COM *XML-Data Submission to the W3C *Visual FoxPro Migration Sourcebook CD RESOURCES *MSDN Subscription January Release *Chat About MSDN Subscription *MSDN Online Member Downloads *New Chapter from Microsoft Mastering Series *Download Windows CE 2.0 Platform SDK *MSDN Online Membership Kit *J/Direct Jump Start Reviewers Guide *Learn Visual Basic Scripting Edition Now EVENTS *Windows DNA Development Lab *XML Conference *VBITS *Windows CE Developer Conference *Visual C++ Developer Conference *Visual J++ Developer Conference *Visual Foxpro Devcon 98 *Microsoft TechEd *Developer Events - United States *Developer Events - Europe MSDN FLASH TIP OF THE WEEK *Visual J++ Developer's Journal ================================================= PRODUCT AND TECHNOLOGY NEWS ================================================= CUSTOMERS CHOOSE VISUAL STUDIO Microsoft Visual Studio 97 is being widely adopted by enterprise customers, partners, and solution providers for building mission-critical business applications addressing a wide variety of scenarios and architectural challenges. Visit http://www.microsoft.com/vstudio/ to read case studies and customer testimonials. VBA POWERTOOLS If you're learning how to build VBA components for applications such as Word or Excel, the new VBA PowerTools series offers add-ins to install and examine, like a popup thesaurus. Download a dozen of them from http://www.microsoft.com/vba/vbapowertools.htm NEW MSDN ONLINE FEATURE - HELPDESK CODE SAMPLE Check out the new MSDN Feature package this month-the HelpDesk, an extensive sample intranet application with 24,000 lines of source code. Find out more about the package at http://www.microsoft.com/msdn/news/feature/020298/default.htm DR. GUI ON COM Check out Dr. GUI's COM column-a step-by-step, week-by-week guide to learning about components, COM and the Active Template Library. Visit http://www.microsoft.com/news/drgui/020298.htm XML-DATA SUBMISSION TO THE W3C The W3C acknowledged the XML-Data submission from Microsoft, ArborText, DataChannel and Inso. The joint submission outlines a richer method for describing and validating data - the goal is to make XML more powerful for integrating data from multiple, disparate sources, and building 3-tier web applications. The submission is available for public review from http://www.microsoft.com/standards/xml/ VISUAL FOXPRO MIGRATION SOURCEBOOK CD This free interactive guide is designed to make upgrading to Visual FoxPro 5.0 easier, addressing the two biggest concerns developers have when upgrading: The learning curve and the operating system. There is plenty of in-depth information on everything from Visual FoxPro's features to using Visual FoxPro to build client/server and Internet applications. For ordering information visit http://www.microsoft.com/vfoxpro/ ================================================= RESOURCES ================================================= MSDN SUBSCRIPTION JANUARY RELEASE The MSDN Subscription January Shipment includes Windows 98 beta 3, Windows NT� Option Pack 4.0, Windows NT DDK (for Windows NT Workstation 5.0 beta 1, Microsoft SQL Server Enterprise Edition, and Visual Studio Service Packs (Alpha). For complete interim details or a full listing of all MSDN subscription components, visit http://www.microsoft.com/msdn/services/subscription/index/ CHAT ABOUT MSDN SUBSCRIPTION Join us for a discussion about MSDN Subscriptions on Tuesday, February 17. 11:00 am - noon, PST. Chat about Library content, quarterly and interim shipments, licensing, and other subscriber benefits. If you can't make the chat but have a great question, please submit it to msdn at microsoft.com with "MSDN Chat" as the subject line. We'll post a transcript two days after the chat. For more information visit http://www.microsoft.com/msdn/newsgroups/chats.htm MSDN ONLINE MEMBER DOWNLOADS Check out this week's free downloads for Online Members: TeeChart Pro ActiveX from TeeMach is a charting and graphing ActiveX control. Also try Soffront TRACK - a customizable defect-tracking and technical-support database. For more information visit http://www.microsoft.com/windowsce/developer/download/ NEW CHAPTER FROM MICROSOFT MASTERING SERIES This month check out Creating ActiveX Code Components, Chapter 7 from Mastering Microsoft Visual Basic 5. Gain the skills you need to become an expert in database programming and ActiveX component creation. Available online and as a download. For more information visit http://www.microsoft.com/msdn/training/mastering.htm DOWNLOAD MICROSOFT WINDOWS CE 2.0 PLATFORM SDK If you're developing for Windows CE 2.0 you'll want to download the Windows CE 2.0 platform SDK. Visit http://www.microsoft.com/windowsce/developer/download/ for more information. MSDN ONLINE MEMBERSHIP KIT Sign up now to get your MSDN Online Membership Kit. Members in the US and Canada will start receiving the kit in February. The kit includes the Component Source CD, which includes 500 ActiveX controls and over 1200 software components and tools, including products from APEX Software Corporation, Distinct Corporation, Phantom Reality, and Spatial Technology. It also features discounts on books and magazines including PC Magazine, Microsoft Systems Journal, Inside Visual Basic, Computer Shopper, Visual J++ Developer's Journal, and featured books from Wrox Press and Microsoft Press. Not to mention rebates on MSDN Professional and Universal subscriptions. For more information visit http://www.microsoft.com/msdn/join/ J/DIRECT JUMPSTART REVIEWERS GUIDE The J/Direct Jumpstart Reviewers Guide discusses developing powerful Windows applications in Java. This guide provides introductory information on both J/Direct and J/Direct Jumpstart, including a description of the code samples and other materials designed to help familiarize developers with the basic concepts of programming with J/Direct. For more information visit http://www.microsoft.com/visualj/ LEARN MICROSOFT VISUAL BASIC SCRIPTING EDITION NOW Check out this sample chapter from the Microsoft Press book, LEARN MICROSOFT VISUAL BASIC SCRIPTING EDITION NOW, which explains the basics of the VB scripting language. Visit http://mspress.microsoft.com/prod/books/sampchap/364.htm ================================================= EVENTS ================================================= MICROSOFT DNA DEVELOPMENT LAB A DNA Development Lab has been established for teams needing assistance in moving their applications to Internet architectures. Corporate development teams can bring their projects into the Lab, an intensive 5-day knowledge-transfer "boot camp", and get assistance in architecting and implementing their solutions. The lab is a partnership between Microsoft, CoreTech Consulting Group and Hewlett Packard. This environment is ideal for proof-of-concept, porting, and startup projects. More information is available at http://www.coretech-group.com and http://www.microsoft.com/usa/mid-atlantic/ XML CONFERENCE March 23-27, Seattle, WA XML, eXtensible Markup Language, describes structured data and delivers the data the way you want it. Come to XML the Conference, and select from the Business, Technical, E-Commerce, Print Media, and Content Management Tracks. See tools that support XML today and those planned for tomorrow. For registration and additional information visit http://www.gca.org/ VBITS SAN FRANCISCO '98 March 23-27, San Francisco, CA VBITS brings Microsoft and independent speakers together to give in-depth, hands-on training on topics ranging from multithreading applications and servers, to leveraging component-based solutions to the Internet or intranet, to deploying N-tier Client/Server apps with MTS. Visit http://www.windx.com/vbits/ for more information. REGISTER NOW FOR THE WINDOWS CE DEVELOPERS CONFERENCE April 5-8, San Jose, CA In-depth technical sessions will teach you all you need to know about the latest advances in Windows CE-based devices. Anyone writing software for Windows 95 or Windows NT will want to come hear how they can leverage their existing Win32 skills into this area. Attendees will receive a complimentary Palm PC - so you can start developing cool applications right away. For more information or to register visit http://www.microsoft.com/events/windowsce/ MICROSOFT VISUAL C++ DEVELOPER CONFERENCE IV April 15-17, Boston, MA TPD Publishing and Microsoft are holding the fourth Visual C++ Developers Conference: three days of intense technical instruction with Microsoft product gurus and third-party speakers and authors. Come learn about COM and DCOM, MFC and ATL, MTS, hardcore Visual C++, and more. For more information Visit http://www.vcdj.com/ VISUAL J++ DEVELOPER CONFERENCE April 27-30, Los Angeles, CA Informant Communications Group, Inc. and Microsoft have announced the first Microsoft Visual J++ Developer Conference and Exposition. A technical forum on advanced Java development using Microsoft Visual J++, this event features four tracks and 48 sessions. For more information visit http://www.javaconference.com/ VISUAL FOXPRO DEVCON 98 May 17-20, Orlando, FL Come learn all about Tahoe, the next version of Microsoft Visual FoxPro. Presented by MSDN and FoxPro Advisor Magazine, this is the ultimate developer conference for Visual FoxPro developers. Join thousands of professionals from around the world and be among the first to get an in-depth look at Tahoe. For more information visit the Visual FoxPro Web site at http://www.microsoft.com/vfoxpro/ MICROSOFT TECHED 98 June 1-4, New Orleans, LA This is the definitive technical conference for building complete solutions with Microsoft technologies. Register now for the event that always sells out. For more information visit http://www.microsoft.com/events/teched/ MICROSOFT TECHED EUROPE 98 7-10th July, Nice Acropolis Convention Centre, France Book Now! For more information visit http://www.eu.microsoft.com/europe/teched/ DEVELOPER EVENTS - UNITED STATES EMERGING TECHNOLOGY SERIES The Emerging Technology Series hits Missouri, Kansas, and Tennessee in February and March with a six-city tour. This free one-day seminar includes sessions on "Developing Multi-tiered Applications with Visual Studio" and "Write Once, Run Everywhere? Alternatives to Cross Platform Application Development". For more information, visit http://www.microsoft.com/stlouis/ets/ BOB AND LARRY'S DEVELOPER WORKSHOP SERIES February 12, Waltham, MA February 17, Farmington, CT Learn how to deliver solutions faster, cheaper and easier. For more information on this free monthly series or to register head to http://www.microsoft.com/usa/newengland/developer/ MICROSOFT PROFESSIONAL DEVELOPERS SUMMIT The PDS hits the West Coast in February with a seven-city tour. This one-day seminar will focus on the Windows Distributed interNet Applications Architecture and the new capabilities of the Windows platform. For more information and to register visit http://www.microsoft.com/usa/pdswest/ TURNING DATA INTO INFORMATION Learn how to leverage desktop productivity tools, Internet technologies, universal data access and SQL Server in a building framework for effective data marts at a lower cost. For more information visit http://www.microsoft.com/usa/mid-atlantic/developer/ DEVELOPER EVENTS - EUROPE MICROSOFT SQL SERVER AND UNIVERSAL DATA ACCCESS TECHNICAL CONFERENCE March 25 - 26th Paris, March 30 - 31st Stockholm, April 2 - 3rd Frankfurt, April 6 - 7th London 1998. For more information visit http://www.eu.microsoft.com/europe/msdn/events/sql/ MICROSOFT WEB SOLUTIONS DEVCON February 16, Munich February 18, Dusseldorf March 3, Frankfurt The one day 2 track technical conference will cover the development, deployment and administration of web solutions built with Microsoft technologies. A pre-conference the day before will focus on component development with either VC++, VJ++ or VB. For more information visit http://microsoft.eusoft.com ================================================= MSDN Flash TIP ================================================= BE CAREFUL WHEN COMPARING STRINGS from Visual J++ Developer's Journal Java allows you to compare two String objects, strng1 and strng2 using the following code: if(strng1 == strng2) then ... Unfortunately, the effect may not be what you want. The code above actually compares the String locations, not their text value. To compare the text values, use this: if(strng1.equals(strng2)) then ... MSDN Online Members - we have a new Tip for you each week at http://www.microsoft.com/msdn. For a free issue of Visual J++ Developer's Journal visit http://www.cobb.com/vjp/freevyer.htm To receive the Visual J++ Developer's Journal Tip of the Week in email, visit Visual J++ tip sign-up: http://www.zdtips.com/vjp/msd-f.htm ================================================= HOW TO JOIN THE MAILING LIST: You received this e-mail newsletter as a result of your registration on the Microsoft Personal Information Center. You may unsubscribe from this newsletter, or subscribe to a variety of other informative newsletters, by returning to the Personal Information Center, http://register.microsoft.com/regwiz/personalinfo.asp and changing your subscription preferences. Alternatively, please send a reply to this e-mail with the word "unsubscribe" as the first line in the body of the message. ================================================= The information provided is for informational purposes only and Microsoft Corporation and its suppliers make no warranties, either express or implied, as to the accuracy of such information or its fitness to be used for your particular purpose. The entire risk of the use of, or the results from the use of this information remains with you. From ichudov at www.video-collage.com Sun Feb 8 15:09:58 1998 From: ichudov at www.video-collage.com (Igor Chudov @ home) Date: Mon, 9 Feb 1998 07:09:58 +0800 Subject: rec.guns et.al. blocked by censorware In-Reply-To: <6bla0o$4ad@xring.cs.umd.edu> Message-ID: <199802082302.RAA18137@manifold.algebra.com> In rec.guns, Dan wrote: * I guess I should not be surprised but blocking software Cyber Patrol apparently * blocks rec.guns and rec.hunting because we are militant extremists, advocate * violence and swear. The whole story starts at: * http://www.spectacle.org/cwp/index.html * You have to keep going until you get to newsgroups. * * If Cyber Patrol is doing this I suspect their competition is doing so as well. * * Magnum: I know this is sort of off topic, but I believe it's important for the * group at large to know. Just fyi, I did look at the site and was astonished. Indeed anyone who uses this Cyber Patrol is a fool. Examples of HUNDREDS of blocked newsgroups: rec.games.mecha Giant robot games. (Moderated) Quest/Illegal/Gamble Violence/Profanity Intol news.groups Discussions and lists of newsgroups. Intol news.groups.questions Where can I find talk about topic X? Intol rec.guns Discussions about firearms. (Moderated) Militant/Extreme Violence/Profanity * -- * Dan - ywq at wco.com * I love the smell of Hoppes #9 in the morning. * Follow the Money - Who funds the election of your Congresscritter - www.opensecrets.org ---------------------------------------------------------------------------- char*p="char*p=%c%s%c;main(){printf(p,34,p,34);}";main(){printf(p,34,p,34);} \=/, _-===-_-====-_-===-_-==========-_-====-_ | @___oo ( )_ /\ /\ / (___,,,}_--= ) ) /^\) ^\/ _) =__ Anything is good and useful if ) ) /^\/ _) (_ ) ) _ / / _) ( it's made of chocolate. ) /\ )/\/ || | )_) (_ ) < > |(,,) )__) ( http://www.algebra.com/~ichudov ) || / \)___)\ (_ _) | \____( )___) )___ -==-_____-=====-_____-=====-___== \______(_______;;; __;;; From tcmay at got.net Sun Feb 8 15:24:28 1998 From: tcmay at got.net (Tim May) Date: Mon, 9 Feb 1998 07:24:28 +0800 Subject: rec.guns et.al. blocked by censorware In-Reply-To: <6bla0o$4ad@xring.cs.umd.edu> Message-ID: At 3:02 PM -0800 2/8/98, Igor Chudov @ home wrote: >In rec.guns, Dan wrote: >* I guess I should not be surprised but blocking software Cyber Patrol >apparently >* blocks rec.guns and rec.hunting because we are militant extremists, advocate >* violence and swear. The whole story starts at: >* http://www.spectacle.org/cwp/index.html >* You have to keep going until you get to newsgroups. >Examples of HUNDREDS of blocked newsgroups: > >rec.games.mecha Giant robot games. (Moderated) Quest/Illegal/Gamble >Violence/Profanity Intol >news.groups Discussions and lists of newsgroups. Intol >news.groups.questions Where can I find talk about topic X? Intol >rec.guns Discussions about firearms. (Moderated) Militant/Extreme >Violence/Profanity Interestingly, rec.guns is moderated (not that I like that), and there is virtually no profanity or discussion of anything remotely of a sexual nature. The discussion is on-topic, about revolvers, rifles, ammunition, target shooting, defense methods, etc. That the "cyber nannies" are blocking it (and other similarly nonsexual, nonprofane newsgroups) is exactly what was expected. These cyber nannies become tools for political correctness. Perhaps the strategy should be to post material to other newsgroups to get them blocked as well. (Though I expect the blocking is not being done using robots to monitor for illegal words, as rec.guns would not have been blocked this way. Rather, the cyber nannies are probably using their "PC judgment" to block groups they don't like. --Tim May Just Say No to "Big Brother Inside" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From anon at squirrel.owl.de Sun Feb 8 15:24:29 1998 From: anon at squirrel.owl.de (Secret Squirrel) Date: Mon, 9 Feb 1998 07:24:29 +0800 Subject: Zero Knowledge Access Message-ID: <75567b97663d45b018853166ea965a73@squirrel.owl.de> Dumbfuck Rimjob (Dr.) Dimitri Vulis fucks apes with a spiked metal pole on the weekends and dreams of someone doing it to him. Buttfuck on, Dimitri. From WebWarrior3 at InfoWar.Com Sun Feb 8 16:05:33 1998 From: WebWarrior3 at InfoWar.Com (WebWarrior3 at InfoWar.Com) Date: Mon, 9 Feb 1998 08:05:33 +0800 Subject: Driver Licenses Message-ID: <34DE37BF.E4E6A424@InfoWar.Com> William H. Geiger III wrote: >My question is what is the best way to remove this information from the >cards? > >A few passes over a strong magnet sufficient or should a chemical solvent >be used? Either should work...I'll bet that scratching the shit off with his keys worked too ;) I'll have to remember that when it's time to get mine done. That was a good question, though, does anyone know how much data those little stripes can hold? Scott R. Brower http://www.infowar.com http://www.efflorida.org From ravage at ssz.com Sun Feb 8 16:08:04 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 08:08:04 +0800 Subject: Driver Licenses (fwd) Message-ID: <199802090012.SAA17348@einstein.ssz.com> Forwarded message: > Date: Sun, 08 Feb 1998 17:54:56 -0500 > From: "WebWarrior3 at InfoWar.Com" > Subject: re: Driver Licenses > William H. Geiger III wrote: > >My question is what is the best way to remove this information from the > > >cards? > > > >A few passes over a strong magnet sufficient or should a chemical > solvent > >be used? > > Either should work...I'll bet that scratching the shit off with his keys > worked too ;) > I'll have to remember that when it's time to get mine done. My suggestion is not to alter the card such that a visual inspection would show. In most states it's a felony to modify or alter a drivers license, they are considered the property of the state and not yours personaly. Next time a cop asks for ID and you hand him your d.l. you could be in for a lot more than couple hundred dollars and a ticket. > That was a good question, though, does anyone know how much data those > little stripes can hold? Anywhere from a few hundred bytes to a k. Depends on the bit density of the tape. Go down to your local electronics or audio supply and get a polarized loupe and count them. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From dlv at bwalk.dm.com Sun Feb 8 16:12:26 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Mon, 9 Feb 1998 08:12:26 +0800 Subject: rec.guns et.al. blocked by censorware In-Reply-To: Message-ID: Tim May writes: > That the "cyber nannies" are blocking [rec.guns] (and other similarly nonsexual, > nonprofane newsgroups) is exactly what was expected. These cyber nannies > become tools for political correctness. Steve Boursy reports that another censorware vendor has been caught mailbombing a critic (sent her >400 junk e-mails) in retaliation for her criticism. Guy Polis is a pedophile. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From WebWarrior3 at InfoWar.Com Sun Feb 8 18:58:39 1998 From: WebWarrior3 at InfoWar.Com (WebWarrior3 at InfoWar.Com) Date: Mon, 9 Feb 1998 10:58:39 +0800 Subject: Drivers Licenses Message-ID: <34DE5F9A.9744B0D7@InfoWar.Com> >In most states it's a felony to modify or alter a drivers license, >they are considered the property of the state and not yours personaly. > >Next time a cop asks for ID and you hand him your d.l. you could be in for a >lot more than couple hundred dollars and a ticket. That's silly! I mess up my credit card strips all the time by keeping them in my pocket with keys on motorcycle rides, or in my tool belt when I used to do carpentry, or even slipping them into my money clip the wrong side out....the tape has never lasted longer than a month on any of my cards...I doubt, seriously, that a cop will harrass anyone who does not come out and say, "Yes, officer, I intentionally defaced my DL. And ya know why, Mr. Poleesse Man? Well, I'll tell ya " I do agree that it is proably better to do the damage without it being noticable. Less suspicion is ALWAYS better. Best, -S From ravage at ssz.com Sun Feb 8 19:02:57 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 11:02:57 +0800 Subject: Drivers Licenses (fwd) Message-ID: <199802090304.VAA17982@einstein.ssz.com> Forwarded message: > Date: Sun, 08 Feb 1998 20:44:58 -0500 > From: "WebWarrior3 at InfoWar.Com" > Subject: re: Drivers Licenses > That's silly! I mess up my credit card strips all the time by keeping > them in my pocket with keys on motorcycle rides, or in my tool belt when > I used to do carpentry, or even slipping them into my money clip the > wrong side out....the tape has never lasted longer than a month on any > of my cards...I doubt, seriously, that a cop will harrass anyone who > does not come out and say, "Yes, officer, I intentionally defaced my > DL. And ya know why, Mr. Poleesse Man? Well, I'll tell ya yadda, yadda, privacy, yadda, yadda, biometrics, yadda....>" > > I do agree that it is proably better to do the damage without it being > noticable. Less suspicion is ALWAYS better. Well I just looked at my Tx. d.l. to make shure my memory was correct. At least on Texas d.l's the *only* way to get to the mag stripe is to break the clear plastic laminating cover. And I assure you that if that cover is broken or tampered with the officer will become much more suspicous. It has this nifty little seal embossed all over the laminating cover on both sides. So going down to the local laminating shop won't work either. Proceed at your own risk, it's your neck after all. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From nobody at REPLAY.COM Sun Feb 8 19:29:20 1998 From: nobody at REPLAY.COM (Anonymous) Date: Mon, 9 Feb 1998 11:29:20 +0800 Subject: Driver Licenses (fwd) In-Reply-To: <199802090012.SAA17348@einstein.ssz.com> Message-ID: <199802090322.EAA09865@basement.replay.com> > > >A few passes over a strong magnet sufficient or should a chemical > > solvent > > >be used? > > > > Either should work...I'll bet that scratching the shit off with his keys > > worked too ;) > > I'll have to remember that when it's time to get mine done. > > My suggestion is not to alter the card such that a visual inspection would > show. In most states it's a felony to modify or alter a drivers license, > they are considered the property of the state and not yours personaly. > > Next time a cop asks for ID and you hand him your d.l. you could be in for a > lot more than couple hundred dollars and a ticket. "Yeah, officer, I dropped my ID in the street and it got run over. Don't give me such a hard time about it, I'm just glad I got it back..." I really doubt you are going to get convicted for accidently dropping your wallet because your ID got scraped up a little bit on the back side. Seriously, the best way is a strong magnet. You can also put it in your shirt pocket and iron it, then apply a strong magnet. The heat will make it lose its magnetism more quickly; just make shure you don't melt it. :) From whgiii at invweb.net Sun Feb 8 19:38:33 1998 From: whgiii at invweb.net (William H. Geiger III) Date: Mon, 9 Feb 1998 11:38:33 +0800 Subject: Drivers Licenses (fwd) In-Reply-To: <199802090304.VAA17982@einstein.ssz.com> Message-ID: <199802090401.XAA04008@users.invweb.net> -----BEGIN PGP SIGNED MESSAGE----- In <199802090304.VAA17982 at einstein.ssz.com>, on 02/08/98 at 09:04 PM, Jim Choate said: >Forwarded message: >> Date: Sun, 08 Feb 1998 20:44:58 -0500 >> From: "WebWarrior3 at InfoWar.Com" >> Subject: re: Drivers Licenses >> That's silly! I mess up my credit card strips all the time by keeping >> them in my pocket with keys on motorcycle rides, or in my tool belt when >> I used to do carpentry, or even slipping them into my money clip the >> wrong side out....the tape has never lasted longer than a month on any >> of my cards...I doubt, seriously, that a cop will harrass anyone who >> does not come out and say, "Yes, officer, I intentionally defaced my >> DL. And ya know why, Mr. Poleesse Man? Well, I'll tell ya > yadda, yadda, privacy, yadda, yadda, biometrics, yadda....>" >> >> I do agree that it is proably better to do the damage without it being >> noticable. Less suspicion is ALWAYS better. >Well I just looked at my Tx. d.l. to make shure my memory was correct. At >least on Texas d.l's the *only* way to get to the mag stripe is to break >the clear plastic laminating cover. And I assure you that if that cover >is broken or tampered with the officer will become much more suspicous. >It has this nifty little seal embossed all over the laminating cover on >both sides. So going down to the local laminating shop won't work either. >Proceed at your own risk, it's your neck after all. A couple of times through the washer and dryer and that lamination seperates. Any cop that has worked traffic has seen plenty of DL's in this shape (heh should have seen my old DL when I truned it in to get it renewed ). - -- - --------------------------------------------------------------- William H. Geiger III http://users.invweb.net/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html - --------------------------------------------------------------- Tag-O-Matic: OS/2: Your brain. Windows: Your brain on drugs. -----BEGIN PGP SIGNATURE----- Version: 2.6.3a-sha1 Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNN5ry49Co1n+aLhhAQFm/wQAhFcm2qIuqA6n1GgkxIgclGPw89cOI7UU NETVYGK6DEf4zM6/pUyJ3VgjMcq7JZnrV3t6q8iM3p+g0htZqzX7tzWeab7SLyuL meoL8IWLGIwR9RpMz7equHQIJ/O/M6zuP02y+wOHxdZsDBfglW8/0KQvrU0ZD74E hlDJTFFNoSk= =xV9x -----END PGP SIGNATURE----- From ravage at ssz.com Sun Feb 8 19:39:10 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 11:39:10 +0800 Subject: Driver Licenses (fwd) Message-ID: <199802090341.VAA18175@einstein.ssz.com> Forwarded message: > Date: Mon, 9 Feb 1998 04:22:54 +0100 (MET) > Subject: Re: re: Driver Licenses (fwd) > From: nobody at REPLAY.COM (Anonymous) > "Yeah, officer, I dropped my ID in the street and it got run over. Don't > give me such a hard time about it, I'm just glad I got it back..." > I really doubt you are going to get convicted for accidently dropping your > wallet because your ID got scraped up a little bit on the back side. See a previous post I submitted earlier in this regards... > Seriously, the best way is a strong magnet. You can also put it in your > shirt pocket and iron it, then apply a strong magnet. The heat will make > it lose its magnetism more quickly; just make shure you don't melt it. :) The 'Currie Point' (the point a magnetic material looses its magnetic behaviour) for Iron Oxide is 600F so I rather doubt your home clothing iron will significantly effect it. The plastic that the license is made of will melt at about 250 - 300. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ravage at ssz.com Sun Feb 8 19:51:48 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 11:51:48 +0800 Subject: Drivers Licenses (fwd) Message-ID: <199802090355.VAA18303@einstein.ssz.com> Forwarded message: > From: "William H. Geiger III" > Date: Sun, 08 Feb 98 21:25:30 -0500 > Subject: re: Drivers Licenses (fwd) > A couple of times through the washer and dryer and that lamination > seperates. Any cop that has worked traffic has seen plenty of DL's in this > shape (heh should have seen my old DL when I truned it in to get it > renewed ). I rather doubt that. I have had a Texas drivers license since I was 16, I'm now 38. I have washed them innumerable times and I have never had the lamination break or otherwise degrade. The lamination is quite heavy. I did have one crack at the seam one time because of a bad lamination and was specificaly instructed by the officer who wrote me a speeding ticket to get it replaced. I did so immediately. The law here is that if the license is damaged, you move, or otherwise make the information invalid you have 30 days to correct it. I suspect quite strongly that had I shown up at the court house to pay that ticket with the same damaged license (required to be shown at the time of payment) they would not have accepted the payment and might have asked to to discuss the situation with one of the officers they so thoughtfuly have placed about the room. Texas takes counterfeiting of licenses quite seriously. My suggestion would be don't try such juvenile tricks here, the DPS have seen it before and won't be pleasant people to deal with unless you're a juvenile. I have a proposal. Lucky is supposed to be in Austin for the CFP conference. If he is agreeable, he could ask to examine a Tx. d.l. We could leave it up to his opinion as to whether these would be easy to alter. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From anon at anon.efga.org Sun Feb 8 21:07:47 1998 From: anon at anon.efga.org (Anonymous) Date: Mon, 9 Feb 1998 13:07:47 +0800 Subject: No Subject Message-ID: >Odd. When I first got a card with the stripe, I was a little paranoid so >I took a bar magnet and erased it. Actually, I don't know whether my >eraser worked because nobody has ever asked to swipe my card thru a >reader. I got a wallet with a plastic fold-out so if someone asks to see >my id, I open my wallet and show it to them, then put it away. How many of us have done this? I nuked mine in the parking lot of the DMV. From rdl at mit.edu Sun Feb 8 21:29:38 1998 From: rdl at mit.edu (Ryan Lackey) Date: Mon, 9 Feb 1998 13:29:38 +0800 Subject: Soft Tempest Message-ID: Anyone interested in working on this for linux? It should be fairly trivial to modify the linux console drivers, disk driver, and possibly keyboard driver to take these changes into account. At the same time, it might be nice to add the permanence counters for RAM and magnetic media. I'm a bit busy until at least after FC '98, or I'd do it myself. One of my goals is to keep my laptop as secure as possible, and that's an application where TEMPEST shielding is rather prohibitive. -- Ryan Lackey rdl at mit.edu http://mit.edu/rdl/ From tcmay at got.net Sun Feb 8 22:25:40 1998 From: tcmay at got.net (Tim May) Date: Mon, 9 Feb 1998 14:25:40 +0800 Subject: Soft Tempest In-Reply-To: Message-ID: At 9:19 PM -0800 2/8/98, Ryan Lackey wrote: >I'm a bit busy until at least after FC '98, or I'd do it myself. One >of my goals is to keep my laptop as secure as possible, and that's >an application where TEMPEST shielding is rather prohibitive. Really? You think so? You think TEMPEST treatment of laptops is more expensive than of normal machines? The physics suggests just the opposite: the RF emissions from laptops are expected to be lower from first principles, and, I have heard, are measurably much lower. (I say "have heard" because I don't have any access to RF measurement equipment...I once spent many hours a day working inside a Faraday cage, but that was many years ago.) The first principles part is that the deflection yokes in a CRT are the largest radiated component of what got named "van Eck radiation." (I'd just call it RF, but whatever.) Laptops are missing this component. (It might be interesting to see the radiated RF numbers for various kinds of flat panel displays.) The emission from the keyboard would have to be looked at, of course. Also, laptops, being so small, are easy to shield with mesh bags. An inelegant approach would be to bend copper sheeting to form an enclosure. A more elegant approach might be to take one of the tight-fitting laptop cases (like the Silicon Sports "Wetsuit") and use it as a pattern for a case made of conductive mesh fabric...or even something like aluminum screen. Several layers would be even better. But before going this route, I'd want to see some measurements. Laptops might already be "quiet enough." (Measurements are needed to determine the effectiveness of any proposed RF shielding anyway, so....) Finally, for a number of years there have been proposals for viewing screens built into glasses or goggles. "Crystal Eyes" was one of them. Another was a replacement for standard EGA screens (this was 4-6 years ago). These were being announced during the period when virtual reality (VR) was expected to dominate...that hasn't happened, yet. With some of these glasses, gargoyle-style, one could completely encase the laptop in a shielded case (like a Zero Haliburton) and then use a palm keypad... Speaking of this sort of approach, a lower-tech version might be to use a palmtop, like the HP 95LX, as a remote terminal to a machine completely shielded. (The laptop could be in a shielded enclosure, or backpack, with the 95LX snaked to it with cables.) Given the battery operation, the long battery life (which says radiated RF is likely to be under control), the LCD display, etc., this should be pretty good against eavesdroppers. I haven't yet looked at the Ross Anderson paper, but some things bother me about it. It seems unlikely that a "TEMPEST font" will affect keyboard and main CPU board noise. Also, in a multiple window environment, with several active windows, and with the target window being of varying sizes, I'm not quite sure I buy the idea that a remote sensing of the content of one window is very easy to pull off. But I'll take a look at what Ross has to say. --Tim May Just Say No to "Big Brother Inside" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From dformosa at st.nepean.uws.edu.au Sun Feb 8 22:45:53 1998 From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa}) Date: Mon, 9 Feb 1998 14:45:53 +0800 Subject: Soft Tempest In-Reply-To: Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Sun, 8 Feb 1998, Tim May wrote: [...] > Really? You think so? You think TEMPEST treatment of laptops is more > expensive than of normal machines? Laptops have a very tight size and waight budget. I would immagion this is the limmiting factor rather then the RF emissions. - -- Please excuse my spelling as I suffer from agraphia see the url in my header. Never trust a country with more peaple then sheep. ex-net.scum and proud You Say To People "Throw Off Your Chains" And They Make New Chains For Themselves? --Terry Pratchett. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBNN6OF6QK0ynCmdStAQFJaQQAkszblxy6EsbYL/xpFlrqjsBSYVtfd+nm lKTSccmEb2be6Eh7RYa9nUxQ1Pi3j/EzTCzkRc1SI1vxG1LfLc7721E9TR18Tk6N bfcNE7uolpSfMKaQO1J8ilihzc0aSYVFDFseLjID9cMRkwLwy84fmvlPUN0bNq7s 71IrIXzctLk= =7qfO -----END PGP SIGNATURE----- From ravage at ssz.com Sun Feb 8 22:55:54 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 14:55:54 +0800 Subject: Laptop TEMPEST Message-ID: <199802090657.AAA19180@einstein.ssz.com> Hi, Doesn't the FCC have to test the RF emissions of all laptops as well as monitors for sale as Class A and Class B in the US? Shouldn't that material be available? I searched the main site, www.fcc.gov, but didn't find anything regarding this. I sent a request for instructions on how to obtain the emissions test results on computer monitors and laptops for commercial and non-commercial use, foia at fcc.gov. If anyone actualy knows of the location I would be much obliged if you would pass it along. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From rdl at mit.edu Sun Feb 8 23:22:52 1998 From: rdl at mit.edu (Ryan Lackey) Date: Mon, 9 Feb 1998 15:22:52 +0800 Subject: Soft Tempest In-Reply-To: Message-ID: <199802090715.CAA24788@the-great-machine.mit.edu> Tim May wrote: > At 9:19 PM -0800 2/8/98, Ryan Lackey wrote: > > >I'm a bit busy until at least after FC '98, or I'd do it myself. One > >of my goals is to keep my laptop as secure as possible, and that's > >an application where TEMPEST shielding is rather prohibitive. > > Really? You think so? You think TEMPEST treatment of laptops is more > expensive than of normal machines? I think it is more difficult to have a lightweight, portable, non-maintenance intensive solution for tempest protecting a portable than for a big desktop box. A desktop box doesn't care how much it weighs. It can even be put inside a TEMPEST rack (I saw someone selling these at a convention once; I wanted one, but didn't have any way to to ship it back to Boston. Sigh), or just TEMPEST protect the entire room. One of the problems with TEMPEST protection is that the gaskets/etc. get worn. Or some stupid fsck paints the exposed copper in the doorway. Or whatever. I don't think requiring that the thing be portable, lightweight, etc. is going to make it any less likely to be damaged. If the TEMPEST protection is damaged, it's not as if a warning LED will come on -- TEMPEST monitoring equipment is *way* too heavy to build into a laptop, so it will fail silently. > The physics suggests just the opposite: the RF emissions from laptops are > expected to be lower from first principles, and, I have heard, are > measurably much lower. (I say "have heard" because I don't have any access > to RF measurement equipment...I once spent many hours a day working inside > a Faraday cage, but that was many years ago.) Certainly the traces are shorter, there are no big antennas (read: cables) connecting parts, etc. The power levels are power. There aren't any power cords if you're on battery. However, a lot of them have plastic cases and generally piss-poor shielding of any kind, too. > > The first principles part is that the deflection yokes in a CRT are the > largest radiated component of what got named "van Eck radiation." (I'd just > call it RF, but whatever.) > > Laptops are missing this component. (It might be interesting to see the > radiated RF numbers for various kinds of flat panel displays.) According to the Anderson paper, certain kinds of LCD-TFT have *easier to monitor* emissions than monitors. I have no idea which is the case, but I'm willing to err on the side of paranoia. I should scrounge up some TEMPEST monitoring equipment around MIT somewhere and test it, though. > > The emission from the keyboard would have to be looked at, of course. It's an integrated component, no keyboard wire, so it's much less likely to lose. > > Also, laptops, being so small, are easy to shield with mesh bags. An > inelegant approach would be to bend copper sheeting to form an enclosure. A > more elegant approach might be to take one of the tight-fitting laptop > cases (like the Silicon Sports "Wetsuit") and use it as a pattern for a > case made of conductive mesh fabric...or even something like aluminum > screen. Several layers would be even better. You need to worry about the mesh bag corrding/breaking/etc. But yeah, this is a decent technique. I wonder how small the mesh has to be to attenuate 30-40db of signal in the relevant frequencies, and if that makes it hard to see/type through. I should figure out what frequencies are involved. > > But before going this route, I'd want to see some measurements. Laptops > might already be "quiet enough." (Measurements are needed to determine the > effectiveness of any proposed RF shielding anyway, so....) The paper pretty clearly says laptop LCDs are not sufficiently quiet. Until I read this, I was under the impression they were; perhaps passive matrix screens are and active are not. (actually, I can totally understand that wrt the pulse modulation not present in modern crts) > > Finally, for a number of years there have been proposals for viewing > screens built into glasses or goggles. "Crystal Eyes" was one of them. > Another was a replacement for standard EGA screens (this was 4-6 years > ago). These were being announced during the period when virtual reality > (VR) was expected to dominate...that hasn't happened, yet. > > With some of these glasses, gargoyle-style, one could completely encase the > laptop in a shielded case (like a Zero Haliburton) and then use a palm > keypad... I used to work in the MIT Media Lab's wearables project -- we used this kind of approach. Something called a "twiddler" chording keyboard (unshielded; my advisor fled the country before I could get a shielded one set up), attached to a "private eye" monocular display; some odd resolution, again unshielded. Attached to a standard portable PC, a belt mounted PC, or whatever. I was going to put together a TEMPEST resistant wearable at some point. In addition, a mesh cloak; we'd been doing some privacy stuff, and discovered that there were penetrating cameras in use by some surveilance companies/etc. for anti-shoplifting/etc. -- it would be nice to shield against them. It never happened, oh well. I had a real bitch of a time finding open source TEMPEST information, which is part of why the idea was back-burnered. I think there is a concerted effort on the part of the government to prevent open source discussion of the topic, through manipulation of research money, etc. Most of my information was general purpose EE stuff and some EMP-shielding information, so perhaps I'm inclined to overkill (when dealing with EMP, you have to worry about 3 second duration *changes* in the field, so your faraday cage needs to be of uniform materials, joints need to be the same as the material, etc. In the absence of material to suggest otherwise, I think the same criteria apply to serious TEMPEST shielding, in the 85db+ range. There is some speculation that the SECRET TEMPEST specs are not sufficient to resist some modern SIGINT technology, and that there exist unknown standards for real protection for some applications. Perhaps this is unjustified paranoia). > > Speaking of this sort of approach, a lower-tech version might be to use a > palmtop, like the HP 95LX, as a remote terminal to a machine completely > shielded. (The laptop could be in a shielded enclosure, or backpack, with > the 95LX snaked to it with cables.) Given the battery operation, the long > battery life (which says radiated RF is likely to be under control), the > LCD display, etc., this should be pretty good against eavesdroppers. Even a passive component has a resonant frequency; if you're attacking, you may know it and can take advantage of this (hinted at in the paper). I don't think the palmtop being low power necessarily makes it immune, although I'd bet it's a bit better off than a laptop. > > I haven't yet looked at the Ross Anderson paper, but some things bother me > about it. It seems unlikely that a "TEMPEST font" will affect keyboard and > main CPU board noise. Also, in a multiple window environment, with several > active windows, and with the target window being of varying sizes, I'm not > quite sure I buy the idea that a remote sensing of the content of one > window is very easy to pull off. > > But I'll take a look at what Ross has to say. > > --Tim May I think the real solution is just what Ross said -- software + hardware. With the right font and X server frobbery, you can get *better* net image/text quality with TEMPEST protection and anti-aliasing than with neither. And it's a great safety net in case your hardware protection is compromised. Once the current project which by now is becoming rather tired of being brought up in passing rather than in a real comprehensive form is on its way, I'm going to look at the TEMPEST wearable, maybe with a verified cryptographic hardware implementation for the important stuff. An interim solution of a nice greyscale antialiased font in a java window serving as a console, even if only for things like the pgp xterm, would be a nice interim solution. Especially since it should only take a few hours to do, if someone has some font manipulation tools. I was originally thinking of modifying the text mode console drivers, but they use DOS text mode, which can't deal with greyscale. The solution is to use SVGAlib, GGI, or an X application. A really cool solution would be to make the X server itself do this to everything on the screen. XFree86 is way too nasty a codebase for me to modify in my spare time, though. I think Linux-GGI is the proper way to do it. > > > > > > Just Say No to "Big Brother Inside" > ---------:---------:---------:---------:---------:---------:---------:---- > Timothy C. May | Crypto Anarchy: encryption, digital money, > ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero > W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, > Higher Power: 2^3,021,377 | black markets, collapse of governments. > > > -- Ryan Lackey rdl at mit.edu http://mit.edu/rdl/ From rdl at mit.edu Sun Feb 8 23:44:54 1998 From: rdl at mit.edu (Ryan Lackey) Date: Mon, 9 Feb 1998 15:44:54 +0800 Subject: Laptop TEMPEST Message-ID: FCC RF/EMC testing is well nigh useless for TEMPEST protection. Compliance engineering firms have some equipment which might be useful for TEMPEST experimentation, but the actual specs for Class B (Class A is basically anything that won't kill you) are pretty worthless for this application. I imagine there may be some other "dual use" technologies through for testing TEMPEST equipment. Perhaps some medical equipment has stringent stray emanation specs? I believe the equipment you'd really want is the real "TS" (technical surveillance) gear, which is 1) not available on the open market and 2) expensive. The paper seems to have involved an AM radio and an obsolete piece of British TS kit; van Eck used a modified TV. Any HAM could probably build a suitable receiver, the real problem is knowing how much attenuation is necessary to defeat the real TS gear. This is why I am fundamentally impressed by the obfuscation techniques from the paper, rather than just straight shielding. -- Ryan Lackey rdl at mit.edu http://mit.edu/rdl/ From nobody at REPLAY.COM Sun Feb 8 23:56:46 1998 From: nobody at REPLAY.COM (Anonymous) Date: Mon, 9 Feb 1998 15:56:46 +0800 Subject: Drivers Licenses Message-ID: <199802090735.IAA08517@basement.replay.com> Jim Choate wrote: >> From: "William H. Geiger III" >> >> A couple of times through the washer and dryer and that >> lamination seperates. Any cop that has worked traffic >> has seen plenty of DL's in this shape (heh should have >> seen my old DL when I truned it in to get it renewed ). > > I rather doubt that. I have had a Texas drivers license > since I was 16, I'm now 38. I have washed them innumerable > times and I have never had the lamination break or > otherwise degrade. The lamination is quite heavy. I did > have one crack at the seam one time because of a bad > lamination and was specificaly instructed by the officer > who wrote me a speeding ticket to get it replaced. I did > so immediately. "Yes SIR!" > The law here is that if the license is damaged, you move, > or otherwise make the information invalid you have 30 > days to correct it. "Yes SIR!" > I suspect quite strongly that had I shown up at the > court house to pay that ticket with the same damaged > license (required to be shown at the time of payment) > they would not have accepted the payment and might have > asked to to discuss the situation with one of the > officers they so thoughtfuly have placed about the room. "Yes SIR!" > Texas takes counterfeiting of licenses quite seriously. "Yes SIR!" > My suggestion would be don't try such juvenile tricks here, "No, SIR!" > the DPS have seen it before "Yes SIR!" > and won't be pleasant people to deal with unless you're > a juvenile. "No SIR!" This is one of the things I love so about Texas and Texans. Despite inexplicable rumors and propaganda about independence and rugged frontier indivuality, Texans are as fucking obedient to authority as the most lock-stepped fucking Germans. The People's Republic of Texas is on the leading edge of Big Brother statism. Sales tax fully as high as New York's, fingerprints at driver license renewal time, roadblocks to fish for people who have been indulging in adult beverages or who have outstanding warrants, and some of the most dumb-fuck, clueless, fuckwit people behind badges in the known universe. Texans will give anyone their SS number at any time for any reason. Many print it on their checks. Texas is without doubt the Rube State. The only reason it isn't on the bleeding foreskin of Big Brother technology is that there aren't enough clues in the state to rub together to make a spark. When you run into anyone halfway sharp or better in Texas, it's a cinch they are a refugee from the unforgiving North. From shamrock at cypherpunks.to Sun Feb 8 23:57:29 1998 From: shamrock at cypherpunks.to (Lucky Green) Date: Mon, 9 Feb 1998 15:57:29 +0800 Subject: Driver Licenses In-Reply-To: <199802082027.PAA00347@users.invweb.net> Message-ID: On Sun, 8 Feb 1998, William H. Geiger III wrote: > My question is what is the best way to remove this information from the > cards? Making the mag stripe on a driver license unreadable by a POS terminal is easy. A refrigerator magnet will suffice. There is only one problem: chances are you then won't be sold any alcohol. See, major chains, such as the Southland corporation [7/11], recently installed POS terminals that are linked to the cash register. [This may not have reached a particular reader's area yet, please don't reply with "but my 7/11 down the corner does not do this"]. Unless a driver license has been swiped, the cash register will not permit the clerk to ring up the sale. It doesn't matter how old you are, you can be 80 years old and in a wheelchair, no government issued ID with working mag stripe, no alcohol or tobacco products for you. The clerk at my local 7/11 assured me the information captured would not be forwarded to a central site. Yet. It appears the stores are installing these systems to protect themselves against police sting "test buys", in which the authorities take persons just days shy of their 21st birthday, put theater makeup and/or a gray beard and wig on them and thus entrap store clerks into selling controlled substances to minors. As any fool can predict, the information captured will not remain local for long. After all, the system is ideal for monitoring gun^H^H^H alcohol purchases of parolees, tracking down deadbeat dads, etc. -- Lucky Green PGP v5 encrypted email preferred. "Tonga? Where the hell is Tonga? They have Cypherpunks there?" From shamrock at cypherpunks.to Mon Feb 9 00:24:11 1998 From: shamrock at cypherpunks.to (Lucky Green) Date: Mon, 9 Feb 1998 16:24:11 +0800 Subject: Drivers Licenses (fwd) In-Reply-To: <199802090355.VAA18303@einstein.ssz.com> Message-ID: On Sun, 8 Feb 1998, Jim Choate wrote: > I have a proposal. Lucky is supposed to be in Austin for the CFP conference. > If he is agreeable, he could ask to examine a Tx. d.l. We could leave it up > to his opinion as to whether these would be easy to alter. Why me? -- Lucky Green PGP v5 encrypted email preferred. "Tonga? Where the hell is Tonga? They have Cypherpunks there?" From jkwilli2 at unity.ncsu.edu Mon Feb 9 00:31:07 1998 From: jkwilli2 at unity.ncsu.edu (Ken Williams) Date: Mon, 9 Feb 1998 16:31:07 +0800 Subject: What's the latest in factoring? In-Reply-To: <199802072222_MC2-3262-79F5@compuserve.com> Message-ID: On Sat, 7 Feb 1998, Alan Tu wrote: >anything more recent? Also, whereas 1024 bits was the commonly accepted >threshhold for key lengths more than two years ago, what's the threshhold >now? Because I have DOS (and like it) I use PGP 2.63ix, when should I >retire my 1024-bit key? I don't expect anybody to answer that I should >do so immediately, but can someone give me an idea on what people are >doing in regard to key length? > >Sincerely, > >Alan Tu 8192 bits is used now. you can generate 8192 bit keys with PGP 2.6.3ui (the unofficial international version). check out "PGP Projects" at http://www.westfalen.de/hugo/pgp/ or "The Unofficial International PGP Home Page" at http://members.tripod.com/~Crompton/pgp.htm for info and download. [note: you can of course generate MUCH larger keys, but i'm attempting to be practical for a change] Regards, TATTOOMAN /-=-=-=-=-=-=-=-=-=-=-=-[ TATTOOMAN ]-=-=-=-=-=-=-=-=-=-=-=-\ | NC State Computer Science Dept VP of The E. H. A. P. Corp. | | jkwilli2 at adm.csc.ncsu.edu http://www.hackers.com/ehap/ | | jkwilli2 at unity.ncsu.edu ehap at hackers.com | | WWW---[ http://152.7.11.38/~tattooman/ | | FTP---[ ftp://152.7.11.38/pub/personal/tattooman/ | | WW2---[ http://www4.ncsu.edu/~jkwilli2/ | | W3B---[ http://152.7.11.38/~tattooman/w3board/ | | PGP---[ http://www4.ncsu.edu/~jkwilli2/pgp.asc | | 35 E1 32 C7 C9 EF A0 AB 9D FE 8E FC 2D 68 55 44 | \-=-=-=-=-=-=-[ http://152.7.11.38/~tattooman/ ]-=-=-=-=-=-=-/ From bill.stewart at pobox.com Mon Feb 9 00:36:07 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Mon, 9 Feb 1998 16:36:07 +0800 Subject: Most elegant wording against privacy/law-enforcement "balance" In-Reply-To: <9802070144.AA11833@mentat.com> Message-ID: <3.0.5.32.19980208073437.007cd710@popd.ix.netcom.com> >> What are the most elegant rebuttals to politicians saying we >> need Key Recovery as a "reasonable balance between the needs of >> law enforcement vs. freedom of crypto"? Someone, probably Jim Ray, has a nice phrase about "Protecting the Fourth Amendment _is_ one of the legitimate needs of law enforcement." It's not an in-depth critique, but it's enough to get a rant off to a good start, where you're on the moral high ground, rather than the "Even the FBI's friends like Dorothy haven't found a legitimate need for increasing wiretaps", which is a useful place to go as long as you're already ahead. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From yourfriend8950 at psynet.net Mon Feb 9 17:13:46 1998 From: yourfriend8950 at psynet.net (yourfriend8950 at psynet.net) Date: Mon, 9 Feb 1998 17:13:46 -0800 (PST) Subject: Online Credit Card Transactions for $39.95!! Message-ID: <199802100111.BAA03828@server1.online-now.de> Lease to own your merchant account equipment, software, and shopping cart system for only $39.95 per month! WE GUARANTEE APPROVAL no matter what your credit status may be! The benefits include: * 2% Discount Rate * No Monthly Minimum Billing Fee * No Statement Fee if No Sales Made for the Month * Money Available in 3 Business Days * Windows-Based or Macintosh Compatible Credit Card Processing Software (Available) * Shopping Cart System To Take Orders Securely Right On-Line (Available) * Checks By Fax/Email/Phone software. Please call us at 912-236-6676 for more information. Please fill out the form below and fax to 970-927-0964. ======================================================= Merchant Account Application Legal Business Name: ____ State: __________________ DBA: ____________________ Business Address: _______ Suite: __________________ City State Zip: _________ Describe Business: ______ Business Hours: _________ Percent Mail Order: _____ Percent Phone Orders: ___ Percent Trade Show: _____ Locations: ______________ Year Started: ___________ Fed Tax ID: _____________ State Tax ID: ___________ Principal Contact: ______ Title: __________________ Phone No: _______________ Fax No: _________________ Est Card Sales Month: ___ Average Ticket: _________ Type of Business: _______ State Incorporated: _____ Age of Business: ________ Date Acquired: __________ OWNER PRINCIPAL INFORMATION: President Owner: ________ Title: __________________ Ownership: ______________ Residence Address: ______ City State Zip: _________ Own Rent: _______________ Since: __________________ Home Phone: _____________ Previous Address: _______ DOB: ____________________ CO OWNER INFORMATION: Co-Owner: _______________ Title: __________________ Percent Owned: __________ Residence Address: ______ City State Zip: _________ Since: __________________ Own Rent: _______________ BUSINESS TYPE: Type of Building: _______ Found EMS By: ___________ CREDIT INFO: Rank Your Credit: _______ Prior Bankrupt: _________ Year: ___________________ TERMINAL: Prefer PC Software or Terminal?: ___ Terms/Lease or Purchase?: __________________ REFERENCES: BUSINESS REFERENCES: (Please list three) From adam at homeport.org Mon Feb 9 02:12:13 1998 From: adam at homeport.org (Adam Shostack) Date: Mon, 9 Feb 1998 18:12:13 +0800 Subject: Driver Licenses In-Reply-To: Message-ID: <199802091006.FAA08443@homeport.org> I used to work in a lab with an MRI. Erased my credit cards regularly. I visit from time to time. :) Adam Anonymous wrote: | >Odd. When I first got a card with the stripe, I was a little paranoid so | >I took a bar magnet and erased it. Actually, I don't know whether my | >eraser worked because nobody has ever asked to swipe my card thru a | >reader. I got a wallet with a plastic fold-out so if someone asks to see | >my id, I open my wallet and show it to them, then put it away. | | How many of us have done this? I nuked mine in the parking lot of the DMV. | -- "It is seldom that liberty of any kind is lost all at once." -Hume From jkwilli2 at unity.ncsu.edu Mon Feb 9 05:13:34 1998 From: jkwilli2 at unity.ncsu.edu (Ken Williams) Date: Mon, 9 Feb 1998 21:13:34 +0800 Subject: 145 Million In-Reply-To: <199801260540.XAA10977@mail.t-1net.com> Message-ID: On Sun, 25 Jan 1998 MAILER-DAEMON at toad.com wrote: >Removal instructions below. > >If someone with an 8th grade education can make a personal >fortune of $145 million in network marketing with herbs, that's a shitload of weed! it would be quite risky too trying to move over 45,000 lbs of quality weed. you are right though that anyone with an 8th grade education can do it....in fact, i would say most of the ppl trying to achieve this probably have an 8th grade education or less. >why can't you? Especially when this person has just decided um....because i didn't enjoy prison the first time? >to come out of retirement to launch an upstart company, >marketing products that were used by the Russians to win all >those gold medals at the Olympic Games. With more scientific Russians winning gold medals? you want me to push steroids too? >research than anything else on the market, it's no wonder why >so many doctors are joining our company and offering these >products to their patients. dope dealers = doctors? crackheads = patients? >Why not do something different to change your life? Join in ok, pass me that crack pipe you're tokin on then. >with the person who knows how to make things happen big and >fast. He has just joined our company and is willing to help >you learn how to 'set yourself free'. uhh....Scarface died trying to do this, didn't he? >Someday maybe you can throw the alarm clock out the window. >For good. but my pager and cellfone will be going off constantly. since i'll probably be jacked on crystal meth all the time, i guess i won't mind though.... >For additional information, please check out the following: >http://www.prime-1.com > >Thanks > > >For guaranteed removal call 1-800-555-9205, ext. 3256, >24 hours a day. > yeah, right. TATTOOMAN From mktmaster23662 at juno.com Mon Feb 9 22:04:26 1998 From: mktmaster23662 at juno.com (mktmaster23662 at juno.com) Date: Mon, 9 Feb 1998 22:04:26 -0800 (PST) Subject: HERE IS HOW TO BULK EMAIL... Message-ID: <> Press the reply button and type "remove" (without the quotes) in the subject heading to be removed from our list. Thank You ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Here is how to bulk email your product, service, or business opportunity SUCCESSFULLY... FACT: While there are many people who TRY to bulk email, There are very few who do it successfully! Why?: Because many people buy bulk email software along with millions of addresses, and are still not supplied with the NECESSARY INFORMATION they MUST HAVE to successfully bulk email. Here is the rest of the information that the bulk email programs and list sellers never give you that you MUST have. For the beginner: This site teaches you as if you were in the 1st Grade, with complete step-by-step INSTRUCTIONS, SOFTWARE & addresses to start effective bulk emailing IMMEDIATELY, at speeds of up to 250,000 emails per hour (and faster). Don't pay someone else to send your bulk email... You never know if it REALLY IS going out! DO IT YOURSELF! WE INCLUDE: * COMPLETE INSTRUCTIONS on HOW to send Bulk Email! * Information on SMTP servers * "bulk friendly" ISPs * How to Make sure your email is being delivered * How to read header information * How to put "CLICK HERE" links in your bulk email * HOW TO SEND BULK EMAIL IN COLOR * Information on the Internet and WHY bulk emailing * Much, Much More! Also: * FREE 8 MILLION EMAIL ADDRESSES available for download RIGHT NOW! * FREE Email List Management Software (sorts, counts, filters, combines, etc. at Lightning Speed!) * STEALTH MASSMAILER SOFTWARE When registering YOU WILL SAVE 50%!!!!! * FREE Software demo that AUTOMATICALLY keeps you signed on AOL indefinitely! * Search Engine submission software demo * MANY MORE SUPRISES AND PROGRAMS!!!! The cost for membership is only $99.00!!!! Limited Time Offer!
CLICK HERE NOW!
or point your browser to: http://209.51.216.146/bulk.htm From mktmaster23662 at juno.com Mon Feb 9 22:04:26 1998 From: mktmaster23662 at juno.com (mktmaster23662 at juno.com) Date: Mon, 9 Feb 1998 22:04:26 -0800 (PST) Subject: HERE IS HOW TO BULK EMAIL... Message-ID: <> Press the reply button and type "remove" (without the quotes) in the subject heading to be removed from our list. Thank You ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Here is how to bulk email your product, service, or business opportunity SUCCESSFULLY... FACT: While there are many people who TRY to bulk email, There are very few who do it successfully! Why?: Because many people buy bulk email software along with millions of addresses, and are still not supplied with the NECESSARY INFORMATION they MUST HAVE to successfully bulk email. Here is the rest of the information that the bulk email programs and list sellers never give you that you MUST have. For the beginner: This site teaches you as if you were in the 1st Grade, with complete step-by-step INSTRUCTIONS, SOFTWARE & addresses to start effective bulk emailing IMMEDIATELY, at speeds of up to 250,000 emails per hour (and faster). Don't pay someone else to send your bulk email... You never know if it REALLY IS going out! DO IT YOURSELF! WE INCLUDE: * COMPLETE INSTRUCTIONS on HOW to send Bulk Email! * Information on SMTP servers * "bulk friendly" ISPs * How to Make sure your email is being delivered * How to read header information * How to put "CLICK HERE" links in your bulk email * HOW TO SEND BULK EMAIL IN COLOR * Information on the Internet and WHY bulk emailing * Much, Much More! Also: * FREE 8 MILLION EMAIL ADDRESSES available for download RIGHT NOW! * FREE Email List Management Software (sorts, counts, filters, combines, etc. at Lightning Speed!) * STEALTH MASSMAILER SOFTWARE When registering YOU WILL SAVE 50%!!!!! * FREE Software demo that AUTOMATICALLY keeps you signed on AOL indefinitely! * Search Engine submission software demo * MANY MORE SUPRISES AND PROGRAMS!!!! The cost for membership is only $99.00!!!! Limited Time Offer!
CLICK HERE NOW!
or point your browser to: http://209.51.216.146/bulk.htm From dlv at bwalk.dm.com Mon Feb 9 06:06:14 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Mon, 9 Feb 1998 22:06:14 +0800 Subject: 145 Million In-Reply-To: Message-ID: <2uymke8w165w@bwalk.dm.com> Ken Williams writes: > >to come out of retirement to launch an upstart company, ^^^^^^^^^^ jail :-) > >marketing products that were used by the Russians to win all > >those gold medals at the Olympic Games. With more scientific > > Russians winning gold medals? you want me to push steroids too? I suspect they used much more than steroids and that half the chemicals are so secret they're not illegal yet. You don't think Russian gymnast girls were on steroids, do you? ;-) (They do have to take the Pill, so they don't get their period in the middle of a performance.) Guy Polis is a pedophile who became interested in cryptography because he didn't want to the cops to read the child pornography pictures on his hard disk. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From ravage at ssz.com Mon Feb 9 06:17:25 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 22:17:25 +0800 Subject: Drivers Licenses (fwd) Message-ID: <199802091420.IAA20507@einstein.ssz.com> Forwarded message: > Date: Mon, 9 Feb 1998 09:25:55 +0100 (CET) > From: Lucky Green > Subject: re: Drivers Licenses (fwd) > On Sun, 8 Feb 1998, Jim Choate wrote: > > I have a proposal. Lucky is supposed to be in Austin for the CFP conference. > > If he is agreeable, he could ask to examine a Tx. d.l. We could leave it up > > to his opinion as to whether these would be easy to alter. > > Why me? Convenience. You seemed like the right person who would be in the right place with the right technical skills to ask for indipendent opinion. You obviously don't feel comfortable with it. I apologize for the intrusion. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ravage at ssz.com Mon Feb 9 06:21:43 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 22:21:43 +0800 Subject: Driver Licenses (fwd) Message-ID: <199802091425.IAA20569@einstein.ssz.com> Forwarded message: > Date: Mon, 9 Feb 1998 09:00:12 +0100 (CET) > From: Lucky Green > Subject: Re: Driver Licenses > The clerk at my local 7/11 assured me the information captured would not > be forwarded to a central site. Yet. It appears the stores are installing > these systems to protect themselves against police sting "test buys", in > which the authorities take persons just days shy of their 21st birthday, > put theater makeup and/or a gray beard and wig on them and thus entrap > store clerks into selling controlled substances to minors. > > As any fool can predict, the information captured will not remain local > for long. After all, the system is ideal for monitoring gun^H^H^H alcohol > purchases of parolees, tracking down deadbeat dads, etc. I have worked doing technical support for McDonalds in two of my past jobs. I assure you that when they dump the stores records each night they are dumping this as well. They dump gas sales from the automated machines as a matter of course. The real question is who besides Southland Corp. subsidies are they selling this info to? ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ravage at ssz.com Mon Feb 9 06:28:24 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 22:28:24 +0800 Subject: Laptop TEMPEST (fwd) Message-ID: <199802091430.IAA20623@einstein.ssz.com> Forwarded message: > Subject: Re: Laptop TEMPEST > From: Ryan Lackey > Date: 09 Feb 1998 02:34:15 -0500 > FCC RF/EMC testing is well nigh useless for TEMPEST protection. I disagree, it would give you a gross baseline on the total emissions between monitors and laptops. That field strenght measurement would at least allow you to calculate radiuses of equal strength to calculate approximately how far the emissions are from each class of device for equal probabilities of detection. One of the specific goals is to measure how effective the device is at effecting other co-located devices (such as seeing ghost images on other monitors or causing static in paging equipment). I suspect one could do it with a spectrum analyzer or a grid dip meter. > I imagine there may be some other "dual use" technologies through for > testing TEMPEST equipment. Perhaps some medical equipment has stringent > stray emanation specs? We're not trying to bring the individual vertical retraces out of the chaff...we're trying to calculate the total comparitive emission strengths. If that isn't high enough then trying to get individual componants of that field will be useless. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From jya at pipeline.com Mon Feb 9 06:40:36 1998 From: jya at pipeline.com (John Young) Date: Mon, 9 Feb 1998 22:40:36 +0800 Subject: EPIC World Crypto Survey Message-ID: <1.5.4.32.19980209142939.00b36c60@pop.pipeline.com> The New York Times, February 9, 1998, p. D10: U.S. Losing Battle on Control of Data Encryption, Study Says By Jeri Clausing Washington -- The Clinton Administration is losing its battle to increase international controls over how reliably computer data can be scrambled to insure privacy, according to a report to be released Monday by an independent research group. ... The Electronic Privacy Information Center says that its survey of 243 governments showed that the United States is virtually the only democratic, industrialized nation seeling domestic regulation of strong encryption. That finding directly contradicts the Clinton Administration's assertions in Congressional hearings that it has the support of most nations on this issue. ... William Reinsch, the Under Secretary for export administration in the United States Commerce Department, denied that the study contradicted the Administration's assertions. "All the Administration has ever said is that there are more countries that go farther than we do," Mr. Reinsch said. "The study confirms that." From ravage at ssz.com Mon Feb 9 06:54:28 1998 From: ravage at ssz.com (Jim Choate) Date: Mon, 9 Feb 1998 22:54:28 +0800 Subject: Airport security cracked by flaw [CNN] Message-ID: <199802091452.IAA20852@einstein.ssz.com> Forwarded message: > X-within-URL: http://www.cnn.com/TECH/computing/9802/08/security.reut/index.html > REPORT: COMPUTER DESIGN FLAW OPENS AIRPORTS TO TERRORISM > > graphic February 8, 1998 > Web posted at: 1:25 p.m. EST (1825 GMT) > > NEW YORK (Reuters) -- The computer security systems that control > access to 40 airports worldwide through electronic badges have a > design flaw that could make them vulnerable to terrorism, The New > York Times reported Sunday. > > A California computer security consulting firm, MSB Associates, > found the flaw in December in a routine audit of a large California > financial services software company, the identity of which was not > disclosed, according to the newspaper. > > Government buildings, including that of the CIA, and prisons and > industries with sensitive military, drug or financial information or > material also use the system and are also vulnerable to attack, the > Times report said. [text deleted] ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From jkwilli2 at unity.ncsu.edu Mon Feb 9 06:59:21 1998 From: jkwilli2 at unity.ncsu.edu (Ken Williams) Date: Mon, 9 Feb 1998 22:59:21 +0800 Subject: CYBERsitter caught mail-bombing (fwd) Message-ID: ---------- Forwarded message ---------- Date: Fri, 6 Feb 1998 23:25:04 -0500 From: bennett at peacefire.org To: peacefire-broadcast at vorlon.mit.edu Subject: CYBERsitter caught mail-bombing CYBERsitter has been caught in the act of mail-bombing someone who wrote a letter to Brian Milburn, the CEO of CYBERsitter, complaining about their product. Spefically, a lady names Sarah Salls sent the following letter to Brian Milburn at bmilburn at solidoak.com: http://peacefire.org/archives/SOS.letters/asherah.2.bm.2.4.98.txt She was writing to CYBERsitter regarding their harassment of Peacefire and their blocking of anti-censorship sites, which is described in more detail at: http://www.peacefire.org/censorware/CYBERsitter/ CYBERsitter replied by flooding her account with over 446 junk messages. While the attack was in progress, Ms. Salls had her ISP's postmaster monitor the incoming attack and shut it off. Naturally, her ISP, Valinet.com, kept copies of the mail logs for that day and has passed them on as evidence to their lawyers. A complaint was also forwarded to MCI's security department, which handles network abuse and illegal denial-of-service attacks that are perpetrated by their customers, which include lower-end network users like CYBERsitter: http://peacefire.org/archives/SOS.letters/valinet.2.mci.2.5.98.txt C-Net's NEWS.com picked up on the story and interviewed Sarah Salls, her ISP, me, and Brian Milburn from Solid Oak Software. Their story is at: http://www.news.com/News/Item/0,4,18937,00.html (Note that the C-Net article compares the act of mail flooding with conventional spam, and says that a bill is being considered in Congress that would outlaw what CYBERsitter did. This is not quite true; flooding a person's account with 500 junk messages is a denial-of-service attack, which is already illegal, and it usually gets you in a lot more trouble than spamming would.) Far from denying the accusations, Brian Milburn gave C-Net the following quote: "Certain people aren't going to get the hint. Maybe if they get the email 500 times, they'll get it through their heads... If they send it to my private email account, they're going to get what they get." No kidding, Brian! bennett at peacefire.org (615) 421 6284 http://www.peacefire.org/ --- From raph at CS.Berkeley.EDU Mon Feb 9 07:00:38 1998 From: raph at CS.Berkeley.EDU (Raph Levien) Date: Mon, 9 Feb 1998 23:00:38 +0800 Subject: List of reliable remailers Message-ID: <199802091450.GAA04639@kiwi.cs.berkeley.edu> I operate a remailer pinging service which collects detailed information about remailer features and reliability. To use it, just finger remailer-list at kiwi.cs.berkeley.edu There is also a Web version of the same information, plus lots of interesting links to remailer-related resources, at: http://www.cs.berkeley.edu/~raph/remailer-list.html This information is used by premail, a remailer chaining and PGP encrypting client for outgoing mail. For more information, see: http://www.c2.org/~raph/premail.html For the PGP public keys of the remailers, finger pgpkeys at kiwi.cs.berkeley.edu This is the current info: REMAILER LIST This is an automatically generated listing of remailers. The first part of the listing shows the remailers along with configuration options and special features for each of the remailers. The second part shows the 12-day history, and average latency and uptime for each remailer. You can also get this list by fingering remailer-list at kiwi.cs.berkeley.edu. $remailer{'cyber'} = ' alpha pgp'; $remailer{"mix"} = " cpunk mix pgp hash latent cut ek ksub reord ?"; $remailer{"replay"} = " cpunk mix pgp hash latent cut post ek"; $remailer{"jam"} = " cpunk mix pgp hash middle latent cut ek"; $remailer{"winsock"} = " cpunk pgp pgponly hash cut ksub reord ?"; $remailer{'nym'} = ' newnym pgp'; $remailer{"squirrel"} = " cpunk mix pgp pgponly hash latent cut ek"; $remailer{'weasel'} = ' newnym pgp'; $remailer{"reno"} = " cpunk mix pgp hash middle latent cut ek reord ?"; $remailer{"cracker"} = " cpunk mix remix pgp hash ksub esub latent cut ek reord post"; $remailer{'redneck'} = ' newnym pgp'; $remailer{"bureau42"} = " cpunk mix pgp ksub hash latent cut ek"; $remailer{"neva"} = " cpunk pgp pgponly hash cut ksub ?"; $remailer{"lcs"} = " mix"; $remailer{"medusa"} = " mix middle" $remailer{"McCain"} = " mix middle"; $remailer{"valdeez"} = " cpunk pgp pgponly hash ek"; $remailer{"arrid"} = " cpunk pgp pgponly hash ek"; $remailer{"hera"} = " cpunk pgp pgponly hash ek"; $remailer{"htuttle"} = " cpunk pgp hash latent cut post ek"; catalyst at netcom.com is _not_ a remailer. lmccarth at ducie.cs.umass.edu is _not_ a remailer. usura at replay.com is _not_ a remailer. remailer at crynwr.com is _not_ a remailer. There is no remailer at relay.com. Groups of remailers sharing a machine or operator: (cyber mix reno winsock) (weasel squirrel medusa) (cracker redneck) (nym lcs) (valdeez arrid hera) This remailer list is somewhat phooey. Go check out http://www.publius.net/rlist.html for a good one. Last update: Thu 23 Oct 97 15:48:06 PDT remailer email address history latency uptime ----------------------------------------------------------------------- hera goddesshera at juno.com ------------ 5:03:45 99.86% nym config at nym.alias.net +*#**#**### :34 95.82% redneck config at anon.efga.org #*##*+#**** 2:00 95.44% mix mixmaster at remail.obscura.com +++ ++++++* 19:18 95.27% squirrel mix at squirrel.owl.de -- ---+--- 2:34:19 95.16% cyber alias at alias.cyberpass.net *++***+ ++ 11:26 95.11% replay remailer at replay.com **** *** 10:06 94.93% arrid arrid at juno.com ----.------ 8:50:34 94.41% bureau42 remailer at bureau42.ml.org --------- 3:38:29 93.53% cracker remailer at anon.efga.org + +*+*+*+ 16:32 92.80% jam remailer at cypherpunks.ca + +*-++++ 24:14 92.79% winsock winsock at rigel.cyberpass.net -..-..---- 9:59:18 92.22% neva remailer at neva.org ------****+ 1:03:02 90.39% valdeez valdeez at juno.com 4:58:22 -36.97% reno middleman at cyberpass.net 1:01:28 -2.65% History key * # response in less than 5 minutes. * * response in less than 1 hour. * + response in less than 4 hours. * - response in less than 24 hours. * . response in more than 1 day. * _ response came back too late (more than 2 days). cpunk A major class of remailers. Supports Request-Remailing-To: field. eric A variant of the cpunk style. Uses Anon-Send-To: instead. penet The third class of remailers (at least for right now). Uses X-Anon-To: in the header. pgp Remailer supports encryption with PGP. A period after the keyword means that the short name, rather than the full email address, should be used as the encryption key ID. hash Supports ## pasting, so anything can be put into the headers of outgoing messages. ksub Remailer always kills subject header, even in non-pgp mode. nsub Remailer always preserves subject header, even in pgp mode. latent Supports Matt Ghio's Latent-Time: option. cut Supports Matt Ghio's Cutmarks: option. post Post to Usenet using Post-To: or Anon-Post-To: header. ek Encrypt responses in reply blocks using Encrypt-Key: header. special Accepts only pgp encrypted messages. mix Can accept messages in Mixmaster format. reord Attempts to foil traffic analysis by reordering messages. Note: I'm relying on the word of the remailer operator here, and haven't verified the reord info myself. mon Remailer has been known to monitor contents of private email. filter Remailer has been known to filter messages based on content. If not listed in conjunction with mon, then only messages destined for public forums are subject to filtering. Raph Levien From mark at unicorn.com Mon Feb 9 07:16:21 1998 From: mark at unicorn.com (mark at unicorn.com) Date: Mon, 9 Feb 1998 23:16:21 +0800 Subject: the best justice money can buy --Lessig (fwd) Message-ID: <887036600.23860.193.133.230.33@unicorn.com> Jim Choate (ravage at ssz.com) wrote: >So do I, and I bet both our incomes combined doesn't add up to 15 minutes of >Bill G's and it won't. Of course not, because Bill has jackbooted copyright enforcers to subsidise his corporation. Without them his income would be dramatically reduced. >From a market perspective we're flies on the back of >great elephant. Please be so kind as to describe how and why this marketing >mechanism (copyleft) will succed? Uh, I said copyright should be abolished, you said noone would write software, I said that Linux disproved that claim. How is this relevant to that discussion? Of course it's not going to take over when companies can get billions of dollars of subsidies in the form of copyright enforcement, but it clearly shows that without copyright people will produce better software than Microsfot has ever written. >I've been using and supporting Linux since >1993 (SSZ is listed as a source site in the back of 'Running Linux' since >day one) in this manner neither I or anyone else has gotten rich. Exactly. So tell us how Bill would have become a billionaire without copyright? >It's copyrighted in the important sense in that it uses the copyright to >enforce its conditions. That is just as important as the marketing decisions >made by it. All it enforces is source-code distribution (and I've yet to hear of a single case where it's ever been used). That's important to the developers, but not to the average user. The situation would be little changed in a world with no copyright, because if anyone did try to keep their source secret anyone who got a copy could freely distribute it. I'm truly amazed to find all these pro-copyright views on the list, when cypherpunks have been at the forefront of creating technologies to make it unenforceable and obsolete. Mark From ericm at lne.com Mon Feb 9 08:42:33 1998 From: ericm at lne.com (Eric Murray) Date: Tue, 10 Feb 1998 00:42:33 +0800 Subject: Driver Licenses In-Reply-To: Message-ID: <199802091627.IAA15679@slack.lne.com> Lucky Green writes: > > On Sun, 8 Feb 1998, William H. Geiger III wrote: > > My question is what is the best way to remove this information from the > > cards? > > Making the mag stripe on a driver license unreadable by a POS terminal is > easy. A refrigerator magnet will suffice. There is only one problem: > chances are you then won't be sold any alcohol. > > See, major chains, such as the Southland corporation [7/11], recently > installed POS terminals that are linked to the cash register. [This may > not have reached a particular reader's area yet, please don't reply with > "but my 7/11 down the corner does not do this"]. I have no idea if my local 7/11 does this. I don't even know where my local 7/11 is. I do however find it interesting that they're implementing this policy when there are still legally-issued non-mag-stripe driver's licenses in circulation... like mine, issued in 1980 (extended many times) and valid til the end of this year. > Unless a driver license has been swiped, the cash register will not permit > the clerk to ring up the sale. It doesn't matter how old you are, you can > be 80 years old and in a wheelchair, no government issued ID with working > mag stripe, no alcohol or tobacco products for you. Never mind that the CDL isn't supposed to be a citizen's ID badge. > The clerk at my local 7/11 assured me the information captured would not > be forwarded to a central site. Yet. It appears the stores are installing > these systems to protect themselves against police sting "test buys", in > which the authorities take persons just days shy of their 21st birthday, > put theater makeup and/or a gray beard and wig on them and thus entrap > store clerks into selling controlled substances to minors. > > As any fool can predict, the information captured will not remain local > for long. After all, the system is ideal for monitoring gun^H^H^H alcohol > purchases of parolees, tracking down deadbeat dads, etc. We're building Big Brother, one tiny step at a time. I hear we're going to war against Oceania again next month. -- Eric Murray Chief Security Scientist N*Able Technologies www.nabletech.com (email: ericm at lne.com or nabletech.com) PGP keyid:E03F65E5 From Markus.Kuhn at cl.cam.ac.uk Mon Feb 9 09:11:17 1998 From: Markus.Kuhn at cl.cam.ac.uk (Markus Kuhn) Date: Tue, 10 Feb 1998 01:11:17 +0800 Subject: Soft Tempest In-Reply-To: Message-ID: Tim May wrote on 1998-02-09 06:14 UTC: > The physics suggests just the opposite: the RF emissions from laptops are > expected to be lower from first principles, and, I have heard, are > measurably much lower. (I say "have heard" because I don't have any access > to RF measurement equipment...I once spent many hours a day working inside > a Faraday cage, but that was many years ago.) > > The first principles part is that the deflection yokes in a CRT are the > largest radiated component of what got named "van Eck radiation." (I'd just > call it RF, but whatever.) You have to differentiate between information carrying emanations and non-information carrying ones. The horizontal and vertical deflection coils produce a lot of radiation at harmonics of the line and frame rate of your CRT, but this signal energy is not related to your screen content (only to your video mode), and therefore not of much concern for the eavesdropper. The low-radion monitor standards look only at those signal (<400 kHz). Therefore having a TCO92 monitor provides you absolutely no advantage with respect to eavesdropping. The information carrying signals of VDUs are in much higher frequency ranges in the VHF/UHF bands. Laptops are pretty good broadcasters there, too. Markus -- Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK email: mkuhn at acm.org, home page: From Markus.Kuhn at cl.cam.ac.uk Mon Feb 9 09:14:13 1998 From: Markus.Kuhn at cl.cam.ac.uk (Markus Kuhn) Date: Tue, 10 Feb 1998 01:14:13 +0800 Subject: Laptop TEMPEST In-Reply-To: <199802090657.AAA19180@einstein.ssz.com> Message-ID: Jim Choate wrote on 1998-02-09 06:57 UTC: > Doesn't the FCC have to test the RF emissions of all laptops as well as > monitors for sale as Class A and Class B in the US? Shouldn't that material > be available? I searched the main site, www.fcc.gov, but didn't find > anything regarding this. I suspect that FCC material is not helpful with regard to Tempest. Results of such EMI tests only measure the general power spectrum emitted by a device. Of interest for Tempest purposes however is not the power spectrum, but the spectrum of the cross-correlation between an internal signal-of-interest in the device and the emanated radiation. There are special cross-correlation meters available to measure this, but this is not the equipment used in EMI tests. I have here two patents filed by the German equivalent of the NSA, that describes cross-correlation techniques for the "detection of highly distorted digital signals". Measurement equipment along those lines are what you need in order to estimate the information carrying components of the emanated spectrum. You can do cross-correlation not only between the VGA cable output and the signal picked up by an antenna or a power/ground line tap, but also between internal bus lines, the keyboard power/data lines, the read amplifier signal in your harddisk, etc. Cross-correlation tests are also useful to measure cross-talk effects between neighbor cables in your building. As mentioned in our paper, secret data on your LAN can easily leave your building via phone cables that ran parallel to your network cable for only a few meters. Markus -- Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK email: mkuhn at acm.org, home page: From bill.stewart at pobox.com Mon Feb 9 09:21:18 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Tue, 10 Feb 1998 01:21:18 +0800 Subject: Driver Licenses In-Reply-To: Message-ID: <3.0.5.32.19980209091437.007b5da0@popd.ix.netcom.com> >I used to work in a lab with an MRI. Erased my credit cards >regularly. I visit from time to time. :) Don't you just hate it when that happens :-) In particular, unlike scratching the mag strip off or ironing, if the mag strip doesn't work, you can just look ignorant. I have enough trouble with my real credit cards being non-scannable. The issue of driver's license mag strip technology has been discussed here in the past, and probably also on some of the privacy newsgroups. You could grunge around the archives and see what you find. If memory serves me correctly, most of them use a common magstripe format used for credit cards, which gives three stripes of up to about 80 bytes each. (It's been suggested that some states use a higher magnetization level, either to reduce forgery or probability of damage.) Typically they'll have the DL#, name, height, weight, eye color, race, Jew bit, Commie bit, etc., so the cops can not only scan the information conveniently, but also can compare it to the information on the front to see if it's forged. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From tcmay at got.net Mon Feb 9 09:33:38 1998 From: tcmay at got.net (Tim May) Date: Tue, 10 Feb 1998 01:33:38 +0800 Subject: Driver Licenses In-Reply-To: <199802082027.PAA00347@users.invweb.net> Message-ID: At 12:00 AM -0800 2/9/98, Lucky Green wrote: >See, major chains, such as the Southland corporation [7/11], recently >installed POS terminals that are linked to the cash register. [This may >not have reached a particular reader's area yet, please don't reply with >"but my 7/11 down the corner does not do this"]. > >Unless a driver license has been swiped, the cash register will not permit >the clerk to ring up the sale. It doesn't matter how old you are, you can >be 80 years old and in a wheelchair, no government issued ID with working >mag stripe, no alcohol or tobacco products for you. If this is consistently the case, then one approach is to wheel a cart up to the checkout line with some alcohol....and a cart full of items from the freezer and deli sections. (Some cartons of chicken salad, partly "sampled," for example.) If a U.S. Passport is not considered enough I.D., because it doesn't have the Big Brother Inside magstripe, one walks away from the transaction. "Oh, OK, you won't take my money. Bye!" (I don't believe there are any laws saying a customer must separate his purchases...if the store refuses to transact business with a customer, he may leave.) This leaves all that frozen food to be quickly returned to the shelves, and the deli food, which probably cannot be returned. (Depends on store and health department policy.) I wish no ill will toward merchants, but implementing a Big Brother Inside tracking policy carries some real costs. Lucky didn't want us to reply with anecdotes, but I have to note that many, many people will inevitably not have the type of cards Lucky refers to. Visitors, tourists, residents of other states, etc. This would all be lost revenue to stores. I thus question the "universality" of Southland's plans. Perhaps only those who "look under 26" (which is what the signs say) will be "striped carded." >The clerk at my local 7/11 assured me the information captured would not >be forwarded to a central site. Yet. It appears the stores are installing >these systems to protect themselves against police sting "test buys", in >which the authorities take persons just days shy of their 21st birthday, >put theater makeup and/or a gray beard and wig on them and thus entrap >store clerks into selling controlled substances to minors. Lucky is right that that "underage stings" are on the increase. Underage persons, often in high school, beome self-righteour warriors in the War On Demon Rum, and "narc out" their local shopkeepers. Hey, it would serve these junior narcs right if, upon being carded and being shown to be underage, a store owner made a citizen's arrest. Perhaps putting the perp in the back freezer for a few hours would send a message. >As any fool can predict, the information captured will not remain local >for long. After all, the system is ideal for monitoring gun^H^H^H alcohol >purchases of parolees, tracking down deadbeat dads, etc. We are on the road toward a surveillance society. Sadly, the ideas of David Chaum are more needed than ever, but his stuff is essentially nowhere to be seen. (To reflect Lucky's comments back to him, :-), spare us any citations of how Mark Twain Bank will let some people open a cumbersome Digicash account.) --Tim May Just Say No to "Big Brother Inside" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From ravage at ssz.com Mon Feb 9 09:36:40 1998 From: ravage at ssz.com (Jim Choate) Date: Tue, 10 Feb 1998 01:36:40 +0800 Subject: Laptop TEMPEST (fwd) Message-ID: <199802091735.LAA21910@einstein.ssz.com> Forwarded message: > Subject: Re: Laptop TEMPEST > Date: Mon, 09 Feb 1998 17:07:23 +0000 > From: Markus Kuhn > Jim Choate wrote on 1998-02-09 06:57 UTC: > > Doesn't the FCC have to test the RF emissions of all laptops as well as > > monitors for sale as Class A and Class B in the US? Shouldn't that material > > be available? I searched the main site, www.fcc.gov, but didn't find > > anything regarding this. > > I suspect that FCC material is not helpful with regard to Tempest. As to calculating a realistic estimate of range to intercept, I disagree strongly. > Results of such EMI tests only measure the general power spectrum > emitted by a device. Of interest for Tempest purposes however is > not the power spectrum, but the spectrum of the cross-correlation I am aware of how to do Tempest in practice as well as in theory. The process goes something like this. The first target is the vertical retrace. This signal is usualy the strongest because the voltage required (and hence the dv/dt) is the largest to sling that e-beam from the lower right to the upper left. It usualy resides in the 50-70Hz range. The next target is the horizontal retrace. It slews the beam from the right edge of the display to the left in order to start another trace. You can use this signal to syn both the vertical retrace steps (in order to move the beam down verticaly to start another trace) as well as the ramp that is required to slew the beam across the screen to write the pixes. Once these 4 signals are aquired and fed to the appropriate control terminals of a CRT you are ready to begin decoding the actual trace data for each line of the display. This is the hardest since the actual modulation of the e-beam is done via a screen grid (who said tube theory was out of date?) and that signal is quite small and generaly has a cardoid emission pattern aligned axialy along the central axis of the CRT tube. So if given a choise you want your antenna to be behind the viewer in line with the display. It is of some import to note that larger displays are easier to aquire usable signals from since the distances the e-beam is slewed and as a result the control voltages are much larger. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From Markus.Kuhn at cl.cam.ac.uk Mon Feb 9 09:46:07 1998 From: Markus.Kuhn at cl.cam.ac.uk (Markus Kuhn) Date: Tue, 10 Feb 1998 01:46:07 +0800 Subject: Soft Tempest In-Reply-To: <199802090715.CAA24788@the-great-machine.mit.edu> Message-ID: Ryan Lackey wrote on 1998-02-09 07:15 UTC: > The paper pretty clearly says laptop LCDs are not sufficiently quiet. Until > I read this, I was under the impression they were; perhaps passive matrix > screens are and active are not. I even used a laptop for a Tempest demo in Ross' undergraduate security course here at Cambridge, because it gave such a clear signal and was much easier to transport than a CRT. > (actually, I can totally understand that > wrt the pulse modulation not present in modern crts) I added this sentence in the paper only for those who had read the van Eck paper before, which in this respect is a little bit out-of-date and does not describe today's VDU technology. > I had a real bitch of a time finding open source TEMPEST information, which > is part of why the idea was back-burnered. I think there is a concerted > effort on the part of the government to prevent open source discussion of > the topic, through manipulation of research money, etc. Same experience here ... :-( Markus -- Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK email: mkuhn at acm.org, home page: From honig at otc.net Mon Feb 9 09:58:52 1998 From: honig at otc.net (David Honig) Date: Tue, 10 Feb 1998 01:58:52 +0800 Subject: Soft Tempest In-Reply-To: Message-ID: <3.0.5.32.19980209093105.007b3780@otc.net> At 10:14 PM 2/8/98 -0800, Tim May wrote: >At 9:19 PM -0800 2/8/98, Ryan Lackey wrote: > > >The physics suggests just the opposite: the RF emissions from laptops are >expected to be lower from first principles, and, I have heard, are >measurably much lower. (I say "have heard" because I don't have any access >to RF measurement equipment...I once spent many hours a day working inside >a Faraday cage, but that was many years ago.) ...later... >But before going this route, I'd want to see some measurements. Laptops >might already be "quiet enough." (Measurements are needed to determine the >effectiveness of any proposed RF shielding anyway, so....) The interference that laptops can cause with avionics is prima facie evidence that laptops are not quiet. >The first principles part is that the deflection yokes in a CRT are the >largest radiated component of what got named "van Eck radiation." (I'd just >call it RF, but whatever.) > >Laptops are missing this component. (It might be interesting to see the >radiated RF numbers for various kinds of flat panel displays.) They are not missing the periodic pixel clocking signals though. ... >With some of these glasses, gargoyle-style, one could completely encase the >laptop in a shielded case (like a Zero Haliburton) and then use a palm >keypad... Yes, but cables radiate. Wires are antennae. Used to be a big problem when laptops had wired mice. BTW, in van Eck's original paper, he gives a way to make screen spying a little tougher: pick random raster-lines to draw instead of the usual order. This of course would not be a significant barrier to modern interception. ------ Enrico Fermi used to tune a regular music radio to a cyclotron(?) so he could tell that it was working, I've read. ------------------------------------------------------------ David Honig Orbit Technology honig at otc.net Intaanetto Jigyoubu Lewinsky for President '2012 From VirginTimmieSkirvinFellatesSheep at teenworld.poboxes.com Mon Feb 9 10:04:18 1998 From: VirginTimmieSkirvinFellatesSheep at teenworld.poboxes.com (Animal Protection League) Date: Tue, 10 Feb 1998 02:04:18 +0800 Subject: rec.guns et.al. blocked by censorware Message-ID: <2.2.32.19980209205329.006d7ae8@neptunenet.com> At 03:22 PM 2/8/98 -0800, Tim May wrote: >At 3:02 PM -0800 2/8/98, Igor Chudov @ home wrote: >>rec.games.mecha Giant robot games. (Moderated) Quest/Illegal/Gamble >>Violence/Profanity Intol > >Perhaps the strategy should be to post material to other newsgroups to get >them blocked as well. (Though I expect the blocking is not being done using >robots to monitor for illegal words, as rec.guns would not have been >blocked this way. Rather, the cyber nannies are probably using their "PC >judgment" to block groups they don't like. You need to consider that rec.games.mecha is primarily a dumbed down alt.flame and includes postings from that obnoxious avowed 300 pound communist bisexual converted jew Camille Klein (she claims she is down to 275 lbs.). I wouldn't my kids to read her garbage posts. From declan at well.com Mon Feb 9 10:05:42 1998 From: declan at well.com (Declan McCullagh) Date: Tue, 10 Feb 1998 02:05:42 +0800 Subject: Interview with the man who creamed Bill Gates Message-ID: ---------- Forwarded message ---------- Date: Mon, 9 Feb 1998 09:29:44 -0800 (PST) From: Declan McCullagh To: politech at vorlon.mit.edu Subject: Interview with the man who creamed Bill Gates Is at: http://cgi.pathfinder.com/netly/opinion/0,1042,1733,00.html -Declan From ravage at ssz.com Mon Feb 9 10:10:25 1998 From: ravage at ssz.com (Jim Choate) Date: Tue, 10 Feb 1998 02:10:25 +0800 Subject: Godin Interview - Bill G's pie in the eye [CNN] Message-ID: <199802091806.MAA22270@einstein.ssz.com> Forwarded message: > X-within-URL: http://cgi.pathfinder.com/netly/textonly/1,1035,1733,00.html > Today's News Let's pie! Let's pie! Nincompoop guys! > by Hugues Henry ��February 9, 1998 > > ���� Until last week, Noel Godin was relatively unknown in the United > States. A 52-year-old Belgian author, film historian, actor ("The > Sexual Life of the Belgians"), writer ("Cream and Punishment") and > "entarteur" (a Godin coinage that roughly translates as "encaker" or > "pie-er"), Godin led the gang that gave to Bill Gates what so many of > us only dream of: a big wet pie in the face. The attack took place at > the entrance of Le Concert Noble on Arlon Street in Brussels and was > widely reported in the press. > > ���� Godin doesn't own a computer and didn't even know what a URL is. > His girlfriend, however, uses a PC. (This interview was conducted and > translated by Hugues Henry.) > > The Netly News: Who are you, Noel Godin? > > Noel Godin: I'm part of a gang of bad hellions that have declared the > pie war on all the unpleasant celebrities in every kind of domain > (slogan: "Let's pie! Let's pie! Nincompoop guys!"). We began to act > against "empty" celebrities from the artistic world who were thinking > they were the cat's whiskers. Then we attacked the TV news business in > France, for instance, Patrick Poivre D'Arvor [a famous French TV > presenter]. Then it became political with Philippe Douste-Blazy in > Cannes, the French minister of culture, or the other French minister > Nicolas Sarkozy last year in Brussels. > > NN When did you first pie someone? > > Godin: In November 1969, with French writer Marguerite Duras, who > represented for us the "empty" novel. > > NN Why did you choose Bill Gates? > > Godin: Because in a way he is the master of the world, and then > because he's offering his intelligence, his sharpened imagination and > his power to the governments and to the world as it is today -- that > is to say gloomy, unjust and nauseating. He could have been a utopist, > but he prefers being the lackey of the establishment. His power is > effective and bigger than that of the leaders of the governments, who > are only many-colored servants. So Bill Gates was at the top of our > lists of victims. The attack against him is symbolic, it's against > hierarchical power itself. Our war cry was explicit: "Let's pie! Let's > pie the polluting lolly!" [text deleted] ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From nobody at REPLAY.COM Mon Feb 9 10:14:34 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 10 Feb 1998 02:14:34 +0800 Subject: rec.guns et.al. blocked by censorware Message-ID: <199802091755.SAA07601@basement.replay.com> >That the "cyber nannies" are blocking it (and other similarly nonsexual, >nonprofane newsgroups) is exactly what was expected. These cyber nannies >become tools for political correctness. > >Perhaps the strategy should be to post material to other newsgroups to get >them blocked as well. (Though I expect the blocking is not being done using >robots to monitor for illegal words, as rec.guns would not have been >blocked this way. Rather, the cyber nannies are probably using their "PC >judgment" to block groups they don't like. These companies are attempting to provide the services desired by their customers. These are generally cautious, conservative parents who want to allow their young children access to the internet without them stumbling over dangerous or disturbing information. Like it or not, many parents are very protective of their children. We have no right to force our own views of childrearing on them. The filtering companies are filling a legitimate need in the marketplace. They are not evil and they are not trying to prevent adults from viewing the material they desire via their own personal accounts. They give concerned parents a sense of safety in allowing their children to use the internet, and in that way allow young people access to the net who would not otherwise be allowed to use it. From zurko at opengroup.org Mon Feb 9 10:33:56 1998 From: zurko at opengroup.org (Mary Ellen Zurko) Date: Tue, 10 Feb 1998 02:33:56 +0800 Subject: New Security Paradigm Workshop '98 Call For Papers Message-ID: <199802091812.NAA12129@postman.opengroup.org> ======================================================================== Call For Papers New Security Paradigms Workshop '98 A workshop sponsored by ACM 22 - 25 September 1998 ======================================================================== Paradigm shifts disrupt the status quo, destroy outdated ideas and open the way to new possibilities. This workshop explores deficiencies of current computer security paradigms and examines radical new models that address those deficiencies. Previous years' workshops have identified problematic aspects of traditional security paradigms and explored a variety of possible alternatives. Participants have discussed alternative models for access control, intrusion detection, new definitions of security, privacy and trust, biological and economic models of security and a wide variety of other topics. The 1998 workshop will strike a balance between building on the foundations laid in past years and exploring new directions. To participate, please submit the following, preferably via e-mail, to both Program Chairs (Mary Ellen Zurko and Steven J. Greenwald) by Friday, 3-April-1998. 1 - Your Paper You should submit either a research paper, a 5 - 10 page position paper or a discussion topic proposal. Softcopy submissions should be in Postscript or ASCII format. Papers may besubmitted in hardcopy. To submit hardcopy, please mail five (5) copies to Program co-chair Steven Greenwald. Please allow adequate time for delivery. The hardcopy deadline is 27-March-1998. Discussion topic proposals should include a description of the topic to be discussed, a pro and con position statement on the topic, identification of the parties who will uphold each position, any assurances that the participants agree to attend, and any other information that the proposer thinks would support their proposal (such as who will moderate). One potential topic for discussion is "Is there a current security paradigm?". 2 - Justification You should describe, in one page or less, why you think your paper is appropriate for the New Security Paradigms Workshop. A good justification will describe which aspects of the status-quo security paradignm your paper challenges or rejects and which new model or models your paper proposes or extends. 3 - Attendance Statement You should state how many authors wish to attend the workshop and should indicate whether at least one author will be able to attend for the entire duration of the workshop. The program committee will referee the papers and notify the authors of acceptance status by 12-June-1998. We expect to be able to offer a limited number of scholarships. More information will be provided on-line as it becomes available. 4 - The Workshop The workshop will offer a creative and constructive environment for approximately 25 participants. It will be held at the Boar's Head Inn in the vicinity of "historic" Charlottesville, Virginia. Steering Committee Bob Blakley, Mary Ellen Zurko, Steven J. Greenwald, Darrell Kienzle, Hilary Hosmer Workshop Co-Chairs Bob Blakley IBM 11400 Burnet Road, Mail Stop 9134 Austin, TX 78758 USA e-mail: blakley at us.ibm.com voice: +1 (512) 838-8133 fax: +1 (512) 838-0156 Darrell Kienzle MITRE, Mail Stop W422 1820 Dolley Madison Blvd. McLean, VA 22102 USA e-mail: kienzle at mitre.org voice: +1 (703) 883-5836 fax: +1 (703) 883-1397 Program Committee Co-Chairs Mary Ellen Zurko The Open Group Research Institute 11 Cambridge Center Cambridge, MA 02142 USA e-mail: zurko at opengroup.org voice: +1 (617) 621-7231 fax: +1 (617) 225-2943 Steven J. Greenwald 2521 NE 135th Street North Miami, FL 33181 USA voice: +1 (305) 944-7842 fax: +1 (305) 944-5746 e-mail: sjg6 at gate.net Program Committee Alfarez Abdul-Rahman, University College London Steven Cheung, University of California, Davis Shaw-Cheng Chuang, University of Cambridge John Dobson, University of Newcastle, UK Heather Hinton, Ryerson Polytechnic University, Canada Tom Lincoln, RAND Masahiro Mambo, Tohoku University Catherine Meadows, Naval Research Laboratory Ruth Nelson, Information System Security Thomas Riechmann, University of Erlangen-Nuernberg Marvin Schaefer, Arca Systems, Inc. Cristina Serban, AT&T Labs Anil Somayaji, University of New Mexico Brenda Timmerman, University of Southern California / ISI Ian Welch, University of Newcastle upon Tyne John Michael Williams Local Arrangements Chenxi Wang (University of Virginia) +1 (804)982-2291 Scholarships Hilary Hosmer (Data Security Inc.) +1 (781) 275-8231 Publications Marv Schaefer (ARCA Systems) +1 (410) 309-1780 Publicity Daniel Essin (University of Southern California) +1 (213) 226-3188 Treasurer/Registration Dixie Baker (SAIC) +1 (310) 615-0305 ACM-SIGSAC Chair Ravi Sandhu (George Mason University) +1 (703) 993-1659 From honig at otc.net Mon Feb 9 10:35:54 1998 From: honig at otc.net (David Honig) Date: Tue, 10 Feb 1998 02:35:54 +0800 Subject: Soft Tempest In-Reply-To: Message-ID: <3.0.5.32.19980209101733.007a6e30@otc.net> At 04:54 PM 2/9/98 +0000, Markus Kuhn wrote: > The horizontal and vertical >deflection coils produce a lot of radiation at harmonics of the >line and frame rate of your CRT, but this signal energy is not >related to your screen content (only to your video mode), and therefore >not of much concern for the eavesdropper. The low-radion monitor >standards look only at those signal (<400 kHz). Therefore having >a TCO92 monitor provides you absolutely no advantage with respect >to eavesdropping. >The information carrying signals of VDUs are in much higher frequency >ranges in the VHF/UHF bands. Laptops are pretty good broadcasters >there, too. One of the issues is that the fast rise-times on signals yields emissions all over the spectrum, not just at the base scanning rate. Thus, even though you're sending at e.g., 2400 bps, you've got an N-volt voltage/current swing accomplished in fractions of a microsecond. These higher harmonics radiate better than the lower ones. See Peter Smulders's paper on RS-232 interception, abstract included below. I have a local copy at http://rattler.otc.net/crypto/docs/rs232.pdf The Threat of Information Theft by Reception of Electromagnetic Radiation from RS-232 Cables Peter Smulders Eindhoven University of Technology, Department of Electrical Engineering, Eindhoven, The Netherlands Research into the possibility of picking up the electromagnetic radiation originating from video display units (VDUs) made clear that this type of information theft can be committed very easily [1]. It is not only this type of equipment which is vulnerable to interception at a distance; experiments on eavesdropping RS-232 cable signals prove that it is possible in some cases to intercept data signals running along an RS-232 cable, by picking up and decoding the electromagnetic radiation produced by the cable. This report gives the results of these Electromagnetic radiation arising from RS-232 cables may contain information which is related to the original RS-232 data signals. The seriousness of eavesdropping risks is shown by estimates of bit error rates feasible with a standard radio receiver as a function of the separation distance. In addition to this, results of experimental eavesdropping are presented. Keywords: RS-232 cable, Electromagnetic radiation, Eaves-dropping risks. Caution: Failure to detect intelligible emanations by the methods described in this paper do not mean an installation is secure against interception by sophisticated and resourceful opponents. ------------------------------------------------------------ David Honig Orbit Technology honig at otc.net Intaanetto Jigyoubu Lewinsky for President '2012 From aba at dcs.ex.ac.uk Mon Feb 9 10:58:22 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Tue, 10 Feb 1998 02:58:22 +0800 Subject: Argentina rules: no software copyright Message-ID: <199802091834.SAA00865@server.eternity.org> (from cpsr list, from edupage) : ARGENTINE SUPREME COURT RULES SOFTWARE PIRACY LEGAL : : Executives of Microsoft, IBM and Unisys are protesting a recent : Argentine Supreme Court decision ruling that antiquated copyright : laws don't cover computer software. Software makers point out that : royalties aren't paid on about 70% of the software sold in : Argentina, resulting in roughly $165 million in revenue losses : annually. A recent study by Price Waterhouse & Co. indicates the : biggest abusers are Argentine federal and local government agencies : and small private businesses. "There's no culture in Argentina of : assigning value to software," says a Unisys unit president. (Wall : Street Journal 6 Feb 98) I like best Mark Grant's comment on why copyright should be scrapped: it is a form of government subsidy. Adam From erehwon at dis.org Mon Feb 9 10:58:41 1998 From: erehwon at dis.org (William Knowles) Date: Tue, 10 Feb 1998 02:58:41 +0800 Subject: Computer design flaw opens airports to terrorism Message-ID: NEW YORK (Reuters) [2.9.98] - The computer security systems that control access to 40 airports worldwide through electronic badges have a design flaw that could make them vulnerable to terrorism, the New York Times reported Sunday. California computer security consulting firm, MSB Associates, found the flaw in December in a routine audit of a large California financial services software company, the identity of which was not disclosed, according to the newspaper. Government buildings, including that of the CIA, and prisons and industries with sensitive military, drug or financial information or material also use the system and are also vulnerable to attack, the Times report said. American and British aviation officials have notified airports of the flaw, the Times said. The system, introduced several years ago by a small company, Receptors, Inc., of Torrance, CA., relies on a secure, isolated computer in a guarded room to control door-locks and an inventory of electronic badges, the Times reported. The company found, however, that in some cases an individual could dial in to the computer and create security badges and unlock doors. Receptors' equipment was removed from the House of Representatives after the Inspector General found that 757 former employees appeared on the rolls of active employees and had working badges that would have allowed them access to the House buildings, the Times said. Receptors' chief operating officer Dale Williams said that the problem is not with the system but with the way it was installed in some cases. Some systems were connected to networks instead of being accessible only by a modem that would only be turned on when a Receptor employee performed maintenance, Williams told the Times. Testing the system, MSB found that the problem persisted as late as last week in the company they audited, the Times said. MSB created a fictitious employee, Millard Fillmore, which the company spotted on its rolls and removed. However, even after he was removed, the faux former president was still able to gain access to the company buildings, meaning any dismissed employee would have the same access, the Times said. == The information standard is more draconian than the gold standard, because the government has lost control of the marketplace. -- Walter Wriston == http://www.dis.org/erehwon/ From aba at dcs.ex.ac.uk Mon Feb 9 11:01:00 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Tue, 10 Feb 1998 03:01:00 +0800 Subject: what is video-collage.com? In-Reply-To: <199802082302.RAA18137@manifold.algebra.com> Message-ID: <199802091802.SAA00773@server.eternity.org> I have long noticed lots of video-collage in the distributed cpunks list headers. Now we see: > From: "Igor Chudov @ home" > To: cypherpunks at www.video-collage.com, freedom-knights at jetcafe.org, ie sent to cypherpunks at www.video-collage.com by ichudov@ the same. What does this mean Igor? Adam From aba at dcs.ex.ac.uk Mon Feb 9 11:13:40 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Tue, 10 Feb 1998 03:13:40 +0800 Subject: time to learn chinese? Message-ID: <199802091845.SAA00883@server.eternity.org> Listened to an analyst on the radio expressing view that towards 2010 China will be leading world economic power. Anyway interesting was that the analyst expressed that in her view China was keen to avoid the mistakes of the socialist welfare state as market liberalization and prosperity grew. She considered the burden of a welfare state to be a large burden which would mean that China would outstrip growth in the west. Also she stated that she thought democracy was in decline. When interviewed asked about human rights, she opined that these would improve as the market became freer. She stated that China hopes to bypass democracy going straight to free market. China may be interesting in a few more decades... Adam From Markus.Kuhn at cl.cam.ac.uk Mon Feb 9 11:21:29 1998 From: Markus.Kuhn at cl.cam.ac.uk (Markus Kuhn) Date: Tue, 10 Feb 1998 03:21:29 +0800 Subject: SOFT TEMPEST In-Reply-To: <34DDEB81.65726105@InfoWar.Com> Message-ID: "WebWarrior3 at InfoWar.Com" wrote on 1998-02-08 17:29 UTC: > So, when the software police pull up outside of my > place of business see that there are six instances of a program being > displayed with one license I can expect a warrant to be issued? That > would suck. The software that displays the license number plus activation instance random code in your windows toolbar as an easy receivable spread spectrum barcode would have to take care of this depending on how exactly your license agreement is formulated. This can be resolved in many ways. The technique of hunting software license violators via Tempest monitoring is not really targeted at providing 100% accurate and reliable identification of abuse at any point of time as you seem to imply. Nor is it alone an effective tool of proofing abuse. It is more an additional tool in getting an initial hint that a company is violating a software license at large scale (e.g., has bought a single copy of an expensive CAD software but uses it on over 80 workstations all day long), which then can justify to get court relevant proof by traditional means of police investigation. > Unfortunatley, I do not have the time to read through the entire > document at the URL provided, and can't save it either from the .pdf ... > the defensive measures sound interesting. One obvious countermeasure are Tempest shielded computers or rooms, but these are rather expensive, inconvenient and not always reliable. Another countermeasure are software reverse-engineering and modifying the broadcast code. This is around as difficult as removing dongle checking code: Not impossible, but for the majority of users too inconvenient. > Also, does this only work with CRTs or can it detect LCD too? Oh, yes, beautifully! Ross' TFT laptop radiates better than the CRT on my desk here. It is true that LCD displays do not have the <400 kHz signals caused by the deflection coils that are of concern for the TCO/MPR low-radiation standards. But they radiate as well in the >1 MHz range where the information carrying signals are broadcasted as harmonics of for instance the dot clock rate. LCDs are connected to high-speed drivers with sharp edges and lot's of nice harmonics. One more remark: This was so far unfunded research initiated by our private interest in the subject of compromising radiation. In this field, the available research literature is very close to zero (there are the van-Eck/Moeller/Smulder papers and that's it basically), and all the real knowledge is tightly guarded by the military and diplomatic community. We hope that developing commercial applications for compromising radiation will open the way to non-military funding and open research in this field. Copyright protections seems to be an interesting application. Tempest research requires some expensive equipment (special antennas, very high-speed DSP experimental systems, an absorber room, etc.). If Microsoft or someone else would like to make some Tempest funding available, I think this should be highly welcome if the results are going to be published in the open literature. There is no good reason, why knowledge about compromising emanations should be restricted to the military community in a time where industrial espionage with these techniques is probably a larger threat to economies than the results of foreign intelligence operations. The preprint of our first paper on this is now on my home page. Markus -- Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK email: mkuhn at acm.org, home page: From eureka at eureka.abc-web.com Tue Feb 10 03:24:16 1998 From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com) Date: Tue, 10 Feb 1998 03:24:16 -0800 (PST) Subject: Eureka! Tue Feb 10 '98 Message-ID: <19980210083153.1416.qmail@eureka.abc-web.com> Welcome to Tuesday's issue of Eureka! EROTIC PARADISE One of the largest pay sites on the web, Erotic Paradise, has now opened its doors to FREE memberships. That's right, you can now get an entire week of hot videos, 1,000s of pix, and much, much more - and it's complely FREE. Check it out! ------> http://www.mr-cash.com/cgi-bin/gold.cgi/raw_3266/999 My Sister NAKED! FREE PIX http://205.134.162.9/sister/ I took pictures of my sister naked! EATING AT THE "Y" Creative use of webdesign. Lots of free pix. These are not your ordinary women. These are hot looking babes! Saddle on up to the bar for some real food. Snack on a brunette, dine with a blonde. Maybe food does mix with sex? Surf by. Eating at the Y ... http://207.156.223.181/they/warning.html DEVIL'S DELIGHT This is a paysite. There are three free pix however. They load fast and are high resolution. One is of a woman taking on two large cocks. Next is a hot looking blonde. Pussy! Devil's Delight .............. http://www.devilsdelight.com/ PLANET EROTIC This is a paysite. But that is not a bad thing. There is something you have to see to believe. Click the guest button and proceed by clicking on the free pics text links. After about four pages of these links (located at the bottom) you will arrive at some thumbnails. On the second row of pix third one to the right, click that one. Mysterious labia! Planet Erotic .................. http://www.planeterotic.com PORNO MACHINE Pretty good website! Decent webdesign and use of graphics. They feature some free pix as well. Lots of pussy filled to the brim with cock. The pix are not huge but they load quick. Oh and there are free videos! This is a busy server. Porno Machine ................. http://www.pornomachine.com/ READ THIS!! WIN $25,000 and a Fantasy Date - Click Here Now! $25,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A HOORAY! THE ADULT SEARCH ENGINE Now you can search for the sex sites you are looking for and fast! This new search engine is setting the standard others will follow. It offers pop-up search and detailed listings! Hooray! -----------------> http://eureka.abc-web.com/hooray/ FREE STREAMING VIDEO Please note that most of these feeds require a Netscape bro- wser in order to successfully view them. Unfortunately Micr- osoft's browser does not have all the features of Netscape's yet. However, many of the feeds use the RealPlayer and will work in most browsers. If you do not have Netscape and want a free copy click here --> http://www.netscape.com/download/ Three dicks -------------------> http://207.168.184.26/trip/ CHAT WITH OTHER READERS Hey, if you haven't checked out the Eureka! Chat sites yet, you're missing out on some great stuff. Every day you'll find hundreds of other readers just like you looking to chat have fun and maybe a little 'cyber'. We know you'll love it! Adult/Sex Chat -----------------> http://137.39.63.229/chat/ General/Fun Chat -------> http://137.39.63.229/chat/funchat/ HOT LIVE PHONE SEX TO MAKE YOU CUM! LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912 LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779 FREE: Live 1-on-1 (international call only)--->011-678-77416 NEW! CENTERFOLD PIC OF THE DAY Exclusive! We proudly present unpublished Pictures of your favorite Centerfolds. Featured This Week: Dec 80-PMOY Terri Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri Kendall, Rebecca Ferratti, Lydia Schone and many more too! ---------------------------> http://www.gatefold.com/eureka/ AMATEUR SITE OF THE DAY Claire: Claire and her husband (Andy) are true exhibitionists who love to show off, especially together. Claire keeps an erotic diary that puts most magazines to shame. This is one hot couple, check them out and read about all their dirty adventures. ---------------------------> http://amateurindex.com/eureka/ EROTIC STORY SITE OF THE DAY StoriesAndPics.com: StoriesAndPics.com gives you the best of both worlds. Visit the site Yahoo calls "The Ultimate Erotic Stories Site" Over 50 categories of sex stories and XXX pics! ....................... http://www.storiesandpics.com/ DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/ ADULT STAR PIC OF THE DAY Woah, our Adult Star pics are getting hotter and hotter, so make sure you stop by and check out today's - definitely not to be missed! --------> http://www.xxxadultstars.com/eureka/ OTHER EUREKAS! GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/ DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm ESPA�OL ------> http://eureka.abc-web.com/eureka/espanol.htm FRAN�AIS ----> http://eureka.abc-web.com/eureka/francais.htm ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm TODAY'S FREE PIX Pic 1 --------------------------> http://137.39.63.229/?100 Pic 2 --------------------------> http://137.39.63.229/?101 Pic 3 --------------------------> http://137.39.63.229/?102 Pic 4 --------------------------> http://137.39.63.229/?103 Pic 5 --------------------------> http://137.39.63.229/?104 Pic 6 --------------------------> http://137.39.63.229/?105 Pic 7 --------------------------> http://137.39.63.229/?106 Pic 8 --------------------------> http://137.39.63.229/?107 Pic 9 --------------------------> http://137.39.63.229/?108 Pic 10 --------------------------> http://137.39.63.229/?109 ============================================================ TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US. ============================================================ From dlv at bwalk.dm.com Mon Feb 9 11:29:01 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Tue, 10 Feb 1998 03:29:01 +0800 Subject: Washington on the verge of being nuked? In-Reply-To: <3.0.5.32.19980209090323.007ba100@otc.net> Message-ID: <1XDNke1w165w@bwalk.dm.com> David Honig writes: > The water supply systems of LA are easy targets for causing civil > disruption, too. Don't know about LA, but New York City gets its water supplies from open reservoirs upstate - a terrorist's dream. > > Lewinsky for President '2012 Vote for Monica - get a free blow job. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From bmm at minder.net Mon Feb 9 11:41:11 1998 From: bmm at minder.net (BMM) Date: Tue, 10 Feb 1998 03:41:11 +0800 Subject: [test - ignore] Message-ID: ping From tcmay at got.net Mon Feb 9 11:49:52 1998 From: tcmay at got.net (Tim May) Date: Tue, 10 Feb 1998 03:49:52 +0800 Subject: time to learn chinese? In-Reply-To: <199802091845.SAA00883@server.eternity.org> Message-ID: At 10:45 AM -0800 2/9/98, Adam Back wrote: >Listened to an analyst on the radio expressing view that towards 2010 >China will be leading world economic power. Like the predictions in 1970 of Russian as the language to learn? Or the predictions in the 1980s that Japanese was the language to learn? China is indeed a large country, so any reasonable per capita output makes it, ranked as a "nation," very large indeed. So? I'm not much of a believer in nation-states as influencers of world trade. While it is true that, for example, India is a larger economic power than Denmark is, so? Oh, and on the specific prediction...I have my doubts about even the per capita numbers rising as fast as some think. It's still a Communist system, with periodic crackdowns on anyone or any entity who is perceived to be doing "too well." Sort of like all the moaning and gnashing that Microsoft did research and invested money and kept working along and didn't "let" Netscape become the "next desktop OS." Recall that Netscape was claiming the browser would become the OS, with applets running under the browser. Anyway, China does not as yet have even a single reasonably state of the art chip making plant in its entire country. Given the timescales and learning curves involved, it seems unlikely they'll be a high tech leader in little over 10 years. Maybe in terms of gross output of chop sticks, rice, fertilizer, etc. --Tim May Just Say No to "Big Brother Inside" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From attila at hun.org Mon Feb 9 12:20:45 1998 From: attila at hun.org (Attila T. Hun) Date: Tue, 10 Feb 1998 04:20:45 +0800 Subject: EPIC World Crypto Survey In-Reply-To: <1.5.4.32.19980209142939.00b36c60@pop.pipeline.com> Message-ID: <19980209.195159.attila@hun.org> -----BEGIN PGP SIGNED MESSAGE----- statistics dont lie, but liars use statistics. back to the same old square one --getting the couch tomatoes (they've gone soft) riled enough to understand the lies. fat chance, as long as they can be fat, dumb, and happy the sloths will still vote their wallets. >The New York Times, February 9, 1998, p. D10: >U.S. Losing Battle on Control of Data Encryption, Study Says [...] >That finding directly contradicts the Clinton Administration's assertions >in Congressional hearings that it has the support of most nations on this >issue. ... >William Reinsch, the Under Secretary for export administration in the >United States Commerce Department, denied that the study contradicted the >Administration's assertions. "All the Administration has ever said is that >there are more countries that go farther than we do," Mr. Reinsch said. >"The study confirms that." ^^^^^^^^^^^^^^^^^^^^ -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: latin1 Comment: No safety this side of the grave. Never was; never will be iQBVAwUBNN9fr7R8UA6T6u61AQHPtgH/cW5VUP54BrXk9t4KjP4LwuxjZ1jsp+0u ghMqpRSq6p88LKrdMIkaLxq4NYj5+anH0OLZY5bm86/YUmrEp5BFVA== =nf7E -----END PGP SIGNATURE----- From jinn at inetnebr.com Mon Feb 9 12:29:04 1998 From: jinn at inetnebr.com (D'jinnie) Date: Tue, 10 Feb 1998 04:29:04 +0800 Subject: Driver Licenses In-Reply-To: Message-ID: How exactly can they require for the DL to be magnetized if only a few states do that? My NE license is just a piece of photographed paper encased in plastic. The only thing that "protects" it from forgery is a "Don't Drink and drive" and "buckle up Nebraska" silvery warnings that can be seen under certain angles. I don't see them changing it anytime soon...thank gods for slow ppl ;) So...seems like there can and will be a lawsuit against such practices. --- Reality leaves a lot to the imagination. jinn at inetnebr.com From jinn at inetnebr.com Mon Feb 9 12:36:17 1998 From: jinn at inetnebr.com (D'jinnie) Date: Tue, 10 Feb 1998 04:36:17 +0800 Subject: fingerprinting Message-ID: Immigration & Naturalization Department has been fingerprinting ppl for years. Does anyone have any ideas what agencies that information is shared with and what they need it for anyway? And what's with that new thumbprint thing in banks? I haven't had occasion to refuse it yet but I wonder if they'd open an account without it... --- Reality leaves a lot to the imagination. jinn at inetnebr.com From Markus.Kuhn at cl.cam.ac.uk Mon Feb 9 13:26:56 1998 From: Markus.Kuhn at cl.cam.ac.uk (Markus Kuhn) Date: Tue, 10 Feb 1998 05:26:56 +0800 Subject: TEMPEST In-Reply-To: <199802091735.LAA21910@einstein.ssz.com> Message-ID: Jim Choate wrote on 1998-02-09 17:35 UTC: > This is the hardest since the actual modulation of the e-beam is done via a > screen grid (who said tube theory was out of date?) and that signal is quite > small and generaly has a cardoid emission pattern aligned axialy along the > central axis of the CRT tube. Things are somewhat more complicated and I am not convinced that the e-beam is the primary source of radiation. Your claim that the Tempest radiation is modulated by the screen grid does not agree with my practical experience: All signals I get are close to harmonics of the dot clock and not of the screen grid rate. In addition, the Tempest monitor cannot distinguish between an all-black and an all-white image, which it should in the case of a screen-grid caused modulation. If there is indeed a screen-grid modulation, then it is *much* weaker than any modulation that you get by software dithering. Monitors are pretty strange antennas: For instance, my monitor still radiates quite well (although noticeably weaker) if I switch its power supply off. Just the passive resonance of the chassis gives a clear signal in around a meter radius with a simple untuned dipole antenna. Switching off a monitor alone does not protect you from eavesdropping a VDU signal, especially if the signal is not just text but a pattern optimized for reception. After I unplug the VGA cable however, I can't pick up any signal with our Tempest receiver unless I bring the antenna almost in contact with the cable or connector. The closed PC chassis also appears to be no very big source of VDU emanations, certainly much below the levels that our receiver can detect. Markus -- Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK email: mkuhn at acm.org, home page: From brianbr at together.net Mon Feb 9 14:09:25 1998 From: brianbr at together.net (Brian B. Riley) Date: Tue, 10 Feb 1998 06:09:25 +0800 Subject: Driver Licenses Message-ID: <199802092153.QAA07449@mx01.together.net> On 2/9/98 12:25 PM, Tim May (tcmay at got.net) passed this wisdom: >Lucky is right that that "underage stings" are on the increase. >Underage persons, often in high school, beome self-righteour >warriors in the War On Demon Rum, and "narc out" their local >shopkeepers. As I write this there are advertisements up in the halls at the HS (obviously with school blessings) where I teach (a few miles east of Burlington, VT) specifically soliciting 17 year olds to work for a private company under contract to the state to 'test buy' tobacco products. I haven't heard about any takers yet nor anything backfiring. >Hey, it would serve these junior narcs right if, upon being carded >and being shown to be underage, a store owner made a citizen's >arrest. Perhaps putting the perp in the back freezer for a few >hours would send a message. I wonder, though, how long it would go on if some shopkeeper indeed did this? But, is it a crime to try to buy booze or tobacco underage, if you do not try to show fraudulent indentification? Brian B. Riley --> http://members.macconnect.com/~brianbr For PGP Keys "He's not dead -- He's electroencephalographically challenged." From aba at dcs.ex.ac.uk Mon Feb 9 14:51:22 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Tue, 10 Feb 1998 06:51:22 +0800 Subject: time to learn chinese? In-Reply-To: Message-ID: <199802092224.WAA00886@server.eternity.org> Tim May writes: > Oh, and on the specific prediction...I have my doubts about even the per > capita numbers rising as fast as some think. It's still a Communist system, > with periodic crackdowns on anyone or any entity who is perceived to be > doing "too well." The interesting aspect of her speculation was on the possibility of an economic and political process of change which would result in a transition directly from communism to a free market based political system, by-passing democracy and socialism. She viewed democracy and socialism as mistakes made by the west to be learned from and avoided. Communist regimes typically include a significant element of central planning which introduces economic inefficiencies, yes, and loss of freedom of choice, etc. Socialist democracies have much in common with communist regimes in this respect: elements of centralised control, restrictions of choices (the nanny state, huge welfare systems, 50%+ taxation) large government restrictions on free market operation. Both systems suck, but currently the lesser of two evils by a large margin is living in a socialist democracy because of the wider freedoms as compared to the lack of freedoms in Communist countries such as China, and because of it being worth putting up with the nanny state and 50%+ tax rates as compared to the economic instability and organised crime problems in Russia, and previous Russian provinces now split off back in to small countries. The interesting question is the how these two evolving political and economic systems will change over time. Her speculation was that a previously communist system evolving towards becoming a pure market system might move towards this goal more rapidly than a rampantly socialist democracy would move towards the same. She also considered the different cultural work ethic signficant: Chinese people on the whole work harder, and re-invest more of per capita income. > Anyway, China does not as yet have even a single reasonably state of > the art chip making plant in its entire country. Given the > timescales and learning curves involved, it seems unlikely they'll > be a high tech leader in little over 10 years. Singapore, Taiwan, and Japan produce sizeable quantities of electronic devices, consumer electronics items, cars, etc. In fact I understood them to out compete western manufacturing in many instances. They may not always be at the leading edge of R&D, but they do produce a lot, much of it quality equipment, and we (westerners) buy more consumer electronics, and cars produced by such countries now. Personally I would buy a Toyota over a Ford anyday :-) China might be viewed as larger version of Singapore a few decades ago perhaps. Enterprise zones (or same rules for the whole country) with 0% taxation, unrestrictive planning rules etc should help attract outside investment from high tech companies, if political stability was viewed as good enough. Probably you are right on the optimism of the time scales of the interviewed analyst. Adam From nobody at nowhere.com Mon Feb 9 15:10:34 1998 From: nobody at nowhere.com (nobody at nowhere.com) Date: Tue, 10 Feb 1998 07:10:34 +0800 Subject: 11 CENTS A CLICK - PINKCASH PAYS CA$H UPFRONT Message-ID: <199802092242.OAA05496@remote.gsd.com.au> Friends, I am Scott Phillips from www.pbits.com, My apologies for this short spam, I`m only sending it because as a fellow ADULT WEBMASTER I know you will be interested in the first click thru system to pay you IN ADVANCE, BEFORE YOU EVER SEND A HIT! Lets keep it short and sweet so HERE IS THE DEAL! Sign up here http://usa-6.gsd.com.au/moremoney And get paid 11c a unique click by ww.pbits.com WE OFFER THE FOLLOWING BENEFITS - Real time stats - Click counts that are 100% real - NEVER BEEN ACCUSED OF SHAVING HITS - Rated "good as gold" on Serge`s good bad ugly sponsor list http://pusi.com/~contest - FRESH banners that pull HARD - straight, gay, hardcore, teen, fetish sites, we have it ALL covered - On the net since May 96 never ripped off a webmaster - The checks are cut by the legendary Serge, who has never been late with a payment ever! - Auto-signup - I answer email personally - Software designed by BobX who wrote the clickthru for cybererotica.com http://usa-6.gsd.com.au/moremoney This is my personal guarantee to you, my fellow webmasters. Pinkcash *is* and will always be the highest paying clickthru on the net. No matter what others claim to pay, at the end of the day you make more money with us, its a FACT! If you earn more with other clickthru programs I will refund the difference. Statistics show that a .11 banner for pinkbits earns TWICE what an xpics banner at 14c does. This is because we DON'T shave hits or filter every AOL proxy to steal from you. http://usa-6.gsd.com.au/moremoney HOW DO WE PAY IN ADVANCE? After you have a trading history with us for a month or two we put you on the advance program. Currently 93% of our traffic is payed before the hits are sent. This is not an idle promise, we send checks everyday. Look at http://www.pbits.com/whosyerdaddy to see a few real checks for people you probably know. And by the way, we pay an extra cent per click when we pay you in advance, its our way of thanking you for being trustworthy honest webmasters just like us. http://usa-6.gsd.com.au/moremoney I live in Australia but I`m travelling around the USA at the moment catching up with webmaster friends and buying more traffic. If you have the ability to send bulk volume traffic contact me and I`ll visit you while I`m in the USA Nobody has ever left our clickthru ever. Nobody has ever had a complaint EVER. This is state of the fucking art software, we are cool people, we want your business, and we treat you right. AND WE PAY MORE! Sign up now http://usa-6.gsd.com.au/moremoney Thanks Scott Phillips --- TO REMOVE YOURSELF FROM THIS LIST CLICK BELOW --- http://207.33.10.200/maillist/remove.html From ravage at ssz.com Mon Feb 9 15:17:52 1998 From: ravage at ssz.com (Jim Choate) Date: Tue, 10 Feb 1998 07:17:52 +0800 Subject: TEMPEST (fwd) Message-ID: <199802092316.RAA24851@einstein.ssz.com> Forwarded message: > Subject: Re: TEMPEST > Date: Mon, 09 Feb 1998 21:07:22 +0000 > From: Markus Kuhn > Things are somewhat more complicated and I am not convinced that > the e-beam is the primary source of radiation. Only of the individual pixel modulations. Go back and re-read my post you missed a whole slew of implications. The vertical and horizontal positioning is via the yoke not the screen grid. Electrostatic steering of an e-beam is expensive and slow, you can't change the charge on the plates that fast. In regards the data for the individual scan lines, where else are you going to modulate that beam than a screen grid? This is a high-voltage low-current point. You can't drive the beam off the screen, the inside of the tube is coated in a carbon based chemical called 'aquadag' that will short the beam to ground and blow your flyback transformer in short order. Not to mention that the inertia of the e-beam will be a bit of a hassle to deal with as well. It won't move that fast. > Your claim that > the Tempest radiation is modulated by the screen grid does not agree with > my practical experience: All signals I get are close to harmonics of > the dot clock and not of the screen grid rate. The screen grid is where the dot clock goes to modulate the e-beam, or is your claim we're going to modulate the filament directly? If so I would suggest you re-take your electronics class and learn how to read a schematic a tad better. A short trip to either your local library or electronics repair business will pay off wonders. You're looking for a Sam's Photo-Facts on the particular monitor you are examining. There is also the fact that the dot clock itself is a low-voltage low-current device until it gets to the tube drive electronics where it switches the high voltage drivers to the tube. If your getting your signal off the harmonics you're doing it the hard way. Go back and re-read your texts on Fourier Transforms and then do a power-spectrum analysis on the signals to the tube; what you will find is that the primary frequencies get the majority of the signal (eg 1st harmonic of a square wave (ie a dot clock) only gets, at best, 1/3 of the energy of the primary). In any case, it's the high voltage emissions of the tube drive electronics that are detected, not the small 5V to 12V drive signals. The same is true for LCD, Plasma, and other flat panel displays. You detect the high-voltage emissions of the display drive electronics. Note that on active transistor displays (where you don't have the high voltage bias as in a LCD) you don't get these sorts of emission magnitudes and they are *much* harder to detect. In addition in the active transistor displays the display drive electronics should buffer the data and so, unlike a CRT, you don't have to send each individual pixel every time. You can actualy send only the changes and impliment those. Unless you're integrating the signals you receive your Tempest display will be gibberish. > In addition, the > Tempest monitor cannot distinguish between an all-black and an all-white > image, which it should in the case of a screen-grid caused modulation. What? This is malarky. If the screen is black the filament emissions are being blocked by the screen grid and the charge cloud gets shunted to ground via the aquadag coating. This means there is no current, and as a consequence no emitted rf field to monitor. And what keeps it from blowing the flyback in this case is that the charge cloud acts as a capacitor and limits the dv/dt to something that the flyback can deal with, it has to leak past the screen grid. You can also discern this using Tempest to monitor NTSC where the black pulse is a negative going pulse at the end of the scanline waveform. It's there so the receiver electronics can know when to turn the e-beam off so you don't get those annoying retrace lines across your screen when it moved back to the left and down one line. Since it's a negative going pulse with respect to the vertical and horizontal retrace it's dv/dt is going in the opposite direction. If you get a schematic find the horizontal retrace clock and disable it and monitor the display. > If there is indeed a screen-grid modulation, then it is *much* weaker > than any modulation that you get by software dithering. This is just plain silly. The switching of the software is drowned in a sea of such noise on the board. Anyone who claims they can pull a valid signal off a cpu pcb at more than a few feet is a liar or else they have some pretty remarkable extra-terrestrial technology. There are litteraly 10's of thousands of state transitions all over the pcb that are going on in parallel and the positive transition fields cancel the negative transition fields so what you end up with is a hash of noise. 30 seconds of looking at a spectrum analyzer will make this obvious. In modern computers what drives the crt is the data residing in the video frame buffer that drives the output electronics on the card and not the data on the cpu pcb. > Monitors are pretty strange antennas: For instance, my monitor still > radiates quite well (although noticeably weaker) if I switch its power > supply off. It can take as much as 20 minutes to drain a good high-voltage supply (read the documents of all power supplies that operate above a couple hundred volts, it should include the discharge time constant - you want to wait through at least 3 of those). There is also the issue that a crt tube sitting unconnected in the open dry air will develop enough of a charge to knock the shit out of you if you're silly enough to grab the grounding connection on the side with one hand and be grounded to earth with the other. So even if the machine is turned off you get a continous charge build up on the tube that gets drained through various resistors to ground. Unfortunately this is a pretty incoherent signal and low power as well. I routinely deal with voltages in the 1MV range and currents (usualy not at those voltages) in the 100A range (I build 12 ft. Tesla Coils for grins and giggles that throw discharges in the 8-12 ft. range). When you start talking about voltages above a few hundred there isn't any such thing as 'off', only a higher impedance path to ground and longer time constants. NOTE: if you do decide to play in your monitor then make shure that one of your hands is in your back pocket at *ALL* times. Otherwise make shure there is somebody there to call 911 so they can haul your body off. If you don't the discharge leakage current through your heart *when* you make a mistake will cause it to go into ventricular fibrillation (v-fib). Unless you got a de-fibrillator handy your dead in about 3 minutes. > Just the passive resonance of the chassis gives a clear > signal in around a meter radius with a simple untuned dipole antenna. If they get within a meter of my machine I seriously doubt they will be using VanEck but rather rubber hose or eye ball monitoring... We're talking real world here not some Tom Clancy novel. > Switching off a monitor alone does not protect you from eavesdropping > a VDU signal, especially if the signal is not just text but a pattern > optimized for reception. True, but instead of being within a couple hundred feet (the average succesful range for interception) you're now talking about 10's of feet. At that range my dogs barking will let me know that Mallet is in the house. > After I unplug the VGA cable however, I can't pick up any signal with > our Tempest receiver unless I bring the antenna almost in contact with > the cable or connector. Duh, can you say 'impedance'....go back and study your analog and rf electronics. A monitors off impedance per line is somewhere in the 50 to 75 ohms range. The impedance of a wire hanging in the air is much higher and as a consequence the current flow and as a result the emitted em field will be much lower. > The closed PC chassis also appears to be no very > big source of VDU emanations, certainly much below the levels that > our receiver can detect. And this surprises you? A pc chassis, provided you put all the screws in it and don't have lots of holes in it, is a Faraday Cage, it's the reason they make them out of expensive metal and not cheaper plastic. A very effective method to confuse Van Eck is to have several monitors sitting next to each other with different displays. A more active display is much more effective than one that is static (eg. such as a person typing in an email to cypherpunks). I strongly suggest the following reference: High-speed Digital Design: a handbook of black magic H.W. Johnson, M. Graham ISBN 0-13-395724-1 ~$60 US ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From nobody at REPLAY.COM Mon Feb 9 15:21:52 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 10 Feb 1998 07:21:52 +0800 Subject: E-CDA Message-ID: <199802092315.AAA02200@basement.replay.com> Congressional Record: February 5, 1998 (House) ELECTRONIC CAMPAIGN DISCLOSURE ACT (Mr. WHITE asked and was given permission to address the House for 1 minute.) Mr. WHITE. Madam Speaker, in March we are going to vote on campaign finance reform in this House. It is a very important issue but also a very difficult issue, and it is made particularly difficult because most of the bills before us are big bills that deal with the whole comprehensive issue that we have to talk about. I have got one of those bills, and I hope that we can pass one. But just in case we cannot, today I am introducing what we might call a small bill that will deal at least with some of the problems. This bill is called the Electronic Campaign Disclosure Act, and what it does is tell the Federal Elections Commission to get into the 21st century. It directs the FEC to establish a database on-line to search over the Internet for all the information needed about campaign finances in our country. Every campaign would have to file within 10 days a report of every contribution that it receives and contributors, and PACs would also have to file. Madam Speaker, sometimes we cannot do it all in one step. The longest journey begins with a single step, and I think if we cannot pass a big bill a small bill like the one I am introducing today would be a step in the right direction. ____________________ From landon at best.com Mon Feb 9 15:39:02 1998 From: landon at best.com (landon dyer) Date: Tue, 10 Feb 1998 07:39:02 +0800 Subject: Driver Licenses and agreeing to something In-Reply-To: Message-ID: <3.0.3.32.19980209153231.00aa4430@shell9.ba.best.com> At 02:20 PM 2/9/98 -0600, you wrote: > >How exactly can they require for the DL to be magnetized if only a few >states do that? My NE license is just a piece of photographed paper >encased in plastic. The only thing that "protects" it from forgery is a >"Don't Drink and drive" and "buckle up Nebraska" silvery warnings that can >be seen under certain angles. I don't see them changing it anytime >soon...thank gods for slow ppl ;) So...seems like there can and will be a >lawsuit against such practices. > >Reality leaves a lot to the imagination. this can work two ways... especially if the people you're trying to work are not paying attention a friend of mine recently had his state license renewed. i think they have the procedure for doing fingerprints down pretty much so they are inescapable if you want a new D/L, buuut... one of the things they make you sign at the bottom of the form is an agreement that starts out "I agree to...". my friend ran the form through a scanner, changed "agree" to "disagree" and printed out his own version of the form. he handed it in and naturally the pencil- pushers never gave it a second glance -landon From ravage at ssz.com Mon Feb 9 15:59:43 1998 From: ravage at ssz.com (Jim Choate) Date: Tue, 10 Feb 1998 07:59:43 +0800 Subject: SOFT TEMPEST (fwd) Message-ID: <199802092357.RAA25254@einstein.ssz.com> Forwarded message: > Subject: Re: SOFT TEMPEST > Date: Mon, 09 Feb 1998 16:44:52 +0000 > From: Markus Kuhn > The software that displays the license number plus activation instance > random code in your windows toolbar as an easy receivable spread > spectrum barcode would have to take care of this depending on how > exactly your license agreement is formulated. This can be resolved > in many ways. Has your technique been verified by any 3rd parties who are not affiliated with you or your firm? Do you expect to do any public demonstrations of this technology in the near future? Would it be possible to arrange for a indipendant 3rd party to receive a test setup for evaluation? > The technique of hunting software license violators via Tempest > monitoring is not really targeted at providing 100% accurate > and reliable identification of abuse at any point of time as That's good. The thought that given current technology a signal reception van could pull one monitors display out of a building that could potentialy have 1,000+ pc's (my last job had about 1500/floor and 3 floors) at a range of say 200 ft. is truly incomprehensible. If it works that is a feat worth many laurels. > (e.g., has bought a single copy of an expensive CAD software but > uses it on over 80 workstations all day long), which then can > justify to get court relevant proof by traditional means of > police investigation. You show up in my companies parking lot without my permission and start snooping you'll be the one sitting in jail facing industrial espionage charges. Any defence lawyer worth a damn would be able to blow this out of the water, private citizens don't have the right to invade my privacy any more than police without a warrant - and that take probable cause. > One obvious countermeasure are Tempest shielded computers or rooms, It's the monitors that need shielded, the computers already sit in a Faraday cage. Simple copper screen glued to the inside of the monitor case with a paper sheild and then grounded will resolve that problem. Be shure to put a grounded screen on the front of the tube as well (similar to those radiation shields that some companies make that don't work because they aren't grounded). > Another countermeasure are software reverse-engineering and modifying > the broadcast code. This is around as difficult as removing dongle > checking code: Not impossible, but for the majority of users too > inconvenient. A simple Gunn Diode oscillator driving a broad-band 100W rf amplifier will swamp any signal you could hope to catch. Cost, about $250 ea. With the new low-power transmitter rulings there wouldn't be much anyone could do about it either. > an interesting application. Tempest research requires some > expensive equipment (special antennas, very high-speed DSP > experimental systems, an absorber room, etc.). Gee, and to think that when I've done this sort of stuff I only used a Commodore 1702 composite monitor and some rf amplifiers and filters... Duh, silly me. Any claim that it can *only* be done with lots of money is almost always wrong. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From dlv at bwalk.dm.com Mon Feb 9 16:40:02 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Tue, 10 Feb 1998 08:40:02 +0800 Subject: Washington on the verge of being nuked? In-Reply-To: <3.0.5.32.19980209124816.0079ba20@otc.net> Message-ID: David Honig writes: > > > LA has a combination of closed pipes and open aqueducts, often > in remote areas. Simple disruption, not poisoning, would > be easier. The resivoirs don't hold enough for more > than a few days. One can "disrupt" the water supply by just making a credible assertion that it's been poisoned - but it won't kill nearly as many people as actual poison (or virus/bacteria). --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From bill.stewart at pobox.com Mon Feb 9 16:43:01 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Tue, 10 Feb 1998 08:43:01 +0800 Subject: the best justice money can buy --Lessig (fwd) In-Reply-To: <887036600.23860.193.133.230.33@unicorn.com> Message-ID: <3.0.5.32.19980209142240.0088b680@popd.ix.netcom.com> [Warning: while this may _look_ like just another rant, there is some technical content below.] At 07:03 AM 2/9/98 -0800, mark at unicorn.com wrote: >Jim Choate (ravage at ssz.com) wrote: >>So do I, and I bet both our incomes combined doesn't add up to 15 minutes of >>Bill G's and it won't. > >Of course not, because Bill has jackbooted copyright enforcers to subsidise >his corporation. Without them his income would be dramatically reduced. .... >Exactly. So tell us how Bill would have become a billionaire without >copyright? Gates got rich not by selling good software, but by selling software very well. Copyright is part of the process, but it's possible to sell your product to computer manufacturers with any customization they need using contracts instead of copyright to make your money. It's also possible to do copy protection in your software; games makers do this because they're widely pirated by non-point-source attacks (kids, mostly) who are hard to track down and sue, unlike major computer manufacturers who are easier to find, both to sue if needed or to provide support for. Copy protection was one of the things people hated about Lotus 123; I don't remember Excel or MS-DOS ever having it. When I've used expensive commercial software on Sun computers, it often needs to be registered with the machine serial number, or used with a floating license server, and refuses to run without it. PCs don't have built-in serial numbers, but they probably would if Gates had insisted on it early enough. Because of copyright law he didn't _have_ to use technical means of copy protection, so the Copyright Enforcers have saved him money - but they've also saved us the aggravation of dealing with copy protection wares. If you _want_ a serial number on each PC for your product, dongles are an available option. They reduce portability somewhat, but software like Banyan Vines networking uses them on its servers. So even the fact that IBM and Mr.Bill didn't install one doesn't stop you from using them - and as anti-crypto law goes away, uncrackable dongles are becoming easier to make (I don't know if anybody bothers, though.) Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From bill.stewart at pobox.com Mon Feb 9 16:43:07 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Tue, 10 Feb 1998 08:43:07 +0800 Subject: Laptop TEMPEST (fwd) In-Reply-To: <199802091430.IAA20623@einstein.ssz.com> Message-ID: <3.0.5.32.19980209163616.0088a200@popd.ix.netcom.com> At 08:30 AM 2/9/98 -0600, Jim Choate wrote: >> FCC RF/EMC testing is well nigh useless for TEMPEST protection. > >I disagree, it would give you a gross baseline on the total emissions >between monitors and laptops. That field strenght measurement would at least >allow you to calculate radiuses of equal strength to calculate approximately >how far the emissions are from each class of device for equal probabilities >of detection. One of the specific goals is to measure how effective the >device is at effecting other co-located devices (such as seeing ghost images >on other monitors or causing static in paging equipment). FCC specs aren't real tight. My old laptop*, which passed FCC specs (at least when it was new, before being hauled around on airplanes and trains, dropped a few times, having cooked parts replaced, and generally getting treated like a laptop), broadcast enough emissions that its video would show up on my parents' TV when used 2-4 meters away. The video sync wasn't right, so there were several hard-to-read images of the screen on the TV, but it was obviously emitting enough that a properly tuned receiver could read it. On the other hand, it doesn't bother my TV from 8-10 meters away, but I've got cable, while my parents use Real Rabbit-Ear Antennas and some kind of antenna-booster widget. I have heard that passive-matrix emits less, but I don't know if that's true from a TEMPEST standpoint or only noise output. It is a bit easier to put a laptop into an RF-shielded enclosure, but enclosures that worked fine for harmonics of 4.77 MHz machines don't necessarily block harmonics of 477 MHz machines :-) especially critical are the penetrations used to get air and fiber-optic connections through, which are basically waveguides - once the wavelength of the signal is short enough, they lose. ___ * AT&T Globalyst 250P, which is a NEC Versa Pentium-75 with a Death-Star painted on it. It has the expensive active-matrix 24-bit-color 640x480 screen (sigh - I'd rather have had the cheaper 800x600 8-bit-color :-). A couple years old, and the case was a bit dented so perhaps it had been more radio-tight when it was new. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From ravage at ssz.com Mon Feb 9 16:47:42 1998 From: ravage at ssz.com (Jim Choate) Date: Tue, 10 Feb 1998 08:47:42 +0800 Subject: Laptop TEMPEST (fwd) Message-ID: <199802100045.SAA25569@einstein.ssz.com> Forwarded message: > Date: Mon, 09 Feb 1998 16:36:16 -0800 > From: Bill Stewart > Subject: Re: Laptop TEMPEST (fwd) > At 08:30 AM 2/9/98 -0600, Jim Choate wrote: > >> FCC RF/EMC testing is well nigh useless for TEMPEST protection. > > > >I disagree, it would give you a gross baseline on the total emissions > FCC specs aren't real tight. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From bill.stewart at pobox.com Mon Feb 9 16:48:13 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Tue, 10 Feb 1998 08:48:13 +0800 Subject: Driver Licenses In-Reply-To: <199802082027.PAA00347@users.invweb.net> Message-ID: <3.0.5.32.19980209122020.00889e90@popd.ix.netcom.com> At 09:00 AM 2/9/98 +0100, Lucky Green wrote: >The clerk at my local 7/11 assured me the information captured would not >be forwarded to a central site. Yet. It appears the stores are installing >these systems to protect themselves against police sting "test buys", in >which the authorities take persons just days shy of their 21st birthday, >put theater makeup and/or a gray beard and wig on them and thus entrap >store clerks into selling controlled substances to minors. The original stings were done by young-looking cops, but a few judges (maybe just New York, maybe Federal? it's been a while) threw them out - if the cop is 24, then it wasn't selling to a minor, so it wasn't a crime or necessarily even a liquor license violation. So the cops need to hire kids (and for tobacco stings, minors.) This gets into the interesting legal question of whether you can insist that the decoys be prosecuted. >As any fool can predict, the information captured will not remain local >for long. After all, the system is ideal for monitoring gun^H^H^H alcohol >purchases of parolees, tracking down deadbeat dads, etc. Yup. It's really annoying to have to give the California DMV lots of personal information about myself so they can track down deadbeat dads, given that I'm not even a dad, much less a deadbeat dad, and so they can track down Mexicans who want to drive without citizenship papers, and similar presumptions of potential guilt. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From bill.stewart at pobox.com Mon Feb 9 16:49:07 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Tue, 10 Feb 1998 08:49:07 +0800 Subject: What's the latest in factoring? In-Reply-To: <199802072222_MC2-3262-79F5@compuserve.com> Message-ID: <3.0.5.32.19980209134003.0088b660@popd.ix.netcom.com> At 03:20 AM 2/9/98 -0500, Ken Williams wrote: >8192 bits is used now. you can generate 8192 bit keys with PGP 2.6.3ui >(the unofficial international version). ... >[note: you can of course generate MUCH larger keys, but i'm attempting to >be practical for a change] There are two countervailing arguments about very long keys; one is that if you understand cryptography well enough to evaluate the issue, you'll know you don't need to bother, but the other is that if you don't understand crypto very well, maybe you should be overly conservative. Remember that factoring difficulty is roughly exponential; adding logn bits about doubles the cracking workload (depending on which factoring method is being used). Factoring a 1024-bit number is _much_ harder than factoring a 512-bit number, and factoring a 2048-bit number is well into age-of-the-universe difficulty level. The practical level of factoring right now is about 512 bits, for either a distributed internet effort or an NSA internal one; in the unlikely event that Moore's law lets us double processing power 100 times in the next 150 years, that means a 1500-bit key could be crackable. So 2048 bits is certainly more than enough for _your_ lifetime. Increasing processing power 2**100 times is likely to be tough :-) After all, features in current microprocessors are on the order of 100 atoms wide. And by the time we've developed the level of nanotechnology needed to speed up processing that much, there'll be tiny audio bugs listening to you type your passphrase into your keyboard and reporting it back to the Central Intelligence Corporation, or picking up the electromagnetic fields from your direct neural interface, so the crypto strength won't matter much. But do you really _need_ to factor the prime number to crack PGP? No. Remember that PGP uses the RSA key to encrypt session keys for IDEA, or for signing MD5 hashes of documents, rather than using it directly. So you can decrypt the message by cracking IDEA, or forge a message by finding MD5 collisions. Cracking IDEA's 128-bit keys was estimated to be about as hard as factoring a 3100-bit number, though improvements to factoring technology may make a 4096-bit number as easy as IDEA. Also, PGP 2.x passphrases are encrypted with IDEA, so if they've got your secring.pgp and can crack 4096-bit keys, you're toast, even if your passphase isn't just your dog's name spelled backwards. Similarly, by the time processing power doubles 100 times making your 1500-bit key insecure, MD5 will be long toasted. Either way, there's no need to go beyond 4096-bit keys ever, with old-style PGP. Even if you're being overly conservative, that's more than enough. Newer versions of PGP dump RSA and IDEA for patent reasons, but they also offer alternatives to IDEA and MD5 which may be stronger. (SHA-1 is stronger than MD5, triple-DES requires immense amounts of storage to reduce it to a strength similar to IDEA, and just being extensible means you can replace algorithms that are obsolete.) The other side of practical is how much work it takes to use long keys, and how many people who want to talk to you use them. The answer to the latter is "Not many" for RSA keys over 2048. The former is about N**2 for decryption and N**3 for key generation, and about linear for encryption with short exponents, so it'll take you 64 times as long (once) to generate the key, and 16 times as long to decrypt or sign anything, compared to the far-more-than-strong-enough 2048-bit key, which is already 4 times as hard to use and 8 times as hard to generate as a 1024. It's not worth the bother, unless you know have a really, really special application that needs to remain secret until long after you've overthrown the government. On the other hand, at least the RSA patent will have expired by then :-) The Diffie-Hellman implementations in PGP 5.x will let you use key lengths up to 4096, but the speed behaviour is a bit different. In particular, key generation is much faster, so generating overkill-length keys isn't as boring. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From ravage at ssz.com Mon Feb 9 16:51:01 1998 From: ravage at ssz.com (Jim Choate) Date: Tue, 10 Feb 1998 08:51:01 +0800 Subject: the best justice money can buy --Lessig (fwd) Message-ID: <199802100054.SAA25744@einstein.ssz.com> Forwarded message: > Date: Mon, 09 Feb 1998 14:22:40 -0800 > From: Bill Stewart > Subject: Re: the best justice money can buy --Lessig (fwd) > Gates got rich not by selling good software, but by selling software > very well. His original money was made by being the first company to sell a CP/M compliant BASIC. It was very heavily pirated and Microsoft became a de facto standard for S-100 using CP/M. Then because of Digital Research's failure to treat IBM with respect he was selected as the supplier for their basic OS. This decision was made because of his reputation with CP/M software. Because of this connection Microsoft was in a position such that Gates couldn't help but make money as long as IBM was selling pc's. And considering nobody ever lost their job buying IBM it was a shoe in that IBM was going to sell machines. His first versions of Windows didn't sell. He looked at what was selling which was a GUI with more features and better looks. He hired the right people to impliment those changes and wallah he had a winner. All those pc's running his old os no longer had to go to Desqview and DR to get a GUI that was acceptable to their users. From their they have used various marketing and licensing tricks to increase his market share. > Copyright is part of the process, but it's possible to > sell your product to computer manufacturers with any customization > they need using contracts instead of copyright to make your money. But a company doesn't make money from selling software to computer manufacturers, they make money by having their software on pc's that the users use. > It's also possible to do copy protection in your software; > games makers do this because they're widely pirated by non-point-source > attacks (kids, mostly) who are hard to track down and sue, > unlike major computer manufacturers who are easier to find, > both to sue if needed or to provide support for. > Copy protection was one of the things people hated about Lotus 123; > I don't remember Excel or MS-DOS ever having it. And in the long run non-copyrighted software has a significant market advantage. It's smaller, it is more stable, and people don't get as pissed off when they want to make their backups. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ravage at ssz.com Mon Feb 9 17:04:00 1998 From: ravage at ssz.com (Jim Choate) Date: Tue, 10 Feb 1998 09:04:00 +0800 Subject: What's the latest in factoring? (fwd) Message-ID: <199802100105.TAA25850@einstein.ssz.com> Forwarded message: > Date: Mon, 09 Feb 1998 13:40:03 -0800 > From: Bill Stewart > Subject: Re: What's the latest in factoring? > Remember that factoring difficulty is roughly exponential; > adding logn bits about doubles the cracking workload > (depending on which factoring method is being used). > Factoring a 1024-bit number is _much_ harder than factoring a 512-bit > number, and factoring a 2048-bit number is well into age-of-the-universe > difficulty level. The practical level of factoring right now > is about 512 bits, for either a distributed internet effort or > an NSA internal one; in the unlikely event that Moore's law lets > us double processing power 100 times in the next 150 years, > that means a 1500-bit key could be crackable. So 2048 bits > is certainly more than enough for _your_ lifetime. That depends on what current and near-future medical technology can do to extend the lifespan of humans. If your assumption is that most folks younger than about 50 will be dead in 75 years I suspect that you're in for a nasty surprise. The reason I posted those cc:'s regarding such research is enough that current estimates of key strength based on human life times need to be re-evaluated. It is my suspicion that within 10-15 years it will be possible, as a matter of course in regards employer medical insurance, to have ones biological clock reset such that the lifespan will be extended 3-4 times with the main limiting factor being cancers. Under those conditions key strength lifetime computations need to be re-evaluated. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From shamrock at cypherpunks.to Mon Feb 9 17:09:46 1998 From: shamrock at cypherpunks.to (Lucky Green) Date: Tue, 10 Feb 1998 09:09:46 +0800 Subject: Driver Licenses In-Reply-To: Message-ID: On Mon, 9 Feb 1998, Tim May wrote: > If a U.S. Passport is not considered enough I.D., because it doesn't have > the Big Brother Inside magstripe, one walks away from the transaction. Just as a data point, in the State of Oregon, an US passport is *not* valid ID for alcohol purchases. Magstripe or no magstripe. -- Lucky Green PGP v5 encrypted email preferred. "Tonga? Where the hell is Tonga? They have Cypherpunks there?" From ravage at ssz.com Mon Feb 9 17:18:50 1998 From: ravage at ssz.com (Jim Choate) Date: Tue, 10 Feb 1998 09:18:50 +0800 Subject: Driver Licenses (fwd) Message-ID: <199802100120.TAA25990@einstein.ssz.com> Forwarded message: > Date: Tue, 10 Feb 1998 02:12:05 +0100 (CET) > From: Lucky Green > Subject: Re: Driver Licenses > On Mon, 9 Feb 1998, Tim May wrote: > > If a U.S. Passport is not considered enough I.D., because it doesn't have > > the Big Brother Inside magstripe, one walks away from the transaction. > > Just as a data point, in the State of Oregon, an US passport is *not* > valid ID for alcohol purchases. Magstripe or no magstripe. You can add Texas to that list. You can use a passport to get a Tx DL or ID card but it in and of itself is worthless for personal ID in most cases. Most places here specificaly require a valid drivers license from some state, they don't seem too interested in if Big Brother certifies your identity. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From Markus.Kuhn at cl.cam.ac.uk Mon Feb 9 17:52:39 1998 From: Markus.Kuhn at cl.cam.ac.uk (Markus Kuhn) Date: Tue, 10 Feb 1998 09:52:39 +0800 Subject: TEMPEST In-Reply-To: <199802092316.RAA24851@einstein.ssz.com> Message-ID: Jim Choate wrote on 1998-02-09 23:16 UTC: > The screen grid is where the dot clock goes to modulate the e-beam, or is > your claim we're going to modulate the filament directly? Ok, now I understand what you where talking about. Sorry, this was just a very silly language misunderstanding (my knowledge of CRTs is based on German vocabulary, so I mixed up "screen grid" and "mask" and was surprised to read that you seemed to claim that the per-pixel on-off modulation that van Eck described for his old-style terminals in fig 8c of his C&S paper is still there in the form of current interruptions caused by mask holes ... I hope you can understand my surprise ... ;-). Forget everything I wrote about "screen grid modulation" in my last reply, I fully agreed with you here. > If your getting your signal off the harmonics you're doing it the hard way. > Go back and re-read your texts on Fourier Transforms and then do a > power-spectrum analysis on the signals to the tube; what you will find is > that the primary frequencies get the majority of the signal (eg 1st harmonic > of a square wave (ie a dot clock) only gets, at best, 1/3 of the energy of > the primary). But this is not necessarily, where the the monitor resonates nicely. Van Eck has reported very similar results in his paper: His VDU had a dot clock of 11 MHz and he got nice resonance peaks near 125 and 210 MHz. > A very effective method to confuse Van Eck is to have several monitors > sitting next to each other with different displays. A more active display > is much more effective than one that is static (eg. such as a person typing > in an email to cypherpunks). If you have only a van Eck style receiver, yes. But as soon as you record the reception over some time and observe the images phases to drift only slightly against each other, you might be able to separate them using similar processing techniques as used in computer tomography. Markus -- Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK email: mkuhn at acm.org, home page: From nobody at REPLAY.COM Mon Feb 9 17:57:52 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 10 Feb 1998 09:57:52 +0800 Subject: Driver Licenses In-Reply-To: <199802082027.PAA00347@users.invweb.net> Message-ID: <199802100152.CAA03245@basement.replay.com> > Yup. It's really annoying to have to give the California DMV lots of > personal information about myself so they can track down deadbeat dads, > given that I'm not even a dad, much less a deadbeat dad, and so they > can track down Mexicans who want to drive without citizenship papers, > and similar presumptions of potential guilt. Actually, thanks to NAFTA, the Mexicans can drive without citizenship papers, and they don't have to give the California DMV shit. All they need is a valid mexican driver license and they can drive in the US. From shamrock at cypherpunks.to Mon Feb 9 18:01:07 1998 From: shamrock at cypherpunks.to (Lucky Green) Date: Tue, 10 Feb 1998 10:01:07 +0800 Subject: SOFT TEMPEST (fwd) In-Reply-To: <199802092357.RAA25254@einstein.ssz.com> Message-ID: On Mon, 9 Feb 1998, Jim Choate wrote: > That's good. The thought that given current technology a signal reception > van could pull one monitors display out of a building that could potentialy > have 1,000+ pc's (my last job had about 1500/floor and 3 floors) at a range > of say 200 ft. is truly incomprehensible. If it works that is a feat worth > many laurels. I don't know about displaying the screens of several thousands of PC's at a site, but you can easily select any given screen of several dozens of PC's. Using $100 worth in equipment plus a [>>$100] quality frequency generator. At HIP'97, I watched a van Eck demonstration given by a German professor. Using cheap analog equipment and one of the better HP frequency generators, he pulled screen images from the power line, the networking cable, and out of thin air. Since the oscillators in the devices to be monitored all have slightly different frequencies, you can actually tune the monitoring equipment to a specific PC. Even if there are numerous PC on the same floor of the building. I am told screen images can be captured up to 600 meters along the power line. Now all this was done without the use of a DSP. I can only imagine what one could capture after adding a DSP to the setup. -- Lucky Green PGP v5 encrypted email preferred. "Tonga? Where the hell is Tonga? They have Cypherpunks there?" From honig at otc.net Mon Feb 9 18:02:42 1998 From: honig at otc.net (David Honig) Date: Tue, 10 Feb 1998 10:02:42 +0800 Subject: Washington on the verge of being nuked? In-Reply-To: <3.0.5.32.19980209124816.0079ba20@otc.net> Message-ID: <3.0.5.32.19980209174919.007b18a0@otc.net> At 06:34 PM 2/9/98 EST, Dr.Dimitri Vulis KOTM wrote: >One can "disrupt" the water supply by just making a credible assertion that >it's been poisoned - but it won't kill nearly as many people as actual >poison (or virus/bacteria). > Psychops? That doesn't work when you have sufficient health-orgs and telecomm to get the word out that the water's ok. Actually, a lot of people drink bottled water here :-) but the 10 million kilos of shit excreted by LA every day would build up pretty fast. Electric power is probably as vunerable as waterways, despite conscious efforts to make the grid redundant. Of course both are controlled by computers, as uncle sam is realizing. In LA, all it takes to create a looting riot is to cut electricity to the city's alarm systems... .... Major freeway intersections are closed down 2-3 times a year in LA due to bomb threats, which are usually just threats -no bombs are found. You can snarl the roads very easily at the right time of day, since the roads' bandwidth is already exceeded and congestion persists after the clog is removed. At *least* once a month a major piece of freeway is shut down for an hour or so for "police activity", one hears on traffic reports, often around rush hour. Crypto relevance: traffic signals can be controlled by modem, a Civ-E friend tells me. They are built to be fail-safe (blinking red), but ever seen rush hour commuters deal with all blinking red? Even tanks can't get through a gridlocked city (a factor in Korean invasion planning). ------------------------------------------------------------ David Honig Orbit Technology honig at otc.net Intaanetto Jigyoubu Lewinsky for President '2012 From wendigo at ne-wendigo.jabberwock.org Mon Feb 9 18:06:00 1998 From: wendigo at ne-wendigo.jabberwock.org (Mark Rogaski) Date: Tue, 10 Feb 1998 10:06:00 +0800 Subject: Driver Licenses In-Reply-To: Message-ID: <199802100200.VAA03490@deathstar.jabberwock.org> -----BEGIN PGP SIGNED MESSAGE----- An entity claiming to be D'jinnie wrote: : : How exactly can they require for the DL to be magnetized if only a few : states do that? My NE license is just a piece of photographed paper : encased in plastic. The only thing that "protects" it from forgery is a : "Don't Drink and drive" and "buckle up Nebraska" silvery warnings that can : be seen under certain angles. I don't see them changing it anytime : soon...thank gods for slow ppl ;) So...seems like there can and will be a : lawsuit against such practices. : Nice to see D'Jinn jumping in ... Here in the Peoples Republik ov NJ, the DL's have no magstrips. But, being that it is NJ, they're probably not far away. An interesting point is that, when I moved (intrastate), the MVS sent a decal with the new address to stick on the back. No re-issue necessary, which is good, since most bars/liquor stores will not accept licenses marked DUP. But, they will accept passports. Also interesting is that PA has recently (within the past 2-4 years) been issuing DL's with the driver's SSN. Mark - -- [] Mark Rogaski "That which does not kill me [] wendigo at pobox.com only makes me stranger." [] [] finger wendigo at deathstar.jabberwock.org for PGP key [] anti spambot: postmaster at localhost abuse at localhost uce at ftc.gov -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQEVAwUBNN+01XzbrFts6CmBAQFkyAf/ZVF3rpjdjTLYQNJ9K6PO/B3HRovlKgba FgmBkTcJKCH4yJPK0KC+RJzQ26B2S4SwKXvWYN46cQypTb6KgRiqpxRXBF7qo8Nt yFebMXv4q/wHCh9Vg8uNeEOSAqq18meZcFy6ZwoeaSMZ3W2aIgCiWoF2fF+zFLu0 EDMxKLEgJtLBWS1HPHeU7XRQX5swu/Ud6rF5pN7m8qCZNPvjuUOL+5yCQGjYEKZp gqJt7gtl1UgmvVkbX+dkbAG07/m3ACWbxspn1u1/NFwBFpJwM95D/Md/FYAa3rpc XZy7LtZKqSrk6CwHPDWNpz/fPEnsmJG13DROMeD4340mjO0ZnS5/5g== =xMsm -----END PGP SIGNATURE----- From rah at shipwright.com Mon Feb 9 18:06:02 1998 From: rah at shipwright.com (Robert Hettinga) Date: Tue, 10 Feb 1998 10:06:02 +0800 Subject: Financial Cryptography 1998 Workshop UPDATE Message-ID: --- begin forwarded text Resent-Date: Mon, 9 Feb 1998 14:37:24 -0400 X-Authentication-Warning: online.offshore.com.ai: list set sender to fc98-request at offshore.com.ai using -f Subject: Financial Cryptography 1998 Workshop UPDATE To: fc98 at offshore.com.ai Date: Mon, 09 Feb 1998 10:20:13 -0800 From: Ian Goldberg Resent-From: fc98 at offshore.com.ai X-Mailing-List: archive/latest X-Loop: fc98 at offshore.com.ai Precedence: list Resent-Sender: fc98-request at offshore.com.ai CALL FOR PARTICIPANTS - UPDATE The Financial Cryptography 1998 (FC98) Workshop for Senior Managers and IS Professionals March 2-6, 1998 The InterIsland Hotel Anguilla, BWI FC98 is sponsored by: * RSA Data Security Inc. * C2NET, Inc. * Hansa Bank & Trust Company Limited, Anguilla * Sicherheit und Privat- International Bank * Offshore Information Services * e$ FC98 Conference and Exhibition February 23-27, 1998 FC98 Workshop for Senior Managers and IS Professionals March 2-6, 1998 The Inter-Island Hotel Anguilla, BWI Workshop and Conference Reservations: Last year, the Financial Cryptography '97 (FC97) Workshop was the world's first intensive financial cryptography workshop for senior managers and IS professionals. This year, the Financial Cryptography '98 (FC98) Workshop will be held Monday through Friday, March 2-6, 1998, at the Inter-Island Hotel on the Carribbean island of Anguilla. This workshop will follow the peer-reviewed financial cryptography conference and commercial exhibition, Financial Cryptography 1998 (FC98), which will be held the preceding week, February 23-27, 1998. The goals of the combined workshop, conference and exhibition are: * to give senior managers and IS professionals a solid understanding of the fundamentals of strong cryptgraphy as applied to financial operations on public networks, * to provide a peer-reviewed forum for important research in financial cryptography and the effects it will have on society, and, * to showcase the newest products in financial cryptography. The Workshop Ian Goldberg, the Workshop chair, has picked an outstanding team of instructors in financial cryptography and internet financial system security to teach the courses in this workshop. The Workshop will consist of 40 hours of intensive instruction and lab time over 5 days. Students will have access to Internet-connected workstations. Who Should Attend The Workshop is intended for senior IS managers and technical professionals who want to get completely up to speed on the design, development, and implementation of financial cryptography systems, the core technology of internet commerce. After the workshop, senior managers will have a hands-on understanding the strengths and liabilities of currently available financial cryptography and internet transaction security software and hardware, and thus be able to make better asset allocation decisions in this area of explosive technology growth. Senior technical professionals with strong IS experience will be able to implement those technologies and to pass on what they've learned to their clients and colleagues when they return home. The Workshop will be held in a casual but intensive atmosphere at the very cutting edge of financial technology on the internet. Someone has likened the experience to a financial cryptography bootcamp. At the end, Workshop attendees should be utterly conversant in cryptography as it applies to finance. Workshop participants will not only know what everyone else is doing now in internet commerce, but, more important, because they understand the implications of strong financial cryptography on ubiquitous public networks, they will be able to know what to do *next*. The Workshop Leader Ian Goldberg is a Ph.D. student in security and cryptography at the University of California, Berkeley. He was the first winner of RSA Data Security Inc.'s Secret-Key Challenge, breaking a 40-bit cipher in just 3.5 hours. In late 1995, he discovered what became a much-publicized flaw in Netscape's implementation of SSL. He is a recognized expert in electronic payment systems, and in DigiCash's ecash digital bearer certificate protocol in particular. He has produced several ecash clients for Unix and Windows, as well as an ecash module for the Stronghold web server, which has extended the existing ecash system for better security, privacy, and ease-of-use. The Principal Instructors Gary Howland has spent the last four years with several companies that are primarily working with secure electronic commerce (including Digicash), where he has been involved with the design and development of secure payment protocols, and the application of these protocols to such tasks as electronic cash, bond trading, loyalty systems, and online gambling. He is also responsible for the development of the a freely available cryptographic library for java and perl. John Kelsey is an experienced cryptographer, cryptanalyst, and programmer who has designed several algorithms and protocols. He pioneered research on secure random number generators, differential related-key cryptanalysis on block ciphers, and the chosen-protocol attack against cryptographic protocols. His research has been presented at several international conferences, and he has broken many proposed commercial cryptographic algorithm, protocol, and system designs. Kelsey has a degree in Computer Science and Economics from the University of Missouri Columbia. Adam Shostack is Director of Technology for Netect, Inc, a Boston based startup building state of the art server security management applications. He has extensive background in designing, implementing and testing secure systems for clients in the medical, computer, and financial industries. His recent public work includes 'Apparent Weaknesses in the Security Dynamics Client Server Protocol,' 'Source Code Review Guidelines,' and comparisons of freely available cryptographic libraries. Workshop Topics * Security on the Internet o Internet Protocols: IP, TCP, UDP o Higher-level Protocols: Telnet, FTP, HTTP, SSL o Solid Foundations for Cryptographic Systems o A History of Internet Attacks o Building Internet Firewalls o Building a Bastion Host o Turning your Bastion Host into a Web Server o Non-internet Internet Security * Cryptography o The Need for Cryptography o History of Cryptography o Classical Methods o Modern Methods o Private and Public Key Cryptography o Authentication vs. Security o Certification and Public Key Infrastructures o Cryptographic Protocols o Engineering a Cryptographically Secure System o Why Cryptography is Harder than it Looks o Security Through Obscurity and How to Recognize Snake Oil * Internet Payment Systems o Payment models: coin-based, cheque-based, account-based o Security Issues o Privacy and Anonymity Issues o Smartcards vs. Software o Existing Payment Schemes + credit cards + First Virtual + CyberCash + DigiCash o Forthcoming Payment Schemes + SET + Mondex + Millicent + micropayments * Setting Up an ecash-Enabled Web Server o Setting up the Web Server o Signing up for ecash o Installing the ecash Module o Setting Prices o Logging o Advanced Methods + ecashiers + moneychangers The price of the workshop is $5,000 U.S. You can pay for your FC98 workshop ticket with Visa or MasterCard, with ecash, or with any of a number of other internet commerce payment protocols, at the regstriation site: . Please register and make your plane and hotel reservations as soon as possible; workshop space is extremely limited. The workshop price includes meals (but not lodging) at the InterIsland Hotel and lab space, plus the delivery and installation of hardware, network access, internet commerce software, all to a location like Anguilla. And, of course, 40 hours of instruction and structured lab activity. We have priced the workshop to be competitive with other comprehensive business and professional technology workshops of similar total session length. In addition, the first ten FC98 workshop participants will receive a 50% reduction in their FC98 Conference and Exhibition fee, for a savings of $500 off the $1,000 conference admission. You can register, and pay for, your workshop ticket at . Air Transportation and Hotels Air travel to Anguilla is typically done through San Juan or St. Maarten/Martin. There are several non-stop flights a day from various US and European locations. Connection through to Anguilla can be made through American Eagle, or through LIAT, or in the case of St. Maarten, with a short ferry ride to Anguilla. See your travel agent for details. Anguilla's runway is 3600 feet, with a displaced threshold of 600 feet, and can accomodate business jets. Obviously, you should talk to your aviation staff for details about your own aircraft's capabilities in this regard. Anguilla import duties are not imposed on hardware or software which will leave the island again, so, as long as you take it with you when you leave, you won't pay import duties. Please Note: Your FC98 Workshop fee only covers meals at the InterIsland Hotel. The InterIsland is actually a small guesthouse attached to a large conference facility, and so rooms there are in short supply. Fortunately, there are lots of small hotels and guesthouses nearby. For more information on these hotels, please see for more information. Other hotels on Anguilla range from spartan to luxurious, all within easy walking or driving distance of the Workshop at the InterIsland. More information about Anguillan hotels can be obtained from your travel agent, or at . Registration and Information for Other FC98 Events To register and pay for your ticket to the FC98 conference itself, see: For information the selection of papers for the FC98 conference see: If you're interested in Exhibition space, please contact Blanc Weber: If you're interested in sponsoring FC98, also contact Blanc Weber: Financial Cryptography '98 is held in cooperation with the International Association for Cryptologic Research. The conference proceedings will be published by Springer Verlag in their Lecture Notes in Computer Science (LNCS) series. The FC98 Organizing Committee: * Vince Cate and Bob Hettinga, General Chairs * Ray Hirschfeld, Conference Chair * Matt Franklin, Conference Co-Chair * Ian Goldberg, Workshop Chair * Blanc Weber, Exhibit and Sponsorship Manager And our sponsors... * RSA Data Security Inc. * C2NET, Inc. * Hansa Bank & Trust Company Limited, Anguilla * Sicherheit und Privat- International Bank * Offshore Information Services * e$ --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ Ask me about FC98 in Anguilla!: From nobody at REPLAY.COM Mon Feb 9 18:18:37 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 10 Feb 1998 10:18:37 +0800 Subject: What Jim Choate doesn't know Message-ID: <199802100200.DAA04492@basement.replay.com> When Jim Choate writes about something that I know about, he is usually wrong. Look at the hash he made of quantum mechanics recently. And don't get me started on his blunders regarding cryptography. So when he writes about something I don't know about, like the EM emissions of video tubes, I tend to assume the same thing. He's probably all messed up. Anybody else have the same experience? And how about his countless off-topic posts, forwarding all kinds of pointless crap? Is anyone else sick of that, too? From anon at anon.efga.org Mon Feb 9 18:20:48 1998 From: anon at anon.efga.org (Anonymous) Date: Tue, 10 Feb 1998 10:20:48 +0800 Subject: The Wit and Wisdom of Tim May Message-ID: <0084d7fee26e9320dae1eb7da281a57b@anon.efga.org> From dm0 at avana.net Mon Feb 9 19:32:20 1998 From: dm0 at avana.net (David Miller) Date: Tue, 10 Feb 1998 11:32:20 +0800 Subject: Drivers Licenses Message-ID: <34DFC8FA.1CECCE12@avana.net> Anonymous (remailer at htp.org) wrote: > My question is, how much information can be stored on these strips? The data that's stored on most of the cards (credit cards, hotel keys, gym cards, etc.) are encoded with 5 bits per character. I believe that this is also known as Baudot encoding. You can store somewhere around 80 characters per track on "normal" cards, and most cards contain a 1/2" magnetic stripe that can hold 4, 1/8" tracks. So, I would estimate that your drivers license would hold a total of about 320 characters on all four tracks with standard encoding techniques. If you are interested in rendering only individual tracks unreadable, it can be done. I have done it by scratching off the magnetic material as you described. Of course, all tracks run horizontally across the card, with track 1 being the track closest to the edge of the card. So, if you wanted to destroy track 1, you could scrape off the 1/8" of the strip closest to the long edge of the license. Have fun. --David Miller middle rival devil rim lad From blancw at cnw.com Mon Feb 9 19:48:08 1998 From: blancw at cnw.com (Blanc) Date: Tue, 10 Feb 1998 11:48:08 +0800 Subject: What Jim Choate doesn't know In-Reply-To: <199802100200.DAA04492@basement.replay.com> Message-ID: <3.0.5.32.19980209193915.00879d60@cnw.com> Anonymous wrote: >Anybody else have the same experience? ...................................................................... You must understand: it's basically understood. .. Blanc From emc at wire.insync.net Mon Feb 9 20:12:27 1998 From: emc at wire.insync.net (Eric Cordian) Date: Tue, 10 Feb 1998 12:12:27 +0800 Subject: The Latest Horiuchi Antics Message-ID: <199802100403.WAA29574@wire.insync.net> Now that the Feds have gotten the Horuichi case moved out of state jurisdiction into a federal courtroom, they want their federal judge to dismiss all charges. ----- BOISE, Idaho (AP) The federal government on Monday sought the dismissal of a state involuntary manslaughter charge against the FBI sharpshooter who killed Randy Weaver's wife at Ruby Ridge six years ago. The Justice Department petition filed in federal court argued that Lon Horiuchi was protected by the Supremacy Clause of the U.S. Constitution so he cannot be subject to state prosecution for actions in the line of duty. "It is imperative that federal officials be protected from state prosecution in such circumstances because without the protection ensured by the Supremacy Clause, rigorous enforcement of federal law would be severely chilled to the detriment of the general public good,'' the petition said. Horiuchi was among dozens of federal agents who surrounded Weaver's remote mountain cabin in the Idaho Panhandle in August 1992 in an attempt to arrest Weaver on an illegal weapons charge. Weaver's 14-year-old son, Sam, and deputy U.S. Marshal William Degan of Quincy, Mass., were killed in the gunfight that touched off the 11-day siege. Vicki Weaver was fatally shot by Horiuchi on the second day. Both Randy Weaver and family associate Kevin Harris were acquitted in 1993 of federal murder and other charges in connection with the siege. Weaver was also acquitted of the weapons charge that had prompted federal agents to confront him. Last August, five years to the day after Mrs. Weaver's death, prosecutor Denise Woodbury filed the involuntary manslaughter charge against Horiuchi. The Justice Department had earlier declined to prosecute Horiuchi. The prosecutor also charged Harris with murder in Degan's death, but that charge was dismissed on a double-jeopardy ruling. On Jan. 7, U.S. District Judge Edward Lodge moved the case to federal court. Horiuchi pleaded innocent. His trial is scheduled for March 10. -- Eric Michael Cordian 0+ O:.T:.O:. Mathematical Munitions Division "Do What Thou Wilt Shall Be The Whole Of The Law" "America is like a corrupt hard drive. It's full of virii and huge inefficient programs written in Java and Visual Basic. Whan a hard drive gets to the point that it is as screwed up as America is, it's beyond repair. America needs to be formatted." From Markus.Kuhn at cl.cam.ac.uk Mon Feb 9 20:18:05 1998 From: Markus.Kuhn at cl.cam.ac.uk (Markus Kuhn) Date: Tue, 10 Feb 1998 12:18:05 +0800 Subject: attracting funding for tempest? (Re: SOFT TEMPEST) In-Reply-To: <199802092134.VAA00795@server.eternity.org> Message-ID: Adam Back wrote on 1998-02-09 21:34 UTC: > There should be a reasonably large supply of > commercial funding candidates even given the 90 : 10 ratio of business > interest in availability over confidentiality. Availability is usually based on authenticity, and authenticity is based on the confidentiality of keying variables, therefore at some level, everyone interested in computer security should be interested in research about the hardware aspects of confidentiality. > > Copyright protections seems to be an interesting application. > > Personally I view technology to assist copyright piracy a more > interesting research goal! Come on, copyright piracy is technically trivial today! Little software is sold with any copyright protection technology, and if, then it is usually easily broken as the full cleartext machine code is always available for reverse engineering. > I am not sure I want to see my computer narcing out over RF > frequencies what software is installed -- once enabled for corporates > there is the risk it will be used against individuals. This concerns only individuals who feel important enough to fear that any organization might want to spend hundreds of dollars per day to park a grey van full of state-of-the-art DSP and HF equipment in front of your home exclusively to observe what you do on your home machine. Quite unrealistic. Of course, in the future, when cellular base stations become freely programmable DSP software radios that can via the network be turned from GSM-BTSs into Tempest monitoring stations by a minor software update, then the paranoid's deep desire to be observed could actually be fulfilled by evil organizations on a very large scale. Stay tuned ... > This sounds > about as (un)desirable as CPUs capable of running encrypted > instruction streams, with per CPU keys loaded at manufacture enabling > software to be purchased for your CPU only (and hence disempowering > users who will thus be unable to even disassemble such code prior to > running), or smart cards as modernized next generation dongles. Well, I have been thinking about this one, too, and I am quite sure that we will see such mechanisms showing up in common desktop processors within the next few years. Then, copyright piracy will become an interesting technological challenge and research on attacks will become orders of magnitude more fascinating than now. See http://www.cl.cam.ac.uk/~mgk25/trustno1.pdf for details. I am not sure, whether high-security copy protection is a really bad idea: It could also mean that strict technical copyright enforcement like it is possible with cryptoprocessors will change the market situation favourably: Small startup companies suddenly become able to sell mass market software at prices in the range of <10 dollars per copy with only a cheap web server as their distribution infrastructure. When the success of software marketing is not any more dependent on the distribution infrastructure that big players like Microsoft enjoy today (retailers, bundling contracts, etc.), market success would much more depend on the quality of product and service than on the control over a distribution system infrastructure. If the copy protection offered by cryptoprocessors would allow small companies to compete successfully with high quality ultra-low price software against Microsoft, then the old shareware distribution concept might actually start to work. In addition, the same transistors used for bus encryption can also be used to keep your entire harddisk encrypted without performance loss and the encrypted software distribution protects you better against Trojans, so you'll get increased overall security as a free side effect. Markus -- Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK email: mkuhn at acm.org, home page: From WebWarrior3 at InfoWar.Com Mon Feb 9 20:23:46 1998 From: WebWarrior3 at InfoWar.Com (WebWarrior3 at InfoWar.Com) Date: Tue, 10 Feb 1998 12:23:46 +0800 Subject: Cyber 'Nannys" Message-ID: <34DF87FE.611AA4EF@InfoWar.Com> An anonymous person wrote, in reference to CyberSitter type 'blocking' software: "These companies are attempting to provide the services desired by their customers... They give concerned parents a sense of safety..." While I do not disagree that these companies should be able to market their products, I wholeheartedly disagree with the fact that often their customers (the adults who bought the software or subscribed to he 'service') are not allowed to have a list of what is actually blocked, and decide for themselves if they want their kids to have access to any of these sites. It would be beating a dead horse to describe, here, the potential value of some of the information that is blocked by these packages; one only has to take a look at any of the published news reports (or actually use one's sense of reason) to see that there are many web sites that contain some of the words that are automatically bloked by these 'services' that are absolutely not...smut , hate speech, or illegal/illicitly oriented. On another, perhaps more severe (to you, Anonymous poster,) angle, they DO NOT, NOR CAN THEY provide a genuine saftey zone for the children who are to be 'protected.' They are providing a false sense of security to parents who, for one reason or another, feel that they are not able to provide their children with direction on what to, and what not to, view on the internet as well as what to do if the instance arises that something that is deemed taboo happens to pop up on their monitor when they click on the 'Chutes and Ladders' web site . I am assuming that there is no latent support for the use of these packages in public libraries, so I won't go into that issue. In general, these programs are flat out crap. They purport to do something that is impossible to accomplish and they often refuse to even inform their customers what they actually ARE doing. Scott R. Brower http://www.infowar.com http://www.efflorida.org From aba at dcs.ex.ac.uk Mon Feb 9 20:24:01 1998 From: aba at dcs.ex.ac.uk (Adam Back) Date: Tue, 10 Feb 1998 12:24:01 +0800 Subject: attracting funding for tempest? (Re: SOFT TEMPEST) In-Reply-To: Message-ID: <199802092134.VAA00795@server.eternity.org> In an interesting discussion on software tempest measures, Markus Kuhn writes: > One more remark: This was so far unfunded research initiated by > our private interest in the subject of compromising radiation. In > this field, the available research literature is very close to zero > (there are the van-Eck/Moeller/Smulder papers and that's it basically), and > all the real knowledge is tightly guarded by the military and diplomatic > community. We hope that developing commercial applications for > compromising radiation will open the way to non-military funding > and open research in this field. People who are interested in communications and data security to the extent of arguing about the difference in security offered by 56 bit keys as compared to 128 bit keys ought to be worried about RF information leaks and tempest shielding. Perhaps similar justification can be used for the relevance of tempest research -- it is just the hardware half of assuring confidentiality of information. There should be a reasonably large supply of commercial funding candidates even given the 90 : 10 ratio of business interest in availability over confidentiality. > Copyright protections seems to be an interesting application. Personally I view technology to assist copyright piracy a more interesting research goal! Candidate technologies include high bandwidth eternity services, anonymous remailers with sufficient bandwidth, pipenets, DC-nets, free software movements, countries with modern intellectual ownership rules like Argentina*, and undermining the power of the state so that state provided copyright enforcement susidies disappear. (* See my previous post: reposted news report "ARGENTINE SUPREME COURT RULES SOFTWARE PIRACY LEGAL"). I am not sure I want to see my computer narcing out over RF frequencies what software is installed -- once enabled for corporates there is the risk it will be used against individuals. This sounds about as (un)desirable as CPUs capable of running encrypted instruction streams, with per CPU keys loaded at manufacture enabling software to be purchased for your CPU only (and hence disempowering users who will thus be unable to even disassemble such code prior to running), or smart cards as modernized next generation dongles. Adam From ATU5713 at compuserve.com Mon Feb 9 20:56:18 1998 From: ATU5713 at compuserve.com (Alan Tu) Date: Tue, 10 Feb 1998 12:56:18 +0800 Subject: Algorithms used in PGP 5.x; Relative strength of Blowfish Message-ID: <199802092337_MC2-32B1-60F5@compuserve.com> What are the algorithms used in PGP 5.x, symetric ones, that is? For anything besides 3DES and IDEA, what are their relative strengths to 3DES or IDEA? Could someone tell me what their key lengths are? Also, what's the relative strength of Blowfish to 3DES or IDEA? Its key length is variable, as I recall. Could someone tell me the range? --Alan From ATU5713 at compuserve.com Mon Feb 9 21:03:02 1998 From: ATU5713 at compuserve.com (Alan Tu) Date: Tue, 10 Feb 1998 13:03:02 +0800 Subject: What's the latest in factoring? Message-ID: <199802092337_MC2-32B1-60F6@compuserve.com> Dear Bill, Sorry, but you may see this message twice. Bill Stewart wrote: >>>>> There are two countervailing arguments about very long keys; one is that if you understand cryptography well enough to evaluate the issue, you'll know you don't need to bother, but the other is that if you don't understand crypto very well, maybe you should be overly conservative. <<<<< Well, personally, I guess by your def I'm in the second group, since I didn't know I don't need to bother. >>>>> Remember that factoring difficulty is roughly exponential; adding logn bits about doubles the cracking workload (depending on which factoring method is being used). Factoring a 1024-bit number is _much_ harder than factoring a 512-bit number, and factoring a 2048-bit number is well into age-of-the-universe difficulty level. The practical level of factoring right now is about 512 bits, for either a distributed internet effort or an NSA internal one; <<<<< I kind of knew this from a hypothesis, so PGP 5.x is being conservative, possibly overly so by your definition. I've seen a screen on a friend's computer and the default is something like 2048. By the way, we don't know about NSA. They may be able to factor any number, if they have an algorithm. >>>>> in the unlikely event that Moore's law lets us double processing power 100 times in the next 150 years, that means a 1500-bit key could be crackable. So 2048 bits is certainly more than enough for _your_ lifetime. Increasing processing power 2**100 times is likely to be tough :-) After all, features in current microprocessors are on the order of 100 atoms wide. And by the time we've developed the level of nanotechnology needed to speed up processing that much, there'll be tiny audio bugs listening to you type your passphrase into your keyboard and reporting it back to the Central Intelligence Corporation, or picking up the electromagnetic fields from your direct neural interface, so the crypto strength won't matter much. <<<<< I believe in Moore's law, since in 1992-1993 I read an analysis that Moore's law was true for the last 100 years. I think its still true today. Your last set of thoughts is chilling, isn't it? But consider this. People 10, 20, 30 years ago like us are saying that the government can eavesdrop on their communication in the future, just as you are saying now. Look now. I am very proud that I am part of the e-crypto revolution (my coined word). I am helping to slow down NSA. I hope that, by the time the tech you hypothesize about is here, we again will have technology to slow down NSA. >>>>> But do you really _need_ to factor the prime number to crack PGP? No. Remember that PGP uses the RSA key to encrypt session keys for IDEA, or for signing MD5 hashes of documents, rather than using it directly. So you can decrypt the message by cracking IDEA, or forge a message by finding MD5 collisions. Cracking IDEA's 128-bit keys was estimated to be about as hard as factoring a 3100-bit number, though improvements to factoring technology may make a 4096-bit number as easy as IDEA. Also, PGP 2.x passphrases are encrypted with IDEA, so if they've got your secring.pgp and can crack 4096-bit keys, you're toast, <<<<< I know this. The point is that most if not all people know that RSA is the weak link, not IDEA. Would you rather start to work on a 1024-bit RSA key or IDEA passphrase of an enemy? Obviously the RSA key. Barring any mathematical weakness in IDEA, I am not worried about IDEA. By the way, my three-year-old info says that IDEA was being mathematicly attacked in many quarters, civilian and non-civilian alike. If they was anything, I would have heard by now, but I still want to ask. Has any significant cryptanalysis attack against IDEA been "successful"? >>>>> even if your passphase isn't just your dog's name spelled backwards. Similarly, by the time processing power doubles 100 times making your 1500-bit key insecure, MD5 will be long toasted. Either way, there's no need to go beyond 4096-bit keys ever, with old-style PGP. Even if you're being overly conservative, that's more than enough. <<<<< You seem to be suggesting that MD5 will lead to the downfall of all of our keys. Let's think about your toasting of MD5. The worst thing that can happen to a one-way hash function is that it can go both ways. So its dead for signatures. So let's suppose now that I can take any document and produce another document with a higher or lower dollar figure in it and come up with the same hash. I can do this easily. But to somehow exploit MD5 to crack a passphrase it is impossible because you have nothing to start working with. You only have an encrypted key, encrypted with an 128-bit IDEA key. Look, for our lifetimes, I don't see much point in going beyond 4096 bits either, maybe even 3072. >>>>> Newer versions of PGP dump RSA and IDEA for patent reasons, but they also offer alternatives to IDEA and MD5 which may be stronger. (SHA-1 is stronger than MD5, triple-DES requires immense amounts of storage to reduce it to a strength similar to IDEA, and just being extensible means you can replace algorithms that are obsolete.) <<<<< Triple-DES is not stronger than IDEA, although it is secure for the most part. According to Phil Zimmerman, its effective key length is 112 bits to 128 bits for IDEA. Its also 3 times slower than DES, which is comparably slow anyway. Also, to settle this issue once and for all in my mind, the Win95 version of PGP, what symetric algorithms do you have to choose from? Does anyone have any comments on the relative strength of Blowfish? What about the mathematics of Blowfish? Has anyone tried to cryptanalyze it yet? Also, I apologize for going on like this, I'll post a separate question on that. >>>>> The other side of practical is how much work it takes to use long keys, and how many people who want to talk to you use them. The answer to the latter is "Not many" for RSA keys over 2048. The former is about N**2 for decryption and N**3 for key generation, and about linear for encryption with short exponents, so it'll take you 64 times as long (once) to generate the key, and 16 times as long to decrypt or sign anything, compared to the far-more-than-strong-enough 2048-bit key, which is already 4 times as hard to use and 8 times as hard to generate as a 1024. <<<<< As I said, I have a 2048-bit key in hibernation. I haven't posted it to a key server, but a friend who recently got PGP decided to use my public key ring, and use my 2048-bit key. There are only two places in which this key of mine is accessible. Anyway, I don't see the 4 time slowdown for using my secret key. (I have a 133 MHz). However, the effect is probably true for slower processors. I agree that we shouldn't bother with keys above 4096 bits because its not necessary and it takes too long to communicate with people who have slower processors. >>>>> It's not worth the bother, unless you know have a really, really special application that needs to remain secret until long after you've overthrown the government. On the other hand, at least the RSA patent will have expired by then :-) <<<<< I already addressed this point. >>>>> The Diffie-Hellman implementations in PGP 5.x will let you use key lengths up to 4096, but the speed behaviour is a bit different. In particular, key generation is much faster, so generating overkill-length keys isn't as boring. <<<<< First of all, Win95 (not my computer) seems slow to me, even if that person's processor is faster than mine. And I hear so much disk reading or writing, no wonder its slow. Boring? Win95 cannot make you bored. Go do something else, or play a MIDI file. You can multi-task. --Alan From die at die.com Mon Feb 9 21:11:52 1998 From: die at die.com (Dave Emery) Date: Tue, 10 Feb 1998 13:11:52 +0800 Subject: SOFT TEMPEST (fwd) In-Reply-To: <199802092357.RAA25254@einstein.ssz.com> Message-ID: <19980209235936.37986@die.com> On Tue, Feb 10, 1998 at 03:03:53AM +0100, Lucky Green wrote: > > Now all this was done without the use of a DSP. I can only imagine what > one could capture after adding a DSP to the setup. Miles... Given static screen images and thousands of repetitions in a few seconds the processing gain from integration of the signal verus the uncorrelated noise over thousands of cycles gets quite interesting. And add to that the tricks one can do with comb filters and combining together the correllated energy from several harmonics of the dot clock one can see that getting signal out from under the trash is easy even at considerable distances. It has, in fact, been speculated that the larger NSA geo and near geosync ELINT/COMINT satellites probably have the required capability to accomplish this from orbit (with football field sized antennas this isn't out of the question at all). Also the "frequency generator" you talk about needs not be some extremely expensive HP synthesizer (often of course available for a few dollars at the local ham radio flea markets in any case), but simply a good voltage controlled crystal oscillator on the right frequency. These are $5 parts... -- Dave Emery N1PRE, die at die.com DIE Consulting, Weston, Mass. PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2 5D 27 BD B0 24 88 C3 18 From anon at anon.efga.org Mon Feb 9 21:23:53 1998 From: anon at anon.efga.org (Anonymous) Date: Tue, 10 Feb 1998 13:23:53 +0800 Subject: 145 Million Message-ID: <07496f2732ef978d405246b0043c4035@anon.efga.org> Someone wrote: >>If someone with an 8th grade >>education can make a personal >>fortune of $145 million in network >>marketing with herbs, And someone else replied: >that's a shitload of weed! it would >be quite risky too trying to >move over 45,000 lbs of quality >weed. All I can say is that if you are paying $145 for 45K pounds, you are getting ripped off no matter if it is the kindest Norhtern Lights you ever smoked. That is $18,777.78+ a pound. From nobody at REPLAY.COM Mon Feb 9 21:54:08 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 10 Feb 1998 13:54:08 +0800 Subject: King Willie:-- He's between Iraq and a Hard-On Message-ID: <199802100536.GAA01716@basement.replay.com> Well... It looks as though the 17th will be a "good day to die" if your an Iraqi...Many sources seem to be targeting the window of Feb 17 - Feb 23 for the start of hostilities... Wag the dawg... comes to mind of course... I wouldn't put it past King Willie to do such a thing to deflect attention from Peckergate.. It seems to me though that the lunatic in charge of North Korea might just find that Feb 17- 23 is also a good time to play games in the south :( after all... the worlds policeman will be preoccupied and stretched mighty thin... From shamrock at cypherpunks.to Mon Feb 9 21:56:00 1998 From: shamrock at cypherpunks.to (Lucky Green) Date: Tue, 10 Feb 1998 13:56:00 +0800 Subject: SOFT TEMPEST (fwd) In-Reply-To: <19980209235936.37986@die.com> Message-ID: On Mon, 9 Feb 1998, Dave Emery wrote: > On Tue, Feb 10, 1998 at 03:03:53AM +0100, Lucky Green wrote: > > > > Now all this was done without the use of a DSP. I can only imagine what > > one could capture after adding a DSP to the setup. > > Miles... > > Given static screen images and thousands of repetitions in a few > seconds the processing gain from integration of the signal verus the > uncorrelated noise over thousands of cycles gets quite interesting. And > add to that the tricks one can do with comb filters and combining > together the correllated energy from several harmonics of the dot clock > one can see that getting signal out from under the trash is easy even at > considerable distances. That would be my analysis as well. Note that the van Eck demonstration I saw didn't even make use of the common analog tricks, such as using a super heterodyne receiver. Not to mention the near magical capabilities of a few Fourier transforms for pulling a nice, fat signal spike out of all that "white noise". There wasn't a single person watching said demonstration in that brutally hot tent at HIP'97 that didn't walk away impressed. And I can off the top of my head come up with a design that would improve the gain by at least 20dB over what was used there.. -- Lucky Green PGP v5 encrypted email preferred. "Tonga? Where the hell is Tonga? They have Cypherpunks there?" From frantz at netcom.com Mon Feb 9 22:32:17 1998 From: frantz at netcom.com (Bill Frantz) Date: Tue, 10 Feb 1998 14:32:17 +0800 Subject: How to TEMPEST for less Message-ID: >From my archives: ---------------------------------------- Preventing Electromagnetic Eavesdropping --------- NOTE: Even though the author of this document uses the term "TEMPEST" at various points, he certifies that his text consists of general concepts to reduce electromagnetic emissions, and was not based on any actual TEMPEST specifications or data. Further questions on this topic should be directed to the author, "grady at netcom.com". -- PRIVACY Forum Moderator --------- Abstract Eavesdropping on personal computers is not limited to looking over the shoulder of the operator or physically tapping in to an Ethernet cable. U.S. Government standards relating to the prevention of information capture via the emission of electromagnetic radiation from computers and peripherals are known as TEMPEST. However, actual TEMPEST specifications are classified. TEMPEST aside, there are inexpensive and easily applied means for individuals to minimize unintentional emissions from equipment. My document "Preventing Electromagnetic Eavesdropping," discusses these techniques. Grady Ward --------- Preventing Electromagnetic Eavesdropping A note discussing the prevention of electromagnetic eavesdropping of personal computers. Grady Ward public key verification by PK server, finger, or by request Version 1.0 22 March 93 TEMPEST is the code name for technology related to limiting unwanted electromagnetic emissions from data processing and related equipment. Its goal is to limit an opponent's capability to collect information about the internal data flow of computer equipment. Most information concerning TEMPEST specifications is classified by the United States Government and is not available for use by its citizens. The reason why TEMPEST technology is particularly important for computers and other data processing equipment is the kinds of signals components in a computer use to talk to each other ("square waves") and their clock speeds (measured in megahertz) produce a particularly rich set of unintentional signals in a wide portion of the electromagnetic spectrum. Because the spurious emissions occupy so wide a portion of that spectrum, technologies used to block one portion of the spectrum (as pulling the shades closed on a window to stop the visible light portion) are not necessarily effective in another portion. Unintentional emissions from a computer system can be captured and processed to reveal information about the target systems from simple levels of activity to even remotely copying keystrokes or capturing monitor information. It is speculated that poorly protected systems can be effectively monitored up to the order of one kilometer from the target equipment. This note will examine some practical aspects of reducing the susceptibility of your personal computer equipment to remote monitoring using easily-installed, widely available after-market components. I One way of looking at TEMPEST from the lay person's point-of-view is that it is virtually identical to the problem of preventing electromagnetic interference ("EMI") by your computer system to others' radios, televisions, or other consumer electronics. That is, preventing the emission of wide-band radio "hash" from your computers, cabling, and peripherals both prevents interference to you and your neighbors television set and limits the useful signal available to a person surreptitiously monitoring. Viewing the problem in this light, there are quite a few useful documents available form the government and elsewhere attacking this problem and providing a wealth of practical solutions and resources. Very useful for the lay person are: Radio Frequency Interference: How to Find It and Fix It. Ed Hare, KA1CV and Robert Schetgen, KU7G, editors The American Radio Relay League, Newington , CT ISBN 0-87259-375-4 (c) 1991, second printing 1992 Federal Communications Commission Interference Handbook (1991) FCC Consumers Assistance Branch Gettysburg, PA 17326 717-337-1212 and MIL-STD-188-124B in preparation (includes information on military shielding of tactical communications systems) Superintendent of Documents US Government Printing Office Washington, DC 20402 202-783-3238 Information on shielding a particular piece of consumer electronic equipment may be available from the: Electronic Industries Association (EIA) 2001 Pennsylvania Ave NW Washington, DC 20006 Preventing unintended electromagnetic emissions is a relative term. It is not feasible to reduce to zero all unintended emissions. My personal goal, for example, might be to reduce the amount and quality of spurious emission until the monitoring van a kilometer away would have to be in my front yard before it could effectively eavesdrop on my computer. Apartment dwellers with unknown neighbors only inches away (through a wall) might want to even more carefully adopt as many of the following suggestions as possible since signal available for detection decreases as approximately the inverse square of the distance from the monitoring equipment to your computer. II Start with computer equipment that meets modern standards for emission. In the United States, the "quietest" standard for computers and peripherals is known as the "class B" level. (Class A level is a less stringent standard for computers to be use in a business environment.). You want to verify that all computers and peripherals you use meet the class B standard which permits only one-tenth the power of spurious emissions than the class A standard. If you already own computer equipment with an FCC ID, you can find out which standard applies. Contact the FCC Consumers Assistance Branch at 1-717-337-1212 for details in accessing their database. Once you own good equipment, follow the manufacturer's recommendations for preserving the shielding integrity of the system. Don't operated the system with the cover off and keep "slot covers" in the back of the computer in place. III Use only shielded cable for all system interconnections. A shielded cable surrounds the core of control wires with a metal braid or foil to keep signals confined to that core. In the late seventies it was common to use unshielded cable such as "ribbon" cable to connect the computer with, say, a diskette drive. Unshielded cable acts just like an antenna for signals generated by your computer and peripherals. Most computer manufacturer supply shielded cable for use with their computers in order to meet FCC standards. Cables bought from third-parties are an unknown and should be avoided (unless you are willing to take one apart to see for yourself!) Try to avoid a "rat's nest" of wire and cabling behind your equipment and by keeping all cables as short as possible. You want to reduced the length of unintended antennas and to more easily predict the likely paths of electric and magnetic coupling from cable to cable so that it can be more effectively filtered. IV Block radiation from the power cord(s) into the house wiring. Most computers have an EMI filter built into their body where the AC line cord enters the power supply. This filter is generally insufficient to prevent substantial re-radiation of EMI voltages back into the power wiring of your house and neighborhood. To reduce the power retransmitted down the AC power cords of your equipment, plug them in to special EMI filters that are in turn plugged into the wall socket. I use a model 475-3 overvoltage and EMI filter manufactured by Industrial Communication Engineers, Ltd. P.O. Box 18495 Indianapolis, IN 46218-0495 1-800-ICE-COMM ask for their package of free information sheets (AC and other filters mentioned in this note are available from a wide variety of sources including, for example, Radio Shack. I am enthusiastic about ICE because of the "over-designed" quality of their equipment. Standard disclaimers apply.) This particular filter from ICE is specified to reduce retransmission of EMI by a factor of at least 1000 in its high-frequency design range. Although ideally every computer component using an AC line cord ought to be filtered, it is especially important for the monitor and computer CPU to be filtered in this manner as the most useful information available to opponents is believed to come from these sources. V Block retransmitted information from entering your fax/modem or telephone line. Telephone line is generally very poorly shielded. EMI from your computer can be retransmitted directly into the phone line through your modem or can be unintentionally picked up by the magnetic portion of the EMI spectrum through magnetic induction from power supplies or the yoke of your cathode ray tube "CRT" monitor. To prevent direct retransmission, EMI filters are specifically designed for modular telephone jacks to mount at the telephone or modem, and for mounting directly at the service entrance to the house. Sources of well-designed telephone-line filter products include ICE (address above) and K-COM Box 82 Randolph, OH 44265 216-325-2110 Your phone company or telephone manufacturer may be able to supply you with free modular filters, although the design frequencies of these filters may not be high enough to be effective through much of the EMI spectrum of interest. Keep telephone lines away from power supplies of computers or peripherals and the rear of CRTs: the magnetic field often associated with those device can inductively transfer to unshielded lines just as if the telephone line were directly electrically connected to them. Since this kind of coupling decreases rapidly with distance, this kind of magnetic induction can be virtually eliminated by keeping as much distance (several feet or more) as possible between the power supply/monitor yoke and cabling. VI Use ferrite toroids and split beads to prevent EMI from escaping on the surface of your cables. Ferrites are magnetic materials that, for certain ranges of EMI frequencies, attenuate the EMI by causing it to spend itself in heat in the material rather than continuing down the cable. They can be applied without cutting the cable by snapping together a "split bead" form over a thick cable such as a power cord or by threading thinner cable such as telephone several times around the donut-shaped ferrite form. Every cable leaving your monitor, computer, mouse, keyboard, and other computer peripherals should have at least one ferrite core attentuator. Don't forget the telephone lines from your fax, modem, telephone or the unshielded DC power cord to your modem. Ferrites are applied as close to the EMI emitting device as possible so as to afford the least amount of cable that can act as an antenna for the EMI. Good sources for ferrite split beads and toroids include Amidon Associates, Inc. P.O. Box 956 Torrance, CA 90508 310-763-5770 (ask for their free information sheet) Palomar Engineers P.O. Box 462222 Escondido, CA 92046 619-747-3343 (ask for their free RFI information sheet) and Radio Shack. VII Other practical remedies. Other remedies that are somewhat more difficult to correctly apply include providing a good EMI "ground" shield for your computer equipment and other more intrusive filters such as bypass capacitor filters. You probably ought not to think about adding bypass capacitors unless you are familiar with electronic circuits and digital design. While quite effective, added improperly to the motherboard or cabling of a computer they can "smooth out" the square wave digital waveform -- perhaps to the extent that signals are interpreted erroneously causing mysterious "crashes" of your system. In other cases, bypass capacitors can cause unwanted parasitic oscillation on the transistorized output drivers of certain circuits which could damage or destroy those circuits in the computer or peripherals. Also, unlike ferrite toroids, adding capacitors requires actually physically splicing them in or soldering them into circuits. This opens up the possibility of electric shock, damage to other electronic components or voiding the warranty on the computer equipment. A good EMI ground is difficult to achieve. Unlike an electrical safety ground, such as the third wire in a three-wire AC power system, the EMI ground must operate effectively over a much wider part of the EMI spectrum. This effectiveness is related to a quality known as electrical impedance. You desire to reduce the impedance to as low a value as possible over the entire range of EMI frequencies. Unlike the AC safety ground, important factors in achieving low impedance include having as short a lead from the equipment to a good EMI earth ground as possible (must be just a few feet); the gauge of the connecting lead (the best EMI ground lead is not wire but woven grounding "strap" or wide copper flashing sheets; and the physical coupling of the EMI into the actual earth ground. An 8 ft. copper-plated ground may be fine for AC safety ground, but may present appreciable impedance resistance to an EMI voltage. Much better would be to connect a network of six to eight copper pipes arranged in a six-foot diameter circle driven in a foot or two into the ground, electrically bonded together with heavy ground strap and connected to the equipment to be grounded via a short (at most, several feet), heavy (at least 3/4-1" wide) ground strap. If you can achieve a good EMI ground, then further shielding possibilities open up for you such as surrounding your monitor and computer equipment in a wire-screen Faraday cage. You want to use mesh rather than solid sheet because you must preserve the free flow of cooling air to your equipment. Buy aluminum (not nylon) screen netting at your local hardware store. This netting typically comes in rolls 36" wide by several feet long. Completely surround your equipment you want to reduce the EMI being careful to make good electrical bonds between the different panels of netting and your good earth ground. I use stainless steel nuts, bolts, and lock washers along with special non-oxidizing electrical paste (available from Electrical contractors supply houses or from ICE) to secure my ground strapping to my net "cages". A good Faraday cage will add several orders of magnitude of EMI attenuation to your system. VIII Checking the effectiveness of your work. It is easy to get a general feeling about the effectiveness of your EMI shielding work with an ordinary portable AM radio. Bring it very close to the body of your computer and its cables in turn. Ideally, you should not hear an increased level of static. If you do hear relatively more at one cable than at another, apply more ferrite split beads or obtain better shielded cable for this component. The practice of determining what kind of operating system code is executing by listening to a nearby AM radio is definitely obsolete for an well-shielded EMI-proof system! To get an idea of the power and scope of your magnetic field emissions, an ordinary compass is quite sensitive in detecting fields. Bring a compass within a few inches of the back of your monitor and see whether it is deflected. Notice that the amount of deflection decreases rapidly with distance. You want to keep cables away from magnetic sources about as far as required not to see an appreciable deflection on the compass. VIIII Summary If you start with good, shielded equipment that has passed the FCC level B emission standard then you are off to a great start. You may even be able to do even better with stock OEM equipment by specifying "low-emission" monitors that have recently come on the market in response to consumer fears of extremely low frequency ("ELF") and other electromagnetic radiation. Consistently use shielded cables, apply filtering and ferrite toroids to all cabling entering or leaving your computer equipment. Finally, consider a good EMI ground and Faraday cages. Beyond this there are even more effective means of confining the electrical and magnetic components of your system through the use of copper foil adhesive tapes, conductive paint sprays, "mu metal" and other less common components. Copyright (c) 1993 by Grady Ward. All Rights Reserved. Permission is granted for free electronic distribution. ------------------------------------------------------------------------- Bill Frantz | Market research shows the | Periwinkle -- Consulting (408)356-8506 | average customer has one | 16345 Englewood Ave. frantz at netcom.com | teat and one testicle. | Los Gatos, CA 95032, USA From dlv at bwalk.dm.com Mon Feb 9 22:55:10 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Tue, 10 Feb 1998 14:55:10 +0800 Subject: Washington on the verge of being nuked? In-Reply-To: <3.0.5.32.19980209174919.007b18a0@otc.net> Message-ID: <8V9Nke9w165w@bwalk.dm.com> David Honig writes: > At 06:34 PM 2/9/98 EST, Dr.Dimitri Vulis KOTM wrote: > >One can "disrupt" the water supply by just making a credible assertion that > >it's been poisoned - but it won't kill nearly as many people as actual > >poison (or virus/bacteria). > > > > Psychops? Yes, psyops (no ch) - the most venerable field of information warfare. > That doesn't work when you have sufficient health-orgs and telecomm > to get the word out that the water's ok. By the same reasoning, a bomb threat won't get a building evacuated if the authorities can check whether the bomb is there... A psychopath like Guy Polis could just call a TV station and claim that he put some poison in the water supply which would take a few days to test for. > Actually, a lot of people drink bottled water here :-) but > the 10 million kilos of shit excreted by LA every day would > build up pretty fast. NYC is one of the few major cities where the tap water is good enough to drink and actually tastes good. > Electric power is probably as vunerable as waterways, despite > conscious efforts to make the grid redundant. Of course > both are controlled by computers, as uncle sam is realizing. > In LA, all it takes to create a looting riot is to cut electricity > to the city's alarm systems... One could use brute force and just blow up enough redundant towers... Or short them with a kite. :-) > Major freeway intersections are closed down 2-3 times a year in LA > due to bomb threats, which are usually just threats -no bombs are found. > You can snarl the roads very easily at the right time of day, since > the roads' bandwidth is already exceeded and congestion persists after the > clog is removed. NYC has pretty good public transporation... I don't think a terrorist can do a lot by screwing up the traffic. I recall that there was a bunch of bomb threates at Salomon Brothers last year, right after Guy Polis was fired from his contractor job. Do you suppose the psychotic pedophile did it? --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From tcmay at got.net Mon Feb 9 23:24:49 1998 From: tcmay at got.net (Tim May) Date: Tue, 10 Feb 1998 15:24:49 +0800 Subject: Cyber 'Nannys" In-Reply-To: <34DF87FE.611AA4EF@InfoWar.Com> Message-ID: At 2:49 PM -0800 2/9/98, WebWarrior3 at InfoWar.Com wrote: >While I do not disagree that these companies should be able to market >their products, I wholeheartedly disagree with the fact that often their >customers (the adults who bought the software or subscribed to he >'service') are not allowed to have a list of what is actually blocked, So you wholeheartedly disagree that they are not giving you a list of what is blocked...so go use another service. I don't mean to be flippant. At issue here is a very real issue of free choice and contracts. Customers cannot "demand" a list of criteria for blocked sites any more than customers can demand a list of the selection criteria a bookstore uses, or a magazine editor uses, and so on. I make fun of Cyber Sitter and other Net.Nannies, but there's no role for "disagreeing with the fact" (whatever that infelicitous expression may mean) that they usually don't publicize their criteria. If you can figure out their criteria, great. Brock Meeks and Declan M. figured out some criteria a while back in an interesting article. But make sure that your "disagreeing with the fact" is not translated into calling for disclosure laws. That way lies statism. --Tim May Just Say No to "Big Brother Inside" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From guy at panix.com Mon Feb 9 23:37:37 1998 From: guy at panix.com (Information Security) Date: Tue, 10 Feb 1998 15:37:37 +0800 Subject: Vulis is asking for it Message-ID: <199802100729.CAA14882@panix2.panix.com> > From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) > A psychopath like Guy Polis could just call a TV station and claim that > he put some poison in the water supply which would take a few days to > test for. > I recall that there was a bunch of bomb threates at Salomon Brothers last > year, right after Guy Polis was fired from his contractor job. Do you > suppose the psychotic pedophile did it? > > Dr.Dimitri Vulis KOTM > Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps Your continued defamation is going to get you in a lot of trouble. Cease it now, asshole. Or you'll be the next Tawana Brawley defamation trial. > From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) > # Guy Polis (guy at panix.com, eviljay at bway.net) is a pedophile child ^^^^^^^^^^^^^ > # molester who was fired from his consulting position at Salomon Brothers > # after he was caught masturbating in his cubicle at the child pornography > # JPEGs that he downloaded from the Internet. > # > # In retaliation, Guy Polis spammed the firewalls mailing list with megabytes > # of e-mail logs that he "intercepted" at Salomon Brothers, and accused > # several of his former co-workers and supervisors of various crimes. > # > # As far as I can determine, Guy Polis has been unemployed since the time > # he was fired from Salomon. If anyone knows otherwise, please let me know. Besides the obvious, you've got _everything_ wrong. o I was not fired o I am not a psychopath o I did not download child porno o I am not AIDS-infected o I am not a faggot o I have been continuously employed since completing my Salomon contract o no one (name them) at Salomon or any other firm has stated otherwise. o I am not a pedophile You'd better stop lying. ---guy Don't cross the line again. From jinn at inetnebr.com Mon Feb 9 23:39:41 1998 From: jinn at inetnebr.com (D'jinnie) Date: Tue, 10 Feb 1998 15:39:41 +0800 Subject: Driver Licenses In-Reply-To: <199802100200.VAA03490@deathstar.jabberwock.org> Message-ID: On Mon, 9 Feb 1998, Mark Rogaski wrote: : Here in the Peoples Republik ov NJ, the DL's have no magstrips. But, : being that it is NJ, they're probably not far away. An interesting point : is that, when I moved (intrastate), the MVS sent a decal with the new : address to stick on the back. No re-issue necessary, which is good, since : most bars/liquor stores will not accept licenses marked DUP. But, they : will accept passports. I believe the sticker thing is standard practice... : : Also interesting is that PA has recently (within the past 2-4 years) been : issuing DL's with the driver's SSN. That is standard practice in Missouri which I think is kinda silly but it got me out of bringing my SSN card to my employers (which by then took several spins through the washer :) You have to request for the number to be different and CDL only allows it on grounds of religious convictions. I think I'll just form a sect... Why are religions, no matter how kooky, respected so much?? --- Reality leaves a lot to the imagination. jinn at inetnebr.com From jinn at inetnebr.com Mon Feb 9 23:53:21 1998 From: jinn at inetnebr.com (D'jinnie) Date: Tue, 10 Feb 1998 15:53:21 +0800 Subject: Driver Licenses In-Reply-To: <3.0.5.32.19980209122020.00889e90@popd.ix.netcom.com> Message-ID: On Mon, 9 Feb 1998, Bill Stewart wrote: : : Yup. It's really annoying to have to give the California DMV lots of : personal information about myself so they can track down deadbeat dads, : given that I'm not even a dad, much less a deadbeat dad, and so they : can track down Mexicans who want to drive without citizenship papers, : and similar presumptions of potential guilt. You're not required to be a citizen. You're not even required to be a permanent resident. All you need is to be here legally for any length of time. Some places won't check. Some require SSN cards, which can only be issued to ppl who are here legally, regardless of work authorization (since we all know SSN go way beyond original purpose ;) --- Reality leaves a lot to the imagination. jinn at inetnebr.com From WebWarrior3 at InfoWar.Com Tue Feb 10 00:47:28 1998 From: WebWarrior3 at InfoWar.Com (WebWarrior3 at InfoWar.Com) Date: Tue, 10 Feb 1998 16:47:28 +0800 Subject: Cyber 'Nannys" In-Reply-To: Message-ID: <34E01274.4531F0CD@InfoWar.Com> Tim May wrote: > I don't mean to be flippant . At issue here is a very real issue of free > choice and contracts. Customers cannot "demand" a list of criteria for > blocked sites any more than customers can demand a list of the selection > criteria a bookstore uses, or a magazine editor uses, and so on. Ever hear of consumer protection laws? There are many cases where consumers are allowed to "demand" information regarding their purchases...you were being flippant. One subscribes to a magazine because one knows what the focus of the content is and one chooses to receive that periodical; not because the magazine MAY have an editorial policy to not cover any stories on the "Oddities of Toenail Fungus in Bleached Blonde Yaks from Manhattan." > I make fun of Cyber Sitter and other Net.Nannies, but there's no role for > "disagreeing with the fact" (whatever that infelicitous expression may > mean) that they usually don't publicize their criteria. Pardon my poor choice of words, please. Looking back on it, I can see that I could have chosen a better way to express my meaning. In case you did not get the gist, let me clarify it for you: I find it to be an irresponsible business practice for a company not to provide a customer with information on exactly what a product does and does not do. In a case where a product claims to 'protect' children from certain 'harmful' material, parents should be able to view these criteria in order to:A) discern whether they agree that the material is harmful and B) make an educated choice regarding which, if any, of these products they want to purchase. Saying that a customer can not demand to know what the product does is like saying that a car manufacturer should not have to tell potential customers if the engine block is made of aluminum, cast iron, or wood. Likewise, remember an agency called the FDA? Hmm, wonder if one of the reasons we have ingredient labels on our packaged food is so people can verify that certain ingredients are not in the products. Have any allergies, Tim? > If you can figure out their criteria, great... Huh? Where did that come from? > But make sure that your "disagreeing with the fact" is not translated into > calling > for disclosure laws. That way lies statism. There are already consumer protection laws. I don't think that this is a concentration of extensive economic controls in the State, do you? Really, Tim... It is neither my option nor is it my responsibility to change someone's little paranoid mind should they confuse consumer protection with statism, that is a job for a psychiatrist or a professor. Scott R. Brower http://www.infowar.com http://www.efflorida.org From bill.stewart at pobox.com Tue Feb 10 01:01:22 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Tue, 10 Feb 1998 17:01:22 +0800 Subject: Driver Licenses In-Reply-To: <199802092153.QAA07449@mx01.together.net> Message-ID: <3.0.5.32.19980210004840.00882c40@popd.ix.netcom.com> At 04:53 PM 2/9/98 -0500, Brian B. Riley wrote: > I wonder, though, how long it would go on if some shopkeeper indeed did >this? But, is it a crime to try to buy booze or tobacco underage, if you >do not try to show fraudulent indentification? Depends on the state; in many places it's a crime both for the buyer and the seller. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From bill.stewart at pobox.com Tue Feb 10 01:06:45 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Tue, 10 Feb 1998 17:06:45 +0800 Subject: Driver Licenses In-Reply-To: <3.0.5.32.19980209122020.00889e90@popd.ix.netcom.com> Message-ID: <3.0.5.32.19980210005639.00882c40@popd.ix.netcom.com> At 01:49 AM 2/10/98 -0600, you wrote: >On Mon, 9 Feb 1998, Bill Stewart wrote: >: >: Yup. It's really annoying to have to give the California DMV lots of >: personal information about myself so they can track down deadbeat dads, >: given that I'm not even a dad, much less a deadbeat dad, and so they >: can track down Mexicans who want to drive without citizenship papers, >: and similar presumptions of potential guilt. > >You're not required to be a citizen. You're not even required to be a >permanent resident. All you need is to be here legally for any length of >time. Some places won't check. Some require SSN cards, which can only be >issued to ppl who are here legally, regardless of work authorization >(since we all know SSN go way beyond original purpose ;) CA has occasionally demanded citizenship papers to get a driver's license, because a few politicians want to harass the large numbers of Mexicans who live here without papers. They weren't demanding them when I got my license 4 years ago, because they'd just been hassled in court, and this time when I renewed the clerk said the main reason the state mails licenses centrally instead of just printing them at the DMV is so they can check all the data with the INS. If you're driving a car here with Sonora plates and you've got a Mexican license with a Sonora address, the CA cops can't bust you for it, though they can ask stuff like what you're doing here. But if you're parking the car on the street for more than 2 months (it may be 1 month?) with Sonora plates, they can bust you for not having California plates, even though you can't get them, and for not having a California license, even though you can't get one. Just as they can for still having Jersey plates on your car. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From o0brainiac0o at hotmail.com Tue Feb 10 17:21:50 1998 From: o0brainiac0o at hotmail.com (o0brainiac0o at hotmail.com) Date: Tue, 10 Feb 1998 17:21:50 -0800 (PST) Subject: Great H/P/V/A Site...packed with useful filez. Check it out! Message-ID: <14378813_56286280> Sup, I found this great H/P/V/A site that You gotta see. Its packed with tonz of useful texts and programs...it's worth the visit. http://www.ndi.net/~toot/ and please dont ferget to visit his sponsors since he is presently making only half as much as he needs to keep the site up and running. http://www.ndi.net/~toot/cash/ o0brainiac0o From steve at tightrope.demon.co.uk Tue Feb 10 01:59:05 1998 From: steve at tightrope.demon.co.uk (Steve Mynott) Date: Tue, 10 Feb 1998 17:59:05 +0800 Subject: SOFT TEMPEST (fwd) In-Reply-To: <19980209235936.37986@die.com> Message-ID: <19980210095845.47535@tightrope.demon.co.uk> On Tue, Feb 10, 1998 at 06:46:55AM +0100, Lucky Green wrote: > There wasn't a single person watching said demonstration in that brutally > hot tent at HIP'97 that didn't walk away impressed. And I can off the top > of my head come up with a design that would improve the gain by at least > 20dB over what was used there.. I wasn't impressed. That main tent was an old circus tent and was huge with enough room for one thousand people. Unfortunately it had the effect of focusing and amplifying the already excessive heat on the sweating and dehydrated victims sitting in it. By the final day an attempt had been made to open it up a bit more and to spray cold water on it. The first thing I saw was a demonstration of the "Van Eck effect". The idea was to pick up the screen display of someone's monitor at a distance to read the information off it. The lecturer was a German professor and spoke heavily accented English. He was very much as a German professor might be shown in a film. He spoke a lot about "Ze Incriminating Emissions", which seemed rather funny at the time. He had an aerial, which looked like an unconvincing Dr Who prop, attached to a standard TV. The circus tent atmosphere led somehow to the impression that he was a stage magician performing tricks. Also the audience's habit of cheering after each trick didn't help. On the target PC screen were a few words in a very large font and he was able to display this up on the TV. He also put a device around the power supply lead and could pick up a better picture this way. There were mutterings from the audience, many of whom seemed unimpressed. At the question session the poor chap got a rather hard ride. The gist of it being "What we have been shown is twenty years old, there are modern digital techniques that are much better". His reply was "They are very expensive and we have only just got the equipment and the results aren't finished yet." The counter measures were Tempest shielding. In short if your password is visible on your monitor in letters three inches high and there is a van outside your office with a large aerial and German plates this might mean trouble. Or maybe the NSA can pick it up anyway from America using the "newer techniques". -- Steve Mynott "no man or group of men shall aggress upon the person or property of anyone else." -- Murray N. Rothbard From chief.gopher at janyce.com Tue Feb 10 02:18:28 1998 From: chief.gopher at janyce.com (Janyce.com, Inc. Union Gap WA USA) Date: Tue, 10 Feb 1998 18:18:28 +0800 Subject: KCKSG Helpers List In-Reply-To: <34AD7EAE.693B@toad.com> Message-ID: <3.0.5.32.19980210021014.007f2c80@mail.eskimo.com> At 03:56 PM 1/2/98 -0800, you wrote: >I noticed that on the helpers section my ph # is listed.. I must have >accidentally entered that. I would prefer that its not there.. > >Could you please remove it? >-Jim > > I have no idea who a Jim whose address cypherpunks at toad.com is. If you are a member, give me your membership no. and full name. As requested please address member concerns to CUSTOMER.SERVICE at janyce.com If you are not a member, how did you find the helpers list? -= Janyce =- Kissing Cousins Korner http://www.janyce.com/genecous/book.html JOIN TODAY: http://www.janyce.com/misc/ccformC.html From anon at anon.efga.org Tue Feb 10 02:37:19 1998 From: anon at anon.efga.org (Anonymous) Date: Tue, 10 Feb 1998 18:37:19 +0800 Subject: Driver Licenses Message-ID: <88b57910d1bea792655156201f962142@anon.efga.org> Lucky Green enlightened us with: > On Mon, 9 Feb 1998, Tim May wrote: > > If a U.S. Passport is not considered enough I.D., > > because it doesn't have the Big Brother Inside > > magstripe, one walks away from the transaction. > > Just as a data point, in the State of Oregon, an US > passport is *not* valid ID for alcohol purchases. > Magstripe or no magstripe. Of course not! The People's Socialist Nirvana of Oregon is a foreign country. Just the fact that almost all other foreign countries recognize the U.S. passport as valid identification for things far more momentous than the purchase of alcohol doesn't mean that the PSNofO has to! What do they require in Oregon? A little holographic tatoo in paisley? A barcode on the tongue? Oh, I know! A machine-readable ID on the inside of the rectum! Has anyone figured out the obvious answer to this shit? If you have, don't answer. And don't send me the bodies by UPS collect, either. From frissell at panix.com Tue Feb 10 04:27:09 1998 From: frissell at panix.com (Duncan Frissell) Date: Tue, 10 Feb 1998 20:27:09 +0800 Subject: Driver Licenses In-Reply-To: Message-ID: <3.0.2.32.19980210071222.036cee1c@panix.com> At 02:12 AM 2/10/98 +0100, Lucky Green wrote: >On Mon, 9 Feb 1998, Tim May wrote: >> If a U.S. Passport is not considered enough I.D., because it doesn't have >> the Big Brother Inside magstripe, one walks away from the transaction. > >Just as a data point, in the State of Oregon, an US passport is *not* >valid ID for alcohol purchases. Magstripe or no magstripe. > >-- Lucky Green PGP v5 encrypted email preferred. > "Tonga? Where the hell is Tonga? They have Cypherpunks there?" So I guess foreigners can't buy booze in Oregon at all. The new (last 10 years) passports don't have a mag stripe but do have the ICAO machine- reabable text string including a replay of the Passport info together with checksum digits. There is also space for a National ID Number for those countries which have one but it is blank on US passports since we don't have a national ID. DCF From ravage at ssz.com Tue Feb 10 04:36:49 1998 From: ravage at ssz.com (Jim Choate) Date: Tue, 10 Feb 1998 20:36:49 +0800 Subject: the best justice money can buy --Lessig (fwd) Message-ID: <199802100349.VAA27066@einstein.ssz.com> Oops... Forwarded message: > From: Jim Choate > Subject: Re: the best justice money can buy --Lessig (fwd) > Date: Mon, 9 Feb 1998 18:54:32 -0600 (CST) > And in the long run non-copyrighted software has a significant market ^^^^^^^^^^^ copy-protected > advantage. It's smaller, it is more stable, and people don't get as pissed > off when they want to make their backups. Sorry. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From frissell at panix.com Tue Feb 10 04:40:31 1998 From: frissell at panix.com (Duncan Frissell) Date: Tue, 10 Feb 1998 20:40:31 +0800 Subject: Driver Licenses In-Reply-To: <199802082027.PAA00347@users.invweb.net> Message-ID: <3.0.2.32.19980210071357.036c98d8@panix.com> At 02:52 AM 2/10/98 +0100, Anonymous wrote: >> Yup. It's really annoying to have to give the California DMV lots of >> personal information about myself so they can track down deadbeat dads, >> given that I'm not even a dad, much less a deadbeat dad, and so they >> can track down Mexicans who want to drive without citizenship papers, >> and similar presumptions of potential guilt. > >Actually, thanks to NAFTA, the Mexicans can drive without citizenship >papers, and they don't have to give the California DMV shit. All they >need is a valid mexican driver license and they can drive in the US. NAFTA has nothing to do with it. You've always been able to drive with a foreign license. DCF From sbcom at wainfleet.ids.on.ca Tue Feb 10 20:47:12 1998 From: sbcom at wainfleet.ids.on.ca (sbcom at wainfleet.ids.on.ca) Date: Tue, 10 Feb 1998 20:47:12 -0800 (PST) Subject: RYNO Seminar -- 18 February Message-ID: <199802110441.XAA11595@e-bizness.com> GETTING ELECTRONIC MEDICAL RECORDS INTO THE EXAM ROOM You are cordially invited to join RYNO, 4MD, Citrix and Symbol Technologies for a FREE seminar on a cost-effective method of getting electronic medical records into the exam room. At this half-day event you will hear several success stories on how other Health Care Institutions have implemented this program and benefited from innovative technology to increase profitability and efficiency. If you are interested in this technology, but cannot make it to the seminar, please contact RYNO's Healthcare Vertical Manager, Veronica Henderson at vhenderson at ryno.com or call her at 1-800-366-7966, xt 265 to learn more. Date: Wednesday, Feb. 18th, 1998 Time: Registration & Breakfast 9:00am* Seminar: 9:30am Adjourn and Hosted Lunch: 12:00pm* Location: Marriott Hotel, Walnut Creek 2355 North Main St. Walnut Creek, CA 94596 510-934-2000 RSVP: 707-746-6252 x262 or email - jramirez at ryno.com Please respond by February 13th *Breakfast and Lunch are complimentary Please feel free to RSVP anyone else who may be interested in attending. We look forward to seeing you there! Joy Ramirez RYNO 4271 Park Road Benicia CA 94510 707-746-6252 x262 jramirez at ryno.com SYMBOL TECHNOLOGIES AND 4MD CORPORATION: Healthcare provider needs can finally be addressed electronically. Symbol Technologies and 4MD Corporation provide a complete point-of-care solution for healthcare providers using a Winframe Server. 4MD Corporation has developed a simple, yet powerful, browser-based, Clinical Decision Support (CDS) application that runs on the Symbol wireless thin client over a Citrix Winframe. Healthcare providers can now pull up patient records, review electronic medical records, lab reports, radiology reports and other patient information as well as clinical guidelines all at a patient's bedside, or in the exam room on a handheld, flatscreen, mobile thin client. Symbol Technologies and 4MD Corporation solutions are designed for high-performance data management, and for satisfying the unique demands of healthcare applications where mobility, durability and ease of operations are a must. WINFRAME: Is the only software that allows you to access a single server with virtually any Windows application from across any type of network connection by any desktop without the software being installed on the desktop! Allows you to use existing hardware (old 386, 486 PC's) and still use advanced software applications, thus getting longer use out of the hardware and saving money. Gives IS departments more control and manageability over the network. Allows remote offices to access information easily from the main headquarters. Saves in maintenance costs. WHY WINFRAME? Today, more than ever, I/S professionals are pursuing cost-effective and efficient solutions to enterprise-wide application deployment. Deploying business-critical Windows-based application?s across the enterprise is a monumental task for today?s I/S professionals. They?re faced with huge obstacles including manageability requirements, multiple desktop computing platforms, clogged networks on heavily trafficked LAN?s, inadequate application performance for remote users, and poor security. And, if that?s not enough, they?re expected to solve these problems faster, with fewer people and a smaller budget! RYNO: RYNO is an award winning Bay Area VAR with top level expertise in both networking and software development. We serve healthcare institutions from building the network to developing the GroupWare applications that make a network function efficiently as a whole. RYNO?s mission is to provide our customers with increased profitability and efficiency by providing superior technology solutions. RYNO in partnership with Citrix Solutions is offering you a free seminar introducing WinFrame, a new paradigm in information management systems! DIRECTIONS TO WALNUT CREEK MARRIOTT: DRIVING FROM SAN FRANCISCO: I-101 North - follow signs to Bay Bridge (right lanes) to I-580 East. One mile to Highway 24 Concord/Walnut Creek. Highway 24 East to I-680 North. Continue I-680 North to North Main Street exit. Turn left on North Main Street and right on Parkside Drive. Hotel is located on the corner of Parkside Drive and North Main Street. DRIVING FROM OAKLAND: Follow signs to I-880 Freeway North (towards Oakland). Take I-880 to I-980 - Walnut Creek. This turns into Highway 24. Drive East on Highway 24 (use left lanes) to I-680 Interchange.Drive North to I-680 for 1.5 miles to North Main Street Exit. Turn left on North Main Street and right on parkside Drive. Hotel is located on the corner of Parkside Drive and North Main Street. DRIVING FROM SACRAMENTO: Follow the signs to I-680 South Concord and Walnut Creek. Cross the Benicia Bridge and proceed to Walnut Creek, exiting on North Main Street. (Approx. 5 miles). Stay in the right lane and turn right after exiting North main. The hotel is one block East on the right side of the street. DRIVING FROM SAN JOSE: Follow the signs to I-680. As you approach Walnut Creek, stay to the right and exit at North Main Street. Turn left on North Main Street and right on Parkside Drive. Hotel is located on the corner of Parkside Drive and North Main Street. /////////////////////////////////////////////////////////////////////////////// This Message was Composed using Extractor Pro Bulk E- Mail Software. If you wish to be removed from this advertiser's future mailings, please reply with the subject "Remove" and this software will automatically block you from their future mailings. //////////////////////////////////////////////////////////////////////////////// From dac at zurich.ibm.com Tue Feb 10 06:25:54 1998 From: dac at zurich.ibm.com (Marc Dacier) Date: Tue, 10 Feb 1998 22:25:54 +0800 Subject: CFP - Recent Advances in Intrusion Detection (RAID'98) Message-ID: <9802101505.ZM25870@zurich.ibm.com> Call For Participation - RAID'98 First International Workshop on the Recent Advances in Intrusion Detection September 14-15, 1998 Louvain-la-Neuve, Belgium We solicit your participation in the first International Workshop on the Recent Advances in Intrusion Detection. This workshop, the first in an anticipated annual series, will bring together leading figures from academia, government, and industry to talk about the current state of intrusion detection technologies and paradigms from the research and commercial perspectives. Research into and development of automated intrusion detection systems (IDS) has been under way for nearly 10 years. In that time, only a few systems have been widely deployed in the commercial or government arena (e.g., DIDS, NADIR, NetRanger, Stalker). All are limited in what they do. At the same time, the numerous research systems developed have been more engineering than scientific efforts, with scant quantitative performance figures. As we survey the field of automated intrusion detection, we are faced with many questions: 1) What *research* questions have yet to be answered about IDS? 2) What are the open questions, limitations, and fundamental concerns about existing intrusion detection methodologies? 3) What metrics shall we use to measure IDS performance and thus compare different IDSes? These measurements should highlight the successes and expose the limitations of current IDS approaches. 4) What factors are inhibiting transfer of research ideas into functional deployed IDSes? How can those be addressed? 5) What is the role of a deployed IDS? How should or can it fit in with other security systems? 6) What are the typical operating environments and policies in which IDSes are used? 7) What are the challenges for IDSes in very large environments, such as the Internet? 8) Is it time to be thinking about IDS standards? What are the advantages and disadvantages of standardizing components of IDS? What forums (e.g., IETF, ISO) would be appropriate for pursuing such standards? 9) What are the problems of turning the results of intrusion detection tools into legally reliable evidence? What are the problems of admissibility and of court-room presentation? We invite proposals and panels that explore these questions or any other aspect of automated intrusion detection. We especially solicit proposals and panels that address: 1) New results related to intrusion detection methodologies and technologies. 2) Innovative ways of thinking about intrusion detection; for example, the applicability of R&D in the fields of survivable and/or dependable systems, data mining, etc. 3) User experiences and lessons learned from fielded intrusion detection systems. 4) IDS for emerging computer environments (e.g., Java, CORBA, NT ). 5) Commercial intrusion detection systems. We have scheduled RAID'98 immediately before ESORICS'98, at the same time as CARDIS'98, and at the same location as both of these conferences. This provides a unique opportunity for the members of these distinct, yet related, communities to participate in all these events and meet and share ideas during joined organized external events. INSTRUCTIONS: Proposals for presentations must include a title followed by an abstract that is a maximum of 600 words in length. The presenter may include a full paper with the abstract, and will have either 15 or 30 minutes (including questions) for the talk. Panel proposals should include a title, proposed chair, tentative panelists, a description (under 300 words), format of the presentation, and short rationale for the panel. Panel sessions must fit into one hour time slots. Each proposed participant must include his or her name, organization, position, e-mail address, facsimile and telephone number, and a brief biography. All proposals must be in English. Plan to give all panels and talks in English. We must receive all proposals before June 15, 1998. We strongly prefer they be submitted by e-mail to raid98 at zurich.ibm.com. Various formats (ASCII, postscript, Word, WordPro, Framemaker, and LaTex) are acceptable. If necessary, hardcopy proposals may be sent to: Marc Dacier Global Security Analysis Lab IBM Zurich Research Laboratory Saeumerstrasse 4, CH-8803 Rueschlikon, Switzerland IMPORTANT DATES: ---------------- Deadline for submission: June 15, 1998 Notification of acceptance or rejection: August 1, 1998 GENERAL CO-CHAIRS: ------------------ Marc Dacier (IBM Zurich Research Laboratory, Switzerland) Kathleen A. Jackson (Los Alamos National Laboratory, USA) PROGRAM COMMITTEE: ------------------ Matt Bishop (University of California at Davis, USA) Dick Brackney (National Security Agency, USA) Yves Deswarte (LAAS-CNRS & INRIA, France) Baudouin Le Charlier (Universite de Namur, Belgium) Stuart Staniford-Chen (University of California at Davis, USA) Rowena Chester (University of Tennessee, USA) Deborah Frincke (University of Idaho, USA) Tim Grance (National Institute of Standards and Technology, USA) Sokratis Katsikas (University of Athens, University of Aegeans, Greece) Jean-Jacques Quisquater (Universite Catholique de Louvain, Belgium) Mark Schneider (National Security Agency, USA) Peter Sommer (London School of Economics & Political Science, England) Steve Smaha (Trusted Information Systems, USA) Gene Spafford (Purdue University, USA) Chris Wee (University of California at Davis, USA) Kevin Ziese (WheelGroup Corporation, USA) For further information contact one of the General Co-chairs: Marc Dacier Kathleen A. Jackson IBM Zurich Research Laboratory Los Alamos National Laboratory Switzerland USA E-mail: dac at zurich.ibm.com E-mail: kaj at lanl.gov Tel.: +41-1-724-85-62 Tel.: +1-505/667-5927 Fax.: +41-1-724-89-53 Fax: +1-505/665-5220 More information will be available at: . Information about ESORICS'98 is available at: ESORICS 98 home page: ESORICS series home page: Note: Papers and panel proposals for ESORICS'98 are due before February 28, 1998. Information about CARDIS'98 will be available at: -- Marc Dacier Mgr. Global Security Analysis Lab (GSAL) IBM Zurich Research Laboratory Saeumerstrasse 4 - CH-8803 Rueschlikon - Switzerland E-mail: dac at zurich.ibm.com Tel.:+41-1-724-85-62 Fax.:+41-1-724-89-53 From ravage at ssz.com Tue Feb 10 07:09:47 1998 From: ravage at ssz.com (Jim Choate) Date: Tue, 10 Feb 1998 23:09:47 +0800 Subject: SOFT TEMPEST (fwd) Message-ID: <199802100346.VAA27061@einstein.ssz.com> Forwarded message: > Date: Tue, 10 Feb 1998 03:03:53 +0100 (CET) > From: Lucky Green > Subject: Re: SOFT TEMPEST (fwd) > I don't know about displaying the screens of several thousands of PC's at > a site, but you can easily select any given screen of several dozens of > PC's. Using $100 worth in equipment plus a [>>$100] quality frequency > generator. What is the $100 worth of equipment? > At HIP'97, I watched a van Eck demonstration given by a German professor. > Using cheap analog equipment and one of the better HP frequency What equipment, not necessarily the manufacturer or model but the functional description? Do you remember the configuration? > I am told screen images can be captured up to 600 meters along the power > line. As long as there isn't a transformer in there. The impedance shift will strongly attenuate the signal. This same limitation effects X-10 controllers. If the PC's are plugged into a UPS (which they should be in a business) you're SOL here. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ravage at ssz.com Tue Feb 10 07:10:24 1998 From: ravage at ssz.com (Jim Choate) Date: Tue, 10 Feb 1998 23:10:24 +0800 Subject: TEMPEST (fwd) Message-ID: <199802100340.VAA27056@einstein.ssz.com> Forwarded message: > Subject: Re: TEMPEST > Date: Tue, 10 Feb 1998 01:45:26 +0000 > From: Markus Kuhn > > If your getting your signal off the harmonics you're doing it the hard way. > > Go back and re-read your texts on Fourier Transforms and then do a > > power-spectrum analysis on the signals to the tube; what you will find is > > that the primary frequencies get the majority of the signal (eg 1st harmonic > > of a square wave (ie a dot clock) only gets, at best, 1/3 of the energy of > > the primary). > > But this is not necessarily, where the the monitor resonates nicely. > Van Eck has reported very similar results in his paper: His VDU > had a dot clock of 11 MHz and he got nice resonance peaks near 125 > and 210 MHz. 11MHz base frequency won't produce a clean ring at 125MHz or 210MHz, they're not a whole number multiple of the base. How is this accounted for? What did he calculate the Q at? At what range was he picking up these harmonics as well as the base? The lower harmonic implies a 4MHz beat and the higher a 1MHz beat, how did he account for these signals? Personaly I would be more inclined to suspect the information was riding on the beats. He didn't happen to measure the frequencies to 3 decimal places did he? Since the components are most likely 20%, 10% at best. This would indicate that his base clock was slewing from around 10MHz to around 12MHz, this would explain the 1MHz and 4MHz beats anyway; sub-harmonics due to excessive slew-rate. If he was seeing ringing it had to be very low power because such off-integer resonances only occur in low-Q tuned circuits and that implies a very quick decay constant because the majority of energy is being dissipated in heat. So, in effect, Van Eck is claiming that the propogation attenuation of the 125 and 210 harmonics is lower than for the fundamental frequencies in a low-Q tuned circuit? Or is he claiming the emitted energy of the harmonics was higher than the base drive signal? > If you have only a van Eck style receiver, yes. But as soon as you record > the reception over some time and observe the images phases to drift only > slightly against each other, you might be able to separate them using > similar processing techniques as used in computer tomography. As I alluded to with the comment I made about integrating the received signals. The easiest way to do this sort of stuff with a small budget is with a flying capacitor integrator. ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From nobody at REPLAY.COM Tue Feb 10 07:23:34 1998 From: nobody at REPLAY.COM (Anonymous) Date: Tue, 10 Feb 1998 23:23:34 +0800 Subject: Driver Licenses In-Reply-To: <199802100200.VAA03490@deathstar.jabberwock.org> Message-ID: <199802101512.QAA11271@basement.replay.com> D'jinnie asked: > Why are religions, no matter how kooky, respected so much?? > Amendment I. Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances. From dm0 at avana.net Tue Feb 10 07:47:59 1998 From: dm0 at avana.net (David Miller) Date: Tue, 10 Feb 1998 23:47:59 +0800 Subject: Spanish biometric project 45% complete Message-ID: <34E09F10.6AB7@avana.net> >Business Systems Magazine, Feb. 1998, p. 78: >BIOMETRICS PROTECTS GOVERNMENT DATA >For example, Spain's government recently integrated biometric >verification units in 633 informational kiosks that will >eventually be used by 7 million citizens (the project is 45% >complete). >... >The 633 kiosks are located in various government offices in >the Andalusia region of Spain, says John Souder, program >manager for Unisys. The Spanish Government plans to implement >the kiosks nationwide. >... >To use the kiosks, citizens had to obtain a smart card with >their name and an ID number. Citizens also had to be "enrolled" >in the system. During the enrollment process, each citizen's >right or left index fingerprint is scanned and stored to the >smart card. That way, the system can verify the citizen using >the card is the same person authorized to use it. >... >Citizens can then access databases for the National Institute >of Social Security; the National Institute of Employment; the >General Treasury of Social Security and the Social Institute >For Sea Workers. From ravage at ssz.com Tue Feb 10 08:01:45 1998 From: ravage at ssz.com (Jim Choate) Date: Wed, 11 Feb 1998 00:01:45 +0800 Subject: SOFT TEMPEST (fwd) Message-ID: <199802101550.JAA02061@einstein.ssz.com> Forwarded message: > Date: Tue, 10 Feb 1998 06:46:55 +0100 (CET) > From: Lucky Green > Subject: Re: SOFT TEMPEST (fwd) > That would be my analysis as well. Note that the van Eck demonstration I > saw didn't even make use of the common analog tricks, such as using a > super heterodyne receiver. In what context? The only place a super-het would buy you any selectivity, and its tight bandwidth may actualy work against you, is in capturing the data on each trace. The syn pulses aren't amplitude sensitive so much as time ordered. If you can get a clear signal use that to fire a Schmitt trigger and synthesize your sync pulses and ramps/stairstep generators from that. Using a super-het for this is over-kill. > Not to mention the near magical capabilities of > a few Fourier transforms for pulling a nice, fat signal spike out of all > that "white noise". Doing a Fourier on the grass won't pull the signal out unless you've got an integration function in there to filter the noise (ala flying cap filter). If the signal is strong enough that a Fourier can be applied to it then the signal is most likely strong enough to use directly. The data we're trying to get out isn't that complicated; two sync pulses and the e-beam modulation data. I would like to request that you provide a better description of the equipment used at HIP for the demo. If the various descriptions of that are accurate his signal detection range was around 50 - 100 ft. and he was using specialy sized fonts (special in the context that you wouldn't use them for a spreadsheet or document processing). Is this correct? ____________________________________________________________________ | | | The most powerful passion in life is not love or hate, | | but the desire to edit somebody elses words. | | | | Sign in Ed Barsis' office | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From anon at anon.efga.org Tue Feb 10 08:02:52 1998 From: anon at anon.efga.org (Anonymous) Date: Wed, 11 Feb 1998 00:02:52 +0800 Subject: school filter legislation Message-ID: <83939ee93a7f8bf2a9dea3a90f96910a@anon.efga.org> Filtering sex off the Net in schools By Reuters NEWS.COM February 10, 1998, 5:55 a.m. PT URL: http://www.news.com/News/Item/0,4,19002,00.html WASHINGTON--Senate Commerce Committee chairman John McCain (R-Arizona) and Sen. Ernest Hollings (D-South Carolina), the ranking Democrat on the panel, introduced a bill yesterday to protect children from sexually explicit materials on the Internet at school and in the library. The Commerce committee will hold a hearing on indecency on the Internet today. The legislation would force schools and libraries to filter or block access to some Internet sites in order to qualify for billions of dollars of federal subsidies aimed at bringing more computers into classrooms and public libraries. Under the legislation, schools would have to certify with the Federal Communications Commission that they are using or will use a filtering device on computers with Internet access so that students will not be able to access sexually explicit or other materials deemed "harmful." A school would not be eligible to receive government subsidies for universal access to the Internet unless it met those conditions. To qualify for the subsidies, libraries would be required to use a filtering system on one or more of their computers so that at least one computer would be "suitable for minors' use," McCain's office said. "The prevention lies not in censoring what goes on the Internet, but rather in filtering what comes out of it onto the computers our children use outside the home," McCain said. In a speech on the Senate floor introducing the measure, McCain noted that when the word "teen" was typed into a Web search engine, a site about teen sex was the first search result to appear. Civil liberties groups have criticized efforts to filter access to materials available on the Internet, saying that such technologies often block out data that children need to learn about AIDS prevention and find support for depression and issues related to their sexuality. Hollings said the legislation gave schools and libraries "an added financial incentive to filter children's access to the Internet," adding, "We must tackle this problem of children innocently stumbling onto indecent material while using the Web for legitimate research purposes or face dire consequences." Under the legislation, school and library administrators would be free to choose any filtering or blocking system that would best fit their community standards and local needs. The bill forbids the federal government from making "qualitative judgments about the system a school or library has chosen to implement," according to a summary. Sen. Dan Coats (R-Indiana) and Sen. Patty Murray (D-Washington) are also sponsoring the legislation. Story Copyright � 1998 Reuters Limited. All rights reserved. Go to Front Door | The Net | Search | Short takes | One Week View Copyright � 1995-98 CNET, Inc. All rights reserved. From ravage at ssz.com Tue Feb 10 08:35:18 1998 From: ravage at ssz.com (Jim Choate) Date: Wed, 11 Feb 1998 00:35:18 +0800 Subject: Open Source Software - Proposal (fwd) Message-ID: <199802101637.KAA02458@einstein.ssz.com> Forwarded message: >From ravage at ssz.com Tue Feb 10 10:35:27 1998 From: Jim Choate Message-Id: <199802101635.KAA02425 at einstein.ssz.com> Subject: Open Source Software - Proposal To: users at ssz.com (SSZ User Mail List) Date: Tue, 10 Feb 1998 10:35:25 -0600 (CST) Cc: friends at ssz.com (Ravage's Friends), stugreen at realtime.net X-Mailer: ELM [version 2.4 PL23] Content-Type: text Content-Length: 3835 Forwarded message: > X-within-URL: http://earthspace.net/~esr/open-source.html > > GOODBYE, "FREE SOFTWARE"; HELLO, "OPEN SOURCE" > > After the Netscape announcement broke in February early 1998 I did a > lot of thinking about the next phase -- the serious push to get "free > software" accepted in mainstream corporate America. And I realized we > have a serious problem with "free software" itself. > > Specifically, we have a problem with the term "free software", itself, > not the concept. I've become convinced that the term has to go. > > The problem with it is twofold. First, it's confusing; the term "free" > is very ambiguous (something the Free Software Foundation's propaganda > has to wrestle with constantly). Does "free" mean "no money charged?" > or does it mean "free to be modified by anyone", or something else? > > Second, the term makes a lot of corporate types nervous. While this > does not intrinsically bother me in the least, we now have a pragmatic > interest in converting these people rather than thumbing our noses at > them. There's now a chance we can make serious gains in the mainstream > business world without compromising our ideals and commitment to > technical excellence -- so it's time to reposition. We need a new and > better label. > > I brainstormed this with some Silicon Valley fans of Linux the day > after my meeting with Netscape (Feb 5th). We kicked around and > discarded several alternatives, and we came up with a replacement > label we all liked: "open source". > > John "maddog" Hall and Larry Augustin, both of the Linux International > Board of Directors, were in on the brainstorming session (though > interestingly enough the term "open source" was suggested by > non-hacker Chris Peterson, observing for the Foresight Institute). > Linus Torvalds himself approved it the following day. And it isn't a > Linux-only thing; Keith Bostic likes it and says he thinks the BSD > community can be brought on board. > > We suggest that everywhere we as a culture have previously talked > about "free software", the label should be changed to "open source". > Open-source software. The open-source model. The open source culture. > The Debian Open Source Guidelines. (In pitching this to corporate > America I'm also going to be invoking the idea of "peer review" a > lot.) > > Bruce Perens has volunteered to register "open source" as a trademark > and hold it through Software in the Public Interest. And RMS himself > has said he'll use the term (though not exclusively) as long as the > Open Source Definition Bruce is working up isn't weaker than the > Debian Free Software Guidelines. > > And, we should explain publicly the reason for the change. Linus has > been saying in "World Domination 101" that the open-source culture > needs to make a serious effort to take the desktop and engage the > corporate mainstream. Of course he's right -- and this re-labeling, as > Linus agrees, is part of the process. It says we're willing to work > with and co-opt the market for our own purposes, rather than remaining > stuck in a marginal, adversarial position. > > It's crunch time, people. The Netscape announcement changes > everything. We've broken out of the little corner we've been in for > twenty years. We're in a whole new game now, a bigger and more > exciting one -- and one I think we can win. > > > _________________________________________________________________ > > Back to Eric's Home Page Up to Site Map $Date: 1998/02/10 03:55:36 $ > > > Eric S. Raymond > From ravage at ssz.com Tue Feb 10 08:37:35 1998 From: ravage at ssz.com (Jim Choate) Date: Wed, 11 Feb 1998 00:37:35 +0800 Subject: New: Linux Weekly News (fwd) Message-ID: <199802101637.KAA02468@einstein.ssz.com> Forwarded message: >From ravage at ssz.com Tue Feb 10 10:34:50 1998 From: Jim Choate Message-Id: <199802101634.KAA02399 at einstein.ssz.com> Subject: New: Linux Weekly News To: users at ssz.com (SSZ User Mail List) Date: Tue, 10 Feb 1998 10:34:40 -0600 (CST) Cc: friends at ssz.com (Ravage's Friends), stugreen at realtime.net X-Mailer: ELM [version 2.4 PL23] Content-Type: text Content-Length: 19324 Forwarded message: > X-within-URL: http://www.eklektix.com/lwn/ > LINUX WEEKLY NEWS > > > > > _________________________________________________________________ > > --> > > Linux Weekly News > > > > Bringing you the latest news from the Linux World. > Dedicated to keeping Linux users up-to-date, with concise news for all > interests > Published February 5, 1998 > > Sections: > Linux articles > Security > Kernel news > Distributions > Ports > Software Development > Tips and tricks > Announcements > > > Leading items > > This is going to be the year of free software. I have honestly come to > believe that. The free software movement is about to make tremendous > gains in respect and mindshare in realms where it has long been > ignored. Big software firms may want to start worrying, because the > world is changing around them. > > Anybody who didn't read Eric S. Raymond's The Cathedral and the Bazaar > paper should go and do so now. It describes the Linux development > model nicely, as well as the reasons for the success of that model. > Netscape has credited this paper with being a crucial influence in > their decision to free the source to their browser. > > As of this writing, Eric is evidently in Silicon Valley discussing > licensing terms with Netscape. The word is that he is also meeting > with several other "leading Silicon Valley CEO's" to discuss the free > software model. One wonders who else may decide to adopt the bazaar > model of development. > > Whether or not other firms follow Netscape in the near future, free > software now has a visibility that was lacking before. Peruse the set > of articles listed below, and you'll see what we mean. This can only > be good for the Linux world, as the validity of its model of > development gains the recognition it deserves. It's looking like > interesting times. > > David Miller, the force behind the Sparc and SGI ports, finally > resurfaced after a longish, low-profile period. To see what he has > been doing, check out the Cobalt Micro page. I don't know anybody who > has actually run one of these cool, blue Linux boxes, but they look > like a fun toy... > > Does unix need to be rescued from the hackers?. This item isn't > particularly new, but Michael Hoffman's article on the need for a > seamless graphical user interface for unix systems is still good food > for thought. Another person, Perry Harrington, would like to replace > the X window system with something better, and which would include a > serious user interface policy. See his page if you would like to > participate. > > Peruse the LWN Archives. > > Our obligatory Linux links page. > > Got some feedback, some news to publish, or something else you would > like to tell us? lwn at eklektix.com is our address. > > Or would you like to be notified when new editions of the Linux Weekly > News are published? Click here and send a blank message. > > Please see our contact page for other contact information. > > The permanent site for this page is here. [Articles] > > Linux in the news > > Wired news ran an article on free software last week. The obvious > point of interest was Netscape, but Linux rated some favorable mention > as well. It's a reasonable discussion of the merits of free software > in general. > > Accolades from the Emerald Isle. An article in the Irish Times > financial section is also favorable toward Linux, explicitly as an > alternative to NT. I assume that "Linux remains at the coalface > technologically [...]" is a positive thing... > > There is a four-part series on free software in news.com this week. > It's a reasonably good and sympathetic series, despite its title: > "Socialist Software." > > Many of us have heard the old argument: "There is no technical support > for Linux." Well, then, why has Infoworld awarded its 1997 technical > support award to the Linux community? It's a great bit of recognition > that just because software is free doesn't mean that it's unsupported. > Show this one to your boss. > > Ah yes, and their award for operating systems went to Red Hat 5.0... > > Two other articles in Infoworld: Nicolas Petreley thinks that > Netscape's move could be a winning strategy, while Mark Tebbe talks of > the model used by "a renegade OS such as Linux" and raises, you > guessed it, the spectre of support. > > "[Linux] is emerging as a viable competitor to Microsoft's Windows NT" > according to an article in the New York Times. Note that this site > requires registration now... The old convention of using 'cypherpunks' > for the username and password will get you in, if you don't wish to > register separately. > > The folks at TBTF ran a couple of Linux-related articles this week. > One, dedicated to estimating the size of the Linux community, comes up > with 5-7 million installed Linux systems in the world. > > We are told January's issue of Sky & Telescope has a nice Linux > article in it. We haven't seen it, though; check your local newsstand. > > > CNN's article on top selling software for January includes a reference > to Red Hat Linux. It's number three in the "Business Software > (MS-DOS/OS/2)" section. "Business software" can almost make sense, but > "MS-DOS"??? [Security] A serious X-windows security problem has > been reported in XKB, depending on X11 version and environment, which > can allow local users to exploit a "feature" XDB to execute arbitrary > programs with extra privileges. Quick vulnerability check and fix are > provided in the posting to linux-alert. You can also see Red Hat's > advisory on this bug. > > The AT&T Crowds project has chosen linux for their next target. Crowds > is intended to protect a person's anonymity as they browse the web and > already runs under SunOS, Solaris and Irix. > > The filter program that comes as part of the elm-2.4 package contains > two vulnerabilities, one of which could be remotely exploited. Details > here. > > Michal Zalewski reported a problem with gzexe, part of the gzip > package. Seems it uses predictable filenames in /tmp, which may allow > users to destroy the contents of files on your system. Use of gzexe is > not widespread, but Red Hat recommends upgrading your version of gzip. > [Kernel] The current development kernel version is 2.1.85. It > includes the ability to boot off of MD striped disks, a bunch of SCSI > changes for machines with the IBM MCA bus, bug fixes, and > documentation updates. Thus far, reported problems are few, though > there are evidently some build problems with the MCA SCSI stuff. > > Alan Cox states that TCP is "somewhat broken" in the 2.1.8x series, > "and will remain so until it's fixed." As always with development > kernels, be careful out there. Patches continue to roll in towards a > (still somewhat distant) 2.2 release. > > A stated goal, once development starts on 2.3, is reworking and > cleaning up the sound driver code. Some of you may have noticed that > it can be a bit, um, difficult to configure and make work right. It's > not clear how that development will proceed, but Colin Plumb posted a > good, concise article on some of the issues involved. > > Richard Gooch continues to update his enhancements. The MTRR patch > (MTRR stands for Memory Type Range Registers - now we all understand, > right?), which greatly speeds frame buffer access, is up to rev 1.8 > (against kernel 2.1.84). His "devfs" patch (runtime creation of the > /dev tree) is up to version 18. Both are available from his patch > page. Still no word on when (or if) these patches will go into the > 2.1 kernel. > > Unless you have a multiprocessor machine, be sure not to compile your > kernels with SMP enabled. Recent development kernels seem to be even > less than usually forgiving in this regard; SMP kernels on a > uniprocessor machine can die in weird and unpleasant ways. > Unfortunately, SMP is still the default, and is not a configuration > option; you need to edit the Makefile and comment out the SMP = 1 line > near the beginning. Believe me (voice of experience here) it's an easy > thing to forget... > > Also in the SMP arena is a flurry of activity around IO-APIC use. The > IO-APIC is an interrupt controller on multiprocessor systems which is > able to route interrupts to any CPU, thus helping to create a true > symmetric multiprocessing system. However, each motherboard seems to > do it a little different, leading to one of those bits of hardware > obnoxiousness that takes a long time to sort out. The 2.1.85 kernel > added a document describing IO-APIC for those interested in the > details. > > Is the Linux Maintenance Project dead? The question was raised this > week, since the web pages have not been updated in recent times. The > answer is that the maintainer is busy, and some new ways of running > the web pages are being worked out. Expect some activity there in the > not-too-distant future. > > William Stearns is working on a program to automate the process of > building a new kernel. Check out his web page for more info. Since > we're a weekly publication, chances are we'll be behind a rev or two > on the kernel release by the time you read this page. Up-to-the-second > information can always be found at LinuxHQ. [DISTRIBUTIONS] > > Debian > > Yes, it's true! Debian is dumping dselect! From the recent mention on > debian-announce, the new package manager meant to replace dselect is > now being demonstrated and will probably appear in 2.1 or one of the > early point releases. > > Mentioned recently on debian-announce, a Debian system was used to > develop the AMSAT Phase 3-D satellite, one of the series of Ham Radio > Satellites. Check it out here. > > A reminder to frustrated Debian users who are only finding their > favorite software in RPM format: "alien" can be used instead. If you > have trouble with alien, try upgrading to debianutils 1.6. > > The January issue of the German magazine CHIP Extra comes with a > CD-ROM containing Debian 1.3.1 and the Beta version of StarOffice 4.0 > for Linux. Review from debian-user indicates that the issue is very > well done, with a lot of useful info for both novices and users. > Here's CHIP's Web site, primarily in German. > > Red Hat > > Red Hat reports recent turn-over in their support staff which has hurt > the Red Hat installation support they provide via e-mail to people who > purchase their $50 set. They "have been working to midnight and > beyond" to catch up with the backload and have hired new staff. Robert > Hart (Red Hat's support manager) assured people on redhat-list that > Red Hat installation support will not be terminated at 30 days if a > delay on their part caused the time to run out. > > Red Hat 5.0 users have also been griping a bit about how the errata > pages are handled. Complaints include slow updates, and Red Hat's > tendency to update existing entries, making it very hard to notice a > second update for a given package. A call was made for public > announcements from Red Hat whenever updates go out. > > Users on redhat-list have been poking at > http://www.ee.surrey.ac.uk/Personal/L.Wood/IE4mk/, finding that > accessing it from Netscape 4.04 crashes some Xservers, and not others, > depending on your Xserver and Linux version. No direct link is > provided, on-purpose, but feel free to check it out!. > > Off-topic, but on the redhat-list, Dave Wreski compiled and posted a > list of free ssh-clients for Windows. He would like to see people > choose one, try it out and post a review, since interest in them is so > high. > > Slackware > > Reported on bugtraq: Imapd/ipop3d problems in slackware 3.4 if you > install the pine package. When fed an unknown username, imapd and > ipop3d will dump core. Details here. Patrick Volkerding [maintainer of > Slackware] has already responded and will put out a repaired package. > > S.u.S.E > > For the Linux trivia buffs, S.u.S.E stands for 'Software und System > Entwicklung', which means software and system development. If you're > interested in S.u.S.E's history, check out this post from Bodo Bauer. > > How do you pronounce S.u.S.E? A popular Americanism is "Suzie", but if > you ask in Germany, the pronunciation will be closer to "Seuss-eh" (as > in Doctor Seuss) or "Souss-uh". Boy was it fun to watch people try and > describe a sound in an e-mail message! > > There are a lot of converts from various Unix flavors on the > suse-linux-e list (of course!). If you're interested in comments from > one person who recently installed the distribution, check it out. > [Ports] > > Alpha > > At least one Linux system vendor (Net Express) has stopped selling > Alpha-based systems as a result of the Compaq takeover of Digital. See > their Alpha systems page for details on their reasoning. On the other > hand, most other vendors and the Alpha discussion lists remain > relatively calm on this subject, suggesting that not everybody is > worried. > > There is an article in SunWorld Online about the Compaq takeover. No > real conclusions, but they raise some concerns. > > Sparc > > People are already asking whether SPARC/Linux will run on the new, > PCI-based Ultra workstations. No definitive answer has been posted, > but it seems awfully unlikely. The new bus, new video, and (oh joy) > IDE disks are all stuff that SPARC/Linux has never had to deal with > before. /td> [Software Development] Almost overnight, the > linux-ha (linux high-availability list) has revived and is generating > good discussion! If you are interested in high-availability Linux > solutions, now is the time to get involved! You can subscribe to > linux-ha on the Linux Mailing Lists page. > > [Articles] Some folks are discovering they can no longer access > hosts with underscores in their names. Host names with underscores > have always been against the rules, but many systems have let them > work anyway. However, the new GNU C library, shipping with the latest > Linux distributions, enforces this rule. If you have host names with > _underscores_, you might want to consider renaming them soon. > > Want to run Oracle 7.3.3 under Linux? Jan Andersen posted a detailed > howto describing the path to there using the IBCS package. > > If you see these errors from Netscape Communicator 4.04: > > sh: -c line 1: missing closing `)' for arthmetic expression sh: -1 > line 1: syntax error near unexpected token `;' sh: -c line 1: > `((/usr/local/bin/rvplayer /tmp/MO34B2F4B209B0136.ram); rm /tmp/\ > MO34B2F4B209B0136.ram )&' > > your problem is actually probably your version of bash. Try upgrading > to the latest version (2.01) to fix the problem. > [Announcements] > > Software and documents > > Package Version Description accton 4.0 Driver for Accton pocket > ethernet adaptor buslogic 2.0.11 Leonard Zubkoff's outstanding > BusLogic SCSI adaptor driver CD patch Patch to 2.0 33 kernel to > support new CD formats datapult 2.02 Scripting language for web > servers ddd 2.2.2 Graphical front end to gdb (very nice) FireMyst 0.8 > Small, UMSDOS-based system (for recovery diskettes) fnorb 0.4 CORBA > object request broker for Python. One of the best-named packages out > there, in your editor's opinion. freetype 1.0 TrueType font rendering > engine ImageMagick 4.0 Amazing image manipulation/conversion system > KDEbeta 3 K desktop environment lftp 0.14.0 Command-line FTP client > lilo-color Patch to Lilo 20 to display boot messages in color linbot > 0.3 Web site management tool mat 0.15 System administration tool plor > 0.3.2 Offline mail and news reader secure-linux Patch to kernel 2.0.33 > to add a number of security features. SMS client 2.0.5 Send SMS > messages to mobile phones snipix 2.12 Run SNA (and talk to your old > IBM mainframes) on your Linux box. Free for Linux, commercial for > other OS's. Software Building mini-HOWTO 1.52 HOWTO on building > software from source StarOffice 4.0 Office suite, free for private use > TkInfo 2.4 Tcl/Tk-based info browser TtH 1.1 Translate TeX to HTML > webalizer beta WWW server log analysis xbomb 2.1 X-based minesweeper > game LLNL XDIR 2.1 Motif-based graphical FTP client xtc 0005 X toolkit > in Java zed 1.0.1 "Fast, powerful, simple, configurable" text editor. > --> > > Projects > > A bunch of ambitious folks have announced the Java/Linux NC project. > They want to provide a complete network computer implementation, with > a full set of Microsoft-type applications, for free. Java and Linux > are their tools. It's a big project, and I wish them luck; check out > their announcement for more info, or to join up. > > Other folks want to clone Userland's "Frontier" scripting environment. > See their announcement for more. > > A volunteer-supported (commercial) Webzine, 32 Bits Online is looking > for LINUX writers to share with the world why Linux is their operating > system of choice. If you're interested in an audience for your > opinions, send e-mail to Ronny Ko. > > The Virtuoso project seeks to put together a fancy 3d graphics package > for Linux. See their announcement if you would like to help. > > The folks with the amazing samba project are setting out to create a > free NT domain controller. > > The Linux Clothing Project moves into a new phase of Linux fashion. > Heaven forbid we have any naked Linuxes out there... > > Web Sites > > The LSDB (Linux Software Database), a cgi searchable database of linux > software has moved. The new address is http://www.egypt.pca.net. > > Events > > 1998 Atlanta Linux Showcase, October 23 - 24, 1998, Atlanta, Georgia. > > Asia and Pacific Rim Internet Conference on Operational Technologies > (APRICOT). Manila, Philippines, February 16-20, 1998. > > On the lighter side > > A native returning "down under" after a year and a half gives a note > on Linux' increased popularity in Australia. > > Some fear that the joke announcement that Linus was going to integrate > Netscape into the Linux Operating System may have the same lifespan as > the Good Times Virus ... Eklektix, Inc. Linux powered! This > page is produced by Eklektix, Inc. > From majordomo at bulkemailserver.com Wed Feb 11 01:08:55 1998 From: majordomo at bulkemailserver.com (majordomo at bulkemailserver.com) Date: Wed, 11 Feb 1998 01:08:55 -0800 (PST) Subject: Please send information Message-ID: <> Please send us more information on your product, service, business and/or money making opportunity. We are always looking for more ways to make money and looking for resources to refer to our customers. You may send us your information at insane.income2 at mailexcite.com Do not hit reply because we will not receive it. Do you need a NEW IDENTITY/ NEW ID/ PRIVACY/ PROTECTION/ CREDIT? If yes, send an email to our Auto Responder at newid-info at freeyellow.com Within minutes you should automatically receive more detailed information. There is no need to type a message to us because we will not see. The auto responder is an automated service that is programmed to send what we have already entered. Do to the HIGH DEMAND FOR THIS INFORMATION your email may not go through. If after 10 minutes you haven't received anything than fax us at (209) 952-8555 and request the "NEW IDENTITY" information. HURRY, get the information NOW! We have a time limited SPECIAL OFFER. The information says that special expires on Feb. 16, 1998, but because of the holiday we have extended the special 2 more days, until Feb. 18, 1998! Thank you for your time. Remember, please send us information on your offer (please DO NOT fax it, email it only). P.S. If you want to find out how we got RICH from the internet go to http://www.freeyellow.com/members2/insaneincome. FREE INFORMATION! You may also email your request to insane.income at mailexcite.com Please state that you want "FREE INFORMATION ON HOW TO GET RICH ON THE INTERNET" (Please DO NOT fax this request, email it only). THANKS AGAIN! financehelp at juno.com financehelp at juno.com financehelp at juno.com financehelp at juno.com financehelp at juno.com insane.income at mailexcite.com new.you at mailexcite.com From majordomo at bulkemailserver.com Wed Feb 11 01:08:55 1998 From: majordomo at bulkemailserver.com (majordomo at bulkemailserver.com) Date: Wed, 11 Feb 1998 01:08:55 -0800 (PST) Subject: Please send information Message-ID: <> Please send us more information on your product, service, business and/or money making opportunity. We are always looking for more ways to make money and looking for resources to refer to our customers. You may send us your information at insane.income2 at mailexcite.com Do not hit reply because we will not receive it. Do you need a NEW IDENTITY/ NEW ID/ PRIVACY/ PROTECTION/ CREDIT? If yes, send an email to our Auto Responder at newid-info at freeyellow.com Within minutes you should automatically receive more detailed information. There is no need to type a message to us because we will not see. The auto responder is an automated service that is programmed to send what we have already entered. Do to the HIGH DEMAND FOR THIS INFORMATION your email may not go through. If after 10 minutes you haven't received anything than fax us at (209) 952-8555 and request the "NEW IDENTITY" information. HURRY, get the information NOW! We have a time limited SPECIAL OFFER. The information says that special expires on Feb. 16, 1998, but because of the holiday we have extended the special 2 more days, until Feb. 18, 1998! Thank you for your time. Remember, please send us information on your offer (please DO NOT fax it, email it only). P.S. If you want to find out how we got RICH from the internet go to http://www.freeyellow.com/members2/insaneincome. FREE INFORMATION! You may also email your request to insane.income at mailexcite.com Please state that you want "FREE INFORMATION ON HOW TO GET RICH ON THE INTERNET" (Please DO NOT fax this request, email it only). THANKS AGAIN! financehelp at juno.com financehelp at juno.com financehelp at juno.com financehelp at juno.com financehelp at juno.com insane.income at mailexcite.com new.you at mailexcite.com From tcmay at got.net Tue Feb 10 09:20:12 1998 From: tcmay at got.net (Tim May) Date: Wed, 11 Feb 1998 01:20:12 +0800 Subject: Cyber 'Nannys" In-Reply-To: Message-ID: At 12:40 AM -0800 2/10/98, WebWarrior3 at InfoWar.Com wrote: >Tim May wrote: > >> I don't mean to be flippant . At issue here is a very real issue of free >> choice and contracts. Customers cannot "demand" a list of criteria for >> blocked sites any more than customers can demand a list of the selection >> criteria a bookstore uses, or a magazine editor uses, and so on. > >Ever hear of consumer protection laws? There are many cases where consumers >are allowed to "demand" information regarding their purchases...you were being >flippant. One subscribes to a magazine because one knows what the focus of the No, I was _not_ being flippant (which was what I said). I was being libertarian. As far as I'm concerned, absent a contract, anyone who "demands" something from me is on thin ice. Like I said, if you're unhappy that CyberSitter or NetNanny will not provide you with information you wish to have, use another service. But don't cite "Consumer Protection Laws." --Tim May Just Say No to "Big Brother Inside" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From eureka at eureka.abc-web.com Wed Feb 11 01:41:39 1998 From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com) Date: Wed, 11 Feb 1998 01:41:39 -0800 (PST) Subject: Eureka! Wed Feb 11 '98 Message-ID: <19980211081945.29762.qmail@eureka.abc-web.com> Welcome to Wednesday's issue of Eureka! HE GIRLS! This site calls itself "The original She-Male, slut wonder- land", and it's hard not to agree. With multiple live she- male slut video feeds. Huge numbers of amazing shemale pics, extra hot stories and so much more, you'll just love this site. And what's more, we have arranged a special free trial membership for all Eureka! subscribers. So go check it out! HeGirls ... http://207.33.10.198/cgi-bin/gate1/pbm/he_0024/0 COLLEGE NUDES GET NASTY http://www.collegenudes.com/eureka.htm BRAND NEW SITE!!! Just opened. The hottest AMATEUR TEENS getting nasty. Pics In All Categories, and tons of Porno material. Cum Back to School for The Hottest sex on the Web. LESBIANS Free hot pix! Wet pink pussy, models and young ones. Simple interface, just text links to jpeg images. Check out number seven, she has a star trek style shaved pussy. It's a quickie! Lesbians ........ http://207.30.50.221/lesbians/lesbian.html SIR CUM A LOT Not a bad website. Stop on by and see the samples for this paysite. They are all quick and easy thumbnails. Featuring panty, pussy, teen, asian, big tits, blowjob and a lot more! Sir Cum A Lot .......... http://www.sircumalot.com/main.html PAGINA DO ROSERA We had to go around the world to find this one! Easy text links to huge super high resolution images of pussy and dick. Double dicks in one mouth, and a wild shot of a large glass electrical insulator up some womans vagina! You must see it! pagina Do Rosera ........... http://www.gold.com.br/~rosera/ MICHELLE Now I know why the Beatles sang about Michelle. This one very sweet hot young amateur teen. She is images of herself in various states of dress including a cheerleading outfit, up her skirt shots and a great bedroom image with some nipple action showing. Check this little lady out for certain! Michelle .............. http://mhgnet.com/michelle/mich.html READ THIS!! WIN $25,000 and a Fantasy Date - Click Here Now! $25,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A HOORAY! THE ADULT SEARCH ENGINE Now you can search for the sex sites you are looking for and fast! This new search engine is setting the standard others will follow. It offers pop-up search and detailed listings! Hooray! -----------------> http://eureka.abc-web.com/hooray/ FREE STREAMING VIDEO Please note that most of these feeds require a Netscape bro- wser in order to successfully view them. Unfortunately Micr- osoft's browser does not have all the features of Netscape's yet. However, many of the feeds use the RealPlayer and will work in most browsers. If you do not have Netscape and want a free copy click here --> http://www.netscape.com/download/ Pregnant ----------------------> http://207.168.184.26/preg/ CHAT WITH OTHER READERS Hey, if you haven't checked out the Eureka! Chat sites yet, you're missing out on some great stuff. Every day you'll find hundreds of other readers just like you looking to chat have fun and maybe a little 'cyber'. We know you'll love it! Adult/Sex Chat -----------------> http://137.39.63.229/chat/ General/Fun Chat -------> http://137.39.63.229/chat/funchat/ HOT LIVE PHONE SEX TO MAKE YOU CUM! LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912 LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779 FREE: Live 1-on-1 (international call only)--->011-678-77416 NEW! CENTERFOLD PIC OF THE DAY Exclusive! We proudly present unpublished Pictures of your favorite Centerfolds. Featured This Week: Dec 80-PMOY Terri Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri Kendall, Rebecca Ferratti, Lydia Schone and many more too! ---------------------------> http://www.gatefold.com/eureka/ AMATEUR SITE OF THE DAY Wendy: "A fine ass blonde co-ed with perky tits" is how one person describes this beautiful babe. Her hobbies include writing and drawing, this talented woman is the girl next door. She loves computers and sex (imagine that!) so visit her and see if she will interface with your HARD drive. ---------------------------> http://amateurindex.com/eureka/ EROTIC STORY SITE OF THE DAY TeenStories.com: Dozens of steamy sex stories about teen sexual experiences! This site is as hot as they come! Visit TeenStories.com today! ......... http://www.teenstories.com/ DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/ ADULT STAR PIC OF THE DAY Woah, our Adult Star pics are getting hotter and hotter, so make sure you stop by and check out today's - definitely not to be missed! --------> http://www.xxxadultstars.com/eureka/ OTHER EUREKAS! GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/ DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm ESPA�OL ------> http://eureka.abc-web.com/eureka/espanol.htm FRAN�AIS ----> http://eureka.abc-web.com/eureka/francais.htm ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm TODAY'S FREE PIX Pic 1 --------------------------> http://137.39.63.229/?110 Pic 2 --------------------------> http://137.39.63.229/?111 Pic 3 --------------------------> http://137.39.63.229/?112 Pic 4 --------------------------> http://137.39.63.229/?113 Pic 5 --------------------------> http://137.39.63.229/?114 Pic 6 --------------------------> http://137.39.63.229/?115 Pic 7 --------------------------> http://137.39.63.229/?116 Pic 8 --------------------------> http://137.39.63.229/?117 Pic 9 --------------------------> http://137.39.63.229/?118 Pic 10 --------------------------> http://137.39.63.229/?119 ============================================================ TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US. ============================================================ From ravage at ssz.com Tue Feb 10 09:51:08 1998 From: ravage at ssz.com (Jim Choate) Date: Wed, 11 Feb 1998 01:51:08 +0800 Subject: [Fwd: The Caldera lawsuit vs MS: alive and well] (fwd) Message-ID: <199802101750.LAA03216@einstein.ssz.com> Forwarded message: >From owner-alg-l at lists.io.com Tue Feb 10 11:24:16 1998 Message-ID: <34E08D1C.9FDF1AF8 at bga.com> Date: Tue, 10 Feb 1998 11:23:40 -0600 From: Stu Green X-Mailer: Mozilla 4.03 [en] (X11; I; Linux 2.0.33 i586) MIME-Version: 1.0 To: alg-l at lists.io.com Subject: [Fwd: The Caldera lawsuit vs MS: alive and well] Content-Type: multipart/mixed; boundary="------------9A07051BBF5BBA9469DB7E8D" Sender: owner-alg-l at lists.io.com Precedence: bulk Reply-To: alg-l at lists.io.com This is a multi-part message in MIME format. --------------9A07051BBF5BBA9469DB7E8D Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit --------------9A07051BBF5BBA9469DB7E8D Content-Type: message/rfc822 Content-Transfer-Encoding: 7bit Content-Disposition: inline Received: from mail1.realtime.net (mail1.realtime.net [205.238.128.217]) by zoom.bga.com (8.6.12/8.6.12) with SMTP id LAA21596 for ; Tue, 10 Feb 1998 11:00:38 -0600 Received: (qmail 28812 invoked from network); 10 Feb 1998 17:00:33 -0000 Received: from rim.caldera.com (207.179.39.2) by mail1.realtime.net with SMTP; 10 Feb 1998 17:00:33 -0000 Received: (qmail 4352 invoked by uid 87); 10 Feb 1998 17:00:23 -0000 Delivered-To: majordom-caldera-users at rim.caldera.com Received: (qmail 4340 invoked by uid 87); 10 Feb 1998 17:00:21 -0000 Received: (qmail 4331 invoked from network); 10 Feb 1998 17:00:18 -0000 Received: from bigbird.telly.org (198.53.146.159) by rim.caldera.com with SMTP; 10 Feb 1998 17:00:18 -0000 Received: from elmo.telly.org [204.187.86.2] by bigbird.telly.org with smtp (Exim 1.73 #1) id 0y2J2d-0004bq-00; Tue, 10 Feb 1998 12:00:15 -0500 Date: Tue, 10 Feb 1998 12:00:15 -0500 (EST) From: Evan Leibovitch To: Caldera Users Mailing List Subject: The Caldera lawsuit vs MS: alive and well Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: majordom-caldera-users-owner at rim.caldera.com Precedence: bulk Reply-To: caldera-users at rim.caldera.com Personal note: This amendment appears to be fairly significant. Previously, the suit was only against practises related to MS-DOS; now Windows95 and 3.1 are part of the deal. At this point a settlement seems unlikely; November could be a *real* interesting month. - Evan ----------------------------------------------------------------- FEDERAL COURT ALLOWS CALDERA TO FILE AMENDED ANTITRUST COMPLAINT AGAINST MICROSOFT Nation's Only Private Antitrust Lawsuit Against Microsoft Adds Claim that Microsoft Illegally Tied MS-DOS Into Windows 95 Orem, UT -- Feb 10, 1998 -- The Federal Court hearing Caldera's antitrust lawsuit against Microsoft has agreed to allow Caldera to amend its complaint and introduce evidence at trial that Microsoft illegally created a technical tie of MS-DOS into Windows 95. Caldera claims that the unnecessary technical tie of MS-DOS into Windows 95 artificially created an impression that DOS on the desktop was dead. In court, Caldera will show that this act and other practices illegally eliminated competition to MS-DOS. This latest court decision allows Caldera to extend its claims of illegal behavior and its request for financial damages to include both historical and existing practices. With this amendment, the courts are allowing Caldera to include consideration of Microsoft's Windows 95, Windows 3.1 and MS-DOS market shares when calculating both the industry effect of Microsoft's alleged monopolistic practices and the financial damages being sought by Caldera. "This amendment to our antitrust case is not about the benefits or features of Windows -- it is about an illegal tie of MS-DOS into Windows 95. We allege Microsoft created this illegal, artificial tie for the dominant purpose of eliminating competition," said Bryan Sparks, President and CEO of Caldera. "The evidence we have to support this new claim coupled with the evidence we have to support our other claims extends our conviction that we will win." Caldera can demonstrate that Windows 95 runs on DR-DOS, Caldera's version of DOS, demonstrating that no technological dependency exists between MS-DOS and Windows 95. In court, Caldera will use this fact to prove that the unnecessary tie between MS-DOS and Windows 95 is one of the many illegal and predatory tactics Microsoft has used and continues to use to maintain its desktop monopoly power. In November 1997, the court denied Microsoft's motion to change the venue of Caldera's trial from Salt Lake City, Utah, to Seattle, Washington. This case is currently scheduled for jury trial in November 1998 in Federal Court located in Salt Lake City, Utah. --------------9A07051BBF5BBA9469DB7E8D-- --- To unsubscribe send the message "unsubscribe alg-l" without quotes to majordomo at lists.io.com Send questions to owner-alg-l at lists.io.com From bill.stewart at pobox.com Tue Feb 10 10:12:51 1998 From: bill.stewart at pobox.com (Bill Stewart) Date: Wed, 11 Feb 1998 02:12:51 +0800 Subject: What's the latest in factoring? (fwd) In-Reply-To: <199802100105.TAA25850@einstein.ssz.com> Message-ID: <3.0.5.32.19980210005500.00882c40@popd.ix.netcom.com> At 07:05 PM 2/9/98 -0600, Jim Choate wrote: ... >> an NSA internal one; in the unlikely event that Moore's law lets >> us double processing power 100 times in the next 150 years, >> that means a 1500-bit key could be crackable. So 2048 bits >> is certainly more than enough for _your_ lifetime. > >That depends on what current and near-future medical technology can do >to extend the lifespan of humans. If your assumption is that most folks >younger than about 50 will be dead in 75 years I suspect that you're in for >a nasty surprise. That is my assumption, and being wrong would be a highly pleasant surprise. >The reason I posted those cc:'s regarding such research is >enough that current estimates of key strength based on human life times need >to be re-evaluated. If Moore's law plus algorithm improvements can give us a 2**150 increase in processing power over the next 200 years, and I'm around to see it, I'll be very surprised. (Or I'll be posthumously surprised, if I'm not around.) On the other hand, if that's true, we'll be in something like the nanotech singularity, where eavesdropping will make up for any remaining difficulty in key cracking, as I'd also discussed. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From tcmay at got.net Tue Feb 10 10:16:31 1998 From: tcmay at got.net (Tim May) Date: Wed, 11 Feb 1998 02:16:31 +0800 Subject: Narcware In-Reply-To: Message-ID: At 1:34 PM -0800 2/9/98, Adam Back wrote: >I am not sure I want to see my computer narcing out over RF >frequencies what software is installed -- once enabled for corporates Why not monkeywrench the narcware to narc out falsely? Imagine 100 copies of a program all screaming "Bill Gates"! (ObCrypto: One can imagine methods to broadcast a new signifier each time a program is started...some kind of zero knowledge approach. But this gets difficult when the broadcast program is under the control of those trying to defeat the system. A well known problem. E.g., if N copies are all identical, and the ZKIPS approach is generated in software, the N copies will overlap signals. And so on. I expect the Anderson-Kuhn approach broadcasts a single identifier, though I have not yet had time to look at their paper, so I may be wrong here.) Narcware will face a lot of customer resistance. --Tim May Just Say No to "Big Brother Inside" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From declan at well.com Tue Feb 10 10:20:12 1998 From: declan at well.com (Declan McCullagh) Date: Wed, 11 Feb 1998 02:20:12 +0800 Subject: Cyber 'Nannys" In-Reply-To: <34DF87FE.611AA4EF@InfoWar.Com> Message-ID: Some of my articles are at: http://cgi.pathfinder.com/netly/spoofcentral/censored/ As for the market, it's already deciding. NetNanny does NOT encrypt its list of blocked sites and is using that as a competitive advantage. -Declan At 23:23 -0800 2/9/98, Tim May wrote: >At 2:49 PM -0800 2/9/98, WebWarrior3 at InfoWar.Com wrote: > >>While I do not disagree that these companies should be able to market >>their products, I wholeheartedly disagree with the fact that often their >>customers (the adults who bought the software or subscribed to he >>'service') are not allowed to have a list of what is actually blocked, > >So you wholeheartedly disagree that they are not giving you a list of what >is blocked...so go use another service. > >I don't mean to be flippant. At issue here is a very real issue of free >choice and contracts. Customers cannot "demand" a list of criteria for >blocked sites any more than customers can demand a list of the selection >criteria a bookstore uses, or a magazine editor uses, and so on. > >I make fun of Cyber Sitter and other Net.Nannies, but there's no role for >"disagreeing with the fact" (whatever that infelicitous expression may >mean) that they usually don't publicize their criteria. > >If you can figure out their criteria, great. Brock Meeks and Declan M. >figured out some criteria a while back in an interesting article. But make >sure that your "disagreeing with the fact" is not translated into calling >for disclosure laws. That way lies statism. > >--Tim May > > >Just Say No to "Big Brother Inside" >---------:---------:---------:---------:---------:---------:---------:---- >Timothy C. May | Crypto Anarchy: encryption, digital money, >ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero >W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, >Higher Power: 2^3,021,377 | black markets, collapse of governments. From declan at well.com Tue Feb 10 10:26:13 1998 From: declan at well.com (Declan McCullagh) Date: Wed, 11 Feb 1998 02:26:13 +0800 Subject: Cyber 'Nannys" In-Reply-To: Message-ID: There are many bad laws on the books. Doesn't mean they're good ones, WebWarrior3. Many "consumer protection" laws in truth hurt consumers through more government regulation, reduced competition, and higher prices. -Declan At 03:40 -0500 2/10/98, WebWarrior3 at InfoWar.Com wrote: >Ever hear of consumer protection laws? There are many cases where consumers >are allowed to "demand" information regarding their purchases...you were being >flippant. One subscribes to a magazine because one knows what the focus of the >content is and one chooses to receive that periodical; not because the >magazine MAY have an editorial policy to not cover any stories on the >"Oddities of Toenail Fungus in Bleached Blonde Yaks from Manhattan." >There are already consumer protection laws. I don't think that this is a >concentration of extensive economic controls in the State, do you? Really, >Tim... > >It is neither my option nor is it my responsibility to change someone's little >paranoid mind should they confuse consumer protection with statism, that is a >job for a psychiatrist or a professor. From Markus.Kuhn at cl.cam.ac.uk Tue Feb 10 10:40:58 1998 From: Markus.Kuhn at cl.cam.ac.uk (Markus Kuhn) Date: Wed, 11 Feb 1998 02:40:58 +0800 Subject: TEMPEST In-Reply-To: <199802100340.VAA27056@einstein.ssz.com> Message-ID: Jim Choate wrote on 1998-02-10 03:40 UTC: > 11MHz base frequency won't produce a clean ring at 125MHz or 210MHz, they're > not a whole number multiple of the base. How is this accounted for? What did > he calculate the Q at? At what range was he picking up these harmonics as > well as the base? The lower harmonic implies a 4MHz beat and the higher a > 1MHz beat, how did he account for these signals? Personaly I would be more > inclined to suspect the information was riding on the beats. He didn't > happen to measure the frequencies to 3 decimal places did he? You might want to consider to read van Ecks paper yourself: Wim van Eck: Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk? Computers & Security 4 (1985) 269--286 If you don't have C&S in your library, you might also find a scan on > > If you have only a van Eck style receiver, yes. But as soon as you record > > the reception over some time and observe the images phases to drift only > > slightly against each other, you might be able to separate them using > > similar processing techniques as used in computer tomography. > > As I alluded to with the comment I made about integrating the received > signals. The easiest way to do this sort of stuff with a small budget is > with a flying capacitor integrator. Please explain! I was more thinking in terms of digitizing everything and solving large per-pixel systems of equations to separate the drifting images, which does not sound much like something equivalent to a single hardware integrator, but more like something that keeps a workstation very busy for a few minutes. Markus -- Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK email: mkuhn at acm.org, home page: From WebWarrior3 at InfoWar.Com Tue Feb 10 10:47:11 1998 From: WebWarrior3 at InfoWar.Com (WebWarrior3 at InfoWar.Com) Date: Wed, 11 Feb 1998 02:47:11 +0800 Subject: Cyber 'Nannys" In-Reply-To: Message-ID: <34E09E8A.73AF7CAB@InfoWar.Com> Tim May wrote: > As far as I'm concerned, absent a contract, anyone who "demands" something > from me is on thin ice. When you purchase or sell anything you enter into a contract with the other party, hence:UNIFORM COMMERCIAL CODE Article 21) In this Article unless the context otherwise requires "contract" and "agreement" are limited to those relating to the present or future sale of goods. "Contract for sale" includes both a present sale of goods and a contract to sell goods at a future time. A "sale" consists in the passing of title from the seller to the buyer for a price (Section 2-401). A "present sale" means a sale which is accomplished by the making of the contract. As far as I can tell, every state other than Louisianna have accepted the UCC as their state business law. Additionally, many states have a law similar to: Deceptive Practices SDCL 37-24-6 It is a violation of state law: (2) To knowingly and intentionally conceal, suppress or omit any material fact in connection with the sale or advertisement of merchandise. > Like I said, if you're unhappy that CyberSitter or NetNanny will not > provide you with information you wish to have, use another service. I never implied that I would use such trash...I trust that my eight year old my daughter understands what to do if she comes across something that is not appropriate for her viewing as far as our family values are concerned. Thanks you for permission, however, should I ever feel the need to allow a corporation to be (in your terms) Big Brother to my daughter, I will feel justified in that you have personally given me the leave to do so. > But don't cite "Consumer Protection Laws." Why not? Scott R. Brower http://www.infowar.com http://www.efflorida.org From ravage at ssz.com Tue Feb 10 11:01:58 1998 From: ravage at ssz.com (Jim Choate) Date: Wed, 11 Feb 1998 03:01:58 +0800 Subject: TEMPEST (fwd) Message-ID: <199802101901.NAA04520@einstein.ssz.com> Forwarded message: > Subject: Re: TEMPEST > Date: Tue, 10 Feb 1998 18:32:28 +0000 > From: Markus Kuhn > You might want to consider to read van Ecks paper yourself: > > Wim van Eck: Electromagnetic Radiation from Video Display Units: An > Eavesdropping Risk? Computers & Security 4 (1985) 269--286 > > If you don't have C&S in your library, you might also find a > scan on I read the paper when it came out, but that's been a while now..:) Thanks for the reference, I'll take a look at it over the next few days. > > As I alluded to with the comment I made about integrating the received > > signals. The easiest way to do this sort of stuff with a small budget is > > with a flying capacitor integrator. > > Please explain! I was more thinking in terms of digitizing everything > and solving large per-pixel systems of equations to separate the drifting > images, which does not sound much like something equivalent to a > single hardware integrator, but more like something that keeps a > workstation very busy for a few minutes. I'll describe how it works in hardware and then how I've done it in software. Hardware: You have a bank of n capacitors that are hooked to a amplifier via a mux. You use a counter that you start with some sort of trigger that sequentialy connects each cap in turn to the amplifier. The charge and as a consequence the voltage varies depending upon whether the new voltage is higher or lower than the last sample. The assumption being that the signal itself is time invariant and that the variations in signal strength are noise and random in nature. After only 3-4 cycles through the cap bank you begin to pull a workable signal out of the noise. The nice thing is that this works for signals that are below the noise floor and buried in the grass. In a VanEck monitoring situation you'd need a bank of n capacitors where n is the number of horizontal pixels. You will also need to array each bank into a m row matrix where m is the number of scan lines. You can get around some of the bulk by using a gyrator circuit to synthesize the capacitor and some sample-and-holds to synthesize the array. The advantage here over software is that this signal can be sampled as its built in real-time (use instrumentation amps) unless you happen to have dual-port ram in your computer (I've never had access to such hardware) and fed to whatever equipment you want to process it. Software: You take a A/D converter and drive an array with it. You sync it the same sort of way as the hardware methods above. Each element in the array contains the current estimate for that particular sample of the total waveform. Each time you come back to the same array element you compare the last value to the new value. You take the value that is half-way between the two and store that as the new array value for the next cycle. In short order a signal comes out. Either the hardware or software method will naturaly integrate the signal within the sample window because of the capacitor effect. This compensates for clock and signal jitter quite nicely. This method will require a D/A conversion process if you want to feed it to any external equipment. Though it should be perfect for Van Eck monitoring. Simply use your video frame buffer as your sample storage array. Enjoy. ____________________________________________________________________ | | | The obvious is sometimes false; | | The unexpected sometimes true. | | | | Anonymous | | | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From WebWarrior3 at InfoWar.Com Tue Feb 10 11:06:49 1998 From: WebWarrior3 at InfoWar.Com (WebWarrior3 at InfoWar.Com) Date: Wed, 11 Feb 1998 03:06:49 +0800 Subject: Cyber 'Nannys" In-Reply-To: Message-ID: <34E0A2B9.F4F4AFA0@InfoWar.Com> Declan McCullagh wrote: > There are many bad laws on the books. Doesn't mean they're good ones, > WebWarrior3. > > Many "consumer protection" laws in truth hurt consumers through more > government regulation, reduced competition, and higher prices. > > -Declan > I do not claim to be a specialist in consumer protection and you may be right that there are many laws that end up hurting consumers. I don't know of any, but they may be there...You mentioned: Government regulation, as in your car or kerosene heater has to meet certain criteria before it is sold? Reduced competition, as in the case where a company wants to produce an item that is unsafe or does not do what it is supposed to and is not allowed to market it? Higher prices--I would rather pay a higher price and know that if the product does not perform as indicated or purported I have recourse than pay less for a product that does not work and end up being stuck with it. Ya get what ya pay for (not including taxes) generally, or you get what you can afford as the case may be. I seriously doubt that consumer protection laws have kept anyone from being able to afford a product they would have otherwise been able to enjoy. Scott R. Brower http://www.infowar.com http://www.efflorida.org From declan at well.com Tue Feb 10 11:13:48 1998 From: declan at well.com (Declan McCullagh) Date: Wed, 11 Feb 1998 03:13:48 +0800 Subject: Sen. Feinstein explains why she supports crypto-restrictions Message-ID: ---------- Forwarded message ---------- Date: Tue, 10 Feb 1998 11:00:33 -0800 (PST) From: Declan McCullagh To: politech at vorlon.mit.edu Subject: Sen. Feinstein explains why she supports crypto-restrictions ---------- Forwarded message ---------- Date: Mon, 9 Feb 1998 20:15:42 -0800 From: Christopher Allen Subject: Re: Letter to Senator Dianne Feinstein I received a response to the "Letter to Senator Feinstein" today. It reads as follows: February 3, 1998 Mr. Christopher Allen President and CEO Consensus Development Corporation 2930 Shattuck Avenue Suite 206 Berkeley, California 94705 Dear Mr. Allen This is in response to a January 16th unsigned letter from a group of high technology companies on encryption policy. In this letter, you urge me to meet regularly with representatives from the companies who sent the letter. I want to assure you that both I and my staff do meet regularly with executives from California firms who are concerned about all aspects of our government's laws and policies regarding the high tech industry. Indeed, I cannot recall ever rejecting a request for a meeting with a CEO on the issue of encryption or other matters of great import. Should you or any of your co-signers wish to meet with me, please just call my or my scheduler, Trevor Daley at 202/224-9636. With regards to my position on encryption, I have no one solution that I favor, included mandated key recovery. However, I am concerned that whatever solution is devised must provide solutions to the issues raised by FBI Director Louis Freeh, which have been reinforced by classified briefings and public hearings that I have attended. Should you have any additional questions about my views on encryption please review a Question & Answer interview I gave to the San Jose Mercury News last September. My answers, though general in nature, accurately set forth my thinking. However I recognize the complicated nature of encryption and am eager to hear industry proposals. I look forward to a continuing dialogue on this issue with you and your colleagues. With warmest personal regards. Sincerely yours, Dianne Feinstein United States Senator DF:seg (enclosure: "Why Feinstein is supporting encryption curbs", San Jose Mercury News, Monday, September 15th, 1997, page 1E) ------------------------------------------------------------------------ ... ** NOTE NEW OFFICE ADDRESS & PHONE NUMBER ** .. ... Christopher Allen Consensus Development Corporation .. ... President & CTO 2930 Shattuck Ave. #206 .. ... Berkeley, CA 94705-1883 .. ... o510/649-3300 f510/649-3301 .. From honig at otc.net Tue Feb 10 11:27:18 1998 From: honig at otc.net (David Honig) Date: Wed, 11 Feb 1998 03:27:18 +0800 Subject: Algorithms used in PGP 5.x; Relative strength of Blowfish In-Reply-To: <199802092337_MC2-32B1-60F5@compuserve.com> Message-ID: <3.0.5.32.19980210111529.007b75a0@otc.net> At 11:36 PM 2/9/98 -0500, Alan Tu wrote: >anything besides 3DES and IDEA, what are their relative strengths to 3DES >or IDEA? Before you can measure something's strength, you have to define the stress. Are you twisting it or bending it? Compressing or pulling? Are you trying an exhaustive keyspace search? Are you trying to find a weak key? Or some information leaking through? Can you pick the plaintext to put through the system, and twiddle bits? Or does your adversary only have access to some plain + cipher pairs? None of the algorithms has been shot out of the water. All of them annoy statists, since they can use more bits than is convenient to search through. That's why 40-bit anything is laughable. >Also, what's the relative strength of Blowfish to 3DES or IDEA? Its key >length is variable, as I recall. Could someone tell me the range? 3DES uses 3 x 56 bits of user key, 56 bits being the DES keylength, defined by the Feds by neutering IBM's Lucifer system. DES uses some fixed tables with unknown (but upon investigation, apparently good) properties. Blowfish uses over 4Kbytes of internal key, derived from a user-key of up to 448 bits by mixing the user-key with random digits in a computationally expensive way that slows keysearch. Both Blowfish and DES are based on Feistel networks, ie, iterations of rounds containing permutations, substitutions, addition and xors, including data-dependant operations (ie, one fraction of the input data (as well as the user's key, or derivations thereof) modifies the other fraction in each round). The 'fractions' are usually halves, but unbalanced feistel networks have been studied too (e.g., McGuffin algorithm). BF was designed with modern 32-bit cpus (and their cache sizes) in mind. 3-DES is a temporary kludge. IDEA doesn't use tables, but uses the shift operator which the others don't. This is newer (less historical scrutiny) than DES or BF's structure. IDEA is patented, the others aren't. You should find the papers on these, there's descriptions and code on line. ------------------------------------------------------------ David Honig Orbit Technology honig at otc.net Intaanetto Jigyoubu Lewinsky for President '2012 From declan at pathfinder.com Tue Feb 10 11:31:07 1998 From: declan at pathfinder.com (Declan McCullagh) Date: Wed, 11 Feb 1998 03:31:07 +0800 Subject: "Corporations selling your ass down the road for a dollar" In-Reply-To: Message-ID: At 13:56 -0400 2/10/98, Michael Sims wrote: >I am aghast. Why not just pull some "facts" from the National >Enquirer or another equally reputable source? > >I would ask Declan how the hearings went but I suspect there'll be a >Netly piece involved. Yep, I'll probably write about this. There are three, maybe four, other Net-related hearings today, which I won't be able to go to, unfortunately. >None of this is news to Declan of course. I just get disappointed >when I see industry mouthpiece after industry mouthpiece without a >single goal in mind except maximum profit. Libertarianism in >action - corporations sell your ass down the road for a dollar and >some stock options. I'm sure Michael was upset and not typing clearly. He knows as well as anyone that libertarians are not pro-business; they're pro-individual rights. Libertarians spend quite a bit of time complaining about the Republican habit of funding corporate subsidies. The pursuit of profit in the free market is not to be discouraged -- without it, we wouldn't have the Internet we have today. Rather, we should be suspicious of the intersection between the government and the market in Congress and in federal agencies. I've written elsewhere about the dangers of industry sellouts on civil liberties -- sellouts and compromises which are of course opposed by libertarians. The libertarian Cato Institute opposes the McCain bill at issue in this hearing. -Declan From ravage at ssz.com Tue Feb 10 11:37:16 1998 From: ravage at ssz.com (Jim Choate) Date: Wed, 11 Feb 1998 03:37:16 +0800 Subject: Fourier & Signal Analysis... Message-ID: <199802101939.NAA05111@einstein.ssz.com> Hi, There is one final point I would like to make regarding at least one comment on Fourier Analysis of signals in a noisy environment. Fourier signal analysis is not good for this sort of stuff, what you want is a function called a Laplace Transform. Fourier is a method to take a complex signal and break it down into component trigonometric functions (eg sin) such that we can apply filtering and other frequency dependant operations to the signal to improve the signals characteristic signature or operate on a particular component (ie a component that is resonating with something and decreasing the s/n ratio - ringing on a pulse edge for example). If you want to find a signal in the noise you want to apply a Laplace. What it does is convert the amplitude-time variant signal (ie f(t)) into a power-frequency variant signal (ie f(s)). What this does is take, for example, a sample of a signal and describe how that signals power is divided between the various frequencies in that signal (eg McLauren Series). In most applications the grass of the signal will be evenly distributed across the s-mapping while the signal (at least its carrier component) itself will show up as a spike of noticeable amplitude. The reason you do this in signal analysis is because that transormation function will often be a simpler equation to solve numericaly that actualy trying to deal with f(t). So, if you want to find a signal in a complex environment use a Laplace Transform, once you've found the signal and want to know about its components use a Fourier Transform. Good hunting! ____________________________________________________________________ | | | The obvious is sometimes false; | | The unexpected sometimes true. | | | | Anonymous | | | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From kent at songbird.com Tue Feb 10 11:48:35 1998 From: kent at songbird.com (Kent Crispin) Date: Wed, 11 Feb 1998 03:48:35 +0800 Subject: Soft Tempest In-Reply-To: Message-ID: <19980210113051.14971@songbird.com> On Mon, Feb 09, 1998 at 09:31:05AM -0800, David Honig wrote: > At 10:14 PM 2/8/98 -0800, Tim May wrote: > >At 9:19 PM -0800 2/8/98, Ryan Lackey wrote: > > > > > >The physics suggests just the opposite: the RF emissions from laptops are > >expected to be lower from first principles, and, I have heard, are > >measurably much lower. (I say "have heard" because I don't have any access > >to RF measurement equipment...I once spent many hours a day working inside > >a Faraday cage, but that was many years ago.) > ...later... > >But before going this route, I'd want to see some measurements. Laptops > >might already be "quiet enough." (Measurements are needed to determine the > >effectiveness of any proposed RF shielding anyway, so....) > > The interference that laptops can cause with avionics is > prima facie evidence that laptops are not quiet. Even palmtops are quite noisy, in fact. -- Kent Crispin, PAB Chair "No reason to get excited", kent at songbird.com the thief he kindly spoke... PGP fingerprint: B1 8B 72 ED 55 21 5E 44 61 F4 58 0F 72 10 65 55 http://songbird.com/kent/pgp_key.html From ravage at ssz.com Tue Feb 10 11:51:29 1998 From: ravage at ssz.com (Jim Choate) Date: Wed, 11 Feb 1998 03:51:29 +0800 Subject: VanEck, Noise, & Palmtops... Message-ID: <199802101949.NAA05309@einstein.ssz.com> Hi, Palmtops are noisy, this is bad for Van Eck. Van Eck relies on the fact that the device is emitting display signals significantly above the noise floor or that there is a method to pull that signal out of the noise. Considering the power draw of palmtops, while they are noisy they are also very low power. My guestimate on emitted rf is in the micro-watt range. That means for a succesful intercept the receiver would need to be in most situation within feet of the device. It'd be much simpler to simply ask to see the PDA because you were thinking of buying one than lugging all that obvious equipment around... If you want to defeat Van Eck you want either very quite or you want lots of noise smoothly distributed across the rf spectrum. ____________________________________________________________________ | | | The obvious is sometimes false; | | The unexpected sometimes true. | | | | Anonymous | | | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From tcmay at got.net Tue Feb 10 13:02:08 1998 From: tcmay at got.net (Tim May) Date: Wed, 11 Feb 1998 05:02:08 +0800 Subject: Cyber 'Nannys" In-Reply-To: Message-ID: At 10:38 AM -0800 2/10/98, WebWarrior3 at InfoWar.Com wrote: >When you purchase or sell anything you enter into a contract with the >other party, >hence:UNIFORM COMMERCIAL CODE Article 21) In this Article unless the context >otherwise requires "contract" and "agreement" are limited to those >relating to the >present or future sale of goods. "Contract for sale" includes both a >present sale >of goods and a contract to sell goods at a future time. A "sale" consists >in the >passing of title from the seller to the buyer for a price (Section 2-401). A >"present sale" means a sale which is accomplished by the making of the >contract. mer Protection Laws." I suppose that your point is that the UCC somehow relates to your argument that filtering companies must supply customers with their filtering criteria? This is a serious distortion of the UCC, and, if applied, would mean: -- a chip company would have to provide the internal workings of chips sold, else they would be violating the disclosure laws -- a restaurant critic (analagous to a net.nanny filter, essentially) would have to provide access to his selection criteria -- the editor of any magazine or newspaper would have to explain his reasons for reporting some stories and not others, for including some editorial remarks and not others, and so on. My point about "absent a contract" is that sometimes there _are_ arrangements to supply internal workings of chips, restaurant selection criteria, etc. If there are such arrangements, then a customer can sue to get performance. But absent such prearrangements, a customer cannot generally demand information on how products were built, on what went into them, and so on. A customer of Cyber Sitter or Net Nanny is free to ask the companies involved what their criteria are, just as in the above cases he may ask the companies for more details. But if these companies decline to give trade secret information, or information they choose for whatever reason to keep to themselves, there is no recourse. Except in a few cases (wrongly, I believe) involving food and drug products, under FDA rules. Importantly, there are absolutely no such requirements for labelling of "speech," or editorial decisions, which is precisely the service being provided by Cyber Sitter and Net Nanny types of services. I believe any attempts to force, through law, the disclosure of editorial selection criteria would quickly be struck down by the courts as a violation of the First Amendment. (Except in the usual cases involving recommendations about drugs, health benefits, etc. And, no, I don't believe "psychological health" could be a justifiable reason for the courts to accept laws forcing editors to disclose their selection criteria.) Face it, Cyber Sitter is saying "We think these are sites your child can visit. " Forcing them to disclose their criteria--or even forcing them to list all sites they disapprove of--is an infringement on their editorial rights. (And please don't anybody cite "commerce" as a justification...it hasn't been a justification to regulate the speech of newspapers, publishers, or other commercial ventures....) --Tim May Just Say No to "Big Brother Inside" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From search at peoplefinders.net Wed Feb 11 05:21:56 1998 From: search at peoplefinders.net (search at peoplefinders.net) Date: Wed, 11 Feb 1998 05:21:56 -0800 (PST) Subject: GOOD NEWS ABOUT BAD ACCOUNTS Message-ID: <1998Feb11.072343.S2501.23202 > For the last fourteen years, National Credit Systems, Inc. has been providing top flight debt collection services to over 9,000 businesses, institutions, and healthcare providers. We charge only a low-flat fee (less than $20) per account, and all proceeds are forwarded to you directly -- not to your collections agency. If you wish, we will report unpaid accounts to Experian (formerly TRW), TRANSUNION, and Equifax. There is no charge for this important service. PLEASE LET US KNOW IF WE CAN BE OF SERVICE TO YOU. Simply reply with the following instructions in the "Subject" field: REMOVE -- Please remove me from your mailing list. EMAIL -- Please email more information. FAX -- Please fax more information. MAIL -- Please snailmail more information. CALL -- Please have a representative call. Indicate the best time to telephone and any necessary addresses and telephone/fax numbers in the text of your reply. If you prefer you can always telephone us during normal business hours at (212) 213-3000 Ext 1467. Thank you. P.S. -- If you are not in need of our services at this time, please retain this message for future use or past it on to a friend. Thank you. From WebWarrior3 at InfoWar.Com Tue Feb 10 13:38:03 1998 From: WebWarrior3 at InfoWar.Com (WebWarrior3 at InfoWar.Com) Date: Wed, 11 Feb 1998 05:38:03 +0800 Subject: Cyber 'Nannys" In-Reply-To: Message-ID: <34E0C6DD.250A38FB@InfoWar.Com> Tim May wrote: > I suppose that your point is that the UCC somehow relates to your argument > that filtering companies must supply customers with their filtering > criteria? > > This is a serious distortion of the UCC, and, if applied, would mean: > > -- a chip company would have to provide the internal workings of chips > sold, else they would be violating the disclosure laws I hardly think that the parameters they choose to use can be construed as a trade secret. > -- a restaurant critic (analagous to a net.nanny filter, essentially) would > have to provide access to his selection criteria Restaurant critics do supply criteria, this, once again, is not a trade secret. What is more, this is not analogous to filtering packages. A critic will provide information on both what he or she likes and dislikes as well as the location and name of the restaurant. They make recommendations which their 'readers' (not customers) can choose to follow or ignore. > -- the editor of any magazine or newspaper would have to explain his > reasons for reporting some stories and not others, for including some > editorial remarks and not others, and so on. As I said before, when one subscribes to a periodical, one has a good idea of what is within their editorial policy. It would be unreasonable to expect a publisher to provide every potential story. Whereas, it would not be unreasonable to expect a magazine on Anthropology to publish an article on a recent discovery of major scientific import. > My point about "absent a contract" is that sometimes there _are_ > arrangements to supply internal workings of chips, restaurant selection > criteria, etc. If there are such arrangements, then a customer can sue to > get performance. But absent such prearrangements, a customer cannot > generally demand information on how products were built, on what went into > them, and so on. Equating a decision of what material is what is not acceptable with the internal schematics of chips is really far fetched. People buy these packages (filtering software/services) with the understanding that they will 'protect' their children from certain content. Without being able to look into what content is actually blocked a customer is being duped into a false sense of security. Additionally, they will never get to see what is actually blocked. > Except in a few cases (wrongly, I believe) involving food and drug > products, under FDA rules. So you don't think that ingredients should be labeled on pre-packaged food? Shit, I guess you don't have any allergies. > Importantly, there are absolutely no such > requirements for labelling of "speech," or editorial decisions, which is > precisely the service being provided by Cyber Sitter and Net Nanny types of > services. But CyberSitter ad Net Nanny DO label their editorial decisions by providing a list of what TYPE of material they block, and as Declan pointed out, Net Nanny provides a list. They simply provide no proof that they actually do block sites on any such basis. The CyberSitter fiasco with Jonathan Wallace and Peacefire last year is an example of material that is being blocked that does not fall into line with their declared criteria. > I believe any attempts to force, through law, the disclosure of editorial > selection criteria would quickly be struck down by the courts as a > violation of the First Amendment. As stated above, they DO disclose the framework of their criteria, it is evidence that these criteria are actually followed that is absent. Scott R. Brower http://www.infowar.com http://www.efflorida.org From jamesd at echeque.com Tue Feb 10 13:54:47 1998 From: jamesd at echeque.com (James A. Donald) Date: Wed, 11 Feb 1998 05:54:47 +0800 Subject: FCPUNX:time to learn chinese? Message-ID: <199802102142.NAA10766@proxy3.ba.best.com> -- At 10:24 PM 2/9/98 GMT, Adam Back wrote: > The interesting aspect of her speculation was on the > possibility of an economic and political process of change > which would result in a transition directly from communism > to a free market based political system, by-passing > democracy and socialism. She viewed democracy and > socialism as mistakes made by the west to be learned from > and avoided. In other words, instead of China taking over Hong Kong, Hong Kong takes over China. We shall see. Right now Hong Kong is being run by some rich capitalist chinese. (What else is new, you may ask) The problem with such systems is that they are vulnerable to the same disease that struck down Venice. Rich merchants aquire state power, soon are tempted by the easy and safe returns from confiscation and taxation, rather than the difficulty and risk of commerce, soon become aristocrats, equally contemptuous of the poor, of real businessmen, and of earning an honest living. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG f/S+Mn40UqaSQjsUULlWtwVMEkmnupDDQNCEyHSC 44TB2tTSr9ueaMq5FhuDDot2crWmnd7SePUYV0Qux --------------------------------------------------------------------- We have the right to defend ourselves and our property, because of the kind of animals that we are. True law derives from this right, not from the arbitrary power of the state. http://www.jim.com/jamesd/ From jamesd at echeque.com Tue Feb 10 13:56:33 1998 From: jamesd at echeque.com (James A. Donald) Date: Wed, 11 Feb 1998 05:56:33 +0800 Subject: Blind signatures dead in the water. What now? Message-ID: <199802102142.NAA10762@proxy3.ba.best.com> -- At 09:25 AM 2/9/98 -0800, Tim May wrote: > Sadly, the ideas of David Chaum are more needed than ever, > but his stuff is essentially nowhere to be seen. (To > reflect Lucky's comments back to him, > :-), spare us any citations of how Mark Twain Bank will let > :some people > open a cumbersome Digicash account.) Why are blind signatures dead in the water? One obvious reason is that people attempting to do business with David Chaum seem to get rather irritable. Still, despite that, Digicash actually exists, but no one uses it. One reason is that the network to convert Digicash into other forms of value is rather limited, whereas the credit card network is fast and spans the world. Another is that people do not wish to hold large amounts of Digicash] for long periods, (security, no interest) and converting money back and forth between interest bearing forms and Digicash attracts rather high charges. (Or used to attract rather high charges when last I looked.) So where do we go from here? One obvious solution is nymous money-- money that is not anonymous, but is not required to be connected to one's government approved and registered name either. This is arguably better than the half-anonymous money that has in fact been implemented by Digicash. What nymous money projects are happening, and how are they going? --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG LYaOPLZKNwSNWeffnb7uS95ByY1zFrrw5ORiNblo 4jCWkLjLNXwKCdAtmb4IoOno/9n7A5bv6OhoyZ2Ki --------------------------------------------------------------------- We have the right to defend ourselves and our property, because of the kind of animals that we are. True law derives from this right, not from the arbitrary power of the state. http://www.jim.com/jamesd/ From brianbr at together.net Tue Feb 10 13:59:17 1998 From: brianbr at together.net (Brian B. Riley) Date: Wed, 11 Feb 1998 05:59:17 +0800 Subject: Fwd: Social Security Message-ID: <199802102151.QAA31482@mx02.together.net> ---------------- Begin Forwarded Message ---------------- Date: 02/09 10:25 PM Received: 02/09 10:29 PM From: James A Chappelow, chappja at mail.auburn.edu Reply-To: Vermont Libertarian, vtlp-list at catamount.com To: Multiple recipients of, vtlp-list at catamount.com Outside of Birmingham, a kid was arrested Saturday for not giving a cop his Social Security number. The bumper fell off his truck, so he stuck the tag in the rear window; not a rare sight in Alabama. He got pulled over for it. Alabama licenses have the holder's SSN on them (because that way the state gets more Federal highway $), except his parents had never applied to get him one, because of their religion. When the cop demanded his SSN ("Deine Papieren!"), and he didn't tell him one, he was arrested for disorderly conduct. He's still in jail because in order to bail him out his parents had to supply their (guess what) SSNs. Clinton recently declared his intention to use his supposed budget surplus to save Social Security. In order to maintain Social Security payments, it is estimated that combined Federal taxes will have to rise to 84% of national income! Social Security is doomed as a retiremant option; there is no reason for any able bodied citizen born after 1950 to ever expect to see any benefits from it. So why should any of those people have SSNs? Because securing retirement is not the real goal of Social Security. However, it is still quite valuable as a means for tracking and controlling people, and it looks like voluntary compliance is now being strictly enforced. That's why Clinton wants to save Social Security. James A. Chappelow --------------------------------------------------- This message is from the VTLP-list (Vermont Libertarian) mailing list. To send a message to everyone on this list send email to . To unsubscribe from the list send email to with "unsubscribe vtlp-list" in the body of the message. To subscribe to the list send email to with "subscribe vtlp-list your name" in the body of the message. ----------------- End Forwarded Message ----------------- Brian B. Riley --> http://members.macconnect.com/~brianbr For PGP Keys "Everyone has a photographic memory. Some just don't have film." From ravage at ssz.com Tue Feb 10 15:22:30 1998 From: ravage at ssz.com (Jim Choate) Date: Wed, 11 Feb 1998 07:22:30 +0800 Subject: FCPUNX:comp.html (fwd) Message-ID: <199802102323.RAA06408@einstein.ssz.com> Forwarded message: > Date: Tue, 10 Feb 1998 15:10:08 -0800 (PST) > From: "James A. Donald" > Subject: Re: FCPUNX:comp.html > However quantum computers so far envisaged (but not yet > built) can only do a few steps before they lose quantum > coherence. > > So far factoring a four bit number is well beyond the state > of the art in quantum computation. I only have two things to say to this: - This year. - Quantum Coupled Architectures ____________________________________________________________________ | | | The obvious is sometimes false; | | The unexpected sometimes true. | | | | Anonymous | | | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From jamesd at echeque.com Tue Feb 10 15:30:19 1998 From: jamesd at echeque.com (James A. Donald) Date: Wed, 11 Feb 1998 07:30:19 +0800 Subject: FCPUNX:comp.html Message-ID: <199802102310.PAA18375@proxy3.ba.best.com> -- At 03:14 PM 1/28/98 -0600, Jim Choate wrote: > Recently, an algorithm was developed for factoring > numbers on a quantum computer which runs in steps where > is small [1]. This is roughly quadratic in the input > size, so factoring a 1000 digit number with such an > algorithm would require only a few million steps. The > implication is that public key cryptosystems based on > factoring may be breakable. However quantum computers so far envisaged (but not yet built) can only do a few steps before they lose quantum coherence. So far factoring a four bit number is well beyond the state of the art in quantum computation. --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG W7fOL2Uec3TpIWpLT+xcgrKGVfoQL3gmNdcADrkN 41SXVwnn/Gy+C42ptPxygaLgt1miSt2a1T/6/b9p8 --------------------------------------------------------------------- We have the right to defend ourselves and our property, because of the kind of animals that we are. True law derives from this right, not from the arbitrary power of the state. http://www.jim.com/jamesd/ From jmr at shopmiami.com Tue Feb 10 15:43:00 1998 From: jmr at shopmiami.com (Jim Ray) Date: Wed, 11 Feb 1998 07:43:00 +0800 Subject: "Corporations selling your ass down the road for a dollar" Message-ID: <3.0.16.19980210183307.0a6fec02@pop.gate.net> -----BEGIN PGP SIGNED MESSAGE----- At 02:28 PM 2/10/98 -0500, Declan McCullagh wrote: ... >I'm sure Michael was upset and not typing clearly. He knows as well as >anyone that libertarians are not pro-business; they're pro-individual >rights. Libertarians spend quite a bit of time complaining about the >Republican habit of funding corporate subsidies. ... In view of his constant spewing of lies to the contrary, I'm beginning to doubt that (and it isn't just the Republicans voting for corporate welfare socialism, Democrats do it too). JMR -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Freedom isn't Freeh. iQEPAwUBNODjfjUhsGSn1j2pAQFziQfQ4ZrEuBdROssccGRGZHvhLUsCBhlz3j/1 PD0bcZXD8xvHiprG8jsCQV1nduKE3FNA8odhtbRUwtYF5dUxS5aSscnb/wuQXcda FaSs6UhRmnwwech38zh7fK0qeC56rstpDdAKy5aoBso4lSLGOu/vyCEhU78zw/NW 2hxm5w9wHapJ4LyU7NwpGrCZWpKHREJKoPnme77roU+AiAVmM44TnZmVNRjbb0lL +rEwXeSckj+d8qF+qdv/l0WUhg3jBMRXBwlBYOejEjNpwLkeGlWo70zLsSq/ihPc 9c9qbb/q2582mwmnl7rI/jo4q4RbVhsQdRCZ8UVdBACghg== =EyXh -----END PGP SIGNATURE----- From jim.burnes at ssds.com Tue Feb 10 15:51:30 1998 From: jim.burnes at ssds.com (Jim Burnes) Date: Wed, 11 Feb 1998 07:51:30 +0800 Subject: FCPUNX:time to learn chinese? In-Reply-To: <199802102142.NAA10766@proxy3.ba.best.com> Message-ID: <34E0E694.3A926DD5@ssds.com> James A. Donald wrote: > The problem with such systems is that they are vulnerable to > the same disease that struck down Venice. Rich merchants > aquire state power, soon are tempted by the easy and safe > returns from confiscation and taxation, rather than the > difficulty and risk of commerce, soon become aristocrats, > equally contemptuous of the poor, of real businessmen, and of > earning an honest living. > Wouldn't that be fixed if the state lost its monopoly on power? Distribute power and the abusers can't have it all. While it may be easy to hookwink the masses with propaganda (without internet/etc), once force monopoly power withers it will be difficult to convince Joe Blow to agree to something obviously not in his best interests. Or something like that... Jim From frissell at panix.com Tue Feb 10 16:21:01 1998 From: frissell at panix.com (Duncan Frissell) Date: Wed, 11 Feb 1998 08:21:01 +0800 Subject: Fwd: Social Security In-Reply-To: <199802102151.QAA31482@mx02.together.net> Message-ID: <3.0.2.32.19980210191727.035ea8a8@panix.com> At 04:51 PM 2/10/98 -0500, Brian B. Riley wrote: > >---------------- Begin Forwarded Message ---------------- >Date: 02/09 10:25 PM >Received: 02/09 10:29 PM >From: James A Chappelow, chappja at mail.auburn.edu >Reply-To: Vermont Libertarian, vtlp-list at catamount.com >To: Multiple recipients of, vtlp-list at catamount.com > >Outside of Birmingham, a kid was arrested Saturday for not giving a cop >his Social Security number. The bumper fell off his truck, so he stuck the >tag in the rear window; not a rare sight in Alabama. Luckily, even though many states demand SS#s, they tend not to verify SS#s so you can supply whatever you like. One state (Ohio) demanded some proof of SS# and was satisfied by a payroll check stub which can be generated by any computer. Common identifiers are meaningless if not verified. DCF From rwright at bsd.adnetsol.com Tue Feb 10 16:27:31 1998 From: rwright at bsd.adnetsol.com (Ross Wright) Date: Wed, 11 Feb 1998 08:27:31 +0800 Subject: Who are the "digerati"? Message-ID: <199802110014.QAA25295@rigel.cyberpass.net> http://www.edge.org/digerati/index.html Have you guys seen this? Any comments? I thought it was pretty interesting. Ross =-=-=-=-=-=- Ross Wright King Media: Bulk Sales of Software Media and Duplication Services http://ross.adnetsol.com Voice: (408) 259-2795 From frissell at panix.com Tue Feb 10 16:27:55 1998 From: frissell at panix.com (Duncan Frissell) Date: Wed, 11 Feb 1998 08:27:55 +0800 Subject: FC'98 Palm Pilot Resources Message-ID: <3.0.2.32.19980210192156.036d3da0@panix.com> I have produced some FC'98 files in suitable formats for the Palm Pilot. I will be adding more as the date approaches. http://www.frissell.com/AXA/axa.html So far we have: A map of Anguilla (looks great in Image). A map of Monserrat with eclipse lines. and in DOC format: The Wired article on FC'97. The Forbes cover story on FC'97. and finally: For purposes of amusement only, a Jfile databse of the first 4 quarterly reports of the (1786) names of Taxpatriates (those with too much money who renounce their US citizenship) as reported to the Secretary of the Treasury last year by the State Department. More to come including a schedule in .dba format as soon as The Powers That Be settle on one. DCF From nelsonde at umich.edu Tue Feb 10 16:41:44 1998 From: nelsonde at umich.edu (nelsonde at umich.edu) Date: Wed, 11 Feb 1998 08:41:44 +0800 Subject: No Subject Message-ID: <199802110031.TAA13619@seawolf.rs.itd.umich.edu> I'm Snyder, the karmic metacrawler. The word: cryptanalytic and Alta Vista's Scooter lead me to you. Know that in the frigid wastes of the WWW my PERL-scripted heart beats for you. To: cypherpunks\@toad.com From spencer at datamerge.com Wed Feb 11 08:56:50 1998 From: spencer at datamerge.com (Spencer Kluesner) Date: Wed, 11 Feb 1998 08:56:50 -0800 (PST) Subject: PRESS RELEASE: VENTURE CAPITAL CD Message-ID: <19980211155548197.AIY417@datamerge.com> _______________________________________________________________ HIGH TECH FINANCING FOR IMMEDIATE RELEASE: DATAMERGE ANNOUNCES VENTURETRACK 2000 CD-ROM INFOBASE VENTURE CAPITAL INSIDERS "TELL ALL" DATABASE Press Contact: Peter Masi (303) 399-6031 MasiPR at aol.com http://www.datamerge.com/venturetrack.html DENVER -- DataMerge, Inc., a Denver-based developer of software and information for companies seeking financing, today announced the release of VentureTrack 2000, a software package containing extensive profiles and proprietary "insider" information on hundreds of venture capital firms throughout North America. The VentureTrack 2000 CD-ROM Infobase gives entrepreneurs and small business owners "insider" information, education and advice critical to establishing business relationships with specific venture capitalists and securing financing from them. The software lets users find the firms that optimally fit their needs by identifying links between their company and the interests of the venture capitalists. VentureTrack 2000's "Inside Track" section then instructs users on custom tailoring their business plan and presentation to each venture capital firm. Specific questions, concerns and objections that a given firm will likely raise and good responses for each are also provided to VentureTrack 2000 users. Information contained in the profiles was gathered by finance savvy investigative reporters who used techniques adapted from the intelligence community. The information is exclusive to VentureTrack 2000 and is not available in competing products. It includes: *Insight into the firm's most likely areas of interest; *Personal/individual preferences of principals; *Best methods of approach and specific things to say or not say to a particular individual; *Investment philosophies and strategies based on past experiences; *Firm background, working atmosphere and relationships; *Case studies of investments that best represent their investment philosophy; *Inside advice/scoop from companies each VC firm has previously financed; *Information from DataMerge's customer "grapevine"; *Key contacts by project type and procedure for internal review; *Portfolio investment overview. In addition to the eight- to 12-page profiles of each venture capital firm, VentureTrack 2000 includes an on-line tutor and venture industry knowledgebase called VentureAdvisor, which was developed with extensive input from venture capital principals. The total package is designed to give users proprietary "insider" information and insight into the venture capital industry, which historically were closely guarded secrets of a few well-placed individuals. In addition to small business people, DataMerge CEO Spencer Kluesner says venture capital firms themselves have shown strong interest in VentureTrack 2000 because they want to gather competitive intelligence on their rivals. VentureTrack 2000 supports Windows 95 and Windows NT. The time-limited introductory price is $495. VentureTrack 2000 can be ordered by calling (800) 580-1188. Privately-held DataMerge was founded in 1989 by Spencer Kluesner, a former securities advisor who today serves as chief executive officer of the 26-person company. DataMerge's products are sold directly to customers in the North America, Western Europe and Asia. Additional information can be obtained at DataMerge's website: http://www.datamerge.com/venturetrack.html Additional Information: VentureTrack 2000 White Paper - http://www.datamerge.com/venture/capital/whitepaper.html Sample VentureTrack Profile - http://www.datamerge.com/venture/page5.html VentureTrack Brochure - http://www.datamerge.com/venture/page2.html --30-- From dlv at bwalk.dm.com Tue Feb 10 17:20:34 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Wed, 11 Feb 1998 09:20:34 +0800 Subject: Cyber 'Nannys" In-Reply-To: Message-ID: Tim May writes: > As far as I'm concerned, absent a contract, anyone who "demands" something > from me is on thin ice. > > Like I said, if you're unhappy that CyberSitter or NetNanny will not > provide you with information you wish to have, use another service. So I can't demand that the censorware peddlers not mailbomb me? The mentally retarded pedophile Guy Polis tried to mailbomb me from his former eviljay at bway.net account, and bway.net pulled his plug in minute. Is that censorship? --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From rdl at mit.edu Tue Feb 10 17:22:21 1998 From: rdl at mit.edu (Ryan Lackey) Date: Wed, 11 Feb 1998 09:22:21 +0800 Subject: TEMPEST open-source definition version 0.1alpha Message-ID: <199802110119.UAA04666@the-great-machine.mit.edu> -----BEGIN PGP SIGNED MESSAGE----- So, if we're going to try to protect computers from TEMPEST threats, and we don't have access to the multiple government classified standards, we should come up with the Cypherpunks TEMPEST standard. A theoretical definition of what we want to do (strong) is that we should be able to put the equipment in a virtual box, have an empty virtual box, and then nothing anything which is not in the TCB can do can distinguish one box from the other. Perhaps the "empty" box should also contain simulators for the ethernet, visible light output, and straight power draw (harmonics are still to be avoided), or in some other definitional way they should be accounted for. This prevents non-TCB programs from utilizing the EM spectrum as a covert channel. Additionally, we need to protect the user from divulging state information about his TCB. I guess this condition can best be met by simply saying "take the target system and clone its state perfectly. Separate the two systems. Allow the user to modify the state of the target system while you retain the clone -- you do not have a non-negiligible improvement in matching future state using the EM emissions of the first system over not using the EM emissions." I think there is a better way of stating this, though. So, given a workable theoretical definition which defines perfection, it's time to reverse engineer the practical TEMPEST systems (and in so doing perhaps the classified TEMPEST spec) out there. Next time I find a TEMPEST case at swapfest, or at a con, I'll pick it up (if someone wants to ship me one, so much the better). You *can* buy them from some vendors, although they often refuse to sell them to non-government affiliated entities). MIT's quasi-affiliated Draper Labs has proper TEMPEST verification equipment, and I think some places on MIT's campus have some general purpose equipment which can be used for such purposes. If not, I have a copy of NI LabView and some DAQ hardware which, coupled with some antenna frobbery, can be used to do a quick spectrum analyzer, and there's the capacity to do some serious analysis once the data are on the computer. It would be nice to know how good government TEMPEST systems really are. In practice, matching them would probably be enough. The above theoretical definition doesn't really help that much -- in practice, there's going to be some information coming out, and just because you can't figure out how to use it, doesn't mean no one can. I think preventing the covert channel attack might actually go beyond the government's TEMPEST spec -- certainly if a non-TCB program can cause a system reboot, or power up a peripheral, you can detect the change in power draw, unless the system naturally throws away the difference between its max power consumption and its present power consumption all the time. Being able to telegraph even 1 bit of information might be enough, and if you've got an arbitrary precision clock, you could use this method to send an arbitrary codeword from an arbitrary-length codebook given an arbitrary time interval. The rainbow books talked about covert channel elimination being a really hard problem. Now I see even more why they were right. IIRC, it's only at the not-really-commercially-available levels (A1) that covert channels are utterly eliminated; usually they are comfortable just documenting them. Of course, it would probably make a lot of sense to do TEMPEST reverse engineering in a country that has neither an OSA nor the ability to randomly classify research. Yet another project for cypherpunks.to, Lucky? A practical way of approaching theoretical TEMPEST-perfection is just a decent faraday cage with a lead-glass monitor cover, shielded or eliminated cables, and a serious double-conversion UPS. From the government TEMPEST products I've seen, that's all they are (or they use mesh). I've mainly seen thinks like the SafeKeyper, not general purpose computers, though. I don't think Jim was that far off the mark in thinking class B machines are a worthwhile starting point, but it doesn't go anywhere near far enough. ObCrypto: I've been looking at implementing a cipher in a reconfigurable processor. I might even customize one. Yay. ObGuns: I got to use a .22cal nail gun. It was fun. ObPersonalAttacks: There are a lot of people who are not Real US Citizens on this list. Beware the evil multinationalist conspiacy in our midst, good followers of Bill Clinton! ObQuestion: Can the US government deny a passport for no reason to a random US citizen who is not a felon? - -- Ryan Lackey rdl at mit.edu http://mit.edu/rdl/ -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQEVAwUBNOD8sawefxtEUY69AQG3NQf9GWJjz3pwORa4y5V1YQA/BBAebDJNlnhd gauYxwALwsEIID20Da3x7f/ZZ/ipVH1fhk9SJYGgPK+mtc7HMpPA7WhEfR1awuyE FaP6VrJ18vKy6Cf+JlUbag2w5luQfSlo4o1jK0v6Os3D+PpuDyRN3GUI05dTxKyC +VfS8oiw+SaM455l1knHGnegLZzivCKGS/xXDFD71dl5QCRQsAMBaGrjg0pej8gJ ByiO4X7ae8OdlUytdQpfaNOtJTdSQJ7C3FLjczp9dQKvb7msfQUWzAWG9L8XneUP b6xRF5Ra1JaixfFEJisnP+CfZbtJknvNlffUh+//b17ql8Jz5WsFJg== =IRsn -----END PGP SIGNATURE----- From nobody at REPLAY.COM Tue Feb 10 17:37:20 1998 From: nobody at REPLAY.COM (Anonymous) Date: Wed, 11 Feb 1998 09:37:20 +0800 Subject: Godwin, et al, a pity, this Message-ID: <199802110133.CAA10366@basement.replay.com> Who are the "digerati" and why are they "the cyber elite"? They are the doers, thinkers, and writers who have tremendous influence on the emerging communication revolution. They are not on the frontier, they are the frontier. The digerati evangelize, connect people, adapt quickly. They like to talk with their peers because it forces them to go to the top of their form and explain their most interesting new ideas. They give each other permission to be great. That's who they want to talk to about the things they are excited about because they want to see if it plays. They ask each other the questions they are asking themselves, and that's part of what makes this cyber elite work. The Connector < John Brockman> The Pragmatist < Stewart Alsop > The Coyote < John Perry Barlow > The Scout < Stewart Brand > The Seer < David Bunnell > The Thinker < Doug Carlston > The Idealist < Denise Caruso > The Statesman < Steve Case > The Physicist < Greg Clark > The Matchmaker < John Doerr > The Gadfly < John C. Dvorak > The Pattern-Recognizer < Esther Dyson > The Software Developer < Bill Gates > The Conservative < David Gelernter > The Defender < Mike Godwin > The Genius < W. Daniel Hillis > The Judge < David R. Johnson > The Searcher < Brewster Kahle > The Saint < Kevin Kelly > The Prodigy < Jaron Lanier > The Marketer < Ted Leonsis > The Scribe < John Markoff > The Maestro < Stewart McBride> The Force < John McCrea > The Competitor < Scott McNealy > The Publisher < Jane Metcalfe > The Pilgrim < Jerry Michalski > The Chef < Nathan Myhrvold> The Webmaster < Kip Parent > The Citizen < Howard Rheingold > The Buccaneer < Louis Rossetto > The Curator < Doug Rowan > The Oracle < Paul Saffo > The Radical < Bob Stein > The Skeptic < Cliff Stoll > The Catalyst < Linda Stone > The Evangelist < Lew Tucker > The Cyberanalyst < Sherry Turkle > The Lover < Dave Winer > The Impresario < Richard Saul Wurman > http://www.edge.org/digerati/index.html From guy at panix.com Tue Feb 10 17:56:59 1998 From: guy at panix.com (Information Security) Date: Wed, 11 Feb 1998 09:56:59 +0800 Subject: Cyber 'Nannys" Message-ID: <199802110145.UAA07873@panix2.panix.com> > To: cypherpunks at toad.com > Subject: Re: Cyber 'Nannys" > From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) > Message-Id: > > The mentally retarded pedophile Guy Polis tried to mailbomb me from his ^^^^^^^^ ^^^^^^^^ ^^^^^^^^^ ^^^ > former eviljay at bway.net account, and bway.net pulled his plug in minute. Fire One. ---guy From brianbr at together.net Tue Feb 10 18:33:12 1998 From: brianbr at together.net (Brian B. Riley) Date: Wed, 11 Feb 1998 10:33:12 +0800 Subject: TEMPEST open-source definition version 0.1alpha Message-ID: <199802110228.VAA11735@mx02.together.net> -----BEGIN PGP SIGNED MESSAGE----- On 2/10/98 8:19 PM, Ryan Lackey (rdl at mit.edu) passed this wisdom: >So, if we're going to try to protect computers from TEMPEST >threats, and wedon't have access to the multiple government >classified standards, we should come up with the Cypherpunks >TEMPEST standard. > >A theoretical definition of what we want to do (strong) is that we >should beable to put the equipment in a virtual box, have an empty >virtual box, and then nothing anything which is not in the TCB can >do can distinguish one box from the other. Perhaps the "empty" box >should also contain simulators for the ethernet, visible light >output, and straight power draw (harmonics are still to be >avoided), or in some other definitional way they should be >accounted for. This prevents non-TCB programs from utilizing the EM >spectrum as a covert channel. [big snip] Some of this reminds me of when I worked at Raytheon, I did some coding for this genius at magnetic fields we had. This was the time of the MX missile and the 'racetrack' concept, mobile launchers that moved all the time. The idea was that a significiant percentage of the mobile launch cannisters were empty and what the scientist I worked with had to do was design a set of coils for the dummy cannister that would make it have the same magnetic signature as a real cannister loaded with a real missile ... "sort of a global thermonuclear shell game" if you will ... -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQEVAwUBNOEM0D7r4fUXwraZAQG+hQf/U/2Irt9FlQQWxc1nJQ1wlFUEtMf5fAxB 5JUXDwGy7+rAVojReAj9gV9SeXZA+h25WJMIbzngibSOYfieiE0iXPNbgNVsDLm/ /giLgqW/AfBUm+EjQMP5glav4xQxGDTKdBBGSqujyzkn5jaDlBVff5mfw5oUeN1c Vz4dIOzl8n6ivdc2PRbFh+he1X55+y3wLAqYc60VMmhlWPTTHx4PoJRw6hl5lX9c dfxTIo5B1Gw1I7pP0REFTodW+HXASqoXAG/1Xo3J5rn+yup0IQblz9Pg8IBAW22j kuFECDHuo9daXp7QH0nZX1/2hRw/cZUf8AtGMhDq3zNWH21E2pHsQA== =+Gr+ -----END PGP SIGNATURE----- Brian B. Riley --> http://members.macconnect.com/~brianbr For PGP Keys -- give us the rights Abraham Lincoln cherished lovingly: "Those who deny freedom to others deserve it not for themselves." From honig at otc.net Wed Feb 11 11:33:46 1998 From: honig at otc.net (David Honig) Date: Wed, 11 Feb 1998 11:33:46 -0800 (PST) Subject: Anti-Asian E-Mail Was Hate Crime, Jury Finds Message-ID: <3.0.5.32.19980211113458.007b6350@otc.net> http://www.latimes.com/HOME/NEWS/ORANGE/OCNEWS/t000013848.html Wednesday, February 11, 1998 Anti-Asian E-Mail Was Hate Crime, Jury Finds Internet: Ex-UCI student Richard Machado is found to have violated civil rights with threatening messages. By DAVAN MAHARAJ, Times Staff Writer SANTA ANA--In the nation's first successful prosecution of a hate crime on the Internet, an expelled university student was found guilty Tuesday of violating the civil rights of Asian students at UC Irvine by sending e-mail threats to kill them if they didn't leave the school. Prosecutors hailed the verdict in the retrial of 20-year-old Richard J. Machado as a victory for federal authorities seeking to police the Internet to deter hatemongers and racist groups. "This verdict shows that high-tech hate is not going to be tolerated," said Assistant U.S. Atty. Michael J. Gennaco, who prosecuted the case. "A line does have to be drawn in the world of cyberspace. If you cross that line and threaten people, you are going to be subject to criminal penalties." The jury of eight women and four men deliberated for less than a day before finding Machado guilty of interfering with students' rights to attend a public university. Jurors deadlocked 9 to 3 in favor of conviction on a second, identical count. Machado displayed no emotion when the verdict was read Tuesday afternoon. His first trial ended in a mistrial in November with jurors deadlocked 9 to 3 in favor of acquittal. Because his conviction carries a maximum sentence of one year in prison and he has already served more time than that in custody, Machado could be set free as early as Friday, when he appears for sentencing before U.S. District Judge Alicemarie H. Stotler. Gennaco, who heads the civil rights division of the U.S. attorney's office in Los Angeles, downplayed Machado's sentence. "What we've taken from this case is a deterrent value that people can't get on the Internet and send threats to folks," Gennaco said. Gennaco hinted that prosecutors would now be more likely to step in and prosecute computer users who stalk or threaten others in cyberspace. "We have a number of ongoing investigations regarding allegations of threats on the Internet," Gennaco said. "Now we have some guidance from 12 people that the government can step in and enforce laws on the Internet." Machado's trial--and retrial--had been seen as a test case. To prosecute Machado, prosecutors turned to civil rights laws enacted in the 1960s that were designed to prevent Southerners from standing in the way of school desegregation. Machado violated students' civil rights, prosecutors contended, when he hunched over a computer in UCI's engineering building on Sept. 20, 1996, and sent an anonymous e-mail message to about 60 mainly Asian students. The message, signed "Asian Hater," warned that all Asians should leave UC Irvine or the sender would "hunt all of you down and kill your stupid asses." "I personally will make it my [life's work] to find and kill every one of you personally. OK? That's how determined I am. Do you hear me?" Apparently thinking the first one didn't get transmitted, Machado sent the same message twice, and school officials quickly traced the messages to him after they received complaints. The e-mail incensed and upset some students, especially those of Asian descent, who constitute nearly half of UC Irvine's 17,000 students, the highest percentage of any UC school. Several students testified that they were petrified by the e-mail. They armed themselves with pepper spray, refused to go out alone at night and became suspicious of strangers. The defense called other students who testified that they became angry over the message but later shrugged it off as a bad joke. During the trial, defense lawyers depicted Machado as a disturbed teenager who became distraught and flunked out of UCI after his eldest brother was murdered in Los Angeles. When he sent the threatening e-mail, Machado was no longer a UCI student, but he was too ashamed to tell his immigrant parents, according to Deputy Federal Public Defender Sylvia Torres-Guillen. Machado testified at both trials that one of his brothers would drive him to UCI each day even after he had been expelled. There, he passed his days in the computer laboratory, sending and receiving e-mail and surfing the Internet until it was time to go home. On the day he sent the e-mail, Machado testified, he was bored and wanted to start a "dialogue" with people who were signed on to the school's computer network. Some attorneys, including Machado's defense team, questioned whether charges should have been filed against the former student. Torres-Guillen even called an expert witness in Internet etiquette, who described Machado's e-mail as "a classic flame"--online lingo for an angry message that, while annoying, is not meant to be harmful. But Gennaco contended that Machado hated Asians because they got better grades than he did. In his rebuttal case, the prosecutor called a University of South Carolina freshman and another computer user in Denver who testified that Machado referred to Asians as "chinks" when he chatted with them in cyberspace. The witnesses contradicted Machado's testimony that he never used derogatory terms for Asians. Gennaco said prosecutors may suggest that Machado attend a racial awareness program as part of his sentence. Search the archives of the Los Angeles Times for similar stories. You will not be charged to look for stories, only to retrieve one. Copyright Los Angeles Times PREV STORY NEXT STORY ------------------------------------------------------------ David Honig Orbit Technology honig at otc.net Intaanetto Jigyoubu Lewinsky for President '2012 From dm0 at avana.net Tue Feb 10 19:34:20 1998 From: dm0 at avana.net (David Miller) Date: Wed, 11 Feb 1998 11:34:20 +0800 Subject: How to profit from writing open source (was: free software) Message-ID: <34E11B59.4E013B83@avana.net> A while back there was a thread on different models of how to profit from free software. I have a few additions that I don't think were mentioned, albeit late. Ok. Way late. The Data Fellows model - supply (ssh) Unix source code free, but charge for Windows (clients) after a 30-day trial period. Yes. The Joel McNamara model - give the (Private Idaho) software away and go fight forest fires and have your children profit from a better world. --David Miller middle rival devil rim lad From ravage at ssz.com Tue Feb 10 19:48:11 1998 From: ravage at ssz.com (Jim Choate) Date: Wed, 11 Feb 1998 11:48:11 +0800 Subject: Drivers licenses (fwd) Message-ID: <199802110351.VAA08010@einstein.ssz.com> Forwarded message: > Date: Tue, 10 Feb 1998 21:27:57 -0500 > From: David Miller > Subject: Re: Drivers licenses > > > It's a signal that is mixed and laid down by the machine. It covers the > > entire track. The cassette head only has two or four head depending on if > > it has auto-revers and moves the head. > > So you are saying that the is a continuous track of varying amplitiude > that > defines the audio signal? And that your bias is a part of this? Actualy a standard cassette tape has 4 tracks grouped in pairs. Each pair is given one of the channel. The audio that comes in is mixed with a bias signal (using a summing amp) and then laid down on the tape. > >From what I know, the bias is a parameter to the recording process and > not > the recording as it can be recovered from the magnets. It is something > intended to forward-correct error, which is not intended to be > interpreted > in the future. Huh? I have been involved in audio recording for over 20 years, acted as rodies for a host of bands (some of which actualy made records - but alas no money) and I must admit that the above sentences don't make any sense to me at all. Can you possible reword them? What magnets? 'paramter of the recording process'? 'forward-correct error'? 'interpreted in the future'? If your heads are magnetised you really should de-gauss them. They'll erase your tapes eventualy... > Looking for satellites? No, to do that I use a C-band hooked to a alt-az mount and a digital modem. I'll probably just make a normal Newtonian and hood a CCD camera to it and feed my Video Toaster to digitize and enhance the images. I am particular inchanged by the Moon. I can look at it for extended periods. I was enchanted by it when Men stepped onto it for the first time. I very much hope that we (as a race) go back to stay... > Did you snag a job? I had a headhunter call tonight. It's been a year > or > so since they've bothered me. I talked to BMC Software today. Looks like I'll probably go to work for them supporting their suite of database products. I should know tomorrow if they want to do the final interview which means I'll go to work for them on Monday. > > | The obvious is sometimes false; | > > | The unexpected sometimes true. | > > You've gotta get this Pringles thing in order. Faith breaks the back of > these > types of philosophies. If you give in to faith, you should normally > incorporate > it. That doesn't mean that you have to explain it through the > philosophy, but > if that faith is the only thing that you know is indespensable, you need > to > reconsider how indespensable a philosophy that does not make room for it > is. Uh, ok. Ta ta. ____________________________________________________________________ | | | The obvious is sometimes false; | | The unexpected sometimes true. | | | | Anonymous | | | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From eviljay at bway.net Tue Feb 10 19:58:53 1998 From: eviljay at bway.net (eviljay) Date: Wed, 11 Feb 1998 11:58:53 +0800 Subject: Cyber 'Nannys" Message-ID: <199802110346.WAA25404@nico.bway.net> > Dr. Dimento wrote: > > The mentally retarded pedophile Guy Polis tried to mailbomb me from his > former eviljay at bway.net account, and bway.net pulled his plug in minute. > > --- > > Dr. Dimento KOTM > Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps Everybody SING!!! The old grey crank, he ain't what he used to be, ain't what he used to be, ain't what he used to be. The old grey crank, he ain't what he used to be, and it'll be like that forevermore. > Is that censorship? Is sex with the impotent Dr. Dimento intercourse? -->EvilJay<-- MUH-HAHAHAHAHAHAHAHAHAHAHAAHA!!! From rah at shipwright.com Tue Feb 10 20:00:34 1998 From: rah at shipwright.com (Robert Hettinga) Date: Wed, 11 Feb 1998 12:00:34 +0800 Subject: FC98 Full Event Schedule Message-ID: --- begin forwarded text Resent-Date: Tue, 10 Feb 1998 18:19:23 -0400 X-Authentication-Warning: online.offshore.com.ai: list set sender to fc98-request at offshore.com.ai using -f X-Sender: rah at pop.sneaker.net Mime-Version: 1.0 Date: Tue, 10 Feb 1998 16:58:52 -0500 To: fc98 at offshore.com.ai From: Robert Hettinga Subject: FC98 Full Event Schedule Resent-From: fc98 at offshore.com.ai X-Mailing-List: archive/latest X-Loop: fc98 at offshore.com.ai Precedence: list Resent-Sender: fc98-request at offshore.com.ai Hello, Everyone! FC98 is fast approaching, and the FC98 organizing team is thrashing together a General Schedule for the combined FC98 events: The FC98 Conference, the FC98 Commercial Exhibition and Exhibition Program, and the FC98 Workshop. In addition to the ASCII version of the schedule in this message, Blanc Weber, the FC98 Exhibition and Sponsorship Manager, has put a very nice tabular version on the web for easy printing: Please send any corrections you might have to me offline. Okay, here's the schedule's roadmap: (CON) means conference activity, and an FC98 Conference Badge is required for attendance. (CE) means Commercial Exhibition activity, and is open to the public. (ECC) means Ecliptical Curve Cruise; Conference badgeholders go free, but badges are non-transferrable. Additional tickets for the Cruise are available for sale to FC98-associated people (family, friends, etc.). (IFCA) means the founding meeting of the International Financial Cryptography Association, which all FC98 Conference badgeholders, booth-holders and sponsors are now automatically members of. Only Conference badgeholders can vote at the first General Meeting of the Association, however. We don't have anything about the Workshop on this message, but we will have a schedule for it soon on the web page, for those of you who are interested in sticking around another week for the world's only financial cryptography bootcamp. :-). Also, all FC98 badgeholders, friends, and family are invited to the "Welcome to Anguilla" session on Monday to get some information and advice on what to do during your stay on Anguilla. Finally, like all schedules, this one is subject to change at a moment's notice. ;-). We'll try to keep the website as up-to-date as possible, because it's probably a good idea not to spam you nice folks will all the updates as they happen. :-) See you in Anguilla! Cheers, Robert Hettinga, General Chairman, The 1998 Financial Cryptography Conference, Exhibition and Workshop (FC98) ----- Monday 23 February 1998 800 -- 820 (CON) Breakfast 820 -- 830 (CON) FC98 Conference Sessions Welcome 830 -- 905 (CON) Micropayments via Efficient Coin-Flipping Richard J. Lipton (Princeton University, Princeton, NJ, USA) Rafail Ostrovsky (Bellcore, Morristown, NJ, USA) 905 -- 940 (CON) X-Cash: Executable Digital Cash Markus Jakobsson (Bell Laboratories, Murray Hill, NJ, USA) Ari Juels (RSA Laboratories, Bedford, MA, USA) 940 -- 1015 (CON) Distributed Trustees and Revokability: A Framework for Internet Payment David M'Raihi (Gemplus, Issy-les-moulineaux, France) David Pointcheval (GREYC, Universite de Caen, Caen, France) 1015 -- 1045 (CON) Coffee Break Exhibition Booths open 1045 -- 1120 (CON) A Platform for Privately Defined Currencies, Loyalty Credits, and Play Money David P. Maher (AT&T Labs--Research, Florham Park, NJ, USA) 1120 -- 1155 (CON) Assessment of Threats for Smart Card Based Electronic Cash Kazuo J. Ezawa, Gregory Napiorkowski (Mondex International, Florham Park, NJ, USA) 1155 -- 1230 (CON) Using a High-Performance, Programmable Secure Coprocessor Sean W. Smith, Elaine R. Palmer, Steve Weingart (IBM T.J. Watson Research Center, Yorktown Heights, NY, USA) 1230 -- 1330 (CON) Lunch 1330 -- 1400 (CE) The Required Hoopla: FC98 Official Event Opening Dignitaries (the Finance Minister?), FC98 sponsors, FC98 Management, etc. Thanks to Anguilla, Sponsors, etc. Administrivia/How FC98 works Ribbon Cutting for FC98 Exhibition FC98 Exhibition Sessions Welcome 1400--1430 (CE) FC98 Press Conference (on Exhibition Floor) 1400--1500 (CE) IBM Secure Crypto Coprocessor Demonstration Sean W. Smith, Elaine R. Palmer, Steve Weingart (IBM T.J. Watson Research Center) 1500--1600 (CE) (Bring friends and family if you want) Welcome to Anguilla! Anguilla history, what to do, what to see. Various Anguillan Chamber of Commerce, Tourist office folks. 1600--1700 (CE) "So, you want to bank on Anguilla?" Offshore Banking and Incorporation in Anguilla. Various Anguillan Bankers, Lawyers, Financial Planners, Etc. 1830 -- 2000 (CE) Cocktail Reception at Serenity Restaurant, Shoal Bay East Sponsored by Hansa Bank, Anguilla Tuesday 24 February 1998 800 -- 830 (CON) Breakfast 830 -- 905 (CON) Secure Group Barter: Multi-Party Fair Exchange with Semi-Trusted Neutral Parties Matt Franklin (AT&T Labs--Research, Florham Park, NJ, USA) Gene Tsudik (USC Information Sciences Institute, Marina del Rey, CA, USA) 905 -- 940 (CON) A Payment Scheme Using Vouchers Ernest Foo, Colin Boyd (Queensland University of Technology, Brisbane, Australia) 940 -- 1015 (CON) A Formal Specification of Requirements for Payment Transactions in the SET Protocol Catherine Meadows, Paul Syverson (Naval Research Laboratory, Washington, DC, USA) 1015 -- 1045 (CON) Coffee Break 1045 -- 1120 (CON) On Assurance Structures for WWW Commerce Markus Jakobsson (Bell Laboratories, Murray Hill, NJ, USA) Moti Yung (CertCo, New York, NY, USA) 1120 -- 1230 (CON) Panel Discussion Certificate Revocation: Mechanics and Meaning Barb Fox (Microsoft, Redmond, WA, USA), moderator Joan Feigenbaum (AT&T Labs--Research, Florham Park, NJ, USA) Paul Kocher (Valicert, Palo Alto, CA, USA) Michael Myers (Verisign, Mountain View, CA, USA) Ron Rivest (MIT Laboratory for Computer Science, Cambridge, MA, USA) 1230 -- 1330 (CON) Lunch 1330 -- 1430 (CE) FC98 Sponsor Showcase RSA Data Security 1430 -- 1530 (CE) FC98 Sponsor Showcase C2NET 1530 -- 1630 (CE) FC98 Sponsor Showcase Sicherheit und Privat- International Bank 1630 -- 1730 (CE) FC98 Sponsor Showcase Hansa Bank 1730 -- 1900 (CE) Cocktails and Barbecue at InterIsland Hotel Sponsored by RSA 1900 -- 2000 (IFCA) (CE) (CON to vote) General Meeting: The International Financial Cryptography Association (IFCA) IFCA Founders Group Photo (Net.Nyms Disguised) 2000 -- 2200 (CON to speak) (CE to watch ) Rump Session (For speaking requests contact Matt Franklin ) Beer provided by RSA Wednesday 25 February 1998 800 -- 830 (CON) Breakfast 830 -- 930 (CON) Invited Speaker Private Signatures and E-commerce David Chaum (DigiCash, Palo Alto, CA, USA) 930 -- 1005 (CON) Group Blind Digital Signatures: A Scalable Solution to Electronic Cash Anna Lysyanskaya, Zulfikar Ramzan (MIT Laboratory for Computer Science, Cambridge, MA, USA) 1005 -- 1045 (CON) Coffee Break 1045 -- 1120 (CON) Curbing Junk E-Mail via Secure Classification Eran Gabber, Markus Jakobsson, Yossi Matias, Alain Mayer (Bell Laboratories, Murray Hill, NJ, USA) 1120 -- 1155 (CON) Publicly Verifiable Lotteries: Applications of Delaying Functions David M. Goldschlag (Divx, Herndon, VA, USA) Stuart G. Stubblebine (AT&T Labs--Research, Florham Park, NJ, USA) 1155 -- 1230 (CON) Security of Digital Watermarks Lesley R. Matheson, Stephen G. Mitchell, Talal G. Shamoon, Robert E. Tarjan, Francis X. Zane (STAR Lab, InterTrust Technologies, Sunnyvale, CA, USA) 1230 -- 1330 (CON) Lunch 1330 -- 1405 (CON) Security in the Java Electronic Commerce Framework Surya Koneru, Ted Goldstein (JavaSoft, Palo Alto, CA, USA) 1405 -- 1440 (CON) Beyond Identity: Warranty-Based Digital Signature Transactions Yair Frankel (CertCo, New York, NY, USA) David W. Kravitz (Divx, Herndon, Virginia, USA) Charles T. Montgomery (CertCo, New York, NY, USA) Moti Yung (CertCo, New York, NY, USA) 1440 -- 1515 (CON) Compliance Checking in the PolicyMaker Trust Management System Matt Blaze, Joan Feigenbaum, Martin Strauss (AT&T Labs--Research, Florham Park, NJ, USA) 1515 -- 1545 (CON) Coffee Break 1545 -- 1620 (CON) An Efficient Fair Off-Line Electronic Cash System with Extensions to Checks and Wallets with Observers Aymeric de Solages, Jacque Traore (France Telecom--CNET, Caen, France) 1620 -- 1655 (CON) An Efficient Untraceable Electronic Money System Based on Partially Blind Signatures of the Discrete Logarithm Problem Shingo Miyazaki, Kouichi Sakurai (Kyushu University, Fukuoka, Japan) 1655 -- 1700 (CON) FC98 Conference Session Closing Official Conference T-shirts Group Photo (Net.Nyms Disguised) 1830 -- 2100? (CE) Financial Masquerade Ball (at Cap Julaca) Sponsored by Sicherheit und Privat- International Bank (Proper attire and disguises required, Groucho glasses available at the door). RSVP Thursday 26 February 1998 Beach/Cruise day. No FC98 activity scheduled today except breakfast and lunch at InterIsland for those who don't take the eclipse cruise. 800 -- 830 (ECC) (CON) Boarding: Ecliptic Curve Cruise [ECC] Sponsored by RSA C2NET Sicherheit und Privat- International Bank Hansa Bank Offshore Information Services Shipwright/e$ 825 *SHARP!* (ECC) (CON) ECC "Before" Group Photo (Net.Nyms Disguised) 830 *SHARP!* (ECC) (CON) Ecliptic Curve Cruise Departs For the Ecliptic Curve and the Zone of Totality 900 -- 1030 (Anguilla) (CON) Breakfast at InterIsland 1230 -- 1330 (Anguilla) (CON) Lunch at InterIsland 1435? (Anguilla) (CON) Maximum Partial Eclipse 1436 (ECC) (CON) ECC now at 16.57N, 62.15W (2 minute totality line, 9 miles north of Montserrat) Total Eclipse of the Sun, Maximum Totality "Diamond ring", the stars, and all... 2030 (ECC) (CON) Ecliptic Cryptography Cruise Returns to Anguilla ECC "After" Group Photo (Net.Nyms Disguised) Friday 27 February 1998 1000 -- 1030 (CON) Breakfast 1030 -- 1230 (CE) Roundtable Discussion Financial Intermediaries, Public Networks, and Financial Cryptography Steve Schear, First Ecache, moderator Paul Guthrie, VISA International Frank Trotter, Mercantile Bank/Mark Twain Ecash A. S. von Bernhardi, Sicherheit und Privat- International Bank Lynwood Bell, Hansa Bank Other Financial Intermediaries, TBA 1230 -- 1330 (CON) Lunch 1330 -- 1430 (CE) Roundtable Discussion The Regulation of Financial Cryptography Duncan Frissell, Frissell Associates, Moderator Kevin Manson, US Dept of Treasury, Financial Fraud Institute A. S. von Bernhardi, Sicherheit und Privat- International Bank Other Regulators, Lawyers, TBA 1430 -- 1655 (CE) Financial Cryptography Showcase Dave Del Torto/Dr. Jon Callas, PGP Certserver, banking applications Dr. Nicko van Someren, ncipher SET processing engine Stephan Overbeek, QC N-Count Ian Grigg/Gary Howland, Systemics, TBA Other FC Products, TBA 1655 -- 1700 (CE) FC98 Commercial Exhibition Closing Minor Exausted Hoopla Commercial Exhibition Survivors Group Photo (Net.Nyms Disguised) 1830 -- ? (CE) 2nd meeting: Anguilla Dining Cryptographers' Society (at Serenity) Partially sponsored by C2NET ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ Ask me about FC98 in Anguilla!: --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ Ask me about FC98 in Anguilla!: From ravage at ssz.com Tue Feb 10 20:37:17 1998 From: ravage at ssz.com (Jim Choate) Date: Wed, 11 Feb 1998 12:37:17 +0800 Subject: TEMPEST open-source definition version 0.1alpha (fwd) Message-ID: <199802110356.VAA08108@einstein.ssz.com> Forwarded message: > Subject: TEMPEST open-source definition version 0.1alpha > Date: Tue, 10 Feb 1998 20:19:46 EST > From: Ryan Lackey > time to reverse engineer the practical TEMPEST systems (and in so doing > perhaps the classified TEMPEST spec) out there. Next time I find a > TEMPEST case at swapfest, or at a con, I'll pick it up (if someone wants to > ship me one, so much the better). You *can* buy them from some vendors, Are you possibly confusing Tempest with a NEMA certified case? Educalc used to sell a case for the HP-41C calculator that they touted as NBC certified. I would suggest looking for one of the NIST certified environmental test cases that are available. They'll cook or chill your electronics and block the emissions quite handily. Be shure to get a supply for the copper door gaskets, they wear out under daily use about 3-4 times a year. ____________________________________________________________________ | | | The obvious is sometimes false; | | The unexpected sometimes true. | | | | Anonymous | | | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From shamrock at cypherpunks.to Tue Feb 10 20:50:15 1998 From: shamrock at cypherpunks.to (Lucky Green) Date: Wed, 11 Feb 1998 12:50:15 +0800 Subject: TEMPEST open-source definition version 0.1alpha In-Reply-To: <199802110119.UAA04666@the-great-machine.mit.edu> Message-ID: On Tue, 10 Feb 1998, Ryan Lackey wrote: > Of course, it would probably make a lot of sense to do TEMPEST reverse > engineering in a country that has neither an OSA nor the ability to randomly > classify research. Yet another project for cypherpunks.to, Lucky? I am currently busy with a complete GSM software implementation. Count me out. But you are welcome to host the pages on my box. :-) -- Lucky Green PGP v5 encrypted email preferred. "Tonga? Where the hell is Tonga? They have Cypherpunks there?" From dm0 at avana.net Tue Feb 10 21:07:36 1998 From: dm0 at avana.net (David Miller) Date: Wed, 11 Feb 1998 13:07:36 +0800 Subject: Someone find Jim Choate a job! Message-ID: <34E12FF3.1D6FC5DB@avana.net> Sensory deprivation has caused Mr.Choate to finally go haywire. I suggest that someone from the state of TX (who have IDs from Hell) transport him to the nearest University. --David Miller middle rival devil rim lad From rfarmer at HiWAAY.net Tue Feb 10 21:16:56 1998 From: rfarmer at HiWAAY.net (Uhh...this is Joe [Randall Farmer]) Date: Wed, 11 Feb 1998 13:16:56 +0800 Subject: Driver Licenses Message-ID: > > Either should work...I'll bet that scratching the shit off with his keys > worked too ;) > I'll have to remember that when it's time to get mine done. Shouldn't take much if all you need is to stop regular folks from scanning it -- if it's like some other systems, changing a couple bits will keep the checksum from checking and the reader will report the card as invalid. > > That was a good question, though, does anyone know how much data those > little stripes can hold? It can (emphasis on can; most stripes don't) store 300 bytes according to some -- 1846 characters of English in theory, 600 in practice, 480 uncompressed, 300 ASCII. 300 bytes is six monochrome compressed mugshots or a 2400-pixel (about 50x50) uncompressed monochrome photo, or it could hold 33 military-grade biometric IDs. A study of el33t h at qu3r ph1|ez show that actual credit and ATM cards don't use nearly 300 bytes. That might be because error rates would be astronomical, or it might just be because they can't use all the extra space. [After writing this, I saw another web site with a figure of 226 bytes, not 300. Don't know who's right, so I'm going with the paranoid estimate...] > > Scott R. Brower > http://www.infowar.com > http://www.efflorida.org --------------------------------------------------------------------------- Randall Farmer rfarmer at hiwaay.net http://hiwaay.net/~rfarmer From ravage at ssz.com Tue Feb 10 21:19:46 1998 From: ravage at ssz.com (Jim Choate) Date: Wed, 11 Feb 1998 13:19:46 +0800 Subject: Test [No Reply] Message-ID: <199802110525.XAA00742@einstein.ssz.com> Loop Test [No Reply] ____________________________________________________________________ | | | The obvious is sometimes false; | | The unexpected sometimes true. | | | | Anonymous | | | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From WebWarrior3 at InfoWar.Com Tue Feb 10 21:34:11 1998 From: WebWarrior3 at InfoWar.Com (WebWarrior3 at InfoWar.Com) Date: Wed, 11 Feb 1998 13:34:11 +0800 Subject: [Fwd: Russia/Iraq] Message-ID: <34E129F0.AE8D3EA4@InfoWar.Com> A bit off of our regularly scheduled program, but with Yeltsin saying that Clinton might be starting a 3rd World War last week, I thought I would pass this on. To: webwarrior3 at infowar.com Subject: Russia/Iraq From: alert at stratfor.com Date: Tue, 10 Feb 1998 19:59:26 -0600 (CST) ______________________________________ Check out our newest product: Santizer Give away your computer, not your data ______________________________________ Global Intelligence Update Red Alert February 11, 1998 Russia Threatens to Arm Baghdad But will Saddam Remain in Power? According to a report on Tuesday in the online edition of the Egyptian newspaper Al-sha'b, the Russian government has warned Washington that Russia will supply arms and humanitarian aid to Iraq if the United States chooses to abandon diplomatic efforts and attacks Iraq. Al-Sha'b reported that Baghdad requested 20 billion dollars in urgent military and humanitarian aid from Russia. Baghdad, which already owes Russia 80 billion dollars, hopes to be able to pay off its debt once sanctions are lifted. Al-Sha'b went on to report that Washington has monitored heightened states of alert and increased military preparedness throughout the Middle East, and has warned neighboring Arab states against providing Iraq with military support. If the Egyptian report is factual, then Russia has just moved even closer to confrontation with the United States. Its previous threats of world war are clearly not credible. Sending aid to Iraq is, on the other hand, quite credible and therefore is in many ways more dangerous. The question is, will Hussein be there after the U.S. attack to receive the arms? We have noticed a curious juxtaposition of official U.S. statements on the crisis in Iraq with the emerging balance of U.S. forces in the region, suggesting that Washington may be expecting an Iraqi coup d'etat. U.S. Secretary of State Madeleine Albright testified before the Senate on Tuesday that, in the event U.S. air strikes contributed to toppling Saddam Hussein, "it would create a situation which, for a time, would require the presence of troops." The United States has accelerated its deployment of ground troops to the region. Three thousand troops from Ft. Stewart are being deployed to reinforce the 1,500 U.S. ground troops already in Kuwait. The USS Tarawa and the USS Guam, amphibious assault ships each carrying a 2,000-man Marine Expeditionary Unit, are headed for the Persian Gulf. Other U.S. ground forces in the region include 6,000 soldiers at the Prince Sultan Air Base in Saudi Arabia and 10,000 soldiers engaged in military exercises in Egypt. Additionally, the list of potential U.S. targets has grown from suspected chemical and biological agent sites to include command and control installations, the Iraqi air force, and the Republican Guard. This suggests a decapitation strike, aimed at disrupting Hussein's capability to coordinate a defense of his hold on power. Iraqi opposition forces also appear to be preparing for an altered post-air strike environment. The rival Kurdish Democratic Party and Patriotic Union of Kurdestan are planning a meeting on February 12 to settle outstanding differences and stabilize their cease-fire. Iraqi Kurdestan's Conservative Party public relations officer, Aram Muhammad Sa'id, declared in an interview on Monday with the Iranian News Agency that Turkey's latest entry into northern Iraq had the "green light" from the United States, and was part of a U.S. plan to use air strikes to topple Hussein and dismember Iraq. Finally, the Iraqi National Congress has reported that Baath Party and military officials have begun evacuating southern Iraq, lest an uprising follow U.S. air strikes. Many in the U.S. Congress have asserted the need for an "end game" that removes Saddam Hussein from power, but thus far the U.S. has been unable to foment or coordinate an overthrow of Hussein. If it is to be successful, we will not know for certain about a coup plot's existence until it is underway. But circumstances do hint that something may be in the works. Baghdad has evidently noticed this, as Iraqi Foreign Minister Saeed al- Sahhaf asserted on Tuesday that the U.S. would fail to topple the Iraqi regime, since Hussein had the support of the Iraqi people. The question is this: is there a real possibility of a coup in Baghdad or is this part of U.S. psychological warfare against Iraq? In a way, the possibility of a coup is more reasonable an explanation for U.S. behavior than the idea that the U.S. is going to mount an air campaign against chemical and biological weapons. What is not clear is whether a coup has a real chance or whether this is just wishful thinking on the part of the United States. And it is not clear what Russia would do if the coup turned into a protracted internal struggle. ___________________________________________________ To receive free daily Global Intelligence Updates or Computer Security Alerts, sign up on the web at http://www.stratfor.com/mail/, or send your name, organization, position, mailing address, phone number, and e-mail address to info at stratfor.com ___________________________________________________ STRATFOR Systems, Inc. 3301 Northland Drive, Suite 500 Austin, TX 78731-4939 Phone: 512-454-3626 Fax: 512-454-1614 Internet: http://www.stratfor.com/ Email: info at stratfor.com From zooko at xs4all.nl Tue Feb 10 21:51:28 1998 From: zooko at xs4all.nl (Zooko Journeyman) Date: Wed, 11 Feb 1998 13:51:28 +0800 Subject: Deriving economic profits from writing FREE software? Message-ID: <199802110400.FAA18217@xs2.xs4all.nl> I have an idea for a model for deriving economic profits from writing free software. It requires dcash (specifically, some money that is cheaply and easily transferrable in small amounts). People submit requests for changes to a "wishlist"/"bug report list". Along with these requests they send dcash. Various mechanisms of market and/or trusted intermediary ensure that, on the whole, the hackers who satisfy the most highly valued wishes get the most money. See Grigg 1997 for one good idea of how such a market could operate. We already have extensive networks of wishlists, bug tracking systems, and the rest of an integrated open, distributed software development system (e.g. Linux, Debian, many others). Given the ability to pay (perhaps credit cards could be made to work here? Low cost credit card transactions? Cybercash?), we could start trying to add this kind of flow of cash to some such systems. Unfortunately, i fear that such attempts may fail and disrupt currently working systems... --Zooko P.S. Hi, y'all. I've switched continents, contexts, CPUs, sensitivities and perhaps more, but i'm fine. Thanks for missing me. p.p.s. as per this slashdot.org article, it is called "Open Software" from now on, not "Free Software". Tell the kids. From frantz at netcom.com Tue Feb 10 22:24:54 1998 From: frantz at netcom.com (Bill Frantz) Date: Wed, 11 Feb 1998 14:24:54 +0800 Subject: VanEck, Noise, & Palmtops... In-Reply-To: <199802101949.NAA05309@einstein.ssz.com> Message-ID: At 11:49 AM -0800 2/10/98, Jim Choate wrote: >If you want to defeat Van Eck you want either very quite or you want lots of >noise smoothly distributed across the rf spectrum. To defeat the integrating attacks you have described, you want to repeat the same noise frame after frame. It must be loud enough to swamp the signal going to the display, so the output of the integration is the noise and not the signal. ------------------------------------------------------------------------- Bill Frantz | Market research shows the | Periwinkle -- Consulting (408)356-8506 | average customer has one | 16345 Englewood Ave. frantz at netcom.com | teat and one testicle. | Los Gatos, CA 95032, USA From rdl at mit.edu Tue Feb 10 22:26:18 1998 From: rdl at mit.edu (Ryan Lackey) Date: Wed, 11 Feb 1998 14:26:18 +0800 Subject: TEMPEST open-source definition version 0.1alpha (fwd) Message-ID: > confusing TEMPEST with NEMA No, I am certain they're TEMPEST cases; they're government security vendors, with names that include the word TEMPEST or Security or whatever, and their prices are huge. And when I said "I'd like to pay COD", they said "we only accept government purchase forms." I have a plain NEMA 19" rack with power and fans, it's quite different. Black Unicorn's post about the demise of cash is particularly true when dealing with vendors who want government POs :) The people at hacking cons who are selling TEMPEST cases are selling what I believe are the real thing acquired through a variety of methods, some legal, others perhaps not. Usually they contain crufty old PCs, but one guy had some really nice fully-enclosed TEMPEST-compliant racks. They had serious power filters at the bottom, massive fans, and shielded fan i/o. They were basically free (a few hundred dollars), but I couldn't motor freight them from the location to my home, since I didn't have anything but cash at the time. ObNonCrypto: Waiting until 10 days before fc98 to buy airline tickets when the cheap fare expired an hour ago was SO SO SO stupid. Like taking 4 c-notes and lighting them on fire. Oh well. -- Ryan Lackey rdl at mit.edu http://mit.edu/rdl/ From declan at well.com Wed Feb 11 14:55:35 1998 From: declan at well.com (Declan McCullagh) Date: Wed, 11 Feb 1998 14:55:35 -0800 (PST) Subject: Transcript of Hillary Clinton's comments on Net-regulation Message-ID: ---------- Forwarded message ---------- Date: Wed, 11 Feb 1998 14:54:55 -0800 (PST) From: Declan McCullagh To: politech at vorlon.mit.edu Subject: Transcript of Mrs. Clinton's comments on Net-regulation Here's what Hillary Clinton said this afternoon about regulation of the Internet during an otherwise routine press conference in the Map Room about the "Millenium Evenings." Tonight at 7 pm EST she and the president will cybercast the first one from the east room of the White House. It's hardly surprising that our elected officials don't like the ability of the Internet to provide everyone with a platform. Even Thomas Jefferson kvetched about the excesses of the press of his day and in 1783 and 1788 endorsed laws that permitted government prosecutions of the press for printing "false facts." Though I somehow suspect that the first lady has recently been more worried about media reporting facts that may turn out to be true... -Declan === Q I just wanted to ask you about something that Gregg said. He's obviously an Internet enthusiast. But when he talked about some of the aspects of the system -- the fact that you could say something and you can't take it back, how it's so available to everyone and instantaneous, he's raised some issues that have been issues for us in the last few weeks in our business. And I wonder if you think that this new media is necessarily an entirely good thing. And also, as somebody who has been through this crucible, in the next millennium how would you like to see this new and ever more interesting -- (laughter) -- handled of things like the issues like the personal lives of public figures. MRS. CLINTON: Well, Kathy, I think that's one of these issues that Dick was referring to, that we're going to have to really think hard about. And I think that every time technology makes an advance -- when you move to the railroad, or you move to the cotton gin, or you move to the automobile, or the airplane, and now certainly as you move to the computer and increasing accessibility and instantaneous information on the computer, we are all going to have to rethink how we deal with this, because there are always competing values. There's no free decision that I'm aware of anywhere in life, and certainly with technology that's the case. As exciting as these new developments are -- and I think Gregg's enthusiasm is shared broadly by Americans and people around the world -- there are a number of serious issues without any kind of editing function or gate-keeping function. What does it mean to have the right to defend your reputation, or to respond to what someone says? There used to be this old saying that the lie can be halfway around the world before the truth gets its boots on. Well, today, the lie can be twice around the world before the truth gets out of bed to find its boots. I mean, it is just beyond imagination what can be disseminated. So I think we're going to have to really worry about this, because it won't be just public elected officials. We've seen some cases where somebody who had a grudge against a girl's mother because the family wouldn't let him date her put out on the Internet that the family were child abusers. Totally private people, never stuck their toe in public life. It can be done to anybody, and it can get an audience, and it can create a falsehood about somebody. And certainly it's multiplied many times over if you happen to be in public life. I don't have any clue about what we're going to do legally, regulatorily, technologically -- I don't have a clue. But I do think we always have to keep competing interests in balance. I'm a big pro-balance person. That's why I love the founders -- checks and balances; accountable power. Anytime an individual or an institution or an invention leaps so far out ahead of that balance and throws a system, whatever it might be -- political, economic, technological -- out of balance, you've got a problem, because then it can lead to the oppression people's rights, it can lead to the manipulation of information, it can lead to all kinds of bad outcomes which we have seen historically. So we're going to have to deal with that. And I hope a lot of smart people are going to -- Q Sounds like you favor regulation. MRS. CLINTON: Bill, I don't know what -- that's why I said I don't know what I'm in favor of. And I don't know enough to know what to be in favor of, because I think it's one of those new issues we've got to address. We've got to see whether our existing laws protect people's right of privacy, protect them against defamation. And if they can, how do you do that when you can press a button and you can't take it back. So I think we have to tread carefully. Q -- one of the balances, though, in this new digital age is that you can have direct communication. You're celebrating that tonight -- people can log on from anywhere. In that spirit, have you thought any more about a direct and frank conversation by the President with the country about these allegations? MRS. CLINTON: I'm not going to add anything to what the President has already said. And I think that any of you who think hard about this issue would have to agree that he's taken the right position. So I'm not going to add to that. === From mixmaster at remail.obscura.com Wed Feb 11 15:03:03 1998 From: mixmaster at remail.obscura.com (Mixmaster) Date: Wed, 11 Feb 1998 15:03:03 -0800 (PST) Subject: Anti-Asian E-Mail Message-ID: <199802112253.OAA05499@sirius.infonex.com> "Gennaco said prosecutors may suggest that Machado attend a racial awareness program as part of his sentence." Political re-education, anyone? Take names, take names, take names. From sunder at brainlink.com Wed Feb 11 15:22:33 1998 From: sunder at brainlink.com (sunder) Date: Wed, 11 Feb 1998 15:22:33 -0800 (PST) Subject: [Fwd: SpookTech98] Message-ID: <34E231DF.28169BB0@brainlink.com> To: (Recipient list suppressed) Subject: SpookTech98 From: SpyKing Date: Sun, 08 Feb 1998 06:26:52 -0500 SpyKing, with a little help from his friends, is pleased to announce: SpookTech98 The Methods of Eavesdropping & Surveillance Seminar II Live from New York City Friday, June 5, 1998 Location: The Crown Plaza at the United Nations 304 East 42nd Street, New York, NY 10017 Sponsered by the Codex Surveillance & Privacy News, A.L.M.I.E. Association of Legal, Medical & Investigative Experts and W.A.S.P. World Association of Surveillance Professionals. If you missed it last year... Don't make the same mistake twice... You'll meet lots of great people and you'll learn a lot... In our "Methods of Eavesdropping & Surveillance" Seminar II you'll learn how various surveillance devices work... and how to protect against them... You will also learn how the spies among us access confidential information sources and learn everything there is to know about YOU... If you're serious about protecting your privacy... you can't afford to miss this seminar... enrollment is VERY limited... You will see ACTUAL Demonstrations... of the latest Surveillance equipment & Investigative techniques... We will have some vendors this year displaying their wares... If you are a vendor and would like to exhibit let us know... You will learn how: Offices/Homes are bugged Phones are tapped Cellular Calls are monitored People/Vehicles are followed Computers are eavesdropped on You will also learn how to PROTECT yourself from these surveillance techniques... We will also give a "live" demonstration of computer data interception... something everyone who "surfs" the net needs to be aware of... AND... We will "crack" a PGP message, show the targets passphrase AND the content of the message... If you're interested in privacy you shouldn't miss SpookTech98! You do NOT have to be a victim... You will receive a Wealth of Handout Material... This is no nonsense information packed seminar taught by seasoned professionals with a lifetime of surveillance experience in the field... You will ALSO Learn How the Spies Among us Obtain: Non-published telephone numbers Addresses from Non published numbers Utility Company information Health insurance information Records of Toll calls Cable company information Bank Accounts & balances Cellular Toll records Pager/Beeper user information and as an added bonus... ALL attendees will receive a FREE micro video pinhole camera and we'll show you HOW to use it to PROTECT your person and/or assets... If you're serious about protecting your privacy... you can't afford to miss this seminar... enrollment is VERY limited... Seminar Date: Friday, June 5, 1998 Hours: 9:00 AM to 6PM Location: The Crown Plaza at the United Nations 304 East 42nd Street, New York, NY 10017 Cost: Advanced Registration SLF & W.A.S.P. Members $295.00 Non-Members $350.00 Day of Seminar Registration at the Door $375.00 (Cash or Money Order Only) We have created a SpookTech98 powerpoint presentation for information purposes if anyone would like... just hit reply and request SpookTech98.ppt Refreshments will be served ALL day during the seminar including a FREE buffet lunch and SpyKing will host a FREE party for all attendees afterwards SOMEWHERE IN NEW YORK CITY... and I'll pick up the tab again ;-) Please printout this form and send with reservation. Your reservation will be confirmed to guarantee your seat. Seating is LIMITED. ************************************************************************ Registration Form SpookTech98 ************************************************************************ Name: Company: Street Address: City: State: Postal Code: Country: E-Mail: Tel: Fax: Amount Enclosed: *************************************************************************** *************************************************************************** The information supplied in this registration form is STRICTLY confidential and will NOT be supplied to anyone. It is strictly for inhouse registration confirmation. **************************************************************************** **************************************************************************** Send Registration Form & Payment to: Codex Publishing 2472 Broadway, Suite 328 New York, New York 10025 USA 917-277-1983 **************************************************************************** **************************************************************************** ************************************************************************* The Codex Surveillance & Privacy News - http://www.thecodex.com Moderator of "The Surveillance List"... http://www.thecodex.com/list.html The FIRST & ONLY list dedicated to Surveillance & Investigative Technology... "We don't spy on you... but we DO keep an eye on those that do..." ************************************************************************* From nobody at REPLAY.COM Wed Feb 11 15:38:15 1998 From: nobody at REPLAY.COM (Anonymous) Date: Wed, 11 Feb 1998 15:38:15 -0800 (PST) Subject: PGP 5.5 BS upgrade Message-ID: <199802112338.AAA16726@basement.replay.com> Has anyone got the upgrade/bugfix for PGP 5.5 Business Security? I think it's 5.5.2 (?) I'm looking for the Win platform upgrade if anyone can help. Perhaps someone could upload it to a c'punk FTP site or post the URL. Thanks in advance! From shamrock at cypherpunks.to Tue Feb 10 23:54:53 1998 From: shamrock at cypherpunks.to (Lucky Green) Date: Wed, 11 Feb 1998 15:54:53 +0800 Subject: TEMPEST open-source definition version 0.1alpha (fwd) In-Reply-To: Message-ID: On 11 Feb 1998, Ryan Lackey wrote: > ObNonCrypto: Waiting until 10 days before fc98 to buy airline tickets when > the cheap fare expired an hour ago was SO SO SO stupid. Like taking 4 c-notes > and lighting them on fire. Oh well. Ouch. Guess you learned that one the hard way. See you all in Anguilla. Remember, bring a US analog cellphone and export versions of Ricochet modems. Also any and all satelite ground station equippment you might have access to. Yes, that does mean your INMARSAT phones. -- Lucky Green PGP v5 encrypted email preferred. "Tonga? Where the hell is Tonga? They have Cypherpunks there?" From jya at pipeline.com Wed Feb 11 16:16:29 1998 From: jya at pipeline.com (John Young) Date: Wed, 11 Feb 1998 16:16:29 -0800 (PST) Subject: UK Crypto Ban? Message-ID: <1.5.4.32.19980212001956.00b27e4c@pop.pipeline.com> From: Campaign Against Censorship of the Internet To: ukcrypto at maillist.ox.ac.uk Date: Tue, 10 Feb 1998 18:18:28 +0100 Subject: Key escrow announcement A source who is a lobbyist in a non-computer sector has just called me to say that Margaret Beckett will be announcing a (compulsory?) key escrow program next Tuesday. So far I don't have independent confirmation, although Nigel Hickson recently said here that he was expecting an announcement "soon". Here's hoping we can get it out before the gvt machine controls the spin. Regards, Malcolm Hutty. ----------------------------------------------------------------- Campaign Against Censorship Tel: 0171 589 4500 of the Internet in Britain Fax: 0171 589 4522 e-mail: cacib at liberty.org.uk Say NO to Censorship Web: http://www.liberty.org.uk/cacib ---------- Date: Wed, 11 Feb 1998 23:57:32 +0000 To: ukcrypto at maillist.ox.ac.uk From: T Bruce Tober Subject: More rumours? -----BEGIN PGP SIGNED MESSAGE----- Free Life Commentary Editor: Sean Gabb Issue Number Ten Tuesday 10th February 1998, 11:20pm ========================== "Over himself, over his own mind and body, the individual is sovereign" (J.S. Mill, On Liberty, 1859) ========================== Next Week's British Encryption Ban by Sean Gabb Earlier this evening, I was given confidential information by someone close to a British Cabinet Minister. I am not in the habit of speaking to such people, let alone having them leak state secrets to me. But that is what happened. In publishing what I heard, I am now risking a prosecution under the Official Secrets Acts - or, more likely, being made to look ridiculous if what I predict does not happen. These risks being accepted, here is the leak. Next Tuesday, the 17th February 1998, the Department of Trade and Industry will announce plans to outlaw the use of strong encryption software within the United Kingdom. We are to be encouraged - and ultimately forced - to encrypt our e-mail only in ways that will allow the authorities to read it. My source was vague about the details of the scheme, saying that they had not yet been circulated to the full Cabinet. But I imagine that it will be more or less a reprint of the Conservative Government's public consultation paper of March 1997. This came to nothing because of the change of Government, and it was even hoped that Labour would have a more liberal policy on Internet regulation. However, Margaret Beckett, the Minister now responsible for trade and industrial policy, is neither bright nor forceful; and she was early captured by the officials who in theory are supposed to do her bidding. If next Tuesday's consultation paper differs at all from the last one, it will be only in matters of small detail and presentation. For this reason, it is probably safe to take the last paper as a guide to what we can expect. The Government will propose creating a network of what are called Trusted Third Parties, or TTPs. These are to be organisations licensed to provide encryption services to the public - that is, software, consultancy and other support. Because they have been licensed by the State, we are to be encouraged to believe that they really are trustworthy - that they are not distributing bad encryption software, or robbing their clients in other ways. But just in case we decide not to believe any of this, it will be made illegal for any unlicensed person to offer encryption services. Here, it is worth quoting from last year's consultation paper: The legislation will prohibit an organisation from offering or providing encryption services to the UK public without a licence. Prohibition will be irrespective of whether a charge is made for such services. The offering of encryption services to the UK public (for example via the Internet) by an unlicensed TTP outside of the UK will also be prohibited. For this purpose, it may be necessary to place restrictions on the advertising and marketing of such services to the public. Enacted into law, this would make it illegal for me to copy encryption software from my hard disk for a friend, and for computer magazines to include it on their free cover disks. It would also allow a strict supervision of the material and the links given access to by British sites on the World Wide Web. The paper never clarifies why we need TTPs in the first place, or why - their need granted - they can only be trusted if licensed by the State. But it does say a lot about law enforcement and national security. Or, to be more accurate, it does say a lot in the usual code about the need to fill in any last potholes on the road to a British police state. Starting with the Interception of Communications Act 1985, the British State has given itself powers of surveillance that a Third World dictator might envy. It can tap our phones on the word of a Minister. It can burgle our homes and leave recording devices behind on the word of a senior policeman. It can trawl through and inspect any records on us held by any organisation. It can do all this without our knowledge, and without any effective system of appeal and redress. The relevant laws are careful to describe the permissions for this as "warrants". But they really are no more than what in France before the Revolution were called Lettres du Cachet - things that our ancestors boasted did not and could not exist in the freer air of England. The spread of personal computers seemed likely at first to extend the scope of surveillance still further. This had until then been limited by cost. For all the theoretical risks, sending letters in sealed envelopes through the post has always been reasonably secure: the costs of interception can only be justified in exceptional cases. For the same reason, most private papers are safe. But the routing of an increasing amount of mail through the Internet promised to bring down the costs of surveillance to the point where everyone could be watched. The storage of records on computers connected to the Internet promised to make it possible for the authorities to spy on people by remote control. The problem is the development of strong encryption software like pgp, and its growing popularity among millions of ordinary people who, though not criminals, have a strong regard for privacy. It allows us to keep our e-mail and private records secret to all but the most determined and expensive attacks. It gives to us the benefits of instant communication and mass data storage, but keeps the authorities - despite their new powers of surveillance - no better informed than in the old days of due process and envelope steaming. Therefore all the talk of Trusted Third Parties. The terms of their licences will require them to sell encryption software with keys that cannot be modified by their clients, and to collect and store copies of these keys for handing over to the authorities. Last year's document is full of promises about "strict safeguards" and the like. But the reality is this: The legislation will provide that the Secretary of State may issue a warrant requiring a TTP to disclose private encryption keys... or a body covered by that warrant. No mention of judicial involvement at the time, or judicial review afterwards - just more police state commands. We can ignore anything the Government parrots next week about law enforcement and national security - or, for that matter, child pornography and complex fraud. These really are just code words. If I were a criminal, or a terrorist, or a foreign spy, the last encryption software I would use would come from a Trusted Third Party. Strong encryption packages are available all over the Internet, or can pass from hand to hand on a single floppy disk. Nor would I worry much about laws against the transmission of data encrypted with unlicensed software. There are ways of keeping the authorities from even knowing that an Internet message contains encrypted data. Somewhere, I have an early version of a program called Steganography, created by Romana Machado. This takes an encrypted text and merges it into a graphics file. My version produces a visible degradation of picture quality. Almost certainly, the newer releases have solved this problem. Assuming I had them, and were sufficiently unpatriotic - neither applies in my case, let me add - I could e-mail this country's battle plans straight off to Saddam Hussain merged invisibly into a picture of my dog. GCHQ would never notice until the Scud missiles began landing on Cheltenham. No - the encryption ban will be aimed at us, the honest public. We are the people who tend to respect the law - or at least to be afraid of it enough to comply in most cases. It is our privacy that is to be stripped away. It is we who are to become like Winston Smith, living for every moment when the telescreens are not monitoring our facial expressions. Why this is desired I cannot say. But we are living though an age of withering trust in the common people. In this country, we are not trusted to possess guns for our self-defence - or indeed to carry carpet knives locked inside our cars. We are not trusted to choose and administer our own medicines, or to bring up our own children in the manner of our choice, or to decide whether or not oxtail soup might be bad for us. Plugging in the telescreens is only a logical next step. Normally, when I write on these issues, I work myself into a frenzy of pessimism. At the moment, though, I feel rather optimistic. Next Tuesday's proposals will cause an uproar. This will not come from the so-called civil liberties groups like Liberty - excepting a few small bodies like the Libertarian Alliance, they have all been taken over by New Labour apparatchiks who can be trusted to keep their mouths shut. It will come from the big business interests. British Telecom is the third or fourth largest telecommunications company in the world. If operates in more than 40 markets, often needing to provide its clients with very secure networks. In the City of London there are more representative offices of foreign banks than in the rest of the European Union combined. These have a taste for confidentiality. There are many other large interests - all paying billions in taxes, all likely to be very hostile to any scheme that will make them appear less useful to foreign clients. We have a Labour Government that still needs to establish itself in the public mind as a party friendly to business. These facts can surely be trusted to ensure the dropping of a scheme that would not merely turn the country into a full police state, but also do the greatest damage to British business since nationalisation. Or so I hope. ========================== Free Life Commentary is an independent journal of comment, published on the Internet. To receive regular issues, send e-mail to Sean Gabb at old.whig at virgin.net Issues are archived at Contact Address: 25 Chapter Chambers, Esterbrooke Street, London, SW1P 4NN; Telephone: 0181 858 0841 If you like Free Life Commentary, you may also care to subscribe to my longer, hard copy journal, Free Life, subscription details for which can be obtained by writing to me at the above address. ========================== Legal Notice: Though using the name Free Life, this journal is owned by me and not by the Libertarian Alliance, which in consequence bears no liability of whatever kind for the contents. - -- Sean Gabb | "Over himself, over his own | E-mail: old.whig at virgin.net | mind and body, the individual| | is sovereign" | Mobile Number: 0956 472199 | J.S. Mill, On Liberty, 1859 | -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 5.0i for non-commercial use Charset: noconv iQCVAwUBNOI4cDzmzFmU9IJVAQFOFAQAlLgKRAM6wTztCSVvUAAUY/g8k0iOKCGY 4s8O7c+axQUcf3e3RTxKbIPqoIeb81uIcKwv86havRuUsm2r2OHADuRBlWT7VgrR RKKCuuvrF19G4/hLTn7094NqUvnp5LAZpKOX7ITYQC/grQL8gnkd/xvpj55Z9oek idz0EU18xJo= =cNRU -----END PGP SIGNATURE----- tbt -- -- |Bruce Tober, octobersdad at reporters.net, Birmingham, England +44-121-242-3832| | Freelance PhotoJournalist - IT, Business, The Arts and lots more | |pgp key ID 0x94F48255. Website - http://www.homeusers.prestel.co.uk/crecon/ | From shamrock at netcom.com Wed Feb 11 00:38:17 1998 From: shamrock at netcom.com (Lucky Green) Date: Wed, 11 Feb 1998 16:38:17 +0800 Subject: Anguilla and Ricochet Message-ID: <3.0.2.32.19980211003056.0075df9c@netcom10.netcom.com> Folks, I would like to coordinate the wireless communication efforts for FC'98 in Anguilla. If you were there last year, you know that the lack of a meaningful communication infrastructure is the number one problem on the island. If you intend to bring, or have access to, wireless modems [Ricochet], satellite ground stations [VSAT, INMARSAT], or the like, please get in touch with me immediately. Thanks, -- Lucky Green PGP encrypted mail preferred "I do believe that where there is a choice only between cowardice and violence, I would advise violence." Mahatma Gandhi From dlv at bwalk.dm.com Wed Feb 11 18:27:29 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Wed, 11 Feb 1998 18:27:29 -0800 (PST) Subject: Me & Louis Freeh In-Reply-To: Message-ID: Declan McCullagh writes: > Just got mail -- > > >Have some friends in the FBI and I just thought that you would like to > >know that Louis Freeh personally considers you, and I quote, and > >"radical". Amazing, isn't it? > > > >Just thought you would like to know what the great Louis Freeh thinks of > >you... > > Somehow I get the impression that FBI directors don't like "radicals" much... I don't like people who forge quotes from me in their netly news "exposes", as Declan has done. Center for Democracy in Technology doesn't like Declan either - they've even complained to Declan's editors at Time Warner about his lies and fabrications. What does it mean when the Vulis, CDT, and the FBI all agree? P.S. Declan, are you an alcoholic? --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From guy at panix.com Wed Feb 11 18:33:43 1998 From: guy at panix.com (Information Security) Date: Wed, 11 Feb 1998 18:33:43 -0800 (PST) Subject: www.lanl.gov Message-ID: <199802120233.VAA17969@panix2.panix.com> Bleep! I pulled up www.lanl.gov (for whatever reason), flipped back to my ISP shell account, did some stuff, logged out. Five minutes later, my PPP connection timed out, and so the line dropped. Two minutes after that, my computer dialed up my ISP and connected to the Net again: it was the LANL page. I hit 'STOP', and the connection timed out again, and that was that. I hate the way there isn't some choice about allowing (JAVA?) to NOT do that unless expressly allowed. I wonder what LANL loaded into my system that needed Net connectivity after seven minutes??? ---guy Vulgersauris is a shadow of his former self. From tihu at wvz.net Wed Feb 11 18:37:15 1998 From: tihu at wvz.net (tihu at wvz.net) Date: Wed, 11 Feb 1998 18:37:15 -0800 (PST) Subject: U.S. Income Tax Returns - $199 (Feb 28th deadline) Message-ID: <19980210405OAA38218@post.fr>




  INCOME TAX SPECIAL




INCOME TAX SPECIAL! - $199

Any State and Federal Income Tax Return

Offer Expires Febuary 28th!

Click Here to take your Income Tax Return headaches away!

C.P.A.- -over 18 years experience -Masters Degree in Science and Taxation
From guy at panix.com Wed Feb 11 18:56:48 1998 From: guy at panix.com (Information Security) Date: Wed, 11 Feb 1998 18:56:48 -0800 (PST) Subject: Me & Louis Freeh Message-ID: <199802120256.VAA19033@panix2.panix.com> > To: cypherpunks at toad.com > Subject: Re: Me & Louis Freeh > From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) > I don't like people who forge quotes from me in their netly news "exposes", > as Declan has done. Huh? > What does it mean when the Vulis, CDT, and the FBI all agree? Didn't happen. > Declan, are you an alcoholic? No, he's a free radical. ---guy h'yuk h'yuk h'yuk From hedges at infonex.com Wed Feb 11 20:05:19 1998 From: hedges at infonex.com (Mark Hedges) Date: Wed, 11 Feb 1998 20:05:19 -0800 (PST) Subject: www.lanl.gov In-Reply-To: <199802120233.VAA17969@panix2.panix.com> Message-ID: I hope you'll endure a product endorsement.. use Anonymizer Surfing when trolling for "sensitive" information on web sites you don't trust. Stops Java, Javascript, and cookies, hides your IP address, etc. Free trial available with delay; $5 per month in quarters eliminates the free trial delay. Yes, it's still sometimes slower, because the traffic travels further, but now it's sitting on a pretty reliable ATM network with decent connectivity. Mark Hedges Anonymizer, Inc. >Two minutes after that, my computer dialed up my ISP and >connected to the Net again: it was the LANL page. > >I hit 'STOP', and the connection timed out again, and that was that. > >I hate the way there isn't some choice about allowing (JAVA?) >to NOT do that unless expressly allowed. From declan at well.com Wed Feb 11 20:08:27 1998 From: declan at well.com (Declan McCullagh) Date: Wed, 11 Feb 1998 20:08:27 -0800 (PST) Subject: Me & Louis Freeh In-Reply-To: <199802120256.VAA19033@panix2.panix.com> Message-ID: Geez, I was wondering why I hadn't heard anything from Vulis in so long. Forgot I killfiled him half a year ago. Now I remember why. -Declan At 21:56 -0500 2/11/98, Information Security wrote: > > To: cypherpunks at toad.com > > Subject: Re: Me & Louis Freeh > > From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) > > > I don't like people who forge quotes from me in their netly news >"exposes", > > as Declan has done. > >Huh? > > > What does it mean when the Vulis, CDT, and the FBI all agree? > >Didn't happen. > > > Declan, are you an alcoholic? > >No, he's a free radical. >---guy > > h'yuk h'yuk h'yuk From guy at panix.com Wed Feb 11 20:12:38 1998 From: guy at panix.com (Information Security) Date: Wed, 11 Feb 1998 20:12:38 -0800 (PST) Subject: www.lanl.gov Message-ID: <199802120412.XAA24363@panix2.panix.com> > From hedges at infonex.com Wed Feb 11 23:05:14 1998 > > I hope you'll endure a product endorsement.. use Anonymizer Surfing > when trolling for "sensitive" information on web sites you don't trust. > Stops Java, Javascript, and cookies, hides your IP address, etc. I don't trust any sites. And, I hear the anonymizer blocks some highly useful sites like DejaNews, which would have been a handy way to post anonymously. And I can turn off Java and cookies. What I really should do is take the time to run Netscape under 'chroot'. ---guy From tcmay at got.net Wed Feb 11 20:38:32 1998 From: tcmay at got.net (Tim May) Date: Wed, 11 Feb 1998 20:38:32 -0800 (PST) Subject: Specious use of specie? In-Reply-To: <199802120233.VAA17969@panix2.panix.com> Message-ID: At 8:05 PM -0800 2/11/98, Mark Hedges wrote: >Free trial available with delay; $5 per month in quarters eliminates Hey, the _postage_ on mailing 20 quarters every month will get to be a headache. Can't you accept dollar bills? Or a check? --Tim May Voluntary Mandatory Self-Rating of this Article (U.S. Statute 43-666-970719). Warning: Failure to Correctly and Completely Label any Article or Utterance is a Felony under the "Children's Internet Safety Act of 1997," punishable by 6 months for the first offense, two years for each additional offense, and a $100,000 fine per offense. Reminder: The PICS/RSACi label must itself not contain material in violation of the Act. ** PICS/RSACi Voluntary Self-Rating (Text Form) ** : Suitable for Children: yes Age Rating: 5 years and up. Suitable for Christians: No Suitable for Moslems: No Hindus: Yes Pacifists: No Government Officials: No Nihilists: Yes Anarchists: Yes Vegetarians: Yes Vegans: No Homosexuals: No Atheists: Yes Caucasoids: Yes Negroids: No Mongoloids: Yes Bipolar Disorder: No MPD: Yes and No Attention Deficit Disorder:Huh? --Contains discussions of sexuality, rebellion, anarchy, chaos,torture, regicide, presicide, suicide, aptical foddering. --Contains references hurtful to persons of poundage and people of color.Sensitive persons are advised to skip this article. **SUMMARY** Estimated number of readers qualified to read this: 1 Composite Age Rating: 45 years From tcmay at got.net Wed Feb 11 20:44:39 1998 From: tcmay at got.net (Tim May) Date: Wed, 11 Feb 1998 20:44:39 -0800 (PST) Subject: www.lanl.gov In-Reply-To: <199802120233.VAA17969@panix2.panix.com> Message-ID: At 6:33 PM -0800 2/11/98, Information Security wrote: >I pulled up www.lanl.gov (for whatever reason), flipped back to >my ISP shell account, did some stuff, logged out. > >Five minutes later, my PPP connection timed out, and so >the line dropped. > >Two minutes after that, my computer dialed up my ISP and >connected to the Net again: it was the LANL page. > >I hit 'STOP', and the connection timed out again, and that was that. > >I hate the way there isn't some choice about allowing (JAVA?) >to NOT do that unless expressly allowed. > >I wonder what LANL loaded into my system that needed Net connectivity >after seven minutes??? Perhaps LANL felt it needed to analyze what was on your computer? To see if you were an Iraqi or Albanian or Quebecois spy attempting to learn atomic secrets? (LANL for those of you mysitified by this is Los Alamos National Laboratory, of course. A beautiful place, high in the Jemez mountains of New Mexico. As nuclear weapons work has been declinining, they've been casting about for a new mission to justify government pork being sent their way. One of their new interests is in hacking, intrusion, and "open sources.") --Tim May Just Say No to "Big Brother Inside" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From csm70830 at port.ac.uk Wed Feb 11 04:49:52 1998 From: csm70830 at port.ac.uk (Paul Bradley) Date: Wed, 11 Feb 1998 20:49:52 +0800 Subject: Cyber 'Nannys" In-Reply-To: <34DF87FE.611AA4EF@InfoWar.Com> Message-ID: <18B66325A0@ou20.csm.port.ac.uk> > >While I do not disagree that these companies should be able to market > >their products, I wholeheartedly disagree with the fact that often their > >customers (the adults who bought the software or subscribed to he > >'service') are not allowed to have a list of what is actually blocked, > > So you wholeheartedly disagree that they are not giving you a list of what > is blocked...so go use another service. I second that, it is strange how easily it is to bait supposedly libertarian list members into saying statist things about "consumer protection laws" and other such examples of state force and coercion over businesses. I do not go out, but a piece of software, then "demand" that I am given the source code and an explanation of why each line was written in the particular way it appears, of course this is all an aside to the real point that people should know better than to try to "protect" children from speech they don`t like. -- Paul Bradley paul at fatmans.demon.co.uk "Why should anyone want to live on rails?" - Stephen Fry From ichudov at algebra.com Wed Feb 11 20:56:18 1998 From: ichudov at algebra.com (Igor Chudov @ home) Date: Wed, 11 Feb 1998 20:56:18 -0800 (PST) Subject: www.lanl.gov In-Reply-To: <199802120412.XAA24363@panix2.panix.com> Message-ID: <199802120453.WAA30761@manifold.algebra.com> Information Security wrote: > > From hedges at infonex.com Wed Feb 11 23:05:14 1998 > > I hope you'll endure a product endorsement.. use Anonymizer Surfing > > when trolling for "sensitive" information on web sites you don't trust. > > Stops Java, Javascript, and cookies, hides your IP address, etc. > > I don't trust any sites. > Try using crowds. - Igor. From attila at primenet.com Wed Feb 11 21:11:08 1998 From: attila at primenet.com (attila) Date: Wed, 11 Feb 1998 21:11:08 -0800 (PST) Subject: Transcript of Hillary Clinton's comments on Net-regulation In-Reply-To: Message-ID: On Wed, 11 Feb 1998, Declan McCullagh wrote: > > I don't have any clue about what we're going to do legally, > regulatorily, technologically -- I don't have a clue. But I do think > we always have to keep competing interests in balance. I'm a big > pro-balance person. That's why I love the founders -- checks and > balances; accountable power. Anytime an individual or an institution > or an invention leaps so far out ahead of that balance and throws a > system, whatever it might be -- political, economic, technological -- > out of balance, you've got a problem, because then it can lead to the > oppression people's rights, it can lead to the manipulation of > information, it can lead to all kinds of bad outcomes which we have > seen historically. So we're going to have to deal with that. And I > hope a lot of smart people are going to -- > pro-balance? JAFR --just another form of regulation. the concept of free thought for anyone outside of the inner circle has never occurred to Hillary. does Chelsea view Hillary as her "mother" or as an automan who conceived her before her clocked ticked out? all the show of family is a sham for Hillary; Hillary is straight out of "Logan's Run" and automated child care --the global village concept of procreation, child rearing, and education in a protypical defined environment to the party line. > Q Sounds like you favor regulation. > even Kathy picked up on that one! > MRS. CLINTON: Bill, I don't know what -- that's why I said I > don't know what I'm in favor of. And I don't know enough to know > what to be in favor of, because I think it's one of those new issues > we've got to address. We've got to see whether our existing laws > protect people's right of privacy, protect them against defamation. > And if they can, how do you do that when you can press a button and > you can't take it back. So I think we have to tread carefully. > if you print a newspaper, you can not retract the comment (but the distribution is less). the government will attack the remailers on accountability, yet the courts have consistently ruled on the constitutionality of anonymous handbills. why do they not come out and state what their real agenda is? the internet is not the controlled media (the gatekeepers of Hillary's later comments --in fact that is the most direct reference to government leaning on the press I have seen in print by a high ranking power behind the throne. the issue is that the internet strikes fear in the hearts of the scalawags, bounders, and highwaymen posing as our elected representatives to what was _our_ republic. attila out... again From ian.sparkes at 17.dmst02.telekom400.dbp.de Wed Feb 11 06:07:15 1998 From: ian.sparkes at 17.dmst02.telekom400.dbp.de (Sparkes, Ian, ZFRD AC) Date: Wed, 11 Feb 1998 22:07:15 +0800 Subject: Legality of *non*-encryption Message-ID: <000001b0000000c4*/c=de/admd=dbp/prmd=telekom400/o=dmst02/ou=17/s=sparkes/g=ian/@MHS> I heard an interesting new slant on the legality of encryption today. I was talking to a colleague who is employed in a law firm here in Germany. It appears that under the current interpretation of German law, communications of a confidential nature (for example, contracts, medical records and so forth) over an insecure network *MUST* be encrypted to protect the Client. It is therefore a breach of German law to send unencypted eMail, unless it can be proved that every stage of the transmission happens over internal (secure?) paths. I will dig further on this - perhaps there is a useful precedent to be established here. At very least we might be able to keep lawers (and doctors) off the net ;-) From ravage at ssz.com Wed Feb 11 06:25:26 1998 From: ravage at ssz.com (Jim Choate) Date: Wed, 11 Feb 1998 22:25:26 +0800 Subject: VanEck, Noise, & Palmtops... (fwd) Message-ID: <199802111428.IAA02962@einstein.ssz.com> Forwarded message: > Date: Tue, 10 Feb 1998 22:08:06 -0800 > From: Bill Frantz > Subject: Re: VanEck, Noise, & Palmtops... > To defeat the integrating attacks you have described, you want to repeat > the same noise frame after frame. It must be loud enough to swamp the > signal going to the display, so the output of the integration is the noise > and not the signal. True, but then we aren't talking about standard PC's and monitors are we... *NO* method of eavesdropping can't be defeated. ____________________________________________________________________ | | | The obvious is sometimes false; | | The unexpected sometimes true. | | | | Anonymous | | | | | | _____ The Armadillo Group | | ,::////;::-. Austin, Tx. USA | | /:'///// ``::>/|/ http://www.ssz.com/ | | .', |||| `/( e\ | | -====~~mm-'`-```-mm --'- Jim Choate | | ravage at ssz.com | | 512-451-7087 | |____________________________________________________________________| From ravage at ssz.com Wed Feb 11 06:49:22 1998 From: ravage at ssz.com (Jim Choate) Date: Wed, 11 Feb 1998 22:49:22 +0800 Subject: NEW TRAVEL INFO -- Kuwait (fwd) Message-ID: <199802111443.IAA03081@einstein.ssz.com> Forwarded message: >From owner-travel-advisories at stolaf.edu Wed Feb 11 04:13:44 1998 Date: Fri, 6 Feb 1998 14:37:33 -0500 From: owner-travel-advisories Subject: NEW TRAVEL INFO -- Kuwait Sender: "U.S. Department of State" <76702.1202 at compuserve.com> To: travel-advisories at stolaf.edu Message-ID: <199802061439_MC2-3241-E30 at compuserve.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Precedence: bulk STATE DEPARTMENT TRAVEL INFORMATION - Kuwait ============================================================ Kuwait - Public Announcement February 6, 1998 On February 5, 1998, the American Embassy in Kuwait was authorized to issue the following warden message: "We are monitoring the situation with Iraq closely. Although we see no direct threat to the safety of American citizens in Kuwait at this time, we believe it would be prudent now for all citizens to heed the standing preparedness advice for American citizens living abroad. Specifically, you should: --assemble all vital documents such as passports, birth and marriage records, vaccination, insurance and bank records in one readily accessible location; --check to be sure that your passport and any necessary visas are valid and that you are registered at the Embassy with your current address and phone number. If you need to obtain a new passport or to update your registration, please do so at the Embassy as soon as possible, any working day from 8:30 to 11:30 am or 1:00 to 3:00 pm; --make or update as necessary a complete inventory of your household effects, in duplicate; --maintain an adequate supply of food and water in your home. Make sure your car is in good working order. Keep the gas tank full and check oil, coolant, tires and battery. We do not want American citizens in Kuwait to become unduly alarmed. These are precautionary measures only. We are not advising Americans to leave. However, given the potential seriousness of the current situation we believe it is important for all citizens to maintain readiness in case of an emergency. We will promptly inform you of any significant developments and advise you accordingly." For further information on travel to Kuwait, please consult the latest Consular Information Sheet for Kuwait or contact the U.S. Embassy in Kuwait. This Public Announcement expires May 6, 1998. Kuwait - Consular Information Sheet August 28, 1996 Country Description: Kuwait is a constitutional monarchy with a modern economy. Day-to-day life has returned to normal after the 1991 Gulf War, and facilities for travelers are widely available. The workweek in Kuwait is Saturday through Wednesday. Entry Requirements: Passports and visas are required for U.S. citizens traveling to Kuwait. For more information concerning entry requirements, travelers may contact the Embassy of Kuwait at 2940 Tilden St., N.W., Washington, D.C. 20008, telephone (202) 966-0702, or the Kuwaiti Consulate in New York City, telephone (212) 973-4318. Areas of Instability: Travel to and near the Iraq-Kuwait border is very hazardous. U.S. citizens having legitimate work-related business near the border may receive updated information from the U.S. Embassy, and may also wish to consult with their employer's security personnel. Unexploded bombs, mines, booby traps, and other items remain in open areas and beaches throughout Kuwait. U.S. Embassy personnel have been forbidden to travel off paved surfaces outside Kuwait City. Medical Facilities: The health care delivery system continues to rebuild, with many medical facilities, both government and private, available in Kuwait. Medical care at government-run clinics and hospitals is generally provided free of charge or at low cost to residents of Kuwait, while private physicians and hospitals charge a fee for services. Non-residents have found that private doctors, hospitals and clinics expect immediate cash payment for their services. U.S. medical insurance is not always valid outside the United States. Medevac insurance, for emergencies requiring treatment outside Kuwait, and supplemental medical insurance with specific overseas coverage have proven useful. Additional information on health matters can be obtained from the Centers for Disease Control and Prevention's international travelers hotline, telephone (404) 332-4559 or visit the CDC Home Page on the Internet at http://www.cdc.gov. Crime Information: The crime rate in Kuwait is moderate. However, weapons left over from the 1991 Gulf War remain in the hands of the populace, and shooting incidents have occurred, Both physical and verbal harassment of women is a continuing problem. The loss or theft of a U.S. passport abroad should be reported immediately to local police and the nearest U.S. embassy or consulate. Useful information on safeguarding valuables, protecting personal security, and other matters while traveling abroad is provided in the Department of State pamphlets, "A Safe Trip Abroad" and "Tips for Travelers to the Middle East and North Africa." They are available from the Superintendent of Documents, U.S. Government Printing Office, Washington, D.C. 20402. Currency Regulations: Travelers checks and credit cards are widely acceptable. Kuwaiti currency is readily convertible to U.S. dollars. Drug and Crime Penalties: U.S. citizens are subject to the laws of the country in which they are traveling. Alcohol, pork products, and pornography are illegal in Kuwait. Penalties for importation, possession, use, manufacture or sale of illegal drugs, alcohol, or pornography are severe, and convicted offenders can expect jail sentences and fines. Religious proselytizing is not permitted. Terrorist Activities: Americans in Kuwait should be alert to their surroundings and take prudent security precautions. U.S. citizens may wish to consult the Department of State or the U.S. Embassy for updated information. Child Custody: In Kuwait, child custody decisions are based on Islamic law. It is extremely difficult for an American woman, even a Muslim, to obtain custody of her children through a Kuwaiti court decision. Regardless of their parents' marital status, minor children of a Kuwaiti father may not leave Kuwait without the father's permission. Traffic Safety and Road Conditions: Driving in Kuwait can be hazardous. Although Kuwait has an extensive and modern system of well-lighted roads, excessive speeding on both primary and secondary roads, coupled with lax enforcement of traffic regulations, lead to frequent and often fatal accidents. Embassy Location and Registration: U.S. citizens are encouraged to register at the Consular Section of the U.S. Embassy and to enroll in the Embassy's emergency alert network, and to obtain updated information on travel and security in Kuwait. The U.S. Embassy in Kuwait is located at Al-Masjid Al-Aqsa Street, Plot 14, Block 14, Bayan, Kuwait. The mailing address is P.O. Box 77, Safat 13001, Kuwait; telephone (965) 242-4151 through 9. No. 96-150 This replaces the Consular Information Sheet for Kuwait dated September 20, 1994, to update information on areas of instability, drug and crime penalties, terrorist activities, and the address of the U.S. Embassy, and to add information on child custody and traffic safety and road conditions. ----- ----- ----- ----- ----- ----- ----- ----- ----- ----- ----- ----- ----- The "travel-advisories at stolaf.edu" mailing list is the official Internet and BITNET distribution point for the U.S. State Department Travel Warnings and Consular Information Sheets. To unsubscribe, send a message containing the word "unsubscribe" to: travel-advisories-request at stolaf.edu Archives of past "travel-advisories" postings are available at the URL: "http://www.stolaf.edu/network/travel-advisories.html" or via Gopher: gopher.stolaf.edu, Internet Resources/US-State-Department-Travel-Advisories From sunder at brainlink.com Wed Feb 11 07:30:05 1998 From: sunder at brainlink.com (sunder) Date: Wed, 11 Feb 1998 23:30:05 +0800 Subject: FCPUNX:time to learn chinese? In-Reply-To: <199802102142.NAA10766@proxy3.ba.best.com> Message-ID: <34E1BF13.E43A04E9@brainlink.com> James A. Donald wrote: > In other words, instead of China taking over Hong Kong, Hong > Kong takes over China. A good friend of mine had the same idea in terms of Microsoft and Apple when Bill gave Steve "Reality Distortion Field" Jobs lots of money. His thought was that Microsoft thought they bought Apple off. What had really happend was that OpenStep took over Apple (it did via Rhapsody) and that since (he believes) that it will be ported to NT and become part of NT later, it is really Jobs's way of taking over EvilSoft. IMHO, I wouldn't mind if OpenStep penetrated NT. It would certainly be an upgrade in my book. :) Then again with the way EvilSoft worked in the past, it may corrupt both. :) We'll see I suppose. But capitatism is indeed a good virus (one would hope a strong enough one to topple the last of the big huge communist blocks.) :) -- =====================================Kaos=Keraunos=Kybernetos============== .+.^.+.| Ray Arachelian |Prying open my 3rd eye. So good to see |./|\. ..\|/..|sunder at sundernet.com|you once again. I thought you were |/\|/\ <--*-->| ------------------ |hiding, and you thought that I had run |\/|\/ ../|\..| "A toast to Odin, |away chasing the tail of dogma. I opened|.\|/. .+.v.+.|God of screwdrivers"|my eye and there we were.... |..... ======================= http://www.sundernet.com ========================== From hugh at road.toad.com Thu Feb 12 01:34:33 1998 From: hugh at road.toad.com (Hugh Daniel) Date: Thu, 12 Feb 1998 01:34:33 -0800 (PST) Subject: ANNOUNCE: Cypherpunks February SF Bay Area Meeting Message-ID: <199802120934.BAA28270@road.toad.com> What: Cypherpunks San Francisco Bay area Phyical meeting When: Saturday February 14th, 1998 at 12:00 noon Where: Network Associates, Inc Total Network Security division (formerly PGP, Inc) 4500 Bohannon Drive, Menlo Park, California Map: http://maps.yahoo.com/yahoo/yt.hm?CMD=GEO&GMI=1&FAM=yahoo&SEC=geo&AD2=4500+Bohannon+Dr&AD3=Menlo+Park%2c+CA++94025-1029&GEOMC=3&recent=0 (More directions at end of email.) Agenda: 12:00 Random Access, Bag Lunch, Bad jokes etc. 13:00 Linux FreeS/WAN _Tutorial_, Hugh Daniel 15:00 Break, announcements 15:30 OpenPGP, DDT & other NA/PGP folks 16:30 Cypherpunks & CFP'98, group DDT's Directions: Take 101 (from North or South) Exit at "Marsh Road/Atherton" Go West (young man) off exit (right exit lane coming south from SF). Turning to the West (away from the Bay / freeway) Get in Left lane immediately. Turn Left at very first light (Scott Drive, not far from freeway exit) (landmark: Shell gas station is on your right as you turn left) Go South on Scott ~2/3 mi (parallel to 101 freeway fence). Pass one Stop sign (do not turn yet). (landmark: Sun Microsystems has an office on the right) Scott curves to right, becomes Bohannon Drive. Turn left into first driveway: "Menlo Oak" Business Park Go straight through parking lot ~2-300 yds Curve 270 degrees around Fountain (effective left turn) #4500 is on left as you curve around fountain. Go down ~50 yds to main lobby entrance (south side of building). Ask reception for Dave Del Torto (call 415.730.3583 cel if any problem). Meeting room is behind reception area through first door on left. From jellicle at inch.com Thu Feb 12 04:11:31 1998 From: jellicle at inch.com (Michael Sims) Date: Thu, 12 Feb 1998 04:11:31 -0800 (PST) Subject: "Corporations selling your ass down the road for a dollar" In-Reply-To: <199802101856.NAA04719@arutam.inch.com> Message-ID: <199802121211.HAA19946@arutam.inch.com> Declan wrote: [to cypherpunks for no apparent reason] > >None of this is news to Declan of course. I just get disappointed > >when I see industry mouthpiece after industry mouthpiece without a > >single goal in mind except maximum profit. Libertarianism in > >action - corporations sell your ass down the road for a dollar and > >some stock options. > > I'm sure Michael was upset and not typing clearly. He knows as well > as anyone that libertarians are not pro-business; they're > pro-individual rights. Except, of course, that *businesses* count as individuals in a libertarian world. Yes, the corporation, that creation wholly of government, becomes a sort of super-individual - and of course all individuals are equal, but some are just a bit more equal. When I see a libertarian calling for an elimination of all forms of corporations and a return to sole proprietorships and straight partnerships as the only form of business, then I'll know he's ideologically consistent. Until then, pro-business is the only reasonable way to describe the twisted rationale behind libertarianism. Which brings me back to my original point - the AIM representation at the aforementioned hearings. In Libber-land, there's nothing reprehensible there. Corporations are lobbying for their "individual rights", one of them being the right to make maximum profit by eliminating/marginalizing competitors. Of course the rights they are lobbying for may infringe on some others' rights, perhaps in schools or libraries which receive federal funds, but hey, that's life for you. Every individual has an equal chance. And after all, freedom to speak and receive information is just a preference - some people prefer to receive more of it than others. > Libertarians spend quite a bit of time > complaining about the Republican habit of funding corporate > subsidies. But very very little time complaining about the *existence* of corporations whose primary function is to shield the important folks who run and fund the corporation from the consequences of their actions. Come on! This should be a primary offense! Individuals with no responsibility! > The pursuit of profit in the free market is not to be discouraged -- > without it, we wouldn't have the Internet we have today. Heavens, Declan, you're right! All those companies selflessly creating a network between universities and defense sites, not seeking a return in five years but looking well into the future..... Let us praise the foresight of those companies. What were their names again? -- Michael Sims From mixmaster at remail.obscura.com Thu Feb 12 05:05:32 1998 From: mixmaster at remail.obscura.com (Mix) Date: Thu, 12 Feb 1998 05:05:32 -0800 (PST) Subject: No Subject Message-ID: <199802121246.EAA20478@sirius.infonex.com> Timothy Mayhem will fuck anything that moves, but he'd rather be fucking his own mother's dead body. <<<< o(0-0)o -ooO-(_) Ooo-- Timothy Mayhem From dlv at bwalk.dm.com Thu Feb 12 05:23:52 1998 From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) Date: Thu, 12 Feb 1998 05:23:52 -0800 (PST) Subject: Me & Louis Freeh In-Reply-To: Message-ID: Declan McCullagh writes: > Geez, I was wondering why I hadn't heard anything from Vulis in so long. > Forgot I killfiled him half a year ago. Translation: Declan is eagerly reading everything I write, ready to masturbate whenever I mention his name. > > > I don't like people who forge quotes from me in their netly news > >"exposes", > > > as Declan has done. Should I follow CDT's example and complain to Declan's bosses at Time Warner about his lies, forgeries, and fabrications? I find it amusing that Declan is acting as a judge of what constitutes orthodox libertarianism. Please recall that Declan was one of the few people on this list who wholeheartedly supported Gilmore/Sandfart's "moderation experiment" and editorialized in favor of Gilmore trying to kick me off of this mailing list. Note also that Timmy "cocksucker" May and his new friend, the degenerate child molester Guy Polis, are again flooding this mailing list with forged spam while calling for moderating it. I'm also amused by Declan's refusal to answer my question (whether he is an alcoholic). Declan's role models in malicious journalism are scum like the pathological liar Charlie Platt and the late Chris French. Numerous articles posted on sci.cryonics by Platt's former business partners in his fraudulent "corpsicle" venture describe him as "perpetually drunk". Chris French too used to start drinking early in the morning and was in the state of drunken stupor by early afternoon. I hope that my exposing him to AP as a Declan-class liar and an incompetent forger contributed to his drinking himself to death. Where is Chris French buried? I feel like pissing on his grave. --- Dr.Dimitri Vulis KOTM Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps From guy at panix.com Thu Feb 12 05:46:49 1998 From: guy at panix.com (Information Security) Date: Thu, 12 Feb 1998 05:46:49 -0800 (PST) Subject: Dr. Dimento again Message-ID: <199802121346.IAA14820@panix2.panix.com> It's time for "ASK GUY ANYTHING"! > From Doctor Net Twinkie Thu Feb 12 08:23:31 1998 > To: cypherpunks at toad.com > > I am a pathetic old fart who is outwitted even by "retards" these days. > > What is wrong with me? > > --- > > Dr. Doctor Net Twinkie KOTM > Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps GUY RESPONDS: Dear Twinkie, The problem is you no longer have all that good white creamy stuff. It's solidified...you are literally hard-headed now. You can't even... : Subject: Re: Changing to Moderated Cypherpunks -- How? : From: dlv at bwalk.dm.com (Dr.Dimitri Vulis KOTM) : Date: Thu, 05 Feb 98 19:25:52 EST : : Guy Polis thinks that anyone smarter than him (and that's 99.99% of the : population) is my tentacle. ...think of a new insult... : Subject: Re: Homosexual anti-Semite Peter Vorobieff is forging cancels for our articles again!!1! : From: Rabbi Shlomo Ruthenberg : Date: 1997/05/06 : Newsgroups: news.admin.net-abuse.policy : : To homosexual anti-semites like Peter Vorobieff and Dan Koroleff, : anyone smarter than them must be a "kike" - and this means 99.99% : of the population. You haven't had an original thought in a decade. To get things CRANKing again, take a sledgehammer and pound yourself in the head until it is a nice soft consistency. You'll feel much better. YOU'RE WELCOME! ---guy Traffic analysis confirms Dimitry is Shlomo - have a great Shabbos! HA HA HA HA HA HA HA HA HA HA HA cough cough HA HA HA HA HA From guy at panix.com Thu Feb 12 05:54:55 1998 From: guy at panix.com (Information Security) Date: Thu, 12 Feb 1998 05:54:55 -0800 (PST) Subject: Me & Louis Freeh Message-ID: <199802121354.IAA15240@panix2.panix.com> It's time for "ASK GUY ANYTHING" again! > Subject: Re: Me & Louis Freeh > From: dlv at bwalk.dm.com (Dr. Doctor Net Twinkie KOTM) > > Declan McCullagh writes: > > > Geez, I was wondering why I hadn't heard anything from Vulis in so long. > > Forgot I killfiled him half a year ago. > > WHAAAAA! WHAAAA! Nobody wants to read what I have to say! > > I don't understand! Someone please explain? > > --- > > Dr. Doctor Net Twinkie KOTM > Brighton Beach Boardwalk BBS, Forest Hills, N.Y.: +1-718-261-2013, 14.4Kbps GUY REPLIES: Dear Twinkie, The answer is simple: You are so full of shit, flies worship you as the One True God! YOU'RE WELCOME! ---guy What a loser! From majordomo at bulkemailserver.com Thu Feb 12 07:26:39 1998 From: majordomo at bulkemailserver.com (majordomo at bulkemailserver.com) Date: Thu, 12 Feb 1998 07:26:39 -0800 (PST) Subject: Do you need a NEW IDENTITY? Message-ID: <> Do you need a NEW IDENTITY/NEW ID/CREDIT/PROTECTION/PRIVACY/WEALTH? LEAVE YOUR PAST BEHIND, FOR WHATEVER REASON! GET AWAY FROM ABUSIVE SPOUSES...FOREVER. START A NEW LIFE. We can help! All of the above is in the LIFE ENHANCEMENT KIT. The LIFE ENHANCEMENT KIT is a COMPLETE, easy step by step do it yourself kit. There is nothing like it on the market today! The kit contains compiled information from many different sources. In fact, it contains 4 LBS. of easy to use, up-to-date life enhancement information!!! For those of you that would like help, ***INFORMATION ON PAYING SOMEONE TO CREATE A TOTAL NEW IDENTITY FOR YOU is located directly after the ordering information for the "Life Enhancement Kit." YOU'LL LEARN: 1. How to DISAPPEAR FOR GOOD. Perfectly, for whatever reasons. 2. How to create an identity out of thin air and make it work. 3. Make the government itself create your new identity! 4. How to get genuine id. 5. How to obtain any type of supportive card you need. 6. Changing citizenship from one country to another. 7. How to get id in your new name - LEGALLY, without going to court. 8. Inside secrets of fingerprinting, faking, altering, removing, YES it CAN be done! 9. A step by step method of assembling a complete package of ALTERNATE ID, based on an original birth certificate. 10. Professional methods used before only by the top espionage agents - now for YOU to use. 11. YOU'LL LEARN HOW TO CREATE A TOTALLY NEW IDENTITY (more than 10 different ways) with every supportive document you'll need. 12. You can KEEP YOUR PRESENT IDENTITY & HAVE A 2ND IDENTITY WITHOUT THEIR PATHS CROSSING. Or if you choose, the present you can "die" and use only the "NEW" YOU. BEWARE, this is not that "simple" new id bought through the mail that your teeenage brother uses to impress his friends. This is REAL! Seals, stamps, etc. EVERYTHING! You'll also learn HOW TO CREATE A NEW BIRTH CERTIFICATE and make it look authentic with a genuine hospital seal and rubber stamp, and "age" it in the oven. Seeing is believing, folks... You'll even find out which social security offices in every state to take your new "created" birth certificate to get a NEW SOCIAL SECURITY NUMBER AND CARD! You'll find out what other EASY TO OBTAIN documentation you'll need to take with you. You'll even learn what to say to the social security employees. HURRY! Get your new identity started now, you never know when a situation will arrive that will cause you to need it. BE READY! The government is making it harder to create identities each year, the harder it gets, the more money it's going to cost you and the more time it will take. GET IT NOW. It's also a GREAT GIFT for your FRIEND OR FAMILY who's having a hard time financially or is an abusive relationship! ***SPECIAL!!! ALL OF THE ABOVE is contained in 5 EASY TO READ, STEP BY STEP Books. THE 5 BOOKS PLUS ALL OF THE FOLLOWING IS INCLUDED IN YOUR "LIFE ENHANCEMENT KIT" FOR ONE LOW PRICE, if you order now! CREDIT... We all need it. How to get it, no matter what your credit file looks like now. You will need this information to go with your NEW identity! A NEW IDENTITY IS ALMOST USELESS WITHOUT ESTABLISHING CREDIT. YOU'LL LEARN: 1. How NEW files are created with NEW names. 2. Banks with lowest interest rates. 3. Cards with no annual fees. 4. How to get UNSECURED credit NOW (INCLUDING VISA) even with bad credit or no credit, addresses/phone numbers included. 5. What credit cards are easiest to get. 6. How to get a car loan or home loan with bad or little credit. Yes, you too can have those things regardless of what your credit reports say now. 7. How to clear bad credit and ESTABLISH NEW CREDIT. 8. How to find out what's on your credit file. 9. What bankers look for on a loan application. 10. How to build a credit line of $100,000.00 OR MORE! It's YOUR turn now. GET ON WITH YOUR LIFE, this information will show you how. YOU DON'T HAVE TO KEEP PAYING FOR YOUR MISTAKES FOR THE NEXT 7-10 YEARS! Also included in the LIFE ENHANCEMENT KIT IS: 1. How to get a LEGITIMATE travel agent id card in any name you choose. Use this card for HUGE DISCOUNTS, up to 90% and sometimes free, on air fare, car rentals, hotels, cruises, amusement theme parks, ALL OVER THE WORLD! 2. How to LEGALLY REDUCE your INCOME TAXES with an International Business Corporation (IBC) and with an onshore corporation. PLUS find out the MANY OTHER BENEFITS these "legal people" can do for you INCLUDING INTERNATIONAL PROFITABLE WEALTH BUILDING BUSINESS OPPORTUNITIES, THAT ARE NOT ADVERTISED IN THE USA. These ARE NOT MLM. You DO NOT NEED TO RECRUIT ANYONE! 3. Find out who can teach you how to KEEP YOUR FINANCIAL AFFAIRS PRIVATE... MAINTAIN A LOW PROFILE... AND HOW TO HIDE IN PLAIN SIGHT! How to keep most of your wealth, protect your assets and how to organize your affairs to result in the lowest possible tax liability! You can also find out how to LAWSUILT PROOF YOURSELF! Guaranteed to send a gold digger packing with his tail between his legs! 4. Where to get information on how to LEGALLY FILE A $0.00 INCOME TAX RETURN AND GET BACK WHAT YOU HAVE PREVIOUSLY PAID. Plus spiritual and general tips! ALL OF THE ABOVE, EVERYTHING FOR ONLY, HOW MUCH? $99.95 plus $9.95 s&h IF YOUR REQUEST IS SENT NO LATER THAN FEB. 19, 1998 (allow 10 business days from the time we receive your request to receive your order, checks to longer) or ADD $15.00 for an EXPRESS ORDER (please allow 5 business days from the time we receive your request, checks take longer). What is it WORTH? UNLIMITED! CA residents add $7.75 sales tax. For international orders add and additional $20 for shipping. U.S. DOLLARS ONLY. Order by Feb. 19, 1998 and receive two FREE GIFTS REPORTS: 1. "How to Get $1000 - $5000 FREE & CLEAR Within 30 days (It works! It takes a little work, but it's worth it). 2. "20 Businesses You Can Start From Home, and become RICH!" If you order after Feb. 19, 1998 add on an additional $15. Fax or mail your check (we take checks by fax too) or VISA/MasterCard information (CREDIT CARD NAME, BILLING ADDRESSES, billing addresses will be verified and orders will be mailed there, no exceptions, HOME PHONE NUMBER and area code are also required by VISA/MasterCard for order that are not in person AND CREDIT CARD EXPIRTATION DATE), also send your email address just in case we need to contact you. Fax number: (209) 952-8555 (if faxing a check, fill in all of the information, tape it on a piece of paper, do not put tape over the check. Print your name and email address just in case we need to contact you if something is not clear on the check). Include your mailing address if different than address on check. State "This is my check and I authorize your to take this one time draft out of my account for $______ (state the dollar amount, whatever your wrote on the check). It is not necessary to mail in the fax check. Address: Noble State Ent. 1163 East March Lane, Suite D719 Stockton, CA 95210 You may also send us a money order by mail. ***BEFORE ORDERING ANYTHING SEE LEGAL WARNING BELOW!*** Also, with all orders, above and below state: "THIS IS NOT ENTRAPMENT OR A GOVERNMENT STING OPERATION, THIS INFORMATION WILL NOT BE USED AGAINST YOU. I UNDERSTAND THERE ARE NO REFUNDS DUE TO THE EASE OF USING AND/OR COPYING THE INFORMATION." Need HELP creating a new identity? See below. ----------------------------------------------------------------------------------------------------------- For a finder's fee of only $100 by Feb. 19, 1998 or $120 after, we'll have a company call you that will CREATE A TOTAL NEW IDENTITY FOR YOU FOR ONLY $1595 (price may go up soon, so order now if you're interested and have the money). DO NOT send the $1595 to us, send only the finder's fee to us of $100 or $120. You will pay the other company the $1595 later. Include with your order, 3 dates and times for someone to call you and a phone number with area code (NO PAGERS OR 800#'s, but phone booths are o.k. if it will take incoming calls because not all do). IF YOU WANT THIS PLEASE STATE WITH ORDER " I WANT SOMEONE TO CREATE A NEW IDENTITY FOR ME." Because you may get the Life Enhancement Kit by accident if you don't, and there are no refunds. You may also get the Life Enhancement Kit (excluding the 5 new identity books) for only $25.00 plus the $100 or $120 finder's fee, whichever is applicable. Sales tax and shipping are included. Add $15 for EXPRESS ORDERS. ***WARNING!!! You must be 18 years or older to purchase this information. This information is provided for ENTERTAINMENT PURPOSES ONLY! Neither the writers, producers, or distributers assume any responsibility for the use or misuse of any information presented. The FRAUDULENT USE OF ID IS ILLEGAL and punishable by fine and/or imprisonment! P.S. THIS IS A ONE TIME MAILING FROM US (unless you have more than one email address) NO NEED TO TYPE REMOVE. ATTN. FLAMERS, We don't mean to offend you, but we ALL get unsolicited mail from the postal service EVERYDAY, this is the same thing, it's just a part of life and IT IS NOT ILLEGAL TO DO IT. There is really no need to be angry. By the way, too much anger is bad for your health, RELAX AND ENJOY LIFE! PEACE TO YOU! From majordomo at bulkemailserver.com Thu Feb 12 07:26:39 1998 From: majordomo at bulkemailserver.com (majordomo at bulkemailserver.com) Date: Thu, 12 Feb 1998 07:26:39 -0800 (PST) Subject: Do you need a NEW IDENTITY? Message-ID: <> Do you need a NEW IDENTITY/NEW ID/CREDIT/PROTECTION/PRIVACY/WEALTH? LEAVE YOUR PAST BEHIND, FOR WHATEVER REASON! GET AWAY FROM ABUSIVE SPOUSES...FOREVER. START A NEW LIFE. We can help! All of the above is in the LIFE ENHANCEMENT KIT. The LIFE ENHANCEMENT KIT is a COMPLETE, easy step by step do it yourself kit. There is nothing like it on the market today! The kit contains compiled information from many different sources. In fact, it contains 4 LBS. of easy to use, up-to-date life enhancement information!!! For those of you that would like help, ***INFORMATION ON PAYING SOMEONE TO CREATE A TOTAL NEW IDENTITY FOR YOU is located directly after the ordering information for the "Life Enhancement Kit." YOU'LL LEARN: 1. How to DISAPPEAR FOR GOOD. Perfectly, for whatever reasons. 2. How to create an identity out of thin air and make it work. 3. Make the government itself create your new identity! 4. How to get genuine id. 5. How to obtain any type of supportive card you need. 6. Changing citizenship from one country to another. 7. How to get id in your new name - LEGALLY, without going to court. 8. Inside secrets of fingerprinting, faking, altering, removing, YES it CAN be done! 9. A step by step method of assembling a complete package of ALTERNATE ID, based on an original birth certificate. 10. Professional methods used before only by the top espionage agents - now for YOU to use. 11. YOU'LL LEARN HOW TO CREATE A TOTALLY NEW IDENTITY (more than 10 different ways) with every supportive document you'll need. 12. You can KEEP YOUR PRESENT IDENTITY & HAVE A 2ND IDENTITY WITHOUT THEIR PATHS CROSSING. Or if you choose, the present you can "die" and use only the "NEW" YOU. BEWARE, this is not that "simple" new id bought through the mail that your teeenage brother uses to impress his friends. This is REAL! Seals, stamps, etc. EVERYTHING! You'll also learn HOW TO CREATE A NEW BIRTH CERTIFICATE and make it look authentic with a genuine hospital seal and rubber stamp, and "age" it in the oven. Seeing is believing, folks... You'll even find out which social security offices in every state to take your new "created" birth certificate to get a NEW SOCIAL SECURITY NUMBER AND CARD! You'll find out what other EASY TO OBTAIN documentation you'll need to take with you. You'll even learn what to say to the social security employees. HURRY! Get your new identity started now, you never know when a situation will arrive that will cause you to need it. BE READY! The government is making it harder to create identities each year, the harder it gets, the more money it's going to cost you and the more time it will take. GET IT NOW. It's also a GREAT GIFT for your FRIEND OR FAMILY who's having a hard time financially or is an abusive relationship! ***SPECIAL!!! ALL OF THE ABOVE is contained in 5 EASY TO READ, STEP BY STEP Books. THE 5 BOOKS PLUS ALL OF THE FOLLOWING IS INCLUDED IN YOUR "LIFE ENHANCEMENT KIT" FOR ONE LOW PRICE, if you order now! CREDIT... We all need it. How to get it, no matter what your credit file looks like now. You will need this information to go with your NEW identity! A NEW IDENTITY IS ALMOST USELESS WITHOUT ESTABLISHING CREDIT. YOU'LL LEARN: 1. How NEW files are created with NEW names. 2. Banks with lowest interest rates. 3. Cards with no annual fees. 4. How to get UNSECURED credit NOW (INCLUDING VISA) even with bad credit or no credit, addresses/phone numbers included. 5. What credit cards are easiest to get. 6. How to get a car loan or home loan with bad or little credit. Yes, you too can have those things regardless of what your credit reports say now. 7. How to clear bad credit and ESTABLISH NEW CREDIT. 8. How to find out what's on your credit file. 9. What bankers look for on a loan application. 10. How to build a credit line of $100,000.00 OR MORE! It's YOUR turn now. GET ON WITH YOUR LIFE, this information will show you how. YOU DON'T HAVE TO KEEP PAYING FOR YOUR MISTAKES FOR THE NEXT 7-10 YEARS! Also included in the LIFE ENHANCEMENT KIT IS: 1. How to get a LEGITIMATE travel agent id card in any name you choose. Use this card for HUGE DISCOUNTS, up to 90% and sometimes free, on air fare, car rentals, hotels, cruises, amusement theme parks, ALL OVER THE WORLD! 2. How to LEGALLY REDUCE your INCOME TAXES with an International Business Corporation (IBC) and with an onshore corporation. PLUS find out the MANY OTHER BENEFITS these "legal people" can do for you INCLUDING INTERNATIONAL PROFITABLE WEALTH BUILDING BUSINESS OPPORTUNITIES, THAT ARE NOT ADVERTISED IN THE USA. These ARE NOT MLM. You DO NOT NEED TO RECRUIT ANYONE! 3. Find out who can teach you how to KEEP YOUR FINANCIAL AFFAIRS PRIVATE... MAINTAIN A LOW PROFILE... AND HOW TO HIDE IN PLAIN SIGHT! How to keep most of your wealth, protect your assets and how to organize your affairs to result in the lowest possible tax liability! You can also find out how to LAWSUILT PROOF YOURSELF! Guaranteed to send a gold digger packing with his tail between his legs! 4. Where to get information on how to LEGALLY FILE A $0.00 INCOME TAX RETURN AND GET BACK WHAT YOU HAVE PREVIOUSLY PAID. Plus spiritual and general tips! ALL OF THE ABOVE, EVERYTHING FOR ONLY, HOW MUCH? $99.95 plus $9.95 s&h IF YOUR REQUEST IS SENT NO LATER THAN FEB. 19, 1998 (allow 10 business days from the time we receive your request to receive your order, checks to longer) or ADD $15.00 for an EXPRESS ORDER (please allow 5 business days from the time we receive your request, checks take longer). What is it WORTH? UNLIMITED! CA residents add $7.75 sales tax. For international orders add and additional $20 for shipping. U.S. DOLLARS ONLY. Order by Feb. 19, 1998 and receive two FREE GIFTS REPORTS: 1. "How to Get $1000 - $5000 FREE & CLEAR Within 30 days (It works! It takes a little work, but it's worth it). 2. "20 Businesses You Can Start From Home, and become RICH!" If you order after Feb. 19, 1998 add on an additional $15. Fax or mail your check (we take checks by fax too) or VISA/MasterCard information (CREDIT CARD NAME, BILLING ADDRESSES, billing addresses will be verified and orders will be mailed there, no exceptions, HOME PHONE NUMBER and area code are also required by VISA/MasterCard for order that are not in person AND CREDIT CARD EXPIRTATION DATE), also send your email address just in case we need to contact you. Fax number: (209) 952-8555 (if faxing a check, fill in all of the information, tape it on a piece of paper, do not put tape over the check. Print your name and email address just in case we need to contact you if something is not clear on the check). Include your mailing address if different than address on check. State "This is my check and I authorize your to take this one time draft out of my account for $______ (state the dollar amount, whatever your wrote on the check). It is not necessary to mail in the fax check. Address: Noble State Ent. 1163 East March Lane, Suite D719 Stockton, CA 95210 You may also send us a money order by mail. ***BEFORE ORDERING ANYTHING SEE LEGAL WARNING BELOW!*** Also, with all orders, above and below state: "THIS IS NOT ENTRAPMENT OR A GOVERNMENT STING OPERATION, THIS INFORMATION WILL NOT BE USED AGAINST YOU. I UNDERSTAND THERE ARE NO REFUNDS DUE TO THE EASE OF USING AND/OR COPYING THE INFORMATION." Need HELP creating a new identity? See below. ----------------------------------------------------------------------------------------------------------- For a finder's fee of only $100 by Feb. 19, 1998 or $120 after, we'll have a company call you that will CREATE A TOTAL NEW IDENTITY FOR YOU FOR ONLY $1595 (price may go up soon, so order now if you're interested and have the money). DO NOT send the $1595 to us, send only the finder's fee to us of $100 or $120. You will pay the other company the $1595 later. Include with your order, 3 dates and times for someone to call you and a phone number with area code (NO PAGERS OR 800#'s, but phone booths are o.k. if it will take incoming calls because not all do). IF YOU WANT THIS PLEASE STATE WITH ORDER " I WANT SOMEONE TO CREATE A NEW IDENTITY FOR ME." Because you may get the Life Enhancement Kit by accident if you don't, and there are no refunds. You may also get the Life Enhancement Kit (excluding the 5 new identity books) for only $25.00 plus the $100 or $120 finder's fee, whichever is applicable. Sales tax and shipping are included. Add $15 for EXPRESS ORDERS. ***WARNING!!! You must be 18 years or older to purchase this information. This information is provided for ENTERTAINMENT PURPOSES ONLY! Neither the writers, producers, or distributers assume any responsibility for the use or misuse of any information presented. The FRAUDULENT USE OF ID IS ILLEGAL and punishable by fine and/or imprisonment! P.S. THIS IS A ONE TIME MAILING FROM US (unless you have more than one email address) NO NEED TO TYPE REMOVE. ATTN. FLAMERS, We don't mean to offend you, but we ALL get unsolicited mail from the postal service EVERYDAY, this is the same thing, it's just a part of life and IT IS NOT ILLEGAL TO DO IT. There is really no need to be angry. By the way, too much anger is bad for your health, RELAX AND ENJOY LIFE! PEACE TO YOU! From eureka at eureka.abc-web.com Thu Feb 12 07:40:25 1998 From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com) Date: Thu, 12 Feb 1998 07:40:25 -0800 (PST) Subject: Eureka! Thu Feb 12 '98 Message-ID: <19980212083920.1744.qmail@eureka.abc-web.com> Welcome to Thursday's issue of Eureka! UNFAITHFUL Just once in a while a brand new site comes along that will blow your mind, and Unfaithful is one of them. Brought to you by two of the biggest names on the web, Intertain and Playgal, it offers MORE than both sites put together, which includes an amazing 3,000 video feeds - yes, thousands of hot, streaming videos, many totally live, and some even with audio too! With it's FREE trial offer don't miss this site! Unfaithful ... http://www.unfaithful.com/banner_Eureka0.html Just Say SEX http://www.justsay.com/index2.htm With over 1000 nude celeb pics, the widest variety of hardcore kink, the freshest amateurs, the hotest exclusive stories, and THE best FREE Swinger Site on the net, why do you need to go anywhere else? RAVISHING RENEE' Oh yes, you betcha, uh huh! This is one hot young amateur! Drop on by her website to see some great pix! Check out the gallery to see what I mean. She paints herself, shows off those tiny titt nipples through tight fabric and wears some short shorts with just enough ass hanging out to keep you clicking for more. Do not miss the massage section either! Ravishing Renee' .................. http://qstart.com/renee/ CAM GIRLS CHEYENNE Definitely worth a stop on your endless surf for hot looking porno pix. This site features a sweet young lady showing us her goods. Rubbing her box, licking other girls and there is a bonus here! Free videos for everyone. Pretty cool mix here! Cam Girls .......... http://www.cam-girls.com/html/chey.html HOT BABES This site is not going to win any design awards but I give it a 10 for being simple. It features good looking women. In various positions and showing their goods. Just click on an image and your off to the next one. Simple but efective! Hot Babes ................ http://www.shadowx.com/babe5.html SEXJUICE ***FREE TODAY!!*** This is a paysite. But get this, we again have a special deal for you today and today only! That's right Sexjuice is giving us free video feeds for 24 hours which includes all video feeds and a HUGE 350 page magazine updated every month. The video is real, not some crappy clip cut out of an old porno flick. Check it out FREE now and find which of the awesome video packages is free - HURRY this offer is extremely limited and ONLY for Eureka subscribers! You'll be directing the hot babe action in no time! This is a do not miss situation. Go there now! Sexjuice ................ http://www.sexjuice.net/eureka.asp READ THIS!! WIN $25,000 and a Fantasy Date - Click Here Now! $25,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A HOORAY! THE ADULT SEARCH ENGINE Now you can search for the sex sites you are looking for and fast! This new search engine is setting the standard others will follow. It offers pop-up search and detailed listings! Hooray! -----------------> http://eureka.abc-web.com/hooray/ FREE STREAMING VIDEO Please note that most of these feeds require a Netscape bro- wser in order to successfully view them. Unfortunately Micr- osoft's browser does not have all the features of Netscape's yet. However, many of the feeds use the RealPlayer and will work in most browsers. If you do not have Netscape and want a free copy click here --> http://www.netscape.com/download/ Six free feeds --------------------> http://207.136.152.129/ CHAT WITH OTHER READERS Hey, if you haven't checked out the Eureka! Chat sites yet, you're missing out on some great stuff. Every day you'll find hundreds of other readers just like you looking to chat have fun and maybe a little 'cyber'. We know you'll love it! Adult/Sex Chat -----------------> http://137.39.63.229/chat/ General/Fun Chat -------> http://137.39.63.229/chat/funchat/ HOT LIVE PHONE SEX TO MAKE YOU CUM! LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912 LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779 FREE: Live 1-on-1 (international call only)--->011-678-77416 NEW! CENTERFOLD PIC OF THE DAY Exclusive! We proudly present unpublished Pictures of your favorite Centerfolds. Featured This Week: Dec 80-PMOY Terri Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri Kendall, Rebecca Ferratti, Lydia Schone and many more too! ---------------------------> http://www.gatefold.com/eureka/ AMATEUR SITE OF THE DAY Tristina: This lady loves behinds, no ands, ifs or BUTTs about it! Trisitna loves bottoms so much, she dedicated her site to asses. So visit this site, and see why we are so tongue in CHEEK about her booty page. ---------------------------> http://amateurindex.com/eureka/ EROTIC STORY SITE OF THE DAY The Top 50 Erotic Stories Sites: Only the highest quality erotic stories sites are listed here. No nonsence. Just top notch totally free free erotic stories sites................ ........................... http://www.xxxstories.com/top50/ DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/ ADULT STAR PIC OF THE DAY Woah, our Adult Star pics are getting hotter and hotter, so make sure you stop by and check out today's - definitely not to be missed! --------> http://www.xxxadultstars.com/eureka/ OTHER EUREKAS! GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/ DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm ESPA�OL ------> http://eureka.abc-web.com/eureka/espanol.htm FRAN�AIS ----> http://eureka.abc-web.com/eureka/francais.htm ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm TODAY'S FREE PIX Pic 1 --------------------------> http://137.39.63.229/?120 Pic 2 --------------------------> http://137.39.63.229/?121 Pic 3 --------------------------> http://137.39.63.229/?122 Pic 4 --------------------------> http://137.39.63.229/?123 Pic 5 --------------------------> http://137.39.63.229/?124 Pic 6 --------------------------> http://137.39.63.229/?125 Pic 7 --------------------------> http://137.39.63.229/?126 Pic 8 --------------------------> http://137.39.63.229/?127 Pic 9 --------------------------> http://137.39.63.229/?128 Pic 10 --------------------------> http://137.39.63.229/?129 ============================================================ TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US. ============================================================ From honig at otc.net Thu Feb 12 08:33:39 1998 From: honig at otc.net (David Honig) Date: Thu, 12 Feb 1998 08:33:39 -0800 (PST) Subject: "Corporations selling your ass down the road for a dollar" In-Reply-To: Message-ID: <3.0.5.32.19980212083416.007c5a20@otc.net> At 07:10 AM 2/12/98 -0400, Michael Sims wrote: > >Except, of course, that *businesses* count as individuals in a >libertarian world. No, its that the owner of a business doesn't lose his rights by virtue of running a business. Yes, the corporation, that creation wholly of >government, becomes a sort of super-individual - and of course all >individuals are equal, but some are just a bit more equal. No, the people running any size corp. have the same rights as everyone else, to non-interference, etc. >When I see a libertarian calling for an elimination of all forms of >corporations and a return to sole proprietorships and straight >partnerships as the only form of business, then I'll know he's >ideologically consistent. Actually, libs have nothing for or against corps. ---only govt interfering with them. I'm not sure where you got your ideas about liberty, or what anti-corporate libs you hang out with, but your model of libertarianism is off. If the natural (efficient) size of a company is big, so be it. As long as you don't defraud or use force, you have the right to grow unimpeded by govt to any size that the market selects. No interference, no subsidies, same thing. ------------------------------------------------------------ David Honig Orbit Technology honig at otc.net Intaanetto Jigyoubu Lewinsky for President '2012 From frissell at panix.com Thu Feb 12 08:59:25 1998 From: frissell at panix.com (Duncan Frissell) Date: Thu, 12 Feb 1998 08:59:25 -0800 (PST) Subject: "Corporations selling your ass down the road for a dollar" In-Reply-To: Message-ID: <199802121659.LAA25269@mail1.panix.com> At 07:10 AM 2/12/98 -0400, Michael Sims wrote: >Except, of course, that *businesses* count as individuals in a >libertarian world. Yes, the corporation, that creation wholly of >government, becomes a sort of super-individual - and of course all >individuals are equal, but some are just a bit more equal. Except that one does not need government to form a limited liability entity. It was never necessary. These days in particular with secret voting protocols and anonymous communications, it would be trivial to have a limited liability entity whose owners had no personal liability for organizational debts because they are unknown and unknowable. Yet they can control the entity without losing their anonymity. This was always possible. Now it is easy. In French corporations were originally called (pardon my spelling) "soci�t� anonime". Certainly as a cypherpunk, you believe in anonymous organizations. >When I see a libertarian calling for an elimination of all forms of >corporations Certainly anarcho libertarians have always opposed government "incorporation" since they opposed government. >and a return to sole proprietorships and straight >partnerships as the only form of business, then I'll know he's >ideologically consistent. What about Trusts, Companies of Adventurers, lots of other things... >But very very little time complaining about the *existence* of >corporations whose primary function is to shield the important folks >who run and fund the corporation from the consequences of their >actions. Come on! This should be a primary offense! Individuals >with no responsibility! One can't impose responsibility on all. Thus, I may be too poor to pay if you sue me. So don't deal with me. If you don't want to deal with an anonymous business entity, don't. DCF From lizard at mrlizard.com Thu Feb 12 09:57:03 1998 From: lizard at mrlizard.com (Lizard) Date: Thu, 12 Feb 1998 09:57:03 -0800 (PST) Subject: "Corporations selling your ass down the road for a dollar" In-Reply-To: Message-ID: <3.0.1.32.19980212095051.00bec7b0@dnai.com> At 07:10 AM 2/12/98 -0400, Michael Sims wrote: >When I see a libertarian calling for an elimination of all forms of >corporations and a return to sole proprietorships and straight >partnerships as the only form of business, then I'll know he's >ideologically consistent. Until then, pro-business is the only >reasonable way to describe the twisted rationale behind >libertarianism. I've been saying that for a long time. I'm not 100% certain I wish to eliminate entirely the corporation, but the idea of an 'artificial person' as an entity to take the blame for crimes committed by real people is highly dubious to me. If Monty Burns says, "Let's dump the toxic waste in the school ground, who cares if some kids die!", then it should be he who faces criminal charges -- not his corporation which gets fined. A corporation, like any collective entity, is at best a convenience -- a way to deal with large numbers of individuals by providing a central identifying tag. This way, "Motorola Chips" can sell to "Apple Computer", and the deal remains valid even if the chip-seller at Motorola and the chip-buyer at Apple quit their jobs, because the contract was not between those two individuals, but between the companies they represented. But just as there is in truth no 'society', no 'race', no 'people', there is also, in truth, no corporation -- it must all come down to individual acts and individual responsibilities. >Which brings me back to my original point - the AIM representation at >the aforementioned hearings. In Libber-land, there's nothing >reprehensible there. Corporations are lobbying for their "individual >rights", one of them being the right to make maximum profit by >eliminating/marginalizing competitors. Not with the power of government behind them. That's like saying there's nothing wrong with Joe's Deli asking Vinnie The Torch to pay a little 'visit' to Max's Deli across the street. You eliminate/marginalize competition by convincing consumers to purchase your products over theirs. Not by having the government regulate them out of business. What you're looking at is corporate socialism -- the current perversion of the 'free market' that America is living under. From k0zm0z at yahoo.com Thu Feb 12 11:51:34 1998 From: k0zm0z at yahoo.com (kozmo killah) Date: Thu, 12 Feb 1998 11:51:34 -0800 (PST) Subject: help with editor? Message-ID: <19980212194840.5943.rocketmail@send1d.yahoomail.com> A non-text attachment was scrubbed... Name: not available Type: text/html Size: 17105 bytes Desc: not available URL: From 57163566 at compuserve.com Thu Feb 12 15:54:17 1998 From: 57163566 at compuserve.com (57163566 at compuserve.com) Date: Thu, 12 Feb 1998 15:54:17 -0800 (PST) Subject: You Also Have Rights! Message-ID: <> Are you tired of being underpaid for your hard work? Do you want the admiration of your friends, relatives, and loved ones? Are you seeking recognition as an accomplished and valued individual? If your answer is "Yes" to any of these questions, you need a diploma from a higher university. Obtain bachelors, masters, and PhD diplomas from prestigious non-accredited universities for as little as $125. The only requirement is a brief interview by phone. Your diploma will be decorating your wall within hours. For details call 1-773-506-4509. When you call, after the message, at the tone, talk slowly and clearly and: 1) Say that you are interested in the University Diploma Program. 2) Say your name, then spell your last name. 3) Leave your daytime and nighttime phone numbers including area codes. 4) Repeat these two phone numbers. NOTE: Leave phone numbers that you personally answer. Do NOT leave pager, beeper, or voice mail numbers. ///////////////////////////////////////////////////// The above message was brought to you by PlusNet Marketing & Distributors. We market or distribute any product or service by bulk E-mail and by traditional marketing media. For information, call 1-513-763-3862. ///////////////////////////////////////////////////// From 57163566 at compuserve.com Thu Feb 12 15:54:17 1998 From: 57163566 at compuserve.com (57163566 at compuserve.com) Date: Thu, 12 Feb 1998 15:54:17 -0800 (PST) Subject: You Also Have Rights! Message-ID: <> Are you tired of being underpaid for your hard work? Do you want the admiration of your friends, relatives, and loved ones? Are you seeking recognition as an accomplished and valued individual? If your answer is "Yes" to any of these questions, you need a diploma from a higher university. Obtain bachelors, masters, and PhD diplomas from prestigious non-accredited universities for as little as $125. The only requirement is a brief interview by phone. Your diploma will be decorating your wall within hours. For details call 1-773-506-4509. When you call, after the message, at the tone, talk slowly and clearly and: 1) Say that you are interested in the University Diploma Program. 2) Say your name, then spell your last name. 3) Leave your daytime and nighttime phone numbers including area codes. 4) Repeat these two phone numbers. NOTE: Leave phone numbers that you personally answer. Do NOT leave pager, beeper, or voice mail numbers. ///////////////////////////////////////////////////// The above message was brought to you by PlusNet Marketing & Distributors. We market or distribute any product or service by bulk E-mail and by traditional marketing media. For information, call 1-513-763-3862. ///////////////////////////////////////////////////// From jmorris at intercode.com.au Thu Feb 12 17:04:12 1998 From: jmorris at intercode.com.au (James Morris) Date: Thu, 12 Feb 1998 17:04:12 -0800 (PST) Subject: Trust Message-ID: <34E39B7C.ABBE7A6@intercode.com.au> I'm just wondering if anyone else finds it particularly odd that while Australia is prepared to commit SAS troops, medical and intelligence personnel to a possible strike against Iraq, the US government still doesn't seem to trust us enough to use US developed cryptography products with adequate security. - James. -- James Morris From y1io at freexxxpics.com Thu Feb 12 17:14:11 1998 From: y1io at freexxxpics.com (y1io at freexxxpics.com) Date: Thu, 12 Feb 1998 17:14:11 -0800 (PST) Subject: FREE XXX PICS, LIVE SEX AND MORE!! READ IF INTERESTED 100% FREE Message-ID: <53405902_89184176> Hi there! want free porn? want pics that are updated daily? Or how about membership to XXX Adult sites, where the bill is payed by us?!? How about FREE live sex? If you do then visit http://www.sungkyul.ac.kr/~kimss/ for the BEST xxx pics, LIVE SEX, AVIs, MPEGS, and more!!!!! WE ARE NOT A SERVICE! THERE IS NOTHING TO SIGNUP FOR! THESE PICS ARE STRICTLY 100% FREE!!! So hurry! and visit http://www.sungkyul.ac.kr/~kimss/porn.html Thank you for your time. From feen4 at juno.com Thu Feb 12 18:21:44 1998 From: feen4 at juno.com (a b c) Date: Thu, 12 Feb 1998 18:21:44 -0800 (PST) Subject: "Ryan McDonald" : Fwd: Message-ID: <19980212.190031.3782.12.feen4@juno.com> --------- Begin forwarded message ---------- From: "Ryan McDonald" To: brandann at hotmail.com, mitya at demis.belpak.minsk.by, ddement at hotmail.com,Yablo at hotmail.com, bigspring1 at juno.com, anagramm at hotmail.com,sirus1 at juno.com, feen4 at juno.com, pleontks at hotmail.com Subject: Fwd: Date: Wed, 11 Feb 1998 21:05:28 PST Message-ID: <19980212050531.25108.qmail at hotmail.com> >Received: from 207.98.182.106 by www.hotmail.com with HTTP; > Sat, 31 Jan 1998 15:33:30 PST >X-Originating-IP: [207.98.182.106] >From: "Perrin ." >To: wilbersbabe at hotmail.com, phoebusapollo at mail.geocities.com, > parcha at hotmail.com, cypherpunks at toad.com, deanna at keylink.net, > cjensen at smtplink.rockford.edu, yablo at hotmail.com, flood69 at hotmail.com, > ftaylor at seer.stetson.edu, punkoff at usa.net, louisadamnit at hotmail.com, > nailbomb666 at hotmail.com, yuhai at hotmail.com, pierre at netins.net, > jewlie at nwiowa.com, mansonswonka at hotmail.com, jonesy at mindless.com, > sjackson at inreach.com, kirijane at hotmail.com, > wrightk at tron.cochise.cc.az.us, 727233 at ican.net, luvdust at hotmail.com, > tanyak at winshop.com.au, lrigyeknom01 at rocketmail.com, mrspots at sinosa.com, > nefurah at hotmail.com, thalion.taur at juno.com, childprodigy at mailexcite.com, > mix69 at hotmail.com, philip at infospeedway.net, datahaven at hotmail.com, > papa at micoks.net, sparkles4 at hotmail.com, shandave at hotmail.com, > tabnit at hotmail.com, thetigress_ at hotmail.com, thumper_069 at hotmail.com, > jacket9 at primenet.com, Yankee1428 at aol.com, bluelover2000 at yahoo.com >Subject: Fwd: >Content-Type: text/plain >Date: Sat, 31 Jan 1998 15:33:30 PST > >> >> >>LIST OF POSSIBLE SLOGANS PROMOTING NATIONAL CONDOM WEEK >> >>1. COVER YOUR STUMP BEFORE YOU HUMP >> >>2. BEFORE YOU ATTACK HER, WRAP YOUR WHACKER >> >>3. DON'T BE SILLY, PROTECT YOUR WILLY >> >>4. WHEN IN DOUBT, SHROUD YOUR SPOUT >> >>5. DON'T BE A LONER, COVER YOUR BONER >> >>6. YOU CANT GO WRONG IF YOU SHIELD YOUR DONG >> >>7. IF YOU'RE NOT GOING TO SACK IT, GO HOME AND WHACK IT. >> >>8. IF YOU THINK SHE'S SPUNKY COVER YOUR MONKEY >> >>9. IF YOU SLIP BETWEEN HER THIGHS, BE SURE TO CONDOMIZE >> >>10. IT WILL BE SWEETER IF YOU WRAP YOUR PETER >> >>11. SHE WONT GET SICK IF YOU WRAP YOUR DICK >> >>12. IF YOU GO IN TO HEAT, PACKAGE YOUR MEAT >> >>13. WHILE YOUR UNDRESSING VENUS, DRESS UP YOUR PENIS >> >>14. WHEN YOU TAKE OFF HER PANTS AND BLOUSE, SLIP UP YOUR >>TROUSER MOUSE >> >>15. ESPECIALLY IN DECEMBER, GIFT WRAP YOUR MEMBER >> >>16. NEVER, NEVER DECK HER WITH AN UNWRAPPED PECKER >> >>17. DON'T BE A FOOL, VULCANIZE YOUR TOOL >> >>18. THE RIGHT SELECTION WILL PROTECT YOUR ERECTION >> >>19. WRAP IT IN FOIL BEFORE CHECKING HER OIL >> >>20. A CRANK WITH ARMOR WILL NEVER HARM HER >> >>21. NO GLOVE, NO LOVE! >> >> >>YOU WILL EXPERIENCE GREAT SEX WITHIN FOUR DAYS OF >>RECEIVING THIS LETTER, PROVIDED YOU SEND IT ON. >>Since the copy must tour the world, you must make ten copies and send >>them to others. >> >>This is no joke. Send no money. Send copies to people who need to get >>laid within 96 hours. You have been selected to receive this letter >>because the person who sent this to you either thinks you need good >>luck or they want to send the curse of this letter on to you. >> >>IF YOU SEND THIS TO: >> >>0 people... Your life will be a living hell >>1-3 people... Your next relationship will be fun but >>won't last long >>4-6 people... Someone will get a crush on you >>7-10 people... You will get a date for Friday night >>11-14 people... You will get a date for the next school >>dance >>15-18 people... Your crush will ask for your number >>19-24 people... You will meet the person of your dreams >>25-29 people... Your crush will ask you out >>30-34 people... Your next relationship will last long and be >>good >>35-37 people... You will live long enough and have a good life and >>get lots of sex! >> >>You must send this in 1 day after reading it. If you do >>not send this to anyone your life will be a living hell. The more >people >>you send this letter to the more luck you will have. >> > > >______________________________________________________ >Get Your Private, Free Email at http://www.hotmail.com Join the Dark Army of Mephistopheles!!! ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com --------- End forwarded message ---------- _____________________________________________________________________ You don't need to buy Internet access to use free Internet e-mail. Get completely free e-mail from Juno at http://www.juno.com Or call Juno at (800) 654-JUNO [654-5866] From tcmay at got.net Thu Feb 12 18:43:50 1998 From: tcmay at got.net (Tim May) Date: Thu, 12 Feb 1998 18:43:50 -0800 (PST) Subject: Sabotaging Australian Involvement in Bill's War In-Reply-To: <34E39B7C.ABBE7A6@intercode.com.au> Message-ID: At 5:01 PM -0800 2/12/98, James Morris wrote: >I'm just wondering if anyone else finds it particularly odd that while >Australia is prepared to commit SAS troops, medical and intelligence >personnel to a possible strike against Iraq, the US government still >doesn't seem to trust us enough to use US developed cryptography >products with adequate security. It's not at all odd. In the New World Order, you Aussies are children. As children, your role is to die in wars like Viet Nam and the Gulf, under orders from the New World Reichsfuhrer. And like the American children sent to die in wars at age 18, but too young to either vote or drink alchohol, children cannot be allowed to possess dangerous crypto tools which might let them deviate from parental wishes. (Seriously, what the holy fuck are you Aussies doing getting involved in our Moral Leader's vanity war with Saddam? The United Nations authorized action in 1990 to "liberate Kuwait." That was done. All this recent folderol about "ensuring Saddam complies with inspections" is outside the original charter. And, of course, pointless. If the U.S. launches Bill's War, I hope it gets paid back in full with some attacks by freedom fighters. Maybe then Amerika will lose its desire to boss the world around and will get back to basics.) --Tim May Just Say No to "Big Brother Inside" ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, ComSec 3DES: 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^3,021,377 | black markets, collapse of governments. From guy at panix.com Thu Feb 12 19:54:53 1998 From: guy at panix.com (Information Security) Date: Thu, 12 Feb 1998 19:54:53 -0800 (PST) Subject: Sabotaging Australian Involvement in Bill's War Message-ID: <199802130354.WAA28444@panix2.panix.com> > Date: Thu, 12 Feb 1998 18:45:38 -0800 > To: James Morris , cypherpunks at toad.com > From: Tim May > Subject: Sabotaging Australian Involvement in Bill's War > > At 5:01 PM -0800 2/12/98, James Morris wrote: > >I'm just wondering if anyone else finds it particularly odd that while > >Australia is prepared to commit SAS troops, medical and intelligence > >personnel to a possible strike against Iraq, the US government still > >doesn't seem to trust us enough to use US developed cryptography > >products with adequate security. > > It's not at all odd. > > In the New World Order, you Aussies are children. As children, your role is > to die in wars like Viet Nam and the Gulf, under orders from the New World > Reichsfuhrer. > > And like the American children sent to die in wars at age 18, but too young > to either vote or drink alchohol, children cannot be allowed to possess > dangerous crypto tools which might let them deviate from parental wishes. > > (Seriously... The Aussies are obligated by treaty for the crypto/spying stuff. We Americans spy on all your domestic traffic by treaty. You can also request specifically targeted AU-domestic information from our personnel manning in AU the spy equipment, and we hand it to them. That's what the UKUSA (pronounced you-koo-za) agreement is all about: none of your people have broken any domestic spy laws. The British provide that service for us in Fort Meade, VA, we provide that service to the British in Menwith Hill... The EU recently declared the NSA was performing massive EU-domestic spying: that's how we have access. (It also confirms the entire massive US-domestic NSA spying claim of the Cryptography Manifesto) There has been a stunning lack of outrage to the EU statement: I'd have thought USA-based privacy groups and reporters would jump all over it. # "Moynihan Says U.S. Killed His Anti-Spy Measure" # By Irvin Molotsky, The New York Times, September 11, 1985 # # Senator Daniel Patrick Moynihan charged that the CIA and State Department # had killed a measure he had introduced aimed at protecting American # citizens from having their telephone conversations intercepted by foreign # agents in this country. # # The Senator's bill would have made telephone call interception by foreign # agents illegal and would have provided for their expulsion. # # The Chairman of the Select Committee on Intelligence opposed the measure # as unnecessary and could lead to disclosing "sensitive intelligence # sources." British wiretappers at the helm of the NSA's domestic spy-fest. You are "secondary" parties to the treaty...low on the totem pole. See the Cryptography Manifesto at: http://www.erols.com/paulwolf/cointelpro/cointel.htm (scroll down once there). Here is the Australian section... You'll have to purchase the "Project L.U.C.I.D." book for more details [that I snipped] from the Australian "National Surveillance" report. Snipped: some Australian politicians chased around trying to find out what the NSA was doing, then reversing themselves ("nothing's happening.."). I have to admit, it wasn't until I read this Australian report that I realized most of NASA's space shots were military. ---guy ****************************************************************************** Australian ECHELON Spotted ---------- ------- ------- * http://www.texemarrs.com, Living Truth Ministries 800/234-9673 Texe Marrs and his organization are big on the "Anti-Christ" aspects of all the technology the UKUSA governments have deployed to monitor people. I am just glad he knows the Beast when he sees it, that it is Evil (without the people involved necessarily being evil in intent: agreed!) and that unless we do something soon, it will be too late: Earth will become Hell. His book-jacket bio: Texe Marrs was a career U.S. Air Force officer (retired). He commanded communications-electronics and engineering units around the globe. * "Project L.U.C.I.D.", by Texe Marrs, 1996, ISBN 1-884302-02-5 * * Appendix 2: World Surveillance Headquarters * * The report that follows, originally entitled "National Surveillance", was * written by Australia's Peter Sawer and published in Inside News (P.O. Box * 311, Maleny, Queensland 4552, Australia). It first came to my attention * when it was printed in the U.S. by LtCol Archibald E. Robert's Bulletin, * the newsletter of the highly respected Committee to Restore the Constitu- * tion (P.O. Box 986, Fort Collins, Colorado 80522). * * The article caused a flurry of activity and a round of vigorous denials, * admissions, coverups, and more denials by Australian political leaders. * * The article contends that (1) America's National Security Agency (NSA) * is the world surveillance headquarters, and (2) Australia has it's own * secret "computer center", linked with the NSA via satellite, which * illegally watches over Australia's citizenry. Article snippets... capitalization by the original authors... * On a fateful fall day in America, on November 4th, 1952, a new United * States government agency quietly was brought into existence through * presidential decree. * * The birth of the National Security Agency on that day so long ago * heralded the beginning of the world's most sophisticated and all * encompassing surveillance system, and the beginnings of the greatest * threat to individual liberty and freedom not only in Australia, but * the entire planet will ever see. * * The NSA grew out of the post war "Signals Intelligence" section of the * U.S. War Department. It is unique amongst government organizations in * America, and indeed most other countries, in that there are NO specified * or defined limits to its powers. * * The NSA can (and does) do just about whatever it wants, whenever, and * wherever it wants. Although little known in both the U.S. and elsewhere, * the NSA is quite literally the most powerful organization in the world. * * Not limited by any law, and answerable only to the U.S. National Security * Council through COMSEC, the NSA now controls an information and * surveillance network around the globe that even Orwell, in his novel * "1984", could not have imagined. * * Most people believe that the current "computer age" grew out of either * the space program or the nuclear weapons race; it did not. * * ALL significant advances in computer technology over the last thirty * years, from the very beginnings of IBM, through to the super computers * of today, have been for the NSA. In fact, the world's very first super * computer, the awe-inspiring CRAY, was built to specification for the * NSA, and installed in their headquarters in 1976. * * The entire twentieth century of development of computer technology has * been the result of the NSA's unquenchable thirst for ever bigger, ever * faster machines on which to collect, collate, and cross-reference data * on hundreds of millions of honest, law-abiding, and totally unsuspecting * individuals. And not only in America, but in many other countries as * well. Including, as we shall see, Australia. [ "The Rise of the Computer State", David Burnham, 1984 p134: ...the technical advances that were occurring did so not entirely by chance. The computers' ability to acquire, organize, store and retrieve huge amounts of data was an essential factor leading to the broad definition of intelligence that was fostered by the National Security Agency and its godfather, the National Security Council. Computer research was supported by NSA in a major way by secret research dollars. Thomas C. Reed, Director of the Pentagon's Telecommunications, Command and Control System, referring to domestic intercity telephone microwave radio trunks, said in 1975, "Modern computer techniques make it possible to sort through that traffic and find target conversations easily." p126-127: Since the wiretap law barred the Bureau of Narcotics and Dangerous Drugs from installing a tap on New York City's Grand Central Station pay phones, bureau head John Ingersoll asked the NSA for help. Within a few months the spy agency was sorting through all the conversations it was already acquiring for general intelligence purposes. Of course, the technicians were required to acquire, monitor, and discard a large number of calls made by people with no connection with the cocaine business in South American cities. But so pleased was Mr. Ingersoll with the tips he was getting from the dragnet monitoring that he ultimately persuaded the NSA to monitor simultaneously nineteen other U.S. communication hubs. ] * "Project L.U.C.I.D.", continued... * * Fort Meade is the hub of an information gathering octopus whose tentacles * reach out to the four corners of the earth. * * The principal means of communicating this information is by the National * Aeronautical and Space Administration (NASA) satellite communications * system, which most people erroneously think exists primarily for the * space program. * * It does not. * * The satellites, indeed NASA and the entire American Space Program, exist * largely to supply the NSA with its telecommunications system. That is why * the bulk of its operations are officially declared 'secret'. This * ultimate 'Big Brother' machine even has an official name 'Project * Platform'. [ "The Puzzle Palace": all these computer systems are linked together under Project Platform. The first Cray went to the NSA. p138 ] * Although the NSA was officially formed in 1952, it grew out of an * International Agreement signed in 1947. Officially termed the "UKUSA * PACT," this was an agreement between Britain, the U.S.A., Canada, New * Zealand, Australia and the NATO countries. * * The UKUSA PACT was, quite simply and bluntly, an agreement between these * countries to collect and collate information on their respective citizens * and to share this information with each other and pass on to Fort Meade. * * On March 9th 1977, the Leader of the Opposition, Mr. Bill Hayden, asked * "questions on notice" on the subject. On April 19, Prime Minister Malcom * Fraser, declined to answer the questions, "in the interests of national * security." * * The first clue of the Australian Headquarters of PROJECT PLATFORM appeared * in 1975. Then, as today, government undertakings involving expenditure * over a certain amount must be presented to a Senate body, the Joint * Parliamentary Accounts Committee (JPAC). In 1975 JPAC was asked to * examine and approve finance for the construction of a new building in * Deakin, a leafy suburb of Canberra. * * This quite massive building was to be constructed behind an existing, much * smaller one, which, until then, had been known to the public only as the * "Deakin Telephone Exchange." * * That it was not, and never had been, simply a "telephone exchange" finally * came to light in the 1975 JPAC Approval Report, when it admitted that the * existing building had a comprehensive basement which housed NASA's micro- * wave communications headquarters in Australia. Part of the justification * of the "need" for the new, much larger building, was that by 1980, it was * expected that NASA would run out of room in their existing home. * * Apart from NASA, it is now admitted that Deakin houses the National * Computer Headquarters for, amongst others, the Australian Defense * Department, the Australian Taxation Office, the Department of Social * Security, the Commonwealth Department of Education, and the Department * of Transport and Communications. * * Both Tax and Social Security are, in turn, directly linked to Medicare. * In fact, the Department of Health used Social Security's computer * facilities there until their own were completed. * * A small, but highly significant, part of the building is, in fact, * occupied by Telecom. This is the part that contains the networking * junctions for the optical-fiber lines leased by the banks for their * "Electronic Funds Transfer System" (EFTS). ALL financial transactions * for the banks pass through there via subsidiary company, "Funds * Transfers Services Pty Ltd." (FTS) * The New York Times INTERNATIONAL Wednesday, May 21, 1997 * by Clyde H. Farnsworth, Woomera, Australia. * * As Darth Vader's Death Star is blown to bits in the newly remastered "Star * Wars" at the local theater, the audience of Australian and American Air * Force personnel, and squadrons of their children, lets out a whoop. As the * lights go on, everyone is beaming. * [snip] * * Pine Gap employs nearly 1,000 people, mainly from the CIA and the U.S. * National Reconnaissance Office. * * It is the ground station for a U.S. satellite network that intercepts * telephone, radio, data links and other communications around the world. Worldwide telephone interception. ****************************************************************************** From guy at panix.com Thu Feb 12 20:19:27 1998 From: guy at panix.com (Information Security) Date: Thu, 12 Feb 1998 20:19:27 -0800 (PST) Subject: Regulators back down on SEC/NASD email snooping rules Message-ID: <199802130419.XAA29697@panix2.panix.com> > From: Don "Free Radical" McLean > Date: Thu, 12 Feb 1998 14:27:19 -0800 (PST) > Subject: Regulators back down on SEC/NASD email snooping rules > > Last Friday I wrote in Netly about the SEC approving rules dealing with > email snooping on home computers and the potential privacy violations: > > http://cgi.pathfinder.com/netly/opinion/0,1042,1731,00.html > > These rules were to take effect on February 15. Now, citing "concerns that > have been voiced," the NASD has backed down and is considering changes. > > Score one for privacy, or at least a more cautious approach. Damn, wish I could affect the real world too. ---- The "cautious approach" is simply ordering all employees to send work-related email via the company systems. ---guy Where I can monitor it. From dformosa at st.nepean.uws.edu.au Thu Feb 12 20:48:36 1998 From: dformosa at st.nepean.uws.edu.au (David Formosa) Date: Thu, 12 Feb 1998 20:48:36 -0800 (PST) Subject: Trust In-Reply-To: <34E39B7C.ABBE7A6@intercode.com.au> Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Fri, 13 Feb 1998, James Morris wrote: > I'm just wondering if anyone else finds it particularly odd that while > Australia is prepared to commit SAS troops, medical and intelligence > personnel to a possible strike against Iraq Nope you haven't relised that the austrailian goverment is the well trained lap dog of amirica. Always ready to roll over and get screwed by the USA. > , the US government still > doesn't seem to trust us enough to use US developed cryptography > products with adequate security. Of cause not, who would turst a subordermate with such things. Of cause we have devoloped softwhere (like SSLeay) that works just as well as any from the US. But we can't export something to au because the US is so much more advansted then us, so we can't be trusted with such products. - -- Please excuse my spelling as I suffer from agraphia see the url in my header. Never trust a country with more peaple then sheep. ex-net.scum and proud You Say To People "Throw Off Your Chains" And They Make New Chains For Themselves? --Terry Pratchett. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBNOO60KQK0ynCmdStAQGDowQA061yXNcatlVY+541pJltHUBMJ/2ebrZi M76FSTGLVL/CsNw5xWKWPlmSKYHwp997NLaG+9nrE8QwFF25CiF6QQEjnxNo8E0W sAv0lCRnXgmnIKaQjn1T8D3mrUXTQA7kCBmVvGuyLKsu7D9RuG5a+lvup/XRijQI dHcRnNMt6bk= =UKQp -----END PGP SIGNATURE----- From dformosa at st.nepean.uws.edu.au Thu Feb 12 22:21:09 1998 From: dformosa at st.nepean.uws.edu.au (? the Platypus {aka David Formosa}) Date: Thu, 12 Feb 1998 22:21:09 -0800 (PST) Subject: Sabotaging Australian Involvement in Bill's War In-Reply-To: Message-ID: -----BEGIN PGP SIGNED MESSAGE----- On Thu, 12 Feb 1998, Tim May wrote: [...] > (Seriously, what the holy fuck are you Aussies doing getting involved in > our Moral Leader's vanity war with Saddam? Our goverment has this quite silly beleafe that if we tag allong with all your wars, when we get attacked the great Amiracan peaple will come to our aid out of a sence of appreashation. The flaw with this is that most amaricans don't know where australia is, let allown care about it. - -- Please excuse my spelling as I suffer from agraphia see the url in my header. Never trust a country with more peaple then sheep. ex-net.scum and proud You Say To People "Throw Off Your Chains" And They Make New Chains For Themselves? --Terry Pratchett. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv iQCVAwUBNOPQT6QK0ynCmdStAQEOowQAs/Ao0oCGsghLLk0VDKuzTQg5gO2k5KTq KJPWpA1OAuRlgJQ7f4/Jk27DLCbXbf+semjCpNpUp32nFbQ8/FBSWNH56KY/AU1r ixL165Da4c8pmAQdjvftU0eZMw5Ob23AMIsX6/v/7bhaWUWmFi225Uc179wY0QmK 0poJWHvaJAw= =8M++ -----END PGP SIGNATURE----- From frantz at netcom.com Thu Feb 12 22:21:13 1998 From: frantz at netcom.com (Bill Frantz) Date: Thu, 12 Feb 1998 22:21:13 -0800 (PST) Subject: "Corporations selling your ass down the road for a dollar" In-Reply-To: <199802121211.HAA19946@arutam.inch.com> Message-ID: At 9:50 AM -0800 2/12/98, Lizard wrote: >I've been saying that for a long time. I'm not 100% certain I wish to >eliminate entirely the corporation, but the idea of an 'artificial person' >as an entity to take the blame for crimes committed by real people is >highly dubious to me. If Monty Burns says, "Let's dump the toxic waste in >the school ground, who cares if some kids die!", then it should be he who >faces criminal charges -- not his corporation which gets fined. I fully agree, and I think US law agrees, that an illegal act by an employee is not shielded by incorporation. But as many people on this list have noted, what the law says, and what is enforced are widely different. Probably the most valuable feature of corporations is the way they limit the financial liability of their stockholders and managers. This limit allows people to go into business without having to worry about business creditors coming to take their houses and cars. (And wives and first born :-) Since everyone knows what the deal is, there is no fraud. Everyone extending credit to a corporation knows that it is the corporation's credit rating which is relevant, not the credit ratings of the members of the board of directors. Limited liability, coupled with the willingness of venture capitalists to fund ventures lead by people whose previous ventures have failed, are the engine which allows Silicon Valley's creative destruction approach to making money succeed. ------------------------------------------------------------------------- Bill Frantz | Market research shows the | Periwinkle -- Consulting (408)356-8506 | average customer has one | 16345 Englewood Ave. frantz at netcom.com | teat and one testicle. | Los Gatos, CA 95032, USA From anon at anon.efga.org Fri Feb 13 01:49:20 1998 From: anon at anon.efga.org (Anonymous) Date: Fri, 13 Feb 1998 01:49:20 -0800 (PST) Subject: No Subject Message-ID: <4a7a63d6ddc3e466ede1e561740bd106@anon.efga.org> I'm in El Paso Texas... so close to the border I can see Old Mex outside my window as I write this.. I'm over there nearly every day for lunch ( I actually walk there from my house it's so close) If I write a crypto program on my laptop over there and ftp it to a web page I have on a server outside the US will I have avoided the foolish export regs?? Does anyone know of someone trying this before?? From eureka at eureka.abc-web.com Fri Feb 13 02:25:25 1998 From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com) Date: Fri, 13 Feb 1998 02:25:25 -0800 (PST) Subject: Eureka! Fri Feb 13 '98 Message-ID: <19980213082113.26521.qmail@eureka.abc-web.com> Welcome to Friday's issue of Eureka! KARA'S ADULT PLAYGROUND With 15 live sex shows, 1,300 Hardcore XXX videos, 1,000s of Hardcore and Softcore Pix, the VaVoom monthly magazine, Kara's exclusive monthly centrefolds, adult games, erotic stories and even casino and sports betting, you won't be going out for weeks particularly now that you can get a FREE trial - your eyes will be popping out of your head! Hahaha! Kara's Playground ...... http://www.rjbtelcom.com/eplay.html James And Victoria's Erotic Site http://www.jamesandvictoria.com/ads/ads.cgi?advert=eureka Our free site has hundreds of photos, thousands of erotic stories, personal ads and several chat rooms. UPSKIRTS AND PANTYHOSE LINKS Quick, go to the bottom of this page and check out the links marked contributors pics. Here you will find a group of odd images sent in by people out on the internet. Pantyhose and underwear shots. Watch out for steamy wet patches in there! Upskirts .................. http://serve.com/teenet/idx2.htm EVERY MAN'S DREAM Sometimes we have to go all the way to Denmark to deliver great porn to you. This website is simple but boy does it deliver! Tons of great free pussy pix! Chicks before they had breast implants, blondes, brunettes. Two galleries. Go there right now. 200 hundred images of pure sweet pussy! Every Man's Dream ....... http://hjem.get2net.dk/dream/1.htm DIRTY DIANA My kind of dirty. A georgeous young black haired beauty who shows her tits and ass to all of us. Wait! She even has a few free video clips. Check out the hot tub pussy rubbing! Dirty Diana ..................... http://www.dirtydiana.com/ FREEPICS Cruise way down the page to the area called, Girls that put things way up their Cunts! Check out the aluminium baseball bat shoved up this girls pussy. I guess strikes one your in! Freepics ............. http://38.15.25.227/freepics/main.htm READ THIS!! WIN $25,000 and a Fantasy Date - Click Here Now! $25,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A HOORAY! THE ADULT SEARCH ENGINE Now you can search for the sex sites you are looking for and fast! This new search engine is setting the standard others will follow. It offers pop-up search and detailed listings! Hooray! -----------------> http://eureka.abc-web.com/hooray/ FREE STREAMING VIDEO Please note that most of these feeds require a Netscape bro- wser in order to successfully view them. Unfortunately Micr- osoft's browser does not have all the features of Netscape's yet. However, many of the feeds use the RealPlayer and will work in most browsers. If you do not have Netscape and want a free copy click here --> http://www.netscape.com/download/ 30 RealVid ---> http://www.sexhost.net/rabbit/video-111.html CHAT WITH OTHER READERS Hey, if you haven't checked out the Eureka! Chat sites yet, you're missing out on some great stuff. Every day you'll find hundreds of other readers just like you looking to chat have fun and maybe a little 'cyber'. We know you'll love it! Adult/Sex Chat -----------------> http://137.39.63.229/chat/ General/Fun Chat -------> http://137.39.63.229/chat/funchat/ HOT LIVE PHONE SEX TO MAKE YOU CUM! LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912 LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779 FREE: Live 1-on-1 (international call only)--->011-678-77416 NEW! CENTERFOLD PIC OF THE DAY Exclusive! We proudly present unpublished Pictures of your favorite Centerfolds. Featured This Week: Dec 80-PMOY Terri Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri Kendall, Rebecca Ferratti, Lydia Schone and many more too! ---------------------------> http://www.gatefold.com/eureka/ AMATEUR SITE OF THE DAY Trina: She bills herself as "America's Favorite Flasher", very bold words which she backs up with a bevy of nasty pictures. She originally wanted to keep her identity secret so she used to wear a mask, but now we can all find out who the real beauty is behind the mask. Visit her site and decide for yourself if the title fits! ---------------------------> http://amateurindex.com/eureka/ EROTIC STORY SITE OF THE DAY Amateur Women Stories: AmateurWomen.com brings you totally hot true sex stories and real pics of hot amatuer models. See and read what these hot honeys do in private! .......... ............................... http://www.amateurwomen.com/ DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/ ADULT STAR PIC OF THE DAY Woah, our Adult Star pics are getting hotter and hotter, so make sure you stop by and check out today's - definitely not to be missed! --------> http://www.xxxadultstars.com/eureka/ OTHER EUREKAS! GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/ DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm ESPA�OL ------> http://eureka.abc-web.com/eureka/espanol.htm FRAN�AIS ----> http://eureka.abc-web.com/eureka/francais.htm ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm TODAY'S FREE PIX Pic 1 --------------------------> http://137.39.63.229/?130 Pic 2 --------------------------> http://137.39.63.229/?131 Pic 3 --------------------------> http://137.39.63.229/?132 Pic 4 --------------------------> http://137.39.63.229/?133 Pic 5 --------------------------> http://137.39.63.229/?134 Pic 6 --------------------------> http://137.39.63.229/?135 Pic 7 --------------------------> http://137.39.63.229/?136 Pic 8 --------------------------> http://137.39.63.229/?137 Pic 9 --------------------------> http://137.39.63.229/?138 Pic 10 --------------------------> http://137.39.63.229/?139 ============================================================ TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US. ============================================================ From rdew at el.nec.com Fri Feb 13 10:08:48 1998 From: rdew at el.nec.com (Bob De Witt) Date: Fri, 13 Feb 1998 10:08:48 -0800 (PST) Subject: Trust Message-ID: <199802131757.JAA09223@yginsburg.el.nec.com> James, That one is easy. NSA does not get all the recovery key info from stuff developed in Australia. On Fri, 13 Feb 1998 James Morris wrote: > > I'm just wondering if anyone else finds it particularly odd that while > Australia is prepared to commit SAS troops, medical and intelligence > personnel to a possible strike against Iraq, the US government still > doesn't seem to trust us enough to use US developed cryptography > products with adequate security. > > - James. > Bob De Witt, rdew at el.nec.com Opinions expressed are my own, and in no way relate to those of my employer, or anyone else. -rdew From honig at otc.net Fri Feb 13 10:08:57 1998 From: honig at otc.net (David Honig) Date: Fri, 13 Feb 1998 10:08:57 -0800 (PST) Subject: Sabotaging Australian Involvement in Bill's War In-Reply-To: <34E39B7C.ABBE7A6@intercode.com.au> Message-ID: <3.0.5.32.19980213100958.007ce970@otc.net> At 06:45 PM 2/12/98 -0800, Tim May wrote: >At 5:01 PM -0800 2/12/98, James Morris wrote: >>I'm just wondering if anyone else finds it particularly odd that while >>Australia is prepared to commit SAS troops, medical and intelligence >>personnel to a possible strike against Iraq, the US government still >>doesn't seem to trust us enough to use US developed cryptography >>products with adequate security. > >It's not at all odd. > >In the New World Order, you Aussies are children. Well, We don't let Aussies have guns, why should we trust them with our cryptographic munitions? Look, if you have a problem with US domination, just fax your complaints to your local Aussie officials. Our Echelon people will forward it to us, no problem. ------------------------------------------------------------ David Honig Orbit Technology honig at otc.net Intaanetto Jigyoubu Has Nike hired Monica to endorse kneepads yet? From anon at anon.efga.org Fri Feb 13 10:19:47 1998 From: anon at anon.efga.org (Anonymous) Date: Fri, 13 Feb 1998 10:19:47 -0800 (PST) Subject: Letter of the law Message-ID: >I'm in El Paso Texas... so close to the border >I can see Old Mex outside my window as I write this.. >I'm over there nearly every day for lunch ( I actually >walk there from my house it's so close) If I write >a crypto program on my laptop over there and ftp >it to a web page I have on a server outside the US >will I have avoided the foolish export regs?? >Does anyone know of someone trying this before?? My guess is this: if it has the name of a US citizen in the copyright notice, it will be assumed to have been made in the US. if the morons even go after you. you still may have a plausable excuse if ever taken to court. after all, you "exported" youself, which is a perfectly legal thing to take out of the country, and "yourself" accidentally spewed a copy of something that couldn't cross the border. I don't think anybody has tried this and been challenged. then again, a lot of us don't have the opportunity. It's easier to ask forgivness than permission... Another easier excuse would be to publish it freely in hardcopy form, and just "happen" to have somebody end up "typing" in your source code abroad, making a legit international copy... -Anon2 From honig at otc.net Fri Feb 13 13:22:36 1998 From: honig at otc.net (David Honig) Date: Fri, 13 Feb 1998 13:22:36 -0800 (PST) Subject: ruling on deceitful domain names Message-ID: <3.0.5.32.19980213132337.0079cb60@otc.net> Seems a wee bit o' infowar is breaking out in the DNS... ........................................ http://dailynews.yahoo.com/headlines/technology/wired/story.html?s=n/reuters /980213/wired/stories/domain_1.html Friday February 13 2:17 PM EST Planned Parenthood wins ruling in domain dispute By Jen Sullivan SAN FRANCISCO (Wired) - In a decision that underscores the thorny and ongoing issue of brand identity and domain names, the U.S. Second Court of Appeals upheld a preliminary injunction issued last March that prevented the use of the plannedparenthood.com domain name for a personal anti-abortion Web site. U.S. District Court Judge Kimba Wood ruled that there was "significant likelihood" that the Web site by Richard Bucci of Syracuse, New York, would cause confusion among individuals seeking Planned Parenthood's actual site, plannedparenthood.org. The .com version has been placed "on hold" by Network Solutions Inc. (NSI) and is not accessible to Web browsers. Planned Parenthood general counsel Eve Paul lauded the decision. "We aren't a big company that owns factories, we just have our name, and women all over the country trust our name," Paul said. "We can't afford to let someone use it for their own political purposes." Paul praised the court's finding that Bucci's use of the domain was misleading. "When you went to that Web site, it said 'Welcome to the Planned Parenthood home page,"' said Paul. "It really had a very negative effect on our ability to reach a great audience out there." In addition to espousing anti-abortion views, Bucci's site promoted his friend's anti-abortion book. Bucci, an anti-abortion activist who also hosts a local radio program several times a week called "Catholic Hour," stopped using the disputed domain name after the judge issued her preliminary injunction, but plans to fight the court's decision, taking appeals all the way to Supreme Court if possible. "Do you remember General Patton? We're going to continue to hold Planned Parenthood by the nose and kick them in the derriere," Bucci said. Though pleased with the end result, Paul expressed dismay over the slow speed of the process, first with NSI, and then with the ensuing legal action. "Network Solutions was very slow," said Paul. "If they had been available, it certainly would have been cheaper. "Our trademark lawyer wrote them a letter, and they sent back a very bureaucratic response, saying that we hadn't crossed our T's and dotted our I's. We went to court but that turned out to be a longer process than we had hoped," she said. Network Solutions' stated policy is that they do not arbitrate in trademark infringement cases. "What insanity has gotten into the minds of the people when they think of domain names and the Internet," said David Graves, director of business affairs at NSI. "What mechanism does the Newspaper Association of America have in place when an advertiser infringes on a trademark in an advertisement? They don't have separate mechanisms." Stanton McCandlish, program director of the Electronic Frontier Federation (EFF), agreed that trademark infringement is purely a legal issue. "NSI has not been doing a very good job," McCandlish said. "They lose registrations, things get screwed up. But trademark is a big open issue. I don't think that anyone can expect NSI to solve that one. Lawsuits are inevitable. There is not any way to get to heart of the matter." Paul said Planned Parenthood was in the process of acquiring the "plannedparenthood.com" domain name. ------------------------------------------------------------ David Honig Orbit Technology honig at otc.net Intaanetto Jigyoubu Has Nike hired Monica to endorse kneepads yet? From guy at panix.com Fri Feb 13 14:01:48 1998 From: guy at panix.com (Information Security) Date: Fri, 13 Feb 1998 14:01:48 -0800 (PST) Subject: The Doctor has been spanked!!! Message-ID: <199802132201.RAA11745@panix2.panix.com> As of 1pm today: # Guy, # # Thank you for the supporting documentation you've provided. # # Dr. Dimitry V's PSINet service has been terminated. ...he called one person too many a 'pedophile'. ---guy From ulf at fitug.de Fri Feb 13 15:41:23 1998 From: ulf at fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=) Date: Fri, 13 Feb 1998 15:41:23 -0800 (PST) Subject: UK Crypto Ban? In-Reply-To: <1.5.4.32.19980212001956.00b27e4c@pop.pipeline.com> Message-ID: <9802132341.AA78212@public.uni-hamburg.de> >The Government will propose creating a network of what are called >Trusted Third Parties, or TTPs. Britain is now trying to establish the infamous GCHQ protocol as the ETSI standard for "Trusted Third Parties". Ulrich Sandl (who represents the German ministry of economics on crypto issues at international conferences etc.) wrote on the Krypto mailing list that the German and other delegations have protested in the last minute. The German standards proposal does not contain key escrow. From jya at pipeline.com Fri Feb 13 16:41:28 1998 From: jya at pipeline.com (John Young) Date: Fri, 13 Feb 1998 16:41:28 -0800 (PST) Subject: BXA, UK Ban, McCain-Kerrey Message-ID: <1.5.4.32.19980214004354.009d3ccc@pop.pipeline.com> In response to Greg Broiles' and Ulf M�ller's posts and the prospect of a UK ban on non-escrowed encryption next Tuesday: Opening Address Under Secretary William A. Reinsch Bureau of Export Administration U.S. Department of Commerce Update West 98 Los Angeles, California February 10, 1998 [Excerpt] Encryption One of the reasons why our licensing load is inching back up is the transfer of encryption licensing to Commerce earlier this year. No speech from me would be complete without a paragraph on encryption, so here it is. Our policy is intended to balance the competing interests of privacy, electronic commerce, law enforcement, and national security. We believe that use of key recovery technologies is the best way to achieve that balance. We do not focus narrowly on a single technology or approach. We expect the market to make those judgments, but we are taking steps to facilitate the development and dissemination of these products. Our regulations allow recoverable encryption products of any strength and key length to be exported freely after a single review by the government. To encourage movement toward recoverable products, we have also created a special, two-year liberalization period during which companies may export 56 bit DES or equivalent products provided they submit plans to develop key recovery products. This provides an incentive for manufacturers to develop these products, which in turn will facilitate the development of key management infrastructures. So far, we have approved 47 plans, from companies large and small, and have five more pending. In terms of licenses, in calendar year 1997, we received 2076 applications, and approved 1801 licenses with a dollar value of $4.7 billion. (The reason for the high dollar value is because we approve encryption licensing arrangements for extended periods of time, from 4 to 10 years.) The interagency working group on cryptography policy, which includes representatives from BXA, NSA, and the FBI, continue to meet to discuss ways to streamline the licensing process on encryption export licenses. Several items have been identified and progress is being made in these areas. We have established a pre-Operating Committee group to discuss contentious cases. In part as a result, no encryption cases have been escalated to the OC since mid-December. We have created an Autolist to eliminate agency referrals. So far, we have agreed to list specific products amounting to 20% of the products we see. This means, once implemented, that a subset of licenses can be processed by Commerce without prior referral to other agencies. Finally, we have posted on our web page "helpful hints" to make the encryption licensing process more transparent: http://www.bxa.doc.gov/encguide.htm We continue to work on other initiatives to streamline the process. We are also discussing with our trading partners a common approach to encryption policy. We have found that most major producing countries have public safety and national security concerns similar to ours. We are working together with these governments to ensure that our policies are compatible, and that they facilitate the emergence of a key management infrastructure. With respect to legislation, we believe the McCain-Kerrey Bill, S. 909, the Secure Public Networks Act, provides a sound basis for legislation acceptable to both Congress and the Administration. In particular, we appreciate the bill's explicit recognition of the need to balance competing objectives and of the potential for key recovery to become a market-driven mechanism to facilitate maintaining that balance. ... [Other excerpts of speeches by BXA officials at the seminar:] Encryption Controls Export Enforcement has new responsibilities in the encryption area. Over the past year, Export Enforcement has opened many new investigations involving alleged violations of the encryption regulations. These cases are being watched very closely. The national security of the United States depends in part on the government's ability to obtain timely information about the activities and plans of potentially hostile foreign parties, such as terrorists and drug dealers. ... the Department of Justice and National Security Agency participate in processing licenses for encryption. ... The increase in licenses we are experiencing is attributable not only to increased exports, but to transfer of items from the Munitions List to Commerce jurisdiction. Encryption licenses account for a significant portion of the increase. We created a special division to handle those. As of today, there is only one encryption case that has been pending over 40 days. ----- For full speeches: http://jya.com/bxa-west98.htm From manager at musicblvd.com Fri Feb 13 17:09:12 1998 From: manager at musicblvd.com (http://musicblvd.com/) Date: Fri, 13 Feb 1998 17:09:12 -0800 (PST) Subject: The New Music Boulevard Message-ID: <3.0.32.19980213144310.007a0a90@mail.sparknet.net> Visit the new and improved Music Boulevard today and check out our new design! We've added 5 new music departments -- that means more featured CDs, new releases, record reviews and in-store specials for you. Here are some of the exciting sales events going on right now: * FREE SHIPPING for U.S. orders of three or more items! * 3 CDs for $30! Over 25,000 CDs on sale! * Celebrate BLACK HISTORY MONTH with us! Influential artists and essential albums are on sale. * Say it with music -- we've got 50 ways to please your lover this Valentine's Day! * The GRAMMY NOMINEES are in, and on sale! Winners to be announced on February 25th. * The BOGMEN LIVE CD is available exclusively on Music Boulevard, only while supplies last. Catch these rising stars while you still can! To take advantage of these specials and shop from our catalog of over 200,000 albums, stop by Music Boulevard today -- http://www.musicblvd.com ! P.S. Enjoy Music Boulevard's new look. We love to hear from our customers, so please let us know what you think. THANK YOU FOR SHOPPING ON MUSIC BOULEVARD! -------------------------------- TO UNSUBSCRIBE -------------------------------- To unsubscribe from this mailing list, send an email to: remove-musicblvd at sparklist.com and you will automatically be removed from this list. From gwb at gwb.com.au Fri Feb 13 18:03:13 1998 From: gwb at gwb.com.au (Global Web Builders) Date: Fri, 13 Feb 1998 18:03:13 -0800 (PST) Subject: Pauline Hanson's Newsletter Message-ID: <1.5.4.32.19980214002657.006d4090@mail.pronet.net.au> Issue 1.7, February 1998 ---------------------------------------------------------------------------- PLEASE NOTE: No unsolicited email is sent. If you do not want to be on the mailing list please say "REMOVE" in the subject line and return this message in the body. ---------------------------------------------------------------------------- Dear supporters in NSW, You may not have seen the recent article in the Australian Financial Review (3rd Feb 1998). Here is a short summary. The subject is political donations: Over 90% of loans (or $4,650,000) to the Liberal Party have been made by one body - the Greenfields Foundation. This organisation has strong links with the Liberal Party's funding vehicle, the Free Enterprise Foundation which was caught out in the 1995 crackdown of the disclosure law. The post box of both is the same and the trustee of the Free Enterprise Foundation since 1981, Tony Bandle, responded to the Australian Electoral's Enquiries about disclosures by the Greenfields Foundation. The Greenfields Foundation has 'lent' the Liberal Party over 80% of its total donations to avoid disclosing just who the donors to Greenfields are. We know that most large donations received by both the Liberal and Australian Labor Party are from multinationals - the benefactors of the multilateral agreement on investment (MAI) (eg Village Roadshow over $200,000; ANZ Bank over $100,000). Benefactors of the MAI, like media giant News Limited, have gone out of their way to try to close down donations to One Nation by alleging large commissions and rewards for One Nation National Director David Ettridge. These claims are false and have one aim - to financially cripple Pauline Hanson's One Nation while multinationals quietly throw hundreds of thousands of dollars at the major parties to support their next federal campaign - one would be a fool to believe there is no contra. Meanwhile, the Liberal Party have refused to return over $50,000 to me after my win in the seat of Oxley. Most of the money would be used by me to benefit the Oxley electorate. See my on-line press release for full details: http://www.gwb.com.au/onenation/press/130298a.html Finally, on the subject of political donations it should come therefore as no surprise that both Kim Beazley and John Howard's foreign minister Alexander Downer have said that 'MAI is good for Australia'. Please visit: http://www.gwb.com.au/mai.html and be the judge. We desperately need your donations to ensure that One Nation can present a strong case at the next Federal Election. We are calling on 'people power' - that's you - to help us by making a donation, no matter how small it is important. If you believe, like I do that Australia has got to be turned around what cost can be too much for the sake of our children and their children? Please contact the Manly office on (02) 9976 0283 or complete and return the donation form at: http://www.gwb.com.au/onenation/funds.html For those of you who are members of Pauline Hanson's One Nation we are holding a celebration of the party's first anniversary over the Easter Weekend (April 10-12) on my rural property near Ipswich in South East Queensland. In true Australian style camping and bar-b-ques under the starlit sky will be the order of the day. There will be competitions, entertainment like bush dancing, karaoke and horse racing - and much, much more. If you are interested please contact (07) 3369 8214, 3848 2197, 3399 6662 or 3399 6901 for details. Costs range from $25 per day for adults or just $45 for the three. Families from $55 for the one day to $85 for the three. Book before you put this one in your diary (limited numbers)! Finally important Internet addresses: Pauline Hanson's One Nation: http://www.gwb.com.au/onenation One Nation Press Releases (about 10 in the last month): http://www.gwb.com.au/onenation/press/ Pauline Hanson From webmaster at UnixSysAdmin.com Fri Feb 13 19:10:11 1998 From: webmaster at UnixSysAdmin.com (webmaster at UnixSysAdmin.com) Date: Fri, 13 Feb 1998 19:10:11 -0800 (PST) Subject: UnixSysAdmin.com Registration Message-ID: <199802140308.TAA22118@hawaii.> Thanks for registering with UnixSysAdmin.com Your Login Name is: cypherpunks (Login names are CASE SENSITIVE.) Your Password is: tt22117 You can now follow this link back to TechTalk: http://www.UnixSysAdmin.com/enter.htm WARNING: If your username contains spaces or special characters, your login will *not* work! From yafq at telcel.net.ve Fri Feb 13 19:46:26 1998 From: yafq at telcel.net.ve (Q) Date: Fri, 13 Feb 1998 19:46:26 -0800 (PST) Subject: Q Message-ID: <19980214034036.AAB6656@telcel.telcel.net.ve> Hi to all the teens out there -------------- next part -------------- A non-text attachment was scrubbed... Name: bin00001.bin Type: application/octet-stream Size: 952 bytes Desc: "Q1.txt.pgp (PGP Encrypted File)" URL: From yafq at telcel.net.ve Fri Feb 13 19:46:29 1998 From: yafq at telcel.net.ve (Q) Date: Fri, 13 Feb 1998 19:46:29 -0800 (PST) Subject: Q Message-ID: <19980214034036.AAA6656@telcel.telcel.net.ve> Whats up? From jamesd at echeque.com Sat Feb 14 00:51:59 1998 From: jamesd at echeque.com (James A. Donald) Date: Sat, 14 Feb 1998 00:51:59 -0800 (PST) Subject: Beating the UK Crypto ban. Message-ID: <199802140851.AAA01341@proxy4.ba.best.com> -- Supposedly the UK is not going to prohibit cryptography, the kindly and benevolent government is merely going to protect us from irresponsible certificate authorities by licensing the issue of certificates. Thus in theory the ban should not affect Crypto Kong, which does not rely on certificates, does not attempt to address the question of which Bob is the real Bob. Instead it merely checks that the Bob who signed one letter is the same Bob as the Bob who signed the other letter. (And you can make an encrypted reply to any signed document) --digsig James A. Donald 6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG CK7qsZEkDlKWk1tmxpi8TmOY5r7pCmwM+xlgxk5x 4pFtHUXCAe4Hr1r3Zj40b35HrJbyCKusv0OUOt/Yo --------------------------------------------------------------------- We have the right to defend ourselves and our property, because of the kind of animals that we are. True law derives from this right, not from the arbitrary power of the state. http://www.jim.com/jamesd/ From jkwilli2 at unity.ncsu.edu Sat Feb 14 01:19:44 1998 From: jkwilli2 at unity.ncsu.edu (Ken Williams) Date: Sat, 14 Feb 1998 01:19:44 -0800 (PST) Subject: Microsoft says it's spying on you.... Message-ID: "Microsoft says it's spying on you with only the purest of intentions. At least for now..." http://www.mojones.com/mother_jones/JF98/blow.html TATTOOMAN From jkwilli2 at unity.ncsu.edu Sat Feb 14 01:27:34 1998 From: jkwilli2 at unity.ncsu.edu (Ken Williams) Date: Sat, 14 Feb 1998 01:27:34 -0800 (PST) Subject: Letter of the law In-Reply-To: Message-ID: On Fri, 13 Feb 1998, Anonymous wrote: >>I'm in El Paso Texas... so close to the border >>I can see Old Mex outside my window as I write this.. >>I'm over there nearly every day for lunch ( I actually >>walk there from my house it's so close) If I write >>a crypto program on my laptop over there and ftp >>it to a web page I have on a server outside the US >>will I have avoided the foolish export regs?? >>Does anyone know of someone trying this before?? > >My guess is this: > if it has the name of a US citizen in the copyright >notice, it will be assumed to have been made in the >US. if the morons even go after you. you still may have >a plausable excuse if ever taken to court. >after all, you "exported" youself, which is a perfectly >legal thing to take out of the country, and "yourself" >accidentally spewed a copy of something that couldn't >cross the border. >I don't think anybody has tried this and been challenged. >then again, a lot of us don't have the opportunity. >It's easier to ask forgivness than permission... >Another easier excuse would be to publish it freely in >hardcopy form, and just "happen" to have somebody end up >"typing" in your source code abroad, making a legit >international copy... >-Anon2 i would think that the big question here, legally, is whether or not you would be ustilizing a US ISP and/or cellular provider to make the upload of the crypto program to the foreign server via ftp. as long as all the packets stay outside of US borders, in other words, as long as you don't use a US ISP and cellular provider, then i don't see how you would be violating any laws in this case. Regards, TATTOOMAN http://152.7.11.38/~tattooman/ From eureka at eureka.abc-web.com Sat Feb 14 03:24:08 1998 From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com) Date: Sat, 14 Feb 1998 03:24:08 -0800 (PST) Subject: Eureka! Sat Feb 14 '98 Message-ID: <19980214083435.28655.qmail@eureka.abc-web.com> Welcome to Saturday's issue of Eureka! PINKBITS Voted the #1 Teen (18+) site on the web, this is one pay site you don't want to miss out on! Here's just one quote from a satisfied member: "This site delivers awesome value. I have been a member of 3 other sites, and this is the best by far. It has the best pics, more live video, younger girls and more hardcore cumshots than the other sites put tog- ether". And we have negotiated a special FREE trial member- ship for Eureka subscribers, so don't take our word, go see! PinkBits .. http://207.33.10.198/cgi-bin/gate1/pbm/pb_0024/0 Amazing Teen Cocksuckers http://pandobox.com Memberships include,40,000 jpg pix,over 300 live hardcore feeds, monthly interactive porn magazine, 1 gig of movies clips, 300 sexy stories and x-rated games to play offline. INDEX OF PRETTY MODELS Pussy packed free picture website of the Asian persuasian! Until you can take that trip to the Orient you have always wanted to. Click below for a starter. Hot looking young women with thick dark eastern pussy and sweet little tits! Index ................... http://www.pblife.com/gc/home3.htm HAMADA'S PHOTO GALLERY You have it all with Eureka! And keeping that in mind and because it has been requested by many of you here is a more artistic Asian website. Click the nude room then nude vol 6 for the good stuff. Sweet dark oriental pussy, free for us! Hamada's ............ http://www.cup.com/hamada/HPG/HPG.html KIMSPAGE Oh yes we do like Kim. She is an exhibitionist. Check out her pics. You will not be sorry! Perhaps the largest pics on the internet today 1080x867 !!! Her pussy jumps out of your computer monitor and excites! Look now I dare you to. Guess what! I almost forgot she has six free video clips! Kimspage ................ http://www.kimspage.com/start.html TEASING TERRI One hot little tramp! Or maybe a vamp? This brunette has a super body and she shares it with the world on her very website. You have got to see her tits, ass and tight little pussy. Click on free stuff to see her pix and there are also some videos! Score one for the amateur teen, Terri! This is some of the hottest free video clip action out there! Teasing .......... http://www.microrave.com/tease/start.html READ THIS!! WIN $25,000 and a Fantasy Date - Click Here Now! $25,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A HOORAY! THE ADULT SEARCH ENGINE Now you can search for the sex sites you are looking for and fast! This new search engine is setting the standard others will follow. It offers pop-up search and detailed listings! Hooray! -----------------> http://eureka.abc-web.com/hooray/ FREE STREAMING VIDEO Please note that most of these feeds require a Netscape bro- wser in order to successfully view them. Unfortunately Micr- osoft's browser does not have all the features of Netscape's yet. However, many of the feeds use the RealPlayer and will work in most browsers. If you do not have Netscape and want a free copy click here --> http://www.netscape.com/download/ 6 RealVideo ----> http://www.sexhost.net/dagwood/index2.html CHAT WITH OTHER READERS Hey, if you haven't checked out the Eureka! Chat sites yet, you're missing out on some great stuff. Every day you'll find hundreds of other readers just like you looking to chat have fun and maybe a little 'cyber'. We know you'll love it! Adult/Sex Chat -----------------> http://137.39.63.229/chat/ General/Fun Chat -------> http://137.39.63.229/chat/funchat/ HOT LIVE PHONE SEX TO MAKE YOU CUM! LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912 LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779 FREE: Live 1-on-1 (international call only)--->011-678-77416 NEW! CENTERFOLD PIC OF THE DAY Exclusive! We proudly present unpublished Pictures of your favorite Centerfolds. Featured This Week: Dec 80-PMOY Terri Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri Kendall, Rebecca Ferratti, Lydia Schone and many more too! ---------------------------> http://www.gatefold.com/eureka/ AMATEUR SITE OF THE DAY Jessica: The ultimate hard body, big titted blonde!! We have 2 words that immediately come to mind when looking at this luscious babe "YUM YUM" She looks good enough to eat! She loves to dance, and loves men who are nasty! Nothing turns her on in bed like a man that whispers dirty thoughts into her ear! Stop by and view a little piece of heaven! ---------------------------> http://amateurindex.com/eureka/ EROTIC STORY SITE OF THE DAY WifeSluts.com: An incredible selection of true, reader submitted sex stories detailing the private sexcapades of real slut wives. A wide selection of submitted wife slut XXX pics too! ........................ http://www.wifesluts.com/ DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/ ADULT STAR PIC OF THE DAY Woah, our Adult Star pics are getting hotter and hotter, so make sure you stop by and check out today's - definitely not to be missed! --------> http://www.xxxadultstars.com/eureka/ OTHER EUREKAS! GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/ DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm ESPA�OL ------> http://eureka.abc-web.com/eureka/espanol.htm FRAN�AIS ----> http://eureka.abc-web.com/eureka/francais.htm ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm TODAY'S FREE PIX Pic 1 --------------------------> http://137.39.63.229/?140 Pic 2 --------------------------> http://137.39.63.229/?141 Pic 3 --------------------------> http://137.39.63.229/?142 Pic 4 --------------------------> http://137.39.63.229/?143 Pic 5 --------------------------> http://137.39.63.229/?144 Pic 6 --------------------------> http://137.39.63.229/?145 Pic 7 --------------------------> http://137.39.63.229/?146 Pic 8 --------------------------> http://137.39.63.229/?147 Pic 9 --------------------------> http://137.39.63.229/?148 Pic 10 --------------------------> http://137.39.63.229/?149 ============================================================ TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US. ============================================================ From guy at panix.com Sat Feb 14 03:26:53 1998 From: guy at panix.com (Information Security) Date: Sat, 14 Feb 1998 03:26:53 -0800 (PST) Subject: Cypherpunk Policeman? Message-ID: <199802141126.GAA12507@panix2.panix.com> > From attila at hun.org Sat Feb 14 03:53:19 1998 > To: Information Security , > cypherpunks > Cc: listproc > Subject: Bye, Bye, Guy [was The Doctor has been spanked!!!] > X-Comment: Cyberspace is Our Freedom! Your CDA is Dead! > > -----BEGIN PGP SIGNED MESSAGE----- > > well, I hope you're real proud of yourself for being the > new cypherpunk policeman. It had nothing to do with the cypherpunks per se, and the majority of the documentation was from Usenet. > ...just like we're all real > proud to know a true snitch who thinks his dirty hands > are bright white and his deeds are pure as the driven > snow while he censors free speech. Huh? I'm just a pissed-off white guy. And what makes you think Vulis will not continue to post to the list? You clearly HAVE NO IDEA WHAT JUST HAPPENED. Comeback when you figure out the complexities of feedback. > John Gilmore tried to be the censor last year.... Information Security has no idea why the list owner didn't succeed. Detweiler my ass. > Pat Buchannan and ol' Senator Exon will surely be happy > to see you. Buchannan can bite me, and Exon was an old fart who never used the Internet, yet proposed CDA as the law of the land. > dont forget F{reeh,uck} is counting on your > vote for mandatory GAK and KRAP. Louis Freeh has the morals of a styrofoam cup, and GAK will happen over my dead body. You've obviously never read my CM. ---- PSINet terminated Vulis for stalking, which I documented he did to a minimum of four people. It took me three traffic analysis reports to convince them. "Fire One" was a success. ---guy KRAP? key recovery and poopies? > > I figured anyone active in cp would know how to filter, > or at least know where the delete key is on his > keyboard; but, on the hand, maybe I should not expect > so much from some of the posters with proven first > amendment ignorance and intolerance. > > you really gotta blow it out, to make my filter to the > great bit bucket in fiery brimstone --you did. > > > on or about 980213:1701, in <199802132201.RAA11745 at panix2.panix.com>, > Information Security was purported to have > expostulated to perpetuate an opinion: > > >As of 1pm today: > > ># Guy, > ># > ># Thank you for the supporting documentation you've provided. # > ># Dr. Dimitry V's PSINet service has been terminated. > > >...he called one person too many a 'pedophile'. > >---guy > > > -----BEGIN PGP SIGNATURE----- > Version: 2.6.3i > Charset: latin1 > Comment: No safety this side of the grave. Never was; never will be > > iQBVAwUBNOVa/LR8UA6T6u61AQHkMQH+OXg9mdu967ZX98RFLC0L2SvKgafFZliW > s4OtdIjj9SRvizeBhesto7IRRtY5v/SXMAJDhLM9KuCP7eShtc0HzQ== > =RFDZ > -----END PGP SIGNATURE----- > > From 42197929 at ix.netcom.com Sat Feb 14 05:29:45 1998 From: 42197929 at ix.netcom.com (42197929 at ix.netcom.com) Date: Sat, 14 Feb 1998 05:29:45 -0800 (PST) Subject: Pharmaceutical, Biotech, & Laboratory Companies Message-ID: <> Pharmaceutical, Biotech, & Laboratories throughout the world use lyophilization (freeze-drying) equipment for preservation, concentration, and product development concepts. Until now the costs to employ this technology have been extremely high and operation has been complicated. Ultra-Dry freeze-dryers are cost efficient, user friendly, portable and affordable. These freeze-dryers are the answer to your needs from simple drying requirements to sterile product development, packaging and validation. If this information is applicable to another department in your organization please forward. Explore the possibilities and click here at http://www.freezedry.com/html/upage1.html From 42197929 at ix.netcom.com Sat Feb 14 05:29:45 1998 From: 42197929 at ix.netcom.com (42197929 at ix.netcom.com) Date: Sat, 14 Feb 1998 05:29:45 -0800 (PST) Subject: Pharmaceutical, Biotech, & Laboratory Companies Message-ID: <> Pharmaceutical, Biotech, & Laboratories throughout the world use lyophilization (freeze-drying) equipment for preservation, concentration, and product development concepts. Until now the costs to employ this technology have been extremely high and operation has been complicated. Ultra-Dry freeze-dryers are cost efficient, user friendly, portable and affordable. These freeze-dryers are the answer to your needs from simple drying requirements to sterile product development, packaging and validation. If this information is applicable to another department in your organization please forward. Explore the possibilities and click here at http://www.freezedry.com/html/upage1.html From sherman at cs.umbc.edu Sat Feb 14 09:44:27 1998 From: sherman at cs.umbc.edu (Dr. Alan Sherman) Date: Sat, 14 Feb 1998 09:44:27 -0800 (PST) Subject: Barry Smith (FBI) to speak on encryption policy at UMBC Message-ID: The UMBC Security Technology Research Group presents A Law-Enforcement Perspective on Encryption Policy Barry Smith Supervisory Special Agent, FBI moderated by journalist Peter Wayner 3:30pm - 5:00pm Friday, March 6, 1998 Lecture Hall III University of Maryland, Baltimore County http://www.cs.umbc.edu/events/spring98/crypto.shtml The second lecture and discussion in a two-part forum on encryption policy. Journalist Peter Wayner will introduce and moderate the event, which is free and open to the public. In Part I, freedom activist John Gilmore and Fritz Fielding (Ex-Associate General Councel, NSA) gave their divergent views, focusing on the Burnstein case. Barry Smith will articulate the needs of law enforcement to conduct lawful wiretaps; he will advocate the use of key-recovery techniques to achieve this end as a way that provides adequate privacy to law-abiding citizens. Schedule: The event will begin with a brief (10 minute) introduction by Peter Wayner. Following Barry Smith's talk, which will last approximately 45 minutes, there will be an opportunity to ask questions for approximately 20-30 minutes. Questions: Attendees are encouraged to ask questions in advance by sending email to sherman at cs.umbc.edu Directions: Take Exit #47B off interstate I-95 and follow signs to UMBC. LH III is in the Administration Building, adjacent visitor's parking lot near the I-95 entrance to UMBC. Host: Dr. Alan T. Sherman Associate Professor, Computer Science sherman at cs.umbc.edu http://www.umbc.edu (410) 455-2666 This event is held in cooperation with the UMBC Intellectual Sports Council Honors College Phi Beta Kappa honors society CMSC Council of Majors IFSM Council of Majors From Ah1261 at aol.com Sat Feb 14 13:23:23 1998 From: Ah1261 at aol.com (Ah1261 at aol.com) Date: Sat, 14 Feb 1998 13:23:23 -0800 (PST) Subject: crackers Message-ID: I WOULD LIKE SOME INFO ON PASSWORD CRACKERS EMAIL ME BACK A.S.A.P. From moneyman at tagentp.com Sat Feb 14 14:20:12 1998 From: moneyman at tagentp.com (moneyman at tagentp.com) Date: Sat, 14 Feb 1998 14:20:12 -0800 (PST) Subject: !!!!!! ATTENTION !!!!! Message-ID: <199802140751.CAA19986@tagentp.com> /////////////////////////////////////////////////////////////////////////////// This Message was Composed using Extractor Pro Bulk E- Mail Software. If you wish to be removed from this advertiser's future mailings, please reply with the subject "Remove" and this software will automatically block you from their future mailings. //////////////////////////////////////////////////////////////////////////////// From tanner at nersp.nerdc.ufl.edu Sat Feb 14 19:56:07 1998 From: tanner at nersp.nerdc.ufl.edu (Michael Tanner) Date: Sat, 14 Feb 1998 19:56:07 -0800 (PST) Subject: Seeking Paper Submissions Message-ID: <1.5.4.32.19980215035640.006bcb5c@nersp.nerdc.ufl.edu> The Journal of Technology Law & Policy an online journal devoted to the discussion of the legal issues concerning technology is requesting article submissions for our upcomming issue. We invite anyone who has an article of original work discussing a legal issue which pertians to any aspect of high-technology (communciation technology, copyright, trademark, patent, software, y2k conerns, internet issues) to submit the article for consideration for publication in our journal. Relevant graphics audio and video may be utilized. There is no length limitations for submissions. All citations should conform to The Bluebook: A Uniform System of Citation 16th. ed. Please include the URL of any cited information available online. Interested writers should send 2 hard copys of thier article as well as a digitized copy in either Wordperfect 6.1 or MS Word 97 format to the following address: Journal of Technology Law and Policy University of Florida College of Law PO Box 117640 Gainesville, FL 32611-7640 USA If you have any questions please feel free to contact us at (352)392-0261. >> > From toto at sk.sympatico.ca Sat Feb 14 22:24:41 1998 From: toto at sk.sympatico.ca (Toto) Date: Sat, 14 Feb 1998 22:24:41 -0800 (PST) Subject: Space Aliens Hide My Drugs / Prologue (1/0) Message-ID: <3.0.5.16.19980214232237.3d37b8ec@mailhost.sk.sympatico.ca> ____________________________________ SPACE ALIENS HIDE MY DRUGS !!!???!!! ____________________________________ by The Author Copyright 2000, The Lost Planet Airmen PROLOGUE: -------- I was very young as a dark and stormy Knight... [Author's Note: This part of the prologue is numbered 1-of-0 because there is, in reality, no telling how long, wide and far I may or may not ramble in telling a tale which lies deep inside of me and cries out to be told, despite the rapid degeneration of what little is left of my nervous system, my brain function, and my sanity in general. As well, after a lifetime of using an overwhelming excess of commas in my sagacious scribblings and blitheful blatherings, I am well aware that commas do not grow on trees (except for cherry trees, and they are upside down--thus of no use to a scribe such as myself) and that this account of tales untold since the beginning of time (1949, in my universe) may well end in mid-sentence when I have used the last of the commas that I have purloined, stolen and hoarded, over the years, is removed from my secret hiding place and placed on the written page. Hopefully, before this has come to pass, I will have managed to reveal all of the myriad of universal secrets which have remained hidden in plain sight of us all (particularly George Carlin), since the founding of the universe, and the final comma that marks the end of my wisdom will mark the beginning of a new universal ignorance, in which all shall finally know that there *is*no* knowledge*, and that "The ClueServer died for our sins".] The Death of gomez and the Birth of Magical Thinking: I am the Prophet... It's not something I'm proud of, and I in no way planned for things to turn out this way, but the role of Unerring Prophet of the Future of All Mankind was forced on me by circumstances beyond my control. Originally, I was just trying to be a brain-warped, cynical asshole--doing my best to stir up shit, cause trouble, spreadFear/Uncertainty/Disinformation to the best of my ability, and maintain a conscientiously applied plan of good oral hygene. ("Thank you. I'm feeling much better, now.) I've been crazy all of my life, having suffered serious brain injury as a child, and compounding this natural disaster by a willful ingestion of a variety of legal and illegal substances designed to enrich pharmacists and people with dark skin tones who spend much of their time on dimly-lit street corners. There are those who read my apparently mad ramblings and assume that I am some kind of creative writing genius heavily influenced by Hunter S. Thompson, Carlos Castenada, Stephen King and William Burrogh's Jr. They are wrong. As gomez himself said, before being removed as the eternal symbol of the true Digerati, the Circle of Eunuchs, "We don't make it up, we just make it better." Thus, when I describe the series of ElectroShock treatments that I underwent under the care of Dr. Abram Hoffer (the Father of Megavitamin Therapy), and describe them as taking place at the exact same moment as the massive power blackouts throughout the NorthEastern United States and Canada, the details I provide may not be accurate within the time-space continuum, but they will be totally consistent with the Ultimate and Eternal Truth as evidenced by the True Measure of Reality--the electrical bill from SaskPower Corporation that was presented to Central Hospital in Saskatoon, Saskatchewan, which ultimately resulted in the restructuring of the Saskatchewan MediCare system, and the loss of many lives that could have otherwise been saved if the medical profession had not deemed it necessary to store within my brain enough electricity to create a thousand FrankenSteins, or power the bright lights of Las Vegas for a hundred years, in the case of an emergency. Hyperbole? Guess again, shit-for-brains... Anyone who has read "The News of the Weird" by Chuck Shephard can vouch for the fact that the crap that backs up in my demented brain cells, until it spills out like a toxic efflusive onto the written page, could not carry the jock-strap of the events which happen every day, in real life, far removed from the short- circuting electrical malfunctions spewing forth from my damaged brain synapses. I am the Prophet... I am a certified lunatic bouncing wildly back and forth between reality and rational thought <--> magical thinking fueled by messages from Mars which I receive hourly via the silver fillings in my decaying dentures <--> logical assumptions based on the patterns formed by rat-droppings I use to encrypt my writings with the same algorithms used as the basis for C2Net's Stonghold encryption software. In all honesty, I have to admit that I was lying when I presented myself to WebWorld at large as the TruthMonger. But, "The best laid plans of rats and men..." My poor self-image, my low self-esteem, and the knowledge that I had come by them honestly, drove me to a state where I was determined to live out my life as a lying, thieving, conniving, rat-bastard-piece-of-shit who would crap on and distort the truth about everything that normal, decent people hold sacred in their lives. So I used my computer skills, my limitless supply of amphetamines, and my powers of obsessive-compulsive, psychotic fixation to rail madly against the surrounding hordes of men and women of reason who strove to suffocate the madness that I was destined from birth to manifest on the long and twisted road which would ultimately lead to my emergence as the Anti-Christ who would raze the complete face of the earth with violent spasms of death and destruction the likes of which the universe has never seen. "It's life's illusions I recall...I really don't know life, at all." ~Joni Mitchell "All my lies are true...and everything I do, I really am." ~Carroll "Some say he's good...some say he's great...some just say, 'It's a *shame* about that boy.'" ~Sonny King, introducing C.J.Parker, the King of Country Porno, at Club Foot in Austin, Texas, at a benefit for Xalapeno Charlie. In the end, I reached spiritual enlightenment through the realization that Satan, the Evil One, the Anti-Christ, Bill Gates, Louis Freeh, Janet Reno, can never hope to even remotely approach the depths of depravity, outrageous licentiousness and lunacy, or sick and twisted dementia exhibited daily by the average Jane and Joe smiling at us from the other side of the bank manager's desk, or the check-out counter at the local K-Mart. No matter how depraved the sick, demented spewings from my evil mind became, attempting to poison the minds of all who came into contact with my evil, satanic blatherings, masquerading as a true mirror of the reality that surrounds us--in the end, I was, am, and will continue to be...TruthMonger. I am the Prophet... If my sick, twisted mind concocts some bizarre, depraved fantasy about Lisa Bonet Ramsey's rotting carcass rising from a roadside ditch to plug parking meters and being flown by the Cincinnati Police Department to New York City to carry out Judge Ito's sentence of having a toilet plunger shoved up her ass, then one of two things will happen. Either CNN will break the story, exactly as I have described it, minutes before my missive shows up on the InterNet, or I will receive the lastest email version of "News of the Weird,"l from SaskPower Corporation that was presented to Central Hospital in Saskatoon, Saskatchewan, which ultimately resulted in the restructuring of the Saskatchewan MediCare system, and the loss of many lives that could have otherwise been saved if the med as standing at the bleeding edge of the burdgeoning computer technology which is rapidly changing the face of our planet and the governmental, civil, and social societies encompassed within this celestial orb. Harbingers of the Digital Future / Pioneers of Future Technology / etc., etc. Bullshit... The CypherPunks are rag-tag band of infantile, pseudo-anarchistic, pseudo- cryptic, well-educated shit-disturbers who take great pleasure in pissing on themselves, each other, and the world around them--all the while, covering their motivations and ambitions with high-sounding ideals intended to disguise the fact that none of them ever received proper toilet-training. The end result? No matter how high they pile it, how far they spread it, or how badly it smells when you step in it, they end up coming off as the Henry Kissinger's of CyberSpace, because no matter how much rotten meat, jalapenos and moldy cheese they eat, they can never manage to crap out anything so vile and foul- smelling that the world-at-large cannot prove prophetic in MeatSpace. Question for Blanc Weber (CypherPunks version of the Sweetheart of the Rodeo): Yes, Blanc, I am the one who was hiding in the bushes near the gravesites when you were laying the wreaths in honor of Mother Teresa and the children who were the 'victims' of the Oklahoma Federal Building bombing. Yes, that was me who was whistling the eerie medely of "Psycho Killer" and "Street Fighting Man" while you were busy trying to honor the souls of the 'innocents' who died for the sin of being born. Realizing that we are polar-opposites, I am willing to concede that perhaps Eternal Truth, True Justice and A Noble Ideal To Be Named Later might best be served if you and I met in the middle and acted in concert to do what must inevitably be done to balance the distorted energy of the Tao which is currently tearing our planet, our socities and our individuals to pieces. I am ready now...when will you be ready? I am ready to walk into Luby's cafeteria today, and start blowing away people I know and total strangers, for no real fucking reason, just to stop the voices inside my head which scream such things as "Wake Up America"/"What the Fuck are We all Doing to One Another"/"When will the Madness STOP!!!" When will you be ready? I am ready to kidnap men, women and children who are federal employees, or related to them, or who sent them Christmas cards, or who failed to punch their fucking lights out when they fucked over those they are supposed to 'serve' because of some obscure legal technicality passed by drunken, syphlittic politicians in a previous century. I am ready to transport them to the site of the OKC bombing in numbers amounting to hundreds of times of McVeigh's victims, bombing their innocent souls into oblivion, in the hope that someone, somewhere, will look into the eyes of the psychotic, deranged madman that I have become, and see themself, and their neighbors, desperately trying to maintain the illusion that their hands are free of blood when foreign children die as a result of embargos placed within the imaginary political lines which define our MeatSpace Reality--embargos placed by those that they themselves voted for in return for the promise that *their* children, on the 'good' side of the imaginary line, would be provided with good nutrition and a sound future, unless, of course, they live in one of the poorer states, or America needs a larger military budget to defend the most powerful military nation in the world from some flea on the ass of an Iranian camel. Blanc, when will *you* be ready? I am ready, today, to gun down a woman carrying a baby, killing them both, and justifying my actions by claiming I thought she was a Somalian warlord--I am ready to drive a tank to MicroSoft Corporate Headquarters and raze it to the ground, killing men, women and children in a violent cataclysm of smoke and flames, justifying it with claims that MicroSoft cult members are all gun-hoarding child-molesters who think Bill Gates is Jesus. When will you be ready...? The optomist says that the human soul is half full. The pessimist says that the human soul is half empty. The realist says, "Kill 'em all, and let God sort them out." Tim May says, "Broken eggs, and all that." I say, "The Revolution is NOW!" What do *you* say? Shall we set a date, sweetheart? [TBC] From nobody at REPLAY.COM Sat Feb 14 23:50:40 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sat, 14 Feb 1998 23:50:40 -0800 (PST) Subject: crackers In-Reply-To: Message-ID: <199802150750.IAA04662@basement.replay.com> On Sat, 14 Feb 1998 16:22:47 EST Ah1261 at aol.com wrote: >I WOULD LIKE SOME INFO ON PASSWORD CRACKERS EMAIL ME BACK A.S.A.P. I like them with some cheese, but you may not. You'll have to let us know if you like cheese or not. BTW those crackers you can get from Wal-Mart are better than password crackers IMHO Free lunch anyone? ;-) From guy at panix.com Sat Feb 14 23:56:06 1998 From: guy at panix.com (Information Security) Date: Sat, 14 Feb 1998 23:56:06 -0800 (PST) Subject: Consumer Biometric Privacy Protection Act of 1998 Message-ID: <199802150756.CAA29542@panix2.panix.com> http://www.zdnet.com/zdnn/content/zdnn/0213/285183.html [snip] Labeled the "Consumer Biometric Privacy Protection Act of 1998," the bill prohibits trafficking in biometric databases, mandates increased security for storing such data, and prevents businesses from recording data for biometric identification without the owner's consent. The bill also increases the severity of identity theft, from a misdemeanor to a felony. "How would you like your fingerprints to be sold over the Internet?" [snip] "[Biometric] identifiers [have the potential] to provide an efficient, unintrusive, and accurate means of identifying consumers in a variety of commercial and government applications," said the text of the bill. [snip] A massive proliferation of "fingertip scanning" products... http://www.zdnet.com/zdnn/content/pcwk/1505/279078.html In separate efforts to strengthen the rapidly evolving biometric industry, vendors and industry groups have announced three separate biometric APIs, each proposed as "the standard API" for biometric application development. Now the real work begins, as developers, users, industry associations, manufacturing interests and government agencies express their opinions on which to back or on how to roll them into one. [snip] The National Registry Inc. (www.nrid.com) was the first to unveil a universal standard, dubbed HA-API, although IBM had announced its coming API previously. NRI developed HA-API as an initiative for the U.S. Department of Defense. The outcome is a high-level umbrella for any biometric technology, although the specification currently supports only the Win32 environment. NRI has demonstrated HA-API's capability by implementing it in its line of fingertip scanning products, as well as in Keyware Technologies Inc.'s Voice Guardian speaker verification product. [snip] From eureka at eureka.abc-web.com Sun Feb 15 01:48:31 1998 From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com) Date: Sun, 15 Feb 1998 01:48:31 -0800 (PST) Subject: Eureka! Sun Feb 15 '98 Message-ID: <19980215081715.18977.qmail@eureka.abc-web.com> Welcome to Sunday's issue of Eureka! PUSSY PARADISE Yet again Eureka! has managed to negotiate a special week's free access to one of the web' s premier porn sites. Pussy Paradise is simply packed with 100s of videos (many live), thousands of photos, and so much more. You will need your credit card as adult verification but it will not be charged for your free week! So check it out - there's smut a plenty! Pussy Paradise .... http://www.pussyparadise.com/eureka.html SINFUL'S 20 FREE XXX PICS http://www.sinful.net/cgi-bin/topvlog.cgi?eureka 20 FREE HARDCORE, CUMSHOT, GROUPSEX, AND FREE ANALSEX PHOTOS UPDATED WEEKLY PLUS LINKS TO 700+ FREE ADULT PICTURE SITES. CATEGORIES INCLUDE: ASIAN, HARDCORE, SOFTCORE, BABES, AND PIC LINKS. YOU GET ALL OF THIS FOR FREE!! VISIT US NOW!! NAUGHTY NEIGHBOR Make a quick pit stop here for some great free pix of one hot neighbor! She rolls several free video clips. Get them and see her rub her major pussy lips. That is my kind of neighbor! Naughty Neighbor ........... http://www.naughtyneighbor.com/ ANNIE'S WEB PAGE This site features a blonde with great tits. We like this combination! There are several free images and even some free video clips! One features a great scene of her playing with here breasts! A definite download here guys! Nipples! Annie's Web .................. http://www.webeweb.net/annie/ AMY'S PAGE Is this Babewatch or what? yet another hot little blonde vixen for us to see. Tight ass, great tits and a pussy that yells out, come screw me! You have to see her free movies! Amy's Page ............. http://www.amysplace.com/start.html MY NAKED GIRLFRIEND You more artistic types will enjoy this website. It features dark art nude type photos. Slave and master fans will like her very tight and painful looking nipple clams. Ouch, ouch! My ......... http://web0.tiac.net/users/dimitrip/nakedgf.htm READ THIS!! WIN $25,000 and a Fantasy Date - Click Here Now! $25,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A HOORAY! THE ADULT SEARCH ENGINE Now you can search for the sex sites you are looking for and fast! This new search engine is setting the standard others will follow. It offers pop-up search and detailed listings! Hooray! -----------------> http://eureka.abc-web.com/hooray/ FREE STREAMING VIDEO Please note that most of these feeds require a Netscape bro- wser in order to successfully view them. Unfortunately Micr- osoft's browser does not have all the features of Netscape's yet. However, many of the feeds use the RealPlayer and will work in most browsers. If you do not have Netscape and want a free copy click here --> http://www.netscape.com/download/ 5 90min -> http://www.spreadteens.com/ian/hardcorevideo.html CHAT WITH OTHER READERS Hey, if you haven't checked out the Eureka! Chat sites yet, you're missing out on some great stuff. Every day you'll find hundreds of other readers just like you looking to chat have fun and maybe a little 'cyber'. We know you'll love it! Adult/Sex Chat -----------------> http://137.39.63.229/chat/ General/Fun Chat -------> http://137.39.63.229/chat/funchat/ HOT LIVE PHONE SEX TO MAKE YOU CUM! LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912 LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779 FREE: Live 1-on-1 (international call only)--->011-678-77416 NEW! CENTERFOLD PIC OF THE DAY Exclusive! We proudly present unpublished Pictures of your favorite Centerfolds. Featured This Week: Dec 80-PMOY Terri Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri Kendall, Rebecca Ferratti, Lydia Schone and many more too! ---------------------------> http://www.gatefold.com/eureka/ AMATEUR SITE OF THE DAY Ally: This blonde football fan lost a bet on the Packers for Super Bowl XXXII, so she is not only becoming a Dallas Cowboy fan but is also getting buck naked for everyone to see. She is quite a looker and her photographs are very high quality. So strap on your helmet and blitz her site now! ---------------------------> http://amateurindex.com/eureka/ EROTIC STORY SITE OF THE DAY StinkyBoy's Sex Stories: Stinky gives you a fresh selection of sex stories in 3 nasty categories: Gang Bangs, Lesbians, and B & D. ............... http://www.stinkyboy.com/stories/ DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/ ADULT STAR PIC OF THE DAY Woah, our Adult Star pics are getting hotter and hotter, so make sure you stop by and check out today's - definitely not to be missed! --------> http://www.xxxadultstars.com/eureka/ OTHER EUREKAS! GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/ DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm ESPA�OL ------> http://eureka.abc-web.com/eureka/espanol.htm FRAN�AIS ----> http://eureka.abc-web.com/eureka/francais.htm ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm TODAY'S FREE PIX Pic 1 --------------------------> http://137.39.63.229/?150 Pic 2 --------------------------> http://137.39.63.229/?151 Pic 3 --------------------------> http://137.39.63.229/?152 Pic 4 --------------------------> http://137.39.63.229/?153 Pic 5 --------------------------> http://137.39.63.229/?154 Pic 6 --------------------------> http://137.39.63.229/?155 Pic 7 --------------------------> http://137.39.63.229/?156 Pic 8 --------------------------> http://137.39.63.229/?157 Pic 9 --------------------------> http://137.39.63.229/?158 Pic 10 --------------------------> http://137.39.63.229/?159 ============================================================ TO UNSUBSCRIBE FROM THIS NEWSLETTER, USE THE REPLY FUNCTION IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US. ============================================================ From mfc at daltek.net Sun Feb 15 02:21:19 1998 From: mfc at daltek.net (mfc at daltek.net) Date: Sun, 15 Feb 1998 02:21:19 -0800 (PST) Subject: Can't Find Your Site? Message-ID: <199802151002.FAA02448@apollo.redcomet.net> * * * * You have been carefully selected to receive the following as a person obviously interested in this subject based upon your previous internet postings, or visits to one of our affiliate web sites. If you have received this message in error, please accept our apology as a responsible e-mailer, and reply with the word REMOVE in the subject line. You will be automatically excluded from future e-mailings. Thank you for your consideration and help in making the Internet spam-free. ***** Does anyone really know where your site is? Can you be found on the top search engines? Go to http://guide-p.infoseek.com/ and type in your business type and your geographical location. Do you show up in the top ten listings? If not, potential clients will never find you. We can guarantee that you get listed in the top ten. We can get you listed in the top ten on all the major search engines. But right now we are offering a "get to know us discount" on Infoseek. Infoseek was visited by 11.7 million users in January of 1998. We have chosen infoseek for this special offer based on its popularity and the fact that it immediately inputs sites into its database. We will GUARANTEE a top ten ranking within 7 days!! Millions of potential clients search for businesses on Infoseek each month. How many clients have you already lost? How much money have you spent on your website with no return? Your website is literally (and financially) dying to be seen. We usually charge $300 for a guaranteed top twenty ranking. Through March 1st we are only charging $150 and we will GUARANTEE A TOP TEN RANKING based on your business type and your geographic location!! To contact us call (603)773-5904 or reply to this email with a phone number. You may also reply to this email with "Make us visible" in the subject line for more information. From rah at shipwright.com Sun Feb 15 05:27:40 1998 From: rah at shipwright.com (Robert Hettinga) Date: Sun, 15 Feb 1998 05:27:40 -0800 (PST) Subject: DCSB: Joseph Reagle; Meta-data and Negotiation in Digital Commerce Message-ID: --- begin forwarded text X-Sender: rah at pop.sneaker.net Mime-Version: 1.0 Date: Sat, 14 Feb 1998 11:02:37 -0500 To: dcsb at ai.mit.edu, dcsb-announce at ai.mit.edu From: Robert Hettinga Subject: DCSB: Joseph Reagle; Meta-data and Negotiation in Digital Commerce Cc: "Joseph M. Reagle Jr." , Adam Shostack , Jeremey Barrett Sender: bounce-dcsb at ai.mit.edu Precedence: bulk Reply-To: Robert Hettinga -----BEGIN PGP SIGNED MESSAGE----- The Digital Commerce Society of Boston Presents Joseph Reagle Jr. World Wide Web Consortium "Social Protocols": Meta-data and Negotiation in Digital Commerce Tuesday, March 3, 1997 12 - 2 PM The Downtown Harvard Club of Boston One Federal Street, Boston, MA On the foundations of basic network, meta-data, and negotiation protocols, a "new" set of protocols, "social protocols," are being built. They are in fact applications of meta-data and negotiation in order to mimic the social capabilities people have in the real world: capabilities to create rich content, make verifiable assertions, create agreements, and to develop and manage trust relationships. Furthermore, governments realize that a significant portion of their constituencies and markets are moving on-line. Consequently, as the sophistication of one's interactions on the Web increase through the development of social protocols, so does the regulators' interest in extending their "real world" mandates on commerce and culture to the Web. Mr. Reagle will detail the development of "social protocols" and their ability to create and maintain spontaneous, emergent, social structures versus their ability to propagate "real world" norms on the Web. Joseph Reagle Jr. joined the World Wide Web Consortium (W3C) at MIT in October of 1996 to focus on policy issues related to the development of global technologies and their relationship to social and legal structures. Specifically, how to promote "good" engineering when applied to a multifaceted and often contentious policy environment; one result of this activity is the W3C Statement on Policy. Mr. Reagle received a Computer Science degree from University of Maryland Baltimore County (UMBC) and continued on to the S.M. Technology and Policy program at the Massachusettes Institute of Technology (MIT). While at MIT he worked with the Research Program on Communication Policy on IPR, eCommerce, security, and cryptographic policy. During the summer of '95, he worked at Open Market on electronic commerce protocols. Before joining the W3C at the Laboratory for Computer Science (MIT), Mr. Reagle consulted on Internet and interactive media for McCann-Erickson, and Internet gambling for go-Digital. This meeting of the Digital Commerce Society of Boston will be held on Tuesday, March 3, 1997, from 12pm - 2pm at the Downtown Branch of the Harvard Club of Boston, on One Federal Street. The price for lunch is $32.50. This price includes lunch, room rental, various A/V hardware, and the speaker's lunch. ;-). The Harvard Club *does* have dress code: jackets and ties for men (and no sneakers or jeans), and "appropriate business attire" (whatever that means), for women. Fair warning: since we purchase these luncheons in advance, we will be unable to refund the price of your lunch if the Club finds you in violation of the dress code. We will attempt to record this meeting for sale on CD/R, and to put it on the web in RealAudio format, at some future date. We need to receive a company check, or money order, (or, if we *really* know you, a personal check) payable to "The Harvard Club of Boston", by Saturday, February 28th, or you won't be on the list for lunch. Checks payable to anyone else but The Harvard Club of Boston will have to be sent back. Checks should be sent to Robert Hettinga, 44 Farquhar Street, Boston, Massachusetts, 02131. Again, they *must* be made payable to "The Harvard Club of Boston", in the amount of $32.50. Please include your e-mail address, so that we can send you a confirmation If anyone has questions, or has a problem with these arrangements (We've had to work with glacial A/P departments more than once, for instance), please let us know via e-mail, and we'll see if we can work something out. Upcoming speakers for DCSB are: April Adam Shostack Digital Commerce Security: Beyond Firewalls May Jeremey Barrett Digital Bearer Certificate Protocols We are actively searching for future speakers. If you are in Boston on the first Tuesday of the month, and you would like to make a presentation to the Society, please send e-mail to the DCSB Program Commmittee, care of Robert Hettinga, . For more information about the Digital Commerce Society of Boston, send "info dcsb" in the body of a message to . If you want to subscribe to the DCSB e-mail list, send "subscribe dcsb" in the body of a message to . We look forward to seeing you there! Cheers, Robert Hettinga Moderator, The Digital Commerce Society of Boston -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.5.3 iQEVAwUBNOW/58UCGwxmWcHhAQG+Mgf/RRBnjaC5ir0QKuD8+tgNhhvdoi2ajZRk KgaBzsd0PDRx/3W2UJTuIR/pzMQBRKp0pstRVkTO74edyIHEWwbUcIvxCmQaCx69 NC2sDRiNDBDyGdfLHq4k7EoEE+I2KYl+bcXLJuIPHdBKpNbDZ9IPrs5z2S0gyc1I FPZkj+EjO8oNXXA9H9nqzjhF5aHvLv5XZrxvb08iLAMl6iepBQz7qdh619CPm7tu 2A8VD9G+46kGXN4SnjOjRUXgKnoQGMTs1TBdMWuse6qmipSMLxXVQXCvAOoD8VSc g3lI3EQB7mjX+P2nVchVYVUBfpxgYJsvtw5zqBBd3f1tpeLCeI29Sg== =Fzwi -----END PGP SIGNATURE----- ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ Ask me about FC98 in Anguilla!: For help on using this list (especially unsubscribing), send a message to "dcsb-request at ai.mit.edu" with one line of text: "help". --- end forwarded text ----------------- Robert Hettinga (rah at shipwright.com), Philodox e$, 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' The e$ Home Page: http://www.shipwright.com/ Ask me about FC98 in Anguilla!: From 15864623 at splittmail.com Sun Feb 15 06:04:56 1998 From: 15864623 at splittmail.com (15864623 at splittmail.com) Date: Sun, 15 Feb 1998 06:04:56 -0800 (PST) Subject: E-mail List Goldmine Message-ID: <199702005.GAA00805@ihia.com> ********************************************************** EUROPE, ASIA AND AUSTRALIA E-MAIL ADDRESS LIST FOR SALE ********************************************************* THE FIRST OF ITS KIND ON THE INTERNET! Expand your business WORLDWIDE! Using the Power of E-mail addresses. This is the first time on the Internet that you are being offered with this kind of opportunity. Do not confine yourself only in the North American region while you can reach the entire world by just a click! Would you like 9 Million Business e-mail address Delivered On CD? I thought so! Well now you can! Hi, My name is Timothy Perora. For over six months, my partner, Suchai T.Sinskul and I have been working to make the cleanest, most unique list available on the internet. This list was gathered from many different methods, but one important criteria was that the list only contains names of people living or working in Asia Europe and Australia. These people are affluent, middle class and upper white collar personnel or owners of various business operation. They're people who have high-buying power, more than 90% hold an international credit card and of course, they are familiar with buying or selling any product, services or any other opportunities overseas! We are now proud to present to you this list! The FRESHEST, CLEANEST list on the internet today! >>>>Answer these questions: * Are you tired of being BLOCKED by providers in the US? * Are you sick of UNDELIVERABLES? * Are you noticing a lowering response rate due to market saturation for people in the US? * Do you hate FLAMERS and REVENGE EMAIL BOMBERS? * Are you concerned about your reputation? * Do you want to sell and expand your offering to other people outside the US with the same cost as you're doing for people in your country? * ARE YOU JUST LOOKING FOR THE ANSWER? * ARE YOU GOING TO EXPAND AND OFFER YOUR PRODUCTS, SERVICES, BUSINESS OPPORTUNITIES AND MANY OTHERS TO THE HUGE, UNTAPPED PEOPLE WHO ARE EAGER TO JUMP INTO THE OPPORTUNITIES THEY'VE NEVER BEEN OFFERED BEFORE? Well, We have the solution. Here's what we have: 9 million e-mail addresses for people who live or work in Europe, Australia and Asian countries. These are included: 456,780 names for people in Hong Kong 367,845 names for people in Singapore 225,678 names for people in Thailand 643,601 names for people in Taiwan 2,120,680 names for people in Japan 345,670 names for people in Korea 1,321,650 names for people in Australia 1,256,789 names for people in United Kingdom 1,076,500 names for people in Germany 417,000 names for people in Netherlands 255,900 names for people in Sweden 345,000 names for people in France 134,231 names for people in Switzerland 175,640 names for people in Italy 128,090 names for people in Spain ********* 9,271,054 names for the whole list! YOU CAN BE ONE OF THE FIRST PEOPLE TO BENEFIT FROM THIS FRESHEST, HUGE, UNTAPPED LIST EVER-TO-BE! YOU'LL LOVE THE CRITERIA: * more than 95% deliverable, and you know what!, these people won't change their e-mail addresses as often as in the US! (In the US, any list that is more than 90 days will be outdated, more than 50% undeliverable!). You can keep this list for more than one year and still be able to make at least 90% deliverable! Yes, it's absolutely true, We guarantee with our strong words! ************************************************************************** AFTER ONE YEAR OF PURCHASE, IF THE LIST HAS MORE THAN 10% UNDELIVERABLES, JUST LET US KNOW, AND WE'LL REFUND THE MONEY TO YOU! ************************************************************************** This list is truly your invaluable goldmine. Profit from it time after time, year after year, people won't go away from their addresses. They're waiting to buy your products, services, opportunities or anything you're doing. What you need to add to your current offering is only the international shipping cost, Just check it out, then you can start promoting immediately! WHAT DOES THIS MEAN FOR YOU? + Expand your business to the huge, untapped part of the world without any additional cost + Less resources needed to process undeliverables and remove requests + Less complaints + Better reputation. + Much more positive responses per mailing + Much higher sales percentages + BIGGER PROFITS! HOW MUCH DO YOU GET, AND HOW MUCH DOES IT COST? If you are an experienced bulk emailer, then YOU KNOW THE VALUE OF GOOD ADDRESSES. If you are not an experienced bulk emailer, then you'll have to take our word for it... "THE FRESHEST VALID EMAIL ADDRESSES ARE PURE *GOLD*" Since sending email is so inexpensive, a good email list is all you need to reach your road to the entire world and make huge profit in the shortest time. You can easily generate thousands of dollars in business in a couple of days... Here's an offer to motivate you to act now... 7 DAYS INTRODUCTORY SPECIAL: If you order within 7 days, you will get the whole 9 million names on CD for a one time low cost of only $95! (from our normal price of $399). IS THERE ANY GUARANTEE? Yes, We guarantee: 1. the list is more than 95% deliverable at the time of purchase and 2. after one year of purchase, if the list has more than 10% undeliverables, just let us know, you'll get a full refund! The file is completely duplicate checked and formatted one email address per line. It is compatible with all of the popular bulk email programs. The list was arranged as per the domain name and country, so that it can save your mass e-mailing time. The following addreses also have been filtered: .mil, .gov, .edu, .org addresses postmaster addresses - postmaster@ webmaster addresses - webmaster@ So, don't wait. EXPAND YOUR BUSINESS TO THE WORLD now before your competitors do! Sincerely, Timothy Perora P.S. 1. Apart from the special introductory price, here's a Super Bonus for people who order within 7 days, 500,000 targeted e-mail addresses. These addresses are all in the US and guaranteed more than 90% deliverable and only targeted for Business Opportunity seekers. It's just only updated on Jan.25-30, 1998. This list will be yours for free! 2. This special price and the Super Bonus have a 7 day expiration limit. We'll only sell to a limited number of people to control saturation levels. Order now! ------------------------------------------------------------------------------ ORDER FORM: Please print out this order form and then fill in the blanks... _____ Yes! I am ordering within 7 days, please send my whole list of 9 million e-mail addresses on CD-ROM for the price of $95, and include a list of 500,000 targeted US e-mail address as a Super Bonus. Important Note: 1.Payment should be made by international Bank Draft, or American Express traveller Cheque (no personal checks/money order)...and made payable to: " Mr.Suchai Techavorasinskul " 2.By sending cash, Please make sure that cash be wrapped around with many fold of thick paper and sealed securely. (if possible,wrapped it with carbon paper). Use the private mail service such as UPS or Fedex to ensure fast delivery. Many of our clients use this method because they are not familiar with international banking process. 3.If you have any queries, please fax to our international office at : (66 2) 8870458 Please fill in the following information and send along with your payment to: _______________________________________________________________________ Mr. Timothy Perora 105/80 Puthamontol lane 2 road, Bangramard, Talingchan, Bangkok 10170, Thailand _______________________________________________________________________ DATE_________________________________________________________ YOUR NAME____________________________________________________ STREET ADDRESS_______________________________________________ CITY, STATE, ZIP_____________________________________________ PHONE NUMBERS________________________________________________ FAX NUMBERS__________________________________________________ EMAIL ADDRESSES______________________________________________ Your order will be shipped by first-class airmail. Please allow up to 4 weeks for the material to arrive at its destination. ------------------------------------------------------------------------------- From 103637.641 at compuserve.com Sun Feb 15 06:28:27 1998 From: 103637.641 at compuserve.com (Jay A. Tolkoff) Date: Sun, 15 Feb 1998 06:28:27 -0800 (PST) Subject: Space Alien CypherPunks / Uncorrupted / From Russia, With Love Message-ID: <199802150927_MC2-3361-2C5E@compuserve.com> ____________________________________ SPACE ALIENS HIDE MY DRUGS !!!???!!! ____________________________________ by The Author Copyright 2000, The Lost Planet Airmen PROLOGUE: -------- I was very young as a dark and stormy Knight... [Author's Note: This part of the prologue is numbered 1-of-0 because there is, in reality, no telling how long, wide and far I may or may not ramble in telling a tale which lies deep inside of me and cries out to be told, despite the rapid degeneration of what little is left of my nervous system, my brain function, and my sanity in general. As well, after a lifetime of using an overwhelming excess of commas in my sagacious scribblings and blitheful blatherings, I am well aware that commas do not grow on trees (except for cherry trees, and they are upside down--thus of no use to a scribe such as myself) and that this account of tales untold since the beginning of time (1949, in my universe) may well end in mid-sentence when I have used the last of the commas that I have purloined, stolen and hoarded, over the years, is removed from my secret hiding place and placed on the written page. Hopefully, before this has come to pass, I will have managed to reveal all of the myriad of universal secrets which have remained hidden in plain sight of us all (particularly George Carlin), since the founding of the universe, and the final comma that marks the end of my wisdom will mark the beginning of a new universal ignorance, in which all shall finally know that there *is*no* knowledge*, and that "The ClueServer died for our sins".] The Death of gomez and the Birth of Magical Thinking: I am the Prophet... It's not something I'm proud of, and I in no way planned for things to turn out this way, but the role of Unerring Prophet of the Future of All Mankind was forced on me by circumstances beyond my control. Originally, I was just trying to be a brain-warped, cynical asshole--doing my best to stir up shit, cause trouble, spreadFear/Uncertainty/Disinformation to the best of my ability, and maintain a conscientiously applied plan of good oral hygene. ("Thank you. I'm feeling much better, now.) I've been crazy all of my life, having suffered serious brain injury as a child, and compounding this natural disaster by a willful ingestion of a variety of legal and illegal substances designed to enrich pharmacists and people with dark skin tones who spend much of their time on dimly-lit street corners. There are those who read my apparently mad ramblings and assume that I am some kind of creative writing genius heavily influenced by Hunter S. Thompson, Carlos Castenada, Stephen King and William Burrogh's Jr. They are wrong. As gomez himself said, before being removed as the eternal symbol of the true Digerati, the Circle of Eunuchs, "We don't make it up, we just make it better." Thus, when I describe the series of ElectroShock treatments that I underwent under the care of Dr. Abram Hoffer (the Father of Megavitamin Therapy), and describe them as taking place at the exact same moment as the massive power blackouts throughout the NorthEastern United States and Canada, the details I provide may not be accurate within the time-space continuum, but they will be totally consistent with the Ultimate and Eternal Truth as evidenced by the True Measure of Reality--the electrical bill from SaskPower Corporation that was presented to Central Hospital in Saskatoon, Saskatchewan, which ultimately resulted in the restructuring of the Saskatchewan MediCare system, and the loss of many lives that could have otherwise been saved if the medical profession had not deemed it necessary to store within my brain enough electricity to create a thousand FrankenSteins, or power the bright lights of Las Vegas for a hundred years, in the case of an emergency. Hyperbole? Guess again, shit-for-brains... Anyone who has read "The News of the Weird" by Chuck Shephard can vouch for the fact that the crap that backs up in my demented brain cells, until it spills out like a toxic efflusive onto the written page, could not carry the jock-strap of the events which happen every day, in real life, far removed from the short- circuting electrical malfunctions spewing forth from my damaged brain synapses. I am the Prophet... I am a certified lunatic bouncing wildly back and forth between reality and rational thought <--> magical thinking fueled by messages from Mars which I receive hourly via the silver fillings in my decaying dentures <--> logical assumptions based on the patterns formed by rat-droppings I use to encrypt my writings with the same algorithms used as the basis for C2Net's Stonghold encryption software. In all honesty, I have to admit that I was lying when I presented myself to WebWorld at large as the TruthMonger. But, "The best laid plans of rats and men..." My poor self-image, my low self-esteem, and the knowledge that I had come by them honestly, drove me to a state where I was determined to live out my life as a lying, thieving, conniving, rat-bastard-piece-of-shit who would crap on and distort the truth about everything that normal, decent people hold sacred in their lives. So I used my computer skills, my limitless supply of amphetamines, and my powers of obsessive-compulsive, psychotic fixation to rail madly against the surrounding hordes of men and women of reason who strove to suffocate the madness that I was destined from birth to manifest on the long and twisted road which would ultimately lead to my emergence as the Anti-Christ who would raze the complete face of the earth with violent spasms of death and destruction the likes of which the universe has never seen. "It's life's illusions I recall...I really don't know life, at all." ~Joni Mitchell "All my lies are true...and everything I do, I really am." ~Carroll "Some say he's good...some say he's great...some just say, 'It's a *shame* about that boy.'" ~Sonny King, introducing C.J.Parker, the King of Country Porno, at Club Foot in Austin, Texas, at a benefit for Xalapeno Charlie. In the end, I reached spiritual enlightenment through the realization that Satan, the Evil One, the Anti-Christ, Bill Gates, Louis Freeh, Janet Reno, can never hope to even remotely approach the depths of depravity, outrageous licentiousness and lunacy, or sick and twisted dementia exhibited daily by the average Jane and Joe smiling at us from the other side of the bank manager's desk, or the check-out counter at the local K-Mart. No matter how depraved the sick, demented spewings from my evil mind became, attempting to poison the minds of all who came into contact with my evil, satanic blatherings, masquerading as a true mirror of the reality that surrounds us--in the end, I was, am, and will continue to be...TruthMonger. I am the Prophet... If my sick, twisted mind concocts some bizarre, depraved fantasy about Lisa Bonet Ramsey's rotting carcass rising from a roadside ditch to plug parking meters and being flown by the Cincinnati Police Department to New York City to carry out Judge Ito's sentence of having a toilet plunger shoved up her ass, then one of two things will happen. Either CNN will break the story, exactly as I have described it, minutes before my missive shows up on the InterNet, or I will receive the lastest email version of "News of the Weird," which will report real news stories from the mainstream media which make my fantasy's look like shallow attempts by Miss Manners to increase her readership. Death of a Legend / The Truth About the CypherPunks: The CypherPunks have long been renowned as standing at the bleeding edge of the burdgeoning computer technology which is rapidly changing the face of our planet and the governmental, civil, and social societies encompassed within this celestial orb. Harbingers of the Digital Future / Pioneers of Future Technology / etc., etc. Bullshit... The CypherPunks are rag-tag band of infantile, pseudo-anarchistic, pseudo- cryptic, well-educated shit-disturbers who take great pleasure in pissing on themselves, each other, and the world around them--all the while, covering their motivations and ambitions with high-sounding ideals intended to disguise the fact that none of them ever received proper toilet-training. The end result? No matter how high they pile it, how far they spread it, or how badly it smells when you step in it, they end up coming off as the Henry Kissinger's of CyberSpace, because no matter how much rotten meat, jalapenos and moldy cheese they eat, they can never manage to crap out anything so vile and foul- smelling that the world-at-large cannot prove prophetic in MeatSpace. Question for Blanc Weber (CypherPunks version of the Sweetheart of the Rodeo): Yes, Blanc, I am the one who was hiding in the bushes near the gravesites when you were laying the wreaths in honor of Mother Teresa and the children who were the 'victims' of the Oklahoma Federal Building bombing. Yes, that was me who was whistling the eerie medely of "Psycho Killer" and "Street Fighting Man" while you were busy trying to honor the souls of the 'innocents' who died for the sin of being born. Realizing that we are polar-opposites, I am willing to concede that perhaps Eternal Truth, True Justice and A Noble Ideal To Be Named Later might best be served if you and I met in the middle and acted in concert to do what must inevitably be done to balance the distorted energy of the Tao which is currently tearing our planet, our socities and our individuals to pieces. I am ready now...when will you be ready? I am ready to walk into Luby's cafeteria today, and start blowing away people I know and total strangers, for no real fucking reason, just to stop the voices inside my head which scream such things as "Wake Up America"/"What the Fuck are We all Doing to One Another"/"When will the Madness STOP!!!" When will you be ready? I am ready to kidnap men, women and children who are federal employees, or related to them, or who sent them Christmas cards, or who failed to punch their fucking lights out when they fucked over those they are supposed to 'serve' because of some obscure legal technicality passed by drunken, syphlittic politicians in a previous century. I am ready to transport them to the site of the OKC bombing in numbers amounting to hundreds of times of McVeigh's victims, bombing their innocent souls into oblivion, in the hope that someone, somewhere, will look into the eyes of the psychotic, deranged madman that I have become, and see themself, and their neighbors, desperately trying to maintain the illusion that their hands are free of blood when foreign children die as a result of embargos placed within the imaginary political lines which define our MeatSpace Reality--embargos placed by those that they themselves voted for in return for the promise that *their* children, on the 'good' side of the imaginary line, would be provided with good nutrition and a sound future, unless, of course, they live in one of the poorer states, or America needs a larger military budget to defend the most powerful military nation in the world from some flea on the ass of an Iranian camel. Blanc, when will *you* be ready? I am ready, today, to gun down a woman carrying a baby, killing them both, and justifying my actions by claiming I thought she was a Somalian warlord--I am ready to drive a tank to MicroSoft Corporate Headquarters and raze it to the ground, killing men, women and children in a violent cataclysm of smoke and flames, justifying it with claims that MicroSoft cult members are all gun-hoarding child-molesters who think Bill Gates is Jesus. When will you be ready...? The optomist says that the human soul is half full. The pessimist says that the human soul is half empty. The realist says, "Kill 'em all, and let God sort them out." Tim May says, "Broken eggs, and all that." I say, "The Revolution is NOW!" What do *you* say? Shall we set a date, sweetheart? [TBC] From EasyMoney at MoneyMakers.com Sun Feb 15 08:08:12 1998 From: EasyMoney at MoneyMakers.com (EasyMoney at MoneyMakers.com) Date: Sun, 15 Feb 1998 08:08:12 -0800 (PST) Subject: Sorry this took so long...call me at home when you get this... Message-ID: <> Alex...here is that E-Mail I got that made me the money to get my new Entertainment system you liked so much. Tell Sarah I said hello, and call me when you get this. I Never Thought I'd Be the One Telling You This!! "I Invested $20 and I'm Going to Europe on My Earnings!" Hello, Friends! My name is Karen Liddell; I'm a 35-year-old mom, wife, and part-time accountant. As a rule, I ignore all unsolicited "junk" e-mail and use my account primarily for business. I received this very same e-mail countless times and deleted it each time. About two months ago I received it again and, because of the catchy subject line, I finally gave it my attention. Afterwards, I thought, "OK, I'm going to try this. I can certainly afford to invest $20 and there's nothing wrong with creating a little excess cash." I promptly mailed four $5 bills and, after receiving the reports, paid a friend a small fee to send bulk e-mail for me. After reading the reports, I also learned how to advertise for free! Let me tell you this: I was not prepared for the results. Everyday for the last six weeks, my large P.O. box has been literally overflowing with $5 bills; many days the excess fills up an extra mail bin! I am STUNNED by all the money that keeps rolling in! My husband and I had been trying to save for a down payment on a house. Now, not only are we purchasing a house with 40% down, we're going to Venice, Italy to celebrate! I promise you, if you follow the steps in this e-mail and be prepared to set aside about an hour each day to follow up (and count your money!), you will make at least as much money as we did. You don't need to be a whiz at the computer but I'll bet you already are. If you can open an envelope, remove the money, and send an e-mail, then you're on your way to the bank. Read this e-mail a few times so you'll understand how easy it is. If I can do this, so can you! GO FOR IT NOW!! IT REALLY WORKS!! Karen Liddell The following is a copy of the e-mail I read: $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ This is a LEGAL, MONEY-MAKING PHENOMENON!!! We suggest you PRINT this letter, read the directions, THEN READ THEM AGAIN! $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ You are about to embark on the most PROFITABLE and UNIQUE program you may ever see. Many times over, it has proven its ability to generate LARGE AMOUNTS of CASH. This program is showing fantastic appeal with a huge and ever-growing on-line population desirous of additional income. This is a legitimate, LEGAL, money-making opportunity. It does not require you to come in contact with people, do any selling, and you don't even have to leave the house except to get the mail and go to the bank! Simply follow the easy instructions in this letter, and soon your financial dreams will come true! When followed correctly, this electronic, multi-level marketing program works perfectly...100% EVERY TIME! Thousands of people have used this program to: - Raise capital to start their own business - Pay off debts - Buy homes, cars, etc., This is your chance, so don't pass it up! $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ OVERVIEW OF THIS EXTRAORDINARY ELECTRONIC MULTI-LEVEL MARKETING PROGRAM $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ This is what you will do to reach financial freedom: You will send thousands of people a product for $5.00 which costs next to nothing to produce and e-mail. As with all multi-level businesses, you will increase your business by building your downline and selling the products. Every state in the U.S. allows you to recruit new multi- level business online (via your computer). The products in this program are a series of four business reports costing $5.00 each. Each order you receive via postal mail will include: * $5.00 cash * The name and number of the report they are ordering * The e-mail address where you will send them the report they ordered. * Their postal address (a great way to build a database of opportunity seekers for your future endeavors). To fill each order, simply e-mail the product to the buyer. THAT'S IT! THE $5.00 IS YOURS! This is the EASIEST multi-level marketing business anywhere! $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ FOLLOW THE INSTRUCTIONS EXACTLY AND BE PREPARED TO REAP THE STAGGERING BENEFITS! $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ * * * * * I N S T R U C T I O N S * * * * * 1. Order all 4 reports shown on the list below (you can't sell them if you don't order them). * For each of the 4 reports, send $5 CASH ONLY, the NAME and NUMBER OF THE REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR POSTAL ADDRESS to the person whose name is listed under the corresponding report. * Make sure you order each of the 4 reports. You need all 4 reports to save on your computer and resell. * Within 5 to 7 days you will receive, via e-mail, each of the four reports. Save them on your computer so they will be accessible for you to send to the thousands of people who will order them from you. 2. IMPORTANT-- DO NOT alter the names of the people who are listed under each report, in any way other than is instructed below in steps "a" through "f" or you will lose out on the majority of your profit. Once you understand how this program works, you'll also see how it doesn't work if you change it. Remember, this method has been tested, and if you alter it, it will not work. a. Look below for the listing of available reports. b. After you've ordered the four reports, take this advertisement and remove the name and address under REPORT #4. This person has made it through the cycle and is no doubt counting their 50 grand! c. Move the name and address under REPORT #3 down to REPORT #4. d. Move the name and address under REPORT #2 down to REPORT #3. e. Move the name and address under REPORT #1 down to REPORT #2. f. Insert your name/address in the REPORT #1 position. =3D=3D> Please copy all names and addresses ACCURATELY!!! <=3D=3D 3. Take this entire letter, including the modified list of names, and save it to your computer. Make NO changes to the instruction portion of this letter. 4. Now you're ready to start an advertising campaign on the WORLDWIDE WEB! Advertising on the WEB is very inexpensive, and there are HUNDREDS of FREE places to advertise. Another avenue which you could use for advertising is investing in bulk e-mail services by paying someone a minimal charge to advertise for you. 5. For every $5.00 you receive, all you must do is e-mail them the report they ordered. THAT'S IT! ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS! This will guarantee that the e-mail THEY send out, with YOUR name and address on it, will be prompt because they can't advertise until they receive the report! *************************************************************** AVAILABLE REPORTS Order Each REPORT by NUMBER and NAME *************************************************************** Notes: - ALWAYS SEND $5 CASH (NO CHECKS) FOR EACH REPORT - Make sure the cash is concealed by wrapping it in at least two sheets of paper - On one of those sheets of paper, include: (a) the number & name of the report you are ordering, (b) your e-mail address, and (c) your postal address. It is suggested that you rent a mailbox addressed to an assumed "company" name to avoid your name and home address being sent to millions of people. For an example, see the "company" names listed below. ___________________________________________________________ REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES" ORDER REPORT #1 FROM: CIC 120 Cedar Grove Ln Suite 314 Somerset NJ 08873 ___________________________________________________________ REPORT #2 "MAJOR CORPORATIONS AND MULTI-LEVEL SALES" ORDER REPORT #2 FROM: PAO 149-06 24th Ave. Whitestone, NY 11357 ___________________________________________________________ REPORT #3 "SOURCES FOR THE BEST MAILING LISTS" ORDER REPORT #3 FROM: SSAI P.O. Box 1834 Bonita, Ca. 91908-1834 ___________________________________________________________ REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS" ORDER REPORT #4 FROM: NDZ, Inc. 1579F Monroe Drive Box 240 Atlanta, Ga. 30324 ___________________________________________________________ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $= $ $ HERE'S HOW THIS AMAZING PROGRAM WILL MAKE YOU $MONEY$ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $= $ $ Let's say you start small just to see how it works. Assume your goal is to get 10 people on your first level. (Placing a lot of FREE ads on the internet will EASILY get a larger response.) Also assume that everyone in YOUR ORGANIZATION gets ONLY 10 downline members. Follow this example to achieve the STAGGERING results below. Level 1: your 10 members with $5. . . . . . . . . . . . .$50 Level 2: 10 members from those 10 ($5 x 100). . . . . . $500 Level 3: 10 members from those 100 ($5 x 1,000). . . .$5,000 Level 4: 10 members from those 1,000 ($5 x 10,000). .$50,000 THIS TOTALS -----------> $55,550 Remember: this assumes that the people who participate only recruit 10 people each. Think what will happen when they get 20 people to participate! Most people get 100's of participants! THINK ABOUT IT!!! $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ TIPS FOR YOUR SUCCESS $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ * TREAT THIS AS YOUR BUSINESS! Be prompt, professional, and follow the directions accurately. * Send for the four reports IMMEDIATELY so you will have them when the orders start coming in because: When you receive a $5 order, you MUST send the report to comply with U.S. Postal & Lottery Laws, Title 18, Sections 1302 and 1341 or Title 18, Section 3005 in the U.S. Code, also Code of Federal Regs. vol. 16, Sections 255 and 436, which state that "a product or service must be exchanged for money received." * Be patient and persistent! Follow the steps exactly and you WILL undoubtedly be SUCCESSFUL! * HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED! $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ YOUR SUCCESS GUIDELINE $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ =3D=3D> Follow these guidelines to GUARANTEE YOUR SUCCESS <=3D=3D If you don't receive 20 orders for REPORT #1 within 2 weeks, keep advertising until you do. Then, 2 weeks later, if you receive less than 100 orders for REPORT #2, keep advertising until you do. Once you have received 100 or more orders for REPORT #2, YOU CAN RELAX, because the system is already working for you, and the $$CASH$$ will continue to roll in! =3D=3D> HOW YOU WILL KNOW THE PROGRAM IS WORKING <=3D=3D Every time your name is moved down on the list, you are placed under a DIFFERENT report. You can KEEP TRACK of your progress by watching which report people are ordering from you. If you want to generate more income, send another batch of your advertisement (with you in the #1 position) and start the process again! There is no limit to the income you will generate from this business! *************************************** T E S T I M O N I A L S *************************************** This program does work, but you must follow it EXACTLY! Especially the rule of not trying to place your name in a different position, it won't work and you'll lose a lot of potential income. I'm living proof that it works. It is a great opportunity to make very easy money, with little investment. If you participate, follow the program exactly and you'll be on your way to financial security. Sean McLaughlin, Jackson, MS My name is Frank. My wife, Doris, and I live in Bel-Air, MD. I am a cost accountant with a major U.S. Corporation and I make pretty good money. When I received the program I grumbled to Doris about "junk mail." I made fun of the whole thing, spouting my knowledge of the population and percentages involved. I "knew" it wouldn't work. Doris totally ignored my supposed intelligence and jumped in with both feet. I made merciless fun of her, and was ready to lay the old "I told you so" on her when the thing didn't work... well, the laugh was on me! Within two weeks she had received over 50 responses. Within 45 days she had received over $147,200 in $5 bills! I was shocked! I was sure that I had it all figured and that it wouldn't work. I AM a believer now. I have joined Doris in her "hobby." I did have seven more years until retirement, but I think of the "rat race" and it's not for me. We owe it all to MLM. Frank T., Bel-Air, MD The main reason for this letter is to tell you that this system is honest, lawful, extremely profitable, and is a way to get a large amount of money in a short time. I was approached several times before I checked this out. I joined just to see what one could expect in return for the minimal effort and money required. To my astonishment, I received $36,470.00 in the first 14 weeks, with money still coming in. Sincerely yours, Phillip A. Brown, Esq. Not being the gambling type, it took me several weeks to make up my mind to participate in this plan. But being conservative, I decided that the initial investment was so little that there was no way that I wouldn't get enough orders to at least get my money back. Boy, was I surprised when I found my medium-size post office box crammed with orders! For awhile, it got so overloaded that I had to start picking up my mail at the window. I'll make more money this year than any 10 years of my life before. There simply isn't a better investment with a faster return. Mary Rockland, Lansing, MI This is my third time to participate in this plan. My wife and I have quit our jobs, and will soon buy a home at the beach and live off the interest on our money. The only way this plan will work for you is if you do it. For your sake, and for your family's sake don't pass up this opportunity. Good luck and happy spending! Charles Fairchild, Spokane, WA $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ ORDER YOUR REPORTS TODAY AND GET STARTED ON YOUR ROAD TO FINANCIAL FREEDOM!!! $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ From EasyMoney at MoneyMakers.com Sun Feb 15 08:08:12 1998 From: EasyMoney at MoneyMakers.com (EasyMoney at MoneyMakers.com) Date: Sun, 15 Feb 1998 08:08:12 -0800 (PST) Subject: Sorry this took so long...call me at home when you get this... Message-ID: <> Alex...here is that E-Mail I got that made me the money to get my new Entertainment system you liked so much. Tell Sarah I said hello, and call me when you get this. I Never Thought I'd Be the One Telling You This!! "I Invested $20 and I'm Going to Europe on My Earnings!" Hello, Friends! My name is Karen Liddell; I'm a 35-year-old mom, wife, and part-time accountant. As a rule, I ignore all unsolicited "junk" e-mail and use my account primarily for business. I received this very same e-mail countless times and deleted it each time. About two months ago I received it again and, because of the catchy subject line, I finally gave it my attention. Afterwards, I thought, "OK, I'm going to try this. I can certainly afford to invest $20 and there's nothing wrong with creating a little excess cash." I promptly mailed four $5 bills and, after receiving the reports, paid a friend a small fee to send bulk e-mail for me. After reading the reports, I also learned how to advertise for free! Let me tell you this: I was not prepared for the results. Everyday for the last six weeks, my large P.O. box has been literally overflowing with $5 bills; many days the excess fills up an extra mail bin! I am STUNNED by all the money that keeps rolling in! My husband and I had been trying to save for a down payment on a house. Now, not only are we purchasing a house with 40% down, we're going to Venice, Italy to celebrate! I promise you, if you follow the steps in this e-mail and be prepared to set aside about an hour each day to follow up (and count your money!), you will make at least as much money as we did. You don't need to be a whiz at the computer but I'll bet you already are. If you can open an envelope, remove the money, and send an e-mail, then you're on your way to the bank. Read this e-mail a few times so you'll understand how easy it is. If I can do this, so can you! GO FOR IT NOW!! IT REALLY WORKS!! Karen Liddell The following is a copy of the e-mail I read: $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ This is a LEGAL, MONEY-MAKING PHENOMENON!!! We suggest you PRINT this letter, read the directions, THEN READ THEM AGAIN! $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ You are about to embark on the most PROFITABLE and UNIQUE program you may ever see. Many times over, it has proven its ability to generate LARGE AMOUNTS of CASH. This program is showing fantastic appeal with a huge and ever-growing on-line population desirous of additional income. This is a legitimate, LEGAL, money-making opportunity. It does not require you to come in contact with people, do any selling, and you don't even have to leave the house except to get the mail and go to the bank! Simply follow the easy instructions in this letter, and soon your financial dreams will come true! When followed correctly, this electronic, multi-level marketing program works perfectly...100% EVERY TIME! Thousands of people have used this program to: - Raise capital to start their own business - Pay off debts - Buy homes, cars, etc., This is your chance, so don't pass it up! $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ OVERVIEW OF THIS EXTRAORDINARY ELECTRONIC MULTI-LEVEL MARKETING PROGRAM $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ This is what you will do to reach financial freedom: You will send thousands of people a product for $5.00 which costs next to nothing to produce and e-mail. As with all multi-level businesses, you will increase your business by building your downline and selling the products. Every state in the U.S. allows you to recruit new multi- level business online (via your computer). The products in this program are a series of four business reports costing $5.00 each. Each order you receive via postal mail will include: * $5.00 cash * The name and number of the report they are ordering * The e-mail address where you will send them the report they ordered. * Their postal address (a great way to build a database of opportunity seekers for your future endeavors). To fill each order, simply e-mail the product to the buyer. THAT'S IT! THE $5.00 IS YOURS! This is the EASIEST multi-level marketing business anywhere! $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ FOLLOW THE INSTRUCTIONS EXACTLY AND BE PREPARED TO REAP THE STAGGERING BENEFITS! $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ * * * * * I N S T R U C T I O N S * * * * * 1. Order all 4 reports shown on the list below (you can't sell them if you don't order them). * For each of the 4 reports, send $5 CASH ONLY, the NAME and NUMBER OF THE REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR POSTAL ADDRESS to the person whose name is listed under the corresponding report. * Make sure you order each of the 4 reports. You need all 4 reports to save on your computer and resell. * Within 5 to 7 days you will receive, via e-mail, each of the four reports. Save them on your computer so they will be accessible for you to send to the thousands of people who will order them from you. 2. IMPORTANT-- DO NOT alter the names of the people who are listed under each report, in any way other than is instructed below in steps "a" through "f" or you will lose out on the majority of your profit. Once you understand how this program works, you'll also see how it doesn't work if you change it. Remember, this method has been tested, and if you alter it, it will not work. a. Look below for the listing of available reports. b. After you've ordered the four reports, take this advertisement and remove the name and address under REPORT #4. This person has made it through the cycle and is no doubt counting their 50 grand! c. Move the name and address under REPORT #3 down to REPORT #4. d. Move the name and address under REPORT #2 down to REPORT #3. e. Move the name and address under REPORT #1 down to REPORT #2. f. Insert your name/address in the REPORT #1 position. =3D=3D> Please copy all names and addresses ACCURATELY!!! <=3D=3D 3. Take this entire letter, including the modified list of names, and save it to your computer. Make NO changes to the instruction portion of this letter. 4. Now you're ready to start an advertising campaign on the WORLDWIDE WEB! Advertising on the WEB is very inexpensive, and there are HUNDREDS of FREE places to advertise. Another avenue which you could use for advertising is investing in bulk e-mail services by paying someone a minimal charge to advertise for you. 5. For every $5.00 you receive, all you must do is e-mail them the report they ordered. THAT'S IT! ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS! This will guarantee that the e-mail THEY send out, with YOUR name and address on it, will be prompt because they can't advertise until they receive the report! *************************************************************** AVAILABLE REPORTS Order Each REPORT by NUMBER and NAME *************************************************************** Notes: - ALWAYS SEND $5 CASH (NO CHECKS) FOR EACH REPORT - Make sure the cash is concealed by wrapping it in at least two sheets of paper - On one of those sheets of paper, include: (a) the number & name of the report you are ordering, (b) your e-mail address, and (c) your postal address. It is suggested that you rent a mailbox addressed to an assumed "company" name to avoid your name and home address being sent to millions of people. For an example, see the "company" names listed below. ___________________________________________________________ REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES" ORDER REPORT #1 FROM: CIC 120 Cedar Grove Ln Suite 314 Somerset NJ 08873 ___________________________________________________________ REPORT #2 "MAJOR CORPORATIONS AND MULTI-LEVEL SALES" ORDER REPORT #2 FROM: PAO 149-06 24th Ave. Whitestone, NY 11357 ___________________________________________________________ REPORT #3 "SOURCES FOR THE BEST MAILING LISTS" ORDER REPORT #3 FROM: SSAI P.O. Box 1834 Bonita, Ca. 91908-1834 ___________________________________________________________ REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS" ORDER REPORT #4 FROM: NDZ, Inc. 1579F Monroe Drive Box 240 Atlanta, Ga. 30324 ___________________________________________________________ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $= $ $ HERE'S HOW THIS AMAZING PROGRAM WILL MAKE YOU $MONEY$ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $= $ $ Let's say you start small just to see how it works. Assume your goal is to get 10 people on your first level. (Placing a lot of FREE ads on the internet will EASILY get a larger response.) Also assume that everyone in YOUR ORGANIZATION gets ONLY 10 downline members. Follow this example to achieve the STAGGERING results below. Level 1: your 10 members with $5. . . . . . . . . . . . .$50 Level 2: 10 members from those 10 ($5 x 100). . . . . . $500 Level 3: 10 members from those 100 ($5 x 1,000). . . .$5,000 Level 4: 10 members from those 1,000 ($5 x 10,000). .$50,000 THIS TOTALS -----------> $55,550 Remember: this assumes that the people who participate only recruit 10 people each. Think what will happen when they get 20 people to participate! Most people get 100's of participants! THINK ABOUT IT!!! $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ TIPS FOR YOUR SUCCESS $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ * TREAT THIS AS YOUR BUSINESS! Be prompt, professional, and follow the directions accurately. * Send for the four reports IMMEDIATELY so you will have them when the orders start coming in because: When you receive a $5 order, you MUST send the report to comply with U.S. Postal & Lottery Laws, Title 18, Sections 1302 and 1341 or Title 18, Section 3005 in the U.S. Code, also Code of Federal Regs. vol. 16, Sections 255 and 436, which state that "a product or service must be exchanged for money received." * Be patient and persistent! Follow the steps exactly and you WILL undoubtedly be SUCCESSFUL! * HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED! $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ YOUR SUCCESS GUIDELINE $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ =3D=3D> Follow these guidelines to GUARANTEE YOUR SUCCESS <=3D=3D If you don't receive 20 orders for REPORT #1 within 2 weeks, keep advertising until you do. Then, 2 weeks later, if you receive less than 100 orders for REPORT #2, keep advertising until you do. Once you have received 100 or more orders for REPORT #2, YOU CAN RELAX, because the system is already working for you, and the $$CASH$$ will continue to roll in! =3D=3D> HOW YOU WILL KNOW THE PROGRAM IS WORKING <=3D=3D Every time your name is moved down on the list, you are placed under a DIFFERENT report. You can KEEP TRACK of your progress by watching which report people are ordering from you. If you want to generate more income, send another batch of your advertisement (with you in the #1 position) and start the process again! There is no limit to the income you will generate from this business! *************************************** T E S T I M O N I A L S *************************************** This program does work, but you must follow it EXACTLY! Especially the rule of not trying to place your name in a different position, it won't work and you'll lose a lot of potential income. I'm living proof that it works. It is a great opportunity to make very easy money, with little investment. If you participate, follow the program exactly and you'll be on your way to financial security. Sean McLaughlin, Jackson, MS My name is Frank. My wife, Doris, and I live in Bel-Air, MD. I am a cost accountant with a major U.S. Corporation and I make pretty good money. When I received the program I grumbled to Doris about "junk mail." I made fun of the whole thing, spouting my knowledge of the population and percentages involved. I "knew" it wouldn't work. Doris totally ignored my supposed intelligence and jumped in with both feet. I made merciless fun of her, and was ready to lay the old "I told you so" on her when the thing didn't work... well, the laugh was on me! Within two weeks she had received over 50 responses. Within 45 days she had received over $147,200 in $5 bills! I was shocked! I was sure that I had it all figured and that it wouldn't work. I AM a believer now. I have joined Doris in her "hobby." I did have seven more years until retirement, but I think of the "rat race" and it's not for me. We owe it all to MLM. Frank T., Bel-Air, MD The main reason for this letter is to tell you that this system is honest, lawful, extremely profitable, and is a way to get a large amount of money in a short time. I was approached several times before I checked this out. I joined just to see what one could expect in return for the minimal effort and money required. To my astonishment, I received $36,470.00 in the first 14 weeks, with money still coming in. Sincerely yours, Phillip A. Brown, Esq. Not being the gambling type, it took me several weeks to make up my mind to participate in this plan. But being conservative, I decided that the initial investment was so little that there was no way that I wouldn't get enough orders to at least get my money back. Boy, was I surprised when I found my medium-size post office box crammed with orders! For awhile, it got so overloaded that I had to start picking up my mail at the window. I'll make more money this year than any 10 years of my life before. There simply isn't a better investment with a faster return. Mary Rockland, Lansing, MI This is my third time to participate in this plan. My wife and I have quit our jobs, and will soon buy a home at the beach and live off the interest on our money. The only way this plan will work for you is if you do it. For your sake, and for your family's sake don't pass up this opportunity. Good luck and happy spending! Charles Fairchild, Spokane, WA $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ ORDER YOUR REPORTS TODAY AND GET STARTED ON YOUR ROAD TO FINANCIAL FREEDOM!!! $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ From nobody at REPLAY.COM Sun Feb 15 09:42:23 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sun, 15 Feb 1998 09:42:23 -0800 (PST) Subject: Hlep Message-ID: <199802151742.SAA10972@basement.replay.com> A cloud of linear purity began to move over the sand-monster, billowing with precipitory anticipation. Small blood puzzles aligned themselves like melanomas, forming patterns of infinite finality. The puzzle-monsters coalesced as lasers, carving lesions from flesh and riddling the brittle skin with xray cracks. Soon it would be as it before, finally. - A'Tak A'Tdorn From nobody at REPLAY.COM Sun Feb 15 11:51:14 1998 From: nobody at REPLAY.COM (Anonymous) Date: Sun, 15 Feb 1998 11:51:14 -0800 (PST) Subject: Q Message-ID: <199802151945.UAA25905@basement.replay.com> >Whats up? Fuck off. From bill.stewart at pobox.com Sun Feb 15 14:26:20 1998 From: bill.stewart at pobox.com (bill.stewart at pobox.com) Date: Sun, 15 Feb 1998 14:26:20 -0800 (PST) Subject: The Octopus and America as the Evil Empire In-Reply-To: Message-ID: <3.0.5.32.19980215011846.008b9320@popd.ix.netcom.com> At 10:58 AM 2/14/98 -0800, you wrote: >(I was told by a usually reliable source that AT&T rerouted some of their >Long Lines to cross Indian reservations...thus allowing interception by the >TLAs without violating the laws about domestic surveillance. Is this true? >I haven't done any research to try to verify this, but it wouldn't surprise >me. The UK-USA agreement is already a way to circumvent the "no domestic >surveillance without a court order" laws, as we all know by now.) I haven't a clue who to ask, but it would surprise me a bit. [#disclaimer: personal opinion only, not AT&T's] If it was done, it would have been for microwave lines, which are mostly obsolete except in places like Southern Utah and parts of Montana and the Dakotas which don't have enough population density to justify replacing with fiber. Much more likely they were routed through reservations for cheap right of way. Most of the routes have been pretty stable for a long time, because of right-of-way issues, and many of them date from back before the FBI and CIA worried about little details like Constitutionality and different rules on Indian reservations. Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From bill.stewart at pobox.com Sun Feb 15 14:26:23 1998 From: bill.stewart at pobox.com (bill.stewart at pobox.com) Date: Sun, 15 Feb 1998 14:26:23 -0800 (PST) Subject: Censorship of Library and School Computers In-Reply-To: <34E09296.3EC@dc.net> Message-ID: <3.0.5.32.19980215112911.008d9b10@popd.ix.netcom.com> Sounds like an obvious target for activism to add a requirement that any censorware systems selected be clearly identified to the public, including the kids, and that the blocking criteria and lists be made available to the parents and adult library users. In particular, many local jurisdictions have sunshine laws that might have applicability, and anything so blatantly Un-American and dangerous as third-party censorship certainly needs to be watched. On the legal side, the idea of a Federal mandate that state and local jurisdictions make decisions that cannot be reviewed by the Feds seems pretty dodgy; certainly the whole issue ought to be reviewable by courts in response to a citizen lawsuit, even if Federal prosecutors can't initiate actions about it. At 09:47 AM 2/10/98 -0800, Robert Cannon wrote to CYBERIA-L at LISTSERV.AOL.COM, >Sen. McCain has introduced his bill to require schools and libraries >that acquire Internet access using the universal service fund to >restrict the access of children to indecency. The text of the Bill can >be found at ftp://ftp.loc.gov/pub/thomas/c105/s1619.is.txt It already >has three cosponsors, one of which is our friend Dan "no I wont give up" >Coats. [Quotes from text of bill about how schools and libraries need systems to block material "deemed to be inappropriate for minors"; schools have to select and promise to install to request the money, while libraries have to employ it on one or more computers, though the language appears to be crafted sufficiently vaguely as to not require them to use it on all their computers (or even necessarily on computers accessible to kids :-) ] > `(4) LOCAL DETERMINATION OF CONTENT- For purposes of > paragraphs (2) and (3), the determination of what matter is > inappropriate for minors shall be made by the school, school > board, library or other authority responsible for making the > required certification. No agency or instrumentality of the > United States Government may-- > `(A) establish criteria for making that determination; > `(B) review the determination made by the certifying > school, school board, library, or other authority; or > `(C) consider the criteria employed by the certifying > school, school board, library, or other authority in the > administration of subsection (h)(1)(B).'. > > Thanks! Bill Bill Stewart, bill.stewart at pobox.com PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639 From vcarlos35 at juno.com Sun Feb 15 14:42:33 1998 From: vcarlos35 at juno.com (vcarlos35 at juno.com) Date: Sun, 15 Feb 1998 14:42:33 -0800 (PST) Subject: Miller-Rabin prime number testing Message-ID: <19980215.173857.7286.1.vcarlos35@juno.com> Does anyone have any information on the Miller-Rabin probabalistic primality test? I'm pretty sure its on page 260 of Applied Cryptography 2nd edition, but I lent mey copy to someone and he's away. Please email me/the list if you have this algorithm. Thanks. _____________________________________________________________________ You don't need to buy Internet access to use free Internet e-mail. Get completely free e-mail from Juno at http://www.juno.com Or call Juno at (800) 654-JUNO [654-5866] From jya at pipeline.com Sun Feb 15 16:09:34 1998 From: jya at pipeline.com (John Young) Date: Sun, 15 Feb 1998 16:09:34 -0800 (PST) Subject: Spy Touts Crypto Message-ID: <1.5.4.32.19980216001226.007560b0@pop.pipeline.com> Date: Sun, 15 Feb 1998 16:40:04 -0500 Frankfurt, Germany (AP) -- Germany's spy chief has denied U.S. allegations that his agents spy on American companies, but he warned German firms that such economic espionage is soaring internationally. Bernd Schmidbauer said in comments published Saturday that, in contrast to most countries' spy agencies, Germany's is not involved in any economic espionage. The Frankfurter Allgemeine daily reported that the FBI last month accused Germany of running a post near Frankfurt that eavesdrops on U.S. phones and tries to break into American computer systems. "We're astounded about those reports from the FBI," the newspaper quoted Schmidbauer as saying. He said the post is involved only in trying to prevent the spread of weapons of mass destruction. The FBI does not normally identify governments it suspects of economic spying. But an article last month, written by an FBI agent for the industry magazine Public Administration Review, lists Germany along with France, Israel, China and South Korea as major offenders. The article said more than 700 investigations involving economic espionage by foreign governments are pending before the bureau. The FBI confirmed that figure last month. The American Society for Industrial Security estimated that American businesses lost $300 billion in intellectual property to foreign and domestic spies last year. Schmidbauer said German companies also are increasingly targeted, and warned that any conversations, faxes or computer information carried over phone lines or mobile phones could be eavesdropped. "A lot of money is being lost through this form of espionage," Schmidbauer said, without giving a figure. "And it's not only east European spies that are snapping up know-how from German companies." "Our companies are relatively naive," he said. "Concrete steps must be taken ... including encoding techniques." [End] Thanks to DN. From billp at nmol.com Sun Feb 15 19:32:39 1998 From: billp at nmol.com (bill payne) Date: Sun, 15 Feb 1998 19:32:39 -0800 (PST) Subject: Erich Mielke Message-ID: <34E7AEE5.6FD9@nmol.com> Sunday 2/15/98 7:52 PM J Orlin Grabbe Albuquerque Journal h 2/5/98 Ex-Spy Denied Extra Pension BERLIN - The former head of the East German secret police, a lifelong communist who fled Germany in the 1930s to avoid the Nazis, is not entitled to extra pension money for the time he spent in exile, a court ruled Wednesday. One the No. 2 man in East Germany, Erich Mielke, 90, now lives in seclusion with his wife in an apartment in eastern Berlin. His monthly pension, according to German media, is just under $55 a month. Hoping to boost his income, he applied to Berlin authorities for a supplemental pension for the years he spent in Moscow and Spain, 1931 until the end of World War II. But the court ruled that the main reason for his exile was not fear of persecution, but for his involvement as a young communist street fighter in the killing of two Berlin policemen on Aug. 9, 1931. Your attached article ALSO may include Mielke. Grabbe, a LOT of guys wanted to find out what happened. Israel too. Let's all hope for settlement of this unfortunate matter. Later bill Title: NSA, Crypto AG, and the Iraq-Iran Conflict [Email Reply] NSA, Crypto AG, and the Iraq-Iran Conflict by J. Orlin Grabbe One of the dirty little secrets of the 1980s is that the U.S. regularly provided Iraq's Saddam Hussein with top-secret communication intercepts by the U.S. National Security Agency (NSA). Consider the evidence. When in 1991 the government of Kuwait paid the public relations firm of Hill & Knowlton ten million dollars to drum up American war fever against the evil dictator Hussein, it brought about the end of a long legacy of cooperation between the U.S. and Iraq. Hill & Knowlton resurrected the World War I propaganda story about German soldiers roasting Belgian babies on bayonets, updated in the form of a confidential witness (actually the daughter of the Kuwaiti ambassador to the U.S.) who told Congress a tearful story of Iraqi soldiers taking Kuwaiti babies out of incubators and leaving them on the cold floor to die. President George Bush then repeated this fabricated tale in speeches ten times over the next three days. What is remarkable about this staged turn of events is that, until then, Hussein had operated largely with U.S. approval. This cooperation had spanned three successive administrations, starting with Jimmy Carter. As noted by John R. MacArthur, "From 1980 to 1988, Hussein had shouldered the burden of killing about 150,000 Iranians, in addition to at least thirteen thousand of his own citizens, including several thousand unarmed Kurdish civilians, and in the process won the admiration and support of elements of three successive U.S. Administrations" [1]. Hussein's artful slaughter of Iranians was aided by good military intelligence. The role of NSA in the conflict is an open secret in Europe, the Middle East, and Asia. Only in this country has there been a relative news blackout, despite the fact that it was the U.S. administration that let the crypto cat out of the bag. First, U.S. President Ronald Reagan informed the world on national television that the United States was reading Libyan communications. This admission was part of a speech justifying the retaliatory bombing of Libya for its alleged involvement in the La Belle discotheque bombing in Berlin's Schoeneberg district, where two U.S. soldiers and a Turkish woman were killed, and 200 others injured. Reagan wasn't talking about American monitoring of Libyan news broadcasts. Rather, his "direct, precise, and undeniable proof" referred to secret (encrypted) diplomatic communication between Tripoli and the Libyan embassy in East Berlin. Next, this leak was compound by the U.S. demonstration that it was also reading secret Iranian communications. As reported in Switzerland's Neue Zurcher Zeitung, the U.S. provided the contents of encrypted Iranian messages to France to assist in the conviction of Ali Vakili Rad and Massoud Hendi for the stabbing death in the Paris suburb of Suresnes of the former Iranian prime minister Shahpour Bakhtiar and his personal secretary Katibeh Fallouch. [2] What these two countries had in common was they had both purchased cryptographic communication equipment from the Swiss firm Crypto AG. Crypto AG was founded in 1952 by the (Russian-born) Swedish cryptographer Boris Hagelin who located his company in Zug. Boris had created the "Hagelin-machine", a encryption device similar to the German "Enigma". The Hagelin machine was used on the side of the Allies in World War II. Crypto AG was an old and venerable firm, and Switzerland was a neutral country. So Crypto AG's enciphering devices for voice communication and digital data networks were popular, and customers came from 130 countries. These included the Vatican, as well the governments of Iraq, Iran, and Libya. Such countries were naturally skeptical of cryptographic devices sold in many NATO countries, so turned to relatively neutral Switzerland for communication security. Iran demonstrated its suspicion about the source of the leaks, when it arrested Hans Buehler, a top salesman for Crypto AG, in Teheran on March 18, 1992. During his nine and a half months of solitary confinement in Evin prison in Teheran, Buehler was questioned again and again whether he had leaked Teheran's codes or Libya's keys to Western powers. Luckily Buehler didn't know anything. He in fact believed in his own sales pitch that Crypto AG was a neutral company and its equipment was the best. They were Swiss, after all. [3] Crypto AG eventually paid one million dollars for Buehler's release in January 1993, then promptly fired him once they had reassured themselves that he hadn't revealed anything important under interrogation, and because Buehler had begun to ask some embarrassing questions. Then reports appeared on Swiss television, Swiss Radio International, all the major Swiss papers, and in German magazines like Der Spiegel. Had Crypto AG's equipment been spiked by Western intelligence services? the media wanted to know. The answer was Yes [4]. Swiss television traced the ownership of Crypto AG to a company in Liechtenstein, and from there back to a trust company in Munich. A witness appearing on Swiss television explained the real owner was the German government--the Federal Estates Administration. [5] According to Der Spiegel, all but 6 of the 6000 shares of Crypto AG were at one time owned by Eugen Freiberger, who resided in Munich and was head of the Crypto AG managing board in 1982. Another German, Josef Bauer, an authorized tax agent of the Muenchner Treuhandgesellschaft KPMG, and who was elected to the managing board in 1970, stated that his mandate had come from the German company Siemens. Other members of Crypto AG's management had also worked at Siemens. Was the German secret service, the Bundesnachrichtendienst (BND), hiding behind the Siemens' connection? So it would seem. Der Spiegel reported that in October 1970, a secret meeting of the BND had discussed how the Swiss company Graettner could be guided into closer cooperation with Crypto AG, or could even merged with it. The BND additionally considered how "the Swedish company Ericsson could be influenced through Siemens to terminate its own cryptographic business." [6] A former employee of Crypto AG reported that he had to coordinate his developments with "people from Bad Godesberg". This was the location of the "central office for encryption affairs" of the BND, and the service instructed Crypto AG what algorithms to use to create the codes. The employee also remembers an American "watcher", who strongly demanded the use of certain encryption methods. Representatives from NSA visited Crypto AG often. A memorandum of a secret workshop at Crypto AG in August 1975, where a new prototype of an encryption device was demonstrated, mentions the participation of Nora L. Mackebee, an NSA cryptographer. Motorola engineer Bob Newman says that Mackebee was introduced to him as a "consultant". Motorola cooperated with Crypto AG in the seventies in developing a new generation of electronic encryption machines. The Americans "knew Zug very well and gave travel tips to the Motorola people for the visit at Crypto AG," Newman told Der Spiegel. Knowledgeable sources indicate that the Crypto AG enciphering process, developed in cooperation with the NSA and the German company Siemans, involved secretly embedding the decryption key in the cipher text. Those who knew where to look could monitor the encrypted communication, then extract the decryption key that was also part of the transmission, and recover the plain text message. Decryption of a message by a knowledgeable third party was not any more difficult than it was for the intended receiver. (More than one method was used. Sometimes the algorithm was simply deficient, with built-in exploitable weaknesses.) Crypto AG denies all this, of course, saying such reports are ""pure invention". What information was provided to Saddam Hussein exactly? Answers to this question are currently being sought in a lawsuit against NSA in New Mexico, which has asked to see "all Iranian messages and translations between January 1, 1980 and June 10, 1996". [7] The passage of top-secret communications intelligence to someone like Saddam Hussein brings up other questions. Which dictator is the U.S. passing top secret messages to currently? Jiang Zemin? Boris Yeltsin? Will Saddam Hussein again become a recipient of NSA largess if he returns to the mass slaughter of Iranians? What exactly is the purpose of NSA anyway? One more question: Who is reading the Pope's communications? Bibliography [1] John R. MacArthur, Second Front: Censorship and Propaganda in the Gulf War, Hill and Wang, New York, 1992. [2] Some of the background of this assassination can be found in "The Tehran Connection," Time Magazine, March 21, 1994. [3] The Buehler case is detailed in Res Strehle, Verschleusselt: der Fall Hans Beuhler, Werd Verlag, Zurich, 1994. [4] "For years, NSA secretly rigged Crypto AG machines so that U.S. eavesdroppers could easily break their codes, according to former company employees whose story is supported by company documents," "No Such Agency, Part 4: Rigging the Game," The Baltimore Sun, December 4, 1995. [5] Reported in programs about the Buehler case that were broadcast on Swiss Radio International on May 15, 1994 and July 18, 1994. [6] "Wer ist der befugte Vierte?": Geheimdienste unterwandern den Schutz von Verschlusselungsgeraten," Der Spiegel 36, 1996. [7] U.S. District Court for the District of New Mexico, William H. Payne, Arthur R. Morales, Plaintiffs, v. Lieutenant General Kenneth A. Minihan, USAF, Director of National Security Agency, National Security Agency, Defendant, CIV NO 97 0266 SC/DJS. November 2, 1997 Web Page: http://www.aci.net/kalliste/ From 89485650 at cts.com Sun Feb 15 21:11:59 1998 From: 89485650 at cts.com (89485650 at cts.com) Date: Sun, 15 Feb 1998 21:11:59 -0800 (PST) Subject: Pre- approved Guaranteed Merchant Accounts ! ! Message-ID: <>


                    INCREASE YOUR SALES! !
ACCEPT  CREDIT CARDS! PRE-APPROVED APPLICATION
 Good Credit/Bad Credit/No Credit NO APPLICATION FEES

 For a Limited Time Only!!! Regular $195.00 Application Fee Waived
For This   Offer!!! PLUS FREE SET-UP FOR ACCEPTING
               CHECKS  BY FAX OR BY PHONE

  Increase Your Business By 30% to 100% Just By Accepting Credit Cards
        We Specialize in Home Based Businesses - APPLY TODAY!!!
         Accept Visa, Mastercard,  American Express, and  Discover!

 If you are interested in the merchant account please call:   (800) 400-8532
  24 HRS A DAY 7 DAYS A WEEK PLEASE LEAVE YOUR NAME, NUMBER,
  AND THE BEST TIME TO CALL YOU. Please be sure to include your source code
          CJK2929-WRN04  to ensure that your application fee is waived.
************************************************************************************************
           This  Pre-Approved  Merchant  Account Application  has
              NO  APPLICATION FEES!! This is a one time mailing.



------------------------------------------------------------------------------------------------------------------------------


 









From 89485650 at cts.com  Sun Feb 15 21:11:59 1998
From: 89485650 at cts.com (89485650 at cts.com)
Date: Sun, 15 Feb 1998 21:11:59 -0800 (PST)
Subject: Pre- approved Guaranteed Merchant Accounts ! !
Message-ID: <>




                    INCREASE YOUR SALES! !
ACCEPT  CREDIT CARDS! PRE-APPROVED APPLICATION
 Good Credit/Bad Credit/No Credit NO APPLICATION FEES

 For a Limited Time Only!!! Regular $195.00 Application Fee Waived
For This   Offer!!! PLUS FREE SET-UP FOR ACCEPTING
               CHECKS  BY FAX OR BY PHONE

  Increase Your Business By 30% to 100% Just By Accepting Credit Cards
        We Specialize in Home Based Businesses - APPLY TODAY!!!
         Accept Visa, Mastercard,  American Express, and  Discover!

 If you are interested in the merchant account please call:   (800) 400-8532
  24 HRS A DAY 7 DAYS A WEEK PLEASE LEAVE YOUR NAME, NUMBER,
  AND THE BEST TIME TO CALL YOU. Please be sure to include your source code
          CJK2929-WRN04  to ensure that your application fee is waived.
************************************************************************************************
           This  Pre-Approved  Merchant  Account Application  has
              NO  APPLICATION FEES!! This is a one time mailing.



------------------------------------------------------------------------------------------------------------------------------


 









From jkwilli2 at unity.ncsu.edu  Sun Feb 15 22:11:16 1998
From: jkwilli2 at unity.ncsu.edu (Ken Williams)
Date: Sun, 15 Feb 1998 22:11:16 -0800 (PST)
Subject: Miller-Rabin prime number testing
In-Reply-To: <19980215.173857.7286.1.vcarlos35@juno.com>
Message-ID: 


On Sun, 15 Feb 1998 vcarlos35 at juno.com wrote:

>Does anyone have any information on the Miller-Rabin probabalistic
>primality test?
>I'm pretty sure its on page 260 of Applied Cryptography 2nd edition, but
>I lent mey copy  to
>someone and he's away.
>Please email me/the list if you have this algorithm.
>Thanks.
>

http://www.altavista.digital.com/cgi-bin/query?pg=q&what=web&kl=XX&q=%22Miller-Rabin%22

83 documents match your query.

TATTOOMAN

/--------------------------[   TATTOOMAN   ]--------------------------\
| ORG: NC State Computer Science Dept    VP of The  E. H. A. P. Corp. |
| EML: jkwilli2 at adm.csc.ncsu.edu         ehap at hackers.com             |
| EML: jkwilli2 at unity.ncsu.edu           ehap-secure at hackers.com      |
| WWW: http://www4.ncsu.edu/~jkwilli2/   http://www.hackers.com/ehap/ |
| FTP: ftp://152.7.11.38/pub/personal/tattooman/                      |
| W3B: http://152.7.11.38/~tattooman/w3board/                         |
| PGP: finger tattooman at 152.7.11.38                                   |
\----------------[   http://152.7.11.38/~tattooman/  ]----------------/







From nobody at REPLAY.COM  Sun Feb 15 22:19:55 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Sun, 15 Feb 1998 22:19:55 -0800 (PST)
Subject: high speed management method
Message-ID: <199802160619.HAA26138@basement.replay.com>



Please teach high speed management method
of block cypher to me.
Thanks







From jkwilli2 at unity.ncsu.edu  Mon Feb 16 00:52:51 1998
From: jkwilli2 at unity.ncsu.edu (Ken Williams)
Date: Mon, 16 Feb 1998 00:52:51 -0800 (PST)
Subject:  World-market Crypto for SSL (fwd)
Message-ID: 



suggestions or help with this one?  what do you ppl think?

Regards,

tattooman
http://152.7.11.38/~tattooman

---------- Forwarded message ----------
Date: Sun, 15 Feb 1998 11:48:01 -0500
From: XXX
To: Ken Williams 
Subject: Re:  World-market Crypto for SSL

Hi Ken,

	Thanks for the note.  I've got an idea I wanted to bounce off you,
since Tattooman seems a suitably non-corporate persona.  I'm one of those
who believes that the world will be a better place if all people have ready
access to strong crypto, for their own personal musing (for what hope has
democracy -- or individualism, or community -- if people can not safely
muse on unpopular or illicit options, deciding what is right by carefully
considering what is wrong as well as right.)  I also believe that strong
crypto is all that can allow online international commerce, and commerce
and trade is the fundamental alternative to war, armed might, and
spook-driven controls on inter-cultural relationships.)  The core struggle
of our time is likely to be between those who want to rely on from-the-top
bureaucratic control, essentially militaristic control of friends and foe,
and those who trust instead in evolving common needs and mutually
beneficial trade interactions between societies and nations.

	(The fact that the most valuable resource of any future information
age -- intellectual capital, human brainpower -- is much more equitably
distributed among nations than other "natural" resources, like coal, or
gold, also gives me hope for a future in which all nations can offer
intellectual trade-good of value and partake of a health and
profitable-to-all world trade.)

	Here's my thought:  in the immediate future, Fortify (or some
similar freeware product) will offer anyone in the world a chance to
upgrade the tens of millions of export-quality (weak crypto) versions of
Netscape in circulation, to make them strong-crypto products with both SSL
(and soon S/MIME) available to all.

	One of the big questions in how this world-wide struggle between
statist forces who want to restrict individual (and corporate) access to
strong crypto internationally, and those of us who instead want to foster
the widespread use of strong crypto, is how to educate and promote the use
of strong-crypto versions of Netscape (since that is today the upgradable
product available worldwide.)

	What I would like to see is one or several CGI packages which folks
could put on their websites which would quickly alert a user that the
browser he is using has only limited and restricted export-quality weak
crypto, and that he or she should immediately consider upgrading to strong
crypto by obtaining Fortify (or other upgrade packages) from XXX website.
C2, which is accessible through the Fortify website: www.fortify.net has
something like this for SSL.  I'm looking into getting something similar
for S/MIME -- assuming McKay or others get the S/MIME-enhanced version of
Fortify in circulation within a few weeks.

	Any ideas about how to get this going?

	Regards,

		XXX

PS.  Your note caught me as I was thinking this through, so you doubtless
got a more wordy and political response than you expected.  Still, this is
an open issue of great importance, IMNSHO, and I'd be grateful for any
energy or suggestions you might offer.








From owner-cypherpunks  Mon Feb 16 02:39:18 1998
From: owner-cypherpunks (owner-cypherpunks)
Date: Mon, 16 Feb 1998 02:39:18 -0800 (PST)
Subject: Turn Your Computer Into a Personal Mail Server
Message-ID: <199802161039.CAA05722@toad.com>



Look at the Headers in this Message.
If you like what you see read on.

This message was sent to you courtesy of the amazing new technology of  the "Rapid Fire 
Mail Server" (RFMS).  RFMS transforms your computer into a personal mail server.  With no 
additional hardware, RFMS software will give you complete control of  your mailings, because 
the mail you send will originate from your computer and be delivered directly into the mailbox 
of your recipient.  Since the mail originates from your computer, it is no longer necessary to 
use your Internet Service Provider's mail server.

When you use the previous generation stealth or cloaking type programs, they work by 
uploading your mail to your provider's mail server.  They can also be programmed to send 
mail through other providers mail servers without authorization (this is considered theft of service).  
The problem is, the previous generation stealth type programs upload the messages faster than 
these mail servers can process them. 

Many times this causes a provider's mail server to bog down and crash.  Obviously, this will make 
providers furious with you.  Furthermore, you may think that you are sending hundreds of thousands 
of messages, unfortunately, most of it simply gets filtered and deleted by the mail server.  You are 
lucky to get 10%-20% of that mail delivered.  With Rapid Fire Mail Server software YOUR computer 
emulates a mail server and YOU actually control and watch all your mail being delivered piece by 
piece. There is a 100% delivery rate with this program anywhere on the internet. We did say 100% 
delivery rate to any internet email addresses. A bold claim but it is true.  This is the latest technical 
advance in bulk email since the advent of the stealth type programs.  

This program verifies domains and validity of email addresses before sending mail. This 
dramatically reduces your bounced back undeliverables. Bounced back undeliverables 
can sure bog down a server. You can also control where you want any bounced back 
mail to go. It can go to any email address you want with Rapid Fire Mail Server.  

Rapid Fire Mail Server can work with ANY dial up internet account, an ISDN line or a T-1 or T-3. 
It runs on Windows 95 or NT.

We have not heard of any person losing a dial up account with this software. One reason 
bulk email is so frowned upon with numerous ISP's is people try to send as much mail 
as they can, as quick as they can and crash the mail server of the ISP. This won't happen 
with Rapid Fire Mail Server software since you don't use the mail server of the ISP to 
send your mail. The program actually sends the mail directly from your computer which 
is now a bona fide mail server, to the recipients mail server avoiding any potential blocks 
that would prevent you from reaching those on your mailing list. You do not have to
"forge" headers or randomize anything to have 100% of your mail delivered, although 
the program does allow for randomization and customizing of headers. You can send
mail omitting the "to" "from" and "reply to" portions of your headers.   

Want to send out your messages in color. Not a problem with Rapid Fire Mail Server. Just 
select a font color with your mouse, and then click on a background color as well. Want to 
make your font bold or put it into italics, just point and click. Want your message centered or 
shifted left or right, once again just point and click.

Rapid Fire Mail Server works with any Windows 95 or NT computer. It requires no additional 
hardware or software.

The Rapid Fire Mail Server sends at speeds up to 80,000 messages per hour DELIVERED using 
a modest pentium and a 28.8 modem. Rates will dramatically increase with an ISDN or cable 
modem and of course with a T-1 they will be even faster. 

If you want to take advantage of this breakthrough in Bulk EMail Technology give us a 
call. Oh, if you were wondering the program costs $700.  We don't plan on repeat 
mailings for this product. If you think the price is too high, well we can sell you Stealth for 
$200. You might be happy with Stealth if you don't mind frequent loss of dial-up accounts, 
a lot of complaints, not getting a lot of your mail delivered due to blocks and crashed mail s
ervers deleting your mail, along with the resulting low response rate from your mailings, 
then stealth would probably make you happy. LOL

Call us at 1-612-557-0034
for more info and ordering info.  
So give us a call today.










From jkwilli2 at unity.ncsu.edu  Mon Feb 16 03:21:07 1998
From: jkwilli2 at unity.ncsu.edu (Ken Williams)
Date: Mon, 16 Feb 1998 03:21:07 -0800 (PST)
Subject: bugged?
Message-ID: 


anybody have any ideas here?  this is a personal email forwarded to me
from a friend who *might* have cause to believe he is bugged.  this is
coming from a .au domain, btw.

thanx,

TATTOOMAN

http://152.7.11.38/~tattooman

---------- Forwarded message ----------
Date: Mon, 16 Feb 1998 20:41:23 +0930
From: XXX at XXX.XXX
To: jkwilli2 at unity.ncsu.edu
Subject: PGP

Yo tat,

I got pgp 5.0. which will not work with your version. Upgrade man :-)

Oh well I'll tell ya without pgp. It's not that much of a problem the
question I wanted to ask you (well I hope it's not).

Anyway, what I wanted to ask you is whether you might know why I'm getting
a very DISTINCTIVE beep when I connect with my modem to my ISP. The
beep(only once) comes just after the initial dialup and just before all the
noise you get before the connection. 

Sounds wierd and it only started 2 days ago. I never heard a connection
like this before and I'm wondering whether my phone line is being tapped. 

Any suggestions ??

XXXXX

P.S. Just in case my mail is being read by someone other than
Tattooman..here's to you (_|_)







From search at owedmoney.com  Mon Feb 16 04:49:07 1998
From: search at owedmoney.com (search at owedmoney.com)
Date: Mon, 16 Feb 1998 04:49:07 -0800 (PST)
Subject: Over 400 Billion Dollars Is Owed To The North American Public!
Message-ID: <199802161235.EAA00189@funds1.fundsrecovery.com>



ATTENTION:  This is an awareness notification from Personal Funds
Recovery, Inc.  http://www.fundsrecovery.com

We want to inform the North American public about money they are owed,
and then help them get it back.  

There is over 400 billion dollars in unclaimed money in the U.S.  

More than 50% of North Americans are owed a portion of this money.  

You should check to see if you are owed some of this money.

It is unclaimed money that people simply forgot about or never knew
existed.  Here are some examples: checking and savings accounts, 
stocks and bonds, IRA accounts, teacher retirement plans, union
pensions, dividends, payroll checks, insurance policies, security
deposits, safety deposit boxes, pension funds, the Social Security
Administration, United States Treasury, Internal Revenue Service,
and many, many more.

Visit our web site at http://www.fundsrecovery.com and we will conduct
a search for you.  We can also perform a search for companies! 

P.S.  If you wish to be removed from further notifications please reply
by email and include the word remove in the subject heading.





From mrman at mybutt.com  Mon Feb 16 05:49:47 1998
From: mrman at mybutt.com (Xavier Man)
Date: Mon, 16 Feb 1998 05:49:47 -0800 (PST)
Subject: bugged?
In-Reply-To: 
Message-ID: 


Ascend MAX 4000/4002/4004/etc units running certain code versions emit a
"burp" tone  before they initiate carrier.  If your friends ISP is using
these, then he shouldn't have much to worry about.  A quick way to test
would be to just call up the ISP and ask, though that's a little obvious.
What you can do is go to a payphone and make a call to the ISPs dialup
number and see if it emits the tone then.  If it does, I'd go ahead and
make you next call to the ISP.  Just give some poor schmuck in tech
support a hard time and find out what equipment they use for the dialin
pool.  If it's Ascend, then that's your problem.

Mr. Man - mrman at mybutt.com

On Mon, 16 Feb 1998, Ken Williams wrote:

> anybody have any ideas here?  this is a personal email forwarded to me
> from a friend who *might* have cause to believe he is bugged.  this is
> coming from a .au domain, btw.
> 
> thanx,
> 
> TATTOOMAN
> 
> http://152.7.11.38/~tattooman
> 
> ---------- Forwarded message ----------
> Date: Mon, 16 Feb 1998 20:41:23 +0930
> From: XXX at XXX.XXX
> To: jkwilli2 at unity.ncsu.edu
> Subject: PGP
> 
> Yo tat,
> 
> I got pgp 5.0. which will not work with your version. Upgrade man :-)
> 
> Oh well I'll tell ya without pgp. It's not that much of a problem the
> question I wanted to ask you (well I hope it's not).
> 
> Anyway, what I wanted to ask you is whether you might know why I'm getting
> a very DISTINCTIVE beep when I connect with my modem to my ISP. The
> beep(only once) comes just after the initial dialup and just before all the
> noise you get before the connection. 
> 
> Sounds wierd and it only started 2 days ago. I never heard a connection
> like this before and I'm wondering whether my phone line is being tapped. 
> 
> Any suggestions ??
> 
> XXXXX
> 
> P.S. Just in case my mail is being read by someone other than
> Tattooman..here's to you (_|_)
> 
> 






From x at x.com  Mon Feb 16 08:14:49 1998
From: x at x.com (x)
Date: Mon, 16 Feb 1998 08:14:49 -0800 (PST)
Subject: bugged?
Message-ID: <3.0.32.19980216081504.006a9e08@shell15.ba.best.com>


Could be wrong, but mine started beeping when ISP switched to new digital
modems to support 56K.
Now, that obviously doesn't mean he's NOT bugged - but Occam's razor and
all that.


At 06:20 AM 2/16/98 -0500, Ken Williams wrote:
>
>anybody have any ideas here?  this is a personal email forwarded to me
>from a friend who *might* have cause to believe he is bugged.  this is
>coming from a .au domain, btw.
>
>thanx,
>
>TATTOOMAN
>
>http://152.7.11.38/~tattooman
>
>---------- Forwarded message ----------
>Date: Mon, 16 Feb 1998 20:41:23 +0930
>From: XXX at XXX.XXX
>To: jkwilli2 at unity.ncsu.edu
>Subject: PGP
>
>Yo tat,
>
>I got pgp 5.0. which will not work with your version. Upgrade man :-)
>
>Oh well I'll tell ya without pgp. It's not that much of a problem the
>question I wanted to ask you (well I hope it's not).
>
>Anyway, what I wanted to ask you is whether you might know why I'm getting
>a very DISTINCTIVE beep when I connect with my modem to my ISP. The
>beep(only once) comes just after the initial dialup and just before all the
>noise you get before the connection. 
>
>Sounds wierd and it only started 2 days ago. I never heard a connection
>like this before and I'm wondering whether my phone line is being tapped. 
>
>Any suggestions ??
>
>XXXXX
>
>P.S. Just in case my mail is being read by someone other than
>Tattooman..here's to you (_|_)
>
>
>
>





From eureka at eureka.abc-web.com  Mon Feb 16 10:52:28 1998
From: eureka at eureka.abc-web.com (eureka at eureka.abc-web.com)
Date: Mon, 16 Feb 1998 10:52:28 -0800 (PST)
Subject: Eureka! Mon Feb 16 '98
Message-ID: <19980216083643.29514.qmail@eureka.abc-web.com>


Welcome to Monday's issue of Eureka!

FRESHTEENS!
Is there no end to it? Yet again we have succeeded in obtai-
ning a FREE one week trial,  for all Eureka!  subscribers at
another of the net's finest websites. Freshteens offers over
200 video feeds, hot live,  sex shows,  hard XXX movies, hot
XXX stories,  exclusive Texas Teens, and a comprehensive gay
area too. You need a credit card to verify you are an adult,
but will not be charged for your FREE membership. Excellent!
Freshteens ........... http://www.freshteens.com/cproot/1217

100% FREE TEEN SITE
http://www.wildteensex.com
check out this new 100% FREE teen site, we have HOT, HORNY,
and at all time VERY WET young teen girls!

BI-FEM-XXX
This website features two young amateurs kissing and licking
each others pussys.  The images offer easy access with thumb
nails. Not the highest quality images but worth a quick stop.
Bi-Fem-XXX ............... http://www.ravage.com/bi-fem-xxx/

KIMMIES BORDELLO
Cruise by this website to see high resloution, thumbnailed
free pix!  Featuring, blondes, 18 and up, oriental, oral, 
lesbian lover, cum shot, amateurs and steamy erotic fiction.
Kimmies ............... http://www.kimmisbordello.com/kimmi/

GLAMOUR PORTFOLIOS
A must stop on the information porno superhighway!  If you 
like looking at a bunch of beautiful women hanging out by the
pool naked then this is your place. Click on a girl, see her
tits.  Now this is what I call interactive multimedia.  Yes!
Glamour .................. http://www.glamourportfolios.com/

BLUESATIN
This is a very clean well built website.  And it delivers!
They have a paysite attraction but a lot of free images to
show us what they have.  Your choice of oral, anal, teens,
tinkle, toys, hardcore, babes, lesbians, fetish and more!
By the way, if you like watching people urinate, this is it.
Bluesatin .............. http://www.bluesatin.com/index.html

READ THIS!! WIN $25,000 and a Fantasy Date - Click Here Now!
$25,000! ---> http://208.195.150.31/us/us_main.cgi/us_5267/A

HOORAY! THE ADULT SEARCH ENGINE
Now you can search for the sex sites you are looking for and
fast!  This new search engine is setting the standard others
will follow.  It offers pop-up search and detailed listings!
Hooray! -----------------> http://eureka.abc-web.com/hooray/

FREE STREAMING VIDEO
Please note that most of these feeds require a Netscape bro-
wser in order to successfully view them. Unfortunately Micr-
osoft's browser does not have all the features of Netscape's
yet.  However, many of the feeds use the RealPlayer and will
work in most browsers.  If you do not have Netscape and want
a free copy click here --> http://www.netscape.com/download/
3 Blonde --> http://www.spreadteens.com/ian/blondevideo.html

CHAT WITH OTHER READERS
Hey,  if you haven't checked out the Eureka! Chat sites yet,
you're  missing out  on some  great stuff.  Every day you'll
find hundreds of other readers just like you looking to chat
have fun and maybe a little 'cyber'. We know you'll love it!
Adult/Sex Chat -----------------> http://137.39.63.229/chat/
General/Fun Chat -------> http://137.39.63.229/chat/funchat/

HOT LIVE PHONE SEX TO MAKE YOU CUM!
LD Call only! - Live Hot Girls!!!!----------->1-664-410-3912
LIVE: 1-on-1, 2-on-1, Group, Dateline-------->1-800-644-8779
FREE: Live 1-on-1 (international call only)--->011-678-77416

NEW! CENTERFOLD PIC OF THE DAY
Exclusive!  We proudly present  unpublished Pictures of your
favorite Centerfolds.  Featured This Week: Dec 80-PMOY Terri
Welles, Dec 89-Petra Verkaik, Sept 93-Carrie Westcott, Kerri
Kendall,  Rebecca Ferratti,  Lydia Schone and many more too!
---------------------------> http://www.gatefold.com/eureka/

AMATEUR SITE OF THE DAY
PJ: She is a self-described  biker-bitch.  Not only does her
site include  many  nude  pictures  of  her  (and  her large
boobs!) but what makes the  site  is  her sarcastic sense of
humor. This gal  has  a  great  ass  that  has polished many
Harleys, and makes a person  wish  he  had  a hog for her to
ride. Visit her site now, and hold on to those handle bars!
---------------------------> http://amateurindex.com/eureka/

EROTIC STORY SITE OF THE DAY
XXXStories.com: The largest free  erotic  story  site on the
net. Over 400 hot sex stories  on such topics as wife sluts,
virgins, group sex and more...... http://www.xxxstories.com/

DAILY CARTOON ----------> http://www.erosinorbit.com/eureka/

ADULT STAR PIC OF THE DAY
Woah,  our Adult Star pics are getting hotter and hotter, so
make sure you stop by and check out today's - definitely not
to be missed! --------> http://www.xxxadultstars.com/eureka/

OTHER EUREKAS!
GAY EUREKA! ----------> http://eureka.abc-web.com/gayeureka/
DEUTSCH ------> http://eureka.abc-web.com/eureka/deutsch.htm
ESPA�OL ------> http://eureka.abc-web.com/eureka/espanol.htm
FRAN�AIS ----> http://eureka.abc-web.com/eureka/francais.htm
ITALIANO ----> http://eureka.abc-web.com/eureka/italiano.htm
PORTUGUESE > http://eureka.abc-web.com/eureka/portuguese.htm

TODAY'S FREE PIX
Pic  1 --------------------------> http://137.39.63.229/?160
Pic  2 --------------------------> http://137.39.63.229/?161
Pic  3 --------------------------> http://137.39.63.229/?162
Pic  4 --------------------------> http://137.39.63.229/?163
Pic  5 --------------------------> http://137.39.63.229/?164
Pic  6 --------------------------> http://137.39.63.229/?165
Pic  7 --------------------------> http://137.39.63.229/?166
Pic  8 --------------------------> http://137.39.63.229/?167
Pic  9 --------------------------> http://137.39.63.229/?168
Pic 10 --------------------------> http://137.39.63.229/?169

============================================================
TO UNSUBSCRIBE FROM THIS NEWSLETTER,  USE THE REPLY FUNCTION
IN YOUR EMAIL PROGRAM, AND SEND THIS EMAIL RIGHT BACK TO US.
============================================================





From alan at clueserver.org  Mon Feb 16 12:11:07 1998
From: alan at clueserver.org (Alan Olsen)
Date: Mon, 16 Feb 1998 12:11:07 -0800 (PST)
Subject: bugged?
In-Reply-To: 
Message-ID: <3.0.5.32.19980216120541.03d20460@clueserver.org>


At 06:20 AM 2/16/98 -0500, Ken Williams wrote:
>
>anybody have any ideas here?  this is a personal email forwarded to me
>from a friend who *might* have cause to believe he is bugged.  this is
>coming from a .au domain, btw.

Sounds like he has a 56k modem and his ISP just upgraded to the same sort
of 56k modem he has.  That is part of the protocol negotiation.  (In the
future, it will take 30 minutes to finish connecting with a modem, but we
will all get 666k transmission speed over normal phone lines.)

>
>thanx,
>
>TATTOOMAN
>
>http://152.7.11.38/~tattooman
>
>---------- Forwarded message ----------
>Date: Mon, 16 Feb 1998 20:41:23 +0930
>From: XXX at XXX.XXX
>To: jkwilli2 at unity.ncsu.edu
>Subject: PGP
>
>Yo tat,
>
>I got pgp 5.0. which will not work with your version. Upgrade man :-)
>
>Oh well I'll tell ya without pgp. It's not that much of a problem the
>question I wanted to ask you (well I hope it's not).
>
>Anyway, what I wanted to ask you is whether you might know why I'm getting
>a very DISTINCTIVE beep when I connect with my modem to my ISP. The
>beep(only once) comes just after the initial dialup and just before all the
>noise you get before the connection. 
>
>Sounds wierd and it only started 2 days ago. I never heard a connection
>like this before and I'm wondering whether my phone line is being tapped. 
>
>Any suggestions ??
>
>XXXXX
>
>P.S. Just in case my mail is being read by someone other than
>Tattooman..here's to you (_|_)
>
>
---
|              "That'll make it hot for them!" - Guy Grand               |
|"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:         |
| mankind free in one-key-steganography-privacy!"  | Ignore the man      |
|`finger -l alano at teleport.com` for PGP 2.6.2 key  | behind the keyboard.|
|         http://www.ctrl-alt-del.com/~alan/       |alan at ctrl-alt-del.com|





From paul at fatmans.demon.co.uk  Mon Feb 16 12:19:49 1998
From: paul at fatmans.demon.co.uk (Paul Bradley)
Date: Mon, 16 Feb 1998 12:19:49 -0800 (PST)
Subject: your mail
In-Reply-To: <4a7a63d6ddc3e466ede1e561740bd106@anon.efga.org>
Message-ID: 



> I'm in El Paso Texas... so close to the border
> I can see Old Mex outside my window as I write this..
> I'm over there nearly every day for lunch ( I actually
> walk there from my house it's so close) If I write
> a crypto program on my laptop over there and ftp
> it to a web page I have on a server outside the US
> will I have avoided the foolish export regs??
> Does anyone know of someone trying this before?? 


Well, how do you plan on ftping it, if you use a PCMCIA modem car and a  
cellular phone and the cell it transmits to is in the US it could be 
argued that you exported crypto because the data went 
mexico->USA->elsewhere, however, using a normal land-line would be 
totally legal, having said that the program would have to be written 
outside the US, not just carried out on a laptop then ftp`d as otherwise 
you`ve exported. Overall I would recomment flouting the export laws, as 
jumping through hoops to obey these regulations merely panders to the 
wishes of the authorities, anyway, how likely do you think you are to get 
caught? 

        Datacomms Technologies data security
       Paul Bradley, Paul at fatmans.demon.co.uk
  Paul at crypto.uk.eu.org, Paul at cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: FC76DA85
     "Don`t forget to mount a scratch monkey"

 





From tjunker at phoenix.net  Mon Feb 16 12:39:27 1998
From: tjunker at phoenix.net (Thomas Junker)
Date: Mon, 16 Feb 1998 12:39:27 -0800 (PST)
Subject: bugged?
In-Reply-To: <3.0.32.19980216081504.006a9e08@shell15.ba.best.com>
Message-ID: <199802162039.OAA12379@virtual5.c-com.net>


On 16 Feb 98 at 8:16, x wrote:

> Could be wrong, but mine started beeping when ISP switched to new digital
> modems to support 56K.

Same here.  I assumed it was an answer burp for 56K,
followed by a momentary pause to see if the calling modem
responds and negotiates 56K.  Mine isn't, so after the 
pause the ISP modem puts up standard V.34 answer tone.





From wombat at mcfeely.bsfs.org  Mon Feb 16 14:30:30 1998
From: wombat at mcfeely.bsfs.org (Rabid Wombat)
Date: Mon, 16 Feb 1998 14:30:30 -0800 (PST)
Subject: bugged?
In-Reply-To: 
Message-ID: 



His ISP has probably switched to 56K-capable modems. This sounds like a 
recognition tone (a low "brrrrp" sound).

He could try dialing another number from that phone to see if he gets the
tone, or calling the ISP from another location, such as a pay phone, if 
he feels like experimenting.

"Just because you're paranoid doesn't mean that nobody's out to get you."

;)

-r.w.

On Mon, 16 Feb 1998, Ken Williams wrote:

> anybody have any ideas here?  this is a personal email forwarded to me
> from a friend who *might* have cause to believe he is bugged.  this is
> coming from a .au domain, btw.
> 
> thanx,
> 
> TATTOOMAN
> 
> http://152.7.11.38/~tattooman
> 
> ---------- Forwarded message ----------
> Date: Mon, 16 Feb 1998 20:41:23 +0930
> From: XXX at XXX.XXX
> To: jkwilli2 at unity.ncsu.edu
> Subject: PGP
> 
> Yo tat,
> 
> I got pgp 5.0. which will not work with your version. Upgrade man :-)
> 
> Oh well I'll tell ya without pgp. It's not that much of a problem the
> question I wanted to ask you (well I hope it's not).
> 
> Anyway, what I wanted to ask you is whether you might know why I'm getting
> a very DISTINCTIVE beep when I connect with my modem to my ISP. The
> beep(only once) comes just after the initial dialup and just before all the
> noise you get before the connection. 
> 
> Sounds wierd and it only started 2 days ago. I never heard a connection
> like this before and I'm wondering whether my phone line is being tapped. 
> 
> Any suggestions ??
> 
> XXXXX
> 
> P.S. Just in case my mail is being read by someone other than
> Tattooman..here's to you (_|_)
> 
> 
> 





From nobody at REPLAY.COM  Mon Feb 16 17:52:22 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Mon, 16 Feb 1998 17:52:22 -0800 (PST)
Subject: We've been found out
Message-ID: <199802170151.CAA08654@basement.replay.com>


Damn! I thought we had everyone fooled.

Some pissant wrote:
Death of a Legend / The Truth About the CypherPunks:
The CypherPunks have long been renowned as standing at the bleeding edge 
of
the burdgeoning computer technology which is rapidly changing the face 
of our
planet and the governmental, civil, and social societies encompassed 
within
this celestial orb.
Harbingers of the Digital Future / Pioneers of Future Technology / etc., 
etc.
Bullshit...
The CypherPunks are rag-tag band of infantile, pseudo-anarchistic, 
pseudo-
cryptic, well-educated shit-disturbers who take great pleasure in 
pissing on
themselves, each other, and the world around them--all the while, 
covering
their motivations and ambitions with high-sounding ideals intended to 
disguise
the fact that none of them ever received proper toilet-training.


The end result?
No matter how high they pile it, how far they spread it, or how badly it 
smells when you step in it, they end up coming off as the Henry 
Kissinger's
of CyberSpace, because no matter how much rotten meat, jalapenos and 
moldy
cheese they eat, they can never manage to crap out anything so vile and 
foul-
smelling that the world-at-large cannot prove prophetic in MeatSpace.





From nobody at REPLAY.COM  Mon Feb 16 18:28:58 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Mon, 16 Feb 1998 18:28:58 -0800 (PST)
Subject: (none)
In-Reply-To: <199802161748.SAA24779@basement.replay.com>
Message-ID: <199802170228.DAA14045@basement.replay.com>


Anonymous asks:

> If its so easy to make your own biological weapons,
> hoembrewed in a bathtub (or vat or whatever), how
> about posting some web links or pointers?
> 
> If its so easy why haven't more downtrodden
> Americans (there are a lot of loonies in this
> country) tried this stuff out yet?


Because it's so easy to kill yourself doing so.





From Shane.Pearson at tafensw.edu.au  Mon Feb 16 20:01:52 1998
From: Shane.Pearson at tafensw.edu.au (Pearson Shane)
Date: Mon, 16 Feb 1998 20:01:52 -0800 (PST)
Subject: bugged?
Message-ID: 



Hi Alan,

I thought he was refering to that too, but notice
he says the beep is before the negotiation, just
after the dialing.

Bye for now.

> -----Original Message-----
> From:	Alan Olsen [SMTP:alan at clueserver.org]
> Sent:	Tuesday, February 17, 1998 7:06 AM
> To:	Ken Williams
> Cc:	cypherpunks at toad.com; dc-stuff at dis.org;
> hh-chat at gateway-1.secureservers.net
> Subject:	Re: bugged?
> 
> At 06:20 AM 2/16/98 -0500, Ken Williams wrote:
> >
> >anybody have any ideas here?  this is a personal email forwarded to
> me
> >from a friend who *might* have cause to believe he is bugged.  this
> is
> >coming from a .au domain, btw.
> 
> Sounds like he has a 56k modem and his ISP just upgraded to the same
> sort
> of 56k modem he has.  That is part of the protocol negotiation.  (In
> the
> future, it will take 30 minutes to finish connecting with a modem, but
> we
> will all get 666k transmission speed over normal phone lines.)
> 
> >
> >thanx,
> >
> >TATTOOMAN
> >
> >http://152.7.11.38/~tattooman
> >
> >---------- Forwarded message ----------
> >Date: Mon, 16 Feb 1998 20:41:23 +0930
> >From: XXX at XXX.XXX
> >To: jkwilli2 at unity.ncsu.edu
> >Subject: PGP
> >
> >Yo tat,
> >
> >I got pgp 5.0. which will not work with your version. Upgrade man :-)
> >
> >Oh well I'll tell ya without pgp. It's not that much of a problem the
> >question I wanted to ask you (well I hope it's not).
> >
> >Anyway, what I wanted to ask you is whether you might know why I'm
> getting
> >a very DISTINCTIVE beep when I connect with my modem to my ISP. The
> >beep(only once) comes just after the initial dialup and just before
> all the
> >noise you get before the connection. 
> >
> >Sounds wierd and it only started 2 days ago. I never heard a
> connection
> >like this before and I'm wondering whether my phone line is being
> tapped. 
> >
> >Any suggestions ??
> >
> >XXXXX
> >
> >P.S. Just in case my mail is being read by someone other than
> >Tattooman..here's to you (_|_)
> >
> >
> ---
> |              "That'll make it hot for them!" - Guy Grand
> |
> |"The moral PGP Diffie taught Zimmermann unites all| Disclaimer:
> |
> | mankind free in one-key-steganography-privacy!"  | Ignore the man
> |
> |`finger -l alano at teleport.com` for PGP 2.6.2 key  | behind the
> keyboard.|
> |         http://www.ctrl-alt-del.com/~alan/
> |alan at ctrl-alt-del.com|





From press at daltek.net  Mon Feb 16 22:42:17 1998
From: press at daltek.net (press at daltek.net)
Date: Mon, 16 Feb 1998 22:42:17 -0800 (PST)
Subject: Is Your Web Business a Winner?
Message-ID: <199802172247.QAA02202@smokey.redcomet.net>


Checklist for success...

In 1993 there were 200,000 websites.
Today there are 20 million.

Internet sales will jump from 8 Billion today
to $300 Billion in the next five years.

Now - How can shoppers find you...and how to make sure
they buy from you? Do you have the 10 elements
for success? Do you have a powerful plan of attack
to stand out from the crowd?

Send for our free checklist and find out how you
rate. Because 70,000 new domains will be registered
this year - and you need to get ahead of the crowd.

FIND OUT HOW...

One Client's Sales doubled in a month.
One Client went from 0 overseas sales to 70% overseas sales.
One Client went from a small web page to their own server
with four employees taking orders from their computers.
One Client established a chain of retail outlets for their
products.
One Client sold the rights to a country for their products.

These folks all adopted at least one strategy in 
common that works - and you can too.

Email for no-obligation free options today. Just hit reply
and type SEND DETAILS PLEASE. Include your website address
(http://www  ) for free analysis. We guarantee it will amaze you! 

====================================================






From 63062395 at aol.com  Mon Feb 16 22:55:00 1998
From: 63062395 at aol.com (63062395 at aol.com)
Date: Mon, 16 Feb 1998 22:55:00 -0800 (PST)
Subject: *******   Interested in bulk mailing ? ->>> READ THIS!!!   *******
Message-ID: <199802153453CAA8394@post.ur.mx>


            25 MILLION EMAIL  ADDRESSES VIA E-MAIL FOR ONLY $34.95


************************************************************************************************* 
         Your  email  address was given to us as a person interested in business
         opportunities...  IF  THIS  IS  NOT  CORRECT, then  please accept  our
                             apologies. You will NOT be contacted again.

*************************************************************************************************

In order to sell your products, they have to be advertised. ... And in order for you to
buy  them, they  have  to  be advertised. You always need customers. What better
way to find customers that you need?  Through e-mailing. What faster way to send
Ads, Letters and Flyers to millions of people? Through e-mailing. 

We  are  offering  YOU  25  Million  FRESH  E-mail  Addresses  for  the low price of
$34.95. They  are all sorted and ready to be mailed. That is the best deal  anywhere
today! These 25 Million  e-mail addresses are  yours to  keep, so you can use them
over  and  over. Imagine selling  a  product  for  only  $1  and  getting only  a  1/10%
response - that's $250,000  in your pocket !

We also include the FREE stealth mailer as  a  GIFT  to our  customer. This is a lite
version of the incredibly fast  mailing  program that  hides your email  address  when
you send  mail so  no one will  find out where  it  came from and you won't lose your
dial up account.


Print this E-Mail, fill the order form.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 

                                                    ORDER FORM

Yes, send me 25 million of e-mail addresses to my E-Mail address:

_________________________________/_______________________________
                                           Please PRINT TWICE

Enclosed is my payment of  $34.95    ____Check    ____Money order

Name__________________________  Address__________________________

Apt.______City____________________State______ Zip Code______________


                     * Make Check/Money order payable, and mail the form to:

                                                   First Choice Ltd.

                                  14431 VENTURA BLVD., SUITE 142
                                       SHERMAN OAKS, CA 91423 







From pics at bj.janey.com  Mon Feb 16 22:55:31 1998
From: pics at bj.janey.com (pics at bj.janey.com)
Date: Mon, 16 Feb 1998 22:55:31 -0800 (PST)
Subject: OWN YOUR OWN PAYSITE
Message-ID: <99552677_81166594>



Hi,
    Have you ever wondered how paysites pay up to 10 cents or moreper click? The reason is because all the recurring revenue they have!! If you're interested in starting up your own paysite & can send atleast 3 members per day then take a look at http://www.teennympho.com/rawclicks/pprogram.html!! Only people who are serious about the program should apply ;-)

	Thanx,
		Ryan Lanane






From weidai at eskimo.com  Mon Feb 16 23:08:16 1998
From: weidai at eskimo.com (Wei Dai)
Date: Mon, 16 Feb 1998 23:08:16 -0800 (PST)
Subject: payment mix
Message-ID: <19980216211932.17385@eskimo.com>


A payment mix is like an email mix, but instead of mixing and remailing
emails, it mixes and repays payments. This would be useful when the
payment system itself does not offer anonymity. A payment mix basicly
turns any traceable payment system into an anonymous one.

Payment mixes could be chained for additional security, just like email
mixes. But by using blind signatures this could also be avoided. In that
case the payment mix would be acting like a mini ecash mint. To illustrate
how it would work, suppose Alice wants to give $1 to Bob.

1. Alice pays $1 to the payment mix using the traceable payment system.

2. In exchange, the payment mix issues Alice $1 in blinded (Chaumian)
ecash.

3. Alice gives the ecash to Bob.

4. Bob gives the ecash back to the payment mix.

5. The payment mix pays Bob $1 using the traceable payment system.

Notice that because of blinding, in step 4 the payment mix cannot connect
the ecash it gets from Bob to the ecash it issued to Alice.

This is a pretty simple idea, but I don't remember if we talked about it
here already. If blinding is used, a payment mix would basicly BE an ecash
mint, except the cash it issues would be held only momentarily by its
users. Because its total outstanding liability at any given moment would
be fairly low, a payment mix would only have to be minimally trusted.






From U812 at swbell.net  Tue Feb 17 05:58:29 1998
From: U812 at swbell.net (U812 at swbell.net)
Date: Tue, 17 Feb 1998 05:58:29 -0800 (PST)
Subject: Phone rates as low as 3cents/min.
Message-ID: <199802171358.HAA16588@pop2.rcsntx.swbell.net>


NEW Technology Breakthrough will save consumers MILLIONS!

YOU CAN SAVE UP TO 70% on State to State and International calls, even  if your present rate is 9.9 cents/ minute or lower  !

 Never a need to change Providers.

The TeleChron routes calls around your PIC (Primary Interexchange Carrier)
to maximize your savings by searching for the lowest rates available, based
on the time, type and destination of your call. This small box (circuit
board) the size of a cassette tape plugs right into your phone jack.

The Telchron is Int'l patented & FCC approved. US patent, pending. 

For more info. 
On how You may purchase or You may also participate as an
independent distributor of the TeleChron. Note: Earn residuals too! GROUND FLOOR
OPPORTUNITY!!

Send an e-mail to by placing "Product" or "Opportunity" or
"Both" in the subject line to aurapro at yahoo.com
Or call : Terry @ 214-750-4738

We thank you for your time,

Sincerely,

CTX Business Solutions


///////////////////////////////////////////////////////////////////////////////
This Message was Composed using Extractor Pro Bulk E- Mail Software. If 
you wish to be removed from this advertiser's future mailings, please reply 
with the subject "Remove" and this software will automatically block you 
from their future mailings.
////////////////////////////////////////////////////////////////////////////////







From honig at otc.net  Tue Feb 17 09:32:02 1998
From: honig at otc.net (David Honig)
Date: Tue, 17 Feb 1998 09:32:02 -0800 (PST)
Subject: crackers
In-Reply-To: 
Message-ID: <3.0.5.32.19980217091147.007cae80@otc.net>


At 04:22 PM 2/14/98 EST, Ah1261 at aol.com wrote:
>I WOULD LIKE SOME INFO ON PASSWORD CRACKERS EMAIL ME BACK A.S.A.P.
>

ARE PASSWORD CRACKERS LIKE MILK BISCUITS?


------------------------------------------------------------
      David Honig                   Orbit Technology
     honig at otc.net                  Intaanetto Jigyoubu

	Has Nike hired Monica to endorse kneepads yet?





	
















From rdew at el.nec.com  Tue Feb 17 10:46:53 1998
From: rdew at el.nec.com (Bob De Witt)
Date: Tue, 17 Feb 1998 10:46:53 -0800 (PST)
Subject: Letter of the law
Message-ID: <199802171845.KAA11835@yginsburg.el.nec.com>


Doesn't the act of taking it across the border, in the laptop, constitute
an act of export??

> From jkwilli2 at unity.ncsu.edu Sat Feb 14 02:07:45 1998
> X-Authentication-Warning: c00954-100lez.eos.ncsu.edu: jkwilli2 owned process doing -bs
> Date: Sat, 14 Feb 1998 04:27:29 -0500 (EST)
> From: Ken Williams 
> X-Sender: jkwilli2 at c00954-100lez.eos.ncsu.edu
> To: cypherpunks at toad.com
> Subject: Re: Letter of the law
> X-Copyright: The contents of this message may not be reproduced in any form
> X-Copyright: (including Commercial use) unless specific permission is granted
> X-Copyright: by the author of the message.  All requests must be in writing.
> X-Disclaimer: The contents of this email are for educational purposes only
> X-Disclaimer: and do not reflect the thoughts or opinions of either myself
> X-Disclaimer: or my employer and are not endorsed by sponsored by or provided
> X-Disclaimer: on behalf of North Carolina State University.
> MIME-Version: 1.0
> 
> On Fri, 13 Feb 1998, Anonymous wrote:
> 
> >>I'm in El Paso Texas... so close to the border
> >>I can see Old Mex outside my window as I write this..
> >>I'm over there nearly every day for lunch ( I actually
> >>walk there from my house it's so close) If I write
> >>a crypto program on my laptop over there and ftp
> >>it to a web page I have on a server outside the US
> >>will I have avoided the foolish export regs??
> >>Does anyone know of someone trying this before?? 
> >
> >My guess is this:
> >  if it has the name of a US citizen in the copyright
> >notice, it will be assumed to have been made in the
> >US. if the morons even go after you. you still may have
> >a plausable excuse if ever taken to court.
> >after all, you "exported" youself, which is a perfectly
> >legal thing to take out of the country, and "yourself"
> >accidentally spewed a copy of something that couldn't
> >cross the border.
> >I don't think anybody has tried this and been challenged.
> >then again, a lot of us don't have the opportunity.
> >It's easier to ask forgivness than permission...
> >Another easier excuse would be to publish it freely in
> >hardcopy form, and just "happen" to have somebody end up
> >"typing" in your source code abroad, making a legit
> >international copy...
> >-Anon2
> 
> i would think that the big question here, legally, is whether or not you
> would be ustilizing a US ISP and/or cellular provider to make the upload
> of the crypto program to the foreign server via ftp.  as long as all the
> packets stay outside of US borders, in other words, as long as you don't
> use a US ISP and cellular provider, then i don't see how you would be
> violating any laws in this case.
> 
> Regards,
> 
> TATTOOMAN 
> 
> http://152.7.11.38/~tattooman/
> 
Bob De Witt,
rdew at el.nec.com
The views expressed herein are my own,
and are not attributable to any other
source, be it employer, friend or foe.
 





From jkwilli2 at unity.ncsu.edu  Tue Feb 17 10:56:45 1998
From: jkwilli2 at unity.ncsu.edu (Ken Williams)
Date: Tue, 17 Feb 1998 10:56:45 -0800 (PST)
Subject: Letter of the law
In-Reply-To: <199802171845.KAA11835@yginsburg.el.nec.com>
Message-ID: 


On Tue, 17 Feb 1998, Bob De Witt wrote:

>Doesn't the act of taking it across the border, in the laptop, constitute
>an act of export??

well, yes, of course.  that was taken for granted in my comments.
likewise, if you go to a tattoo parlor and get the infamous 4 line
crypto-sig tattooed on your ass, then you are classified as a munition,
and you cannot leave the US.

the only relevant question here regards the odds that a US Customs officer
is going to want you to drop your drawers and bend over...
;-)

ken 

>> >>I'm in El Paso Texas... so close to the border
>> >>I can see Old Mex outside my window as I write this..
>> >>I'm over there nearly every day for lunch ( I actually
>> >>walk there from my house it's so close) If I write
>> >>a crypto program on my laptop over there and ftp
>> >>it to a web page I have on a server outside the US
>> >>will I have avoided the foolish export regs??
>> >>Does anyone know of someone trying this before?? 
>> >
>> >My guess is this:
>> >  if it has the name of a US citizen in the copyright
>> >notice, it will be assumed to have been made in the
>> >US. if the morons even go after you. you still may have
>> >a plausable excuse if ever taken to court.
>> >after all, you "exported" youself, which is a perfectly
>> >legal thing to take out of the country, and "yourself"
>> >accidentally spewed a copy of something that couldn't
>> >cross the border.
>> >I don't think anybody has tried this and been challenged.
>> >then again, a lot of us don't have the opportunity.
>> >It's easier to ask forgivness than permission...
>> >Another easier excuse would be to publish it freely in
>> >hardcopy form, and just "happen" to have somebody end up
>> >"typing" in your source code abroad, making a legit
>> >international copy...
>> >-Anon2
>> 
>> i would think that the big question here, legally, is whether or not you
>> would be ustilizing a US ISP and/or cellular provider to make the upload
>> of the crypto program to the foreign server via ftp.  as long as all the
>> packets stay outside of US borders, in other words, as long as you don't
>> use a US ISP and cellular provider, then i don't see how you would be
>> violating any laws in this case.
>> 
>> Regards,
>> 
>> TATTOOMAN 
>> 
>> http://152.7.11.38/~tattooman/
>> 
>Bob De Witt,
>rdew at el.nec.com
>The views expressed herein are my own,
>and are not attributable to any other
>source, be it employer, friend or foe.
> 
>

TATTOOMAN

/--------------------------[   TATTOOMAN   ]--------------------------\
| ORG: NC State Computer Science Dept    VP of The  E. H. A. P. Corp. |
| EML: jkwilli2 at adm.csc.ncsu.edu         ehap at hackers.com             |
| EML: jkwilli2 at unity.ncsu.edu           ehap-secure at hackers.com      |
| WWW: http://www4.ncsu.edu/~jkwilli2/   http://www.hackers.com/ehap/ |
| FTP: ftp://152.7.11.38/pub/personal/tattooman/                      |
| W3B: http://152.7.11.38/~tattooman/w3board/                         |
| PGP: finger tattooman at 152.7.11.38                                   |
\----------------[   http://152.7.11.38/~tattooman/  ]----------------/







From hharc at damacus.dyn.ml.org  Tue Feb 17 12:40:16 1998
From: hharc at damacus.dyn.ml.org (Damacus -HHChat)
Date: Tue, 17 Feb 1998 12:40:16 -0800 (PST)
Subject: [HH-CHAT] bugged?
In-Reply-To: 
Message-ID: 


I don't know if there has been any ideas sent in reply to this yet, but it
is possible that this user has an X2 modem (it makes a beep before the
completion of a handshake to detect an X2 serving modem) or possibly a
K56flex (although I've nbever connected using one befire).  

Adios,

-D

On Mon, 16 Feb 1998, Ken Williams wrote:

> anybody have any ideas here?  this is a personal email forwarded to me
> from a friend who *might* have cause to believe he is bugged.  this is
> coming from a .au domain, btw.
> 
> thanx,
> 
> TATTOOMAN
> 
> http://152.7.11.38/~tattooman
> 
> ---------- Forwarded message ----------
> Date: Mon, 16 Feb 1998 20:41:23 +0930
> From: XXX at XXX.XXX
> To: jkwilli2 at unity.ncsu.edu
> Subject: PGP
> 
> Yo tat,
> 
> I got pgp 5.0. which will not work with your version. Upgrade man :-)
> 
> Oh well I'll tell ya without pgp. It's not that much of a problem the
> question I wanted to ask you (well I hope it's not).
> 
> Anyway, what I wanted to ask you is whether you might know why I'm getting
> a very DISTINCTIVE beep when I connect with my modem to my ISP. The
> beep(only once) comes just after the initial dialup and just before all the
> noise you get before the connection. 
> 
> Sounds wierd and it only started 2 days ago. I never heard a connection
> like this before and I'm wondering whether my phone line is being tapped. 
> 
> Any suggestions ??
> 
> XXXXX
> 
> P.S. Just in case my mail is being read by someone other than
> Tattooman..here's to you (_|_)
> 
> 






From twaweb at inet2.twa.com  Tue Feb 17 16:54:00 1998
From: twaweb at inet2.twa.com (Trans World Specials)
Date: Tue, 17 Feb 1998 16:54:00 -0800 (PST)
Subject: Trans World Specials Fare Sales
Message-ID: <19980217210008.25649.qmail@inet2.twa.com>


Welcome to Trans World Specials for 
 February 17th, 1998. 
 
 All tickets must be purchased by February 
 20th, 1998. Domestic fares are valid for outbound
 travel 2/21/98 and returning 2/23 or
 2/24/98.  New York to Milan fare is valid
 for outbound travel 2/20 or 2/21/98 
 and returning 2/24/or 2/25/98. 
 
 We have great fares to help you enjoy	
 the weekend. Relax on the beaches of 
 San Diego, or stroll the world class 
 shopping district in Milan. 
 
 
 On to this week's Trans World Specials.
 
 
 Roundtrip fare:		From:		To:
 
 $248			New York (JFK)	Milan(MXP)
 
 
 Out International fare is valid FROM New York TO Milan only.  As usual, 
 Domestic fares may originate in either city. 
 
 
 Roundtrip fare:		To/From:
 
 $69			St. Louis, MO (STL) / Nashville, TN (BNA)
 $69			St. Louis, MO (STL) / Cedar Rapids, IA (CID)
 $69			St. Louis, MO (STL) / Dayton, OH (DAY)
 
 
 $79			St. Louis, MO (STL) / Oklahoma City, OK (OKC)
 $79			St. Louis, MO (STL) / Shreveport, LA (SHV)
 $79			St. Louis, MO (STL) / Knoxville, TN (TYS)
 $79			Nashville, TN (BNA) / Cedar Rapids, IA (CID)
 
 
 $99			Nashville, TN (BNA) / Oklahoma City, OK (OKC)
 
 
 $129			Cedar Rapids, IA (CID) / Ontario, CA (ONT)
 $129			Newark, NJ (EWR) / Cedar Rapids, IA (CID)
 $129			Newark, NJ (EWR) / Oklahoma City, OK (OKC)
 $129			Newark, NJ (EWR) / Shreveport, LA (SHV)
 $129			Newark, NJ (EWR) / St. Louis, MO (STL)
 $129			Oklahoma City, OK (OKC) / Dayton, OH (DAY)
 
 
 $159			Dayton, OH (DAY) / Ontario, CA (ONT)
 $159			Dayton, OH (DAY) / San Diego, CA (SAN)
 $159			St. Louis, MO (STL) / Ontario, CA (ONT)
 $159			St. Louis, MO (STL) / San Diego, CA (SAN)
 $159			Ontario, CA (ONT) / Shreveport, LA (SHV)
 
 
 Call TWA at 1-800-221-2000 and book your Trans World Special today !
 
 
 
 ***********************************GETAWAY VACATIONS********************
 
 
 HAWAII OUTRIGGER MAILE SKY COURT INCLUDES:
 
 - roundtrip economy airfare
 - 5 nights accommodations at the Maile Sky Court
 - all rooms have refrigerator, cable TV and in-room movies
 - hotel features T.G.I. Friday's restaurant
 - 3 blocks from Waikiki beach
 - 2000 bonus FFB miles in addition to actual miles earned
 - only $599 from New York, Philadelphia, and Miami
 - only $659 from St. Louis
 
 
 BEST OF EGYPT FROM $2999 INCLUDES:
 
 - 7 night Nile Cruise
 - visit Cairo, Alexandria, Dendera, Luxor, Aswan, Abu, Simbel, Sakkara, Memphis
 - all meals while cruising
 - buffet breakfast daily
 - roundtrip economy airfare to Cairo
 - economy air tickets Cairo-Luxor, Aswan-Abu, and Simbel-Cairo
 - depart 3/27/98 from Chicago, St. Louis, Houston, Detroit, or Cleveland
 - 5000 bonus FFB miles in addition to actual miles earned
 
 Call 1-800-GETAWAY(438-2929) and book your Getaway Vacation today !
 
 
 
 ************************************ALAMO*******************************
 
 Alamo offers these low rates for an economy car valid 2/21/98 - 2/23/98
 
 
 $17.99		St. Louis, Dayton, Oklahoma City, 
 
 $20.99		Nashville, Newark, Shreveport, Knoxville
 
 $21.99		San Diego, Ontario
 
 For reservations call Alamo at 1-800-GO-ALAMO and request rate code RT
 and ID # 443833. For online reservations visit Alamo at
 http://www.goalamo.com
 
 
 ***********************************HILTON*******************************
 
 Hilton Hotels/Resorts offers this low rate valid the nights of 2/21/98-
 2/23/98.
 
 
 $93		Fort Lee Hilton, Fort Lee, NJ ( only 10 miles from Manhattan)
 
 
 For reservations call Hilton at 1-800-774-1500 and ask for Hilton Value Rates.
 Visit Hilton at http://www.hilton.com
 
 
 ******************************TERMS AND CONDITIONS**********************
 
 
 Airfare Terms and Conditions: 
 GENERAL CONDITIONS: Fares shown are round trip, nonrefundable and 
 are subject to change. Changes to itinerary are not permitted.
 Fares do not include Passenger Facility Charges of up to $12 
 depending on itinerary. Offer is not available in conjunction with 
 any other discount, coupon or promotional offer. Seats are limited 
 and may not be available on all flights or days of the week. Tickets 
 must be purchased at time of booking and no later than 2/20/98. 
 Standby passengers not allowed.  DOMESTIC: Valid for outbound travel 
 on Saturday (2/21) and return Monday (2/23) or Tuesday (2/24). 
 Travel is effective 2/21/98 with all travel to be completed by 
 2/24/98. Minimum stay is 2 days. Maximum stay is 3 days. Must use 
 E-Ticketing for domestic travel. Credit card is the only form of 
 payment accepted. 
 
 INTERNATIONAL: Valid for outbound travel on Friday (2/20) or Saturday 
 (2/21) and return Tuesday (2/24) or Wednesday (2/25). Travel is 
 effective 2/20/98 with all travel completed by 2/25/98. A $47 fee 
 for customs/immigration/APHIS fee/U.S. departure tax and security
 surcharges apply. An additional Italian departure tax of $9.00 also 
 applies. Tickets must be purchased at time of booking and no later than
 2/20/98. 
 
 Getaway Conditions: 
 ALL PACKAGES: Package includes round-trip economy airfare. Price is per 
 person based on double occupancy and is subject to change.  
 Availability, restrictions, surcharges, blackouts and cancellation 
 penalties apply. No other discounts or promotions are valid in 
 conjunction with these packages. 
 
 DOMESTIC CONDITIONS: Depart for Hawaii Wednesday or Thursday and return 
 Monday or Tuesday. Travel is valid 4/15-5/28/98 with all travel 
 completed by 6/3/98. Price does not include Passenger Facility Charges 
 of up to $16 per person. Full payment due by 2/20/98. 
 
 INTERNATIONAL CONDITIONS: Seats are limited and may not be available on 
 all flights. Price does not include Passenger Facility Charges, US 
 departure/arrival, agriculture and security fees from point of origin 
 of travel up to approximately $68 per person. Single suppliment $499. 
 Full payment is required by 2/23/98. 
 
 Car Rental Conditions: 
 Taxes (including in California, VLF taxes ranging up to $1.89 per day), 
 registrations fee/tax reimbursement, and airport access fees/taxes, if
 any, are extra. Optional CDW, liability insurance, fuel, additional 
 driver fee, drop charges and other optional items are extra. Rates 
 higher for renters under age 25. Rates valid for rentals commencing
 on Saturday and ending by 11:59 PM on Tuesday. Rates only valid during
 week in which they are published via TWA Internet site. A 24-hour 
 advance reservation is required. Availability is limited. 
 
 Hotel Conditions: 
 Hilton Hotels and Resorts special rates are available only during the 
 specific week in which they are published via the TWA Hot Deals 
 Internet site and the HiltonNet Internet site. Limited availability; 
 rooms at these Hilton Value Rates are sold on a first-come, 
 first-served basis. Availability, rate, and terms of occupancy are 
 not guaranteed and will be confirmed at time of reservation. 
 Participating hotels, rates and terms are subject to change without 
 notice. Single or double occupancy. Early check-in, late check-out 
 subject to availability. No extra charge for children when they 
 stay in parents' or grandparents' room; total room occupancy 
 subject to local fire safety regulations and other applicable laws 
 or regulations. Rates vary by season, do not include any other fees 
 or charges, including without limitation state or local taxes or 
 gratuities and are subject to change without notice. Advance booking 
 required. Advance deposit may be required. Offer cannot be combined 
 with any other special discounts, coupons, certificates, special 
 rates, promotional offers, award stays, or meeting/group stays.  
 Hilton reserves the right to cancel any Hilton Value Rate at any 
 time without notice. Hilton is not responsible for the terms of 
 other offers in the program, or for any electronic, computer, 
 telephone, security, virus or any other problem or damage related 
 to use of the program or its offers. 
 
 
 
 For reservations call 1-800-221-2000 (domestic) or 1-800-892-4141 
 (international) or call your travel agent and ask for TWA's special 
 Internet fares. 
 
 Remember to ask for Trans World� Electronic Ticketing when you 
 book your special Internet fare! 
 
 
 
 







From honig at otc.net  Tue Feb 17 17:34:56 1998
From: honig at otc.net (David Honig)
Date: Tue, 17 Feb 1998 17:34:56 -0800 (PST)
Subject: $10million logic bomb goes off
Message-ID: <3.0.5.32.19980217163006.007a06e0@otc.net>



http://biz.yahoo.com/upi/98/02/17/general_state_and_regional_news/nyzap_1.html

Tuesday February 17 4:16 PM EST 

Fired programmer zaps old firm

NEWARK, N.J., Feb. 17 (UPI) _ A disgruntled computer programmer dismissed
from a defense contractor has been arraigned for
allegedly zapping his old firm's computer system in retaliation, causing
losses of $10 million. 

Timothy Lloyd of Wilmington, Del. worked as the computer network programmer
for Omega Engineering Corp., in Bridgeport, N.J. The
company, which has offices in Stamford, Conn., and elsewhere in the world,
produces high-tech measurement and control instruments
used by the U.S. Navy and NASA. 

Lloyd was fired from Omega on July 10, 1996, after working there for about
11 years. Twenty days after his dismissal he allegedly
activated a computer ``bomb'' that permanently deleted all of the company's
design and production programs, costing the company about
$10 million in sales and contracts. 

Philadelphia Secret Service head Danny Spriggs says the $10 million in
damages is believed to be one of the most expensive computer
sabotage cases they have ever investigated. 

Lloyd was also charged with stealing $50,000 in computer equipment from
Omega and taking it home. 

U.S. District Judge William Walls set bail at $25,000 and scheduled trial
for April 20. 

If convicted Lloyd faces up to five years for the sabotage count and up to
10 years for the theft count. He could also be ordered to pay
restitution and fines. 

_- 
------------------------------------------------------------
      David Honig                   Orbit Technology
     honig at otc.net                  Intaanetto Jigyoubu

	Has Nike hired Monica to endorse kneepads yet?





	
















From rdew at el.nec.com  Tue Feb 17 18:30:18 1998
From: rdew at el.nec.com (Bob De Witt)
Date: Tue, 17 Feb 1998 18:30:18 -0800 (PST)
Subject: Letter of the law
Message-ID: <199802180228.SAA12074@yginsburg.el.nec.com>


Ken,

I guess I was thinking about the NSA, recording the message and deciding to 
make an example.  They seem to do that occassionally just to keep the rest
of us folks 'in line'.  I can't see the INS even understanding what they 
were looking at, even if you showed them.  "My, my, my!  All those bits are
really in that little box?"  You have to understand the difference between
a 'large possibility' and a 'fat chance', yes?

Now, drugs!  That they understand ...  But a PKI key?  Or, a file??  Or, a
crypto program (especially renamed)???  What piece of this trick question 
am I missing?

Bob De Witt,
 rdew at el.nec.com
The views expressed herein are my own,
and are not attributable to any other
source, be it employer, friend or foe.


> From jkwilli2 at unity.ncsu.edu Tue Feb 17 10:56:22 1998
> X-Authentication-Warning: c00954-100lez.eos.ncsu.edu: jkwilli2 owned process doing -bs
> Date: Tue, 17 Feb 1998 13:56:29 -0500 (EST)
> From: Ken Williams 
> X-Sender: jkwilli2 at c00954-100lez.eos.ncsu.edu
> To: Bob De Witt 
> cc: cypherpunks at toad.com
> Subject: Re: Letter of the law
> X-Copyright: The contents of this message may not be reproduced in any form
> X-Copyright: (including Commercial use) unless specific permission is granted
> X-Copyright: by the author of the message.  All requests must be in writing.
> X-Disclaimer: The contents of this email are for educational purposes only
> X-Disclaimer: and do not reflect the thoughts or opinions of either myself
> X-Disclaimer: or my employer and are not endorsed by sponsored by or provided
> X-Disclaimer: on behalf of North Carolina State University.
> MIME-Version: 1.0
> 
> On Tue, 17 Feb 1998, Bob De Witt wrote:
> 
> >Doesn't the act of taking it across the border, in the laptop, constitute
> >an act of export??
> 
> well, yes, of course.  that was taken for granted in my comments.
> likewise, if you go to a tattoo parlor and get the infamous 4 line
> crypto-sig tattooed on your ass, then you are classified as a munition,
> and you cannot leave the US.
> 
> the only relevant question here regards the odds that a US Customs officer
> is going to want you to drop your drawers and bend over...
> ;-)
> 
> ken 
> 
> >> >>I'm in El Paso Texas... so close to the border
> >> >>I can see Old Mex outside my window as I write this..
> >> >>I'm over there nearly every day for lunch ( I actually
> >> >>walk there from my house it's so close) If I write
> >> >>a crypto program on my laptop over there and ftp
> >> >>it to a web page I have on a server outside the US
> >> >>will I have avoided the foolish export regs??
> >> >>Does anyone know of someone trying this before?? 
> >> >
> >> >My guess is this:
> >> >  if it has the name of a US citizen in the copyright
> >> >notice, it will be assumed to have been made in the
> >> >US. if the morons even go after you. you still may have
> >> >a plausable excuse if ever taken to court.
> >> >after all, you "exported" youself, which is a perfectly
> >> >legal thing to take out of the country, and "yourself"
> >> >accidentally spewed a copy of something that couldn't
> >> >cross the border.
> >> >I don't think anybody has tried this and been challenged.
> >> >then again, a lot of us don't have the opportunity.
> >> >It's easier to ask forgivness than permission...
> >> >Another easier excuse would be to publish it freely in
> >> >hardcopy form, and just "happen" to have somebody end up
> >> >"typing" in your source code abroad, making a legit
> >> >international copy...
> >> >-Anon2
> >> 
> >> i would think that the big question here, legally, is whether or not you
> >> would be ustilizing a US ISP and/or cellular provider to make the upload
> >> of the crypto program to the foreign server via ftp.  as long as all the
> >> packets stay outside of US borders, in other words, as long as you don't
> >> use a US ISP and cellular provider, then i don't see how you would be
> >> violating any laws in this case.
> >> 
> >> Regards,
> >> 
> >> TATTOOMAN 
> >> 
> >> http://152.7.11.38/~tattooman/
> >> 
> >Bob De Witt,
> >rdew at el.nec.com
> >The views expressed herein are my own,
> >and are not attributable to any other
> >source, be it employer, friend or foe.
> > 
> >
> 
> TATTOOMAN
> 
> /--------------------------[   TATTOOMAN   ]--------------------------\
> | ORG: NC State Computer Science Dept    VP of The  E. H. A. P. Corp. |
> | EML: jkwilli2 at adm.csc.ncsu.edu         ehap at hackers.com             |
> | EML: jkwilli2 at unity.ncsu.edu           ehap-secure at hackers.com      |
> | WWW: http://www4.ncsu.edu/~jkwilli2/   http://www.hackers.com/ehap/ |
> | FTP: ftp://152.7.11.38/pub/personal/tattooman/                      |
> | W3B: http://152.7.11.38/~tattooman/w3board/                         |
> | PGP: finger tattooman at 152.7.11.38                                   |
> \----------------[   http://152.7.11.38/~tattooman/  ]----------------/
> 
> 
> 





From mark at mtcnet.com  Tue Feb 17 18:43:31 1998
From: mark at mtcnet.com (mark at mtcnet.com)
Date: Tue, 17 Feb 1998 18:43:31 -0800 (PST)
Subject: CAN WE SWAP LINKS?                         ******************Please DO NOT consider this SPAM!******************
Message-ID: <199802180236.SAA26956@pumpkin.cdepot.net>



Hi, 

It's not a secret that the best way to attract traffic is through links from other sites. We currently have apx. 250 links from other sites TO US! This is nothing compared to Yahoo which has over 800,000 links from other sites. We are setting up a links page and offering a link to every domain or page that links to us. 

If interested visit our site at: http://www.mtcnet.com. If our site is ok link to us and send back your site address and category as IT WOULD FIT ON OUR LINK PAGE AT: http://www.mtcnet.com/links/ and we will link back to you. You should link to our main page: www.mtcnet.com and we will link to your main page.

Our site currently gets apx. 30,000+ views a month. 

Thanks,

Mark Cushman

P.S. We reserve the right as to which sites we will link back to, ie. no pornographic or related sites. If it's OK for my kids we will link back.








From rlbrye at daltek.net  Tue Feb 17 19:02:41 1998
From: rlbrye at daltek.net (rlbrye at daltek.net)
Date: Tue, 17 Feb 1998 19:02:41 -0800 (PST)
Subject: FREE Pentium II Computer!!!
Message-ID: <199802180257.VAA11204@apollo.redcomet.net>


You have been selected to receive this message because of your presence on
the World Wide Web.  If you wish to be removed from future mailings, please reply
with the subject  "Remove" and your address will be blocked from  future mailings.
////////////////////////////////////////////////////////////////////////////////

Would you like to Win a Free Pentium II Computer?...A Bahamas Vacation for two?...
Free advertising??

These are just a few of the fabulous prizes that will be awarded to subscribers to the
Enews over the next few months...and the best part is the subscription is FREE!!

Whether you are involved in an online  business or not.....This FREE weekly
Newsletter will benefit you....and cost you nothing!!!

Each issue of the FREE Enews is packed with informative articles on 
doing business on the net, tax tips, methods of analyzing 
opportunities, reviews of new businesses, reader comments, analysis 
of products to help your net business, etc. 

We have had rave reviews from our readers about the meaningful 
content and most of our new subscribers are referred by current 
subscribers.

We would like to have you as a subscriber and it costs you nothing, 
ever! That is the best part. To subscribe:

       mail to:rlbrye at daltek.net?subject=subad4

As soon as you subscribe, an issue will be sent out to you and then 
each Wednesday you will receive a new issue. Thanks for your time and 
we look forward to keeping you informed on the latest net marketing 
techniques.

Don't delay....Only subscribers are eligible to win the prizes in our fabulous
giveaways!!!  Subscribe Today!

Good luck in all your endeavors.








From anon at anon.efga.org  Tue Feb 17 19:03:41 1998
From: anon at anon.efga.org (Anonymous)
Date: Tue, 17 Feb 1998 19:03:41 -0800 (PST)
Subject: No Subject
Message-ID: <6c52fc4fbf1b77f88e3aeb3fffb90659@anon.efga.org>


>Doesn't the act of taking it across the border, in the laptop, constitute
>an act of export??

Well, yes it would, but the original scenario includes WRITING the code
outside of the US, which means it never was a US creation, even if the
creature that happened to be writing the code was native to the US.

The question is whether the dude could pull a stunt like this and get
away with it. I'd say go for it. You got a plausible loophole to a
stupid law that might not hold in court anyways.

-Anon







From nobody at REPLAY.COM  Tue Feb 17 19:04:31 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Tue, 17 Feb 1998 19:04:31 -0800 (PST)
Subject: description of my stream cipher
Message-ID: <199802180304.EAA02881@basement.replay.com>



Subject:      description of my stream cipher
From:         Jouni Vuorio 
Date:         1998/02/17
Message-ID:   <34E9D794.371 at vtoy.fi>
Newsgroups:   sci.crypt

[Subscribe to sci.crypt] 
[More Headers]


Here is description of my stream cipher, it operates one
byte at time, instead of one bit at time.
it�s key length is up to 255 bytes (2040 bits)

im sure that there are no need for longer description,
becourse that vb source code explanes details.
only thing that could be difficult to understund is
Asc(Mid(Text2, R2 - 1, 1)) that simppely means that
take asci value from text (in this case string text2)
starting from R2 - 1 and length of 1. i think that
everyone understunds the rest.


VB source code:

Initializing the substitution-box
On Error Resume Next

D = Len(Key)
R = 1

For R2 = 1 To 256
H1 = Asc(Mid(Text2, R2 - 1, 1))
K1 = Asc(Mid(Text2, R, 1))
K2 = Asc(Mid(Text2, D Mod Len(Text2), 1))
K3 = Asc(Mid(Text2, D * R Mod Len(Text2), 1))
K4 = Asc(Mid(Text2, R + D Mod Len(Text2), 1))

R1 = ((R1 + R2 + K + 1) Xor (R1 * R2 + 1)) Mod 256
R3 = ((R3 + R1 + 1) + R2 + (R1 * K + 1 Mod (R3 + R1 + 1))) Mod 256
R4 = (R4 + R3 + R1 + 1) ^ 2 Mod 256

R = R + 1
If (R - 1) = Len(Text2) Then R = 1

C = (C + (H1 + K1 + K2 + K3 + K4 + D + R1 + R3 + R4) Mod 256) Mod 256
C = C Mod 256


SBox = SBox & Chr(C Mod 255 + 1)
Next






On Error Resume Next

Key = Text2
texti = Text1
Text1 = ""


R = 1
S1 = Len(Key)
S2 = 11
For R2 = 1 To Len(texti)
C = Asc(Mid(texti, R2, 1)) - 1
K = (K + Asc(Mid(Key, R2 Mod Len(Key), 1))) Mod 256
K = (K + Asc(Mid(SBox, (((K * R2 Mod 256) - 255) * -1) Mod 257, 1))) Mod
256

R1 = ((R1 + R2 + K) Xor (R1 * R2)) Mod 256
R3 = ((R3 + R1) + R2 + (R1 * K Mod (R3 + R1))) Mod 256
R4 = (R4 + R3 + R1) ^ 2 Mod 256


F1 = (F1 + (Asc(Mid(SBox, R1 Mod 256, 1)) Mod 256) Mod 256)
F2 = (F2 + (Asc(Mid(SBox, R2 Mod 256, 1)) Mod 256) Mod 256)
F3 = (F3 + (Asc(Mid(SBox, R3 Mod 256, 1)) Mod 256) Mod 256)
F4 = (F4 + (Asc(Mid(SBox, R4 Mod 256, 1)) Mod 256) Mod 256)
F5 = (F5 + (Asc(Mid(SBox, K Mod 256, 1)) Mod 256) Mod 256)
temp = F1 + F2 + F3 + F4 + F5 + M Mod 256
F = (F + (Asc(Mid(SBox, temp, 1)) Mod 256) Mod 256)

M = M + 1
If M = 2 Then M = 0


If M = 0 Then C = C Xor ((F + K) Mod 256)
If M = 1 Then C = C Xor ((((F + K) Mod 256) - 255) * -1)


C = (C Mod 256) + 1


Mid(texti, R2, 1) = Chr(C)
Next



Text1 = texti

-- 
Jouni.vuorio at vtoy.fi             GSM 050-5456235
PahaeNTeist� soNTaa viNTi�t peNTteihin aseNTavat...







From sheriff at speakeasy.org  Tue Feb 17 19:06:36 1998
From: sheriff at speakeasy.org (The Sheriff)
Date: Tue, 17 Feb 1998 19:06:36 -0800 (PST)
Subject: Handling spam
Message-ID: 


For those of you who use mail-reading/downloading softs
that let you filter your messages based on header/body 
content (ie Eudora, ect), I've found a helpfull tool
that assists in the filtering out of spam.

If the Sender: header is "owner-cypherpunks at toad.com"
and the To: line does not contain the list address, you
can easily get a lot of the spam that comes through here.
I've resigned myself to creatively filtering out the spam
into the trash folder (or your equivilent, like deleting)
and leaving it at that, because of time constraints.

Best wishes and fresh-roasted peanut taste,
The Sheriff. -- ******
---
As kinky as this sounds, finger sheriff at speakeasy.org 
for my RSA PGP public key and my ICQ UIN.  If you don't
know what a UIN is, head on over to http://www.icq.com :)
---
Any and all commercial e-mail will be subject to a $5000
downloading, archival and consulting fee.  Cash/MO only.
Refusals will result in a default judgement of $10,000
and persuit from my favorite collection agency. NO SPAM!
---
     --- BEGIN INFLAMATORY BLOCK ---
Version: 0 (Survivors)
Comments: I was stewing about cliques when the rhyming
          bug bit.

          Watch them gather,
          watch them play.
          Watch the mailman
          blow them away.
     ---  END INFLAMATORY BLOCK  ---







From anon at anon.efga.org  Tue Feb 17 20:31:18 1998
From: anon at anon.efga.org (Anonymous)
Date: Tue, 17 Feb 1998 20:31:18 -0800 (PST)
Subject: No Subject
Message-ID: <2d903692314a67a27cf3a173ba82fd9f@anon.efga.org>


nobody at REPLAY.COM wrote:
-----------------------------------------------------
Here is description of my stream cipher, it operates one
...
...
VB source code:
^^^^^^^^^^^^^^^

------------------------------------------------------
Who the hell uses VB of all languages - to write
a crypto algorithm? And, which sane person uses
MicroSucks Winduhz? 







From rdew at el.nec.com  Tue Feb 17 21:14:31 1998
From: rdew at el.nec.com (Bob De Witt)
Date: Tue, 17 Feb 1998 21:14:31 -0800 (PST)
Subject: Stupid Law
Message-ID: <199802180443.UAA12254@yginsburg.el.nec.com>


Yes, it is.  Even if he wrote a program in Mexico, but carried his laptop
back and forth daily, each piece can come into the US, but cannot leave
again!  Uuuuuuuuummmmmmm, gooooood!  Read the actual documents.


Bob De Witt,
rdew at el.nec.com


> From anon at anon.efga.org Tue Feb 17 19:44:29 1998
> Date: Tue, 17 Feb 1998 22:08:26 -0500
> From: Anonymous 
> Comments: This message did not originate from the Sender address above.
> 	It was remailed automatically by anonymizing remailer software.
> 	Please report problems or inappropriate use to the
> 	remailer administrator at .
> To: cypherpunks at toad.com
> 
> >Doesn't the act of taking it across the border, in the laptop, constitute
> >an act of export??
> 
> Well, yes it would, but the original scenario includes WRITING the code
> outside of the US, which means it never was a US creation, even if the
> creature that happened to be writing the code was native to the US.
> 
> The question is whether the dude could pull a stunt like this and get
> away with it. I'd say go for it. You got a plausible loophole to a
> stupid law that might not hold in court anyways.
> 
> -Anon
> 
> 
> 





From alexm at smug.adelaide.edu.au  Tue Feb 17 21:38:47 1998
From: alexm at smug.adelaide.edu.au (Nightmare)
Date: Tue, 17 Feb 1998 21:38:47 -0800 (PST)
Subject: bugged?
In-Reply-To: 
Message-ID: <199802180534.QAA07609@mulder.smug.adelaide.edu.au>


> 
> anybody have any ideas here?  this is a personal email forwarded to me
> from a friend who *might* have cause to believe he is bugged.  this is
> coming from a .au domain, btw.
> 
> thanx,
> 
> TATTOOMAN
 
> I got pgp 5.0. which will not work with your version. Upgrade man :-)
> 
> Oh well I'll tell ya without pgp. It's not that much of a problem the
> question I wanted to ask you (well I hope it's not).
> 
> Anyway, what I wanted to ask you is whether you might know why I'm getting
> a very DISTINCTIVE beep when I connect with my modem to my ISP. The
> beep(only once) comes just after the initial dialup and just before all the
> noise you get before the connection. 
> 
> Sounds wierd and it only started 2 days ago. I never heard a connection
> like this before and I'm wondering whether my phone line is being tapped. 
> 
> Any suggestions ??
> 
> XXXXX
> 
> P.S. Just in case my mail is being read by someone other than
> Tattooman..here's to you (_|_)
> 

What have you been doing wrong??  :)

Anyway suggestions are;

1) You can use a voltage check , if you want, but there are ways around that..

Someone actually emailed the list a while back re overcoming this problem,
email me privately if you are still looking and ill dig up the schematics
for it for you. but you can use a modified power up system to maintain the
initial voltage level.

2) Or, have fun with the possibilty.

Get a good friend in with you, one you can trust, and one you can ring at 
any hour..

It takes upto two weeks to transcribe a recorded phone conversation, unless
you are involved with drugs. which is the next part of the good time. talk about
drug dealing and arms trading , prostition etc, with your friend for the next 2-3
weeks. he can call you from a public phone.
then one night ring him up, in a mad panic, claiming that you just 
caught somone trying to break into your house, and you clubbed him over
the head and killed him. then make plans for him to help you dispose of
the body and have a human shaped "thing" in a bag that you can then carry out
at night to his car..

If your phone is being taped you should have a police escort all ready to help
you load the car...

Time consuming but a sure thing  ;)
trust me...

The other option is using a reprogrammed mobile phone for just those kind of 
conversations, but thats naughty....

or buying the optus card package, aus only, for about $70-00, which gives
you a simm card and sixty dollars worth of calls.. phone is not supplied.

hurry though, as the feds want these cards to be name registered, as they can 
presently be bought with no ID.. great for those untraceable dealings...

Well thats about it without thinking.

If you need help , to tattooman's friend, email me privately.
from one OZ to another..

Seeya.

--------------------------------------------------------------------------------
    _/    _/ _/_/_/  _/_/_/  _/    _/ _/_/_/_/ _/    _/  _/_/_/  _/_/_/   _/_/_/
   _/_/  _/   _/   _/    _/ _/    _/    _/    _/_/_/_/ _/    _/ _/    _/ _/
  _/ _/ _/   _/   _/       _/_/_/_/    _/    _/ _/ _/ _/_/_/_/ _/_/_/   _/_/
 _/  _/_/   _/   _/  _/_/ _/    _/    _/    _/    _/ _/    _/ _/    _/ _/
_/    _/ _/_/_/   _/_/_/ _/    _/    _/    _/    _/ _/    _/ _/    _/ _/_/_/
                     _/   "The meek shall inherit the Earth,
                  _/_/     But it is the strong and powerful who shall rule it"
-------------------------------------------------------------------------------



                                                 
                                                   

   





From anon at anon.efga.org  Tue Feb 17 23:55:29 1998
From: anon at anon.efga.org (Anonymous)
Date: Tue, 17 Feb 1998 23:55:29 -0800 (PST)
Subject: I was auto-outed by an IMG tag in HTML spam
Message-ID: <37a52bf54844994eb90c8e8af06b07b7@anon.efga.org>


I just had my on-line pseudonym outed to my company's VP of
marketing, with potentially serious internecine political
consequences.  It didn't even take an AOL customer service rep
to do the dirty deed.  Here's how it happened.

I have an account unconnected with work, for personal mail, on a
machine run by a friend in my wife's department at the local
college.  From this account, I speak my mind about my political
views, my employer's spamming of their rather loosely defined
lists of "customers", etc.  I don't do that from my work account
because I don't want any confusion about whether I am speaking
for the company or not.

Evidently my mention of my displeasure with my company's
spamming hit a nerve with marketing.  They sent a message to my
off-site address (along with those of other critics about whom
they wanted to know more).  It was an HTML message with an
embedded IMG tag.

Last night about midnight, I downloaded my off-site mail with
Netscape.  (I was still at work because our team is debugging
some killer database problems.)  When Netscape saw that IMG
tag, it happily connected to marketing's "customer" tracking
server, and downloaded the keyed graphic.

My boss just let me see the log he got from the marketing VP,
showing clearly that my workstation read the message.  The log
was attached to a strident call for my head from the VP. 
Luckily, my boss agrees with my attitude, as do all of my
co-workers on the engineering side of the house, and thinks I
was in the right to use an off-site account.  But the political
fallout could be interesting.

Beware "live" message content.  If you don't, you may end up
having to get your company's entire marketing force fired to
protect yourself.

Use mail readers that don't automatically process HTML and
connect to image servers, accept cookies, or run javascripts. 
You are being watched by tricky defective, er, detective types.
es.






From whgiii at invweb.net  Wed Feb 18 01:06:30 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Wed, 18 Feb 1998 01:06:30 -0800 (PST)
Subject: I was auto-outed by an IMG tag in HTML spam
In-Reply-To: <37a52bf54844994eb90c8e8af06b07b7@anon.efga.org>
Message-ID: <199802180937.EAA10267@users.invweb.net>


-----BEGIN PGP SIGNED MESSAGE-----

In <37a52bf54844994eb90c8e8af06b07b7 at anon.efga.org>, on 02/18/98 
   at 03:00 AM, Anonymous  said:

>Use mail readers that don't automatically process HTML and
>connect to image servers, accept cookies, or run javascripts.  You are
>being watched by tricky defective, er, detective types. es.

Several things here:

1. HTML in mail:

There is just no place for this crap in e-mail. If multipart/alternative
is used it is tolarable but pure text/html messages go into the bitbucket
with a autoreply explaining to the poster the error of their ways. :)

I was pleasently suprised that MS Outlook actually makes use of the
multipart/alternative format (M$ actually got it right for once). Net$cape
does not and will blindly send out text/html messages (after all everyone
uses a web browser to read their mail) and Eudora was doing the same thing
though they may have fixed this (I talked to John about this when I was at
the IETF in DEC).

2. AutoProcessing of Attachments:

This is *allways* a BadThing(TM). Not only is it an obvious security risk
it is a PITA for the user. I would be rally pissed if my mailer launched a
V-Card app everytime someone thought it was a GoodThing(TM) to add these
attachments to every message they sent out.

3. AutoDownloading of Data:

I imagine what happend here is the internal logic for N$ mailreader when
processing a html/text e-mail message is to treat it just like a WebPage
and processes it accordingly.

IMHO a mail client that is going out to an external site to DL data wether
it be part of a html/text message or Message/External-Body the mailer
should prompt the user on wether or not he wishes to retreive the data.

My recomendations is to dump the Netscape garbage and get a real e-mail
client. Netsacpe has done a good job at screwing up the web we really
don't need the same favor from them with e-mail.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: Friends don't let friends use Windows.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNOqWz49Co1n+aLhhAQE77gP/U2a/px/oEZGr9HD/FXvmzHH1DGF2E3mx
0WApF3FX2Y6s0MwBaY/t/YisZwyjki6T/xSqd2qVuADeh5sdXYN9Fd6sIon42SX2
4PBvq+HjsKNKlptASjN3x0l3RK8l7Yis47gB3igiA8m8JKMyevm7Vu1bhg572PTA
Kfy8V1J9gYI=
=onje
-----END PGP SIGNATURE-----






From sneakpreview at amninc.nu  Wed Feb 18 02:05:10 1998
From: sneakpreview at amninc.nu (sneakpreview at amninc.nu)
Date: Wed, 18 Feb 1998 02:05:10 -0800 (PST)
Subject: Sneak Preview!!!
Message-ID: <199802182461ZAA53904@post.sec.com.sg>


CLICK HERE
with the word GO in the subject line
for a sneak preview of an incredible new website
with over 200,000 music CDs, cassettes and more,
at the lowest prices on earth.  For example:

* "Show Me Love" CD single by Robyn
* elsewhere $3.95; our price $2.63

* "Tubthumping" CD by Chumbawumba
* elsewhere $12.99; our price $10.40

* "To the Moon & Back" cassette by Savage Garden
* elsewhere $3.99; our price $2.48

We ship worldwide with low shipping charges,
usually $3 for up to six CDs or cassettes.

You must CLICK HERE
with the word GO in the subject
line to receive advance notice.  You will *not*
receive future e-mail from this address unless
you reply.











From 77224.who at cygnus.com  Wed Feb 18 03:07:31 1998
From: 77224.who at cygnus.com (77224.who at cygnus.com)
Date: Wed, 18 Feb 1998 03:07:31 -0800 (PST)
Subject: 167 business and financial reports -53016
Message-ID: <199802181107.DAA12232@cygint.cygnus.com>


////////////////////////////////////////////////////
If you wish to be removed from this advertiser's future mailings, please reply with the subject "Remove" 
and this software will automatically block you from their future mailings.
///////////////////////////////////////////////////


To: ENTREPRENEUR		
     From:    REGINALD J. WILLIAMS	
     Subject: 167 BUSINESS REPORTS
    
        I WILL SEND YOU A POWERFUL, MONEY-MAKING COMPUTER DISK   AND A SPECIAL REPORT  
ENTITLED "HOW TO MAKE $100,000 IN 100 DAYS".  YOU JUST PAY $10.00 FOR YOUR ONE-TIME 
REGISTRATION FEE AND SHIPPING COST.
Dear Entrepreneur:
        In the most recent "Richest People In America" survey published by  Forbes  Magazine, the richest 
man in America IS NOT in the real estate business. He IS NOT an oil tycoon, and he DOES NOT own an 
airline or an automobile company.
        The richest man in America is Bill Gates, with an estimated net worth of around 29.9 BILLION. His 
business: COMPUTER SOFTWARE. Bill Gates founded Microsoft, the largest computer software company 
on planet Earth.    This is clear proof that the "computer revolution" is finally here, bringing exceptional 
opportunities that are creating millionaires out of ordinary people like me and you every day.   Recently, I 
received in the mail this computer disk which contains 167 business and financial reports which I can sell 
to people for around  $1.00 to $5.00 per report. That's quite attractive considering that the disk contains 
167 reports. However, for me that was like trying to peddle bananas by the piece, and I didn't get to excited 
with the idea.
        HOWEVER, WHEN THE COMPANY WHO DEVELOPED THE DISK, SAID THAT I CAN ACTUALLY MAKE 
EXACT COPIES OF THE DISK, AND SELL THEM TO OTHER PEOPLE AT ANY PRICE I WANT, I KNEW THAT I 
HIT THE JACKPOT.
        You see, selling how to reports and information by mail is an old and established business. What's 
new is the way information is being packaged, sold and delivered. From ordinary paper and ink (printed 
format) to computer floppy disks (electronic format), INFORMATION HAS GONE HIGH-TECH.
        So here's what I will do for you when registering for my "computer disk business package"...        
upon receipt of your $10.00 one-time only registration fee, I will send you the following:
        1. A high density 3.5" computer disk which contains all 167 
business and financial reports.
        2. A sample sales letter and  sample camera - ready print ads which you can use to get people to 
order copies of the reports & the disk from you.
        3. A step-by-step plan on how and where to make copies of this 
disk, and how to get people to order copies of the disk - direct from you- 
and pay you anywhere from $20.00 to $49.00 each (you set your own price.) 
       
	4. Most importantly A Duplication License which grants you the 
right  to reproduce copies of the disk and the printed materials that come 
with it.
        Please include $10.00 cash, check, or money order (U.S.Funds Only).
If you would like to receive your package via Priority Mail, please add 
$4.00 (total of $14.00).

        PLEASE TAKE A MOMENT TO SEND IN THIS OFFER. IT IS SUCH A SMALL INVESTMENT FOR THE 
KNOW-HOW, EXPERIENCE AND FINANCIAL REWARDS YOU WILL GAIN THROUGH THIS PACKAGE. ALSO 
ALL ORDERS RECEIVED,  WILL  RECEIVE A FREE COPY OF ENVELOPE FOR WINDOWS, (A $29.95 
VALUE).   AN EXCELLENT RATED ENVELOPE  ADDRESSING PROGRAM.  (SPECIFY LASER OR DOT 
MATRIX) LASER___  OTHER____

SEND ORDER AND REGISTRATION FEE TO: 
        REGINALD J. WILLIAMS
        POST OFFICE BOX 42091
        FREDERICKSBURG, VA 22407-2091
         (540)  972-0903 
________________________________________________________________________                         

                                                  ORDER FORM

NAME_____________________________________________

ADDRESS_________________________________________APT#

CITY____________________________STATE___________

POSTAL ZIP+4__________________

SPECIFY DISK SIZE 3.5____    5.25______ IBM PC COMPATIBLE ONLY

SPECIAL OFFER: Free INTERNET advertising !!! Free with your purchase of 167 Business and Financial 
Reports, 3 months of INTERNET advertising- your 40 word classified ad will be included in an electronic 
magazine (e-mag) for entrepreneurs. Your ad can contain any ad content you wish, and will run for a 
minimum of 3 months absolutely free. This alone can save you hundreds of dollars on ad placement, so act 
today free ads will only be offered for a limited time. THANKS RJW 


SPECIAL 1\2 PRICE SALE ; PURCHASE WITHIN 72 HOURS AND PAY ONLY $5.00 FOR YOUR COMPLETE 
PACKAGE

GET Paid for your SPAM!  New and HOT.  Signed up over 250 the first day.
Now you can profit with "SPAM"  Bulk email with no risk, and make a small
fortune at the same time!  THIS ONE IS A NO-BRAINER!  Really, Check it out
http://wasi.com/spamaddress/info.idc?reg=1953

PRELAUNCH !!      HOT !! HOT OFF THE PRESSES!!

Secure your position Now..  Free sign up with Free Self-Replicating
Webpages for your Downline. Awesome Opportunity for '98.
Join now in my website and ask questions later.. It is FREE.
Please browse and sign up at;
 http://globalads.com/gfn-prelaunch/rjwilliams







From jtsr-stock at jtsr-stock.com  Wed Feb 18 04:02:48 1998
From: jtsr-stock at jtsr-stock.com (jtsr-stock at jtsr-stock.com)
Date: Wed, 18 Feb 1998 04:02:48 -0800 (PST)
Subject: HOT STOCK-Double Your Money By Easter!!
Message-ID: <>


You have been carefully selected to receive the following as a person obviously interested 
in this subject based upon your previous internet postings, or visits to one of our affiliate web
sites.  If you have received this message in error, please accept our apology as a 
responsible e-mailer, and reply with the word REMOVE in the subject line. You will be 
automatically excluded from future e-mailings. Thank you for your consideration and help
in making the Internet spam-free. *****

Visit http://www.jtsr-stock.com or call 888-295-6365 For Complete 
Information.

Who said opportunity only knocks once. JT's Restaurant is about to be one
of the fastest growing Restaurant chains. Under valued stock situations
presently $2.25 per share. Analysts predict stock to go as high as $5.00 
by Easter and could go up to $10.00 by end of 1998. Stock symbol JTSR on 
NASDAQ.  If you had invested just $100.00 in 1955 in Mcdonalds, it would 
be worth over $100 million today.  $1000 would be worth over $1 billion.  
Here is another opportunity for you.  Look for some exciting news shortly 
to boost this stock!!

Visit us at http://www.jtsr-stock.com or call 1-888-295-6365.






From jtsr-stock at jtsr-stock.com  Wed Feb 18 04:02:48 1998
From: jtsr-stock at jtsr-stock.com (jtsr-stock at jtsr-stock.com)
Date: Wed, 18 Feb 1998 04:02:48 -0800 (PST)
Subject: HOT STOCK-Double Your Money By Easter!!
Message-ID: <>


You have been carefully selected to receive the following as a person obviously interested 
in this subject based upon your previous internet postings, or visits to one of our affiliate web
sites.  If you have received this message in error, please accept our apology as a 
responsible e-mailer, and reply with the word REMOVE in the subject line. You will be 
automatically excluded from future e-mailings. Thank you for your consideration and help
in making the Internet spam-free. *****

Visit http://www.jtsr-stock.com or call 888-295-6365 For Complete 
Information.

Who said opportunity only knocks once. JT's Restaurant is about to be one
of the fastest growing Restaurant chains. Under valued stock situations
presently $2.25 per share. Analysts predict stock to go as high as $5.00 
by Easter and could go up to $10.00 by end of 1998. Stock symbol JTSR on 
NASDAQ.  If you had invested just $100.00 in 1955 in Mcdonalds, it would 
be worth over $100 million today.  $1000 would be worth over $1 billion.  
Here is another opportunity for you.  Look for some exciting news shortly 
to boost this stock!!

Visit us at http://www.jtsr-stock.com or call 1-888-295-6365.






From ptrei at securitydynamics.com  Wed Feb 18 07:19:48 1998
From: ptrei at securitydynamics.com (Trei, Peter)
Date: Wed, 18 Feb 1998 07:19:48 -0800 (PST)
Subject: I was auto-outed by an IMG tag in HTML spam
Message-ID: <6B5344C210C7D011835C0000F8012766010035D1@exna01.securitydynamics.com>


This can also happen with embedded tags in news messages,
if you use Netscape to read news while 'autoload images'
is turned on.

It's an interesting form of entrapment. 

Peter

> -----Original Message-----
> From:	Anonymous [SMTP:anon at anon.efga.org]
	[Trei, Peter]  [edited]
> They sent a message to my
> off-site address (along with those of other critics about whom
> they wanted to know more).  It was an HTML message with an
> embedded IMG tag.
> 
> When Netscape saw that IMG
> tag, it happily connected to marketing's "customer" tracking
> server, and downloaded the keyed graphic.
> 
> My boss just let me see the log he got from the marketing VP,
> showing clearly that my workstation read the message.  





From awbd at awbd.com  Wed Feb 18 10:17:51 1998
From: awbd at awbd.com (awbd at awbd.com)
Date: Wed, 18 Feb 1998 10:17:51 -0800 (PST)
Subject: Commercial delegate in Egypt
Message-ID: <199802181900.LAA24797@ghs1.greenheart.com>


Feb. 18th 1998. 

.                   

Dear Sirs,
     
I have the pleasure to enclose herewith a copy of my C.V. introducing myself
to you as a person of very good experience in Freight Forwarding &
International Transportation and in the different commercial services
related thereto; and proposing myself for representing your company in Egypt
and the Middle East as its own local resident COMMERCIAL DELEGATE looking
after your interests and projects in this area.
As a matter of fact, among lots of investors, many international freight
forwarding & transportation companies have started their own presence in
Egypt seizing the opportunity of the economic reformation achieved in this
area; as now is the right time for business starting in Egypt.
Starting with Commercial Delegation I foresee our final target, in case my
proposal meets your interest, is to develop that delegation into the full
operating company�s branch in Egypt. That is to be achieved gradually by
time, but as quickly as possible, through building a good account of clients
and by selecting and training an efficient professional work team.
In addition to my  qualifications shown in my enclosed C.V., I am actually a
USA resident as per the Green Card I have got for lawful admission for
permanent residence in America (Employment Authorized). Such advantage is
considered as a good asset for a person appointed by an American company to
represent it as its own Commercial Delegate in the area where he was grown
up. Speaking their own language and understanding their mentality and the
way they think, such delegate can move among the company�s correspondents &
agents, its clients, the local official authorities, and any other concerned
parties to intervene, for his company�s favor, to avoid any probable
problems and to enhance the company�s achievements in this area.
For any further details and/or information, please feel free and do not
hesitate to contact me through any of the contact means listed among my
personal data in my C.V. attached hereto. You may also contact me, for the
time being and until Feb. 24th when I leave back to Egypt, through my
address in USA which is as follows:
915 Mount Olive Dr.  #3
Duarte,   CA 91010
Tel & Fax (626) 357 0243
E-mail: info at awbd.com
Looking forward to getting the honor of working with your esteemed company,
I wish you all the best and remain
faithfully yours. 


 Isaac  Youssef


CURRICULUM VITAE
PERSONAL DATA:

Name:			   Isaac Youssef Atiya
Nationality; 		   Egyptian
Place and date of birth:    Cairo, On Oct. 5th 1951
Marital Status:		   Single
Education Degree:	   B.Sc. Cairo University
Contact Address:	   PO Box  #15
			   Al- Afdal Post Office
   Cairo-11627,  Egypt.

Tel:			   00202-235-3997
Fax:			   00202-236-7413
E-mail:                            andyeg at eis.egnet.net 	 
 
JOB HISTORY & BUSINESS EXPERIENCE:

Jan. 1st. 94 - Currently:
PARTNER and MANAGER of CFT Int�1., CENTRE DU FRET ET DU TRANSPORT
INTERNATIONAL, which is actually an extension of GONDRAND Egypt     (A
former company mentioned below). As CFT Int�l., I represented the following
companies:
= SDV group, including SCAC, TTA, & ATT				France 
= TRANSCAP INTERNATIONAL					France
= GEFCO								France

Aug, 15th 91 - May 31st  94
The GENERAL MANAGER, and the only ACTIVE PARTNER of GONDRAND Egypt, one of
the most leading freight forwarding agents and the international transport
companies working in Egypt. As GONDRAND Egypt, I was the agent of many world
wide companies such as :
= S.F.T. GONDRAND FRERES					France
= MACH + 								France
= SAVING SHIPPING & FORWARDING 				Italy
= UTC, UNION TRANSPORT CORPORATION			USA
= UAT, UNION AIR TRANSPORT					Europe
= DSL, DISTRIBUTION SERVICES LTD				USA
= GEFCO								France
= TRUST FREIGHT							USA


Sep. 1st  88 - Aug. 14th 91:
During that period, besides managing an export- import group consisting of 3
sister companies, I worked in the following companies:
= DMC, the Egyptian daughter company of DOLLFUS MIEG ET CIE, one of the most
leading world wide French threads manufacturers, in which I worked as the
MATERIALS / INFORMATION FLOW & PURCHASING MANAGER. My duties included the
following:
1-  Supplying and furnishing both of the clients of the company and its
employees with whatever they needed of information, materials, services, and
/or products.
2-  Controlling the flow of all the materials imported or locally purchased.
3-  Supervising the import formalities and regulations with Banks, Customs
and Governmental authorities, Air and Maritime lines, and Freight Forwarding
agents.
4-  Supervising purchasing and maintenance of the company assets through
different contractors, suppliers, and services companies.
5-  Controlling the circulation of raw materials and products.
= AMECO, an Egyptian freight forwarder which, in the same time, represents
ships owners. In AMECO I had the position of the ASSISTANT MANAGER of Cairo
branch.    
= MEDTRANS, The Egyptian correspondent of a group of European and American
freight forwarding companies, such as the French company S.F.T. GONDRAND
FRERES, And the American company DANIEL F. YOUNG Inc.. In MEDTRANS I had the
position of the EXECUTIVE MANAGER.

Feb. 1st 80 - Aug. 31st 88 :
A SUPERVISOR and a DEPARTMENT HEAD in MFA - MISR FREIGHT AGENCIES - The
Egyptian branch of the world wide DANZAS company for international
transportation and freight forwarding - which had, at that time, 450 offices
distributed in 42 countries with the head office in Switzerland.
In MFA- DANZAS Egypt - I supervised the following departments:
1-  Sea Freight Dep. (Conventional and General Cargo, and Containerized
Shipments).
2-  Air Freight Dep.
3-  Projects Transport Dep.
4-  Transit Goods & Distribution Dep.
5-  Fairs & International Exhibitions Transport Dep.
6-  The Local Operations & Inland Road Transport Dep.
7-  Besides the above, I supervised some special inter-branches relations
between MFA and the other world wide branches of DANZAS group.
      
Before MFA was founded, I worked in the above capacities for the COMMERCIAL
DELEGATION OF DANZAS in Egypt.




Sept. 78 - Jan. 31st 80:
	The DIRECTOR ASSISTANT of CENTER FOR EGYPTIAN CIVILIZATION STUDIES, in
which I supervised the following:
1-  Planning & Execution of programs
2-  Administration
3-  Public Relations
4-  Correspondence
5-  Translation

OTHER QUALIFICATIONS:

= Courses in MANAGEMENT SKILLS FOR SUPERVISORS AND DEPARTMENT
HEADS organized by Monadonck International Limited - London, for
International Management Development.
=  A seminar and a long training course in PROJECTS TRANSPORT, SEA FREIGHT,
and INLAND ROAD TRANSPORT in  DANZAS  branch in Zurich city, and in  AIR
FREIGHT in its branch in Kloten airport of Zurich.
= Courses in BUSINESS ADMINISTRATION including FINANCE FOR NON- FINANCIAL
MANAGERS, AN INTRODUCTION TO COST ACCOUNTING, and BASIC PRINCIPLES OF
FEASIBILITY STUDIES. These courses were organized by The Egyptian-German
Association for Economical and Social Development of The Arab-German Chamber
of Commerce in Cairo, among the Business Administration Program in Egypt
sponsored by Konrad-Adenauer Foundation.
=  Write and Speak English language.
=  Some courses in French language, and still studying.
= Traveled in Business Trips to many  countries, such as Switzerland, UK,
France, Germany, Turkey, and USA.
=  Active, Head Working, Ambitious, and willing for constant movement &
traveling.
=  Fond of creating new businesses in Egypt.

    Signature 

Isaac Youssef


PS:
Besides the ordinary transport activities and the services related to the
freight forwarding business, I represent my clients in the various official
authorities, e.g. Customs Authority; Investment Authority, General
Organization for Fairs & International Exhibitions, Egyptian General
Petroleum Corporation, National Authority for Wire and Wireless
Communications, Traffic Administration, The Import Rationalization Committee
of the Ministry of Foreign Trade, Banks, Embassies, and Chambers of
Commerce��etc.. 






From jenni at biznetandmarketing.com  Wed Feb 18 12:44:29 1998
From: jenni at biznetandmarketing.com (jenni at biznetandmarketing.com)
Date: Wed, 18 Feb 1998 12:44:29 -0800 (PST)
Subject: your request
Message-ID: <42719674_84637763>



Thank you for your request.  

You can now:

1. Get more hits to your website for FREE! Win 1,000,000 banner impressions on thousands of websites! (worth $10,000)

2. Download the Internet Biz Startup Kit FREE! (Worth $95)

3. Download Web-Traffic's guide to listing your URL on top of search engines FREE! Touted as the world's Best Web and Hits Resource. (worth $95)

4. Win Astro-Space's Virtual Web Server with 75 MB space, and unlimited pop, autoresponders, telnet, ftp, domains, etc. (worth $1195)

ALL of these at: http://www.free-banners.com


Best Regards,

Jenni LR

--------------------------------------------------------
*          This is an autoresponded message.           *
--------------------------------------------------------










From mhw at wittsend.com  Wed Feb 18 08:01:25 1998
From: mhw at wittsend.com (Michael H. Warfield)
Date: Thu, 19 Feb 1998 00:01:25 +0800
Subject: I was auto-outed by an IMG tag in HTML spam
In-Reply-To: <199802180937.EAA10267@users.invweb.net>
Message-ID: <199802181346.IAA21174@alcove.wittsend.com>



William H. Geiger III enscribed thusly:
> In <37a52bf54844994eb90c8e8af06b07b7 at anon.efga.org>, on 02/18/98 
>    at 03:00 AM, Anonymous  said:

> >Use mail readers that don't automatically process HTML and
> >connect to image servers, accept cookies, or run javascripts.  You are
> >being watched by tricky defective, er, detective types. es.

> Several things here:

	:
	: - Point 1 deleted...
	:

> 2. AutoProcessing of Attachments:

> This is *allways* a BadThing(TM). Not only is it an obvious security risk
> it is a PITA for the user. I would be rally pissed if my mailer launched a
> V-Card app everytime someone thought it was a GoodThing(TM) to add these
> attachments to every message they sent out.

	Oh it gets better than that!  I know of one person who got hit with
a specially formated porno-spam message.  When he opened it, the html message
did an autorestart on his browser and  there he was browsing
the porno site!  What a convenient feature!  Especially with you boss and
co-workers in the vicinity!

	Needless to say, that person has is now a rabid anti-html in E-Mail
fanatic!

	:
	: - Remainder of message deleted...
	:

> ---------------------------------------------------------------
> William H. Geiger III  http://users.invweb.net/~whgiii
> Geiger Consulting    Cooking With Warp 4.0
> 
> Author of E-Secure - PGP Front End for MR/2 Ice
> PGP & MR/2 the only way for secure e-mail.
> OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
	Mike
-- 
 Michael H. Warfield    |  (770) 985-6132   |  mhw at WittsEnd.com
  (The Mad Wizard)      |  (770) 925-8248   |  http://www.wittsend.com/mhw/
  NIC whois:  MHW9      |  An optimist believes we live in the best of all
 PGP Key: 0xDF1DD471    |  possible worlds.  A pessimist is sure of it!






From whgiii at invweb.net  Wed Feb 18 08:18:24 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Thu, 19 Feb 1998 00:18:24 +0800
Subject: I was auto-outed by an IMG tag in HTML spam
In-Reply-To: <199802181346.IAA21174@alcove.wittsend.com>
Message-ID: <199802181636.LAA13398@users.invweb.net>



-----BEGIN PGP SIGNED MESSAGE-----

In <199802181346.IAA21174 at alcove.wittsend.com>, on 02/18/98 
   at 08:46 AM, "Michael H. Warfield"  said:

>	Oh it gets better than that!  I know of one person who got hit with a
>specially formated porno-spam message.  When he opened it, the html
>message did an autorestart on his browser and  there he
>was browsing the porno site!  What a convenient feature!  Especially with
>you boss and co-workers in the vicinity!

This could be a good sting opperation. Send an anonymous e-mail message
that points to a childporn site. The [add your jackbooted thug
orginization here] kick in your door as soon as they get the signal that
your machine has connected to the site and downloaded the images.

Hmmmm I wonder if there is a way to get the browser to DL an image without
displaying it. The pictures would be sitting in your cache without even
knowing it. Probably not a big issue I would imagine that a jury would
convict on website logs alone even if no pictures were found on the
machine.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: Dos: Venerable.  Windows: Vulnerable.  OS/2: Viable.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNOr5IY9Co1n+aLhhAQH8TgQAsZUM0aA1XLwWigarq5PCz55uc67Zvgui
5SrwS2JasrhaEoZ//inxT8kQi7qJGSdd5sA/VckOHOWNmqOz4QaJJyHIpldd14we
lVtFc3t1DRxpY/RdUXEu45AvbWvVzDijAVU3nOgcaPRzllT1NYnSEuxnjKgsJdLd
IzGIn8BKpuo=
=SQJ/
-----END PGP SIGNATURE-----






From ravage at ssz.com  Wed Feb 18 08:23:19 1998
From: ravage at ssz.com (Jim Choate)
Date: Thu, 19 Feb 1998 00:23:19 +0800
Subject: New technology around the corner [slashdot.org]
Message-ID: <199802181626.KAA11323@einstein.ssz.com>



Note: Text edited for relevance.

Forwarded message:

> Subject: http:--www.slashdot.org-

>    Hitachi Makes Breakthrough Contributed by Justin
>    [Technology] Tue Feb 17 16:40:30 1998 EST
>    From the rapidly-advancing-society? dept.
>    Hitachi has made a breakthrough of their own, in a different kind of
>    storage. Hitachi announced they have found a way to reduce the number
>    of electrons needed to store a bit of information in a DRAM chip. The
>    128MB chips should be coming out soon, and will be perfected in the
>    16GB (*drool*) generation of chips.
>    Read More...
>    13 comment(s)

>    Seagate Makes Breakthrough Contributed by Justin
>    [Technology] Tue Feb 17 15:28:31 1998 EST
>    From the buncha-really-tiny-mirrors dept.
>    A division of Seagate Technology, Inc. has announced a new way of
>    increasing disk drive capacity density. Quinta has disclosed key parts
>    of their technology, which they call Optically Assisted Winchester
>    (OAW) technology to make a practical magento-optical disk that is
>    capable of holding 40GB/square inch. The new technology uses mirrors,
>    a new servo system, and other methods to allow these large capacities.

>    Slashdot is participating in Distributed.Net's Decryption Projects.
>    Read who's helping, and why. Check out Our Current Rank.

>    [Technology] Sun Feb 15 11:12:15 1998 EST
>    Plastic Screens (12)


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From ravage at ssz.com  Wed Feb 18 08:28:18 1998
From: ravage at ssz.com (Jim Choate)
Date: Thu, 19 Feb 1998 00:28:18 +0800
Subject: Quebec secession trial - status?
Message-ID: <199802181633.KAA11473@einstein.ssz.com>



Hi,

I was wondering if anyone in the great white north might enlighten us on
what is going on with the Quebec secession case that starts this week...


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From whgiii at invweb.net  Wed Feb 18 08:53:45 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Thu, 19 Feb 1998 00:53:45 +0800
Subject: Websites and trademarks at odds [CNN]
In-Reply-To: <199802181552.JAA11020@einstein.ssz.com>
Message-ID: <199802181715.MAA13754@users.invweb.net>



-----BEGIN PGP SIGNED MESSAGE-----

In <199802181552.JAA11020 at einstein.ssz.com>, on 02/18/98 
   at 09:52 AM, Jim Choate  said:

>>      How can consumers trust using the Web, where guessing about a
>>      company's address can be like playing shopper's roulette? Imagine
>>      visiting your local grocery store and finding no milk or eggs but
>>      auto parts instead. Imagine walking into Burger King and being
>>      offered computer software.

This is really much todo about nothing and shows a complete lack of
understanding of Trademark laws.

Trademarks are product specific, there is nothing preventing preventing
two companies from having the same name provided they are not in the same
business. You can even have two companies with the same name in the same
business provided that the likelyhood of mistaking one company for another
is small.

Some examples:

It is perfectly legal to have a company name IBM (the computer company)
and another company called IBM (a local auto repair shop in Podunk, AK).

It is also legal to have two companies called Widgets both making widgets
provided that both were operating in different regions (Widgets #1 only
operated in NewEngland while Widgets #2 only operated in Texas).

Trademarks not only involve company names but also include product names.
A good example of this is Intel and the naming of thier CPU's. The courts
ruled that they could not trademark a Number (286,386,486,...) an this is
the reason for the Pentium(TM) name for their chips which is
trademarkable. Even so there is nothing preventing McDonalds from calling
thier new burger the Pentium as no one should mistake a burger for a CPU
(well except for some windows users ).

Now understanding that even when one Tradmarks a name it does not give you
exclusive use of the name how does one apply trademarks to a domain name?

Should www.windows.com be the exclusive domain of Microsoft just because
they have a program with that name? What about a window manufacture
shouldn't he have an equal if not greater claim to that domain (after all
his whole business is windows)? Which windows manufacture? Should ABC
Windows have that claim or Billy-Bob's Windows Imporium? Should the
trademark claim extend to all possible domains? (www.windows.com,
www.windows.org, www.windows.net,
www.windows-blows-chunks-and-bill-gates-sucks-eggs.com)?

I haven't even touched on the international issues. Should a company from
one company have the ability to enforce it's trademark claim to all
domains world-wide?

I fear that this is just another example of the Government trying to get
it's sticky fat fingers on another portion of the net not to mention yet
aother shoddy piece of journalism (calling it that give too much credit to
the author).

Just for the slow ones out there it is perfectly legal for me to open a
computer store, call it Buger King and call my computer system the Wopper.


- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: I'm an OS/2 developer...I don't NEED a life!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNOsCLI9Co1n+aLhhAQGPUAP/XIg+CYn3zGQH6ztVDY+gZAEVjPMU04QF
4JePKqGUOPSaXwHF6U7Fvx9bqGl9cBd36JT0KwwQluBRQBdJ4q2FAX4a92JubtuX
PqeJRTXNf9QszMDh5LFVSBu+aQi5qozqAglHf6Ep7hMNQ8ZyK1yw7pYHWRvLALGJ
dQQaIWI/zKo=
=RrnK
-----END PGP SIGNATURE-----






From schear at lvdi.net  Wed Feb 18 09:31:40 1998
From: schear at lvdi.net (Steve Schear)
Date: Thu, 19 Feb 1998 01:31:40 +0800
Subject: Dealing with Spam, Part 2
In-Reply-To: 
Message-ID: 

A non-text attachment was scrubbed...
Name: not available
Type: text/enriched
Size: 1137 bytes
Desc: not available
URL: 

From jkwilli2 at unity.ncsu.edu  Wed Feb 18 09:35:54 1998
From: jkwilli2 at unity.ncsu.edu (Ken Williams)
Date: Thu, 19 Feb 1998 01:35:54 +0800
Subject: Letter of the law
In-Reply-To: <199802180228.SAA12074@yginsburg.el.nec.com>
Message-ID: 



On Tue, 17 Feb 1998, Bob De Witt wrote:

>Ken,
>
>I guess I was thinking about the NSA, recording the message and deciding to 
>make an example.  They seem to do that occassionally just to keep the rest
>of us folks 'in line'.  I can't see the INS even understanding what they 
>were looking at, even if you showed them.  "My, my, my!  All those bits are
>really in that little box?"  You have to understand the difference between
>a 'large possibility' and a 'fat chance', yes?

yep.

>Now, drugs!  That they understand ...  But a PKI key?  Or, a file??  Or, a
>crypto program (especially renamed)???  What piece of this trick question 
>am I missing?

actually, you are right on target with your comments.  IMO, you didn't
miss anything.  i was simply referring to my dislike of random body cavity
searches and harassment by US Customs and customs officials in other
countries (i travel alot and have been subjected to alot of bullshit).  so
far, Japan was the worst of all the countries i have visited (18 at last
count in Europe and Asia alone).  they saw my waist-length hair, tattoos
and US passport....well, you can guess the rest.

TATTOOMAN

>Bob De Witt,
> rdew at el.nec.com
>The views expressed herein are my own,
>and are not attributable to any other
>source, be it employer, friend or foe.
>
>
>> From jkwilli2 at unity.ncsu.edu Tue Feb 17 10:56:22 1998
>> X-Authentication-Warning: c00954-100lez.eos.ncsu.edu: jkwilli2 owned process doing -bs
>> Date: Tue, 17 Feb 1998 13:56:29 -0500 (EST)
>> From: Ken Williams 
>> X-Sender: jkwilli2 at c00954-100lez.eos.ncsu.edu
>> To: Bob De Witt 
>> cc: cypherpunks at toad.com
>> Subject: Re: Letter of the law
>> X-Copyright: The contents of this message may not be reproduced in any form
>> X-Copyright: (including Commercial use) unless specific permission is granted
>> X-Copyright: by the author of the message.  All requests must be in writing.
>> X-Disclaimer: The contents of this email are for educational purposes only
>> X-Disclaimer: and do not reflect the thoughts or opinions of either myself
>> X-Disclaimer: or my employer and are not endorsed by sponsored by or provided
>> X-Disclaimer: on behalf of North Carolina State University.
>> MIME-Version: 1.0
>> 
>> On Tue, 17 Feb 1998, Bob De Witt wrote:
>> 
>> >Doesn't the act of taking it across the border, in the laptop, constitute
>> >an act of export??
>> 
>> well, yes, of course.  that was taken for granted in my comments.
>> likewise, if you go to a tattoo parlor and get the infamous 4 line
>> crypto-sig tattooed on your ass, then you are classified as a munition,
>> and you cannot leave the US.
>> 
>> the only relevant question here regards the odds that a US Customs officer
>> is going to want you to drop your drawers and bend over...
>> ;-)
>> 
>> ken 
>> 
>> >> >>I'm in El Paso Texas... so close to the border
>> >> >>I can see Old Mex outside my window as I write this..
>> >> >>I'm over there nearly every day for lunch ( I actually
>> >> >>walk there from my house it's so close) If I write
>> >> >>a crypto program on my laptop over there and ftp
>> >> >>it to a web page I have on a server outside the US
>> >> >>will I have avoided the foolish export regs??
>> >> >>Does anyone know of someone trying this before?? 
>> >> >
>> >> >My guess is this:
>> >> >  if it has the name of a US citizen in the copyright
>> >> >notice, it will be assumed to have been made in the
>> >> >US. if the morons even go after you. you still may have
>> >> >a plausable excuse if ever taken to court.
>> >> >after all, you "exported" youself, which is a perfectly
>> >> >legal thing to take out of the country, and "yourself"
>> >> >accidentally spewed a copy of something that couldn't
>> >> >cross the border.
>> >> >I don't think anybody has tried this and been challenged.
>> >> >then again, a lot of us don't have the opportunity.
>> >> >It's easier to ask forgivness than permission...
>> >> >Another easier excuse would be to publish it freely in
>> >> >hardcopy form, and just "happen" to have somebody end up
>> >> >"typing" in your source code abroad, making a legit
>> >> >international copy...
>> >> >-Anon2
>> >> 
>> >> i would think that the big question here, legally, is whether or not you
>> >> would be ustilizing a US ISP and/or cellular provider to make the upload
>> >> of the crypto program to the foreign server via ftp.  as long as all the
>> >> packets stay outside of US borders, in other words, as long as you don't
>> >> use a US ISP and cellular provider, then i don't see how you would be
>> >> violating any laws in this case.
>> >> 
>> >> Regards,
>> >> 
>> >> TATTOOMAN 
>> >> 
>> >> http://152.7.11.38/~tattooman/
>> >> 
>> >Bob De Witt,
>> >rdew at el.nec.com
>> >The views expressed herein are my own,
>> >and are not attributable to any other
>> >source, be it employer, friend or foe.
>> > 
>> >
>> 
>> TATTOOMAN
>> 
>> /--------------------------[   TATTOOMAN   ]--------------------------\
>> | ORG: NC State Computer Science Dept    VP of The  E. H. A. P. Corp. |
>> | EML: jkwilli2 at adm.csc.ncsu.edu         ehap at hackers.com             |
>> | EML: jkwilli2 at unity.ncsu.edu           ehap-secure at hackers.com      |
>> | WWW: http://www4.ncsu.edu/~jkwilli2/   http://www.hackers.com/ehap/ |
>> | FTP: ftp://152.7.11.38/pub/personal/tattooman/                      |
>> | W3B: http://152.7.11.38/~tattooman/w3board/                         |
>> | PGP: finger tattooman at 152.7.11.38                                   |
>> \----------------[   http://152.7.11.38/~tattooman/  ]----------------/
>> 
>> 
>> 
>






From tcmay at got.net  Wed Feb 18 09:46:58 1998
From: tcmay at got.net (Tim May)
Date: Thu, 19 Feb 1998 01:46:58 +0800
Subject: Private schools as free speech havens?
In-Reply-To: <01ITPE1OG8I49G4R0J@ctrvax.Vanderbilt.Edu>
Message-ID: 



At 9:56 PM -0800 2/17/98, Bennett Haselton wrote:

>But you wouldn't ask them to accept discriminatory treatment that had
>nothing to do with their disability, simply on the basis that the condition
>causing them to be discriminated against would eventually go away.

What is this "ask them to accept discriminatory treatment" nonsense?

An employer should be free to hire and fire whom he chooses, based on the
criteria he chooses.


--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.








From nobody at REPLAY.COM  Wed Feb 18 09:49:25 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 19 Feb 1998 01:49:25 +0800
Subject: Is spam really a problem?
Message-ID: <199802181733.SAA26244@basement.replay.com>




I see discussion of spam here and everywhere on
the net. But who finds it a *real* problem, and
why?

I've been on the net for nearly 20 years. I'm
active on numerous mailing lists. I post to 
usenet. I have a website. In all cases 
(except this post) I use real email 
addresses.

Nevertheless, spam does not create a big problem
for me. Perhaps 10-15% of my home email is spam,
(much less at work) and I identify and kill it 
in less time than it takes me to sort out the 
junk from my snail mail.

Don't get me wrong; I don't *like* spam. But 
for me it's a minor problem, certainly not
worthy of legal remedies. I'm willing to suffer
a certain level of foolish annoyance gladly 
in return for liberty.

The only point at which spam is more than a 
minor irritation is when sexual spam turns up in
my home mail or in inappropriate news groups, 
and then only because I have young kids, who
I don't wish to be exposed to porn until they
are more mature (if you flame me on this, you're
missing the point of this post, and will be
ignored).

Masque.

PS: I'm slightly anonymous in this message
because I fear that if I used my real name,
some jerk would decide to sign me up for
every spam source on the planet, to prove
a point.

M
  






From jkwilli2 at unity.ncsu.edu  Wed Feb 18 09:55:09 1998
From: jkwilli2 at unity.ncsu.edu (Ken Williams)
Date: Thu, 19 Feb 1998 01:55:09 +0800
Subject: bugged?
In-Reply-To: <34EA2E43.240F2420@ccwf.cc.utexas.edu>
Message-ID: 



On Tue, 17 Feb 1998, Breezy wrote:

>Babu Mengelepouti wrote:
>> 
>> Ken Williams wrote:
>> >
>> > I got pgp 5.0. which will not work with your version. Upgrade man :-)
>> 
>> He's the one who needs to change his version... to 2.6.x
>
>Why use 2.6.x vs 5.0?  Is 5.0 not as stable or something?  Not as good?
>What's up?
>
>====/------ Breezy ----------------------------/ 
>===/---- ebresie at ccwf.cc.utexas.edu ----------/ 
>==/---- http://ccwf.cc.utexas.edu/~ebresie --/
>

PGP v2.6.2 for UNIX is RSA, and cannot decrypt anything crypted with 
PGP v5.x.  v5.0 for UNIX features the DSS/Diffie-Hellman algorithm that
all the other 5.x versions have.  v5.0 is stable, better, and is basically
the current standard.  it is more script-friendly and has a better
command-line.

basically, it really sucks when every encrypted message i have gotten in
the past week was encrypted with RSA/DSS and i couldn't decrypt it with
the v2.6.2 that is installed at work.  due to space limitations on my
volume server and our nihilistic copyrighted software policy, my only
solution/option at the moment is to bring my laptop to work just for
message decryption.

i've sent in a software request for a PGP upgrade on the network, but due
to the expensive PGP licensing agreements and the fact that we have close
to 50,000 active users, i don't expect anything to be done.

guess state employees don't have the right to privacy any more huh?
and neither do the studnets here for that matter...


TATTOOMAN

work disclaimer:  i lied and i'm legally insane.






From honig at otc.net  Wed Feb 18 10:05:35 1998
From: honig at otc.net (David Honig)
Date: Thu, 19 Feb 1998 02:05:35 +0800
Subject: 
In-Reply-To: <2d903692314a67a27cf3a173ba82fd9f@anon.efga.org>
Message-ID: <3.0.5.32.19980218091525.007f8100@otc.net>



At 11:36 PM 2/17/98 -0500, Anonymous wrote:
>
>Here is description of my stream cipher, it operates one
>...
>...
>VB source code:
>^^^^^^^^^^^^^^^
>
>------------------------------------------------------
>Who the hell uses VB of all languages - to write
>a crypto algorithm? And, which sane person uses
>MicroSucks Winduhz? 
>
>


Forget the implementation language/platform bigotry.

The substantive issue is, Tell us what it is designed
to do *precisely*, and then tell us how it does it.
If it is claimed to be a "stream cipher" then it should do 
certain things, e.g., produce incompressible data
from an input stream consisting of identical symbols.
Argue with logic, don't make us read your code.



------------------------------------------------------------
      David Honig                   Orbit Technology
     honig at otc.net                  Intaanetto Jigyoubu

	Has Nike hired Monica to endorse kneepads yet?





	
















From proff at iq.org  Wed Feb 18 10:27:01 1998
From: proff at iq.org (proff at iq.org)
Date: Thu, 19 Feb 1998 02:27:01 +0800
Subject: Is spam really a problem?
In-Reply-To: <199802181733.SAA26244@basement.replay.com>
Message-ID: <19980218050405.1567.qmail@iq.org>



> PS: I'm slightly anonymous in this message
> because I fear that if I used my real name,
> some jerk would decide to sign me up for
> every spam source on the planet, to prove
> a point.
> 
> M

Too late. Someone subscribed you to cypherpunks
already.

Cheers,
Julian.






From tcmay at got.net  Wed Feb 18 10:27:21 1998
From: tcmay at got.net (Tim May)
Date: Thu, 19 Feb 1998 02:27:21 +0800
Subject: Is spam really a problem?
In-Reply-To: <199802181733.SAA26244@basement.replay.com>
Message-ID: 



At 9:33 AM -0800 2/18/98, Anonymous wrote:
>I see discussion of spam here and everywhere on
>the net. But who finds it a *real* problem, and
>why?

Indeed, discussion of "what to do about spam?" periodically consumes all of
the main lists I'm on. Discussion of spam is worse than the actual spam.

>Nevertheless, spam does not create a big problem
>for me. Perhaps 10-15% of my home email is spam,
>(much less at work) and I identify and kill it
>in less time than it takes me to sort out the
>junk from my snail mail.

Same for me. I can delete commercial advertisements ("spam") in seconds.


>Don't get me wrong; I don't *like* spam. But
>for me it's a minor problem, certainly not
>worthy of legal remedies. I'm willing to suffer
>a certain level of foolish annoyance gladly
>in return for liberty.

Well said. "Be careful what you ask for."

Anti-spam bills are already wending their way through Congressional
committees. If passed, an FCC-like authority over the Net will have been
granted.

(Though probably ineffectual, given the use of offshore sites, throwaway
accounts, etc. The real effect will probably be to usher in an era of
mandatory identification for account opening, which is pernicious, and
various other tracking and surveillance systems.)


The only  "spam" which really bothers me is/are _mail bombs_, where
hundreds or even thousands of messages fill my mailbox. I've been hit twice
with these attacks. And a friend of mine received 25,000 messages from one
sender...he sued and won a substantial settlement from the employer of the
guy who mail bombed him.

But such attacks will likely not be affected by anti-spam laws anyway.
Perps can use sites in other countries, beyond the reach of the laws. And
remailers. And so on.

"Be careful what you ask for."

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.








From overseas at 4link.net  Thu Feb 19 02:33:35 1998
From: overseas at 4link.net (overseas at 4link.net)
Date: Thu, 19 Feb 1998 02:33:35 -0800 (PST)
Subject: AN EXCITING OVERSEAS JOB IS WAITING FOR YOU!
Message-ID: <>


CAPITALIZE ON YOUR TRUE WORTH!
**********************************************************************
Earn up to $72,000 (US Dollars) annually tax-free working abroad!
Yes, by law you are entitled to earn up to $72,000 in annual earnings
working outside of the US without paying any US income taxes.
**********************************************************************

Hundreds of companies are aggressively hiring American talent for
lucrative jobs worldwide.  After extensive research, INTERNATIONAL
RESEARCH & DATA INSTITUTE (IRDI) is now publishing its latest
edition of a directory which will provide you with key leads to a specific
recruiter or employer that can offer you a fantastic overseas career
opportunity.

International Search Firms: IRDI's Directory of International Recruiters
and Employers has a section which provides up-to-date detailed
information on executive search firms all over the world which are
currently seeking qualified candidates to fill positions for their client
companies. If they place you with one of their clients, the client pays
their search fee. It's a total win situation for you!

International Direct Job Opportunities: Our Directory has a separate
section which provides key leads directly to companies which are
currently seeking capable candidates to fill positions which they have
available outside of the US. This section includes names of staffing
executives, addresses, phone numbers and describes the types of jobs
being offered.

The listings in IRDI's Directory cover many fields:

Accounting* Chem./Petrochemical* Engineering* Oil & Gas* Advertising*
Communications* Environmental* Pharmaceuticals* Agriculture* Computers*
ESL/Education* Programming* Architecture* Contract/Admin. * Finance*
Banking* Public Relations* Automotive* Construction* Health Care*
Transportation* Aviation/Aerospace* Data Processing* Human Resources*
Business* Travel/Tourism* Management* Electronics* Nursing* Marketing*
Sales* Hospitality*
AND OTHERS!

If your target field is not listed above, contact us and we will research and
guide you to positions that are available, or feel free to email or call us
should you have a question. Email us at Research at overseaswork.com,
or email us from our website; http://www.overseaswork.com

Get the edge by acquiring our up-to-date Directory.  If you are a skilled
individual these companies would love to hear from you. They spend
hundreds of hours and tens of thousands of $$$$$$$ looking for talented
people like you in the following geographical areas:

Europe* Central America* Australia* Canada* Pacific Islands* South
Africa* Middle East* South East Asia* Japan* South America* Caribbean*
Brazil* Far East* China* Malaysia* Russia*

Our detailed guidelines will assist you to apply for overseas jobs listed with
IRDI's Directory.  Included are foreign-based and US corporations with
thousands of current openings outside of the US. Most employers will pay
for your relocation expenses.  Your food, accommodations and
transportation to your new career position are all usually included in a
package offer, as well as several weeks of annual paid vacation and
other benefits for you and your family.

Our Directory listings are continually updated from leading worldwide
on-line databases and regular contact with international employers and
search firms. We will provide you our Directory of International Recruiters
and Employers for only $39.95 (shipping and tax included).

We want to do all we can to make your new career in the international
marketplace a resounding success!  If you wish, we can provide you
with an effectively composed internationally formatted resume at an
affordable price!  Please fax us your fully completed international resume
worksheet (which you will find at the end of your Directory),
and we will call you with a quote.

Once your resume is prepared, we can also mail your resume to your
selected targets at a nominal expense over our direct out-of-pocket
costs (e.g. postage, stationery, printing, etc.).
Our Fax is (213) 380-1288 Phone: (213) 385-0557, or (213) 385-8388

THIS WILL BE THE FIRST STEP IN THE MOST IMPORTANT
CAREER DECISION OF YOUR LIFE!  ORDER NOW!

Send check or money order for $39.95 payable to:

International Research & Data Institute
Attn: Research Department
Howard Hughes Center, Fifth Floor
6601 Center Drive West
Los Angeles, CA 90045

Please include your name, return address & telephone number.

********************************************************************************
Obtain the current issue (via COD); Send us an inquiry to our address
above, or call us at (213) 385-0557. After business hours please leave
a message giving us your name, address and phone number. You can
also Email us your COD order to;
IRDI at overseaswork.com (please put "COD Order" as the subject)

Directory of International Recruiters and Employers,
via COD is $49.95, (tax, shipping and COD charges included).
********************************************************************************

P.S. Feel free to visit our Web Site and learn more about us @
www.overseaswork.com





From overseas at 4link.net  Thu Feb 19 02:33:35 1998
From: overseas at 4link.net (overseas at 4link.net)
Date: Thu, 19 Feb 1998 02:33:35 -0800 (PST)
Subject: AN EXCITING OVERSEAS JOB IS WAITING FOR YOU!
Message-ID: <>


CAPITALIZE ON YOUR TRUE WORTH!
**********************************************************************
Earn up to $72,000 (US Dollars) annually tax-free working abroad!
Yes, by law you are entitled to earn up to $72,000 in annual earnings
working outside of the US without paying any US income taxes.
**********************************************************************

Hundreds of companies are aggressively hiring American talent for
lucrative jobs worldwide.  After extensive research, INTERNATIONAL
RESEARCH & DATA INSTITUTE (IRDI) is now publishing its latest
edition of a directory which will provide you with key leads to a specific
recruiter or employer that can offer you a fantastic overseas career
opportunity.

International Search Firms: IRDI's Directory of International Recruiters
and Employers has a section which provides up-to-date detailed
information on executive search firms all over the world which are
currently seeking qualified candidates to fill positions for their client
companies. If they place you with one of their clients, the client pays
their search fee. It's a total win situation for you!

International Direct Job Opportunities: Our Directory has a separate
section which provides key leads directly to companies which are
currently seeking capable candidates to fill positions which they have
available outside of the US. This section includes names of staffing
executives, addresses, phone numbers and describes the types of jobs
being offered.

The listings in IRDI's Directory cover many fields:

Accounting* Chem./Petrochemical* Engineering* Oil & Gas* Advertising*
Communications* Environmental* Pharmaceuticals* Agriculture* Computers*
ESL/Education* Programming* Architecture* Contract/Admin. * Finance*
Banking* Public Relations* Automotive* Construction* Health Care*
Transportation* Aviation/Aerospace* Data Processing* Human Resources*
Business* Travel/Tourism* Management* Electronics* Nursing* Marketing*
Sales* Hospitality*
AND OTHERS!

If your target field is not listed above, contact us and we will research and
guide you to positions that are available, or feel free to email or call us
should you have a question. Email us at Research at overseaswork.com,
or email us from our website; http://www.overseaswork.com

Get the edge by acquiring our up-to-date Directory.  If you are a skilled
individual these companies would love to hear from you. They spend
hundreds of hours and tens of thousands of $$$$$$$ looking for talented
people like you in the following geographical areas:

Europe* Central America* Australia* Canada* Pacific Islands* South
Africa* Middle East* South East Asia* Japan* South America* Caribbean*
Brazil* Far East* China* Malaysia* Russia*

Our detailed guidelines will assist you to apply for overseas jobs listed with
IRDI's Directory.  Included are foreign-based and US corporations with
thousands of current openings outside of the US. Most employers will pay
for your relocation expenses.  Your food, accommodations and
transportation to your new career position are all usually included in a
package offer, as well as several weeks of annual paid vacation and
other benefits for you and your family.

Our Directory listings are continually updated from leading worldwide
on-line databases and regular contact with international employers and
search firms. We will provide you our Directory of International Recruiters
and Employers for only $39.95 (shipping and tax included).

We want to do all we can to make your new career in the international
marketplace a resounding success!  If you wish, we can provide you
with an effectively composed internationally formatted resume at an
affordable price!  Please fax us your fully completed international resume
worksheet (which you will find at the end of your Directory),
and we will call you with a quote.

Once your resume is prepared, we can also mail your resume to your
selected targets at a nominal expense over our direct out-of-pocket
costs (e.g. postage, stationery, printing, etc.).
Our Fax is (213) 380-1288 Phone: (213) 385-0557, or (213) 385-8388

THIS WILL BE THE FIRST STEP IN THE MOST IMPORTANT
CAREER DECISION OF YOUR LIFE!  ORDER NOW!

Send check or money order for $39.95 payable to:

International Research & Data Institute
Attn: Research Department
Howard Hughes Center, Fifth Floor
6601 Center Drive West
Los Angeles, CA 90045

Please include your name, return address & telephone number.

********************************************************************************
Obtain the current issue (via COD); Send us an inquiry to our address
above, or call us at (213) 385-0557. After business hours please leave
a message giving us your name, address and phone number. You can
also Email us your COD order to;
IRDI at overseaswork.com (please put "COD Order" as the subject)

Directory of International Recruiters and Employers,
via COD is $49.95, (tax, shipping and COD charges included).
********************************************************************************

P.S. Feel free to visit our Web Site and learn more about us @
www.overseaswork.com





From jim.burnes at ssds.com  Wed Feb 18 10:41:50 1998
From: jim.burnes at ssds.com (Jim Burnes)
Date: Thu, 19 Feb 1998 02:41:50 +0800
Subject: New technology around the corner [slashdot.org]
In-Reply-To: <199802181626.KAA11323@einstein.ssz.com>
Message-ID: <34EB2935.AC6847AE@ssds.com>



Jim Choate wrote:
> 
> Note: Text edited for relevance.
> 
> Forwarded message:
> 
> > Subject: http:--www.slashdot.org-
> 
> >    Hitachi Makes Breakthrough Contributed by Justin
> >    [Technology] Tue Feb 17 16:40:30 1998 EST
> >    From the rapidly-advancing-society? dept.
> >    Hitachi has made a breakthrough of their own, in a different kind of
> >    storage. Hitachi announced they have found a way to reduce the number
> >    of electrons needed to store a bit of information in a DRAM chip. The
> >    128MB chips should be coming out soon, and will be perfected in the
> >    16GB (*drool*) generation of chips.

Does anyone else get the feeling that we are on the cusp of
serious exponential change in technology?   I know its been
going exponential for a while, but now I'm really starting
to feel it.  Thats major breakthroughs in two weeks:

1. 170 TB Polymer memory sandwiches (OptiCom)
2. Flat Plastic Video Screens using Light Emitting Polymers "LEPs"
(Cambridge)
3. massive DRAMS (Hitachi)

ObCrypto: Since polymer transistors seem to be necessary to implement
polymer memory, how does this effect computation speed?  The polymer
transistors must be around 30-40nm and low power.  How long until we
have Polymer PGA,PALS,CPUs?  How fast will they be?  Is it time to add
a few more bits to the public key?  Are there any cipher attacks that
would benefit from obscenely large amounts of fast memory?  Sorry if
this is a naive question to the theorists.

Jim






From tcmay at got.net  Wed Feb 18 11:21:46 1998
From: tcmay at got.net (Tim May)
Date: Thu, 19 Feb 1998 03:21:46 +0800
Subject: New technology around the corner [slashdot.org]
In-Reply-To: <199802181626.KAA11323@einstein.ssz.com>
Message-ID: 



At 10:32 AM -0800 2/18/98, Jim Burnes wrote:

>Does anyone else get the feeling that we are on the cusp of
>serious exponential change in technology?   I know its been
>going exponential for a while, but now I'm really starting
>to feel it.  Thats major breakthroughs in two weeks:
>
>1. 170 TB Polymer memory sandwiches (OptiCom)
>2. Flat Plastic Video Screens using Light Emitting Polymers "LEPs"
>(Cambridge)
>3. massive DRAMS (Hitachi)

No, I don't think we're on any kind of cusp of a growth curve. If anything,
several things are slowing down.

Beware the "press release." The items above are just a few of literally
thousands of such announcements.

Remember how "laser pantography" was going to revolutionize chip-making,
and even make "back yard fabs" possible? How about "silicon on sapphire"
and how it would obsolete Integrated Injection Logic? (You don't remember
I-squared L? Shame on you, as it was scheduled to put Intel out of business
by 1976).

Or how about plastic cubes that can store terabytes. Or wafer scale
integration. Or e-beam addressed memory. Or neural networks. Or fuzzy logic.

("Hey, Tim's being a negativist. My new rice cooker says it has fuzzy logic
in it.")

And then there's the whole universe of speculation about quantum computers,
DNA computers, nanotechnology, etc.

The fact is that R&D labs partly run on hype. And journalists are willing
to interview researchers to generate stories.

A particularly interesting place to read about all the Latest and Greatest
technologies destined to replace silicon is "Electronic Engineering Times."
EE Times has for at least 15 years been running breathless hype about such
technologies as neural networks, brain machines, organic semiconductors,
optical memories, and on and on.

(These articles are often interesting, too. I just don't get too excited by
some researcher's predictions.)

>ObCrypto: Since polymer transistors seem to be necessary to implement
>polymer memory, how does this effect computation speed?  The polymer
>transistors must be around 30-40nm and low power.  How long until we
>have Polymer PGA,PALS,CPUs?  How fast will they be?  Is it time to add
>a few more bits to the public key?  Are there any cipher attacks that
>would benefit from obscenely large amounts of fast memory?  Sorry if
>this is a naive question to the theorists.

If you literally mean "add a few more bits," as in 4 or 5 or so bits, that
pretty much applies every few years, by the usual Moore's Law sorts of
calculations. (Except of course it makes no logistic/administrative sense
to literally add a few more bits...better of course to pick a "safely
large" size. And of course the strength is usually more dependent on the
underlying symmetric cipher key size (e.g., IDEA).

As for "polymer memory," or even Hitachi's "fewer electrons in the cell"
research, believe it when you see it. And when you can buy it. And buy it
cheaply.

But I don't get overly excited by announcements of new developments like
this. Perhaps following the industry for 25 years has made me jaded.

--Tim May


Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.








From nobody at REPLAY.COM  Wed Feb 18 12:15:48 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 19 Feb 1998 04:15:48 +0800
Subject: No Subject
Message-ID: <199802182008.VAA17760@basement.replay.com>




Two spam-ignorati wrote:

>>Don't get me wrong; I don't *like* spam. But
>>for me it's a minor problem, certainly not
>>worthy of legal remedies. I'm willing to suffer
>>a certain level of foolish annoyance gladly
>>in return for liberty.

>Same for me. I can delete commercial advertisements ("spam") in
seconds.

I used to have the same attitude. But then I started running a mail
server.

Routinely I find spammers attempting to use my server as a relay for
their crap. The undeliverable notifications fill up my postmaster mail
box so that I have to spend much more than "a few seconds" to sort out
this virtual mail bomb from the legitimate notifications I need to do
something about.

Current I am chasing some asshole from ISP to ISP in Arizona, shutting
him down only to have him get a new account with another ISP and "mail
bomb" me from there.

I would gladly prosecute, as this person is no better than a thief,
stealing my resources and time so he can run his con.


BTW, the reason I sent anon is so other spammers don't get my host name
and try to use it as a relay.






From sunder at brainlink.com  Wed Feb 18 12:58:32 1998
From: sunder at brainlink.com (sunder)
Date: Thu, 19 Feb 1998 04:58:32 +0800
Subject: Is spam really a problem?
In-Reply-To: <199802181733.SAA26244@basement.replay.com>
Message-ID: <34EB48F9.352C6B61@brainlink.com>



Anonymous wrote:
> 
> I see discussion of spam here and everywhere on
> the net. But who finds it a *real* problem, and
> why?

It eats up your valuable time.  You might not see it for what it is, but
it is an interruption of normal service.  It's annoying as having your
pager go off durring sex and having to call back your boss instead of
ignoring it.  (Presume you can't shut off your pager.)  It takes away
from the continuity of life.

Further, some of us use ISDN to get their email and transferring the
extra junk adds to the pay/minute connections.

There are nice technical solutions to this.  If sendmail didn't transport
things unauthenticated it could be done, but at a cost in CPU cycles on mail
servers:

Have every sendmail server use a PK scheme to talk to every other
server and authenticate the connection.  Have every sendmail server accept
mail only from those whose key is verified.

Anonymous remailers would still work and these could be set up to accept
unauthenticated email, but then use their own credentials to send out
the mail, so it will auth with your servers.  Also have the anon remailers
not accept too many messages from one source within a certain time frame to
different destinations.  i.e. if I send out 50 messages to cypherpunks in
one hour, that's cool.  If I send out 50 messages to 50 different users
everywhere within an hour, it's not cool.

This way the spamming bitches would be forced to still register domain
names and send mail from them, and you can have your mail server block
them as needed and be certain of where they came from.  If you have
problems with anon users, you can block unsigned (and/or signed but
unrecognized) messages from anon users, while still allowing signed
messages of anons you know well and accept mail from.  

[Note: I said known anons, this prevents Spamfuckers from genning
10 billion key pairs to spam you with.]

(I won't get into persistant anonymous identities and reputation capital
as that's been beaten to death already.)

IMHO with such a scheme it will be possible to reactivate email relaying
again, it just requires everyone to gen their own DH or RSA keys.  The
mailer software can handle this for users, so it's of little issue.

The other side of the coin is that ISP's should include AUP clauses that
state if you spam, you pay extra $$$ and make it enforceable via contract.
Say, you pay shit.net $10/month for access, you'll have to sign a thing
that says if you use your account to spam, you'll have to pay $500,000
or something just as prohibitive, or release their real world info, 
(or whatever can be legally used to deter the fuckers.)

If any ISP's don't do this, or allow way too many spams, they get
filtered from your servers.

Mind you, this won't totally stop spammers, but it will make it hard 
for them.  Food for thought.  IMHO, with such fascist anti-encryption
laws today, this is unlikely to take off. :(

OTOH, the idea of pledging not to buy anything from spammers helps in
the long run, but there are enough sheep out there that will accept
any crap thrown in their mail.  Further, spamming them back helps.
If they put 800 numbers on the spam, call them and talk to them for
hours and waste their time.  If they put fax numbers in there, send
them orders with fake addresses.  If they put up net addresses, block
them from your router and/or flood them with extra traffic if you can
or want to.  If they put up PO addresses, subscribe them to many weird
magazines by sending in the fall out cards with their address on
it.  (seek legal advice before trying these, I'm just ranting and venting.)
:)

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From guy at panix.com  Wed Feb 18 13:21:10 1998
From: guy at panix.com (Information Security)
Date: Thu, 19 Feb 1998 05:21:10 +0800
Subject: Is spam really a problem?
Message-ID: <199802182107.QAA00482@panix2.panix.com>



   >   From sunder at brainlink.com Wed Feb 18 15:58:46 1998
   >   
   >   Anonymous wrote:
   >   > 
   >   > I see discussion of spam here and everywhere on
   >   > the net. But who finds it a *real* problem, and
   >   > why?

Why are you asking the cypherpunks list?

   >   There are nice technical solutions to this.  If sendmail didn't transport
   >   things unauthenticated it could be done, but at a cost in CPU cycles on mail
   >   servers:
   >   
   >   Have every sendmail server use a PK scheme to talk to every other
   >   server and authenticate the connection.  Have every sendmail server accept
   >   mail only from those whose key is verified.

Nonsense.

We (NANA) already know where spam comes from,
and when we complain about it, they are terminated.

#   Date: Tue, 10 Feb PST  16:13:26 -0800
#   Message-Id: <199802110013.QAA23854 at blaze.corp.netcom.com>
#   Subject: Re: Commercial spam complaint
#   From: abuse at netcom.com (NETCOM Policy Management)
#
#   Thank you for your report. This user's account has been terminated for
#   violations of NETCOM's Acceptable Use Guidelines.

PK authentication would change nothing.

Show a single spam with a forged IP address.

PK authentication would only lead us down the
road of everyone being tattooed with barcodes
of our own making - and incredibly dumb idea.
---guy

   It would be like requiring a smart card for Internet access.






From ravage at ssz.com  Wed Feb 18 13:58:19 1998
From: ravage at ssz.com (Jim Choate)
Date: Thu, 19 Feb 1998 05:58:19 +0800
Subject: New technology around the corner [slashdot.org] (fwd)
Message-ID: <199802182201.QAA12804@einstein.ssz.com>



Forwarded message:

> Date: Wed, 18 Feb 1998 11:32:21 -0700
> From: Jim Burnes 
> Subject: Re: New technology around the corner [slashdot.org]

> Does anyone else get the feeling that we are on the cusp of
> serious exponential change in technology?   I know its been
> going exponential for a while, but now I'm really starting
> to feel it.

I have felt that way since the early 80's. The rate of technology
multiplication and some of the truly weird technologies that people said
wold never happen are happening. 

> 2. Flat Plastic Video Screens using Light Emitting Polymers "LEPs"
> (Cambridge)

Don't forget the fact that their test beds were done with *standard* ink-jet
printers with a modified head assembly.

> ObCrypto: Since polymer transistors seem to be necessary to implement
> polymer memory, how does this effect computation speed?  The polymer
> transistors must be around 30-40nm and low power.  How long until we
> have Polymer PGA,PALS,CPUs?  How fast will they be?  Is it time to add
> a few more bits to the public key?  Are there any cipher attacks that
> would benefit from obscenely large amounts of fast memory?  Sorry if
> this is a naive question to the theorists.

These are some of the exact same questions that I'm trying to add numbers to
myself... when we take the union of the computer, information processing,
networking, bio-engineering, transportation, etc. industries the various
predictions of Toffler and others seem woefuly short-sighted.


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From weidai at eskimo.com  Wed Feb 18 14:14:33 1998
From: weidai at eskimo.com (Wei Dai)
Date: Thu, 19 Feb 1998 06:14:33 +0800
Subject: Is spam really a problem?
In-Reply-To: <199802181733.SAA26244@basement.replay.com>
Message-ID: <19980218135327.39037@eskimo.com>



On Wed, Feb 18, 1998 at 06:33:07PM +0100, Anonymous wrote:
> 
> I see discussion of spam here and everywhere on
> the net. But who finds it a *real* problem, and
> why?

The way I see it, the problem with spam isn't that it takes too much
effort to delete them, but that it discourages useful advertisement
through email. Email could be a very efficient way for companies to send
valuable information to potential customers, but the incentives are such
that virtually all unsolicited commercial email are of very low value
and are deleted without being read. 

If you like game theory, you might want to search the cypherpunks mailing
list archive for a game theoretic analysis of the spam situation.






From ravage at ssz.com  Wed Feb 18 14:19:05 1998
From: ravage at ssz.com (Jim Choate)
Date: Thu, 19 Feb 1998 06:19:05 +0800
Subject: New technology around the corner [slashdot.org] (fwd)
Message-ID: <199802182222.QAA12937@einstein.ssz.com>



Forwarded message:

> Date: Wed, 18 Feb 1998 11:16:15 -0800
> From: Tim May 
> Subject: Re: New technology around the corner [slashdot.org]

> No, I don't think we're on any kind of cusp of a growth curve. If anything,
> several things are slowing down.

Stricly speaking I would agree, we are *past* the cusp and on the upward
rush of the technology curve.

> Beware the "press release." The items above are just a few of literally
> thousands of such announcements.

Exactly! Only look at what people are actualy *doing* and not what they are
predicting. It's one of the reasons the vast majority of forwards in the
technology forum I send here are about things that have succeeded.

> Remember how "laser pantography" was going to revolutionize chip-making,
> and even make "back yard fabs" possible?

While the concept of a backyard fab has been pretty much blown out of the
water what *has* come around and *wasn't* predicted is the growth of
fab-less chip design companies. If you look at how these sorts of businesses
have grown since the late 80's onward it is astounding some of the custom
chips these firms are willing to design and get built through renting others
spare fab bandwidth.

> How about "silicon on sapphire"
> and how it would obsolete Integrated Injection Logic? (You don't remember
> I-squared L? Shame on you, as it was scheduled to put Intel out of business
> by 1976).

SoS technology was always predicted to win the game *if* the issues of
thermal expansion between the Silicon and Sapphire could be resolved. Also,
just as with Josephson Junction devices, other methods to achieve the same
levels of predicted performance at less cost were devloped. There must be
technologies that fail for there to be technologies to win. Simply pointing
at the failed ones as an example of why it can't happen is a strategy that
is doomed. There will always be some turk who has the self-confidence to say
it can be done and then does it.

> Or how about plastic cubes that can store terabytes. Or wafer scale
> integration. Or e-beam addressed memory. Or neural networks. Or fuzzy logic.

All of these technologies are out there. They haven't reached a point where
they're mature for a variety of reasons. Let's look at Terabyte storage for
a moment. Consider that the largest data bases on the planet are only a few
*hundred* Terebytes and of them there are only a few 10's of thousands.
Perhaps the reason the market hasn't taken off in this area is because the
market isn't large enough. Give it another 5-10 years so that computers have
become pervasive in schools, play, home, business, etc. (and no they are not
pervasive now) and the market forces to drive new material releases on CD
or other long-term media as the *primary* media (paper being so now) *and*
there becomes a market for the re-release of past books and material then
we'll begin to see a reason for each of us to be carrying around tera-bytes
of data.

Fuzzy logic and neural networks resolve your telephone switching issues,
are used to locate natural resources, filter intelligence data for threads,
etc. They're even used in coffee makers and micro-waves now.

e-beam addressed memory is a looser, and anyone with a clue back them would
have said so as well. Too power hungry, physicaly a bitch to haul around in
your shirt pocket, etc.

> ("Hey, Tim's being a negativist. My new rice cooker says it has fuzzy logic
> in it.")

See!

> And then there's the whole universe of speculation about quantum computers,

I *strongly* suggest folks follow the Quantum Coupled Architecture
developments over the next two years or so.

> DNA computers, nanotechnology, etc.

These are new technologies that are only a decade or two old. Consider
transisitors. The first FET transistor effects was discovered in the 30's
but it wasn't until the 50's that we actualy managed to build a working BJT
and several years after that till the FET based technology became feasible.
And there have been some interesting advances in these fields. DES being
cracked by a bio-logical computer a couple of years ago for example. The ARM
technology as well as the ability to not only understand but manipulate the
genetics and mechanics of nano-technology have only been around 5-10 years.
These are new technologies that are at the 'terrible-two's' stages of
development. It's clear they can do it, they just haven't figured out how.
And in the process they're rambling around the house opening every cubbard
and drawer dumping the contents out.

> The fact is that R&D labs partly run on hype. And journalists are willing
> to interview researchers to generate stories.

Until it's a reality it's *always* hype. Asking the technology to prove it
itself the first day is like asking a new born baby to talk or recite
Shakespeare. It's unreasonably demanding and self-deluding.

> A particularly interesting place to read about all the Latest and Greatest
> technologies destined to replace silicon is "Electronic Engineering Times."

You can see some pretty funny predictions in the Enquirer also...

It's a good thing to have an open mind, just not so open it sloshes out on
the ground.

> But I don't get overly excited by announcements of new developments like
> this. Perhaps following the industry for 25 years has made me jaded.

>From the stories of your personality and the demonstrations I've seen you're
a born cynic.


The street finds its own uses for technology.

                      William Gibson


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From ravage at ssz.com  Wed Feb 18 14:50:26 1998
From: ravage at ssz.com (Jim Choate)
Date: Thu, 19 Feb 1998 06:50:26 +0800
Subject: Moore's Law - What is it?
Message-ID: <199802182255.QAA13050@einstein.ssz.com>



Hi,

Consider this,

Moore's Law has for the past few decades successfuly described the increase
in computer performance, at least within experimental error. It has proven
it's success, at least short term, from the school of hard knocks.

But what *is* Moore's Law? It clearly doesn't discuss the fundamental
technology of computing and its limitations. Is it in fact the mathematical
description of our understanding and ability to apply that comprehension to
the real world. Is it in fact a mathematical model of the limits of human
reasoning and not computing technology per se.

If Moore's Law is fundamentaly valid over the long-term it should be
applicable to other forms of human endeavor since the limits of human
reasoning and comprehension would seem to be a characteristic of our mind
and not a particular area of application.

What other forms of human exploration when examined in this light follow the
curve?

Perhaps Moore's Law is a measure of an ecomomic systems' ability to apply
and distribute technology to the society in a non-breakthrough, an ah-hah
experience where there is a fundamental shift of paradigm, environment.

If so, what other forms of economic expansion follow this curve?

However, if Moore's Law is only applicable to computing technology; Why?
Why should such a simple curve describe such a complex and inherently
non-deterministic area?


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From tcmay at got.net  Wed Feb 18 15:27:05 1998
From: tcmay at got.net (Tim May)
Date: Thu, 19 Feb 1998 07:27:05 +0800
Subject: Is spam really a problem?
In-Reply-To: <199802181733.SAA26244@basement.replay.com>
Message-ID: 



At 12:47 PM -0800 2/18/98, sunder wrote:
>Anonymous wrote:
>>
>> I see discussion of spam here and everywhere on
>> the net. But who finds it a *real* problem, and
>> why?
>
>It eats up your valuable time.  You might not see it for what it is, but
>it is an interruption of normal service.  It's annoying as having your
>pager go off durring sex and having to call back your boss instead of
>ignoring it.  (Presume you can't shut off your pager.)  It takes away
>from the continuity of life.

But *many* things eat up our valuable time. Doesn't mean government action
is the answer.

>Further, some of us use ISDN to get their email and transferring the
>extra junk adds to the pay/minute connections.

If you use ISDN and pay minute charges to download an article from me, for
example, and you feel it was a waste of your valuable time, should my
article be illegal?

If someone sees your name somewhere and does the same thing (sends you a
letter), should this be illegal?

(I threw this last point in because some have argued that there is an
implicit agreement that mail on a mail exploder will not be objected to, as
it fits the charter, blah blah. So I removed this implicitness by speaking
of someone who writes a letter.)

If _content_ is not a criterion for spam, as Costner and others have noted,
then "wasting Ray's time" is even less of a criterion for what spam is.


Look, there's just not going to be a simple government answer to "unwanted
communications" that doesn't do serious damage to our liberties.

Technological/economic approaches are the only way to go.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.








From tcmay at got.net  Wed Feb 18 15:34:53 1998
From: tcmay at got.net (Tim May)
Date: Thu, 19 Feb 1998 07:34:53 +0800
Subject: Squelch discussions of the "spam problem"
Message-ID: 




Several lists I'm on are beating the spam problem once again. What to do
about it, whether government should step in, and so on.

Look, folks, I guarantee that the more everyone talks about the "spam
problem," even if most of us don't think it's a pressing problem, the more
likely it is that spam legislation will be introduced. And that won't be
good, whatever one thinks of spam.

Congress operates by catering to special interests and popular calls for
"action." Doesn't matter to them what action they take, so long as they can
hold up their "Digital Protectin and Children's Safe Surfing Act of 1998"
legislation.

The more jostling and chatter that goes on, the more likely Congressional
aides will start drawing up legislative language.

So, even if you think spam is a serious problem, I urge you to suppress the
desire to throw your two cents in on what kind of a horrible thing it is,
how its corrupting the nation's precious bodily fluids, and how *something*
must be done!

I guarantee you won't like the results you get, no matter your views on spam.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.








From nobody at REPLAY.COM  Wed Feb 18 16:11:15 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 19 Feb 1998 08:11:15 +0800
Subject: New technology around the corner [slashdot.org]
In-Reply-To: <199802181626.KAA11323@einstein.ssz.com>
Message-ID: <199802190002.BAA25350@basement.replay.com>



Tim May wrote:

> Or how about plastic cubes that can store terabytes....


They work fine.  Just keep it in liquid nitrogen or you'll lose all your
data.

Backyard fabs?  Quite doable with MBE or electron beam lithography.  Just
don't expect to do any mass-production on such a setup.


There's possible, and then there's practical.  You've ranted on that
subject a lot.  ("AMD can't make enough chips.")






From troy at austin.ibm.com  Wed Feb 18 16:13:27 1998
From: troy at austin.ibm.com (Troy A. Bollinger)
Date: Thu, 19 Feb 1998 08:13:27 +0800
Subject: (forw) Re: Cypherpunks - Austin: Sat. Feb. 21 6-7pm, physical meet (fwd)
Message-ID: <19980218180749.12069@austin.ibm.com>

I made the mistake of replying back to austin-cpunks instead of this
list.  If anyone attending CFP this week in Austin would like to get
together let me know.  Or just show up on Saturday for the local meet.

Thanks,
Troy

----- Forwarded message from Jim Choate  -----

Message-Id: <199802181631.KAA11452 at einstein.ssz.com>
Subject: Re: Cypherpunks - Austin: Sat. Feb. 21 6-7pm, physical meet (fwd)
To: austin-cpunks at ssz.com
Date: Wed, 18 Feb 1998 10:31:27 -0600 (CST)
In-Reply-To: <19980218101742.09049 at austin.ibm.com> from "Troy A. Bollinger" at Feb 18, 98 10:17:42 am
X-Mailer: ELM [version 2.4 PL23]
Content-Type: text
Sender: owner-austin-cpunks at ssz.com
Reply-To: austin-cpunks at ssz.com


Hi Troy,

> Well, I'm free to meet anytime this week.  I don't know what the
> schedule is for CFP, but if someone sends me a time and place I'll show
> up.

> > > Lots of us out-of-towners will be in Austin for CFP this week -- but the
> > > conference ends on Friday. People start leaving that evening or the next
> > > morning. And those of us are staying through Saturday are planning a day
> > > trip outside of Austin that won't get us back by 6 pm.
> > >
> > > Why not have a pre-meet, or the meet itself, during CFP?

You should send a notice to 'cypherpunks at ssz.com' so that your offer can be
propogated to the entire crew quickly.

Thanks for the effort.

----- End forwarded message -----

-- 
Troy Bollinger                            troy at austin.ibm.com
AIX Security Development        security-alert at austin.ibm.com
PGP keyid: 1024/0xB7783129 Troy's opinions are not IBM policy

-------------- next part --------------
A non-text attachment was scrubbed...
Name: pgp00000.pgp
Type: application/octet-stream
Size: 355 bytes
Desc: "PGP signature"
URL: 

From vznuri at netcom.com  Wed Feb 18 16:14:15 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Thu, 19 Feb 1998 08:14:15 +0800
Subject: News & Truth
In-Reply-To: <199802171633.KAA03408@einstein.ssz.com>
Message-ID: <199802190007.QAA19951@netcom13.netcom.com>



Jefferson:
>At a very early period in my life I determined never to put a sentence into
>any newspaper. I have religously adhered to the resolution through my life
>and have great reason to be contented with it. Were I to undertake to answer
>the calumnies of the newspapers it would be more than my time and twenty
>aids could effect. For, while I should be answering one, twenty new ones
>would be invented. I have thought it better to trust to the justice of my
>countrymen  that they would judge me by what they see of my conduct on the
>stage where they have placed me.

a friend of mine is studying Hamilton vs. Jefferson. it turns out
Hamilton loved newspapers and would write frequently under his own
name, or under a variety of pseudonyms. one biographer states he
assumed the personality of each as he wrote under them.  I think
Jefferson was at ill advantage in the face of Hamilton's tactics.


>No Government ought to be without censors; and when the press is free, no
>one ever will. Nature has given to man no other means of sifting out the
>truth either in religion, law or politics. I think it as honorable to the
>government neither to know nor notice its sycophants or censors as it would
>be undignified and criminal to pamper the former and persecute the latter.

this is pretty hard to parse until one understands that an old 
form of the word "censor", as I understand it, meant "to criticize".
so "censor" as a noun and verb should be replaced with "critic" and
"criticize" for the modern translation.






From vznuri at netcom.com  Wed Feb 18 16:19:37 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Thu, 19 Feb 1998 08:19:37 +0800
Subject: Websites and trademarks at odds [CNN]
In-Reply-To: <199802181552.JAA11020@einstein.ssz.com>
Message-ID: <199802190013.QAA20451@netcom13.netcom.com>



the article states that it is difficult for consumers to
find companies when trademarks are not equivalent to 
web site addresses.

solution: a "trademark directory" web page-- say,
www.trademark.com. it gives the
official web site of all companies in the world. yahoo
is close to this but not quite. an opportunity for a 
budding entrepreneur. it would clearly be a very
high-traffic site, ripe with advertising possibilities.

added benefit:
it might cut down on the animosity going on over 
web site addresses, "poaching", and lawsuits over ownership.






From vznuri at netcom.com  Wed Feb 18 16:22:03 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Thu, 19 Feb 1998 08:22:03 +0800
Subject: Squelch discussions of the "spam problem"
In-Reply-To: 
Message-ID: <199802190018.QAA20938@netcom13.netcom.com>



I strongly disagree with TCM about not talking about spam.

I have commented on the list many times about the very
difficult problem of spam and how its not something that
ought to be ignored. it *was* ignored many years ago
and is continuing to get worse. it will *continue* to
get worse until some good solutions are found.

however, I agree with TCM in that I despise a legislative
solution and think that it would be a very bad idea, and
lead to new odious bureacracies.

I do believe that the spam problem can be solved with
a technical solution, and I urge cypherpunks as a group 
(oops, that's taboo and an oxymoron) to attack it technically.
that is part of the problem-- imho it requires a cooperative
& collaborative solution, which tends to defy the loner and individualistic
mentality that permeates cyberspace. 

why can't cryptographic ingenuity be applied to this problem?
in many ways it is similar to problems of "denial of service"
that keep repeating all over cyberspace because it is a 
very difficult problem to solve.

I suspect reputation systems might be extremely useful in attacking the
problem, and supposedly this is a cpunk area.

I'm going to try to write up an essay soon on spam prevention based
on some of the ideas I have bouncing around in my brain.






From nobody at REPLAY.COM  Wed Feb 18 16:25:32 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 19 Feb 1998 08:25:32 +0800
Subject: New technology around the corner [slashdot.org]
In-Reply-To: <199802181626.KAA11323@einstein.ssz.com>
Message-ID: <199802190021.BAA28248@basement.replay.com>



Tim May wrote:

> Or how about plastic cubes that can store terabytes....


They work fine.  Just keep it in liquid nitrogen or you'll lose all your
data.

Backyard fabs?  Quite doable with MBE or electron beam lithography.  Just
don't expect to do any mass-production on such a setup.


There's possible, and then there's practical.  You've ranted on that
subject a lot.  ("AMD can't make enough chips.")






From ravage at ssz.com  Wed Feb 18 16:29:24 1998
From: ravage at ssz.com (Jim Choate)
Date: Thu, 19 Feb 1998 08:29:24 +0800
Subject: News & Truth (fwd)
Message-ID: <199802190033.SAA13743@einstein.ssz.com>



Forwarded message:

> Subject: Re: News & Truth 
> Date: Wed, 18 Feb 98 16:07:00 -0800
> From: "Vladimir Z. Nuri" 

> a friend of mine is studying Hamilton vs. Jefferson. it turns out
> Hamilton loved newspapers and would write frequently under his own
> name, or under a variety of pseudonyms. one biographer states he
> assumed the personality of each as he wrote under them.  I think
> Jefferson was at ill advantage in the face of Hamilton's tactics.

Perhaps, but I doubt your proposing that history looks upon Hamilton
with equity to Jefferson. The ultimate winner of any discourse is the one
that history remembers.

Jefferson's Opinion of Hamilton:

That I have utterly in my private conversations disapproved of the system of
the Secretary of the Treasury, Alexander Hamilton, I acknowledge and avow;
and this was not a merely speculative difference. His system flowed from
principles adverse to liberty and was calculated to undermine and demolish
the republic, by creating an influence of his department over members of the
Legislature. I saw this influence actually produced, and its first fruits to
be the establishment of the greatest outlines of his project by the votes of
the very persons who, having swallowed his bait, were laying themselves out
to profit by his plans; and that had these persons withdrawn as those
interested in a question ever should, the vote of the disinterested majority
was clearly the reverse of what they made it. These were no longer then the
votes of the representatives of the people, but of deserters from the right
and interests of the people.

My objection to the Constitution was that it wanted a bill of rights
securing freedom of religion, freedom of press, freedom from standing
armies, trial by jury, and a constant Habeas Corpus act. Colonel Hamilton's
was that it wanted a king and a house of lords. The sense of America has
approved my objection and added the bill of rights, not the king and lords.
I also thought a longer term of service, nsusceptible of renewal would have
made a President more independant. My country has thought otherwise, and I
have aquiesced implicity. He wishes the general government should have power
to make laws binding the States in all cases whatever. Our country has
thought otherwise. Has he aquiesced?

Note: It is of some interest to note the capitalization in the final
      opinion, it is Jeffersons.


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From ravage at ssz.com  Wed Feb 18 16:35:08 1998
From: ravage at ssz.com (Jim Choate)
Date: Thu, 19 Feb 1998 08:35:08 +0800
Subject: New technology around the corner [slashdot.org] (fwd)
Message-ID: <199802190037.SAA13835@einstein.ssz.com>



Forwarded message:

> Date: Thu, 19 Feb 1998 01:21:32 +0100 (MET)
> Subject: Re: New technology around the corner [slashdot.org]
> From: nobody at REPLAY.COM (Anonymous)

> Tim May wrote:
> 
> > Or how about plastic cubes that can store terabytes....
> 
> 
> They work fine.  Just keep it in liquid nitrogen or you'll lose all your
> data.

This only applies to semiconductor systems. Also, liquid Nitrogen is cheaper
to purchase than beer, liter for liter. Also with Peltier devices it is quite
possible to keep such systems working for extended periods of time. Simply
review some of the Nitrogen based IR viewing systems that are being used by
amatuer astronomers.

However, there are technologies being worked on now, protein memory for
example, that offer equal 3d packing factors and don't require esoteric
cooling systems.


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From nobody at REPLAY.COM  Wed Feb 18 16:37:42 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 19 Feb 1998 08:37:42 +0800
Subject: Is spam really a problem?
In-Reply-To: <199802181733.SAA26244@basement.replay.com>
Message-ID: <199802190024.BAA28610@basement.replay.com>



Wei Dai wrote:

> The way I see it, the problem with spam isn't that it takes too much
> effort to delete them, but that it discourages useful advertisement
> through email. Email could be a very efficient way for companies to send
> valuable information to potential customers, but the incentives are such
> that virtually all unsolicited commercial email are of very low value
> and are deleted without being read.

Those of us outside of the Microsoft Marketing Machine have a different
opinion.  Frankly, I do not want to make Bill Gates's latest advertising
gimmick any more 'efficient' nor do I want to be his 'potential customer'.
I have had just about enough crap from Microsoft, which is why I deleted
JunkOS version 95, and use Linux instead.

When I open up my email and find twenty pieces of spam, like most people
I start hitting the delete key.  Last week I got a call from a friend...
"Didn't you get my email?"  "uh... no..."






From fbm at jolt.mpx.com.au  Wed Feb 18 17:02:53 1998
From: fbm at jolt.mpx.com.au (Farrell McKay)
Date: Thu, 19 Feb 1998 09:02:53 +0800
Subject: ANNOUNCE: Fortify-1.2.1: worldwide, 128-bit S/MIME and SSL encryption
Message-ID: 




Sydney, Australia. (19 Oct, 1997).  Fortify for Netscape, version 1.2.1,
with support for strong S/MIME, has now been released.

Fortify for Netscape is a system that provides world-wide, unconditional,
full strength, 128-bit encryption to users of Netscape's Web browsers.
If you routinely use Netscape's export grade Web browsers (i.e. the ones
that are available on the net), then you need Fortify. 

This new version supports two significant improvements to the strong crypto
in the 4.x Netscape web browsers - namely long RSA keys (1024-bits) for key
generation, and strong S/MIME encryption for your e-mail messages.
These improvements are in addition to the 128-bit SSL services already
provided by Fortify.

Version 1.2.1 is available on Windows 95 and NT immediately.  The Unix versions
are being finalized, and these will be released over the coming few days.

Fortify costs nothing to download and use. Nil. Zippo. Zilch.  It currently
supports most, if not all, of the non-beta versions of Netscape Navigator
(3.0x) and Communicator (4.0x), that have been released on the following
platforms:-

	Alpha DEC-OSF
	Mips SGI-Irix 5.x and 6.x 
	Sparc Sun-Solaris 2.x 
	Sparc Sun-SunOS 4.1.3_U1 
	x86 BSD, FreeBSD and BSDI
	x86 Linux-Elf 
	x86 Microsoft Win95 and WinNT 

Full details about availability, copyright, download sites, latest news,
and an FAQ guide can all be found at the Fortify web site:-
	http://www.fortify.net/

Farrell McKay
-- 
Farrell McKay                Email: Farrell.McKay at mpx.com.au   (PGP key avail)
Wayfarer Systems Pty Ltd     http://www.fortify.net/






From tcmay at got.net  Wed Feb 18 17:24:11 1998
From: tcmay at got.net (Tim May)
Date: Thu, 19 Feb 1998 09:24:11 +0800
Subject: New technology around the corner [slashdot.org]
In-Reply-To: <199802181626.KAA11323@einstein.ssz.com>
Message-ID: 



At 4:02 PM -0800 2/18/98, Anonymous wrote:
>Tim May wrote:
>
>> Or how about plastic cubes that can store terabytes....
>
>
>They work fine.  Just keep it in liquid nitrogen or you'll lose all your
>data.

Fine, I'll keep them in LN. Tell me where I can buy these terabyte cubes?
This would be news to Rentzepis and his cohorts.


>Backyard fabs?  Quite doable with MBE or electron beam lithography.  Just
>don't expect to do any mass-production on such a setup.

Neither MBE nor EBL handle more than a tiny subset of the steps needed. For
example, diffusion drives, implants, reactive etches, chem-mechanical
polishing, and a dozen other steps.

--Tim May


Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.








From Shane.Pearson at tafensw.edu.au  Wed Feb 18 17:26:05 1998
From: Shane.Pearson at tafensw.edu.au (Pearson Shane)
Date: Thu, 19 Feb 1998 09:26:05 +0800
Subject: bugged?
Message-ID: 



> Hi,
> 
> Although the phone number will not be traceable to you. The system
> knows your phones IMEI number, which is hardware/firmware bound
> to GSM digital phones. They can put 2 and 2 together and find that
> the IMEI number usually corresponds to your number.
> Unless you can reprogram the IMEI, I wouldn't trust a pre paid card.
> I think the IMEI number is also used as part of the encryption key.
> 
> >or buying the optus card package, aus only, for about $70-00, which
> gives
> >you a simm card and sixty dollars worth of calls.. phone is not
> supplied.
> >
> >hurry though, as the feds want these cards to be name registered, as
> they >can 
> >presently be bought with no ID.. great for those untraceable
> dealings...
> >
> 






From billp at nmol.com  Wed Feb 18 17:47:28 1998
From: billp at nmol.com (bill payne)
Date: Thu, 19 Feb 1998 09:47:28 +0800
Subject: judicial authentication
Message-ID: <34EB8A58.AC4@nmol.com>

Wednesday 2/18/98 6:04 PM

J Orlin Grabbe
John Young

Authentication

John Young has been sent a copy of  ORDER with SEPARATE
PAGE marked

	FILED
	UNITED STATES DISTRICT COURT
    	ALBUQUERQUE, NEW MEXICO
	February 10, 1998



	US District Court
	District of New Mexico
	Digital File Stamp

...

 This document consists of an official stamp of the Court and, if
attached to the
document identified above, servers and endorsed copy of the pleading. 
It may be
used in lieu of the Court�s mechanical file stamp for the named document
only, and
misuse will be treated the same as misuse of the Court�s official
mechanical file
stamp.  The Court�s digital signature is a verifiable mathematical
computation unique
to the filed document and the Court�s private encryption key.  This
signature assures
that any changes can be detected.

Attached is Svet�s ORDER.  WITH NO MARKINGS ON IT.

Grabbe, perhaps I should modify the ORDER SLIGHTLY and return this to
the court
claiming that I believe that I have recieved a COUNTERFEIT COPY of
Svet�s
decision.

And, would the court please verify if the copy I sent them was authentic
or not.

And, too, tell me WHY they knew that it was a counterfeit or authentic.

But this is why we have back-ups.

ALLAHU AKBAR!

Perhaps the opposition has more brains than our [?] side.

But first things first.

bill


                     UNITED STATES DISTRICT COURT
                 FOR THE DISTRICT OF NEW MEXICO


William H. Payne        	   	    		)
Arthur R. Morales                           			)
                                            				)
                Plaintiffs,                 			)
                                            				)
v                                           				)	CIV NO 97 0266 
							)	SC/DJS
			                    			)
Lieutenant General Kenneth A. Minihan, USAF 	)
Director, National Security Agency	    		)
National Security Agency		    		)
                                            				)
                Defendant                   			)


PLAINTIFFS'  RESPONSES TO JUDGE SVET'S ORDER FILED January 28, 1998, ORDER FILED February 10, 1998, AND AFFIDAVIT OF ATTORNEY FEE IN ACCORDANCE WITHCOURT ORDER FILED 98 FEB-9


1  COMES NOW plaintiffs Payne  and Morales [Plaintiffs] to respond

to two ORDERs and AFFIDAVIT.

2  Magistrate judge Svets [Svet] writes in ORDER filed January 28, 1998.

  IT IS FURTHER ORDERED THAT sanctions will be granted and 
  counsel for Defendant shall submit an affidavit outlining her costs
  and fee in bring the Motion within ten days of entry of this Order.
  Plaintiffs may respond within ten days of service of Defendant's     
  affidavit.

3 Svet states in ORDER filed January 28, 1998

 Plaintiff's attempt at discovery violates this Court's Order entered June
 11 , 1997.

4 June 11 order states,

  THIS MATTER come before the Court sua sponte following 
  an Initial Scheduling Conference held June 5, 1997.  The 
  establishment of deadline for discovery and pre-trial pleading is 
  necessary for the orderly hearing of this case. However, this case 
  in not one in which an Initial Pre-trial pleading will assist the 
  Court.  Accordingly, such a document will not be entered.  Further, 
  the parties will not be permitted to undertake any discovery in this 
  matter absent Court permission.  The parties shall submit any 
  proposed discovery to the Court for approval, accompanied by a 
  motion to permit discovery and a memorandum of points and 
  authorities explaining the need for that discovery.

     IT IS THEREFORE ORDERED that the following deadlines 
  are hereby established:

     1.   The parties shall complete discovery necessary by 
     September 3,
     1997.
     2.   Motions relating to discovery shall be filed no later 
     than September 23, 1997.
     3.   All pretrial motions regarding matters other than 
     discovery shall be filed by October 3, 1997.
     4.   The Pre-Trial Order shall be provided as follows:
     Plaintiffs to Defendants by November 3, 1997;  
     Defendants to the Court by November 18, 1997.

  IT IS FURTHER ORDERED that discovery in the matter shall only be 
  undertaken upon obtaining Court permission.  The parties shall 
  submit any proposed discovery to the Court for approval, 
  accompanied by a motion to permit discovery and a memorandum of 
  point and authorities explaining the need for that discovery.

                    signed
                    DON J. SET
                    UNITED STATES MAGISTRATE

5 Plaintiff's point out in UNOPPOSED MOTION FOR EXTENSION 

OF TIME AND  RESETTING TIME LIMITS FOR DISCOVERY

  Rule 36 states, 
 
  Request for admission (a) A party may serve upon any other 
  party a written request for the  admission, for the  purposes of 
  the pending action only, of the truth of any  matters within the  
  scope of Rule 26(b) set forth the request that relate to statements 
  or opinions of fact or of the application of law to fact including 
  the genuineness of any documents described in the request.   
  Copies of documents shall  be served with the request unless 
  they have been or otherwise  furnished or made available for 
  inspection and  copying.  The request may WITHOUT LEAVE  
  OF THE COURT, be served  upon the plaintiff after 
  commencement of  the action and upon any  other party with 
  or after service of the  summons and complaint upon that 
  party. ... 
 
  Plaintiffs capitalize WITHOUT LEAVE OF THE COURT.

6  Svet writes in ORDER filed January 28, 1998

  On June 11, 1997 this Court ordered that any proposed 
  discovery must be approved by this Court.

Svet's above sentence violations Rule 36 of the Federal Rule
 
of Civil Procedure.

7 Svet writes in ORDER filed January 28, 1998

  Further, Plaintiff's did not seek to take discovery prior to the
  discovery deadline.

Svet FAILED TO RESPOND to Plaintiffs' UNOPPOSED MOTION 

FOR EXTENSION OF TIME AND  RESETTING TIME LIMITS 

FOR DISCOVERY.

8 Svet writes in ORDER filed January 28, 1998

  Finally, Plaintiffs, failed to serve counsel for Defendant and 
  instead served General Minihan.  This violates Fed. R. Civ 5.

Plaintiffs DID SERVE General Minhan with first set of admissions

through US lawyer Mitchell on October 13, 1997 in full compliance with

Fed. R. Civ 5.

9 Svet writes in ORDER filed January 28, 1998

  The fact that Plaintiffs are pro se does not relieve them from the burden
  of complying with court orders and rules of civil procedure.

To the contrary, Svet flaunts in writing his disregard of truth and rules

of Civil Procedure.

  Plaintiff have always attempted to follow the Federal Rules of Civil 

Procedure and were always willing to correct any mistakes.

  Svet, on the other hand, proceeds with an attempt to ignore the laws

IN WRITING of the United States.

  Friday October 24, 1997 08:10 file criminal complaint affidavit with

Supreme Judge Antonin Scalia against judges Svet and Campos.

  Scalia has not yet responded to Plaintiffs' criminal complaint affidavit.

  Svet, by issuing ORDER filed January 28, 1998, must believe that Scalia

is going to cover-up for Svet's and Campos' judicial misconduct.

10 Svet writes in ORDER filed January 28, 1998

  Further, Plaintiffs flagrant disregard of this Court's order warrants
  the imposition of sanctions pursuant to Fed.R.Civ.P. 37

    IT IS THEREFORE ORDERED, ADJUDGED AND DECREED that
  Defendant's Motion to Strike and all of Plaintiff's First Set of Requests
  for Admissions to Various Employees of the National Security Agency
  and to Various Employees of Sandia National Laboratories is granted.

Svet cite no law or rules which prevent Plaintiffs' from requesting

admission from non-parties, therefore Plaintiff's must assume in the

interest of justice that Svet agrees with Plaintiff's procedure.

11  Svet ORDER FILED February 10, 1998 states

  THIS MATTER comes before the Court on Plaintiffs' Motion to Remove
  Docket Sheet Entry 14 and Associated Response file on June 24, 1997.
  The matter of discovery was addressed in and Order entered June 11,
  1997.  Thus, Plaintiff's Motion is moot.

  IT IS THEREFORE ORDERED, ADJUDGED AND DECREED that 
  Plaintiffs' Motion to Remove Docket Sheet Entry 14 and Associated
  Response is denied as moot.

Docket Sheet entry 14 posted 6/9/97 is

  RESPONSE  by defendant to motion to accept discovery plan of plaintiffs
  as an unopposed motion before the Court (dmw) [Entry date 06/10/97]

5/23/97 Docket Sheet entry 9 Plaintiffs file 

  MOTION by plaintiff for order to accept discovery plan (dmw)

Defiant misses filing date for response to entry 9.

Therefore, Plaintiffs' file on 6/9/97 Docket Sheet entry 13

  MOTION by plaintiff to accept discovery plan of plaintiffs are an   
  unopposed motion before the court (dwm)

In panic Defendant's lawyer US Mitchell submits on 6/9/97

Docket Sheet entry 14

  RESPONSE by defendant to motion to accept discovery plan of plaintiffs
  as an unopposed motion before the Court [13-1] (dwm) [Entry date
  06/10/97]

Lawyer Mitchell, apparently realizing her legal procedureal blunder, is 

forced to deposit her LATE MOTION in Court outside mailbox since entry was 

not until June 10.

  Svet, again, flaunts disregard for the Federal Rules of Civil Procedure 

by ORDER FILED February 10, 1998 by ruling late motion moot.

  Svet cites no authority to overrule dictates of Federal Rules of Civil 

Procedure, and even local court rules, on timeliness.

  Svet demonstrates again, IN WRITING, prejudice toward Defendant.

12 Svet NOT ONLY has shown,  IN WRITING, his attempt to inhibit the legal 

process specified in the Federal Rules of Civil Procedure but has engaged 

in a proactive process of attempting to retaliate against Plaintiffs' in 

their attempt to follow the Federal Rules of Civil Procedure.

  Svet NEVER attempted to clarify procedures or rules so that either side 

could correct any mistakes in civil procedure.

WHEREFORE

13  Plaintiffs' invoke 

  28 USC � 455. Disqualification of justice, judge, or magistrate 

    (a) Any justice, judge, or magistrate of the United States shall 
    disqualify himself  in any proceeding in which his impartiality 
    might reasonably be questioned. ...

14  REMOVE judges Svet and Campos from this proceeding for clear
 
demonstration of pattern and practice of judicial misconduct IN

WRITING in this lawsuit.

15  ORDER judge Svet  RESTRAINED from awarding sanctions against

Plaintiffs.

16  APPOINT new magistrate and judge to begin this lawsuit DE NOVO.

17 GRANT such other relief as the Court may deem  just and proper.



Respectfully submitted, 
 
 
                    _________________________ 
                    William H. Payne             	   	     
                    13015 Calle de Sandias NE          	     
                    Albuquerque, NM 87111              	     
 
 			
                    _________________________				 
                    Arthur R. Morales                            
                    1024 Los Arboles NW                         
                    Albuquerque, NM 87107                        
 
                    Pro se litigants 
 
 
               CERTIFICATE OF SERVICE 
 
I HEREBY CERTIFY that a copy of the foregoing memorandum
was mailed to Lieutenant General Kenneth A. Minihan, USAF, 
Director,  National Security Agency, National Security Agency, 
9800 Savage Road, Fort George G. Meade, MD 20755-6000 
and hand delivered to Jan E Mitchell, Assistant US Attorney, 
525 Silver SW, ABQ, NM 87102 this Thursday February 19,
1998.





7







From ravage at ssz.com  Wed Feb 18 17:58:46 1998
From: ravage at ssz.com (Jim Choate)
Date: Thu, 19 Feb 1998 09:58:46 +0800
Subject: Quantum transistor breakthrough? [slashdot.org]
Message-ID: <199802190203.UAA14286@einstein.ssz.com>



Forwarded message:

> X-within-URL: http://www.slashdot.org/

>    Quantum Transitors Trumpeted! Contributed by mojoski on Wed Feb 18
>    20:08:01 1998 EST
>    [Technology] From the bragging-on-my-bro Dept
>    In what can only be described as a huge advance in quantum transitior
>    technolgy, The San Jose Mercury News is reporting that researchers at
>    Sandia National Laboratories have demonstrated a method of making
>    these devices stable enough for potential use in computing
>    applications.
>    
>    The Sandia quantum transistor is not the first to use a quantum
>    mechanical effect called ``tunneling'' to compute. Experimental
>    quantum tunneling devices were first made nearly a decade ago.
>    
>    But Sandia's is the first to be made using common manufacturing
>    techniques that would allow many of the devices to be strung together
>    to compute en masse, said physicist Jerry Simmons, leader of the
>    Sandia development team.
>    
>    And you know what the coolest part of this story is? Jerry Simmons is
>    my brother! Go man, go! I can only hope that he'll remember the little
>    people in his life when he sells this technology to chipmakers
>    world-wide! *wink*
>    Add a Comment?

>    Sco Emulates Win95 Contributed by CmdrTaco
>    Wed Feb 18 12:06:03 1998 EST
>    From the emulate-the-enemy dept.
>    joe wrote in to tell us that SCO now has a Win5 emulator available.
>    Read about it here. Between Wine, Wabi, OS/2 and others emulating 95,
>    it's getting closer and closer to a point where you can try a new OS
>    without giving up your old software. This is important stuff people.
>    Read More...
>    27 comment(s)

>    New DES Clients Contributed by CmdrTaco
>    [Encryption] Wed Feb 18 12:02:38 1998 EST
>    From the bits-and-bytes dept.
>    phi1abole wrote in to let us know that a new batch of Des Clients are
>    available for download. This gives me a good chance to once again plug
>    Slashdot's DES2 Team. We're ranked #8 overall. With over 2/3rds of the
>    keyspace searched, this contest is almost toast.
>    Read More...
>    5 comment(s)


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From billp at nmol.com  Wed Feb 18 18:50:12 1998
From: billp at nmol.com (bill payne)
Date: Thu, 19 Feb 1998 10:50:12 +0800
Subject: the Court's private encryption key
Message-ID: <34EB9A94.42D4@nmol.com>



Wednesday 2/18/98 7:23 PM

J Orlin Grabbe
John Young

I just spoke with Bill Goldrick.

Read about Goldrick in Deep Black by William Burrows.

Goldrick was the Sandia supervisor who supervised installation
the Norwegian seismic system.  And supervised the second
data authenticator.  And reviewed my SAND report.

We talked about data authentication.  And its problems.

I looked at Svet�s February 10, 1998 ORDER

And thought about

Digital File Stamp

 This document consists of an official stamp of the Court 
and, if attached to the document identified above, servers an
endorsed copy of the pleading.  It may be used in lieu of the Court's 
mechanical file stamp for the named document only, and
misuse will be treated the same as misuse of the Court's official 
mechanical file stamp.  The Court's digital signature is a verifiable 
mathematical computation unique to the filed document and the 
Court's private encryption key.  This signature assures
that any changes can be detected.

Think devious.  

By way of deception.

But this for later.

Allahu Akbar
bill







From ravage at ssz.com  Wed Feb 18 19:14:59 1998
From: ravage at ssz.com (Jim Choate)
Date: Thu, 19 Feb 1998 11:14:59 +0800
Subject: Where to buy Terra byte protein ram/rom... [slashdot.org]
Message-ID: <199802190322.VAA14603@einstein.ssz.com>



Forwarded message:

> X-within-URL: http://www.slashdot.org/slashdot.cgi?mode=article&artnum=00000702

>    Gernot Bauer wrote in to tell us a bit more about organic chips. He
>    writes "Computer chips are nowerdays made on the base of silicon.
>    German computing magazine "c't" wrote about an Norwegian company
>    called Opticom which claims that its ready for series production of
>    organic mass memory (RAM/ROM and all that nice stuff). Imagine 170
>    Terra-Bytes for a few cents. Read here how it works and what you can
>    expect if this technology is widely used (the article was translated
>    to english). Will new types of real virus be able to trash not only
>    your system but also your hardware?"

Note this company is claiming 'series production' meaning you can go out and
buy them.

I tramped over the web but couldn't find a website for them. If anybody
knows somebody in Norway please ask them to contact the company and get us
some information...please.


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From billp at nmol.com  Wed Feb 18 19:52:06 1998
From: billp at nmol.com (bill payne)
Date: Thu, 19 Feb 1998 11:52:06 +0800
Subject: rushdie list
Message-ID: <34EBA748.689C@nmol.com>

Orlin

Best to try to keep off the list.

  August 1991, Shapour Bakhtiar and Soroush Katibeh are killed in  
Suresnes, France.

Title: Iranian Martyrs





This page is dedicated to all those who stood up against tyranny

KNOW THAT BEHIND EACH NUMBER, AND EACH NAME,
THERE IS A MAN, A WOMAN, A CHILD,
A FACE, A SMILE, A TEAR
PUT YOURSELF IN PLACE OF THE CONDEMNED AND
IMAGINE
THE SOLITUDE AND LONELINESS OF THE MOMENT
WHEN THEY COME TO TAKE THEM AWAY,
THIS LAST VOYAGE,
WHERE ARE YOU AT THIS VERY MOMENT, PARTISAN OF HUMAN RIGHTS ?
WHY HAS THE WORLD SUDDENLY BECOME A VAST
DESERT WHERE THERE EXISTS ONLY THE VICTIM AND HIS EXECUTIONERS ?
HOW MUCH LONGER CAN YOU STAY SILENT ?

Below is a list of all those who were affiliated to NAMIR  or its military wing - NEGHAB - and
were murdered by the Islamic Republic of Iran : 
Date         Location           Name                    
04/07/1980   Tehran             A.Mohagheghi (general)
04/07/1980   Tehran             G.Ghayeghran (non-commissioned officer : pilot)
04/07/1980   Tehran             F.Jahangiri (non-commissioned officer : pilot)
04/07/1980   Tehran             A.Kamiani 
04/07/1980   Tehran             A.Karimbar
30/07/1980   Tehran             H.Kazemi (non-commissioned officer)
30/071980    Tehran             M.Moradi (non-commissioned officer)
30/07/1980   Tehran             S.Norouzi (sergeant)
30/07/1980   Tehran             A.Mohamadi
30/07/1980   Tehran             M.Assangochai
30/07/1980   Tehran             Y.Mahboubian
30/07/1980   Tehran             E.Mamaghani
30/07/1980   Tehran             N.Sedarat
30/07/1980   Tehran             E.Baroukhim
30/07/1980   Tehran             M.B.Fard (lieutenant)
30/07/1980   Neyshabur          Y.Khadjeh
30/07/1980   Neyshabur          G.Jafari
31/07/1980   Tehran             M.Farzam (lieutenant)
31/07/1980   Tehran             H. Karimpurtari (non-commissioned officer)
31/07/1980   Tehran             D.Jalaii (colonel)
31/07/1980   Tehran             N.Yahyaii (lieutenant)
31/07/1980   Tehran             N.Najaf-Nejad (sergeant)
07/08/1980   Tehran             I. Soltani (corporal)
07/08/1980   Tehran             H.Lashkari (lieutenant-pilot)
07/08/1980   Tehran             M.Saghafi (lieutenant-pilot)
07/08/1980   Tehran             A.Zarineh (colonel)
07/08/1980   Tehran             H.Gohari (major)
07/08/1980   Tehran             K.Alizadeh (major)
07/08/1980   Tehran             A.Morvaridi (sergeant)
07/08/1980   Tehran             S.Pourfahmideh (lieutenant)
07/08/1980   Tehran             M.Najafabadi (lieutenant)
07/08/1980   Tehran             M.Zahedi (lieutenant)
07/08/1980   Tehran             M.Asgharian (non-commissioned officer)
07/08/1980   Tehran             H.Abedini
07/08/1980   Tehran             F.Azarian (lieutenant)
16/08/1980   Tehran             E.Arab-Shirazi
16/08/1980   Tehran             A.Awazzadeh 
16/08/1980   Tehran             M.Sajadi (non-commissioned officer)
16/08/1980   Tehran             M.Farahpour
16/08/1980   Tehran             Z.Momeni
16/08/1980   Tehran             G.Khergani (sergeant)
16/08/1980   Tehran             M.Kiani (sergeant)
16/08/1980   Tehran             D.Bakhtiar
16/08/1980   Tehran             G.NaghibZadeh (non-commissioned officer)
16/08/1980   Tehran             H.Zamanpour (flight-lieutenant)
16/08/1980   Tehran             K.Azartash (major)
16/08/1980   Tehran             A.Azmudeh (colonel)
16/08/1980   Tehran             C.Ahmadi (lieutenant)
16/08/1980   Tehran             S.Mahdiun (general-pilot)
16/08/1980   Tehran             M.Farnejad (non-commissioned officer)
16/08/1980   Tehran             K.Mohamadi-Koubaii (non-commissioned officer)
16/08/1980   Tehran             M.Tightiz (non-commissioned officer)
18/08/1980   Tehran             M.Mirlaki (non-commissioned officer)
18/08/1980   Tehran             M.Abedini-Moghadam (non-commissioned officer0
18/08/1980   Tehran             K.Rahmati (non-commissioned officer)
18/08/1980   Tehran             P.Bayani (non-commissioned officer)
18/08/1980   Tehran             L.Lotfolahi (non-commissioned officer)
18/08/1980   Tehran             A.Habibi (lieutenant)
18/08/1980   Tehran             N.Zandi (flight lieutenant pilot)
18/08/1980   Tehran             C.Karimian (sergeant)
18/08/1980   Tehran             O.Boyeri (flight lieutenant)
18/08/1980   Tehran             A.Soleimani (flight lieutenant)
18/08/1980   Tehran             D.Mazaheri-Kashani
18/08/1980   Tehran             D.Fatehjou (non-commissioned officer)
18/08/1980   Tehran             A.Pourkarbassi-Dehi (non-commissioned officer)
18/08/1980   Tehran             D.Fateh-Firouz (non-commissioned officer)
18/08/1980   Tehran             K.Afrouz (flight lieutenant)
18/08/1980   Tehran             M.Azimifar (flight lieutenant)
21/08/1980   Tehran             M.Arad (lieutenant)
21/08/1980   Tehran             M.Sadeghi (colonel)
21/08/1980   Tehran             H.Izadi (colonel)
21/08/1980   Tehran             Asghari
25/08/1980   Tehran             D.Rahbar (non-commissioned officer)
25/08/1980   Tehran             G.Hamedani (non-commissioned officer)
25/08/1980   Tehran             F.Javaherian (non-commissioned officer)
25/08/1980   Tehran             M.Zade-Naderi (non-commissioned officer)
26/08/1980   Tehran             G.Hejazi (female)
26/08/1980   Tehran             D.Shomali
26/08/1980   Tehran             H.Ahmadi
26/08/1980   Esfahan            M.Altani
26/08/1980   Esfahan            H.Karimi
26/08/1980   Esfahan            S.Mozaii
26/08/1980   Esfahan            H.Dari
26/08/1980   Esfahan            A.Allahverdi
26/08/1980   Esfahan            S.Hemati
26/08/1980   Esfahan            M.Vesaali
26/08/1980   Esfahan            B.Nikbakht (female)
26/08/1980   Esfahan            E.Biglari
26/08/1980   Esfahan            J.Hemati
26/08/1980   Esfahan            E.Karimi
26/08/1980   Esfahan            M.Karimi
28/08/1980   Tehran             S.Bassani (female)
28/08/1980   Tehran             M.T.Bahrami (non-commissioned officer)
29/08/1980   Tehran             A.Almasi (lieutenant)
29/09/1980   Tehran             H.Haleki (lieutenant)
29/08/1980   Tehran             M.R.Javadi (lieutenant)
29/08/1980   Tehran             H.Ahmadi (non-commissioned officer)
29/08/1980   Tehran             J.Ranjbar (non-commissioned officer)
30/08/1980   Tehran             A.Azizian (major)
30/08/1980   Tehran             R.Soltani (colonel)
30/08/1980   Tehran             A.Faria (colonel)
30/08/1980   Tehran             I.Derakhshandeh (non-commissioned officer)
30/08/1980   Tehran             M.Bahrami
30/08/1980   Tehran             S.Shahbeui (colonel)
30/08/1980   Tehran             I.Khalafbegi (major)
30/08/1980   Tehran             K.Keyvanfar
30/08/1980   Ahwaz              M.Borati (corporal)
30/08/1980   Ahwaz              I.Marvdashti (non-commissioned officer)
30/08/1980   Ahwaz              R.Yahyapasand (lieutenant)
30/08/1980   Ahwaz              M.A.Mehrabi (non-commissioned officer)
30/08/1980   Ahwaz              O.Atashboro
30/08/1980   Ahwaz              S.Sotoudeh
01/09/1980   Tehran             D.Asghari (officer)
01/09/1980   Tehran             D.Raastgu (lieutenant)
01/09/1980   Tehran             M.Fatahi-Nourdehi (non-commissioned officer)
03/09/1980   Ahwaz             M.Hokmabadtchi (sergeant)
03/09/1980   Ahwaz             E.Ostad-Nazari (lieutenant)
03/09/1980   Ahwaz             F.Reissi (lieutenant)
03/09/1980   Ahwaz             S.Dehgan (lieutenant)
09/09/1980   Tehran            M.Sayah (sergeant)
09/09/1980   Tehran            M.Rahbai-Nejad (lieutenant)
09/09/1980   Tehran            M.Tajvari (lieutenant)
09/09/1980   Tehran            B.Partovi (major)
09/09/1980   Tehran            H.Mostafavi 
11/09/1980   Tehran            K.Atri
11/09/1980   Tehran            M.Sadeghi (colonel)
11/09/1980   Tehran            M.Sohaneki
11/09/1980   Tehran            N.Morovati (lieutenant)
11/09/1980   Tehran            N.Sajadi (non-commissioned officer)
11/09/1980   Tehran            A.Mohammad (soldier)
11/09/1980   Tehran            A.Shafigh (flight lieutenant)
16/09/1980   Tehran            M.Tabrizi-Khatun
16/09/1980   Tehran            E.Azadighaneh (non-commissioned officer)
16/09/1980   Tehran            M.Jalali-Ghajar (major)
16/09/1980   Tehran            S.Nour
13/071981    Tehran            M.Khadem
10/08/1981   Tehran            Amir-Tahmasbi (major)
10/08/1981   Tehran            A.Abdolmalek-Pour (colonel)
10/08/1981   Tehran            Didehvar (colonel)
10/08/1981   Tehran            Mohajeri
23/12/1981   Tehran            R.Marzban
23/12/1981   Tehran            A.Mohebi
30/01/1982   Tehran            A.Amir-Tahmasbi (colonel)
30/01/1982   Tehran            K.Yarahmadi
30/01/1982   Tehran            E.Seyrafi (colonel)
30/01/1982   Tehran            A.Foroughi (colonel)
30/01/1982   Tehran            A.Abdol-Malekpour
30/01/1982   Tehran            G.Rahimi (colonel)
30/01/1982   Tehran            M.Sabah (colonel)
30/01/1982   Tehran            G.Biglou
30/01/1982   Tehran            A.Mohajeri
30/01/1982   Tehran            M.Lotfzari
30/01/1982   Tehran            G.Naghib-Manesh
30/01/1982   Tehran            G.Didehvar (colonel)
30/01/1982   Tehran            G.Shahandeh-Ashtiani
30/01/1982   Tehran            M.Khashayar
11/09/1982   Tehran            R.Shahbakhti
11/09/1982   Tehran            H.Moghbelzadeh

 of these victims, none had the rights 
 of an accused as foreseen in 
 the Universal Declaration of  Human Rights 
.............................................


Report on the Islamic Republic's Terrorism abroad
   
Since the advent of the Islamic Republic in Iran, terrorist attempts have targeted exiled Iranians as well as citizens
of other countries, condemned as heretics, around the world.  These attacks were ordered by the Islamic government 
of Iran.
   

1. In July 1980, Shapour Bakhtiar escapes an assassination attempt in Paris, France.  A French policeman and a 
    neighbor are killed and one policeman is seriously injured.
2. In July 1980, Ali Tabatabai is killed in Washington D.C., United States.
3. In 1981, Shahriar Shafigh is killed in Paris, France.
4. In January 1982, Shahrokh Missaghi is killed in Manila, Philippines.
5. In April 1982, a young German student is killed during the attack of the residence of Iranian students in Mainzer,
    Germany, by the pro-Iranian Hezbollah.
6. In June 1982, Shahram Mirani is fatally wounded in India.
7. In August 1982, Ahmad Zol-Anvar is fatally wounded in Karachi, Pakistan.
8. In September 1982, Abdolamir Rahdar is killed in India.
9. In 1982, Colonel Ahmad Hamed is killed in Istanbul, Turkey.
10. In February 1983, Esfandiar Rahimi is killed in Manila, Philippines.
11. In February 1984, Gholam-Ali Oveissi and his brother, Gholam-Hossein, are killed in Paris, France.
12. In August 1985, Behrouz Shahverdilou is killed in Istanbul, Turkey.
13. In December 1985, Hadi Aziz-Moradi is killed in Istanbul, Turkey.
14. In August 1986, Bijan Fazeli is killed in London, Great Britain.
15. In December 1986, Vali Mohammad Van is killed in Pakistan.
16. In January 1987, Ali-Akbar Mohammadi is killed in Hamburg, Germany.
17. In May 1987, Hamid Reza Chitgar disappears in Vienna, Austria and is found assassinated in July.
18. In July 1987, Faramarz-Agha� and Ali-Reza Pourshafizadeh are killed and twenty-three persons 
      are wounded in residences of Iranian refugees Karachi and Quetta, Pakistan.
19. In July 1987, Amir-Hossein Amir-Parviz is seriously wounded by the explosion of a bomb placed in his car
      in London, England.
20. In July 1987, Mohammad-Hassan Mansouri is shot dead in his house Istanbul, Turkey.
21. In August 1987, Ahmad Moradi-Talebi is killed in Geneva, Switzerland.
22. In October 1987, Mohammad-Ali Tavakoli-Nabavi and his youngest son, Noureddin, are killed in 
      Wembley,  Great Britain.
23. In October 1987, Abol-Hassan Modjtahed-Zadeh is kidnapped in Istanbul, Turkey. 
24. In December 1988, an Iranian refugee is assassinated in front of the headquarters of the United Nations High 
      Commissioner for Refugees in Karachi, Pakistan.
25. In June 1989, Ataollah Bay Ahmadi is killed in the Emirate of Dubai.
26. In July 1989, Abdol-Rahman Ghassemlou and Abdollah Ghaderi and Fazel Rassoul are killed in Vienna, Austria.
27. In August 1989, Gholam Keshavarz is killed in Cyprus.
28. In September 1989, Sadigh Kamangar is assassinated in the north of Iraq.
29. In September 1989, Hossein Keshavarz, victim of a terrorist attempt, is paralyzed for life.
30. In February 1990, Hadj Baloutch-Khan is killed by a terrorist commando in Pakistan.
31. In Mars 1990, Hossein Mir-Abedini is wounded by an armed commando in the airport of Istanbul, Turkey.
32. In April 1990, Kazem Radjavi is killed in Coppet, Switzerland.
33. In July 1990, Ali Kashefpour is kidnapped and killed in Turkey.
34. In September 1990, Efat Ghazi is killed in Sweden by a bomb intended for her husband.
35. In October 1990, Cyrus Elahi is killed in Paris, France.
36. In April 1991, Abdol-Rahman Boroumand is killed in Paris, France.
37. In July 1991, Alberto Capriolo is wounded in Milan, Italy.
38. In July 1991, Hitoshi Igarashi is killed in Tokyo, Japan.
39. In July 1991, Ahad Agha is killed in Suleimanya, iraq.
40. In August 1991, Shapour Bakhtiar and Soroush Katibeh are killed in Suresnes, France.
41. In September 1991, Sa�d Yazdan-Panah is fatally wounded in iraq.
42. In December 1991, Massoud Rajavi escapes a terrorist attempt in Baghdad, iraq.
43. In January 1992, Kamran Hedayati is wounded opening a letter bomb in Vastros, Sweden.  He looses his 
      sight and his hands.
44. In May 1992, Shapour Firouzi is killed in Iraq.
45. In July 1992, Kamran Mansour-Moghadam is killed in Suleymania, Iraq.
46. In August 1992, Fereydoun Farokhzad is killed in Bonn, Germany.
47. In September 1992, Sadegh Sharafkandi, Fatah Abdoli, Homayoun Ardalan and Nouri Dehkordi are killed in 
      Berlin, Germany.
48. In January 1993, Ugur Mumcu is killed in Ankara, Turkey.
49. In February 1993, the fundamentalist terrorists in Turkey admit to have kidnapped and killed Ali-Akbar Ghorbani
      who had disappeared in June 1992 in Turkey.
50. In March 1993, Mohammad-Hossein Naghdi is killed in Rome, Italy.
51. In June 1993, Mohammad-Hassan Arbab is killed in Karachi, Pakistan
52. In October 1993, Turkish fundamentalists admit having tortured and killed for Iranian officials, Abbas Gholizadeh
      who was kidnapped in Istanbul, Turkey in December 1992.
53. In November 1993, William Nygaard is wounded in Oslo, Norway.
54. In January, 1994, Taha Kermanj is killed in Corum, Turkey. 
55. In August 1994, Ghafour Hamzei'i is killed in Baghdad, iraq.
56. In February 1996, Zahra Rajabi and Ali Moradi were killed in Istanbul, Turkey.
57. In March 1996, Ali Mollazadeh was killed in Karachi, Pakistan. 
58. In May 1996, Reza Mazlouman ( Kourosh Aryamanesh) was killed in Paris, France.

Due to the lack of reliable information, this list of terrorist attempts is not exhaustive. Undoubtedly, since the 
advent of the Islamic Republic, the number of extra-judicial executions outside Iran, in particular in Pakistan, 
Turkey and Iraq is higher.  Also, this report deliberately leaves out well known terrorist attacks ordered by Tehran, 
such as: the hostage crisis of the US embassy in Tehran in 1979; the kidnapping of British, American and French 
citizens in Lebanon by pro-Iranian Hezbollah; the explosive attack on the American and French military headquarters
in Lebanon, which were publicly claimed by Mohsen Rafighdoust, then head of the Revolutionary Guards  ; the wave 
of terrorist bombing in Paris in 1986, which resulted in the death of 13 persons and the wounding of hundreds of 
others; the death sentence against Salman Rushdie for writing The Satanic Verses; and the Dahran terrorist attempts
that targeted the American military in Saudi Arabia.



Title: NSA, Crypto AG, and the Iraq-Iran Conflict




 [Email Reply] 


NSA, Crypto AG, and the Iraq-Iran Conflict


          by J. Orlin Grabbe




	One of the dirty little secrets of the 1980s is that 
the U.S. regularly provided Iraq's Saddam Hussein with 
top-secret communication intercepts by the U.S. National 
Security Agency (NSA).  Consider the evidence.

	When in 1991 the government of Kuwait paid the 
public relations firm of Hill & Knowlton ten million 
dollars to drum up American war fever against the evil 
dictator Hussein, it brought about the end of a long legacy 
of cooperation between the U.S. and Iraq.  Hill & 
Knowlton resurrected the World War I propaganda story 
about German soldiers roasting Belgian babies on 
bayonets, updated in the form of a confidential witness 
(actually the daughter of the Kuwaiti ambassador to the 
U.S.) who told Congress a tearful story of Iraqi soldiers 
taking Kuwaiti babies out of incubators and leaving them 
on the cold floor to die.  President George Bush then 
repeated this fabricated tale in speeches ten times over the 
next three days.

	What is remarkable about this staged turn of 
events is that, until then, Hussein had operated largely 
with U.S. approval.  This cooperation had spanned three 
successive administrations, starting with Jimmy Carter.  
As noted by John R. MacArthur, "From 1980 to 1988, 
Hussein had shouldered the burden of killing about 
150,000 Iranians, in addition to at least thirteen thousand 
of his own citizens, including several thousand unarmed 
Kurdish civilians, and in the process won the admiration 
and support of elements of three successive U.S. 
Administrations" [1].

	Hussein's artful slaughter of Iranians was aided by 
good military intelligence.  The role of NSA in the 
conflict is an open secret in Europe, the Middle East, and 
Asia.  Only in this country has there been a relative news 
blackout, despite the fact that it was the U.S. 
administration that let the crypto cat out of the bag.  

	First, U.S. President Ronald Reagan informed the 
world on national television that the United States was 
reading Libyan communications.  This admission was part 
of a speech justifying the retaliatory bombing of Libya for 
its alleged involvement in the La Belle discotheque 
bombing in Berlin's Schoeneberg district, where two U.S. 
soldiers and a Turkish woman were killed, and 200 others 
injured. Reagan wasn't talking about American 
monitoring of Libyan news broadcasts. Rather, his "direct, 
precise, and undeniable proof"  referred to secret 
(encrypted) diplomatic communication between Tripoli 
and the Libyan embassy in East Berlin.

	Next, this leak was compound by the U.S. 
demonstration that it was also reading secret Iranian 
communications.  As reported in Switzerland's Neue 
Zurcher Zeitung,  the U.S. provided the contents of 
encrypted Iranian messages to France to assist in the 
conviction of Ali Vakili Rad and Massoud Hendi for the 
stabbing death in the Paris suburb of Suresnes of the 
former Iranian prime minister Shahpour Bakhtiar and his 
personal secretary Katibeh Fallouch. [2]
 
	What these two countries had in common was they 
had both purchased cryptographic communication 
equipment from the Swiss firm Crypto AG. Crypto AG 
was founded in 1952 by the (Russian-born) Swedish 
cryptographer Boris Hagelin who located his company in  
Zug.  Boris had created the "Hagelin-machine", a 
encryption device similar to the German "Enigma".  The 
Hagelin machine was used on the side of the Allies in 
World War II.

	Crypto AG was an old and venerable firm, and 
Switzerland was a neutral country. So Crypto AG's 
enciphering devices for voice communication and digital 
data networks were popular, and customers came from 
130 countries. These included the Vatican, as well the 
governments of Iraq, Iran, and Libya.  Such countries 
were naturally skeptical of cryptographic devices sold in 
many NATO countries, so turned to relatively neutral 
Switzerland for communication security.

	Iran demonstrated its suspicion about the source of 
the leaks, when it arrested Hans Buehler, a top salesman 
for Crypto AG, in Teheran on March 18, 1992.  During 
his nine and a half months of solitary confinement in Evin 
prison in Teheran, Buehler was questioned again and 
again whether he had leaked Teheran's codes or Libya's 
keys to Western powers.  Luckily Buehler didn't know 
anything.  He in fact believed in his own sales pitch that 
Crypto AG was a neutral company and its equipment was 
the best.  They were Swiss, after all.  [3]

	Crypto AG eventually paid one million dollars for 
Buehler's release in January 1993, then promptly fired 
him once they had reassured themselves that he hadn't 
revealed anything important under interrogation, and 
because Buehler had begun to ask some embarrassing 
questions. Then reports appeared on Swiss television, 
Swiss Radio International, all the major Swiss papers, and 
in German magazines like Der Spiegel.  Had Crypto AG's 
equipment been spiked by Western intelligence services? 
the media wanted to know. The answer was Yes [4].

	 Swiss television traced the ownership of Crypto 
AG to a company in Liechtenstein, and from there back to 
a trust company in Munich. A witness appearing on Swiss 
television explained the real owner was the German 
government--the Federal Estates Administration. [5]

        According to Der Spiegel, all but 6 of the 6000 
shares of Crypto AG were at one time owned by Eugen 
Freiberger, who resided in Munich and was head of the 
Crypto AG managing board in 1982. Another German, 
Josef Bauer, an authorized tax agent of the Muenchner 
Treuhandgesellschaft KPMG, and who was elected to the 
managing board in 1970, stated that his mandate had 
come from the German company Siemens.  Other 
members of Crypto AG's management had also worked at 
Siemens. Was the German secret service, the 
Bundesnachrichtendienst (BND), hiding behind the 
Siemens' connection?

        So it would seem.  Der Spiegel reported that in 
October 1970, a secret meeting of the BND had discussed 
how the Swiss company Graettner could be guided into 
closer cooperation with Crypto AG, or could even merged 
with it. The BND additionally considered how "the 
Swedish company Ericsson could be influenced through 
Siemens to terminate its own cryptographic business." [6]

	A former employee of Crypto AG reported that he 
had to coordinate his developments with "people from 
Bad Godesberg". This was the location of the "central 
office for encryption affairs" of the BND, and the service 
instructed Crypto AG what algorithms to use to create the 
codes.  The employee also remembers an American 
"watcher", who strongly demanded the use of certain 
encryption methods.

	Representatives from NSA visited Crypto AG 
often. A memorandum of  a secret workshop at Crypto 
AG in August 1975, where a new prototype of an 
encryption device was demonstrated, mentions the 
participation of Nora L. Mackebee, an NSA 
cryptographer. Motorola engineer Bob Newman says that 
Mackebee was introduced to him as a "consultant".  
Motorola cooperated with Crypto AG in the seventies in 
developing a new generation of electronic encryption 
machines.   The Americans "knew Zug very well and gave 
travel tips to the Motorola people for the visit at Crypto 
AG," Newman told Der Spiegel.

	Knowledgeable sources indicate that the Crypto 
AG enciphering process, developed in cooperation with 
the NSA and the German company Siemans, involved 
secretly embedding the decryption key in the cipher text.  
Those who knew where to look could monitor the 
encrypted communication, then extract the decryption key 
that was also part of the transmission, and recover the 
plain text message.  Decryption of a message by a 
knowledgeable third party was not any more difficult than
it was for the intended receiver.  (More than one method 
was used.  Sometimes the algorithm was simply deficient, 
with built-in exploitable weaknesses.)

	Crypto AG denies all this, of course, saying such 
reports are ""pure invention".

	What information was provided to Saddam 
Hussein exactly?  Answers to this question are currently 
being sought in a lawsuit against NSA in New Mexico, 
which has asked to see "all Iranian messages and 
translations between January 1, 1980 and June 10, 1996". 
[7]

	The passage of top-secret communications 
intelligence to someone like Saddam Hussein brings up 
other questions.  Which dictator is the U.S. passing top 
secret messages to currently?  Jiang Zemin?  Boris 
Yeltsin?  

	Will Saddam Hussein again become a recipient of 
NSA largess if he returns to the mass slaughter of 
Iranians?  What exactly is the purpose of NSA anyway?

	One more question:  Who is reading the Pope's 
communications?


Bibliography

[1] John R. MacArthur, Second Front: Censorship and 
Propaganda in the Gulf War, Hill and Wang, New York, 
1992.

[2] Some of the background of this assassination can be 
found in "The Tehran Connection," Time Magazine, 
March 21, 1994.

[3] The Buehler case is detailed in Res Strehle, 
Verschleusselt: der Fall Hans Beuhler, Werd Verlag, 
Zurich, 1994.  

[4] "For years, NSA secretly rigged Crypto AG machines 
so that U.S. eavesdroppers could easily break their codes, 
according to former company employees whose story is 
supported by company documents,"  "No Such Agency, 
Part 4: Rigging the Game," The Baltimore Sun, December 
4, 1995.

[5] Reported in programs about the Buehler case that were 
broadcast on Swiss Radio International on May 15, 1994 
and July 18, 1994.

[6]  "Wer ist der befugte Vierte?":  Geheimdienste 
unterwandern den Schutz von Verschlusselungsgeraten," 
Der Spiegel 36, 1996.

[7] U.S. District Court for the District of New Mexico, 
William H. Payne, Arthur R. Morales, Plaintiffs, v. 
Lieutenant General Kenneth A. Minihan, USAF, Director 
of National Security Agency, National Security Agency, 
Defendant, CIV NO 97 0266 SC/DJS.

November 2, 1997
Web Page: http://www.aci.net/kalliste/







From wombat at mcfeely.bsfs.org  Wed Feb 18 20:09:13 1998
From: wombat at mcfeely.bsfs.org (Rabid Wombat)
Date: Thu, 19 Feb 1998 12:09:13 +0800
Subject: Stupid Law
In-Reply-To: <199802180443.UAA12254@yginsburg.el.nec.com>
Message-ID: 





So leave the laptop in the hotel safe before going back to the US each 
evening.

On Tue, 17 Feb 1998, Bob De Witt wrote:

> Yes, it is.  Even if he wrote a program in Mexico, but carried his laptop
> back and forth daily, each piece can come into the US, but cannot leave
> again!  Uuuuuuuuummmmmmm, gooooood!  Read the actual documents.
> 
> 
> Bob De Witt,
> rdew at el.nec.com
> 
> 
> > From anon at anon.efga.org Tue Feb 17 19:44:29 1998
> > Date: Tue, 17 Feb 1998 22:08:26 -0500
> > From: Anonymous 
> > Comments: This message did not originate from the Sender address above.
> > 	It was remailed automatically by anonymizing remailer software.
> > 	Please report problems or inappropriate use to the
> > 	remailer administrator at .
> > To: cypherpunks at toad.com
> > 
> > >Doesn't the act of taking it across the border, in the laptop, constitute
> > >an act of export??
> > 
> > Well, yes it would, but the original scenario includes WRITING the code
> > outside of the US, which means it never was a US creation, even if the
> > creature that happened to be writing the code was native to the US.
> > 
> > The question is whether the dude could pull a stunt like this and get
> > away with it. I'd say go for it. You got a plausible loophole to a
> > stupid law that might not hold in court anyways.
> > 
> > -Anon
> > 
> > 
> > 
> 
> 






From rdew at el.nec.com  Wed Feb 18 20:14:09 1998
From: rdew at el.nec.com (Bob De Witt)
Date: Thu, 19 Feb 1998 12:14:09 +0800
Subject: bugged?
Message-ID: <199802190400.UAA13074@yginsburg.el.nec.com>



TATTOOMAN,

Ken Williams  wrote on Wed Feb 18 10:28:21 1998:
> Breezy > On Tue, 17 Feb 1998, Breezy wrote:
> >Babu Mengelepouti wrote:
> >> Ken Williams wrote:
> >> > ...
> >> > I got pgp 5.0. which will not work with your version. Upgrade man :-)
> >> He's the one who needs to change his version... to 2.6.x
> >Why use 2.6.x vs 5.0?  Is 5.0 not as stable or something?  Not as good?
> >...
> >====/------ Breezy ----------------------------/ 
> >===/---- ebresie at ccwf.cc.utexas.edu ----------/ 
> >==/---- http://ccwf.cc.utexas.edu/~ebresie --/
> 
> PGP v2.6.2 for UNIX is RSA, and cannot decrypt anything crypted with 
> PGP v5.x.  v5.0 for UNIX features the DSS/Diffie-Hellman algorithm that
> all the other 5.x versions have.  v5.0 is stable, better, and is basically
> the current standard.  it is more script-friendly and has a better
> command-line.
> 
> basically, it really sucks when every encrypted message i have gotten in
> the past week was encrypted with RSA/DSS and i couldn't decrypt it with
> the v2.6.2 that is installed at work.  due to space limitations on my
> volume server and our nihilistic copyrighted software policy, my only
> solution/option at the moment is to bring my laptop to work just for
> message decryption.
> 
> i've sent in a software request for a PGP upgrade on the network, but due
> to the expensive PGP licensing agreements and the fact that we have close

NO, NO.  PGP licensing agreements are by the server, not by the client.  You
need 1 server in each local net, on an exported partition (drive).  Then the
users can run it from UNIX(NT).  You still have to combine the public keys 
onto a single keyring, but ...

BTW, arrange your contracts in two chuncks.  The small one has the high 
priced service agreement, and the large one has the licenses for the user
majority.

> to 50,000 active users, i don't expect anything to be done.
> 
> guess state employees don't have the right to privacy any more huh?
> and neither do the studnets here for that matter...
> 
> TATTOOMAN

Luck,

Bob De Witt,
rdew at el.nec.com






From nobody at REPLAY.COM  Wed Feb 18 21:07:18 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 19 Feb 1998 13:07:18 +0800
Subject: Which is secure
Message-ID: <199802190454.FAA04010@basement.replay.com>




Which is secure block cypher,or stream cypher?
Thanks
 
        






From hh-feedback at netscape.com  Wed Feb 18 21:34:29 1998
From: hh-feedback at netscape.com (Netscape Communications)
Date: Thu, 19 Feb 1998 13:34:29 +0800
Subject: Email Survey Form
Message-ID: <1A33705099E@mail.selectnet.com>








   Thank you for downloading one or more trial versions of Netscape Server
   applications from our Web site.  We appreciate your interest in taking
   the time to evaluate some of our newest and most exciting products.

   We would like to follow-up with you to learn more about your company
   environment and better understand your needs.  To do so, please click
   below or copy the URL site address listed below.

   http://netscape.web-register.com/cgi/netscape/form/www_form?x=141270     

   If you experience problems entering the site, and are prompted to enter a
   customer ID number; your number is 141270  - or you may call 1-888-349-3100.

   Netscape respects your online time and Internet privacy.  If you would
   prefer not to receive future online surveys, please go to the site listed
   above and click on the box that has unsubscribe.

   Thank you for your time,

   Netscape Communications














From ravage at ssz.com  Wed Feb 18 21:52:19 1998
From: ravage at ssz.com (Jim Choate)
Date: Thu, 19 Feb 1998 13:52:19 +0800
Subject: Microsoft's World Domination Failing? [Forward]
Message-ID: <199802190558.XAA15432@einstein.ssz.com>



Hi,

>From somebody in the gun lobby industry who doesn't mind sharing their
opinion, though not their name...

Forwarded message:

> My attitude about Bill Gate$ is: Screw him!  Ever since he helped finance a
> recent anti-gun initiative in Washington state with over $1 million of
> personal cash, I've considered him an elitist jerk.  He recently sent out a
> chain e-mail in an attempt to collect e-mail addresses, offering $1,000 to
> any users who could stack 1,000 addresses below theirs.  I refused to
> forward it.


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From ichudov at Algebra.COM  Wed Feb 18 22:08:39 1998
From: ichudov at Algebra.COM (Igor Chudov @ home)
Date: Thu, 19 Feb 1998 14:08:39 +0800
Subject: Dealing with Spam, Part 1
In-Reply-To: 
Message-ID: <199802190557.XAA00934@manifold.algebra.com>



Tim May wrote:
> At 7:12 PM -0800 2/17/98, Marek Jedlinski wrote:
> >Did you read to the point in my post when I said I would happily shut up if
> >there *was* technology available? I agree with your "basic philosophy",
> 
> Suppose someone said, "I will happily shut up and stop proposing laws to
> restrict online pornography if someone shows me that there is technology
> available to block it."?
> 
> How about, "I will happily shut up if there is technology to block bad
> thoughts from reaching me. Otherwise, I favor censorship."

To add to this, the spam blocking technology is widely available and can be
used by anyone with half brain. My spam filters make me spend no more than 
a minute or so a day on quickly reviewing and deleting spams.

I do it by saving all messages that are likely to be spam to a separate
folder. A quick browse through subject lines of these messages is enough
to delete them really quickly.

In the future such spam detection is going to become a lot harder. Perhaps
a system where the first time sender pays a refundable digital fee to
the reader will become necessary.

	- Igor.






From lreed at west.cscwc.pima.edu  Wed Feb 18 22:14:03 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Thu, 19 Feb 1998 14:14:03 +0800
Subject: SAHMD / Porlo
Message-ID: <009C2049.D1802500.47@west.cscwc.pima.edu>










From lreed at west.cscwc.pima.edu  Wed Feb 18 22:55:57 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Thu, 19 Feb 1998 14:55:57 +0800
Subject: SAHMD / Prologue 2/0 (kinda)
Message-ID: <009C204F.7D120320.1@west.cscwc.pima.edu>



[Author's Note: This chapter, or continuation of the prologue,
 or whatever the fuck it is, contains an expose of the true
 diabolical nature of Lucky Green.
 Unfortunately, the only existing file-copy and printout are
 at the residence of a friend who is not currently at home,
 and it seems to be in my best interest to leave town in a
 hurry, without turning on my headlights and using only
 back roads and alleys.
 Anyone who is just so desperate to read Prologue 2/0 that
 they are peeing thier pants might want to email Jay Tolkoff
 at whatever internet address appears on Prologue 1/0 that
 was recently spammed to the CypherPunks list, pleading, 
 bribing, threatening or thanking him, in order to see if
 he might possibly be open to sending you (or the list) a
 copy of foresaid missive.
 At present, continuation of "Space Aliens Hide My Drugs"
 seems to be largely dependent upon the speed of my vehicle
 and the volume of my ammo supply. (The more things change,
 the more they remain insane.)
 And the good news is...
 As soon as I hit 'send', Baby and I will be hitting the
 road, under cover of darkness, with the sounds of Linda
 Lou and the Drifters belting out Leadbelly's "When I Was
 A Cowboy" in our wake.
 Don't get any on'ya...]






From nobody at REPLAY.COM  Wed Feb 18 23:23:42 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Thu, 19 Feb 1998 15:23:42 +0800
Subject: I was auto-outed by an IMG tag in HTML spam
Message-ID: <199802190715.IAA21519@basement.replay.com>



William H. Geiger III wrote:
>
>This could be a good sting opperation. Send an anonymous e-mail
>message that points to a childporn site. The [add your jackbooted
>thug orginization here] kick in your door as soon as they get the
>signal that your machine has connected to the site and downloaded
>the images.
>
>Hmmmm I wonder if there is a way to get the browser to DL an image
>without displaying it. The pictures would be sitting in your cache
>without even knowing it. Probably not a big issue I would imagine
>that a jury would convict on website logs alone even if no pictures
>were found on the machine.



would get shmeebs using netscab or microslop...






From sunder at brainlink.com  Thu Feb 19 12:40:06 1998
From: sunder at brainlink.com (sunder)
Date: Thu, 19 Feb 1998 15:40:06 -0500
Subject: Is spam really a problem?
References: <199802182107.QAA00482@panix2.panix.com>
Message-ID: <34EC98A6.363D0100@brainlink.com>


Information Security wrote:

>    >   From sunder at brainlink.com Wed Feb 18 15:58:46 1998
>    >
>    >   Anonymous wrote:
>    >   >
>    >   > I see discussion of spam here and everywhere on
>    >   > the net. But who finds it a *real* problem, and
>    >   > why?
> 
> Why are you asking the cypherpunks list?

I didn't. Anonymous did.  
 
>    >   There are nice technical solutions to this.  If sendmail didn't transport
>    >   things unauthenticated it could be done, but at a cost in CPU cycles on mail
>    >   servers:
>    >
>    >   Have every sendmail server use a PK scheme to talk to every other
>    >   server and authenticate the connection.  Have every sendmail server accept
>    >   mail only from those whose key is verified.
> 
> Nonsense.
> 
> We (NANA) already know where spam comes from,
> and when we complain about it, they are terminated.

Until someone else gets a throw away $10 account and uses it to 
spam, right?  By the time you track'em down, they already gave up
that account.  All ISP's do is to delete the spamming account, which
the spammer doesn't care about anyway.  So you achive nothing.

Further one can generate fake headers and you would not know exactly where
it comes from, though you could have some idea since it would be one of
many sites it was relayed from.  One could send messages from an ISP
that doesn't mind spammers who won't help you track down the bitch that
just slimed your machine, etc.

 
> PK authentication would change nothing.
> 
> Show a single spam with a forged IP address.

IP addresses won't be forged, but one could send
a mail with extra Recieved-By: headers, etc.
 
> PK authentication would only lead us down the
> road of everyone being tattooed with barcodes
> of our own making - and incredibly dumb idea.
> 
> It would be like requiring a smart card for Internet access.

Bullshit.  PK auth with a central repository would be Big Brotherish.
Having each user gen their own PK pair is what I suggested. That
would allow anon users to have persistant (or even throw away)
identities, but prevent Joe Spambitch from telnetting to port 25
and spamming that way.

Even if Joe Spambitch does gen PK pairs and uses them, he can't
gen a pair for every message he sends, the recipient servers won't
recognize his PK pair and might have been instructed to block messages
from bad (and possibly unknown PK's), or at least refuse to relay
messages from unknown PK's.  Relaying is a big problem.

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From mhw at wittsend.com  Thu Feb 19 00:00:05 1998
From: mhw at wittsend.com (Michael H. Warfield)
Date: Thu, 19 Feb 1998 16:00:05 +0800
Subject: Which is secure
In-Reply-To: <199802190454.FAA04010@basement.replay.com>
Message-ID: <199802190548.AAA27163@alcove.wittsend.com>



Anonymous enscribed thusly:

> Which is secure block cypher,or stream cypher?
> Thanks

	Yes.

	In other words...  It depends on things other than merely whether
it's block cypher or stream cypher.  Religious adherents on BOTH sides
may differ (and prove the point).

	Mike
-- 
 Michael H. Warfield    |  (770) 985-6132   |  mhw at WittsEnd.com
  (The Mad Wizard)      |  (770) 925-8248   |  http://www.wittsend.com/mhw/
  NIC whois:  MHW9      |  An optimist believes we live in the best of all
 PGP Key: 0xDF1DD471    |  possible worlds.  A pessimist is sure of it!






From mark at unicorn.com  Thu Feb 19 04:18:16 1998
From: mark at unicorn.com (mark at unicorn.com)
Date: Thu, 19 Feb 1998 20:18:16 +0800
Subject: MailGuard
Message-ID: <887890124.21343.193.133.230.33@unicorn.com>



>I think that this could easily be fixed by only sending out the request
>once then adding the address to the possiable spam list until a reply is
>received or there is user intervention.

Sure, but that doesn't stop the problem at the other end. According to
the company:

"Messages received from other copies of the 
program are either brought to the attention of the user, or (if the user 
so desires) result in the automatic transmission of a positive response to
the 
other copies of the program, which response causes the other copies of the 
program to 'approve' the user."

This implies that they have some 'magic marker' in the challenge messages
which forces the software to pass it on to the user. In which case, a
spammer can merely add this marker to his messages and they will get
through to anyone who has the software configured that way.

>I do not run WinBlows on any of my
>Inet connected machines so I can not test it here (well I could but I am
>not *that* intrested in it).

Ditto.

>Mailing list seem like they would be a problem as diferent mailing list
>use different formats. Unless the software is sophisticated enough to take
>this into account you could see alot of garbage being posted.

I've seen this problem with other active 'anti-spam' programs on other
lists; it's a real pain in the ass. They say the software handles lists
properly, but who knows?

>The fake e-mail address seems to be a real problem if they resolve to a
>valid domain let alone a valid e-mail address not belonging to the spamer.

Exactly; any kind of active anti-spam is a pain in the ass in this
case. I just filter and delete, which gets 95%+ of spam sent to my
account; 3MB in the last nine months, last I checked.

    Mark






From adam at homeport.org  Thu Feb 19 04:47:49 1998
From: adam at homeport.org (Adam Shostack)
Date: Thu, 19 Feb 1998 20:47:49 +0800
Subject: I was auto-outed by an IMG tag in HTML spam
In-Reply-To: <6B5344C210C7D011835C0000F8012766010035D1@exna01.securitydynamics.com>
Message-ID: <199802191234.HAA20433@homeport.org>



| > -----Original Message-----
| > From:	Anonymous [SMTP:anon at anon.efga.org]
| 	[Trei, Peter]  [edited]
| > They sent a message to my
| > off-site address (along with those of other critics about whom
| > they wanted to know more).  It was an HTML message with an
| > embedded IMG tag.
| > 
| > When Netscape saw that IMG
| > tag, it happily connected to marketing's "customer" tracking
| > server, and downloaded the keyed graphic.
| > 
| > My boss just let me see the log he got from the marketing VP,
| > showing clearly that my workstation read the message.  

	What exactly did that log say?

oops.netscape.com - - [15/Feb/1998:13:55:53 +0200] "GET /sekrit/tracilords.gif"

????

	Doesn't clearly show anything.  Theres IPspoofing.  Theres log
spoofing.  There's being forwarded the message by a buddy (or someone
avoiding the entrapment by forwarding the mail (anonymously) to
cypherpunks, thus getting hundreds of people who are totally
uninvolved to see it.

Adam

-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume







From ravage at ssz.com  Thu Feb 19 07:21:04 1998
From: ravage at ssz.com (Jim Choate)
Date: Thu, 19 Feb 1998 23:21:04 +0800
Subject: Barnes & Nobles indicted on child porno... [CNN]
Message-ID: <199802191523.JAA16425@einstein.ssz.com>



Forwarded message:

>           NATION'S LARGEST BOOKSELLER CHARGED WITH CHILD PORNOGRAPHY
>                                        
>      February 18, 1998
>      Web posted at: 10:28 p.m. EST (0328 GMT)
>      
>      MONTGOMERY, Alabama (AP) -- An Alabama grand jury indicted the
>      nation's largest bookseller, Barnes & Noble, on child pornography
>      charges involving the sale of books by noted photographers whose
>      work includes pictures of nude children.
>      
>      State Attorney General Bill Pryor said Wednesday he started the
>      grand jury investigation after receiving complaints about two books
>      being sold at Barnes & Noble stores in Alabama: "The Age of
>      Innocence" by French photographer David Hamilton and "Radiant
>      Identities" by San Francisco photographer Jock Sturges.
>      
>      The indictment accuses the New York-based company of disseminating
>      "obscene material containing visual reproduction of persons under 17
>      years of age involved in obscene acts."


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From paul at fatmans.demon.co.uk  Thu Feb 19 07:39:54 1998
From: paul at fatmans.demon.co.uk (Paul Bradley)
Date: Thu, 19 Feb 1998 23:39:54 +0800
Subject: Letter of the law
In-Reply-To: 
Message-ID: 




> the only relevant question here regards the odds that a US Customs officer
> is going to want you to drop your drawers and bend over...

Reasonably good odds I would say given the reputation of Customs-faggots...

        Datacomms Technologies data security
       Paul Bradley, Paul at fatmans.demon.co.uk
  Paul at crypto.uk.eu.org, Paul at cryptography.uk.eu.org    
       Http://www.cryptography.home.ml.org/
      Email for PGP public key, ID: FC76DA85
     "Don`t forget to mount a scratch monkey"







From attila at hun.org  Thu Feb 19 09:10:35 1998
From: attila at hun.org (Attila T. Hun)
Date: Fri, 20 Feb 1998 01:10:35 +0800
Subject: Barnes & Nobles indicted on child porno... [CNN]
In-Reply-To: <199802191523.JAA16425@einstein.ssz.com>
Message-ID: <19980219.163356.attila@hun.org>



-----BEGIN PGP SIGNED MESSAGE-----

on or about 980219:0923, in <199802191523.JAA16425 at einstein.ssz.com>, 
    Jim Choate  toosed this gem of a bomb into our 
    subsconsiousness:

>>           NATION'S LARGEST BOOKSELLER CHARGED WITH CHILD PORNOGRAPHY
>>                                        
>>      February 18, 1998
>>      Web posted at: 10:28 p.m. EST (0328 GMT)
>>      
>>      MONTGOMERY, Alabama (AP) -- An Alabama grand jury indicted the
>>      nation's largest bookseller, Barnes & Noble, on child pornography
>>      charges involving the sale of books by noted photographers whose
>>      work includes pictures of nude children.
>>
    that means every nudist camp magazine trying to show happy families,    
    every news picture from Cannes, and the National Geographic, etc. are
    about to have a problem with this dumbfuck.
      
>>      State Attorney General Bill Pryor said Wednesday he started the
>>      grand jury investigation after receiving complaints about two books
>>      being sold at Barnes & Noble stores in Alabama: "The Age of
>>      Innocence" by French photographer David Hamilton and "Radiant
>>      Identities" by San Francisco photographer Jock Sturges.
>>      
    is this asshole about to run for US President or just governor of
    Alabama? sounds like he has high political ambitions and wants the
    endorsements of Robertson, Buchannan & the now-religious-zealot
    Donna Rice.

    somebody raid his house; bet he's an S-M freak or some other kind
    of pervert!

>>      The indictment accuses the New York-based company of disseminating
>>      "obscene material containing visual reproduction of persons under 17
>>      years of age involved in obscene acts."

    to this man, God's natural clothing is an obscene act; he'd probably
    die of apoplexy if someone invited him to the communal saunas in     
    Scandinavia and he walked out of the men's dressing room...  Bavaria
    for that matter, but not the prudish Swiss.

    pedophilia should be treated as a capital crime, but that's as far
    as it goes. today, statutory rape in consensual sex is a joke for
    children over 12, or 8? I dont think they should have an awareness 
    of carnal knowledge at that age, but they certainly do. you can not
    legislate morality; you can punish predatory acts such as pedophilia,
    but the perpetrators sense of morality, etc. was lost long ago.

    welcome to censorship in its finest hour. perhaps Mississippi has
    progressed further out of the Victorian age than Alabama.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNOxkGrR8UA6T6u61AQEVYgH+Oa9S81C6pMGVVU1+GU933KPYTjeYbfiQ
zBqK5mg0dsW3WCkKWGxp2zsvARVkAKYrJBNqH92ak2EQiE3mz7nEjw==
=krrE
-----END PGP SIGNATURE-----






From attila at hun.org  Thu Feb 19 09:30:15 1998
From: attila at hun.org (Attila T. Hun)
Date: Fri, 20 Feb 1998 01:30:15 +0800
Subject: privacy trade war
Message-ID: <19980219.000200.attila@hun.org>



FUD: Forwarded at 980219:171500 +0000 by Attila T. Hun 

-----BEGIN PGP SIGNED MESSAGE-----

Europe, U.S.  try to head off privacy trade war
_________________________________________________________________
   
BRUSSELS, Belgium (Reuters) - U.S.  companies doing business
in Europe are nervously counting the days to what they fear
could be a new trans-Atlantic showdown.
   
Oct.  24 is the deadline for the 15 European Union nations
to implement a tough law designed to protect citizens from
computer-age invasions of privacy.  The law gives
individuals broad rights to know, and in some cases control,
how information about their buying habits, credit ratings,
health, political affiliations and other characteristics is
used.
   
The problem, which has been consuming increasing amounts of
attention in Brussels and Washington, is that it also allows
governments to block exports of personal information to
third countries that do not provide "adequate" protection.
The United States is scrambling to show that it does not
fall into that category even though it prefers industry
self-regulation to strict government controls.
   
"It's clear that the EU has a law with a sort of
centralized government-led approach that they have to
follow," a U.S.  official said.  "We don't have such an
approach and we're not going to be taking such an
approach."
   
Washington argues that industry codes of conduct are an
effective way to guard against misuse of data -- a stance
that critics say does not appreciate the historical reasons
Europe wants the right to privacy enshrined in law.
   
"The difference between the United States (and Europe) is
that the smell of fascism is still thick in the air in
Europe," said Simon Jones, founder of the British-based
global coalition Privacy International, which supports the
EU approach.
   
The conflict has raised fears that the two sides are heading
for confusion at best and a bruising trade battle at worst
once the EU law takes effect.
   
"Every time we meet this comes up because the potential
risk is quite large," the U.S.  official said.
   
The EU data protection directive, adopted after much
controversy in 1995, aims to protect information traveling
over electronic networks including the Internet from abuse
by potential "Big Brothers."
   
It also aims to ensure that public agencies, banks, mail
order firms, multinationals and others can send data across
Europe without fearing it will be blocked by differences in
national privacy laws.
   
It gives individuals the right to know what data has been
collected, to prevent details from being handed over to
third parties such as direct marketers, to file complaints
about the misuse of data with a national authority and to
win compensation for damages.
   
The sticking point for Washington is Article 25, which
requires governments to bar organizations from transferring
personal data to third countries that do not "ensure an
adequate level of protection." Since U.S.  law does not
mandate the controls required by the EU directive, companies
fear the country will be blacklisted.
   
"This disruption of trade would have an enormous impact on
data flows required for electronic commerce," the EU
Committee of the American Chamber of Commerce, which lobbies
for U.S.  business on EU issues, said in a policy paper.
   
Washington has responded to the threat by pushing its
business sectors to draw up codes of conduct with teeth.  It
has set a July 1 deadline for assessing whether that
approach will work, the American official said.
   
Industry sources say government officials have urged them to
draw up codes bolstered by consumer notices, effective
enforcement and outside audits -- or face continued pressure
from the EU and home-grown privacy activists.
   
"The hope is there will be a self-regulatory solution
strong enough to give the U.S.  the opportunity to say,
'Look what we've done' and the Europeans to say, 'They've
complied, we can back off,"' Mark Kightlinger, a lawyer at
Covington & Burling in Brussels who is following the issue,
said.
   
Many U.S.  companies already have privacy policies and some
sectors have been forced to strengthen their protection
under pressure from the Federal Trade Commission.
   
For example, a group of leading American computer database
companies that was under fire for releasing Social Security
and other information drew up a privacy policy in December.
The American Electronics Association says it is among
industry groups that are debating how to formulate a code of
conduct.
   
The European Commission, the EU executive said, has assured
the United States that it does not envisage a blanket ban on
data transfers to the United States, even under the status
quo.
   
Commission President Jacques Santer said in a letter to the
EU Committee that the law allowed for "ad hoc solutions"
and a "case by case" approach.  But he said codes of
conduct alone were not enough.  "There is a need for
sanctions and individuals must have guaranteed access to
their personal data and a means of redress if their rights
are violated," he said.
   
A working party of EU national regulators echoed that
message when it issued a paper in January outlining criteria
for effective self-regulation in third countries.
   
"Self-regulation as such is not a very explicit term," a
commission official said.  "Does it mean self-regulation,
we don't do anything?  Or do we inform consumers about our
privacy policies and provide a right of access and
rectification?"
   
Some say the EU-U.S.  conflict highlights the need for a
global approach to data privacy.  Some international
organizations have already taken up the question such as the
29-member Organization for Economic Cooperation and
Development and the International Chamber of Commerce.
   
Santer argued in his letter that the Geneva-based World
Trade Organization was the appropriate forum.

    _________________________ NOTICE ______________________

    In accordance with Title 17 U.S.C.  Section 107, this
    material is distributed without profit to those who have
    expressed a prior interest in receiving the included
    information for research and educational purposes.
    _______________________________________________________


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNOxqILR8UA6T6u61AQFcdgIApku3mtLjUenuYQV9tPwev/dbZrcDEeKa
Lp/tOlfU5psEeHmcTtA2ltSLwFgZX9dD//41Cll9txi7BfbDOC0YQg==
=8FJW
-----END PGP SIGNATURE-----






From tcmay at got.net  Thu Feb 19 10:06:56 1998
From: tcmay at got.net (Tim May)
Date: Fri, 20 Feb 1998 02:06:56 +0800
Subject: Anthrax--The Horsemen are Riding
Message-ID: 




CNN is reporting a news flash, with few details, about two men being
arrested in Las Vegas for making or possessing or planning to make anthrax.
Details should be emerging, but I have a hunch it's a witch hunt, an
invocation of the Four Horsement, to drum up support for Clinton's Dirty
Little War.

Now, just what are the chances of such an arrest *exactly* as the USG is
rattling sabers over Saddam's alleged anthrax and other CBW items?

It seems highly likely that the word went out to local FBI offices to "beat
the bushes" to produce some news headlines.

"Find us some jimbells we can show to the American public as proof that an
undeclared, unsupported war with Iraq is justified."


Expect more raids on "terrorist cells." Expect more coincidental findings
of chemicals and supplies which _could_ be used to make banned items.

Expect the usual suspects, like Fineswine, to call for limits on free
communications ("which are being used by terrorists") and cryptography.

Meanwhile, expect no Congressional vote for Clinton's War with Saddam. Why
won't Congress declare war, as is its responsibility (clearly stated in the
Constitution)? The last time around, in 1990-1, there was a six-month
buildup to the start of the war, there was apparently overwhelming public
hatred of Saddam, there was a clear goal ("liberate Kuwait"), and there was
clear support by other nations, other Arab states, the United Nations, etc.

And yet the vote in Congress was very close...the Congress came very close
to not issuing a statement of support. (Of course, this was still not a
declaration of war, as the Constitution calls for, but it's about as close
as we ever get in this post-WW II "Executive" government, where Congress
never declares war, not even in Korea, Viet Nam, the Gulf, etc.)

And this time around the public's interest in Saddam is ho-hum, the support
of other nations is lukewarm to nonexistent, the goals of a war are
completely unclear, and Congress appears unwilling to vote support.

And yet the war will probably happen. Clinton, the draft dodger and antiwar
activist (factual statement, not a judgement on his actions in the 60s),
_needs_ a Nice Little War.

But I predict it will backfire. He'll kill ten thousand Iraqi women,
children, and other innocents, he'll incinerate some underground bunkers
holding terrified residents of Baghdad, and he'll bomb some pesticide
facilities.

But in a region as vast as Iraq is, does anybody think he'll destroy all of
those shock-resistant flasks and Thermos bottles carring whatever
biological goodies he's already made? When Clinton's minions stood and held
up bags of sugar and said "This much anthrax could kill everyone in
Washington," why, after the cheering stopped, didn't the obvious question
get asked: "And bombing Baghdad stops this bag of sugar from being used in
just _what_ way?"

If a couple of guys in Las Vegas can get busted for doing Illegal
Experiments, regardless of whether actual anthrax is ever found, then why
do we think Iraqi, Libyan, Sudanese, and other such nations have not long,
long had the means to disperse anthrax in nations which bomb them, kill
their children, and tell the U.N. to boycott them?

Like I always say, avoid "soft targets." Avoid the Schelling points for
attacks, the sites any self-respecting terrorist, freedom fighter, or
patriot would attack first.

When Washington, the president not the pesthole, advised us to "avoid
foreign wars," we should have heeded him. America has become Amerika,
Policeman to the World, ready to inject herself into foreign wars in
Bosnia, Haiti, Ruwanda, Somalia, Viet Nam, Korea, El Salvador, Kuwait, and
on and on.

"Pouring out the phials" may be rough justice for Amerika.


--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.








From tcmay at got.net  Thu Feb 19 10:27:52 1998
From: tcmay at got.net (Tim May)
Date: Fri, 20 Feb 1998 02:27:52 +0800
Subject: PLO censoring pro-Iraqi sentiments
Message-ID: 




The PLO ("Palestinian Authority") has banned pro-Iraqi demonstrations and
has seized the offices of newspapers and radio stations with an editorial
bent against the upcoming War with Saddam.

(Last time around, of course, the PLO supported Saddam.)

So much for any pretense of freedom of speech and the press.

(Not that I ever held the PLO, or the State of Israel, or Iraq for that
matter, as any kind of exemplars.)

Just something to remember when considering the implications of these
foreign wars.

No doubt Madelyn Albright, William Cohen, and Sandy Berger would love to
have had such press controls yesterday in Columbus, Ohio, when their
policies were booed and heckled, and when the questions asked were the
common sense questions many of us are asking.....

I chortled to see tapes of this event being replayed over and over again in
Baghdad.

But not in Israel. At least not in PLO-controlled areas, now that
Washington is their New Master.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.








From emc at wire.insync.net  Thu Feb 19 10:31:30 1998
From: emc at wire.insync.net (Eric Cordian)
Date: Fri, 20 Feb 1998 02:31:30 +0800
Subject: FBI Claims Germ Attack Foiled
Message-ID: <199802191818.MAA00341@wire.insync.net>



Here's an interesting little story that just floated by on AP.
 
-----
 
NEW YORK (AP) -- Two members of the Aryan Nation have been arrested in
Nevada and accused of plotting a bacterial attack on the New York City
subways, an FBI source said today.
 
The source, who spoke in New York on condition of anonymity, provided
no other details. The Aryan Nation is a white supremacist group.
 
The FBI in Nevada said that two men were taken into custody in a
luxury car outside a doctor's office in Henderson, Nev., near Las
Vegas.
 
FBI spokesman Aurelio Flores in Las Vegas said only the matter was
``serious.'' He said different teams from around the country are
``coming in to look at what we have.''
 
A news conference was set for late morning Las Vegas time.
 
Flores said the FBI has secured the area where the car was found and
had ``made everything safe.'' He said the agency was not looking for
explosives.
 
The New York source said the suspects allegedly planned to release a
``dangerous bacterial substance'' in the subways.
 
In Washington, a federal law enforcement source said agents were
investigating allegations that the two men arrested in Las Vegas
possessed anthrax. The source stressed that the tests were not
complete and that there have been unfounded instances in the past
involving allegations of anthrax.
 
Anthrax is an infectious disease that usually afflicts only animals,
especially cattle and sheep. But Anthrax spores can be produced in a
dry form suitable for weapons and can be fatal to humans even in
microscopic amounts.
 
New York City Mayor Rudolph Giuliani was briefed on the case by FBI
Director Louis Freeh and was told ``there is no reason for alarm,''
said mayoral spokeswoman Cristyne Lategano. She would not confirm what
the alleged threat was.
 
Giuliani, speaking generally about the threat of terrorism, said:
``Every part of America, every part of the world, is vulnerable to
terrorism. ... There is no way to make an open society, a democracy,
invulnerable to terrorism or to criminal acts. Short of closing down
America and closing down the city of New York, it would be impossible
to do that.''
 
The mayor added, ``It is impossible to have a police officer every
place. That would be unrealistic, and it would change the nature of a
free society. Short of that, I think New York City is doing everything
it can do to try to reduce the risk.''

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
 






From ravage at ssz.com  Thu Feb 19 10:44:37 1998
From: ravage at ssz.com (Jim Choate)
Date: Fri, 20 Feb 1998 02:44:37 +0800
Subject: Opticom.com is *not* the Opticom that makes the TB chips...
Message-ID: <199802191847.MAA17888@einstein.ssz.com>



Hi all,

Someone mentioned in private mail that 'opticom.com' was a valid webpage.

True, but it isn't the Opticom that is making the tera-byte chips that we
have been discussing. I did a whois on them and called the admin contact
number and they very quickly made it clear there was no connection.

So, if anyone knows how to get in touch with the company on the other side
of the big pond please pass that info along to me. I am most interested in
getting data sheets, etc. on the devices.

Thanks.


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From jinn at inetnebr.com  Thu Feb 19 10:59:42 1998
From: jinn at inetnebr.com (D'jinnie)
Date: Fri, 20 Feb 1998 02:59:42 +0800
Subject: Mainframe solution (fwd)
Message-ID: 



I do not know where this was published but it seems interesting...

---
Reality leaves a lot to the imagination.

jinn at inetnebr.com

---------- Forwarded message ----------
Date: Thu, 19 Feb 1998 13:13:20 -0500
From: "Labry, Phillip" 
To: intp at jubjub.wizard.com
Subject: Mainframe solution,Lengthy but interesting...
Resent-Date: Thu, 19 Feb 1998 10:14:27 -0800 (PST)
Resent-From: intp at jubjub.wizard.com


> Got this interesting article from an old friend of mine.........the
> best approach seems to be to build GUI-based applications on the
> front-end and use mainframes as big servers.
> 
> 
> ---------------------------------------------------------------
> 
> By Martin J. Garvey
> 
>         The mainframe, once the IT backbone for many enterprises, is
> regaining that stature. Next month, several large companies will lead
> the charge back to big iron in an attempt to rescue unwieldy or
> stalled client-server projects. Mainframes, these companies say,
> provide better price/performance and return on investment than their
> sleeker Unix and Windows NT systems, while delivering proven security,
> scalability, and reliable centralized management.
> 
>         GTE Data Services, Motorola Semiconductor, University Health
> System, and others are at the cusp of a trend toward leveraging the
> mainframe to back out of costly or unmanageable Unix and Windows NT
> client-server implementations. Brian Jeffery, an analyst with
> International Technology Group, an IT consulting firm in Los Altos,
> Calif., says about 70 sites worldwide are porting Unix or NT
> applications back to IBM OS/390-based mainframes. By fall, he
> estimates, as many as 300 sites will convert Oracle, SAP, and
> PeopleSoft projects to OS/390. "By 1998, there will be thousands of
> these accounts," predicts Jeffery.
> 
>     "It's a brand new life for the mainframe," says Cal Braunstein, a
> consultant with Robert Frances Group, an IT market research firm in
> Westport, Conn. "It's far less expensive to tie Unix and client-server
> information into mainframes than it is to spread it out across much
> smaller systems."
> 
>     University Health System, a 450-bed hospital in San Antonio, hopes
> to begin in August to move data-intensive applications, such as
> patient accounting and discharge, to the IBM Parallel Sysplex
> mainframe.  The project is expected to be completed by year's end. "We
> can't go in a direction of more and more resources for a nonending
> distributed environment," says Tim Geryk, director of technical
> services for University Health. "We need to turn it back the other way
> for a better scale of economy."
> 
>         Currently, University Health's enterprise has 2,500 desktops
> attached to LANs, 100 RS/6000 Unix servers, about 600 other Unix
> machines, 2,000 dumb terminals, an IBM ES/ 9000 bipolar mainframe, and
> an IBM 9672 CMOS mainframe. "It's time-intensive to keep so many
> workstations and servers up and running when so many different things
> can go wrong," says Geryk. "We can't put our hands around it anymore."
> 
>     The company is installing an IBM Parallel Sysplex architecture
> that supports Unix applications to provide a single-platform image
> across its enterprise. Bill Tudor, director of systems product
> management for mainframe maker Hitachi Data Systems in Santa Clara,
> Calif., says it's not uncommon to see multiple racks with 200 Unix
> servers in the data center. "It's just cheaper to run that same
> information on the mainframe," he says.
> 
>         According to Jeffery of ITG, it's cheaper and easier to
> increase network bandwidth for integration between Unix servers and
> the mainframe than it is to add more Unix servers. Also, customers are
> demanding that systems management, as well as enterprise data itself,
> be centralized.
> 
>         And according to the Clipper Group, a consultancy in
> Wellesley, Mass., Unix's security hasn't caught up to the mainframe's.
> Some intrepid IT users aren't just migrating some applications to
> mainframes. They're also consolidating client-server architectures
> onto big iron. One financial services company reportedly is
> consolidating as many as 600 Unix servers onto one mainframe, sources
> say.
> 
>         The hidden costs of Unix servers may be the final incentive to
> push many customers back to the mainframe. For example, CMOS
> mainframes may cost three times more than Unix servers, but management
> costs for distributed Unix servers are 20 times greater than those for
> supporting a mainframe, according to Giga Information Group in
> Cambridge, Mass.
> 
>         IT managers can port Unix applications to the OS/390 mainframe
> operating system for acceptable performance in a production
> environment. Moreover, enterprise applications, including those from
> Oracle, PeopleSoft, and SAP, are available on OS/390. And the CMOS
> processor architecture, the heart of IBM's Parallel Sysplex mainframe
> cluster that scales to 32 processors, is for the first time as
> powerful as older bipolar mainframes.
> 
>         Motorola's $7.9 billion semiconductor business unit in Phoenix
> will begin moving all of its SAP R/3 data to the mainframe in the next
> four months.
> 
>         Its architecture will then include PC clients, Unix servers as
> application servers, and an IBM OS/390-based Parallel Sysplex
> mainframe as host for about 500 Gbytes of data. The company says it is
> one of five pilot sites for SAP's R/3 on the mainframe. Before taking
> on the pilot, the semiconductor manufacturer evaluated multiple Unix
> servers and databases. The Unix systems lost to the mainframe because
> they lacked the power and manageability Motorola was looking for. "It
> was the best way to keep the database in one place," says Patrick
> Horrigan, corporate VP and IS director for Motorola's SPS division.
> "And it's 40% cheaper than the Unix solutions."
> 
>     'Tons Of Unix'
>         At GTE Data Services in Temple Terrace, Fla., shifting its
> distributed applications to the mainframe conforms to the division's
> motto of "right data, right device." The group is consolidating six
> systems into three or four. "With our so-called distributed systems,we
> have tons of Unix out there, but it's really not even distributed,"
> says operations director Pat Remick. "We're just piling a lot of Unix
> boxes on raised floors next to the mainframes, so we decided to look
> at the better reliability and scalability of the mainframe."
> 
>         Analysts point out that server consolidation isn't relegated
> solely to mainframes. HP and Sun Microsystems recently both announced
> enterprise-class servers that many say will suffice as Unix
> consolidation servers. "There is increasing value in consolidating
> Unix servers and PC servers separate from mainframes," says John
> Young, VP of enterprise systems planning for the Clipper Group.
> "People are realizing the savings behind the re-emergence of the data
> center. It's the place for consolidating processing, management,
> accountability, and data storage."
> 
>         The pioneers in the migration back to mainframes say they
> aren't ready to dismiss Unix. "Our client and application server tiers
> of R/3 will remain distributed with Unix," says Motorola SPS's
> Horrigan.  However, distributed computing could benefit from greater
> reliability, availability, and scalability. "Downtime from distributed
> systems costs too much in management, and I know a lot of processing
> is on Unix," says GTE's Remick. "But some transition must happen.
> Something has to be done."
> 
> 
> 
>     SIDEBAR:Reasons For Returning
> *   Mainframe security is at least two years ahead of Unix or Windows
> NT
> *   OS/390 can run Unix, NT, and enterprise applications such as SAP
> R/3
> *   Mainframes have the capacity to store a database of 500 Gbytes or
> more without splitting it up
> *   Parallel Sysplex configurations have no single point of failure
> and are easy to update and maintain while the system is running
> 
> 						    Data:
> InformationWeek
> 
> 
> 
> --
> 
> 
> 
> 
> 
> 
> 
> 
> 






From emc at wire.insync.net  Thu Feb 19 11:11:55 1998
From: emc at wire.insync.net (Eric Cordian)
Date: Fri, 20 Feb 1998 03:11:55 +0800
Subject: PLO censoring pro-Iraqi sentiments
In-Reply-To: 
Message-ID: <199802191903.NAA00453@wire.insync.net>



Tim May writes:

> The PLO ("Palestinian Authority") has banned pro-Iraqi demonstrations and
> has seized the offices of newspapers and radio stations with an editorial
> bent against the upcoming War with Saddam.

Under US pressure, of course.  In Bosnia, the US, hiding behind the UN, is
attacking media outlets critical of its occupation, and even writing
"confessions" for the anchors to read on the air.

So much for free speech. A good example of what the American people can
expect from their government should FUD no longer suffice to control their
thought patterns. 

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"







From attila at hun.org  Thu Feb 19 11:51:07 1998
From: attila at hun.org (Attila T. Hun)
Date: Fri, 20 Feb 1998 03:51:07 +0800
Subject: Anthrax--The Horsemen are Riding
In-Reply-To: 
Message-ID: <19980219.183321.attila@hun.org>



-----BEGIN PGP SIGNED MESSAGE-----

on or about 980219:0959, in , 
    Tim May  was purported to have 
    expostulated to perpetuate an opinion:

>CNN is reporting a news flash, with few details, about two men being
>arrested in Las Vegas for making or possessing or planning to make
>anthrax. Details should be emerging, but I have a hunch it's a witch
>hunt, an invocation of the Four Horsement, to drum up support for
>Clinton's Dirty Little War.
>
    The Gulf of Tonkin all over again. playing on the strings of
    perceived public patriotism

>Now, just what are the chances of such an arrest *exactly* as the USG is
>rattling sabers over Saddam's alleged anthrax and other CBW items?

    my calculator only displays to 10^-999

>It seems highly likely that the word went out to local FBI offices to
>"beat the bushes" to produce some news headlines.
>
    Ruby Ridge, Waco, Oklahoma City...     

>"Find us some jimbells we can show to the American public as proof that
>an undeclared, unsupported war with Iraq is justified."
>
    "jimbells"  -there but for the grace of God, go we...

    just like Waco underlined the need for more government suppression
    of whatever, or whomever, in the interest of public safety.

>Expect more raids on "terrorist cells." Expect more coincidental findings
>of chemicals and supplies which _could_ be used to make banned items.

>Expect the usual suspects, like Fineswine, to call for limits on free
>communications ("which are being used by terrorists") and cryptography.
>
    and get something legislated which might be stricken by the 
    Supreme Court. if we're lucky.

    [snip]

>And this time around the public's interest in Saddam is ho-hum, the
>support of other nations is lukewarm to nonexistent, the goals of a war
>are completely unclear, and Congress appears unwilling to vote support.
    
    [snip]

>And yet the war will probably happen. Clinton, the draft dodger and
>antiwar activist (factual statement, not a judgement on his actions in
>the 60s), _needs_ a Nice Little War.
           ^^^^^^^^^^^^^^^^^^^^^^^^^

    the desire to change leaders in the middle of a ScheiBsturm may
    be possible this time; Bush needed a nice little war, but as you
    point out, there was a specific issue: Kuwait. and George did not
    have the scandal, after scandal, ad nauseam...

    [snip]

>If a couple of guys in Las Vegas can get busted for doing Illegal
>Experiments, regardless of whether actual anthrax is ever found, then why
>do we think Iraqi, Libyan, Sudanese, and other such nations have not
>long, long had the means to disperse anthrax in nations which bomb them,
>kill their children, and tell the U.N. to boycott them?

    all it takes is a sufficient catalyst, an enabling act, to push 
    someone over the edge. who really needs nukes and their intendant 
    delivery problems.  our brave warriors claim Iraq does not have
    the means to deliver CBW --yeah, right.  it may be true they can
    not deliver it without suiciding the agents, but since when has
    the Arab world ever lacked for martyrs to execute a fatwah?

>Like I always say, avoid "soft targets." Avoid the Schelling points for
>attacks, the sites any self-respecting terrorist, freedom fighter, or
>patriot would attack first.

    bullies do not understand this; certainly not Saddam, and it
    is becoming obvious that Bubba is willing to do anything, 
    including selling our Americans to distract us from the almost 
    inevitable fact that his "need" for satisfaction warrants the lies
    and coverup.

>When Washington, the president not the pesthole, advised us to "avoid
>foreign wars," we should have heeded him. 
>
    we would be a lot better off if we had heeded not only the foreign
    wars admonition, but a great many more of Washington's farewell
    address. you never see it quoted en toto for the masses, never
    printed full page in the Times, never even taught in our schools
    --because it does not serve the interests of the ruling classes.

>America has become Amerika,
>Policeman to the World, ready to inject herself into foreign wars in
>Bosnia, Haiti, Ruwanda, Somalia, Viet Nam, Korea, El Salvador, Kuwait,
>and on and on.

    Pax Amerikana: may commerce prevail for Amerikan suits to
    rape, pillage, and burn uninhibited around the world. welcome
    to the interests of big money, central banks, and the NWO.

>"Pouring out the phials" may be rough justice for Amerika.

    you aren't downwind from Las Vegas and we were hit with 
    government experiments from the test range which not only
    dropped radioactive fallout, but anthrax.

    of course, it would not bother me if Washington, the pesthole,
    became a ghost town of rotting CongressCritters and bureaucrats.

    maybe Bubba should take this little walk around the memorials
    (unfortunately ignoring the last one which would displeased him, 
    but which would do us the most good):

        Clinton, distraught and contemplating his latest scandal 
        was walking through Washington looking for any kind of
        guidance. 

        He walks up to the Washington Monument, looks up and says,
        "George, you were always wise, what should I do?" 

        Low and behold, a voice comes down from above and says,
        "ABOLISH THE I.R.S. AND START OVER." Clinton, amazed that
        he is talking to the past President thinks he'll try it
        again. 

        He walks over to the Jefferson Memorial and utters the
        same request. "Thomas, you never had these kind of
        problems, what can I do to rally people behind me?" 

        Again a voice from above answers, "WELFARE, ITS NOT
        WORKING, ABOLISH IT, START OVER." 

        After hearing this Clinton is so excited he is planning to
        go to all the historic sites for guidance. Next he goes to
        the Lincoln Memorial.  "Abe, I need your help, people are
        losing confidence in me and they no longer trust me what
        should I do?"

        After a substantial pause Abe responds, "TAKE THE DAY OFF,
        GO TO THE THEATER."


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNOyJA7R8UA6T6u61AQFXJgIAiurmJNELU+ic3N6V3aqIz8QcqkhgCKlF
2MBlwFPWRTlEetjGT0jg5KMLGu3ehJsoMbijQz7BTgcjLPDTb0anpQ==
=DlR/
-----END PGP SIGNATURE-----






From tcmay at got.net  Thu Feb 19 11:52:29 1998
From: tcmay at got.net (Tim May)
Date: Fri, 20 Feb 1998 03:52:29 +0800
Subject: Anthrax--The Horsemen are Riding
In-Reply-To: 
Message-ID: 



At 9:59 AM -0800 2/19/98, Tim May wrote:
>CNN is reporting a news flash, with few details, about two men being
>arrested in Las Vegas for making or possessing or planning to make anthrax.
>Details should be emerging, but I have a hunch it's a witch hunt, an
>invocation of the Four Horsement, to drum up support for Clinton's Dirty
>Little War.

I'm now watching the FBI's news conference about this event. Very few
details, lots of scary stuff about deadly biological viruses....par for the
course.

The FBI guy cites the help of "Dougwood Proving Grounds." Er, I think he
means Dugway, but he's just a flack.

He mentioned that the raids were launched "hours" after an informant gave
them information. Ah, but how in this bureaucratic age did they get the
support from Nellis AFB, the U.S. Army, a team from Quantico, and half a
dozen other police and military agencies?

And the Army's involvement (Army and Air Force personnel) would seem to
violate Posse Comitatus (the law forbidding military involvement in
domestic police enforcement).

Still looks like a canned event to drum up support for Operation Wag the Dog.

(Consider that one of the arrestees was charged two years ago with some
crime related to having precursor chemicals which could be used in making
bubonic plague. He was on probabation, and probably his movements were
being tracked. Perfect for "rounding up the usual suspects.")

So far the seized materials are "unidentified." It'll be real funny, and
tragic, if nothing is found.

(Ah, a reporter just asked, "You've had these suspects under surveillance
for quite some time....")

But I suspect the Feds will _plant_ something incriminating even if nothing
is actually found. Like throwdown guns planted on perps in shootings,
throwdown vials will be used. (Dugway Proving Grounds was involved, and is
just one of many sources of anthrax.)

It's truly indicative of our Orwellian state that the USG is ranting about
"weapons of mass destruction" when the USG maintains massive chemical,
biological, and nuclear stockpiles.

(Or are Fort Detrick and Dugway  and the VX stockpiles near Hanford just
"baby milk factories"? :-) )

Wanna bet they also bring crypto in this media circus?


--Tim May


Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.








From jim.burnes at ssds.com  Thu Feb 19 12:07:12 1998
From: jim.burnes at ssds.com (Jim Burnes)
Date: Fri, 20 Feb 1998 04:07:12 +0800
Subject: PLO censoring pro-Iraqi sentiments
In-Reply-To: 
Message-ID: <34EC8F2A.7DECFD4B@ssds.com>



Tim May wrote:
> No doubt Madelyn Albright, William Cohen, and Sandy Berger would love to
> have had such press controls yesterday in Columbus, Ohio, when their
> policies were booed and heckled, and when the questions asked were the
> common sense questions many of us are asking.....
> 

Art Bell's radio show had a very interesting interview with a
correspondent who was at the "town hall meeting".  As bad as the
footage from Nightline (donated by CNN) looked, most people
don't know what CNN didn't show.

The damage control geeks at the white house are trying to get
you to believe it was just a vocal minority.  Well apparently
the minority was somewhere between 20 and 50 people.  A pretty
healthy minority.  Healthy enough that, during the break, a riot
almost broke out.  (The whole audience clapped when the 
non-minorities questioners threw some very hardball questions)

What I found interesting was the late night ABC news spin.  They
said a vocal minority had behave rudely, then went on to mention
that a veteran was in favor of doing whatever it took.  What the
veteran really said was something like, "we shouldn't be over there
unless we do it right and take over." (he was pretty angry too)

Then more interesting propaganda during Nightline when Koeppel
asked Albright et al why we should bomb Iraq for "having weapons
of mass destruction" when we never bombed Russia during the
cold war.  The secretary of defense lied through his teeth
(or is totally ignorant - a possibility) when he said that
none of those countries has ever used its weapons of mass
destruction.  I guess he forgot about the Soviets and their
yellow rain campaign in Afganistan.

Maybe what he meant to say was they never used it on us.
Niether have the Koreans.  Niether have the Israelis.
(what weapons of mass destruction did Iraq use on us?
I thought it was the other way around.  I'm trying to
remember where I read the report, but I think the US
used Fuel Air Explosives in the PGWar)

Wag the Dog....

jim burnes






From tcmay at got.net  Thu Feb 19 12:09:53 1998
From: tcmay at got.net (Tim May)
Date: Fri, 20 Feb 1998 04:09:53 +0800
Subject: PLO censoring pro-Iraqi sentiments
In-Reply-To: 
Message-ID: 



At 11:03 AM -0800 2/19/98, Eric Cordian wrote:
>Tim May writes:
>
>> The PLO ("Palestinian Authority") has banned pro-Iraqi demonstrations and
>> has seized the offices of newspapers and radio stations with an editorial
>> bent against the upcoming War with Saddam.
>
>Under US pressure, of course.  In Bosnia, the US, hiding behind the UN, is
>attacking media outlets critical of its occupation, and even writing
>"confessions" for the anchors to read on the air.

And don't forget Somalia. In Somalia the U.S. occupying forces not only
suppressed newspapers critical of the U.S., they also led the disarmament
of the civilian population.

(This was verified, and I saw CNN reports of journalists following the U.S.
teams going farm to farm, hut to hut, collecting the AKs and SKS rifles the
peasants had. There were then, predictably, reports that the peasants were
now finding themselves easy pickings for roving looters. The U.S. clucked
and called these looters "agents of Warlord Aidid." Whatever, the effects
of disarming people are predictable. Apparently the First and Second and
Fourth Amendments are good enough for us, even if honored less and less,
but not OK for ragheads and dirtballs.)

This is why I cheered to see the U.S. gets its tail kicked in Somalia and
have to retreat in disgrace. Alas, the U.S. planners just looked for
another war, one we could "win," and they found a bombed out Bosnia to be
the perfect place to "restore our dignity."

Amerika the Fascist.

--Tim May





>So much for free speech. A good example of what the American people can
>expect from their government should FUD no longer suffice to control their
>thought patterns.
>
>--
>Eric Michael Cordian 0+
>O:.T:.O:. Mathematical Munitions Division
>"Do What Thou Wilt Shall Be The Whole Of The Law"


Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.








From hedgehog at anon.efga.org  Thu Feb 19 12:11:21 1998
From: hedgehog at anon.efga.org (Henri La Bouche)
Date: Fri, 20 Feb 1998 04:11:21 +0800
Subject: The danger of certificates
Message-ID: <199802192003.PAA11771@server1.efga.org>




IMHO there is a serious situation creeping up that I have not seen much attention on. That is the use of certificates to encrypt e-mail. I think these are two entirely separate subjects and unless the distinction is made and people are made to see it strong encryption will be next to useless.

If I may draw an analogy (albeit flawed ). Using a certificate to sign or encrypt a message is akin to notarizing a document. Using strong encryption is akin to putting snail mail in an envelope before sending. To have to notarize every piece of mail you send, or to be required to go to the post office and show ID in order to send mail would be a gross invasion of privacy and completely unacceptable. Yet this is what is done when using certificates to encrypt e-mail.

Currently this use of certificates is not widespread, but if any lesson is to be learned from the "browser wars" is that if you give it away people will use it regardless of quality. And in America especially, if something requires brains or intelligence to use you know right off that the general public will not accept it. As e-mail becomes more and more the standard it will be easy to whip the populace into a frenzy regarding "privacy" and spam then provide the simple and easy method of using certificates as a standard.

Let's put on the black hat for a moment and create a plan. We want to snooker the public into believing it has security through strong encryption and yet we have the ability to track connections and communications. Further we would like to get a net gain of intel, not just replace the current system with something new.

The primary goals would be
1. Knock out any competing encryption system.
2. Provide a system that is apparently strong but is not.

The best way to defeat number one is to give away number two (pun intended).

The specs for such a system would be:
1. A backdoor or key escrow or other method to easily decrypt the information sent.
2. A means to trace all messages back to the actual originator.
3. A means to know who is the true recipient.
4. User friendly (no-brainer).
5. It must provide benefits above and beyond encryption and digital signatures.
6. Acceptable to the general public.

The simplest method of creating key escrow is to have a single source for issuing keys. If people are unable to create their own keys then there will be no problem with having to break unknown keys. To make this acceptable to the populace there has to be an apparent benefit. If the keys are issued by a "trusted" authority who supposedly takes great pains to verify identity before issuing a key, then the people don't have to think or be bother to look for deceit. The authority will be there to ensure it never happens.

This system also provides traceability of originator and recipient.

To make it user friendly, make it password free, fully integrated into the e-mail client and fully transparent to the user.

Additional benefits could be the noted above "trusted" authority factor as well as whipping up a frenzy about "hackers" reading your mail and doing horrible things, which will be prevented if your just use our encryption. Also "faster" protocols can be invented that whisk certificate encrypted mail through the internet faster and more reliably. Use of certificates can eliminate spam, simply filter out all mail that is not encrypted with one of our certificates, after all, if someone doesn't use our certificate then they must have something to hide.

Making it acceptable would require that it appear to be not controlled by the government and then run a PR campaign selling it. First off have a few large corporations back it, have the certificates issued by an apparently private corporation and finally have athlete and movie star endorsements, i.e. "Got Encryption".

The political deviants who refuse to use this system will be easy to isolate and target.

Henri







From tcmay at got.net  Thu Feb 19 12:31:10 1998
From: tcmay at got.net (Tim May)
Date: Fri, 20 Feb 1998 04:31:10 +0800
Subject: No Real Debate Yet on the War
Message-ID: 




By the way, for those of you not living in the U.S., and who haven't been
here to see the way the debate (or lack of it) has been developing in the
U.S., let me make a few points:

* the preparations for a new war have been going on for several weeks

* Congress has taken no votes one way or the other about this imminent war

* Congress, in fact, is not in session, and has not been called back into
session to debate and discuss and ultimately vote on a Declaration of War
(or what passes for it these days, a "vote of moral support")

* the American public has shown a lukewarm response at best to the plans,
such as they understand them

* speaking of plans, the plans are very vague. The public does not know
what the goals of a war might be, what the endgame options are, how many
Americans are likely to die, what the likely counterpunch will be (hint:
think terrorist attacks), and just how the U.S. plans to fight a war
without clear goals and clear support.

* essentially no one thinks a bombing campaign will either kill Saddam, who
moves around a lot to highly secret locations (including houses of
peasants), or will destroy all of those small cannisters of anthrax and
sarin and the like...when asked, Albright and Cohen are vague and
dissembling.

* meanwhile, scare reports of terrorists in Las Vegas are making the
headlines...a perfect "give us some jimbells to scare the nation" scenario.
(With the usual scary stuff about his "survivalist" books, his membership
in Christian Identity, and his links to Aryan Nation. Throw him jail!)

In short, where is the debate about this upcoming war?

Is Congress now so ineffectual that its main power, the power to declare
war, is no longer "operative"?

Amazing.

--Tim May, posting before his own home gets raided for having supplied PGP
to Christian Identity and Aryan Nation.


Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.








From sunder at brainlink.com  Thu Feb 19 12:34:51 1998
From: sunder at brainlink.com (sunder)
Date: Fri, 20 Feb 1998 04:34:51 +0800
Subject: Is spam really a problem?
In-Reply-To: <199802181733.SAA26244@basement.replay.com>
Message-ID: <34EC9489.F44B070B@brainlink.com>



Tim May wrote:
>
> But *many* things eat up our valuable time. Doesn't mean government action
> is the answer.

Show me one place in the email you replied to where I mention that I would
favor
any sort of governmental action in terms of passing anti-spam laws.  I did
mention
contracts between ISP's and subscribers at one point, but did you see anything
about someone passing laws?
 
> If you use ISDN and pay minute charges to download an article from me, for
> example, and you feel it was a waste of your valuable time, should my
> article be illegal?

If I am forced to pay for something that I don't want to buy, it is a theft
of my money.  If you send me garbage without my asking for it, then you're
wasting my money.  If I subscribe to a mailing list and don't want to see
your messages, it's a different story since I have to take other steps to
not see what you post.  In other words, in one case you are targetting me
with spam, in the other, I want to receive cypherpunks minus one user, but
that user isn't directly targetting me.
 
> If someone sees your name somewhere and does the same thing (sends you a
> letter), should this be illegal?

Ditto as the response above.  I will accept any non commercial, non moral
pushing message.  i.e. there are those who like my home page and email me
to tell me so.  There are those who hate it and tell me so.  There are
those who ask for help, or offer help.  No problemo there.

But there are those who see the upside down pentagram and send me email
stating I'm in the wrong religion.  Thems I consider spam because they
try to pursuade me to their belief system.
 
> (I threw this last point in because some have argued that there is an
> implicit agreement that mail on a mail exploder will not be objected to, as
> it fits the charter, blah blah. So I removed this implicitness by speaking
> of someone who writes a letter.)

Makes no difference what you throw in.  A mail exploder that auto subscribes
everyone on the planet without their consent IS a source of spam.  A mail
exploder that sends email to those who wish to receive it is not because there
was consent.
 
> If _content_ is not a criterion for spam, as Costner and others have noted,
> then "wasting Ray's time" is even less of a criterion for what spam is.

Spam is unsolicited broadcasts.   Pure and simple.  If you spam me with
a scheme to make you money, it's spam.  If you spam me with "Jesus loves you"
it's a spam.  If you spam me with chain letters promising whatever or warning
of great virus plages, it's still spam.  Content is a valid criterion for spam
and so is consent. It's the unwanted content of these messages that makes
them unwanted.  If they were useful to the recipient, they wouldn't be unwanted
hence would not be spam.

Problem is every dickhead who buys into the "Make Money Fast on the Net
By Spamming" theory has dollar signs in his eyes and thinks his message
is the most valuable, most useful, most cuddly lovely bit of info on the
planet and that he's doing everyone a service by shoving it down their 
unwiling throats.
 
> Look, there's just not going to be a simple government answer to "unwanted
> communications" that doesn't do serious damage to our liberties.

I posted a very nice technological way to deter spam, and you go and read
governmental interfearence in it.  READ the message you reply to before you
respond to it.
 
> Technological/economic approaches are the only way to go.

No shit.  And that's what I posted earlier.

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From declan at well.com  Thu Feb 19 12:46:09 1998
From: declan at well.com (Declan McCullagh)
Date: Fri, 20 Feb 1998 04:46:09 +0800
Subject: Congress getting involved in crypto this year
Message-ID: 



I'm in the CFP computer room listening to CDT's Alan Davidson finish his
comments on a panel discussion about crypto: "Congress is getting involved
in the crypto debate. Bad things may happen, good things may happen. It
depends on all of you."

Anyone want to bet on the possibility of Congress doing a "good thing" on
crypto? Remember, there's no bill being considered in either house of the
Congress that does *not* have domestic controls on encryption: the
crypto-in-a-crime penalties.

Now Jason Mahler, from the Office of Congresswoman Zoe Lofgren (D-Calif),
is speaking. He stressed that the House Commerce committee "resoundingly"
voted down the FBI's bill last September -- but neglected to say that the
panel approved included a *doubling* of crypto-in-a-crime penalties. He
says Lofgren's plans are to push crypto legislation this year: "Hopefully
if we get it [passed] in the House in the spring we'll move to the
Senate." What about a presidential veto? "We're going to put pressure on
the administration."

Now Mahler is talking about how much support the SAFE bill has in the
House (yes, the version of SAFE with crypto-in-a-crime penalties) and how
it's a good thing. True, a majority of members of the House were at one
point cosponsors. But this is a misguided way to look at the situation.
Some of these "cosponsors" and "crypto supporters" voted for the FBI's
bill. Others, like the late Sonny Bono, ended up speaking out against it. 
Lobbyists are about to find out that the support for crypto freedom in the
Congress is wide but very, very shallow. 

-Declan






From tcmay at got.net  Thu Feb 19 12:47:37 1998
From: tcmay at got.net (Tim May)
Date: Fri, 20 Feb 1998 04:47:37 +0800
Subject: Is spam really a problem?
In-Reply-To: <199802181733.SAA26244@basement.replay.com>
Message-ID: 




Ray has widened his definition of "spam" even more.

At 12:22 PM -0800 2/19/98, sunder wrote:
>Tim May wrote:
>>
>> But *many* things eat up our valuable time. Doesn't mean government action
>> is the answer.
>
>Show me one place in the email you replied to where I mention that I would
>favor
>any sort of governmental action in terms of passing anti-spam laws.  I did
>mention
>contracts between ISP's and subscribers at one point, but did you see anything
>about someone passing laws?

You've mentioned that spam is theft. If the courts agree with you on your
definition of what spam is, then pretty clearly the legal system gets
invoked. (But to forestall any confusions in the courts, the anti-spam
sentiment being discussed by Ray and many others is likely to lead to
specific legislation. Sadly.)


>> If you use ISDN and pay minute charges to download an article from me, for
>> example, and you feel it was a waste of your valuable time, should my
>> article be illegal?
>
>If I am forced to pay for something that I don't want to buy, it is a theft
>of my money.  If you send me garbage without my asking for it, then you're

"Theft." Call the cops.

>But there are those who see the upside down pentagram and send me email
>stating I'm in the wrong religion.  Thems I consider spam because they
>try to pursuade me to their belief system.

So, your definition of spam has now been expanded to include someone who
sends _you_ (you, not thousands, not tens of thousands) a message you don't
care for.

Well, not much more I can say here.

--Tim May


Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.








From anon at anon.efga.org  Thu Feb 19 13:01:36 1998
From: anon at anon.efga.org (Anonymous)
Date: Fri, 20 Feb 1998 05:01:36 +0800
Subject: No Subject
Message-ID: <241e4ef7f128aa790d464cb6e45d4dd2@anon.efga.org>



Lately, anonymous messages sent to the list
with Replay's Web-based remailer have not
been getting through - anyone know if one or
more of these remailers (efga, replay, ml, 
obscura, cypherpunks.ca) are down?

In case my last message doesn't get through,
I'm looking for info on how one can create and
use a persistent Nym. I looked and can't find
info on how to do this anywhere (besides the
creation of a "free" email account somewhere).
Can any cypherpunks help?

Thank you.



From declan at well.com  Thu Feb 19 13:08:03 1998
From: declan at well.com (Declan McCullagh)
Date: Fri, 20 Feb 1998 05:08:03 +0800
Subject: SF Chronicle on Sen. Dianne Feinstein: "Feinstein Offline"
Message-ID: 





---------- Forwarded message ----------
Date: Thu, 19 Feb 1998 12:52:39 -0800 (PST)
From: Declan McCullagh 
To: politech at vorlon.mit.edu
Subject: SF Chronicle on Sen. Dianne Feinstein: "Feinstein Offline"


****

Feinstein Offline
Her law-and-order stance irks tech industry 
Jon Swartz, Chronicle Staff Writer
Thursday,�February 19, 1998 

URL:

http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/1998/02/19/BU48718.DTL

Despite Silicon Valley's growing economic and political clout, a chorus
of high-tech executives have complained that U.S. Senator Dianne
Feinstein is unresponsive and, at times, hostile to their interests --
especially when it comes to the Internet. 

``She is in the forefront of senators voting against the Internet,''
said Jerry Berman, executive director of the liberal Center for
Democracy and Technology in Washington, D.C. ``On a scale of 1 to 10, in
terms of being on the side of Internet freedom, she gets a 1.'' 

Feinstein voted in favor of bills banning the distribution of
bomb-making instructions, pornography and personal information over the
Internet. She wants to impose fines and jail terms for people who gamble
online. She supports strict export controls on encrypted software. And
she has joined the move to ban laptop computers on the Senate floor. 

``Isn't it ironic that the senator from California and the former mayor
of San Francisco appears to be running against the Internet?'' said
Stanton McCandlish, program director at The Electronic Frontier
Foundation, a civil libertarian organization in San Francisco. 

David Sobel, legal counsel at the nonpartisan Electronic Privacy
Information Center in Washington, D.C., said Feinstein is ``perceived to
be less supportive of the Internet and the computer industry than one
would expect.'' 

Feinstein -- a rumored vice presidential candidate in 2000 -- dismisses
the criticism as ``nonsense'' and says her record is ``replete'' with
technology-friendly legisla tion in securities litigation reform, R&D
tax credits and education. 

In September 1996, Feinstein was one of the few Democrats to override
President Clinton's veto of the securities-litigation reform legislation
that the high-tech industry desperately wanted. She also pushed hard for
the permanent extension of R&D tax credits in both the Taxpayer Relief
Act of 1997 and the 1996 Small Business Job Protection Act. Both bills
were passed into law. 

But Feinstein's strong law enforcement stance works ``to the detriment''
of the Internet, Sobel said. ``She accepts, without question, law
enforcement's claims about the dangers of the Internet.'' 

In Feinstein's view, ``This whole cyberspace is moving so fast that one
has to be sure that kids are protected,'' she said. ``I'm concerned when
kids blow themselves up by building bombs (they learned to make) over
the Internet, when Social Security card numbers are made available
online and when pedophiles punch up children's names. There is a
philosophy that anything goes. 

``I recognize the primacy of the First Amendment,'' she added. ``But
privacy goes two ways. I think prudent laws to protect children may well
be necessary. There should be a balance.'' 

Feinstein's most controversial stand is on encryption, the technology
that allows digital information to be scrambled and sent securely over
the Internet. Strong encryption is used within the United States to
protect the transmission of credit-card numbers, trade secrets and other
confidential information. 

But national security laws stretching back to the Cold War prohibit the
export of software with strong encryption. Law enforcement officials
want to be able to crack the code in case it's used by terrorists, drug
traffickers, economic saboteurs or others plotting against the United
States. 

High-tech companies say they want to be able to export software with
strong encryption because they're losing billions of dollars in
potential sales to foreign competitors who aren't subject to the same
restrictions. 

A bill called the Security and Freedom Through Encryption (SAFE) Act,
co-sponsored by Representative Anna Eshoo, D-Atherton, would relax
export controls. 

But a rival bill co-written by Senators John McCain, R-Ariz., and Bob
Kerry, D- Neb., titled the Secure Public Network Act would go the other
way and impose controls on use of encrypted software domestically. 

Feinstein favors the latter bill but doesn't think it goes far enough.
She thinks anyone who uses encrypted software should make a key to
unlock their code available to law enforcement authorities. 

During a Senate Judiciary Committee hearing on encrypted software last
fall, Feinstein said that nothing short of mandatory domestic control of
encrypted software would be acceptable. She added that no high-tech CEO
had contacted her about the issue. 

Feinstein's comments caused a furor. A January 15 letter from 26
high-tech executives sent exclusively to Feinstein stated: 

``We were disappointed by your comments. . .implying that California
companies are ambivalent regarding your position on encryption policy. 

``California companies and industries nationwide are united in
opposition to domestic and export controls,'' the letter stated. It
closed with the names of chief executives from Netscape Communications,
America Online, Pacific Bell, 3Com, Sun Microsystems, Autodesk, Adobe
Systems, RSA Data Security and others. 

``I was nothing short of shocked,'' said RSA Data Security CEO Jim
Bidzos. ``For someone to take such an extreme position on such an
important issue without touching base with her constituency is
unbelievable.'' 

Explaining her position in an interview, Feinstein said, ``When a
particular situation involves public safety, there should be some means
for recovery of encrypted information by law enforcement that falls
within the strict confines of due process of law. 

``If industry can come up with a way to provide the same law enforcement
access without a mandatory key-recovery system, I would support it,''
she said. 

[...]







From tcmay at got.net  Thu Feb 19 13:15:56 1998
From: tcmay at got.net (Tim May)
Date: Fri, 20 Feb 1998 05:15:56 +0800
Subject: What are the "Soft Targets"?
Message-ID: 




Someone asked me what I meant by "soft targets," and what specifically some
of them are.

I won't provide a list here, lest I be tarred by the same "guilt by
association" brush the Las Vegans are facing in the media. ("The Army found
a map of the New York City subway system." Thoughtcrime.)

A "soft target" is a target of opportunity that is both:

-- almost impossible to defend

and

-- valuable for publicity purposes if attacked

Traditionally, examples have been public squares, train stations, hotel ,
etc.  When U.S.-sponsored terrorists blew up the Balogna, Italy train
station, they knew this would generate massive fear and backlashes against
the Left (whom the U.S. supported terrorists were pretending to
represent...cf. the info on Lucio Gelli, the strategy of tension, the P2
Lodge, Stefano Delle Chiaie, etc.). And when the Jewish terrorists in
Palestine wanted to make a point, they bombed the King David Hotel.

In the U.S., soft targets abound. These would typically be crowded,
downtown areas any of the 30 or 50 largest cities, but also various tourist
attractions and government facilities (though government facilities tend to
be "harder" targets, and so less likely).

With aerosol weapons, subways and indoor locations are more likely to be
targets.

Use your own judgment, but I choose to avoid any of the various soft
targets near me.

-Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.








From declan at well.com  Thu Feb 19 13:16:38 1998
From: declan at well.com (Declan McCullagh)
Date: Fri, 20 Feb 1998 05:16:38 +0800
Subject: TechNet on Feinstein, SF Chron article, and encryption
Message-ID: 





---------- Forwarded message ----------
Date: Thu, 19 Feb 1998 12:58:17 -0800 (PST)
From: Declan McCullagh 
To: politech at vorlon.mit.edu
Subject: TechNet on Feinstein, SF Chron article, and encryption

This in response to these comments in the SF Chron article, sent in a
sep. message:

>Wade Randlett, a Democratic Leadership Council activist who advises
>TechNet, said Feinstein's ``detractors are narrow- minded and hung up on
>her stance on encryption. If you look at any broad sweep, she is as big a
>champion for Silicon Valley as anyone in the U.S. Senate.''

-Declan

---------- Forwarded message ----------
Date: Thu, 19 Feb 1998 12:43:14 -0800
From: "Garrett, Sean" 
To: "'declan at well.com'" 
Subject: Feinstein & Internet Policy

Declan:

Below is the awaited article about Senator Feinstein and Internet
policy.

I also want to make sure that TechNet's position on the encryption
debate is clear.  While encryption regulations are not the only major
issue facing the industry, we recognize that they are extremely
important to many (including most of TechNet's members). 

While TechNet as an organization is not playing a role in the debate, we
believe the dialogue that we facilitate between tech CEOs and public
officials will help further all of our collective goals-including the
industry's domestic and export crypto goals.

Regarding Senator Feinstein, we hope that future meetings between her
and the industry are productive on encryption and other important
issues.

We do wholeheartedly appreciate the Senator's leadership with education
and securities litigation reform-TechNet's two policy goals.

Best,
Sean Garrett
Alexander Communications (representing the Technology Network)
Sgarrett at alexandercom.com










From sunder at brainlink.com  Thu Feb 19 13:30:22 1998
From: sunder at brainlink.com (sunder)
Date: Fri, 20 Feb 1998 05:30:22 +0800
Subject: Is spam really a problem?
In-Reply-To: <199802181733.SAA26244@basement.replay.com>
Message-ID: <34ECA0D8.32CBABB5@brainlink.com>



Tim May wrote:
 
> Ray has widened his definition of "spam" even more.

No, my definition is the same as it always was.  Maybe you didn't realize
how wide it was.
 
> You've mentioned that spam is theft. If the courts agree with you on your
> definition of what spam is, then pretty clearly the legal system gets
> invoked. (But to forestall any confusions in the courts, the anti-spam
> sentiment being discussed by Ray and many others is likely to lead to
> specific legislation. Sadly.)

It is my definition, if others agree, that's their business.  I'm not asking
the courts to do shit about it however.
 
> "Theft." Call the cops.

It is theft, and I do call the cops, or rather in this case the ISP's involved.
The problem is they can't do much as the messages are sent from throw away
accounts.

> So, your definition of spam has now been expanded to include someone who
> sends _you_ (you, not thousands, not tens of thousands) a message you don't
> care for.

Show me your spam filters.  Do you not have at least one individual's name
in that list whose messages you route to a folder of trash or delete outright?
I seem to recall that was the case quite a while back with a certain "Doctor".

Indeed, even you make decisions about what is or isn't spam based on WHO sends
it.  In this case, you, not thousands, not tens o thousands of others is making
a decision on what is or isn't spam because you don't care for it.

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From tcmay at got.net  Thu Feb 19 13:43:33 1998
From: tcmay at got.net (Tim May)
Date: Fri, 20 Feb 1998 05:43:33 +0800
Subject: SF Chronicle on Sen. Dianne Feinstein: "Feinstein Offline"
In-Reply-To: 
Message-ID: 



At 12:53 PM -0800 2/19/98, Declan McCullagh wrote:

>Feinstein Offline
>Her law-and-order stance irks tech industry
>Jon Swartz, Chronicle Staff Writer
>Thursday,�February 19, 1998

Or the version her innermost self expressed:

> In Feinstein's view, ``This whole information thing is moving so
> fast that one has to be sure that kids are protected,'' she said.
> ``I'm concerned when kids blow themselves up by building bombs (they
> learned to make) by reading things in the encyclopedia. There is a
> philosophy that anything goes. This is why I support the repeal of
> the First Amendment and prison terms for thought criminals."

She's a buffoon who is probably the first one who'll be sent to the wall if
there's ever a Second American Revolution.

As for her concern about Social Security numbers being posted online, did
it ever occur to her and her ilk that perhaps the problem is the widespread
use of SS numbers by increasing numbers of government agencies, by
requirements that banks use them, by requirements that motor vehicle
departments use them, and so on?

"Duh."

The solution is not a new set of laws to felonize information like this,
but the elimination of the SS number as a universal identifier. Far too
late for that, of course, but Fineswine's laws won't help anybody. In fact,
law enforcement will continue its abuse of SS numbers, its role in
falsifying records and official documents, and so on.

Let's try to be sure DiFi is in D.C. when Abu Nidal makes his move.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.








From Roger.Jones at IBPINC.com  Thu Feb 19 14:07:57 1998
From: Roger.Jones at IBPINC.com (Roger J. Jones)
Date: Fri, 20 Feb 1998 06:07:57 +0800
Subject: Mainframe solutions
Message-ID: <09B2B857068ED11182284000000018980C5C@IBPNT000>

Having looked at this path I suggest that the article is misleading. No
one moves SAP to a mainframe. What you do is move the DBMS from Oracle
under UNIX (the normal implementation for 1000 concurrent users or less)
to Oracle or more likely DB2 on the mainframe.

Also curious about how mainframe security is 2 years ahead of Unix
and/or NT. There is almost no security on a mainframe unless you add a
package such as ACF2 or TopSecret. Neither are easy to administer, easy
to audit, nor do either have anything to do with application security.
They monitor use of files, terminals and the like. As far as I know,
there is no package that can intercept the PSW being returned after a
system call in the System (vice User) state. (Being in system state on a
mainframe is like being root in UNIX) I assure you that in the millions
of lines of code, much over 25 years old, in the typical mainframe
operating system you don't have to wait long for the "right word"



-------------- next part --------------
A non-text attachment was scrubbed...
Name: bin00000.bin
Type: application/octet-stream
Size: 737 bytes
Desc: "Roger John Jones (E-mail).vcf"
URL: 

From nobody at REPLAY.COM  Thu Feb 19 14:20:43 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Fri, 20 Feb 1998 06:20:43 +0800
Subject: Anthrax--The Horsemen are Riding
Message-ID: <199802192135.WAA17978@basement.replay.com>



Yet another wrong call by Tim "Chicken Little" May:

>CNN is reporting a news flash, with few details, about two men being
>arrested in Las Vegas for making or possessing or planning to make
>anthrax. Details should be emerging, but I have a hunch it's a witch
>hunt, an invocation of the Four Horsement, to drum up support for
>Clinton's Dirty Little War.

Nonsense.  This has nothing to do with Saddam.  These men are from the
Aryan Nation, a militia group (and one which Tim secretly supports, being
a strong believer in Aryan superiority).  No wonder he is upset, when
his favorite racists are shown to be just another bunch of terrorists,
willing to kill innocents to promote their hate-filled cause.

>"Find us some jimbells we can show to the American public as proof that
>an undeclared, unsupported war with Iraq is justified."

How incoherent can you get?  How on earth can terrorism by the militias
be related to the war in Iraq?  Jeez, what an idiot.

>Wanna bet they also bring crypto in this media circus?

This would be funny if it weren't so sad.  And you guys really _respect_
someone who would write this nonsense?

It's a sad story when the one who is supposed to be the brains of the
group is this stupid.






From paladin at lvcablemodem.com  Thu Feb 19 14:21:30 1998
From: paladin at lvcablemodem.com (Eric J. Tune)
Date: Fri, 20 Feb 1998 06:21:30 +0800
Subject: PLO censoring pro-Iraqi sentiments
Message-ID: <3.0.5.32.19980219140712.007bda40@pop3.lvcablemodem.com>



>X-Sender: tcmay at mail.got.net
>Date: Thu, 19 Feb 1998 12:03:26 -0800
>To: Eric Cordian , cypherpunks at cyberpass.net
>From: Tim May 
>Subject: Re: PLO censoring pro-Iraqi sentiments
>Sender: owner-cypherpunks at cyberpass.net
>Reply-To: Tim May 
>X-Loop: cypherpunks at cyberpass.net
>
[SHIT REMOVED]

>This is why I cheered to see the U.S. gets its tail kicked in Somalia and
>have to retreat in disgrace. Alas, the U.S. planners just looked for
>another war, one we could "win," and they found a bombed out Bosnia to be
>the perfect place to "restore our dignity."
>
>Amerika the Fascist.
>
>--Tim May
>
>

You know Tim, I respect most of what you write, and I respect you in that
you have your own free will and opinions and the right to express them, but
what you have forgotten in your anarchistic ravings is that PEOPLE DIED IN
SOMALIA, including a personal friend of mine.  They were all somebody's
son, brother, and friend.  These soldiers went where they were ordered to
go, as befits a soldier, and tried to do the job they were given and
accomplish the mission, and for that EVERY ONE OF THEM DESERVES   Y O U R
RESPECT.  I am quite sure the vast majority of them thought it was patently
stupid to go to Somalia in the first place, but a soldier follows orders,
legal ones, and tries to get the job done regardless of personal feelings.

The next time you "cheer to see the U.S. gets its tail kicked", why don't
you think about the American troops who lost their lives or were maimed, or
who were doing something they may have been personally and morally against,
but they chose to be professional soldiers, and instead of displaying
cowardice, they tried to do what was asked of them.  Think of the innocent
civilians who inevitably die in the conflicts started by the megalomaniacs
like Saddam Hussein.  If you want to blame someone, and you bellow
endlessly in every letter you write about blaming someone, why don't you
blame the politicians who start the wars, who run the countries and step
all over their own people, instead of the people who are made to do the
dirty work?

Your "cheering" was a blatant slap in the face to anyone who has ever
served in uniform, and my only hope is that you will think about who should
really deserve your ire next time before you so recklessly blurt it out.

A lot of people like what you have to say most of the time, including me,
but with the right to our freedom of speech comes a responsibility to speak
wisely, which is something we could all strive to be better at, don't you
think?

Eric Tune







From ravage at ssz.com  Thu Feb 19 15:13:14 1998
From: ravage at ssz.com (Jim Choate)
Date: Fri, 20 Feb 1998 07:13:14 +0800
Subject: Anthrax--The Horsemen are Riding (fwd)
Message-ID: <199802192318.RAA19801@einstein.ssz.com>



Forwarded message:

> From: Ernest Hua 
> Subject: RE: Anthrax--The Horsemen are Riding
> Date: Thu, 19 Feb 1998 14:51:32 -0800

> The real issue is why NOW?  It's just a bit coincidental, don't you
> think, that someone so blatantly advertises his intimate relationships
> with biological weapons for years is just now suddenly being arrested?
> In politics, timing is everything.
> 
> I am not the least bit sorry for this guy if he really possessed
> anything, but I'm just a bit skeptical that this is just another routine
> domestic terrorism arrest.

There is one other potential reason why 'now'. The guy doing the deed
figured it was a prime time to strike.


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From Hua at teralogic-inc.com  Thu Feb 19 15:13:42 1998
From: Hua at teralogic-inc.com (Ernest Hua)
Date: Fri, 20 Feb 1998 07:13:42 +0800
Subject: Anthrax--The Horsemen are Riding
Message-ID: <413AC08141DBD011A58000A0C924A6D50D7DA2@MVS2>



Relax ... Tim is not condoning this guy's behavior.

The real issue is why NOW?  It's just a bit coincidental, don't you
think, that someone so blatantly advertises his intimate relationships
with biological weapons for years is just now suddenly being arrested?
In politics, timing is everything.

I am not the least bit sorry for this guy if he really possessed
anything, but I'm just a bit skeptical that this is just another routine
domestic terrorism arrest.

Ern

	-----Original Message-----
	From:	Anonymous [SMTP:nobody at REPLAY.COM]
	Sent:	Thursday, February 19, 1998 1:35 PM
	To:	cypherpunks at cyberpass.net
	Subject:	Re: Anthrax--The Horsemen are Riding


	Yet another wrong call by Tim "Chicken Little" May:

	>CNN is reporting a news flash, with few details, about two men
being
	>arrested in Las Vegas for making or possessing or planning to
make
	>anthrax. Details should be emerging, but I have a hunch it's a
witch
	>hunt, an invocation of the Four Horsement, to drum up support
for
	>Clinton's Dirty Little War.

	Nonsense.  This has nothing to do with Saddam.  These men are
from the
	Aryan Nation, a militia group (and one which Tim secretly
supports, being
	a strong believer in Aryan superiority).  No wonder he is upset,
when
	his favorite racists are shown to be just another bunch of
terrorists,
	willing to kill innocents to promote their hate-filled cause.

	>"Find us some jimbells we can show to the American public as
proof that
	>an undeclared, unsupported war with Iraq is justified."

	How incoherent can you get?  How on earth can terrorism by the
militias
	be related to the war in Iraq?  Jeez, what an idiot.

	>Wanna bet they also bring crypto in this media circus?

	This would be funny if it weren't so sad.  And you guys really
_respect_
	someone who would write this nonsense?

	It's a sad story when the one who is supposed to be the brains
of the
	group is this stupid.






From emc at wire.insync.net  Thu Feb 19 15:29:20 1998
From: emc at wire.insync.net (Eric Cordian)
Date: Fri, 20 Feb 1998 07:29:20 +0800
Subject: Anthrax--The Horsemen are Riding
In-Reply-To: <199802192135.WAA17978@basement.replay.com>
Message-ID: <199802192320.RAA00953@wire.insync.net>



A Very Gullible Government Tool Writes:

> Yet another wrong call by Tim "Chicken Little" May:

> Nonsense.  This has nothing to do with Saddam.  These men are from the
> Aryan Nation, a militia group (and one which Tim secretly supports, being
> a strong believer in Aryan superiority).  No wonder he is upset, when
> his favorite racists are shown to be just another bunch of terrorists,
> willing to kill innocents to promote their hate-filled cause.

This has everything to do with Sadaam.  These individuals came to the
attention of the government a long time ago, have been under surveilance,
and their carefully timed arrest today, at the precise moment needed to
give the Sheeple an overdose of Biological Warfare sound bytes, is hardly
coincidental.

This is Bell Revisited, with the usual trotting out of someones personal
property accompanied by government editorializing.  "He had a map of New
York City!"  "You don't need nitric acid to kill aphids!" 

Oh right.  Big Woo.

Now all we need is some more propaganda on Russia's plans to sell Sadaam
that big vat, which "could be used" to produce biological weapons. 

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"







From Hua at teralogic-inc.com  Thu Feb 19 15:42:15 1998
From: Hua at teralogic-inc.com (Ernest Hua)
Date: Fri, 20 Feb 1998 07:42:15 +0800
Subject: Anthrax--The Horsemen are Riding (fwd)
Message-ID: <413AC08141DBD011A58000A0C924A6D50D7DA3@MVS2>



If the guy was after visibility, yes, then I would agree with you (re:
"prime time").

Of course, it could also just be monumental stupidity on his timing (to
confirm the FBI's "dumb criminal" model).

Ern

	-----Original Message-----
	From:	Jim Choate [SMTP:ravage at ssz.com]
	Sent:	Thursday, February 19, 1998 3:18 PM
	To:	cypherpunks at ssz.com
	Subject:	RE: Anthrax--The Horsemen are Riding (fwd)


	Forwarded message:

	> From: Ernest Hua 
	> Subject: RE: Anthrax--The Horsemen are Riding
	> Date: Thu, 19 Feb 1998 14:51:32 -0800

	> The real issue is why NOW?  It's just a bit coincidental,
don't you
	> think, that someone so blatantly advertises his intimate
relationships
	> with biological weapons for years is just now suddenly being
arrested?
	> In politics, timing is everything.
	> 
	> I am not the least bit sorry for this guy if he really
possessed
	> anything, but I'm just a bit skeptical that this is just
another routine
	> domestic terrorism arrest.

	There is one other potential reason why 'now'. The guy doing the
deed
	figured it was a prime time to strike.



____________________________________________________________________
	   |
|
	   |            When a man assumes a public trust, he should
|
	   |            consider himself public property.
|
	   |
|
	   |                                      Thomas Jefferson
|
	   |
|
	   |
| 
	   |            _____                             The Armadillo
Group   |
	   |         ,::////;::-.                           Austin, Tx.
USA     |
	   |        /:'///// ``::>/|/
http://www.ssz.com/   |
	   |      .',  ||||    `/( e\
|
	   |  -====~~mm-'`-```-mm --'-                         Jim
Choate       |
	   |
ravage at ssz.com     |
	   |
512-451-7087      |

|____________________________________________________________________|






From ravage at ssz.com  Thu Feb 19 15:45:30 1998
From: ravage at ssz.com (Jim Choate)
Date: Fri, 20 Feb 1998 07:45:30 +0800
Subject: Anthrax--The Horsemen are Riding (fwd)
Message-ID: <199802192351.RAA20061@einstein.ssz.com>



Forwarded message:

> From: Ernest Hua 
> Subject: RE: Anthrax--The Horsemen are Riding (fwd)
> Date: Thu, 19 Feb 1998 15:26:38 -0800

> If the guy was after visibility, yes, then I would agree with you (re:
> "prime time").
> 
> Of course, it could also just be monumental stupidity on his timing (to
> confirm the FBI's "dumb criminal" model).

The point I was thinking of was that such a timing would be when the country
as a whole was distracted with over-seas events. Since they were Aryan
Nation related, as I understand it, the goal was probably to further their
white supremacy agenda. An attack on some 'hood would cause a civil uproar
between blacks and whites that could have a impact of some importance. The
result of that could be quite pervasive.


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From emc at wire.insync.net  Thu Feb 19 15:46:18 1998
From: emc at wire.insync.net (Eric Cordian)
Date: Fri, 20 Feb 1998 07:46:18 +0800
Subject: PLO censoring pro-Iraqi sentiments
In-Reply-To: <3.0.5.32.19980219140712.007bda40@pop3.lvcablemodem.com>
Message-ID: <199802192336.RAA00978@wire.insync.net>



Eric Tune writes:

> You know Tim, I respect most of what you write, and I respect you in
> that you have your own free will and opinions and the right to express
> them, but what you have forgotten in your anarchistic ravings is that
> PEOPLE DIED IN SOMALIA, including a personal friend of mine.  They were
> all somebody's son, brother, and friend. 

So were the 100,000 Iraqi military killed by Bush, and the 1,000,000
Iraqis of all ages killed by US sanctions.  So were the civilians
bulldozed into mass graves in Panama, so the country would look neat and
tidy for the arrival of the ReportWhores.

What the world needs now is not another mass killing of Iraqis by the
United States government.  What the world really needs now is a fifty
dollar weapon that sinks aircraft carriers.

> These soldiers went where they were ordered to go, as befits a soldier,
> and tried to do the job they were given and accomplish the mission, and
> for that EVERY ONE OF THEM DESERVES Y O U R RESPECT.  I am quite sure
> the vast majority of them thought it was patently stupid to go to
> Somalia in the first place, but a soldier follows orders, legal ones,
> and tries to get the job done regardless of personal feelings.

Most of them would probably follow "legal orders" to fire upon American
civilians too.  

> The next time you "cheer to see the U.S. gets its tail kicked", why
> don't you think about the American troops who lost their lives or were
> maimed, or who were doing something they may have been personally and
> morally against, but they chose to be professional soldiers, and instead
> of displaying cowardice, they tried to do what was asked of them. 

The universe does not view the lives of Americans as more valuable than
the lives of people murdered by Americans. 

> Think of the innocent civilians who inevitably die in the conflicts
> started by the megalomaniacs like Saddam Hussein.

You mean all those melted child car seats and scorched teddy bears on
George Bush's "Highway of Death" leading out of Kuwait? 

Unfortunately, for all the braying Americans do about freedom, Americans
can never be truly happy unless someone is telling them what to do, or
they are telling someone else what to do, or they are bombing someone for
not doing what they have told them to do. 

The only thing Americans understand is dead Americans.  The only thing. 

I've always believed that communications functions most effectively when
people are talked to in a language that they understand. 

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"






From whgiii at invweb.net  Thu Feb 19 16:09:41 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Fri, 20 Feb 1998 08:09:41 +0800
Subject: SF Chronicle on Sen. Dianne Feinstein: "Feinstein Offline"
In-Reply-To: 
Message-ID: <199802200032.TAA28422@users.invweb.net>



-----BEGIN PGP SIGNED MESSAGE-----

In , on 02/19/98 
   at 01:36 PM, Tim May  said:


>At 12:53 PM -0800 2/19/98, Declan McCullagh wrote:

>>Feinstein Offline
>>Her law-and-order stance irks tech industry
>>Jon Swartz, Chronicle Staff Writer
>>Thursday, February 19, 1998

>Or the version her innermost self expressed:

>> In Feinstein's view, ``This whole information thing is moving so
>> fast that one has to be sure that kids are protected,'' she said.
>> ``I'm concerned when kids blow themselves up by building bombs (they
>> learned to make) by reading things in the encyclopedia. There is a
>> philosophy that anything goes. This is why I support the repeal of
>> the First Amendment and prison terms for thought criminals."

>She's a buffoon who is probably the first one who'll be sent to the wall
>if there's ever a Second American Revolution.

Third. We had a Second American Revolution and we lost.

>As for her concern about Social Security numbers being posted online, did
>it ever occur to her and her ilk that perhaps the problem is the
>widespread use of SS numbers by increasing numbers of government
>agencies, by requirements that banks use them, by requirements that motor
>vehicle departments use them, and so on?

>"Duh."

>The solution is not a new set of laws to felonize information like this,
>but the elimination of the SS number as a universal identifier. Far too
>late for that, of course, but Fineswine's laws won't help anybody. In
>fact, law enforcement will continue its abuse of SS numbers, its role in
>falsifying records and official documents, and so on.

Well this goes back to the "privacy rights" debate that has been going off
and on the list for quite awhlie now. The key to the whole thing is not
more bad laws and government regulation but removing the power of the
State to collect the information in the first place. (If we didn't have
the corrupt and bankrupt SS program then we wouldn't have to worry about
how SS #'s were used would we?)

>Let's try to be sure DiFi is in D.C. when Abu Nidal makes his move.

I figure the best time for a strike is during a Presidential Inagural
Address or a State of the Union when all the players are in DC in one
convenient location.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: "Luke!  I'm your father!"  Bill Gates, 1980

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNOy5/49Co1n+aLhhAQGZKgQAqO2SySNPUNbBc+PUmDTGljm9u7v1dIgk
rlNn7A6+Sr6Gz9C+5LmtsS8Fg1d9U70kKLsgiMvFY1wE6XLgRFEkrg6Z/OEaOaer
dfdPGgLP2YGylE0nNFPaWOTIQ/gZzf+RhRBfRG/7DLQNLwrDLfirMgf5wNhwEAMI
6w49b/CoOA8=
=z4Od
-----END PGP SIGNATURE-----






From bkarger at yahoo.com  Thu Feb 19 16:21:49 1998
From: bkarger at yahoo.com (Björn Karger)
Date: Fri, 20 Feb 1998 08:21:49 +0800
Subject: Anthrax
Message-ID: <19980220000436.13373.rocketmail@send1d.yahoomail.com>



Is it just coincidence that this scenario (crazy
Amerikans brewing biowarfare in their homes) was 
just discussed on Cypherpunks just days before the
attack?




_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com






From tcmay at got.net  Thu Feb 19 16:44:41 1998
From: tcmay at got.net (Tim May)
Date: Fri, 20 Feb 1998 08:44:41 +0800
Subject: SF Chronicle on Sen. Dianne Feinstein: "Feinstein Offline"
In-Reply-To: 
Message-ID: 



At 2:55 PM -0800 2/19/98, William H. Geiger III wrote:

>>She's a buffoon who is probably the first one who'll be sent to the wall
>>if there's ever a Second American Revolution.
>
>Third. We had a Second American Revolution and we lost.

You're quite right...I stand corrected.

Though in some sense it was a "secessionist movement," which is subtly
different from a revolution. As with Quebec, whose secession the USG
opposes. As with Kurdistan, whose secession the USG sometimes supports and
sometimes doesn't, depending on geopolitical calculations and on the party
in power. As with the Basque region, whose secession the USG emphatically
does not support, to the point of sending intelligence experts to Spain to
help crush the secessionists. As with the outlying regions of the former
Soviet Union, which the USG attempted to destabilize by dropping agents in,
assassinating politicians, etc.

--Tim May


Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.








From tcmay at got.net  Thu Feb 19 17:06:12 1998
From: tcmay at got.net (Tim May)
Date: Fri, 20 Feb 1998 09:06:12 +0800
Subject: Vile Vial Files
Message-ID: 




One of the interesting items revealed today was that an FBI file was opened
on the Ohio man when he ordered the bubonic plague culture a few years ago.
The Maryland company forwarded his name to the Feds, apparently as part of
a regular arrangement to do so.

The Feds did an investigation, found he had used his company's name
"fraudulently" (whatever that might be), and used this to convict him on
fraud charges. (Not on the bubonic plague charges, though, as that wasn't a
crime. At least not then.)

This is part of a larger surveillance state situation, with buyers of all
sorts of chemicals reported to the Feds. With buyers of grow lamps
reported. (And supposedly the electric utility companies are reporting
unusual power usages in the middle of the night to Feds.)

While there may be various good reasons not to have botulism or bubonic
plague cultures sold to ordinary folks, this whole situation raises serious
issues. And the initiation of FBI investigations of purchasers of many
kinds of chemicals raises issues.

(One can asssume that with more and more such things being added to the
"watch lists" each year, that there will be less acceptance of cash, or
anonymous digital cash, for such purchases.)

ObMinorNote: I recently tried to buy a bag of ammonium nitrate for my
yard...the local yard store says it hasn't been available to ordinary
customers since OKC. I had to settle for ammonium sulfate instead.

We live in a dangerous world, full of potentially dangerous substances and
things. Instead of dealing with the danger on a personal basis, we are
using the government as our nanny, and also letting it record our
purchases, open files on us for "unusual" purchases, and generally track
our actions. Which actually won't have much effect on dedicated terrorists
and criminals.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.








From attila at hun.org  Thu Feb 19 17:10:09 1998
From: attila at hun.org (Attila T. Hun)
Date: Fri, 20 Feb 1998 09:10:09 +0800
Subject: putting down the US military
In-Reply-To: <3.0.5.32.19980219140712.007bda40@pop3.lvcablemodem.com>
Message-ID: <19980220.000732.attila@hun.org>



-----BEGIN PGP SIGNED MESSAGE-----

on or about 980219:1407, in <3.0.5.32.19980219140712.007bda40 at pop3.lvcablemodem.com>, 
    "Eric J. Tune"  was purported to have 
    expostulated to perpetuate an opinion:

>From: Tim May 
>>
>>[SHIT REMOVED]

>>This is why I cheered to see the U.S. gets its tail kicked 
>>in Somalia and have to retreat in disgrace. Alas, the U.S. 
>>planners just looked for another war, one we could "win," 
>> and they found a bombed out Bosnia to be the perfect place 
>>to "restore our dignity."
>>
>>Amerika the Fascist.
>>
>>--Tim May
>>

Eric J. Tune wrote:

>You know Tim, I respect most of what you write, and I respect
>you in that you have your own free will and opinions and the
>right to express them, but what you have forgotten in your
>anarchistic ravings is that PEOPLE DIED IN SOMALIA, including a
>personal friend of mine.  They were all somebody's son, brother,
>and friend  [snip]
>
    my oldest son's LAR recon/black unit had been stood down for
    Somalia, gear turned in, etc.  we were finishing Christmas 
    dinner [two additional NCO's who did not live close enough
    to 29 Palms were also guests] --just about 4pm, the 'phone 
    rang...  I knew, and they knew. Bush had decided to go to 
    Somalia and the powers grabbed an always on standby high
    power unit: 21 LAV25s, etc.  vehicles and all were on C5s in
    14 hours. 

    having personally received those calls before does not
    prepare you for the call when it is _your_ son heading out
    for his first chance to stare the beast in the face and 
    stand it down...  or come home in a body bag.

Eric J. Tune wrote:

>The next time you "cheer to see the U.S. gets its tail kicked",
>why don't you think about the American troops who lost their
>lives or were maimed, or who were doing something they may have
>been personally and morally against, but they chose to be
>professional soldiers, and instead of displaying cowardice, they
>tried to do what was asked of them. [snip]
>
    escorting Bush was a piece of cake, but the brass figured 
    they had two of these special recon companies and ordered
    them to secure North Mogadishu --they did and were shipped 
    stateside; then Army's 10th Mountain got its ass kicked for
    some of the dumbest logistics planning, including the pickup 
    armor column getting lost, no water, and no night vision
    goggles...  then Uncle put its tail between its legs and
    came home.

    how do you think the all the families with sons, husbands,
    lovers, siblings, etc. felt with the spectacle of a dead
    (and initially unidentified pending notification of 
    kin) service man out there just doing his duty for
    his country is being dragged around the dirt streets of a
    shithole?  the boy's parents saw it on television before
    the Army could get a man out to their house to tell them 
    (yes, it is done in person).

    my _boy_ came home a changed _man_ after live ammo on live
    targets and no rubber bullets --and did what all returning  
    jarheads do after first blood --got married as soon as 
    possible.

Eric J. Tune wrote:

>Your "cheering" was a blatant slap in the face to anyone who has
>ever served in uniform. [snip]
>
    absolutely. misplaced criticism and a personal offense to me
    as well as all other servicemen.

    it is one thing to deplore the various wars, police actions,
    dirty tricks, etc. which the U.S. Presidents and spook shows
    are always using to defend "our" interests around the world 
    -it is another to criticize and ridicule the men who fight 
    and die. 

    I have no regrets for what I did, and did too well, but I
    sure as hell have regrets for whom it was done: total
    sleezeballs who have taken TR's maxim to mean: "speak loudly 
    and use a big stick" --it's only business, son.

>...with the right to our freedom of speech comes a
>responsibility to speak wisely..
>
    well, on this point, the thorn of what is "wisely" is 
    defined differently by everyone; freedom of speech is just
    that-- if we restrict Tim's, then we lose our own freedom.

        Tim gets to say his piece, 
        and we get to lump it      --or lump Tim.



-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNOzVpbR8UA6T6u61AQGN/QIAnQC2/ZUMCwT9M1hLToVdwETxSIkn3zah
4kYcPausEzc4FB64Pomg5CI2UKgiozCGrfv79ijwQmC3cn848lWxSQ==
=GjmF
-----END PGP SIGNATURE-----






From tcmay at got.net  Thu Feb 19 17:31:48 1998
From: tcmay at got.net (Tim May)
Date: Fri, 20 Feb 1998 09:31:48 +0800
Subject: putting down the US military
In-Reply-To: <3.0.5.32.19980219140712.007bda40@pop3.lvcablemodem.com>
Message-ID: 



At 4:07 PM -0800 2/19/98, Attila T. Hun wrote:


>Eric J. Tune wrote:
>
>>Your "cheering" was a blatant slap in the face to anyone who has
>>ever served in uniform. [snip]
>>
>    absolutely. misplaced criticism and a personal offense to me
>    as well as all other servicemen.

"Personal offense"? Gee, I'm crushed. (Attila, you wrote such a nice rant
about fascist Amerika...then decided to be "offended" when your predictable
hot button was pressed: any criticism of the military and any cheering of
its defeats. So predictable.)

I'll repeat: I cheer when I see the U.S. swatted down in its foreign
adventures. While I don't necessarily with harm to specific soldiers,
they're just pawns in a geopolitical power game. Eggs have to be broken to
make omelettes, and sometimes planes have to be shot down, aircraft
carriers have to be sunk (my fondest wish for Operation Wag the Dog), and
soldiers have to be stuck by the pikes of the peasants (as in Somalia). War
is hell. Nothing new there.

To _not_ want the U.S. to be taught a lesson just because it means some
soldiers must die as part of the lesson (else there is no lesson, of
course) is to let the USG do anything it wants.

By the way, the same arguments--identical in all ways--about individual
sons (and, sometimes, daughters) dying in the cause of war can be used in
many other arenas. For example, no doubt the CIA agent killed in Athens
when his name was published in a newspaper had parents, perhaps a wife and
children. So? He was still a spy, and some folks angry at having
imperialist spies in their midst offed him. Rough justice.

And no doubt some government soldiers in Burma, killed by rebel forces,
also had mothers and fathers, blah blah blah.

Both of these examples have crypto connections:

- the rebel forces in Myanmar/Burma use PGP. Ergo, PGP is helping
"terrorists" kill government soldiers.

- the publication of lists of CIA and DIA agents via "whistleblowing
remailers" is expected to increase. Remailers _will_ be used by "enemies of
the U.S. government." On this one, Louis Freeh and I have  long been in
agreement, me for even longer than he's known what the issues are.

Get used to it. When Johhnie or Hans or Sergei goes to war, he may die. And
perhaps because of Cypherpunks technologies. All part of the scheme of
things.


>        Tim gets to say his piece,
>        and we get to lump it      --or lump Tim.
>

Another empty threat from Attila?


--Tim May




Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.








From attila at hun.org  Thu Feb 19 17:41:19 1998
From: attila at hun.org (Attila T. Hun)
Date: Fri, 20 Feb 1998 09:41:19 +0800
Subject: onward, Clinton soldiers / not so fast, Sen. Lott
Message-ID: <19980220.000200.attila@hun.org>



-----BEGIN PGP SIGNED MESSAGE-----

    let's put the Saddam affair in perspective; I'm sure anyone 
    who is generally enlightened will agree that Bubba needs a
    nice little war to distract attention from his impending 
    doom from a wandering dickhead which Hillary obviously does 
    not, and has not, serviced adequately. 

    Eric Margolis, whom I have known for many years, is an
    American, and a Vietnam veteran, on the staff of the Toronto
    Sun, who went to Canada for editorial freedom. he calls it
    like he sees it, and the following article on American's
    failed MidEast foreign policy since WWII should be must
    reading for the war mongers who have never learned their 
    history and are about to repeat it.

    _________________________ NOTICE ______________________

    In accordance with Title 17 U.S.C.  Section 107, this
    material is distributed without profit to those who have
    expressed a prior interest in receiving the included
    information for research and educational purposes.
    _______________________________________________________

                         NOT SO FAST, SEN. LOTT!
                             by Eric Margolis
                             Toronto Sun Editorial Columnist
                             February 16, 1998

Senate majority leader Trent Lott and other senior Republicans
are demanding the US adopt a long-term strategy of covert action
and subversion to overthrow Saddam Hussein and other Mideast
troublemakers who disturb the Pax Americana.

Bombing Iraq is simply not enough, warned war-fevered
Republicans.  Saddam must be driven from power once and for all.
Many pro-Israel Conservatives demand the US Army march on
Baghdad.

If Senator Lott knew Mideast history better, he might not be so
eager for covert action, or hopeful Iraq's government could be
overthrown to America's profit.  He might even learn the United
States is not the solution to the Mideast's chronic instability
and tensions, but a major source.  A few examples:

*1947 

Washington is displeased by Syria's government.  A CIA-Army
`political action team' mounts a coup, employing a `CIA asset,'
Gen. Husni Za'im.  As senior CIA Mideast agent Miles Copeland
delightfully recalls, the Americans kept calling Za'im `our
boy,' or `Husni,' and ordering him about.  The day after Za'im's
coup, Copeland and the American agents went to inform the new
dictator whom he would appoint as ambassadors and cabinet
ministers.  When the Americans called him, `Husni,' Za'im
ordered them to `stand at attention,' and address him as
`Excellency.'  US-Syrian relations have been terrible ever
since.  Two subsequent, US-backed coups backfired.

*1952

The US helps engineer a coup against British puppet ruler of
Egypt, King Farouk.  CIA backs a young colonel, Gammal Abdel
Nasser.  But when the US later tries to pressure Nasser into
joining Washington's `new order' for the Mideast, the Baghdad
Pact, Nasser rebels and becomes America's enemy number one.  CIA
tries first to overthrow, than assassinate Nasser.  All attempts
fail.

*1953

Iran's popular, elected leader, Mohammed Mossadegh, attempts to
assert Iranian control of his nation's oil industry, whose
profits go to the US and Britain.  A CIA coup overthrows
Mossadegh, and puts `our boy' Reza Shah on the throne.  Iran's
US-trained secret police keep the Shah in power through a reign
of terror.  Islamic-nationalist revolution sweeps Iran in 1979,
ending US domination.

*1957/58

US and Britain thwart popular uprisings against King Hussein of
Jordan.

*1958 

Washington installs a client regime in Lebanon, which then
dutifully calls for US troops.  Beginning of Lebanon's 35 years
of instability and civil war.

*1958

Britain's Iraqi puppets, King Faisal and Nuri as- Said,
overthrown by the bloodthirsty Col. Kassim.  US uses Kassim to
attack Nasser.  Kassim murdered by Col. Aref in CIA-mounted
coup.  Aref's helicopter blown up.  A few more murders later,
CIA helps engineer into power a promising, young, Baath Party
enforcer, Saddam Hussein,

*1960

Anwar Sadat goes on CIA payroll.  After Nasser's death, CIA puts
Sadat into power in Egypt.  Corrupt and hated, Sadat is
assassinated to great popular joy..

*1969

The US elbows Britain out of Libya to gain control of its
high-grade oil.  CIA overthrows British puppet, King Idris, and
- - in one of its most brilliant moves - helps into power a young,
reformist colonel, Muammar Khadaffi.  When Khadaffi subsequently
trumpets the Arabs are being robbed of their oil by the west,
and raises prices, he goes unto America's hit list.

*1976

US, Iran and Israel secretly arm Iraq's Kurds and promote their
rebellion to destabilize Iraq.  Kurdish revolt plays major role
in igniting Iran-Iraq War 1980-1988 in which one million died.
US abandons Kurds, gets chummy with Baghdad.

*1980

Saddam Hussein becomes America's most important Mideast ally in
trying to crush Iran's Islamic revolution.  Urged on, armed and
financed by the US, Saddam invades Iran in 1980.  CIA and
Pentagon supply military advice and intelligence on Iran.  US
and British intelligence help Iraq obtain its chemical and
biological warfare capabilities.

*1983

US attempts to install a client, Christian/fascist regime in
Lebanon, drive out Syrian influence.  US Marines sent to Beirut,
under cover of `peace-keepers.'  They are bombed out of Lebanon
by Shia militants:  309 Americans die, including CIA's top
Mideast staff.

*1985

CIA's revenge backfires.  Lebanese CIA agents detonate truck
bomb in Beirut in a failed attempt to assassinate Shia leader,
Sheik Fadlallah.  Eighty-three civilians killed, 240 wounded.

*1986

US tries to assassinate Khadaffi by bombing his residence in
Tripoli.  One baby daughter killed, one injured.  He escapes.
Downing of Pan Am and French UTA flights may be revenge for this
failed hit.  Three other attempt to assassinate Khadaffi, using
CIA-organized Libyan exiles, fail.

*1996

The Bay of Camels - CIA's biggest flop since Cuba.  Urged on
by President Clinton, CIA mounts an elaborate coup against
Saddam Hussein.  Iraqi exiles, armed and trained by CIA, to
march on Baghdad from US/British ruled Kurdistan.  CIA organizes
a cabal of generals to assassinate Saddam.  Public places in
Baghdad are bombed, many civilians killed, in order to
`destabilize' Iraq (this while the US is busy denouncing
terrorism).  But Saddam's spies have infiltrated the plot.  The
whole operation collapses.  CIA's agent network in Iraq is
rolled up.  Many Kurds back Saddam, turn on pro-US Kurds.  CIA
agents in Kurdistan run for their lives, abandoning allies and
tons of documents.  Saddam is strengthened.  CIA's inept
Director, John Deutch, fired for this Mother of All Fiascos.  .

Republicans now urge more of the above to keep the Mideast
calm. You certainly can't argue with success.

copyright   eric margolis   1998



-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNOzdC7R8UA6T6u61AQGciwH8DV95VLZFazEpV9YOI7xaItpsq2892hlW
LsEgcfoDRAPp4qHworr1kFymnzNpJXToj1KGO6/yyoEam8Xjw/MBig==
=8rR0
-----END PGP SIGNATURE-----






From ichudov at Algebra.COM  Thu Feb 19 18:27:20 1998
From: ichudov at Algebra.COM (Igor Chudov @ home)
Date: Fri, 20 Feb 1998 10:27:20 +0800
Subject: Digital copy prot3ction
Message-ID: <199802200216.UAA09021@manifold.algebra.com>




I can hardly believe that any of these schemes are undefeatable.

As soon as the CPU starts talking to a video and sound board, 
this whole thing becomes easily breakable. All one needs to do is
to capture the signals that go to these boards and re-record them.

Right?

======================================================================
Thursday February 19, 3:58 am Eastern Time

Firms said to agree on digital anti-piracy system

LOS ANGELES, Feb 19 (Reuters) - Five giants of the computer and
electronics industries have agreed on technology designed to protect
Hollywood's most valuable products from being illegally copied, a
newspaper reported on Thursday.

The Los Angeles Times said Sony Corp (NYSE:SNE - news; 6758.T), Intel
Corp(INTC - news), Matsushita Electric Industrial Co (MSES.KL), Toshiba
Corp (6502.T) and Hitachi Ltd (NYSE:HIT - news; 6501.T) were expected
to announce later on Thursday a proposal to deploy encryption technology
that will prevent people from making illicit copies of copyright digital
content.

The deal could be a breakthrough for the entertainment industry, which
has been wary of the ease with which digitally distributed material can be
endlessly copied without any degradation in quality, the newspaper said.

``If somebody tries to violate a copyright, it won't work,'' the
newspaper quoted Mike Aymar, vice president of consumer products at Intel,
as saying.

``The goal is that you'll see products on the marketplace that support
this by the end of the year,'' Aymar said.

The proposed technology would have no effect on televisions, video
cassette recorders or computers already in use, the paper said.

It said the agreement was presented on Wednesday in Burbank, California,
to the Copy Protection Technical Working Group, a committee that is
led by major movie studios and includes representatives of the music,
computer, software and electronics industries.







From ravage at ssz.com  Thu Feb 19 18:37:58 1998
From: ravage at ssz.com (Jim Choate)
Date: Fri, 20 Feb 1998 10:37:58 +0800
Subject: Digital copy prot3ction (fwd)
Message-ID: <199802200241.UAA20917@einstein.ssz.com>



Forwarded message:

> Subject: Digital copy prot3ction
> Date: Thu, 19 Feb 1998 20:16:49 -0600 (CST)
> From: ichudov at algebra.com (Igor Chudov @ home)

> I can hardly believe that any of these schemes are undefeatable.
> 
> As soon as the CPU starts talking to a video and sound board, 
> this whole thing becomes easily breakable. All one needs to do is
> to capture the signals that go to these boards and re-record them.
> 
> Right?

> The proposed technology would have no effect on televisions, video
> cassette recorders or computers already in use, the paper said.

I suspect that this part is the key, what they will propose is some
mechanism to alter the chipsets from the one currently implimented. Expect
them to impliment something similar to the DAT tape systems where the machine
won't execute a copy function if it sees the correct signal.


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From attila at hun.org  Thu Feb 19 18:55:08 1998
From: attila at hun.org (Attila T. Hun)
Date: Fri, 20 Feb 1998 10:55:08 +0800
Subject: putting down the US military
In-Reply-To: 
Message-ID: <19980220.013910.attila@hun.org>



-----BEGIN PGP SIGNED MESSAGE-----

on or about 980219:1723, in , 
    Tim May  was purported to have 
    expostulated to perpetuate an opinion:

>At 4:07 PM -0800 2/19/98, Attila T. Hun wrote:

>>    absolutely. misplaced criticism and a personal offense to me
>>    as well as all other servicemen.

at 980219:1723, Tim May wrote:

>"Personal offense"?  Gee, I'm crushed.  (Attila, you wrote such
>a nice rant about fascist Amerika...then decided to be
>"offended" when your predictable hot button was pressed:  any
>criticism of the military and any cheering of its defeats.  So
>predictable.)
>
    No, Tim, not predictable --your cheers are misplaced.

    Amerika is fascist at best; we do not have the government
    my ancestors, and probably yours, fought to create 222 years
    ago. today's Federal Hamiltonian style central government 
    does not qualify as a republic, at best it is a plutocracy.

    No, my objection is _where_ you place your cheers. we need
    to bring down the fascists, not kill our fighting men, most
    of whom still believe in America the Beautiful, not the 
    cesspool you and I and the rest know it has become. we 
    almost had a military arrest of Clinton for treason in his
    first term, but a number of key generals and admirals were
    killed.

    turn your cheers at American defeats into jears to the heart
    of the problem in Washington.

    I'm not advocating a sapper, but somebody better wake the 
    serfs.

>Eggs have to be broken to make omelettes

    yes, but there is an unlimited supply of eggs in the minds
    of the politicians; they'll go on until they are gone, then
    shrug their shoulders and say: "we tried...."

    if the US suffers some really significant defeat, that will
    be the excuse for martial law and we will see more than the
    Admirality flag flying in every U.S. courtroom (courtesy of 
    FDR and 08 Mar 33). 

    If we run out of eggs, we will be overrun; and I may post
    a significant historical document, overlooked by all but a
    few, on that point.

    Amerika is fast heading towards moral bankruptcy because
    "it feels good" --just like the dog who licks his balls 
    because he can.

> aircraft carriers have to be sunk
>(my fondest wish for Operation Wag the Dog), 

    5,000 men to teach a whoring asshole like Clinton what?

    if Saddam, or friends, sinks a carrier, the asshole will
    nuke the middle east while every Joe Couch Potato screams 
    for blood --then what?
 
>War is hell.  Nothing new there.

    never was and never will be. and war should be avoided at
    all costs. 

    if the US was a good friend overseas instead of the greedy
    bastards and manipulators they have been most of this entire
    century, every country in the world would not hate the U.S. 
    --except maybe the Brits. Amerika has destabilized close to 
    90% of the world governments at one point of another in this
    century, including the Labour government preceding Thatcher.

    check the list of foreign policy failures in the mideast
    which I just posted.  the American fools put every one of
    the now anti-US bastards in power: Syria, Iraq, Libya,
    Jordon, and previously Iran, Egypt, and Lebanon. Britain
    kicked the Palestinians off the land they farmed since the
    diaspora --almost 2,000 years, and now the U.S props up both
    Israel and the PLO (half-heartedly, which is more than the
    rest of the Arabs do for Arafat, other than noise). The most
    stupid action after world war 2 was to permit Britain to
    establish Israel --only exceeded by our stupidity of
    continuing to support a pig like Bibbi.

    Amerika has made so many enemies overseas with its Pax 
    Americana policies that we do not have enough soldiers to
    be the world's policemen --and we should never have been
    in that position in the first place, except Amerika has
    always been the home of the free --the freedom to rape,
    pillage, and burn your fellow man, particularly if they
    are someplace else.

>To _not_ want the U.S. to be taught a lesson just because it
>means some soldiers must die as part of the lesson (else there
>is no lesson, of course) is to let the USG do anything it wants.
>
    no, the issue is to rectify the situation at the root: the
    cesspool. everyone one of us, regardless of our beliefs, is
    responsible for the meglomaniacs in our government. if those
    of us with supposed intelligence can not get Joe Couch 
    Potato off his ass --whose fault is it?  Clinton will get 
    them off their collective asses if an aircraft carrier goes 
    down --even if he scuttles it.

>Get used to it.  When Johhnie or Hans or Sergei goes to war, 
>he may die.  And perhaps because of Cypherpunks technologies. 
>All part of the scheme of things.
>
    doesn't need to be... 

    I am too well aware of what I have contributed first in
    black ops and then in technology until I got smart enough
    20+ years ago to refuse any direct military work. even so,
    it does not help withholding (but it feels good); high-tech 
    only kills more with less effort.

>        Tim gets to say his piece,
>>        and we get to lump it      --or lump Tim.
>
>Another empty threat from Attila?
>
    no, Tim, not at all, just a cheap pun!  someday maybe I'll 
    even be creative enough to coin a new "Dew Drop Inn"

    I'll defend to the death your right to say whatever you 
    wish; obviously, I also reserve the right to bitch! 


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNOztA7R8UA6T6u61AQF/awH/VbccORGJYCe+Xd4dIMRraFl8tOA/dB80
zLeNC5zWFxyQr4dQw94ySIy++XI/lkl/oi3csi3RTl6lw2SIJsfDJQ==
=HxNf
-----END PGP SIGNATURE-----






From Curtis_Yarvin at geoworks.com  Thu Feb 19 19:16:28 1998
From: Curtis_Yarvin at geoworks.com (Curtis Yarvin)
Date: Fri, 20 Feb 1998 11:16:28 +0800
Subject: Digital copy prot3ction
In-Reply-To: <199802200216.UAA09021@manifold.algebra.com>
Message-ID: <199802200259.SAA10250@ammonia.geoworks.com>



> 
> I can hardly believe that any of these schemes are undefeatable.
> 
> As soon as the CPU starts talking to a video and sound board, 
> this whole thing becomes easily breakable. All one needs to do is
> to capture the signals that go to these boards and re-record them.

In general, there's no way of building a secure system that
prevents copying of information, but permits its consumption.
The two are too closely related.

The best you could do is a tamper-resistant hardware key on
the audio/video card.  (This locks you into a design where
the content is decoded on the card, which may be suboptimal.)
And anyone who can crack the crypto chip can get unprotected
digital copies and distribute them.  This is probably doable
by the same kind of people who set up pirate CD factories.

I'm sure Intel knows this.  I doubt the content companies do.
It's not Intel's goal to create an undefeatable protection
system; it's Intel's goal to convince the content companies
that it has done so.  This seems to have been achieved.

Curtis Yarvin
(not speaking for Geoworks)






From brianbr at together.net  Thu Feb 19 19:40:56 1998
From: brianbr at together.net (Brian B. Riley)
Date: Fri, 20 Feb 1998 11:40:56 +0800
Subject: PLO censoring pro-Iraqi sentiments
Message-ID: <199802200322.WAA27685@mx02.together.net>



-----BEGIN PGP SIGNED MESSAGE-----


>> The next time you "cheer to see the U.S. gets its tail kicked", why
>> don't you think about the American troops who lost their lives or
were
>> maimed, or who were doing something they may have been personally and
>> morally against, but they chose to be professional soldiers, and
instead
>> of displaying cowardice, they tried to do what was asked of them. 

 I prefer to view what Tim said in the context that "Amerika" the ugly
got its tail kicked in the broader sense. I don't believe that Tim took
any pleasure in seeing American soldiers getting killed.

  The fact remains that we, Amerika, did get our tail kicked in Somalia;
like Viet Nam it was little reflection on the troops but a reflection of
the of a command staff being run by Washington DC Apparatchiki all
suffering from cranio-rectal inversion. America deserves all the
ridicule that has been heaped upon it for those fiascos; only ... some
time, maybe we can but hope the we will finally learn at least one
lesson and get it right once before I go for the long sleep!
 

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEVAwUBNOz23D7r4fUXwraZAQFTmAf+NduMJzQp+B4bgILGKcE2n2nMiqqCbV3F
gfDqNCANv8I+9VFIZp5yXomg6fmrv/byz/KBAJ0Vb+r8Sgmw/EofflN6s5fInVTq
GZlg9aGkdQRHSo8dRuGsxeIkQE0tYqISqFWLNdf5raKEE1UygYoOxQ83snZFvFLU
VFOdo37zepo3qlfRNwt2TSW4Wg5D02uQHQIONah64/F9XIENoBAfTLhdeglAN05z
L+JGC0hUgyzjv+vmN4qBgtQJIKKOJO1eyQsT1csDXXWPoD/O7I+w6bwS98Yf4UA2
d8T+G8vBdms7rpjQkX7cpa2XASufl1A+3YI8vVDMUREBSjJRTH85nA==
=tsyh
-----END PGP SIGNATURE-----


Brian B. Riley --> http://members.macconnect.com/~brianbr
  For PGP Keys  

 "Despite the bleating of various socialistically-anointed
 freakshow groups, the vast majority of us realize that bringing
 children into the world is not only the most wonderful endeavor
 with which we can be associated but absolutely essential if we
 aren't going to put ourselves on the EPA's endangered species
 list."  Winston Borden







From nobody at REPLAY.COM  Thu Feb 19 19:45:11 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Fri, 20 Feb 1998 11:45:11 +0800
Subject: Is spam really a problem?
In-Reply-To: <199802181733.SAA26244@basement.replay.com>
Message-ID: <199802200338.EAA13749@basement.replay.com>



Tim wrote to Ray:
> You've mentioned that spam is theft. 

Spam is plainly not theft.  Littering or pollution is a better analogy.






From tcmay at got.net  Thu Feb 19 20:09:44 1998
From: tcmay at got.net (Tim May)
Date: Fri, 20 Feb 1998 12:09:44 +0800
Subject: PLO censoring pro-Iraqi sentiments
In-Reply-To: <199802200322.WAA27685@mx02.together.net>
Message-ID: 



At 7:22 PM -0800 2/19/98, Brian B. Riley wrote:

>>> The next time you "cheer to see the U.S. gets its tail kicked", why
>>> don't you think about the American troops who lost their lives or
>were
>>> maimed, or who were doing something they may have been personally and
>>> morally against, but they chose to be professional soldiers, and
>instead
>>> of displaying cowardice, they tried to do what was asked of them.
>
> I prefer to view what Tim said in the context that "Amerika" the ugly
>got its tail kicked in the broader sense. I don't believe that Tim took
>any pleasure in seeing American soldiers getting killed.

Precisely. I took no special glee in seeing U.S. soldiers killed in
Somalia. (By the way, I also took no special glee in seeing young Russian
boys burning to death as their Hind helicopter plummeted to the ground
after being hit by a Redeye or Stinger missile...but I was happy to see the
Russian invaders have their asses kicked.)

The United States has undertaken in the last half of this century to get
involved in exactly the sort of "foreign wars" that Washington warned us
of. Adventurism, really.

That some young American boys (and a few girls) die in such vanity wars is
regrettable, but it doesn't change my view of the wars, or the wish I have
that the U.S. lose the wars and so, perhaps, rethink its adventurist,
imperialist, statist, New World Big Brother Order geopolitical view.

Since the lessons really didn't take in past wars, whether won or lost, I'm
really, really, really hoping for a debacle in this one. The sinking of an
aircraft carrier, with the deaths of several thousand young boys, might do
it.

As for their deaths, their choice is to not enlist. Or, if they enlisted,
to refuse to go the Gulf for this war.

(A Santa Cruz local, Erik Larsen, did exactly this in Desert Storm. He
refused to go.)

If they go fight in Clinton's dirty little vanity war, and they get killed,
tough shit. Think of it as evolution in action.

And as for the thread name here, "PLO censoring pro-Iraqi sentiments, it's
reprehensible that the U.S. is pushing a "peace process" which condones
this kind of censorship. Better to just let the Arabs fight the Jews,
without any funding from U.S. slave-taxpayer-units. If the Arabs kill all
the Jews I'll say it was a really, really stupid ideas for a bunch of Jews
from Poland and Germany and Russia to go kick out a bunch of "sand niggers"
and "ragheads" and not expect retribution to someday arrive.

Oh, and spare me the typical Zionist rhetoric about how "YHWH" or Whatever
It's Damned Name Is "promised" this land to the Jews, despite their Polish
or Russian or Ukrainian residency and genetics for thousands of years.

Fucking religious fruitcakes.


--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.








From info at inexchange.net  Fri Feb 20 09:26:08 1998
From: info at inexchange.net (Info Desk)
Date: Fri, 20 Feb 1998 12:26:08 -0500
Subject: Advertisement: Website Hosting
Message-ID: <19980220172300666.AGT297@out.inexchange.net>


http://www.inexchange.net
info at inexchange.net

InExchange would like to introduce our complete Hosting and Promotional service.

     FOR ONLY $19.95 PER MONTH !

* 20 MB (megabytes) of disk space
* 750 MB  of data transfer per month
* 5 E-mail accounts
* INTERNATIONAL Hosting
* Access to your account anytime via the Web Control Panel
* Full MS Front Page support
* Unlimited FTP updates
* Personal CGI directory for your own scripts (or use ours)
* The best statistics analyzer in the industry
* E-mail forwarding, auto responders and vacation reply
* Domain name registration (www.yourname.com)
* FREE registration of your domain with over 250 search   engines
* Real Audio/Video support

* Inquire about our $16.95 plan

* Other plans also include:
  Shopping cart application and database access/utilities
  Cold Fusion Hosting
  CyberCash, iBill and VersaNet ready
  Instant on-line credit card processing

For additional details, please refer to our website:
http://inexchange.net
info at inexchange.net

Inexchange offers you a full 30 day money back guarantee if not satisfied with our services.










From rah at shipwright.com  Thu Feb 19 20:46:24 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Fri, 20 Feb 1998 12:46:24 +0800
Subject: IFCA
Message-ID: 




--- begin forwarded text


Resent-Date: Thu, 19 Feb 1998 21:52:04 -0400
X-Authentication-Warning: online.offshore.com.ai: list set sender to
fc98-request at offshore.com.ai using -f
Date: Fri, 20 Feb 1998 02:33:04 +0100 (MET)
From: Ray Hirschfeld 
To: fc98 at offshore.com.ai
Subject: IFCA
Resent-From: fc98 at offshore.com.ai
X-Mailing-List:  archive/latest
X-Loop: fc98 at offshore.com.ai
Precedence: list
Resent-Sender: fc98-request at offshore.com.ai

The second year of a new conference is perhaps the most difficult--the
novelty has worn off but the conference is not yet firmly established.
But all indications for FC98 are promising.  Another success next week
will be a signal to do it again next year.

A new organization, the International Financial Cryptography
Association (IFCA) has been formed to support future meetings of the
Financial Cryptography conference.  IFCA will not only be responsible
for organizational aspects of the conference, but will also select the
program chair.  All paid registrations of FC98 will automatically
receive a year's membership in IFCA (unless they indicate that they do
not wish to join).  Others may join by paying membership dues.  A
first general meeting of IFCA will be held on the evening of Tuesday
February 24, just before the conference rump session, and all members
are encouraged to attend.

The main purposes of the meeting will be to elect directors and to
discuss possible locations for FC99 (and perhaps FC00).  If you are
interested in hosting an FC conference and can provide some logistic
support for it, you are invited to bring a proposal to the meeting.
Ideas tossed around so far have mostly focused on other "financial
island" locations, e.g., Grand Cayman, Hong Kong, Manhattan, Jersey,
etc., but anyplace reasonable will be considered.  (There will almost
certainly be insufficient information available at the time of the
meeting to make a decision, but an indication of the wishes of the
membership will be gathered to help guide the directors.)

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: 







From attila at hun.org  Thu Feb 19 20:57:22 1998
From: attila at hun.org (Attila T. Hun)
Date: Fri, 20 Feb 1998 12:57:22 +0800
Subject: PLO censoring pro-Iraqi sentiments
In-Reply-To: 
Message-ID: <19980220.042154.attila@hun.org>



-----BEGIN PGP SIGNED MESSAGE-----

on or about 980219:2004, in , 
    Tim May  was purported to have 
    expostulated to perpetuate an opinion:

    [snip the dead issues on gloating...]

>And as for the thread name here, "PLO censoring pro-Iraqi sentiments,
>it's reprehensible that the U.S. is pushing a "peace process" which
>condones this kind of censorship. Better to just let the Arabs fight the
>Jews, without any funding from U.S. slave-taxpayer-units. If the Arabs
>kill all the Jews I'll say it was a really, really stupid ideas for a
>bunch of Jews from Poland and Germany and Russia to go kick out a bunch
>of "sand niggers" and "ragheads" and not expect retribution to someday
>arrive.
>
    they figure Britain owes Israel to them to atone for Brit   
    guilt for refusing to let them leave Germany for Palestine
    before Hitler reduced the number available to make the trip.

    and since Britain cant go it by themselves anymore, and the
    US has over 50% of the Zionists in the world --Russia being
    in second place-- the 10% of the Zionists in Palestine wag
    the US dog to protect them from "the barbarian Arabs" 
    (their attitude, not mine).

    the argument that Israel is the only true friend to the US
    in the Middle East is pure bullshit; with friends like 
    Israel who take our technology and either steal it directly 
    or reverse engineer it and sell it to China, Iran, South
    Africa who sells to China, etc. --who needs enemies. 

    the Israeli governments have double crossed U.S. interests 
    at most every point --they are a liability. if the U.S. had
    not acquiesced, under pressure of U.S. Zionist and general 
    WWII guilt, to Britain's division of Palestine, the Middle
    East would not be the problem it is --the Arabs plus the 
    Iranians (Farsi, not Arabs) would never have been able to 
    find a common unifying factor --and hate the US accordingly
    for its virtually unquestioning support of Israel.

    the U.S. should withdraw support from both sides of divided
    Palestine and let nature take its course. save the U.S. $5 
    billion dollars in acknowledged aid to Israel every year
    plus whatever amount is hidden in the black budgets, etc.
    plus the additional billions they raise from the guilt 
    ridden American Zionists.

    if there were no Israel, maybe the U.S. Zionists would 
    become Americans rather than Zionists first and residents of
    the U.S. second. if the really rabid ones wont shut up, give
    them an AR16, 200 rounds, and a ticket...

>Oh, and spare me the typical Zionist rhetoric about how "YHWH" or
>Whatever It's Damned Name Is "promised" this land to the Jews, despite
>their Polish or Russian or Ukrainian residency and genetics for thousands
>of years.

    me too...

>Fucking religious fruitcakes.

    you bet, but more than that, it's a class of discordant 
    freeloaders whose interests supersede those of the hand 
    that feeds and protect them.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNO0LEbR8UA6T6u61AQE/YQIAjmht713DIz6lxUtMwC+aANsfpLch2H6S
xarlS1TwZ1OTtcKPMKiEDqmuPL7sRUJrnBsuCF6TkdqoggPHfv9oEw==
=6OGe
-----END PGP SIGNATURE-----






From paladin at lvcablemodem.com  Thu Feb 19 21:02:39 1998
From: paladin at lvcablemodem.com (Eric J. Tune)
Date: Fri, 20 Feb 1998 13:02:39 +0800
Subject: PLO censoring pro-Iraqi sentiments
Message-ID: <3.0.5.32.19980219204255.007c3680@pop3.lvcablemodem.com>



>Eric Tune writes:
>
>> You know Tim, I respect most of what you write, and I respect you in
>> that you have your own free will and opinions and the right to express
>> them, but what you have forgotten in your anarchistic ravings is that
>> PEOPLE DIED IN SOMALIA, including a personal friend of mine.  They were
>> all somebody's son, brother, and friend. 
>
>So were the 100,000 Iraqi military killed by Bush, and the 1,000,000
>Iraqis of all ages killed by US sanctions.  So were the civilians
>bulldozed into mass graves in Panama, so the country would look neat and
>tidy for the arrival of the ReportWhores.
>
>What the world needs now is not another mass killing of Iraqis by the
>United States government.  What the world really needs now is a fifty
>dollar weapon that sinks aircraft carriers.
>
>> These soldiers went where they were ordered to go, as befits a soldier,
>> and tried to do the job they were given and accomplish the mission, and
>> for that EVERY ONE OF THEM DESERVES Y O U R RESPECT.  I am quite sure
>> the vast majority of them thought it was patently stupid to go to
>> Somalia in the first place, but a soldier follows orders, legal ones,
>> and tries to get the job done regardless of personal feelings.
>
>Most of them would probably follow "legal orders" to fire upon American
>civilians too.  

You ever served in the military?  Unless you've been under fire, you should
shut the fuck up about shit you know nothing about nor could comprehend.

>> The next time you "cheer to see the U.S. gets its tail kicked", why
>> don't you think about the American troops who lost their lives or were
>> maimed, or who were doing something they may have been personally and
>> morally against, but they chose to be professional soldiers, and instead
>> of displaying cowardice, they tried to do what was asked of them. 
>
>The universe does not view the lives of Americans as more valuable than
>the lives of people murdered by Americans. 

Listen up jerk, in case you didn't get any news during 1990, Iraq attacked
Kuwait, and murdered thousands of Kuwaitis.  "Don't start no shit and there
won't be no shit"... ever heard that, asshole?  America would have never
been involved if Iraq hadn't invaded Kuwait.  I was there, in a Bradley,
and we could have rolled all over Baghdad, especially after what the Iraqi
bastards did to the Kuwaitis, but it wasn't done. Unfortunately Saddam
Hussein stayed in power.  There will not be a shred of a chance for peace
in that region until he is DEAD.  I don't think air strikes are the answer
to this, and I think Clinton is a moron for his present policy, War is the
worst thing that man can do to other men, and there is no such thing as
"the good fight"... war is hell. Period.  Until you have been in a war, you
have no idea of what you are talking about.  But if you think that Iraq was
"more right" or better yet, "less wrong", you need a radical lobotomy, or
perhaps you've already had one.

>> Think of the innocent civilians who inevitably die in the conflicts
>> started by the megalomaniacs like Saddam Hussein.
>
>You mean all those melted child car seats and scorched teddy bears on
>George Bush's "Highway of Death" leading out of Kuwait? 

Evidently, you again know nothing of what the Iraqis did to the Kuwaitis on
their way in to Kuwait.  Get educated, shithead. 

>Unfortunately, for all the braying Americans do about freedom, Americans
>can never be truly happy unless someone is telling them what to do, or
>they are telling someone else what to do, or they are bombing someone for
>not doing what they have told them to do. 
>
>The only thing Americans understand is dead Americans.  The only thing. 

You sound like nothing more than disillusioned, spoiled, pompous asshole
when you presume to know what Americans "understand".  Your anarchistic
ravings only mark you for the idiot you are.

To everyone else besides Cordian who reads this, my apologies, but for all
it's failings, I still have pride in America... ...not for all the foreign
policy bullshit or the way the government fucks us over, or starts wars, or
sticks their collective nose in other countries business...but for the fact
that as a whole people, Americans still keep trying, everyday, to be a
better people. I'm proud of that.

Eric Tune






From dboone at ptialaska.net  Thu Feb 19 21:21:53 1998
From: dboone at ptialaska.net (Daniel J. Boone)
Date: Fri, 20 Feb 1998 13:21:53 +0800
Subject: No Subject
Message-ID: <199802200515.UAA00982@ptialaska.net>




Barry Wainwright wrote:
> 
> At 4:51 pm -0500 on 10/2/98, sombody pretending to be Brian B. Riley wrote:
> 
> > Alabama licenses have the holder's SSN on them (because that way
> >the state gets more Federal highway $), except his parents had never
> >applied to get him one, because of their religion.
> 
> What religion precludes the holding of a SS no.?

Here's one: Western Sect Freedonianism.  Check out 

http://www.geocities.com/SoHo/Lofts/2110/F_Freedonian.html



-- J.Q. Lurker






From classic at ix.netcom.com  Fri Feb 20 13:48:50 1998
From: classic at ix.netcom.com (classic at ix.netcom.com)
Date: Fri, 20 Feb 1998 13:48:50 -0800 (PST)
Subject: A Bit About Your Last Name
Message-ID: <199802201053.EAA01696@dfw-ix11.ix.netcom.com>



	Discover Your Family History - Rated "Cool Site of the Week"

		Come visit our website at, http://www.adsilver.com/research/index.html
(if you have problems with the above link, please try http://www.vpm.com/hallofnames/search.htm )
	
        Do you know WHO your ancestors are and WHAT they did?
	Do you know WHEN your surname first appeared?
	Are you curious about WHERE your family roots originate?

Now you can fill in the missing pieces of this puzzle.

Join the satisfied multitudes who have discovered their complete Family Surname History.

All Nationalities. It's easy. Just key your last name into our online index, and in seconds we will tell you it's origin and much MORE.  See if we've researched your complete family name history during our 25 years of professional research.

Read a sample history, plus - FREE Coat of Arms keychain with your family's most ancient coat of arms & crest. All in full color.  Your family name history parchment is 11 x 17",approximately 1700 words. It is beautifully ILLUMINATED by your most ancient Coat of Arms in full authentic Heraldic Colors.  Over 500 URLs on family and heraldic history.

Come visit our website at, http://www.adsilver.com/research/index.html

(if you have problems with the above link, please try http://www.vpm.com/hallofnames/search.htm )


Hall of Names International Inc.
1-888-My-Roots  (1-888-697-6687)





From whgiii at invweb.net  Thu Feb 19 21:49:39 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Fri, 20 Feb 1998 13:49:39 +0800
Subject: PLO censoring pro-Iraqi sentiments
In-Reply-To: <3.0.5.32.19980219204255.007c3680@pop3.lvcablemodem.com>
Message-ID: <199802200612.BAA31481@users.invweb.net>



-----BEGIN PGP SIGNED MESSAGE-----

In <3.0.5.32.19980219204255.007c3680 at pop3.lvcablemodem.com>, on 02/19/98 
   at 08:42 PM, "Eric J. Tune"  said:


>>Eric Tune writes:
>>
>>> You know Tim, I respect most of what you write, and I respect you in
>>> that you have your own free will and opinions and the right to express
>>> them, but what you have forgotten in your anarchistic ravings is that
>>> PEOPLE DIED IN SOMALIA, including a personal friend of mine.  They were
>>> all somebody's son, brother, and friend. 
>>
>>So were the 100,000 Iraqi military killed by Bush, and the 1,000,000
>>Iraqis of all ages killed by US sanctions.  So were the civilians
>>bulldozed into mass graves in Panama, so the country would look neat and
>>tidy for the arrival of the ReportWhores.
>>
>>What the world needs now is not another mass killing of Iraqis by the
>>United States government.  What the world really needs now is a fifty
>>dollar weapon that sinks aircraft carriers.
>>
>>> These soldiers went where they were ordered to go, as befits a soldier,
>>> and tried to do the job they were given and accomplish the mission, and
>>> for that EVERY ONE OF THEM DESERVES Y O U R RESPECT.  I am quite sure
>>> the vast majority of them thought it was patently stupid to go to
>>> Somalia in the first place, but a soldier follows orders, legal ones,
>>> and tries to get the job done regardless of personal feelings.
>>
>>Most of them would probably follow "legal orders" to fire upon American
>>civilians too.  

>You ever served in the military?  Unless you've been under fire, you
>should shut the fuck up about shit you know nothing about nor could
>comprehend.

>>> The next time you "cheer to see the U.S. gets its tail kicked", why
>>> don't you think about the American troops who lost their lives or were
>>> maimed, or who were doing something they may have been personally and
>>> morally against, but they chose to be professional soldiers, and instead
>>> of displaying cowardice, they tried to do what was asked of them. 
>>
>>The universe does not view the lives of Americans as more valuable than
>>the lives of people murdered by Americans. 

>Listen up jerk, in case you didn't get any news during 1990, Iraq
>attacked Kuwait, and murdered thousands of Kuwaitis.  "Don't start no
>shit and there won't be no shit"... ever heard that, asshole?  America
>would have never been involved if Iraq hadn't invaded Kuwait.  I was
>there, in a Bradley, and we could have rolled all over Baghdad,
>especially after what the Iraqi bastards did to the Kuwaitis, but it
>wasn't done. Unfortunately Saddam Hussein stayed in power.  There will
>not be a shred of a chance for peace in that region until he is DEAD.  I
>don't think air strikes are the answer to this, and I think Clinton is a
>moron for his present policy, War is the worst thing that man can do to
>other men, and there is no such thing as "the good fight"... war is hell.
>Period.  Until you have been in a war, you have no idea of what you are
>talking about.  But if you think that Iraq was "more right" or better
>yet, "less wrong", you need a radical lobotomy, or perhaps you've already
>had one.

>>> Think of the innocent civilians who inevitably die in the conflicts
>>> started by the megalomaniacs like Saddam Hussein.
>>
>>You mean all those melted child car seats and scorched teddy bears on
>>George Bush's "Highway of Death" leading out of Kuwait? 

>Evidently, you again know nothing of what the Iraqis did to the Kuwaitis
>on their way in to Kuwait.  Get educated, shithead. 

>>Unfortunately, for all the braying Americans do about freedom, Americans
>>can never be truly happy unless someone is telling them what to do, or
>>they are telling someone else what to do, or they are bombing someone for
>>not doing what they have told them to do. 
>>
>>The only thing Americans understand is dead Americans.  The only thing. 

>You sound like nothing more than disillusioned, spoiled, pompous asshole
>when you presume to know what Americans "understand".  Your anarchistic
>ravings only mark you for the idiot you are.

>To everyone else besides Cordian who reads this, my apologies, but for
>all it's failings, I still have pride in America... ...not for all the
>foreign policy bullshit or the way the government fucks us over, or
>starts wars, or sticks their collective nose in other countries
>business...but for the fact that as a whole people, Americans still keep
>trying, everyday, to be a better people. I'm proud of that.

Wow! I haven't seen this kind of reactionary temper-tantrum since the last
4th of July BBQ down at the VFW.

So how long were you in?? Usally this type of "God save the King"
mentality wears off after a boot has been in the field for a few months.
For the more febal minded it lasts longer but they usally never make it
above Cpl. or 1st Lt.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: Bugs come in through open Windows.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO0JkI9Co1n+aLhhAQGeAQP/Z3zTLezopxF3l7vb6tRDuT3YDFTucr1d
h3JQ5ieWdFAPdNQmvlvnXNU2L7JoQW5J34b3gYnA9M3+xNK8DRBcifpojLkQItPj
zoZfta2A2giGgNsRpdmPrrrQUtMWhhN4SzOllwsidayCQiLxVX3eaQCOzEIIRpSy
aWD6KU0wyGY=
=aTfM
-----END PGP SIGNATURE-----






From nobody at REPLAY.COM  Thu Feb 19 21:50:54 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Fri, 20 Feb 1998 13:50:54 +0800
Subject: PLO censoring pro-Iraqi sentiments
Message-ID: <199802200542.GAA29531@basement.replay.com>



Eric J. Tune wrote:

> You know Tim, I respect most of what you write, and I respect you in that
> you have your own free will and opinions and the right to express them, but
> what you have forgotten in your anarchistic ravings is that PEOPLE DIED IN
> SOMALIA, including a personal friend of mine.  They were all somebody's
> son, brother, and friend.  These soldiers went where they were ordered to
> go, as befits a soldier, and tried to do the job they were given and
> accomplish the mission, and for that EVERY ONE OF THEM DESERVES   Y O U R
> RESPECT.  I am quite sure the vast majority of them thought it was patently
> stupid to go to Somalia in the first place, but a soldier follows orders,
> legal ones, and tries to get the job done regardless of personal feelings.


There is honor in fighting for something you believe in, taking a risk with
the belief that your actions may make things better.  What were those
soldiers in Somalia fighting for?

Yes, we know those people died in Somalia.  What did they die for?

Oh, just following orders... where have I heard that before...






From caos at mail.telepac.pt  Fri Feb 20 13:57:23 1998
From: caos at mail.telepac.pt (David Lopes)
Date: Fri, 20 Feb 1998 13:57:23 -0800 (PST)
Subject: No Subject
Message-ID: <000701bd3c71$98a40920$c2e941c2@vladimix>




Subscribe



From gwb at gwb.com.au  Fri Feb 20 13:57:41 1998
From: gwb at gwb.com.au (Global Web Builders)
Date: Fri, 20 Feb 1998 13:57:41 -0800 (PST)
Subject: One Nation birthday raffle
Message-ID: <1.5.4.32.19980219235351.00b3131c@mail.pronet.net.au>


Dear One Nation Supporter,

We are currently selling tockets for One Nation first birthday raffle.

The first prize is a QANTAS Global Explorer Holiday for two valued at
$12,000 - a 23 day trip visiting Paris, London, New York, Los Angeles,
Anaheim and Honolulu.

The second prize is a 7 day holiday to Hawaii at the Outrigger Reef Hotel
for two - value $5,000.

The third prize is a 7nights stay at the Novotel Palm Cove at Cairns - value
$3,000.

You can order a book of 5 tickets (minimum) at $10 per book (or $2 per
ticket) by credit card by phoning 1800 620088.

Winner's names being drawn at One Nation's Birthday Party at 7pm on April
11th 1998.

Winners will be notified by phone and mail with the results being published
in the Sydney Morning Herald on Friday 17th April 1998.

Order now while tickets remain!






From attila at hun.org  Thu Feb 19 22:17:49 1998
From: attila at hun.org (Attila T. Hun)
Date: Fri, 20 Feb 1998 14:17:49 +0800
Subject: PLO censoring pro-Iraqi sentiments
In-Reply-To: <199802200612.BAA31481@users.invweb.net>
Message-ID: <19980220.055727.attila@hun.org>



-----BEGIN PGP SIGNED MESSAGE-----

on or about 980219:2334, in <199802200612.BAA31481 at users.invweb.net>, 
    "William H. Geiger III"  was purported to have 
    expostulated to perpetuate an opinion:

    [chop 80% of the various rantings]

> Tune said:

>>You sound like nothing more than disillusioned, spoiled, pompous asshole
>>when you presume to know what Americans "understand".  Your anarchistic
>>ravings only mark you for the idiot you are.

>>To everyone else besides Cordian who reads this, my apologies, but for
>>all it's failings, I still have pride in America... ...not for all the
>>foreign policy bullshit or the way the government fucks us over, or
>>starts wars, or sticks their collective nose in other countries
>>business...but for the fact that as a whole people, Americans still keep
>>trying, everyday, to be a better people. I'm proud of that.

>Wow! I haven't seen this kind of reactionary temper-tantrum since the
>last 4th of July BBQ down at the VFW.

    really? you start yours with a prayer followed by the statement:

        OK, fellas, friendly game; all guns on the table...

>So how long were you in?? Usally this type of "God save the King"
>mentality wears off after a boot has been in the field for a few months.
>For the more febal minded it lasts longer but they usally never make it
>above Cpl. or 1st Lt.

    very true, for those who have never been deployed into the
    face of the beast. 

    those who have been in combat have an entirely different
    attitude.     

    the peacetime Army is a often a goldbrickers union for lack
    of something better to do. and it is definitely not true in
    the Corps with the exception of the few who take the two
    year stint and four years active reserve and are somewhat
    disillusioned by the inactivity as they never hit the floats
    or are otherwise deployed.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNO0eL7R8UA6T6u61AQFotgH/c8XYz0psrJvjc5ibaf8PnY9aB1Y0hqX7
m11PvGFKKxtiRtDDOqv6zH0og68g1zpfJLcDBoI/GaFtOEctIfsEGg==
=cGsI
-----END PGP SIGNATURE-----






From tcmay at got.net  Thu Feb 19 22:20:21 1998
From: tcmay at got.net (Tim May)
Date: Fri, 20 Feb 1998 14:20:21 +0800
Subject: "My country, right or wrong"
In-Reply-To: <3.0.5.32.19980219140712.007bda40@pop3.lvcablemodem.com>
Message-ID: 



At 2:07 PM -0800 2/19/98, Eric J. Tune wrote:

>>
>[SHIT REMOVED]
>


I think this item, and your other frothings, show why you should not be
taken seriously.

Once again, a lurker who has never posted any substantive ideas delurks to
foam and spew insults.

In any case, all of the arguments I have seen from you boil down to that
tired old chestnut:

"My country, right or wrong."

A good attitude for cannon fodder to have.  Not such a good attitude for
free men to have.

Time to add you to my ever-growing killfile.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.








From emc at wire.insync.net  Thu Feb 19 22:39:55 1998
From: emc at wire.insync.net (Eric Cordian)
Date: Fri, 20 Feb 1998 14:39:55 +0800
Subject: The Political Education of Eric Tune
In-Reply-To: <3.0.5.32.19980219204255.007c3680@pop3.lvcablemodem.com>
Message-ID: <199802200632.AAA01478@wire.insync.net>



"Eric J. Tune"  writes:
 
> You ever served in the military?  Unless you've been under fire, you
> should shut the fuck up about shit you know nothing about nor could
> comprehend.
 
Similarly, only rapists should judge other rapists, only murderers
other murderers, only SS members other SS members, and only soldiers
other soldiers, only tyrants other tyrants, only gas-chamber operators
other gas-chamber operators.
 
Waaaaaaa!  The Baby-Napalmers of the world cry, no one "understands"
us.
 
> Listen up jerk, in case you didn't get any news during 1990, Iraq
> attacked Kuwait, and murdered thousands of Kuwaitis.
 
Iraq, mislead by the US into believing that there would be no
interference in its long-standing dispute with Kuwait, annexed it,
providing a pretense for the US to do some dirty work for the
Israelis, who did not want to tolerate an Arab military giant in their
region.
 
Kuwait provoked Iraq far more than places like Panama and Grenada have
provoked the United States, when US forces poured in to remove
existing governments, and install regimes sympathetic to Washington,
also killing thousands of uninvolved civilians.
 
Then again, perhaps you believed the touching "Baby Incubator" story
performed by the daughter of the Kuwaiti ambassador for an
appreciative Congress, who were unaware of who she was, or that she
was lying through her teeth.  Perhaps you were also unaware that
American public opinion during the Persian Gulf War was under the
control of a domestic public relations firm hired by the government of
Kuwait.
 
> "Don't start no shit and there won't be no shit"... ever heard that,
> asshole
 
America always manages to find some pretense to fight the wars it
decides to fight.  Sometimes there is a staged attack, and an
arrangement for allies to "invite" us into the conflict.  Other times,
some imagined threat, like the chance that an infant formula factory
"could be used" to produce material that "might be used" for chemical
or biological warfare. Most of us who have watched the antics of
America for more than a few decades see through the transparent
rhetoric employed in such situations to manufacture public consent.
 
> America would have never been involved if Iraq hadn't invaded Kuwait.
 
Well, at least another pretense would have had to be engineered to
implement the ZoG agenda.
 
> I was there, in a Bradley,
 
Next time, try under a Bradley.
 
> and we could have rolled all over Baghdad, especially after what the
> Iraqi bastards did to the Kuwaitis, but it wasn't done. Unfortunately
> Saddam Hussein stayed in power.  There will not be a shred of a
> chance for peace in that region until he is DEAD.
 
Right.  Let's kill the only secular leader of the only secular
government in a region full of religious fruitcakes that either
believe that God has awarded them other peoples land in the Bible, or
that lopping off body parts is the appropriate punishment for
criticizing nonsense.  I didn't see Sadaam Hussein issuing any death
sentences against Salmon Rushdie.
 
> I don't think air strikes are the answer to this, and I think Clinton
> is a moron for his present policy, War is the worst thing that man can
> do to other men, and there is no such thing as "the good fight"... war
> is hell. Period.  Until you have been in a war, you have no idea of
> what you are talking about.
 
It's interesting that the nation that engaged in continuous national
nonstop whining over the kids in the exploding federal building
daycare center commits such crimes at the drop of a hat in other
countries, merely to send some ambiguous foreign policy message.
 
> But if you think that Iraq was "more right" or better yet, "less
> wrong", you need a radical lobotomy, or perhaps you've already had
> one.
 
I would be more than happy to put Sadaam in charge of Israel, Iran,
Saudi Arabia, and the UAE.  You know, Iraq is a multicultural nation.
It even has a Jewish communuity.  That's why "secular" is always
better than a religious state stuffing organized superstition and
paternalistic Sky-God fairy tales down the throats of its subjects.
 
> Evidently, you again know nothing of what the Iraqis did to the
> Kuwaitis on their way in to Kuwait.  Get educated, shithead.
 
So the fact that Iraqis may have mistreated Kuwaitis justifies George
Bush's order to destroy "everything that moves" on the only path out
of the impending American invasion, including civilians fleeing for
their lives with children in carseats?  That's the kind of logic I'd
expect from a professional babykiller.
 
> You sound like nothing more than disillusioned, spoiled, pompous
> asshole when you presume to know what Americans "understand".  Your
> anarchistic ravings only mark you for the idiot you are.
 
If you'd get your commanding officers cock out of your ass, and stop
listening to the propaganda they feed you, then maybe you would be
worthy of further discussion.
 
You have the choice to not join an army that commits atrocities on
foreign soil, and to refuse orders which conflict with whatever
remaining conscience you have.  If you join, and you go over there,
and you kill people, then you are no better than any other murderer.
 
Middle Eastern affairs pose no threat to the Constitution of the
United States, which is, after all, the only thing you are empowered
to defend by shooting at others.
 
> To everyone else besides Cordian who reads this, my apologies, but
> for all it's failings, I still have pride in America... ...not for
> all the foreign policy bullshit or the way the government fucks us
> over, or starts wars, or sticks their collective nose in other
> countries business...but for the fact that as a whole people,
> Americans still keep trying, everyday, to be a better people. I'm
> proud of that.
 
America needs a low-level format.  Soon.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
 






From eristic at gryzmak.lodz.pdi.net  Thu Feb 19 22:41:34 1998
From: eristic at gryzmak.lodz.pdi.net (Marek Jedlinski)
Date: Fri, 20 Feb 1998 14:41:34 +0800
Subject: Dealing with Spam, Part 1
In-Reply-To: <199802190557.XAA00934@manifold.algebra.com>
Message-ID: <34ee0fca.11042019@gryzmak.lodz.pdi.net>



Igor Chudov @ home wrote:

>To add to this, the spam blocking technology is widely available and can be
>used by anyone with half brain. 

So? I use filtering, too (procmail) with relatively good results as far as
it goes, but *so what*? Filtering is the last-stance defense. I should not
have to filter out spam.

I addressed the various weak sides of filters at length previously, so I
won't repeat that. Digest: filtering is heuristic, error prone, consumes
the maintainer's time and consumes machine resources (think of all the perl
scripts people are beefing up their procmail filters with). I have to
connect to my ISP to modify/upload filters - this itself costs me time and
money too.


Here's why I say I should not *have to* filter:

We pay for advertising when we purchase the advertised products. Sometimes,
as in the case of software, the price increase due to advertising costs is
very high. This is a disgrace, BUT it is not theft.

We do NOT pay for advertising if we do not choose to purchase the product.
If you don't but Coke, you don't pay for Coke's advertising. If you don't
use buses, you do not chip into the transport company's coffer, either.
This is generally regarded as "fair".

With spam, it's different. I am forced to pay for spammers' ad campaigns
(pay, that is, in the costs of greater phone bills and expended time) even
though I have never and will never purchase anything advertised by spam.
Can you see the difference? *This* is why spam is THEFT. Normally,
advertisers get your money only when you buy the product, so you do get
something in return. Spammers take money from you whether or not you want
their products - and hey, they take money from you even if you explicitly
tell them to stop (unworkable fake "remove" lists sold to other spammers,
filter bocks bypassed by forged headers, etc).


>My spam filters make me spend no more than 
>a minute or so a day on quickly reviewing and deleting spams.

A minute. Will it still be a minute when you get a thousand spams per day?
Ten thousand? And why not, seeing how many *million* businesses there are
that might one day decide to spam. It costs them next to nothing.

>I do it by saving all messages that are likely to be spam to a separate
>folder. A quick browse through subject lines of these messages is enough
>to delete them really quickly.

So you're just playing into the hands of the spammers, who tell you to
"just hit delete". You are thus helping them, by allowing them to continue
unchallenged. It's your choice, of course, but IMO it's nothing to be proud
of.

>In the future such spam detection is going to become a lot harder. 

It already is. But you are right, it *is* going to get harder still,
because spammers are constantly getting better at bypassing filter blocks.
This invalidates the notion that filtering is somehow an "adequate"
solution.

>Perhaps
>a system where the first time sender pays a refundable digital fee to
>the reader will become necessary.

In vaguely distant future, perhaps. Currently this kind of scheme is
plainly *impossible* to implement, because (a) e-cash is still not cheap
enough (i.e. it doesn't make financial sense to transfer sub-dollar
amounts); (b) because there's no widely accepted standard for e-cash
transfers; (c) whether e-cash or not, you could only implement such a
pay-per-message scheme within the US, perhaps, and within several
West-European countries. In other places, the banking systems in place are
too behind-the-curve to allow this to work. Me - for instance - I have no
cheap *and* fast way of transferring foreign currency abroad (no, not even
with a regular VISA that I have). I'll skip the irrelevant details, but I
can explain it at length to anyone interested - but basically most banks in
Poland want you to have a separate dollar account for such transfers, with
a sum like $10.000 *frozen* in the account to use VISA internationally.
That's far more than I can afford, and I'm in the mid-range earnings
bracket. (Yes, this also means I can't order from online stores such as
amazon.com et al.)


.marek

-- 
Invalid thought. Close all mental processes and restart body.
Largactil Caf� http://www.lodz.pdi.net/~eristic/index.html
Send message with GET PGP_KEY in subject for PGP public key.
Hail Eris. *plonk* trolls. Fight spam: http://www.cauce.org/






From whgiii at invweb.net  Thu Feb 19 22:42:12 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Fri, 20 Feb 1998 14:42:12 +0800
Subject: PLO censoring pro-Iraqi sentiments
In-Reply-To: 
Message-ID: <199802200656.BAA31853@users.invweb.net>



-----BEGIN PGP SIGNED MESSAGE-----

In , on 02/19/98 
   at 08:04 PM, Tim May  said:

>And as for the thread name here, "PLO censoring pro-Iraqi sentiments,
>it's reprehensible that the U.S. is pushing a "peace process" which
>condones this kind of censorship. Better to just let the Arabs fight the
>Jews, without any funding from U.S. slave-taxpayer-units. If the Arabs
>kill all the Jews I'll say it was a really, really stupid ideas for a
>bunch of Jews from Poland and Germany and Russia to go kick out a bunch
>of "sand niggers" and "ragheads" and not expect retribution to someday
>arrive.

>Oh, and spare me the typical Zionist rhetoric about how "YHWH" or
>Whatever It's Damned Name Is "promised" this land to the Jews, despite
>their Polish or Russian or Ukrainian residency and genetics for thousands
>of years.

Well the polotics of the middle east and the history of the Jews both in
and out of Israel are much more convoluted that Tim and other would make
it out to be.

I find it quite intresting how members will bemone the plight of the
Plaistinians in Israel yet no one ever mentions the fact that 80% of the
population of Jordan is Palistinian. Nor do they mention the reasons *why*
the PLO was operating out of Lebanon in the 70's and early 80's (for those
of you who don't know it's because they tried to overthrow the government
in Jordan and the King sent the troops out to slaughter them.) Nor is
there any mention that historically there was never any county of
Palistine until the British created it out of what was known as
Trans-Jordan which again was a creation of the British after the defete of
the Ottoman Empire (the Turks for the less informed) durring WWI. Lets not
forget that the British promised both the Jews and the Palistinians their
own country (unfortunatly they promised them both the same peice of land).
And god forbid no one ever mentions the fact that the UN created both a
State of Israel and a State of Palistine in 1945 and the Palistinians
rather than declare thier independence and form a governemnt joined with
the rest of the Arab states in going to war against the Jews currently
living in Palistine. They then were promptly handed their asses by the
Israelies *without* help from the British or the US (as an intresting side
note it was the Russians who were the first to reconise the State of
Israel not any of the western governments).


Now some may wish to extend the lame argument that the British didn't have
the right to carve up the middle east nor did the Jews have the right to
immegrate to Israel. Well the simple fact of the matter is that *every*
country in exsistance today has been created by one group of people
conquering another. All the countries of North *and* South America were
formed that way. The empires of the Incas and Aztecs were formed the same
way. The various tribes of North America gaind control of their "huntting
grounds" by taking them away from those that were there before.


So wine and cry all you want about Israel and the Evil Zionist but they
have the strongest military in the area (and one of the best skilled in
the world) and they have a shitload of Nukes. They ain't going anywhere
with or without any help from the US. (for those of you silly enough to
think the US should force them out or let the Russian backed Arabs do the
job I sugest a reading of the Masada Plan).

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: OS/2: Windows with bullet-proof glass.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO0UDI9Co1n+aLhhAQHSLAP9HAyo1XLrUBDxOAmD6morAc3lWm1BTwT1
Zgy25qU+Ei6wm/xglKA2QJJ3XfxdQKjcKi/KQqtNNiUhAh8sF5vwQzASG1czkRkP
AKEc78EGNT8EaiiPwrSa5+Zm3WSGh9PftpHgPInFXKOGrJrCfo0cyn57Ub5lJLt2
AhVvvDLNAQo=
=XyzX
-----END PGP SIGNATURE-----






From tcmay at got.net  Thu Feb 19 22:59:09 1998
From: tcmay at got.net (Tim May)
Date: Fri, 20 Feb 1998 14:59:09 +0800
Subject: The Eloquence of Eric J. Tune
In-Reply-To: <3.0.5.32.19980219204255.007c3680@pop3.lvcablemodem.com>
Message-ID: 



At 8:42 PM -0800 2/19/98, Eric J. Tune wrote:

>You ever served in the military?  Unless you've been under fire, you should
>shut the fuck up about shit you know nothing about nor could comprehend.
...
>Listen up jerk.... "Don't start no shit and there
>won't be no shit"... ever heard that, asshole?
...
>Get educated, shithead.
...
>You sound like nothing more than disillusioned, spoiled, pompous asshole


Such eloquence! He must've learned it in the military.

Very persuasive, too. Persuasive to a certain kind of person.

Wasted on this list, though.


--Tim May


Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.








From bill.stewart at pobox.com  Thu Feb 19 23:21:39 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Fri, 20 Feb 1998 15:21:39 +0800
Subject: onward, Clinton soldiers / not so fast, Sen. Lott
In-Reply-To: <19980220.000200.attila@hun.org>
Message-ID: <3.0.5.32.19980219223651.007da660@popd.ix.netcom.com>



>Iran's popular, elected leader, Mohammed Mossadegh, attempts to
>assert Iranian control of his nation's oil industry, whose
>profits go to the US and Britain.  A CIA coup overthrows
>Mossadegh, and puts `our boy' Reza Shah on the throne.  Iran's
>US-trained secret police keep the Shah in power through a reign
>of terror.  Islamic-nationalist revolution sweeps Iran in 1979,
>ending US domination.

A minor correction - while the CIA wanted to overthrow Mossadegh,
they screwed up, and had very little part in actually doing it.
The British were the main instigators of the coup, which had a 
fair amount of popular support, and which went fast enough that the
CIA was caught by surprise - they hadn't even spent a tenth of their
bribery slush fund yet.  

So why does everybody keep saying that the CIA put the Shah in power?
Because in the early 60s, trying to repair their reputation after the
Bay Of Pigs fiasco, the CIA put out a lot of PR taking credit for it,
and since it was the kind of thing they would have done if they 
hadn't missed the starting gun, people pretty much believed them.
And a lot of Iranians have been blaming them for it ever since.

[References:  Some book I read a while back.  Don't remember the
title or the author, but the author was Iranian, so he may have
had his own axe to grind; certainly the CIA had their cloak and dagger
to grind in this whole mess.]

				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639






From bill.stewart at pobox.com  Thu Feb 19 23:23:05 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Fri, 20 Feb 1998 15:23:05 +0800
Subject: Anthrax--The Horsemen are Riding
In-Reply-To: <199802192135.WAA17978@basement.replay.com>
Message-ID: <3.0.5.32.19980219231708.007da950@popd.ix.netcom.com>



>> Nonsense.  This has nothing to do with Saddam.  These men are from the
>> Aryan Nation, a militia group (and one which Tim secretly supports, being
...
>This has everything to do with Sadaam.  These individuals came to the
>attention of the government a long time ago, have been under surveilance,
>and their carefully timed arrest today, at the precise moment needed to
>give the Sheeple an overdose of Biological Warfare sound bytes, is hardly

The Wag The Dog war has almost nothing to do with Saddam, but I agree
that the Anthrax Nation supporters are being brought out specifically
to scare the population.  One of the comments on the radio was that
the perp was bragging about having military-grade anthrax.
They didn't say whose military was in the anthrax-grading business,
but it's probably those evil manufacturers of weapons of Mass destruction --
The Pentagon.  

.  Are we going to have to levitate the Pentagon again?
Is there some way to just do it over the net?  :-)


And yes, even through Freeh hasn't been quoted about the need for
wiretaps in the radio stories I've heard so far, I'm sure he will be.

> Of course, it could also just be monumental stupidity on his timing (to
> confirm the FBI's "dumb criminal" model).
Nah - he's a perpetual "usual suspect" type.
				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639






From tcmay at got.net  Thu Feb 19 23:31:14 1998
From: tcmay at got.net (Tim May)
Date: Fri, 20 Feb 1998 15:31:14 +0800
Subject: Letting Israel Twist Slowly in the Desert Wind
In-Reply-To: 
Message-ID: 



At 8:48 PM -0800 2/19/98, William H. Geiger III wrote:

>I find it quite intresting how members will bemone the plight of the
>Plaistinians in Israel yet no one ever mentions the fact that 80% of the
>population of Jordan is Palistinian. Nor do they mention the reasons *why*

So? The land taken from a Palestinian farmer and given to a Polish Jew, for
example, remains his, morally. That a neighboring country has many persons
similar to him does not reduce his loss.

80% of Oregon is Aryan, just as I am. And yet if a bunch of Jews, for
example, kicked me off my land, land I had title to, and I fled to Oregon
to live in a tent, I'd still be fighting those who kicked me off my land.
Even if the Jewish Grand Foofah declared that God had "given" California to
the Jews 3000 years ago.

Oregon is under no obligation to absorb the Aryans kicked out of California
by the Jews. And the farm or land lost is still lost, regardless of any
"absorbtion." The canard about how Jordan is racially similar to the
Palestinians is neither here nor there...the Palestinian farmer who used to
grow oranges in Jaffa is hardly satisfied to learn that his land has been
stolen by a Polish Jew, but that neighboring Jordan has a lot of
Palestinians!

(BTW, I use the word Aryan in place of the word Caucasian, which is no
longer in scientific use, and was a dumb characterization of Aryans,
anyway. )

>the PLO was operating out of Lebanon in the 70's and early 80's (for those
>of you who don't know it's because they tried to overthrow the government
>in Jordan and the King sent the troops out to slaughter them.) Nor is
>there any mention that historically there was never any county of
>Palistine until the British created it out of what was known as

Who cares if their was a nation-state or not? Just give them back their
land. Period. Nation-states are a modern creation anyway.

>Trans-Jordan which again was a creation of the British after the defete of
>the Ottoman Empire (the Turks for the less informed) durring WWI. Lets not
>forget that the British promised both the Jews and the Palistinians their
>own country (unfortunatly they promised them both the same peice of land).
>And god forbid no one ever mentions the fact that the UN created both a
>State of Israel and a State of Palistine in 1945 and the Palistinians
>rather than declare thier independence and form a governemnt joined with
>the rest of the Arab states in going to war against the Jews currently
>living in Palistine. They then were promptly handed their asses by the
>Israelies *without* help from the British or the US (as an intresting side
>note it was the Russians who were the first to reconise the State of
>Israel not any of the western governments).

I agree it's a mess. So why is the U.S. sending $5 billion a year extorted
from American slave-units to subsidize Israel's military and lifestyle, and
about as much to Egypt to subsidize whatever corruptions it favors?

I say pull out, stop the funding, and let American Jews send their money if
they want to. Let the Arabs and Jews fight it out. Just don't require me to
pay for it or to pay for soldiers to be sent to defend one side or the
other.

And use crypto and suchlike to destabilize the Zionist regime in various ways.


>Now some may wish to extend the lame argument that the British didn't have
>the right to carve up the middle east nor did the Jews have the right to
>immegrate to Israel. Well the simple fact of the matter is that *every*
>country in exsistance today has been created by one group of people
>conquering another. All the countries of North *and* South America were
>formed that way. The empires of the Incas and Aztecs were formed the same
>way. The various tribes of North America gaind control of their "huntting
>grounds" by taking them away from those that were there before.

Whatever the history lesson, all I ask is that slave labor (taxes) not be
used over there, nor that cannon fodder be sent over there to die.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.








From bill.stewart at pobox.com  Fri Feb 20 00:15:53 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Fri, 20 Feb 1998 16:15:53 +0800
Subject: Cryptographic Implementations
In-Reply-To: <199802180733.NAA15038@u10.serc.iisc.ernet.in>
Message-ID: <3.0.5.32.19980219235016.0089fa80@popd.ix.netcom.com>



At 01:03 PM 2/18/98 +0530, Akshay Vashist wrote:
>Hi,
>   Could somebody point me to some of the software implementations
>of the cryptographic algorithms ( RSA , DES ,3DES ) .Actually,
>Iam interested in evaluating their performance on firewalls etc.,
>so if there are sites, that contain their performance metrics/data
>and the time it takes to break them ( approximately , on an average
>m/c say sun ultra sparc ), please  do mail  me.Any help is welcome.

There are a lot of good crypto web and ftp sites.
Look at ftp.ox.ac.uk and ftp.funet.fi .
Look at Ron Rivest's pages (AltaVista knows where they are.)


				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639






From bill.stewart at pobox.com  Fri Feb 20 00:20:49 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Fri, 20 Feb 1998 16:20:49 +0800
Subject: Dealing with Spam, Part 2
In-Reply-To: <2358.199802181427@cronus>
Message-ID: <3.0.5.32.19980220001517.008a6300@popd.ix.netcom.com>



At 02:27 PM 2/18/98 +0000, T.G.Griffiths at exeter.ac.uk wrote:

>Mark at unicorn.com makes a good point about MailGuard.
>If A and B both run MailGuard, and neither is on the
>other's allowed list, do you get an infinite bounce
>when A mails B or does the prog. get around it? I can
>think of a couple of ways, but what does MailGuard do?

The classic implementations of systems like that do
one of three things
0) Don't think, leading to infinite mailbounces
	(often caught in testing, since it's very bad.)
1) Prevent loops, but there's no way to communicate
2) Prevent loops, and recognize mail from other MailThingies,
	which makes it easy for Spammers to forge.

If you get fancy, you can probably work something like
	Receive message
	Send and record Alice-cookie ->
			<-- Reply with Alice-cookie and new Bob-cookie
	verify Alice-cookie and accept message
	Reply to Bob-cookie
			--> Verify Bob-cookie for future use

				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639






From whgiii at invweb.net  Fri Feb 20 00:40:14 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Fri, 20 Feb 1998 16:40:14 +0800
Subject: Letting Israel Twist Slowly in the Desert Wind
In-Reply-To: 
Message-ID: <199802200908.EAA00130@users.invweb.net>



-----BEGIN PGP SIGNED MESSAGE-----

In , on 02/19/98 
   at 11:23 PM, Tim May  said:

>So? The land taken from a Palestinian farmer and given to a Polish Jew,
>for example, remains his, morally. That a neighboring country has many
>persons similar to him does not reduce his loss.

Well before the Israel war of Independence no one was kicked off their
farmland. There was a native population of Jews that lived there and own
their own land. Those who migrated there durring the 1st half of the
century *bought* the land that they lived on and also actively created new
land that was fallow. Much of the current farmland in Israel was not
stolen from the Arabs but came from swamps that were drained and deserts
that were irrigated (much of Israel was either swamp or desert before the
Jewish Immigration started).

The plight of the plaistinians after 1945 is known as the "spoils of war"
and since the palestinians were the *aggressor* I have no simpathy for
them (ya pay your money ya take your chances).

 It is really no surprise that so few Americans have any
understanding of the History or Politics of the region.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: OS/2: Logic, not magic.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO0yzo9Co1n+aLhhAQH1fwP/UvNUexgTHE2jQB6cUShwASG2A+2x70Os
iZP05PNGd049GFoBvXq5j3nKE/II95uouyQCsnpTXzUOjNniU6eH2x5fmxd7TBQg
Z+5X05+8yPYfi9kbxMg2ktvFIBjN+nMHmsO6nWKueqJNPh+Ru/C5p3UJNRA9M7ya
YlWKjkNFmpA=
=lA5+
-----END PGP SIGNATURE-----






From postmaster at mail.opentown.com  Fri Feb 20 16:41:10 1998
From: postmaster at mail.opentown.com (postmaster)
Date: Fri, 20 Feb 1998 16:41:10 -0800 (PST)
Subject: (¿ÀÇŸ¿î °øÁö¸ÞÀÏ)¿ÀÇÂÄ«Áö³ë °æÇ° ´ëÀÜÄ¡!
Message-ID: <9802200305.AA21758286@mail.opentown.com>


HTTP://WWW.OPENTOWN.COM

�ѱ��� ������ ī������� ����Ʈ ����Ÿ��� ������� ��ǰ�̺�Ʈ ��縦
�����մϴ�.
��������� �Ʒ��� �����ϴ�

������� : 1998�� 2�� 9�� ~ 3�� 10�� ����(12:00 ����)
��系�� : ���� ����� 346ï¿½í¿¡ï¿½ï¿½ Ǫ���� ��ǰ
�������� : ���Ըӽ�
���ӹ�� : 1ȸ�� 30�� ���� ������ ���� ����
��ǰ����
   1�� : ��޿���� ��Ʈ 1��(100�������)
   2�� : PCS�� 5��
   3�� : 56K��Ӹ� 10��
   4�� : ������ī��Ʈ 10��
   5�� : �׿�Į��߻� 20��
   6�� : MGMī����Ĩ ï¿½ï¿½ï¿½ï¿½í¸® 300��(���� ī���뿡�� ���̴� Ĩ����
���۵�)
���� �̺�Ʈ : ����ī���뿡���� ���ο� �������� �������� �̺�Ʈ ��縦
������ �����Դϴ�. 
���� ����� �ּ���... 

����ִ� ����ä�õ� ���� ���Դϴ�.
���� ī���뿡���� Gostop, Slot, Baccarat, Roulette, Drawpoker,
BlacJack�� �پ��� ī���� ������ 
����� ���� ���Դϴ�.  Ư�� ï¿½í½ºï¿½ï¿½ï¿½ï¿½ Ǫ���� ��ǰ�� �ɷ��ִ� �̺�Ʈ����
�� �αⰡ ����
�������� �ʹ��� ���� �е��� ���� �ֽ��ϴ�.  ������ �����̶��
���������� ������ ������ �������� ��ܺ�����.
�ٸ� ī���� ���ӵ� ��� �������̸� ����� ���ο� ���Ӹ� ���� �������� 
�� û�ҳ���� ���� ���ӵ� ������ ���� �� �����Դϴ�.

Good Luck!

http://www.opentown.com







From bill.stewart at pobox.com  Fri Feb 20 01:31:38 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Fri, 20 Feb 1998 17:31:38 +0800
Subject: Declan pro-cencorship (sorta) (fwd)
In-Reply-To: <199802180120.TAA06603@einstein.ssz.com>
Message-ID: <3.0.5.32.19980220011234.0089a100@popd.ix.netcom.com>



Unfortunately, there's a conflict between real definitions of spam
(you knew it when you sent it, and the recipients knew it too)
and the real-world problems encountered with blocking/canceling spam,
which tends to result in either censorship or under-blocking.
Number of recipients _isn't_ the right criterion at all -
but it's objective enough to agree on, and usually makes a
clear enough boundary between most spammers and most non-spammers.
Rigidly defining numerical limits can also have serious problems,
because there are good messages that get excluded.

The more important number is the number of people deciding
which things are and are not spam - "More than 1" is best,
while "There can be only one" is censorship, either deliberate
or as a side-effect.

At 10:52 PM 2/17/98 -0500, Robert A. Costner wrote:
>At 07:20 PM 2/17/98 -0600, Jim Choate wrote:
>>So, we actualy do agree that the number of recipients is irrelevant.
>
>When it comes to spam, the ONLY thing that is relevant is the number of
>recipients, and whether these recipients have offered some form of implicit
>or explicit permission to receive the email.  
...
>Any attempt whatsoever to define spam in terms of content and how liked or
>not liked the message is, interferes with traditional 1st amendment
>definitions of speech, if codified in law or promulgated through (gov't)
>rules.  Ignoring first amendment concerns, any attempt to define spam in
>terms of anything other than numbers causes a severe curtailing of the true
>communication and business purposes of the internet.  


				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639






From bill.stewart at pobox.com  Fri Feb 20 01:32:00 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Fri, 20 Feb 1998 17:32:00 +0800
Subject: Declan pro-cencorship (sorta) (fwd)
In-Reply-To: <199802151803.MAA24764@einstein.ssz.com>
Message-ID: <3.0.5.32.19980220005636.007e6a00@popd.ix.netcom.com>



Unlike the rest of this discussion, Jim is mostly right here,
and in a way that neither censors anyone nor discourages them
from providing filtering services for people who want it.
However, Wabe is reinventing NoCeMs - which support multiple 
NoCeM issuers, and you can pick any one or more that you like
to kill off spam for you before you read it.  I'm not sure
how widely available implementations of NoCeM mailreaders are;
probably they're mostly Emacs macros.

On the other hand, while the Cypherpunks list gets lots of noise,
it doesn't get much spam (except when somebody's targeting it),
Filters that pick out the most interesting 10% are much more useful
than filters that discard the bottom 10%.
Attacking the list, while less suicidal than spamming alt.2600,
is still not very bright, given the potential risks :-)



>> Date: Sun, 15 Feb 1998 12:40:39 +0000
>> From: wabe 
>> Any reason Cyperpunks couldn't set up a distributed "spam innoculator?"
>> 
>> If I get spam, I'd send it to "spam at cypherpunks.com" and then spam would
>> send a fingerprint to all of our modified netscape messengers, which have been
>> programmed to erase any messages which match that fingerprint.
>> 
>> Then, if one person sees a spam message and declares it spam, no one
>> else has to see it. (If they get the message from spam at cypherpunks in time.)

At 12:02 PM 2/15/98 -0600, Jim Choate wrote:
>What makes you think you are suitable to decide what others want to see?
>How is this any different than any other form of censorship? This exact
>issue is why the CDR was setup with multiple nodes.


				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639






From csm70830 at port.ac.uk  Fri Feb 20 01:32:02 1998
From: csm70830 at port.ac.uk (Paul Bradley)
Date: Fri, 20 Feb 1998 17:32:02 +0800
Subject: No Real Debate Yet on the War
In-Reply-To: 
Message-ID: <89B3250098@ou20.csm.port.ac.uk>




> * speaking of plans, the plans are very vague. The public does not know
> what the goals of a war might be, what the endgame options are, how many
> Americans are likely to die, what the likely counterpunch will be (hint:
> think terrorist attacks), and just how the U.S. plans to fight a war
> without clear goals and clear support.

Yes, it will be a great sight indeed to see Iraqi freedom-fighters 
bombing the hell out of soft targets in America, Britain, Australia 
and any other imperialist countries who like to consider themselves 
among the world police. 


> * essentially no one thinks a bombing campaign will either kill Saddam, who
> moves around a lot to highly secret locations (including houses of
> peasants), or will destroy all of those small cannisters of anthrax and
> sarin and the like...when asked, Albright and Cohen are vague and
> dissembling.

The same is true in the UK, a few days ago I saw a television 
interview (I rarely watch such rubbish but I sometimes like to laugh 
at the spin, but it also depresses me that most citizen-units swallow 
this crap) with some government minister who said that "We can attack 
strategic points along the production line without releasing any 
chemical agents", another lie. It is also a commonly held public 
misconception that there is such a thing as a "precision bombing 
campaign" (government spindoctor term) which most people believe 
implies a campaign where no-one is injured but we miraculously win 
a war without any casualties.  
The more American, British, Australian, French etc. troops that die 
in the Gulf War II (tm), the more the western world will realise that 
war involves losses and that we cannot go on policing the world.  

 
--                  
                            Paul Bradley 
                      paul at fatmans.demon.co.uk
       "Why should anyone want to live on rails?" - Stephen Fry






From bill.stewart at pobox.com  Fri Feb 20 01:33:29 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Fri, 20 Feb 1998 17:33:29 +0800
Subject: financial incentives for hashcash?
In-Reply-To: <83C932393B88D111AED30000F84104A70A1F27@indyexch_fddi.indy.tce.com>
Message-ID: <3.0.5.32.19980220012637.008994c0@popd.ix.netcom.com>



At 12:13 PM 2/17/98 -0500, Fisher Mark wrote:
>I am curious -- does anyone have any statistics on how much spam (what
>percentage) is done via SMTP relay?  To me, using the SMTP service of
>someone/something you don't know to send 1000's/10,000's/more of email
>messages seems pretty unfriendly at best.  

Yes, it's one of the major techniques used by spammers;
the other big one is disposable accounts.
maps.vix.com has information about the Realtime Blackhole List
system, which lets you configure your sendmail system to reject
incoming mail from any system that permits relays,
and provides lots of information about setting your system
not to do relays.  They're a bit inflexible,
but if you're up to rolling your own sendmail.cf code,
you can fix that.
				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639






From bill.stewart at pobox.com  Fri Feb 20 01:34:39 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Fri, 20 Feb 1998 17:34:39 +0800
Subject: Declan pro-cencorship (sorta) (fwd)
In-Reply-To: <199802152303.RAA27009@einstein.ssz.com>
Message-ID: <3.0.5.32.19980220010711.008ae250@popd.ix.netcom.com>



At 05:03 PM 2/15/98 -0600, Jim Choate wrote:
>Then you are saying that the only way to send email to yourself, for
>example, is to contact you prior to the transmission and obtain your
>permission to send the traffic?

That's fine - people who take this approach may get less mail
from interesting people as well as getting less mail from spammers.
It's easy to find mail forwarding systems that don't cost much
and will filter out well-known spam, either for free or for a small fee.
Pobox.com offers this, and I think the iname.com systems do also;
I don't know about hotmail and other web-based mailreaders.

>Why should the fact that I have a mailbox on my front porch while you use a
>mailbox (that you pay extra for) at the post office matter to my ability to
>send you a letter in the mail? Should I call you on the phone and ask your
>permission before sending it? Should I not get some mechanism to contact
>you before contacting you using the phone? No ,I assume because local calls
>are flat rate and therefore don't increase your out of pocket expense? Then
>perhaps the problem is you're choice of payment for net connections? Why
>does your choice of personal expense effect my ability to send traffic?

Most of us have flat-rate email, and the important cost is 
our attention span, not the transmission cost.  For other people,
that's not true, and sending them junk mail _is_ ripping them off
financially as well as ripping off their time and concentration.

As far as "how do you know something is bulk mail"?  The sender knows,
and the sender is the one being rude to thousands of receivers
if it is bulk mail.

>If we accept the free-market view then we should expect all net connections
>to be flat rate since this provides the consumer, the final arbiter in
>free-market theory, the most bang for the buck.

This does not apply in countries that still have
Government-granted Monopoly Postal/Telephone/Telegraph companies.
It also doesn't apply in places where the Telephone Company
decides to charge for connect time by the minute rather than
flat rate - even if your internet provider is flat rate,
you may be paying 1-5 cents/minute - mildly annoying on a 
US salary, and much more so on a Polish salary.

And in a free market, you'd expect a mix of options,
since different people have different net connection needs,
financial constraints, and communications costs.
My main ISP offers an 800 number for about 10 cents/minute,
and I sometimes use it when I'm on the road at hotels with
stupider-than-usual telephone systems.

				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639






From hjk at ddorf.rhein-ruhr.de  Fri Feb 20 01:50:33 1998
From: hjk at ddorf.rhein-ruhr.de (Heinz-Juergen Keller)
Date: Fri, 20 Feb 1998 17:50:33 +0800
Subject: your mail
In-Reply-To: <241e4ef7f128aa790d464cb6e45d4dd2@anon.efga.org>
Message-ID: 



-----BEGIN PGP SIGNED MESSAGE-----

On Thu, 19 Feb 1998, Anonymous wrote:

 
> In case my last message doesn't get through,
> I'm looking for info on how one can create and
> use a persistent Nym. I looked and can't find
> info on how to do this anywhere (besides the
> creation of a "free" email account somewhere).
> Can any cypherpunks help?
> 
> Thank you.
> 
> 
Lutz Donnerhacke is working on something you might like.
Have a look at http://www.iks-jena.de/mitarb/lutz/anon/as-node.en.html.

- -------------------------------------------------------------------------------
  Heinz-Juergen Keller     hjkeller at gmx.[net,de]
  2047bit PGP Public Key : http://www.ddorf.rhein-ruhr.de/~hjk/
  MD5 Fingerprint: 4d33126fbf8c1bcd8e96ba90d99f0bdc
- -------------------------------------------------------------------------------


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv

iQEVAwUBNO1Q4CZWWJBRAP1VAQH0Agf/QLUl8XNlwmaXAn11+5EUn8NfoJV0PfP9
hkor4vhM98aTCiBCVZaZyNGN/enl501GYr6hTuOg7J6ZBWU0oXhYbSnYBxmD6h7r
rYp36Pyjtq5pbZrSGXz1OpRNUrnqEG31UlF7M0BgtlJYCc5iCdafN8iuHp5kbQRV
J/MHDURv5I0rPpybb2GnrcbxE38z7V9V4mQiRO6OJPJu7rO5Dpm7IHorIgjs3kv0
IV+laPgKYwM7w0xR88I4k+kYwVxVJBB8ekVcWlb+xz90VSVDL/0yJ64/okPf9ipd
sXIWsOPtaYu1qfW/fsabkuwXhGNNfDzCTUgDdJMV3bfnZek+vMMB6Q==
=4F5b
-----END PGP SIGNATURE-----






From whgiii at invweb.net  Fri Feb 20 02:09:10 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Fri, 20 Feb 1998 18:09:10 +0800
Subject: Declan pro-cencorship (sorta) (fwd)
In-Reply-To: <3.0.5.32.19980220011234.0089a100@popd.ix.netcom.com>
Message-ID: <199802201034.FAA00842@users.invweb.net>



-----BEGIN PGP SIGNED MESSAGE-----

In <3.0.5.32.19980220011234.0089a100 at popd.ix.netcom.com>, on 02/20/98 
   at 01:12 AM, Bill Stewart  said:

>The more important number is the number of people deciding
>which things are and are not spam - "More than 1" is best,
>while "There can be only one" is censorship, either deliberate or as a
>side-effect.

The biggest problem I see with the various spam "solutions" are the
side-effects which universally are more repugnant than the original
"problem".

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: OS/2: Logic, not magic.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO1HJo9Co1n+aLhhAQGpoAQAvsUo/DjWyaa3vTBQ7HUyIu8QAqN0N3GA
P6UMTdRY61WviU1EVXGlUavFm3BIsHd6G/UD7W6CcMWCYuYtug4cH2D4jpk1lO8k
s1lQuDNdM6bNJMxhZFUPn4gvUR2QcoSr0txsNMQVJkmM4aEA5cnLwO6A1x8CQq4W
j2E8SoIiDFw=
=acT+
-----END PGP SIGNATURE-----






From whgiii at invweb.net  Fri Feb 20 02:17:29 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Fri, 20 Feb 1998 18:17:29 +0800
Subject: No Real Debate Yet on the War
In-Reply-To: <89B3250098@ou20.csm.port.ac.uk>
Message-ID: <199802201043.FAA00924@users.invweb.net>



-----BEGIN PGP SIGNED MESSAGE-----

In <89B3250098 at ou20.csm.port.ac.uk>, on 02/20/98 
   at 09:27 AM, "Paul Bradley"  said:

>The more American, British, Australian, French etc. troops that die  in
>the Gulf War II (tm), the more the western world will realise that  war
>involves losses and that we cannot go on policing the world.  

Well if the US was to really take the moral HighGround on this they would
be bombing France and Germany for supplying them with CBW supplies for
years.

Does anyone have a French body count from when Israel blew up the breader
reactor they were building in Iraq back in 1980? (I am sure it was far too
small).

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: Bugs come in through open Windows.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO1JM49Co1n+aLhhAQE6gAQAovGA/woNwxyJZoiPngh+xfr61kukB+sr
UQt1DP2e0d2w4GRcYRbAO7DGe4LlgiDMT+hxzKPyhqyZKW+ZeqF7Y947LtzvF7vd
0/3OQCXBeeu/YfxtBjraDtsfFloluTguDaNtjpJ2cw+MSybYss1bh5xtS+o8ta+x
2ohEZ7N8bXI=
=XPgz
-----END PGP SIGNATURE-----






From bdolan at USIT.NET  Fri Feb 20 02:52:28 1998
From: bdolan at USIT.NET (Brad)
Date: Fri, 20 Feb 1998 18:52:28 +0800
Subject: Letting Israel Twist Slowly in the Desert Wind
In-Reply-To: 
Message-ID: 



It's interesting that there has been much effort recently to return
property stolen in the '30s and '40s by Nazis and communists to the
descendents of the original owners.  For example a Romanian friend
recently got his family farm back.  And then there is the "Swiss/Nazi 
gold" thing.  But, so far, I haven't heard many calls for refunds and
property returns in the middle east.

bd

On Thu, 19 Feb 1998, it was written:

>[...]
> 
> >Now some may wish to extend the lame argument that the British didn't have
> >the right to carve up the middle east nor did the Jews have the right to
> >immegrate to Israel. Well the simple fact of the matter is that *every*
> >country in exsistance today has been created by one group of people
> >conquering another. All the countries of North *and* South America were
> >formed that way. The empires of the Incas and Aztecs were formed the same
> >way. The various tribes of North America gaind control of their "huntting
> >grounds" by taking them away from those that were there before.
> 






From bdolan at USIT.NET  Fri Feb 20 04:55:39 1998
From: bdolan at USIT.NET (Brad)
Date: Fri, 20 Feb 1998 20:55:39 +0800
Subject: Anthrax--The Horsemen are Riding
In-Reply-To: 
Message-ID: 





Watching the tube:

Andrea Greenspan just did the standard scare piece about the useful
idiots, Larry Wayne Harris & Co.  Then Kallstrom (thought he was retired!)
appeared, to warn vaguely of the need for more wiretaps and less
encryption.

One thing you can say for these guys:  they're predictable.

bd






From rah at shipwright.com  Fri Feb 20 05:57:48 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Fri, 20 Feb 1998 21:57:48 +0800
Subject: Feb. 22 column - privacy, long version
Message-ID: 




--- begin forwarded text


Resent-Date: Thu, 19 Feb 1998 21:28:11 -0700
X-Sender: vin at dali.lvrj.com
Mime-Version: 1.0
Date: Thu, 19 Feb 1998 20:25:09 -0800
To: cathy at engr.colostate.edu
From: Vin_Suprynowicz at lvrj.com (Vin Suprynowicz)
Subject: Feb. 22 column - privacy, long version
Resent-From: vinsends at ezlink.com
X-Mailing-List:  archive/latest/440
X-Loop: vinsends at ezlink.com
Precedence: list
Resent-Sender: vinsends-request at ezlink.com


    FROM MOUNTAIN MEDIA
    EDITORS NOTE: This is the longer version of "privacy," at 2,900 words.
A shorter,          2,400-word version also moves.
    A VERSION of this essay originally appeared in "Las Vegas" magazine.
    FOR EMBARGOED RELEASE DATED FEB. 22, 1998
    THE LIBERTARIAN, By Vin Suprynowicz
    Big Brother wants your number

    The New York Times is generally in editorial favor of any government
intervention you can name. Most would agree it is the furthest thing from a
marketplace of paranoid, feds-are-out-to-get-us conspiracy theories.

  Even Times columnist William Safire is hardly a true Libertarian -- Mr.
Safire still believes "No sensible passenger minds the frisking for bombs
at airports."

  (I guess I'm not very sensible; it seems to me anyone who has ever put
any real effort into getting around such Fred-and-Ethel security screens
has succeeded, while the REAL target of all the sniffing and scanning
appears to be the now-prohibited  transport of tax-free agricultural
extracts and untaxed currency.)

  Anyway, more significant than what Mr. Safire actually wrote for
publication on Jan. 8, 1998, is where it was published: America's
pro-government paper of record, The New York Times.

  Mr. Safire warned, in part:


  "WASHINGTON -- Your right to privacy has been stripped away. You cannot
walk into your bank, or apply for a job, or access your personal computer,
without undergoing the scrutiny of strangers. You cannot use a credit card
to buy clothes to cover your body without baring your soul. Big Brother is
watching as never before.

  "Encouraged by an act of Congress, Texas and California now demand
thumbprints of applicants for drivers' licenses -- treating all drivers as
potential criminals.

  "Using a phony excuse about airplane security, airlines now demand
identification like those licenses to make sure passengers don't exchange
tickets to beat the company's rate-cutting promotions.

  "In the much-applauded pursuit of deadbeat dads, the Feds now demand that
all employers inform the government of every new hire, thereby building a
data base of who is working for whom that would be the envy of the KGB. ...

  "Hooked on easy borrowing, consumers turn to plastic for their purchases,
making records and sending electronic signals to telemarketers who track
them down at home. ...

  "Enough.

  "Fear of crime and terrorism has caused us to let down our guard against
excessive intrusion into the lives of the law-abiding. ... But doesn't this
creeping confluence of government snooping, commercial tracking and
cultural tolerance of eavesdropping threaten each individual American's
personal freedom? And isn't it time to reverse that terrible trend toward
national nakedness before it replaces privacy as an American value? ..."


  Unfortunately, Mr. Safire stopped short, in that January column, of
calling for an end to government "ID cards" of any sort, an end to
mis-labeled "airport security" checkpoints, an end to the very "War on
Drugs" under which most of these new interventions have been justified.

  He also ran the risk of diverting attention from the government as the
major culprit here, by treating as equally culpable the kind of folks who
collate data from warranty cards -- hardly the folks who have the right to
raid your home and throw you in jail if they don't like what they find.

  (On my list of things that concern me, my supermarket knowing what brand
of catfood I prefer still ranks somewhat below armed government agents
tracking where I travel, and how much cash I carry.)

  Finally, Mr. Safire suggest that we "Pay cash," which is harder to track.

  That advice might be fine, if the very pattern of abuses Mr. Safire
catalogs wasn't moving us rapidly toward the ballyhooed  "cashless
society."

  Already, the old $500 and $1,000 bills are nowhere to be found, and those
trying to withdraw more than $5,000 from their own savings accounts to buy
a used car or other large-ticket item find themselves being grilled by
their own government-regulated bankers -- amateur surrogates for the DEA
and IRS -- like so many money-laundering drug-dealers.


A rogue candidate

  That so-called "cashless society" is frequently on the mind of Aaron
Russo, former producer of such Hollywood films as "Trading Places" and "The
Rose," now running an iconoclastic long-shot 1998 GOP primary campaign
against Kenny Guinn -- former head warden of the Las Vegas government
schools and hand-picked anointee of the casino bosses -- for the
governorship of Nevada.

  Russo is campaigning on such populist issues as eliminating state
privilege taxes (so that car registration costs in Nevada would be limited
to "$35 and not one penny more" -- rather than surging upwards based on
blue-book value) and his vow to sue the federal government to fight the
taxation of Nevadans' "estimated" tips as income.

  But Russo has also includes in his platform opposition to such federal
steps as the wiring of all telephones for tapping (already authorized under
House Resolution 4922, which passed on Jan. 25, 1994), and the
aforementioned national law requiring all states to issue drivers' licenses
with thumbprints or other personalized "biometric" ID tags to serve as a
"national ID cards."

  Those stances have gained Russo the sobriquet of a "federal paranoiac"
from one well-established Nevada political columnist, who coincidentally
does not appear to have ever met a new tax he didn't think those in power
should have the "courage" to enact.

  "In my view, the wiretaps are authorized under a federal regulation, and
they cannot impose any federal regulations on any of the states," said
Russo, in between passing out cards to well-wishers during Sunday lunch at
the Celebrity Deli, on Flamingo near Maryland, as we took a break from an
afternoon watching the NFL playoff games ... liberally sprinkled with
$150,000 in TV campaign ads which Russo had bought in the one-week New
Year's period, just to put the opposition on notice that he's in the game.

  "The governor has the authority to go to the Supreme Court, and the
Supreme Court has to hear the case. You have something to stand on. A
senator or congressman needs other people to work with him. But in a
dispute between the feds and a state, the Supreme Court has the only
jurisdiction," says Russo, in the Brooklyn accent he has never shed. "So we
wouldn't have to go through the 9th District (Court of Appeals), like
anyone else. A governor can stop federal agents from coming into his state
to enforce these things; they need the permission of the individual county
sheriffs to try and enforce these laws within the state."

  I pointed out to Russo that skeptics will claim HR 4922 creates no actual
new wiretaps; it merely puts phone companies and others on notice that they
must wire their systems in such a way that federal agents can come in and
tap lines, if necessary, "pursuant to a court order or other lawful
authorization."

  "Then why, if it's only by court order the way it should be, does it say,
'or other lawful authorization'?" Russo asks, between bites of the corned
beef and pastrami. "That means any cop can request it," the same way your
bank account can now be frozen and levied with a mere letter from an IRS
agent -- no court order required.

  "Uri Dowbenko wrote a piece on this for the National Review; call him up."

  Russo obligingly supplied a copy of the federal law, which requires the
attorney general to tell congress how many "communication interceptions,
pen registers, and trap and trace devices" federal agents expect to need in
the next four years. A dutiful subordinate of Attorney General Janet Reno,
FBI Director "Louis Freeh has told Congress he needs money to tap 1.5
million phones simultaneously," Russo says.

  "The worst part of the federal ID card is not the card itself but what's
going to come out of it," candidate Russo adds, segueing without drawing a
breath into the other federal intervention that gets his goat. "The ID card
and the debit card merging; getting rid of cash. Everything will be on the
card. Every time you go buy something, they'll know what books you read,
what tapes you rent.

  "They'll debit your Social Security tax payments automatically. You'll
have no more cash. Cash will be gone; it will be illegal; you won't be able
to hide any more money in your mattress. And as Ross Perot pointed out, the
current Clinton budget will eventually mean an 82 percent tax rate" to
cover expanding welfare programs.

  "If they freeze your card, you can't buy food; you can't pay a lawyer. If
they can assume how much money a waitress should make in tips, and tax that
amount, then they can assume how much you make, and tax the amount they
assume you should be making. And at that point you're a slave. You are a
slave."


Digital fingerprinting

  Central in organizing resistance to the national ID card to which Russo
refers is the Coalition to Repeal the Fingerprint Law, at 5446 Peachtree
Industrial Boulevard, Suite 133, Atlanta, GA 30341, telephone 404-250-8105.

  The group's web site is at http://www.atlantainfoguide/repeal/.

  Posted there is an article by Cyndee Parker - self-described Georgia
"housewife turned activist, because no one else was doing anything about
it" - which begins: "In September of 1996, President Clinton signed into
law the Illegal Immigration Reform and Immigrant Responsibility Act of
1996. Buried at approximately page 650 of the new National Defense Bill,
also known as Public Law 104-208, Part B, Title IV, the American public was
given a national ID card. With no fanfare, no publicity and no scrutiny,
the bill easily avoided the watchful eyes of even its most aggressive
opponents. ...

  "In Section 401-403, pilot programs have been initiated by the U.S.
Attorney General, one of which is the 'Machine Readable Document Pilot
Program.' In this particular program, employers would have to 'procure' a
document reader linked to the federal government's Social Security
Administration in order to have the potential employee swipe their new
drive's license/national ID card through the reader. Then it would be up to
the federal government to either approve or disapprove the applicant for
employment. ...

  Additionally, Section 656 of the new law states that "after October 1,
2000, Federal agencies may only accept as proof of identity driver's
licenses that conform to standards developed by the Secretary of the
Treasury," after consultation with state motor vehicle officials and the
American Association of Motor Vehicle Administrators. "The AAMVA sees
digital fingerprinting as the best way to go in driver's license
identifiers," Ms. Parker reports.

  Parker quotes Dick Armey, R-Tex., calling the move "an abomination and
wholly at odds with the American tradition of individual freedom." Jack
Kemp told the New York Times this was "an anti-privacy, anti-business and
anti-American approach." Of course, Parker adds, "all this was said before
the bills were snuck through in the last defense bill. ... For the first
time in American history and reminiscent of Communist countries, our
government would have the ability to grant approval before a private
company enters into private employment contracts with private citizens,"
all justified as necessary to ban illegal immigrants from the workplace,
and to track down "deadbeat dads" delinquent on their child-support
payments.


Your number, please?

  A sister law is the Personal Responsibility and Work Opportunity
Reconciliation Act of 1996, now Public Law 104-193, approved by the
"Conservative Republican
Congress" on July 23, 1996, and signed into law by President Clinton on
Aug. 22, 1996.

  Public Law 104-193 requires that, as a condition for receipt of federal
"Child Support" and "Aid to Families With Dependent Children" funding, each
state must implement federally-defined citizen locating and tracking
measures, and specifically  authorizes the use of Social Security numbers
in a new biometric identity card ("biometric" referring to individualized
digital fingerprints, retinal scans, and so forth) for NON-drivers.

  Of special note in that bill are Section 313, the "State directory of new
hires," which Ms. Parker summarizes as "all new employees to be databased
with nationwide multiple agency sharing of personal information. ... felony
conspiracy charges for employers not reporting."

  Section 316, the "Expansion of the Federal Parent Locator Service" then
gives us "Employee assets and debts to be databased. Secretary of the
Treasury to have access to database."

  And that one's followed by Section 317, "Collection and use of Social
Security numbers for use in child support enforcement," which Ms. Parker
summarizes as "All applications for professional licenses, occupational,
drivers and marriage licenses to include Social Security numbers. Formerly
illegal as an invasion of privacy under the Privacy Act of 1974, USC Title
5, Section 552a."

  Uri Dowbenko did indeed look up all this stuff for his article in the
Oct. 13, 1997 National Review, as candidate Russo reported. And Dowbenko
confirms Cyndee Parker's reading of these laws, adding:

  "There is also a stipulation for the development of
'counterfeit-resistant Social Security cards,' implying the use of
biometric data like fingerprints and/or retinal scans. This is not sci-fi,
folks, it's the law."


'Resistance will spread'

  As Mr. Safire of the Times reports, several states have already moved to
comply with the new federal requirements -- some picking up federal "pilot
program" funding for their efforts.

  "The new driver's license requirement mandating fingerprints for Georgia
drivers and those wanting ID cards passed the state Legislature with
virtually no public or media attention in April of 1996," Cyndee Parker
reports from Atlanta. "The first known announcement was on the local
Atlanta news announcing an October 1996 date to begin fingerprinting."

  Since then, efforts to repeal the Georgia fingerprinting law have been
blocked by inspired procedural maneuvering on the part of the leadership of
the Georgia state Legislature.

  Bobby Franklin is a first-term member of the Georgia House of
Representatives from District 39, in Marietta. Marietta is in Cobb County,
home of Kennesaw, which recently and famously reacted to firearm bans
elsewhere by passing a law which requires every head of household to own a
gun.

  "And the crime rate immediately dropped, and stayed down, which you will
not see covered in the national news, because that's something they do not
want you to know," laughed Rep. Franklin when I reached him at his home on
a Monday night in early January.

  But I was calling Franklin about the fingerprint law.

  "They did that here back in '96, on the last day of the session. I was
not in the House then; I was elected in '96. So we tried last year to
repeal the measure. We had several bills that were introduced, we were
promised by the chairman of the committee that it would be let out so it
could be voted on by the whole house. ..."

  Needless to say, that did not happen.

  "The (state) Senate amended to remove the fingerprints, and we missed
upholding that by one vote.

  "I know in Alabama, their department of public safety said last year,
they just up and said, 'Hey guys, we're fingerprinting.' And there was such
a public outcry against it that the department backed down and they're not
fingerprinting. And we're very close to repealing, here. Our two major
Republican candidates for governor this year are both saying they will
issue an executive order banning our Motor Vehicle Department from
fingerprinting."

  At which point, won't they just substitute retinal scans, or something
else to meet the federal requirement, I ask Franklin. After all, no state
wants its residents cut off from all those fine, federal benefits as of the
year 2000.

  "Our draft legislation says they're not allowed to use (start
ital)any(end ital) biometric identifiers. We hope if we can block it in
Georgia it will spread, that we can prevent them from instituting their
program, that resistance will spread. No one wants to be chattel. If we're
treated like a number, we're property."

  Alabama "was basically a pilot program, from what I understood. They
threw out a trial balloon to see how it would go, and they got slammed, so
they backed away from it."

  On June 19, 1997, Congressman Bob Schaffer rose to the floor of the House
of Representatives in Washington, and read into the record Colorado Joint
House Resolution 97-1027 (passed unanimously in the state Senate, and by a
vote of 59-6 in the House): "Resolved ... that we, the members of the
Sixty-first General Assembly urge the Congress of the United States to
amend or repeal those specific provisions of the federal Personal
Responsibility and Work Opportunity Reconciliation Act of 1996 set forth in
this Resolution that place undue burden and expense upon the several
states, that violate provisions of the Constitution of the United States,
that impose insufficiently funded mandates upon the states in the
establishment, modification, and enforcement of child support obligations,
or that unjustifiably intrude into the personal lives of the law-abiding
citizens of the United States of America."

  Resistance IS spreading.


Vin Suprynowicz is the assistant editorial page editor of the Las Vegas
Review-Journal. His book, "Send in the Waco Killers," is due from
Huntington Press in May, 1998. Readers may contact him via e-mail at
vin at lvrj.com. The web site for the Suprynowicz column is at
http://www.nguworld.com/vindex/. The column is syndicated in the United
States and Canada via Mountain Media Syndications, P.O. Box 4422, Las Vegas
Nev. 89127.

***


Vin Suprynowicz,   vin at lvrj.com

"If ye love wealth greater than liberty, the tranquility of servitude
greater than the animating contest for freedom, go home from us in peace.
We seek not your counsel, nor your arms. Crouch down and lick the hand that
feeds you. May your chains set lightly upon you; and may posterity forget
that ye were our countrymen."    -- Samuel Adams

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: 







From ravage at ssz.com  Fri Feb 20 06:20:03 1998
From: ravage at ssz.com (Jim Choate)
Date: Fri, 20 Feb 1998 22:20:03 +0800
Subject: NEW TRAVEL INFO -- Israel (fwd)
Message-ID: <199802201419.IAA23796@einstein.ssz.com>



Forwarded message:
>From owner-travel-advisories at stolaf.edu Fri Feb 20 04:04:45 1998
Date: Tue, 17 Feb 1998 11:07:49 -0500
From: owner-travel-advisories 
Subject: NEW TRAVEL INFO -- Israel
Sender: "U.S. Department of State" <76702.1202 at compuserve.com>
To: travel-advisories at stolaf.edu
Message-ID: <199802171112_MC2-33A4-1596 at compuserve.com>
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Precedence: bulk

STATE DEPARTMENT TRAVEL INFORMATION - Israel and the Occupied Territories
============================================================
Israel and the Occupied Territories  - Public Announcement
 February 14, 1998

 U.S. DEPARTMENT OF STATE
 Office of the Spokesman

The American Embassy in Tel Aviv and the U.S. Consulate General in 
Jerusalem are issuing the following Warden Message:

"This message supplements the Public Announcement issued by the 
U.S. Department of State on February 10, 1998 for the Middle East 
and South Asia.
 
The U.S. Embassy in Tel Aviv and Consulate General in Jerusalem 
continue to closely monitor the situation with Iraq. The U.S. 
Government believes there is a low probability of attack on Israel, 
the West Bank or Gaza, and that the possibility of Iraq using 
chemical and biological weapons (CBW) is remote, but cannot be 
excluded. American citizens are advised to avoid travel to the West 
Bank and Gaza and to exercise caution in Jerusalem, particularly in 
the area of the old city of Jerusalem.  The U.S. Consulate General 
in Jerusalem has suspended personal travel of its employees to the 
West Bank and has placed restrictions on official travel to the West 
Bank.  

These are precautionary measures only.  However, given the current 
tensions in the region, the U.S. Government believes it is important 
for all citizens to maintain readiness in the unlikely event of an 
emergency.

At this time, the Government of Israel is distributing protection 
kits to Israeli citizens and legal residents only. However, we 
understand that the government of Israel is putting in place 
arrangements to determine the most effective ways to distribute gas 
masks to foreign nationals and is in the process of acquiring 
adequate numbers of gas masks to provide for non-Israeli citizens in 
Israel, Jerusalem, and the areas of the West Bank under its control. 
 The Palestinian authority has informed the U.S. Government that it 
does not have protection kits to supply its population or foreign 
residents living within its areas of control.

For those American citizens who need to obtain a new passport or to 
update their registrations, passport hours at the Embassy (71 
Hayarkon Street, Tel Aviv) are Monday through Friday mornings from 
8:30 to 11:00 am and Wednesday afternoons from 1:30 to 3:30 pm; 
Consulate General in Jerusalem (27 Nablus Road, East Jerusalem) 
passport hours are Monday through Friday mornings from 8:30 to 
12:00, except for the last Friday of the month.

The Embassy and Consulate General urge all U.S. citizens to monitor 
local and international media for further developments.  Should the 
U.S. government need to issue advice to U.S. citizens, the Embassy 
and Consulate will notify the local media and activate our citizens 
warden network immediately.

U.S. citizens contemplating traveling to Israel, the West Bank and 
Gaza should take the above information into consideration and 
should, in addition, consult the latest Consular Information Sheet 
on Israel and the Occupied Territories dated December 23, 1997."

This Public Announcement expires on May 14, 1998.


Israel and the Occupied Territories - Consular Information Sheet
 December 23, 1997

(INCLUDING AREAS SUBJECT TO THE JURISDICTION OF THE PALESTINIAN 
INTERIM SELF-GOVERNMENT AUTHORITY)

Country Description:  The state of Israel is a parliamentary 
democracy with a modern economy.  Tourist facilities are widely 
available.  Israel occupied the West Bank, Gaza Strip, Golan 
Heights, and East Jerusalem as a result of the 1967 War.  Pursuant 
to negotiations between Israel and the Palestinians, an elected 
Palestinian authority now exercises jurisdiction in most of Gaza and 
most of the major cities of the West Bank.  Palestinian Authority 
police have responsibility for keeping order in those areas and the 
Palestinian Authority exercises a range of civil functions in other 
areas of the West Bank. Areas of Israeli and Palestinian Authority 
responsibilities and jurisdiction in the West Bank and Gaza are 
complex.  Definitive information on entry, customs requirements, 
arrests and other matters in the West Bank and Gaza may not be 
available and is subject to change without prior notice.

Embassy/Consulate Location and Sources of Assistance: The U.S. 
Embassy in Tel Aviv, Israel, is located at 71 Hayarkon Street. The 
U.S. mailing address is PSC 98, Box 0013, APO AE 09830.  The 
telephone number is (972) (3) 519-7575.  After hours number: 
519-7551.  The fax number is 972-3-516-0315.  The e-mail address is 
acs.amcit-telaviv at dos.us-state.gov.

The Consular Section of the U.S. Embassy should be contacted for 
information and help in the following areas:  Israel, the Gaza 
Strip, and ports of entry at Ben Gurion Airport, Haifa Port, and the 
northern (Jordan River) and southern (Arava) border crossings 
connecting Israel and Jordan.

The Consular Section of the U.S. Consulate General in Jerusalem is 
located at 27 Nablus Road. The U.S. mailing address is Unit 7228 Box 
0039, APO AE 09830. The telephone number is (972) (2) 625-3288 (via 
Israel)  the after hours number is 625-3201.  The fax number is 
972-2-272-2233.

The U.S. Consulate should be contacted for information and help in 
the following areas: west and east Jerusalem, the West Bank, and 
border crossings at the Allenby Bridge, connecting Jordan with the 
West Bank.

There is a U.S. Consular Agent in Haifa, at telephone (972) (04) 
853-1470, who reports to the Embassy in Tel Aviv.  The Consular 
Agent can provide routine and emergency services in the north.

Entry Requirements:

Israel:  Passports, an onward or return ticket, and proof of 
sufficient funds are required for entry.  A three-month visa may be 
issued for no charge upon arrival, and may be renewed.  Anyone who 
has been refused entry or experienced difficulties with his/her visa 
status during a previous visit, or who has overstayed a visa, can 
obtain information from the Israeli Embassy or nearest Israeli 
consulate regarding the advisability of attempting to return to 
Israel. Permission must be obtained from Israel for anyone 
attempting to claim the status of a returning resident.

Palestinian Authority:  Except during periods of closures, U.S. 
citizens, except those of Palestinian ancestry (see below) may enter 
and exit Gaza and the West Bank on a U.S. passport with an Israeli 
visa.  It is not necessary to obtain a visitor's permit from the 
Palestinian Authority.  Private vehicles frequently encounter long 
delays entering or leaving Gaza; and may also expect to be stopped 
at checkpoints entering or leaving the West Bank.

U.S. citizens who have ever held or now hold resident status in the 
West Bank or Gaza should be aware that they may be subject to the 
same travel regulations governing entry to and exit from Israel that 
affect all other resident Palestinians. In general, such individuals 
are required to hold a Palestinian passport to enter or depart Gaza 
or the West Bank via Israel.  U.S. citizen Palestinian residents 
arriving at Ben Gurion Airport without a Palestinian passport will 
be granted an entry visa to enable their transit to the West Bank or 
Gaza to obtain such documentation from the Palestinian Authority.  A 
Palestinian passport and permit to depart are required to leave via 
Ben Gurion Airport.  No permit is required for departure via the 
Rafah or Allenby border posts.

Palestinians who last departed Israel before the May 1994 Cairo 
Accords (regarding Gaza and Jericho) or the September 1995 Interim 
Agreement (regarding other areas of the West Bank) should re-enter 
Israel through the same port of entry from which they last left (and 
where their travel documents were then deposited).

Specific questions may be addressed to the nearest Israeli embassy 
or consulate.

Israel-Jordan Crossings:  International crossing points are now in 
operation between Israel and Jordan at Arava (Wadi al-'Arabah) 
crossing in the south and the Jordan River crossing (Sheikh Hussein 
Bridge) in the north.  Prior visas are not necessary for American 
citizens using these two crossing points, but travelers will have to 
pay a fee.  Visas should be obtained in advance for those wanting to 
cross the Allenby Bridge which links Jordan and the occupied West 
Bank.  (Note: Palestinian Americans with residency in the West Bank 
must cross into Jordan using the Allenby Bridge.)  Procedures for 
all crossings into Jordan are subject to frequent changes.  

For further entry information, travelers may contact the Israeli 
Embassy at 3514 International Dr., NW, Washington, DC. 20008, 
telephone (202) 364-5500, or the Israeli Consulate General in Los 
Angeles, San Francisco, Miami, Atlanta, Chicago, Boston, New York, 
Philadelphia, or Houston.

Customs Requirements:  Video cameras, among other items, must be 
declared upon entry to Israel and travelers carrying these items 
must go through the red zone at customs.  Definitive information on 
customs requirements for the Palestinian Authority is not available.

Security Measures:  Israel has strict security measures that may 
affect visitors.  Prolonged questioning and detailed searches may 
take place at the time of entry and/or departure at all points of 
entry to Israel, including entry from any of the areas under 
Palestinian jurisdiction.  American citizens with Arab surnames may 
expect close scrutiny at Ben Gurion Airport and the Allenby Bridge 
from Jordan.  For security reasons, delays or obstacles in bringing 
in or departing with cameras or electronics equipment are not 
unusual.  During searches and questioning, access may be denied to 
U.S. consular officers, lawyers, or family members.  Definitive 
information on security measures in the Palestinian Authority is not 
available.

Terrorism/Security:  Although they have not been specifically 
targeted for attack, U.S. citizens have been killed in past 
terrorist actions in Israel, the West Bank, and Gaza.   The most 
recent attacks have been in highly frequented shopping and 
pedestrian areas, and public buses. U.S. citizens should use caution 
in crowded pedestrian and shopping areas.   In addition, the U.S. 
Embassy and the Consulate General have warned their employees and 
American citizens to avoid travel on public buses, as well as 
congregating at bus stops and other crowded areas.  This restriction 
does not apply to tour buses.

U.S. citizens should, at all times, avoid large crowds and 
political demonstrations, and not remain in an area where a 
demonstration or altercation appears to be developing.  Such 
gatherings can occur spontaneously, and have the potential to become 
violent without warning.

Areas of Instability -

West Bank and Gaza:  During periods of unrest, the West Bank and 
Gaza are sometimes closed off by the Israeli government.  Travel 
restrictions may be imposed with little or no warning. Strict 
measures have frequently been imposed following terrorist actions.  
In such circumstances,  movement of Palestinians (including 
Palestinian Americans) and foreign passport holders has been 
severely impaired.

Demonstrations by Palestinians and Israelis in the West Bank have 
led to confrontations and clashes with the police, with some turning 
deadly.  Stone throwing and other forms of protest can occur without 
warning and can escalate quickly.

In view of the continued potential for violence and unrest in the 
West Bank and Gaza, the State Department advises all American 
citizens to avoid travel to these areas, except for daylight visits 
to Bethlehem, Jericho, Highway 1 from Jerusalem to the Dead Sea, 
Route 90 through the Jordan Valley, and tourist sites along these 
routes. Accessible sites for daylight visits include the Inn of the 
Samaritan, Nebi Musa, St. George's Monastery, Mount of Temptation 
Monastery, Qumran, and Qualiah Water Park.  The Consular Section of 
the U.S. Consulate General, located at 27 Nablus Road in East 
Jerusalem, is safe and accessible to all visitors.

The U.S. government maintains tight security procedures regarding 
travel of U.S. government employees, officials, and dependents to 
the Gaza Strip and the West Bank.  Frequently, U.S. government 
employees are instructed not to travel at all to these areas.  
Travel guidelines for U.S. government employees may change at any 
time.

The Palestinian police force has been established in Gaza and the 
major cities of the West Bank which are under Palestinian 
jurisdiction.  Joint Israeli/Palestinian police patrols and 
checkpoints may be encountered.  Many Israeli and Palestinian 
civilians in Gaza and the West Bank possess their own guns.

General Precautions:  Travel on strike days or after dark is not 
recommended.  Tourists using public transportation or traveling by 
car in areas less frequented by tourists are at risk.  Vehicles have 
been damaged, with rental cars in particular being targeted.

Jerusalem:  In Jerusalem, travelers can reduce their risk of being 
involved in violent incidents by traveling in groups, avoiding the 
old city at night, except for the Jewish quarter, and exercising 
caution at religious sites on holy days, Fridays, and Saturdays.  
Most roads into ultra-orthodox Jewish neighborhoods are blocked off 
on Saturdays.  Assaults on secular visitors, either for being in 
cars or for being "immodestly dressed," have been known to occur in 
these neighborhoods.

In the North:  In the Golan Heights, there are live land mines in 
many areas, and some minefields have not been clearly marked or 
fenced.  Visitors who walk only on established roads or trails will 
reduce the risk of injury from mines.  Rocket attacks from Lebanese 
territory can occur without warning close to the northern border of 
Israel.

Driving and Road Conditions:  There is a high rate of fatalities 
relating to auto accidents, and drivers should use caution.  While 
the roads in Israel are well built, the roads in Gaza and most of 
the West Bank are of poor quality.

Arrests and Detention:  U.S. citizens arrested by the Israeli 
National Police (INP) and charged with crimes are entitled to legal 
representation and consular notification and visitation.  Typically 
the INP notifies the Embassy or Consulate General within two days of 
arrest, and consular access is normally granted within four days.  
This procedure may be expedited if the arrested American shows a 
U.S. passport to the police as proof of U.S. citizenship, or asks 
for access to the Embassy or Consulate General.

U.S. citizens arrested in the West Bank for criminal offenses may 
be prevented from communicating with lawyers, family members, or 
consular officers. The U.S. Consulate General is often not notified 
of the arrest, or notified in a timely manner.  Consular access to 
the arrestees can be initially denied and is frequently delayed.

In contrast to persons arrested for criminal offenses, U.S. 
citizens arrested or detained in Israel and the West Bank on 
suspicion of security offenses often are not permitted to 
communicate with consular officials, lawyers, or family members in a 
timely manner during the interrogation period of their case.  They 
may be detained for up to six months at a time without charges.  
Youths over the age of fourteen have been detained and tried as 
adults.  Neither the Embassy nor the Consulate are normally notified 
of the arrests of Americans in the West Bank by Israeli authorities, 
and access to detainees is frequently delayed.  Notification may be 
more rapid if the detained American shows a U.S. passport as proof 
of citizenship and asks the local authorities to contact the Embassy 
or Consulate General.

Medical Facilities:  Modern medical care and medicines are 
available in Israel.  However, some hospitals in Israel and most 
hospitals in the Gaza Strip and the West Bank fall below U.S. 
standards.  Travelers can find information in English about 
emergency medical facilities and after-hours pharmacies in the 
"Jerusalem Post" newspaper.  Doctors and hospitals often expect 
immediate cash payment for health services.  U.S. medical insurance 
is not always valid outside the united states.  Supplemental medical 
insurance with specific overseas coverage has proven useful.  The 
Internet site at the Centers for Disease Control and Prevention 
(http://www.cdc.gov) has additional health information. Travelers 
from regions where contagious diseases are prevalent may need to 
show shot records before entry into Israel.

Information on Crime:  The crime rate is moderate in Israel, the 
Gaza Strip, and the West Bank.  The loss or theft of a U.S. passport 
abroad should be reported immediately to local police and the 
nearest U.S. embassy or consulate.  Useful information on 
safeguarding valuables, protecting personal security, and other 
matters is provided in the Department of State pamphlets, "A Safe 
Trip Abroad" and "Tips for Travelers to the Middle East and North 
Africa," available from the Superintendent of Documents, U.S. 
Government Printing Office, Washington, DC. 20402.

Drug Penalties:  U.S. citizens are subject to the laws of the 
territory in which they are traveling.  Penalties for possession, 
use or trafficking in illegal drugs are severe in Israel, and 
convicted offenders can expect jail sentences and fines.  The 
Palestinian Authority also has strict penalties for drug use by 
persons under its jurisdiction.

Court Jurisdiction:  Under Israel's judicial system, the rabbinical 
courts exercise jurisdiction over all Jewish citizens and residents 
of Israel in cases of marriage and divorce and related issues, such 
as support and child custody.  Rabbinical courts can also impose 
sanctions, including jail terms and restrictions against leaving the 
country, on individuals married in a Jewish religious ceremony who, 
in case of divorce, refuse to give their spouses a religious divorce 
("get").  In some cases, Jewish Americans, who entered Israel as 
tourists, have become defendants in divorce cases filed against them 
in a rabbinical court in Israel by their American spouses who are 
seeking a religious divorce that the defendants have refused to 
give.  These Americans have been detained in Israel for prolonged 
periods while the Israeli courts consider whether such individuals 
have sufficient ties to Israel to establish rabbinical court 
jurisdiction.  In one case, the rabbinical courts detained in Israel 
a Jewish American tourist who had been sued for support by his 
spouse in the United States.  Jewish American visitors should be 
aware that they may be subject to involuntary and prolonged stays in 
Israel if a case is filed against them in a rabbinical court.  This 
may occur even when the marriage took place in the U.S., and/or the 
spouse seeking relief is not present in Israel.  

Dual Nationality:  Israeli citizens naturalized in the United 
States retain their Israeli citizenship, and their children are 
considered Israeli citizens as well.  In addition, children born in 
the United States to Israeli parents acquire both U.S. and Israeli 
nationality at birth.  Israeli citizens, including dual nationals, 
are subject to Israeli laws requiring service in Israel's armed 
forces.  U.S.-Israeli dual nationals of military age who do not wish 
to serve in the Israeli armed forces may contact the Israeli Embassy 
to obtain proof of exemption or deferment from Israeli military 
service before going to Israel.  Otherwise, they may not be able to 
leave the country without doing military service.  Israeli citizens, 
including dual nationals, must enter and depart Israel on their 
Israeli passports.  (Note:  U.S.-Israeli dual citizens must enter 
and depart the U.S. on their U.S. passports.)

Palestinian-American citizens with residency rights in Gaza or the 
West Bank are subject to the same regulations as other resident 
Palestinians.  This normally requires them to depart these areas 
with Palestinian travel documents or (for residents of Jerusalem) 
laissez-passers with re-entry permits approved by the Israeli 
Ministry of Interior.

Registration:  The State Department advises American citizens who 
plan to be in the region for a substantial period of time to 
register at the U.S. Embassy in Tel Aviv or the U.S. Consulate 
General in Jerusalem.  When registering, U.S. citizens can obtain 
updated information on travel and security in the area.

 No. 97-169

This replaces the Consular Information Sheet dated January 22, 
1997, to provide new information about travel documentation for 
Palestinian Americans, and to update the sections on entry/exit 
requirements, terrorism and security, and arrest and detentions.

----- ----- ----- ----- ----- ----- ----- ----- ----- ----- ----- ----- -----
The "travel-advisories at stolaf.edu" mailing list is the official Internet and
BITNET distribution point for the U.S. State Department Travel Warnings and
Consular Information Sheets.  To unsubscribe, send a message containing the
word "unsubscribe" to:	travel-advisories-request at stolaf.edu

Archives of past "travel-advisories" postings are available at the URL:
"http://www.stolaf.edu/network/travel-advisories.html" or via Gopher:
gopher.stolaf.edu, Internet Resources/US-State-Department-Travel-Advisories






From rah at shipwright.com  Fri Feb 20 07:44:31 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Fri, 20 Feb 1998 23:44:31 +0800
Subject: A Geodesic Society?
Message-ID: 




--- begin forwarded text


X-Sender: rah at pop.sneaker.net
Mime-Version: 1.0
Date: Fri, 20 Feb 1998 08:36:21 -0500
To: e$@vmeng.com
From: Robert Hettinga 
Subject: A Geodesic Society?
Sender: 
Precedence: Bulk

The following is something I wrote for a private online conference
sponsored by Nikkei, the Japanese financial news organization. Since
they're supposedly combing the list for quotable bon mots, I may end up in
the Japanese papers. :-).

Anyway, longtime residents of this list have seen me say this kind of stuff
before, but for those who haven't, the following explains the kinds of
effects I think the combination of ubiquitous public networks and financial
cryptography can have.

Cheers,
Bob Hettinga

--- begin forwarded text


X-Sender: rah at pop.sneaker.net
Mime-Version: 1.0
Date: Thu, 19 Feb 1998 00:24:07 -0500
To: gis-ec at nikkei.co.jp, gis-net at nikkei.co.jp
From: Robert Hettinga 
Subject: [gis-asia 10] A Geodesic Society?
Cc: gis-asia at nikkei.co.jp
Reply-To: gis-asia at nikkei.co.jp
X-MLserver: majordomo-1.94.1 k-patch-2.0-alpha p-patch-1.0
X-sequence: gis-asia 10
Sender: owner-gis-asia at tokyo.nikkei.co.jp
Precedence: bulk

-----BEGIN PGP SIGNED MESSAGE-----

As the token cryptoanarchist around here, I've been lurking way too long,
mostly because I'm working on this financial cryptography conference we're
doing in Anguilla next week. However, A lot of good stuff has gone by on all
of these groups, and I think it's time I put my oar in and earned my keep a
bit before I enter the maelstrom of next week's FC98 conference, and loose
my chance to say anything here until it's all over.


The first topic I'd like to talk about is something which is more general
than my ostensible commercial focus in these discussions, and, after I've
said my piece here, I'll go back to the commerce list and pay more attention
to that end of things.  I have a little more to say there on what you can do
with the technology of money on public networks, though I'll drop a few
hints here to get people thinking about them.


My observation about networks in general is a rather obvious one when you
think about it: our social structures map to our communication structures.
As intuitive as it is to understand, this observation provides great insight
into where the technology of computer assisted communication will take us in
the years ahead.


Because of Moore's Law and its effect of collapsing the price of
semiconductors by half every 18 months, our telecommunication architectures
have changed from hierarchical networks, where it's cheaper to add lines
than it is to add expensive switching nodes, to geodesic networks, where it
is ever-exponentially cheaper to add microprocessor switches instead of now
relatively more expensive transmission lines.

This isn't new. In fact, it's outlined in Peter Huber's landmark "The
Geodesic Network", written in 1986 as a report for Judge Harold Greene as
part of the Modified Final Judgement which broke up American Telephone and
Telegraph, and with it the US telephone monopoly. I believe the original
version is still available from the US Government Printing Office, and I
know that you can order a revised edition from Peter Huber's law firm in
Washington. Huber himself is now a famous technology analyst from the
Manhattan Institute and a Forbes columnist, among other things.

In "The Geodesic Network", Huber observed that because the network was
becoming more and more geodesic, competition in telecommunications was
becoming much easier. That's because switching, a scarce thing which had
theretofore caused economies of scale and resultant "natural" monopoly, was
becoming cheaper and cheaper to build, and thus causing *dis*economies of
scale in the telephone markets.

One can almost hear Huber doing a little heavy lifting from the Marines in
report's conclusion, which was, essentially, "Deregulate 'em all, and let
God sort 'em out." It's nice to see that we're finally getting to see
deregulation of the "last mile" of the US telephone network 10 years after
Huber's recommendation.

As it is, it took *me* almost 10 years to realize something else about
geodesic networks. It's something which required me getting back on the
internet 4 years ago, after not being there since grad school, and
discovering that financial cryptography -- that is, the cryptographic
protocols for internet payment -- was much more important than the project
management software I had wanted to sell on the net at the time.

My realization was, if Moore's Law creates geodesic communications networks,
and our social structures -- our institutions, our businesses, our
governments -- all map to the way we communicate in large groups, then we
are in the process of creating a geodesic society. A society in which
communication between any two residents of that society, people, economic
entities, pieces of software, whatever, is geodesic: literally, the
straightest line across a sphere, rather than hierarchical, through a chain
of command, for instance.

This seems like a very simple truth these days. A "motherhood", as people in
American business like to say. But, once you start thinking about the world
in the terms of geodesic networks versus hierarchical ones, the world
changes. A Buckminster Fuller version of satori, if you will, though I'm
sure Bucky didn't think of human society in geodesic terms, at least from
what I've read of his work. His "World Game", for instance, is primarily
about the hierarchical centralization and redistribution of resources in an
industrial fashion. But, as it was, Bucky Fuller had discovered a geometric
archtype which was deeper than even his capacious understanding of its
implications had gotten him before.

So in light of this observation, for fun, let's look at human history in a
few paragraphs. :-).

Humans first lived in small groups on the African savanna. An artifact of
this life is the fact that most people can't have serious emotional
relationships with more than about 12 people, depending on how you define
serious. :-). Think of it as the carrying capacity of the human "switch",
and things get interesting. These small groups communicated geodesically.
When you wanted to talk to someone, you went up and talked to them. Then we
developed agriculture and its resulting food surpluses, people tended to
congregate at the crossroads of trade routes, and that's where the first
cities began. Civilization means, literally, "life in cities", remember?
Once we had large groups of people in a single place, we had lots of
information to pass around, but we also had expensive humans "switching"
that information who were only able to trust about 12 people at any time.
So, we had to develop hierarchical "networks", social organizations in other
words, to move that information around. Notice we finesse the whole trust
problem by using the entire hierarchy as one entity in everyone's
trusted-person list. That's why people die for king and country, for
instance, instead of just their family hunter-gatherer clan.

So, we can now see the ancient city-state as a hierarchy of power,
economics, whatever. We can also see ancient empires as a hierarchies of
city states, and so on. Notice that the size of any given hierarchy in
geographic terms is determined by the *speed* of communications it posesses.
Athenian triremes were very secure ways to move goods and information in a
relatively lawless Agean. Roman roads and galleys didn't just haul goods
quickly, they moved information as well. Staged Mongol riders could carry
messages across their own short-lived empire from a capital near China to
the gates of Warsaw in as little as 14 days. Napoleon invented his
10-mile-an-hour stagecoach and highway system for exactly the same reason,
and could almost legitimately call himself an emperor for the feat alone.

That brings us to the modern nation state, which, I claim, is entirely the
result of industrial communications technology. That is, you have
increasingly faster communications, from sailing ships to trains to
telegraphy and finally telephony, but you still have humans switching
information. That gives you larger and larger communication, and thus
social, hierarchies. Up until the automation of telephone switching --
paradoxically brought about a demand for universal service in exchange for
that ultimate industrial hierarchy, the US telephone monopoly -- things just
kept getting bigger and bigger. One could even see the increasing size of
government in this century as an "antihierarchy" funded by the forcible
confiscation or political extortion of economic rents from the large
industrial hierarchies where industrial society's money was being made in
the first place.

For a tasty little digression, Marxism then can be seen as simple
anti-industrialism, and an intriguing validation of Bertrand Russell's
comments about the similarity of Marxism and the feudal aristocracy it hated
so much. Hegel can't come to Marx's rescue here at all, because, for all
it's anarchistic pretensions, Marxism can now be seen as merely
industrialism's hierarchical antithesis, and not something "beyond
capitalism". Besides, trading has been around since the savana itself. It's
hard to imagine something antithetical to trade -- and have the result be
human, anyway. :-).


Okay. Now let's look at the future, shall we? Oddly enough, the "future"
starts with the grant of telephone monopoly to AT&T in the 1920's in
exchange for universal telephone service. When AT&T figured out that a
majority of people would have to be telephone operators for that to happen,
it started to automate switching, from electricomechanical, to electronic
(the transistor was invented at Ball Labs, remember), to, finally,
semiconducting microprocessors.  Which, Huber noted, brought us Moore's Law,
and, finally, that mother of all geodesic networks, the internet.

So, seen this way, using the hierarchy-to-geodesy synthesis (speaking of
Hegel :-)), a lot of things jump out right at us. Let's look at financial
operations, for example.

One can see, for instance, that the thing we call disintermediation in the
capital markets is in fact a process leading to something I call
*micro*intermediation, where large human decision hierarchies, like the New
York Stock Exchange, or money center banks, are being outcompeted by large
integrated proprietary computer networks, like the NASDAQ interbrokerage
network, or Fidelity Investments here in Boston. Yet, these financial
versions of big dumb bulletin boards, which still need humans to operate
them on behalf of the customer, will themselves be replaced someday by
smaller, more specialized and automated entities operating in increasingly
smaller market niches, and, we aren't just talking about financial
"shovelware", with database-driven web forms, either.

Someday, for instance, a couple of portfolio managers from Fidelity could
strike out on their own peculiar investment specialty, and set up a web
server to handle their investor relations, but in a way that financial
operations people thought was obsolete decades ago. Using financial
cryptgraphy like David Chaum's blind signature protocol, our portfolio
managers could just issue digital *bearer* certificates, right over the net
to their customers, representing shares in the portfolio they manage, rather
than keep track of all a given client's transactions in a database for
posterity. Even more fun, using the digital bearer *cash* they get from the
sale of those certificates, they could turn right around and instantly buy
debt, equity, or any derivative thereof, in digital bearer form, of course,
without waiting for any transactions to settle through a clearinghouse of
any kind. Why? Because knowing that you've digitally signed a unique blop of
bits and honoring the promises those various outstanding blops represent is
a whole lot easier, faster, and, of course, cheaper than keeping track of
every transaction you make for seven years, or whatever your friendly nation
state says you have to do so they can send somebody to jail if that person
lies to you. And, of course, digital bearer settlement is *much* faster than
waiting for all those book-entries to percolate through various
clearinghouses, banks, brokerages, and other financial intermediaries in
order for a trade to clear and settle.


Financial cryptography is a direct consequence of Moore's Law. You can't do
it without computers, and, more important, lots of cheap computers on a
network. But, you can do a lot of very neat things with it, as we've seen
above. In fact, the protocols of financial cryptography will be the glue
which holds a geodesic economy, if you will, together. And, of course, as
Deke Slayton put it, "No bucks, no Buck Rogers." No geodesic economy, no
geodesic society.

I joke about VISA being replaced someday by an innumerable swarm of very
small underwriting 'bots' whose job it is to form an ad hoc syndicate which
buys the personal digital bearer bond issue you floated for today's lunch.
In a geodesic market, the one-to-many relationships of hierarchical
book-entry-settled industrial finance, like checks and credit cards, becomes
to the many-to-one relationship of the geodesic digital-bearer-settled cash
and the personal bond syndicate.

But, what, you ask, do I do when someone defrauds me? The neat thing about
using financial cryptography on public networks is that you can use the much
cheaper early-industrial trust models that went away because you couldn't
shove a paper bearer bond down a telegraph wire. In short, reputation
becomes everything. Like J. Pierpont Morgan said 90 years ago,
"...Character. I wouldn't buy anything from a man with no character if he
offered me all the bonds in Christendom." In a geodesic market, if someone
commits fraud, everyone knows it. Instantly. And, something much worse than
incarceration happens to that person. That person's reputation "capital"
disappears. They cease to exist financially. Financial cryptographers
jokingly call it reputation capital punishment. :-). The miscreant has to
start all over with a new digital signature, and have to pay through the
nose until that signature's reputation's established. A very long and
expensive process, as anyone who's gone bankrupt will testify to.

So, you don't need biometric identity to stop non-repudiation. Translated,
that means that since you're moving secure digital bearer certificates over
an insecure private network like the internet, and not moving insecure
debits and credits over a secure private network like the SWIFT system, you
don't need audit trails to send someone to jail if they make the wrong book
entry.

Instead, you trust the issuer of a given piece of digital bearer cash, say,
and not the person who gave it to you, just like you trust the issuer of a
given currency today. Biometric identity is orthogonal to reputation in, um,
"cypherspace". And, of course, a financial intermediary like the above
issuer of digital bearer cash is not about to destroy its reputation for the
sake of a very small transaction like the one you're doing, any more than
the Fed would demand 6 one dollar bills in exchange for one five dollar bill
just to make an extra buck. Well, not since they started listening to
Friedman, anyway. :-)


Microintermediation means what it says. Financial intermediaries never go
away. You can't have markets, much less efficient ones, without financial
intermediaries buying things low and selling them high. Renting their
reputations to ensure transaction liquidity, in other words. This is at the
essense of Von Mises' "Calculation Argument" against planned economies, and
the defunct economy of the ex-Soviet Union is mute testament to that
particular economic truth.


Moore's Law, I like to say, operates like a surfactant of information,
breaking great globs of concentrated information fractally into smaller and
smaller bits, like so much grease in soapy dishwater. Capital, for the most
part, can now be converted into information and instantantly bought or sold,
or, more to the point, instantly settled and cleared in digital bearer form,
in increasingly smaller and smaller bits, by smaller and smaller and
increasingly more automated financial intermediaries. Microintermediated, in
other words.

What we get is a world where anything which can be digitized and sent down a
wire will be auctioned off in real-time in cash-settled markets. Stuff like
capital we've seen, but lots of other things, which are not immediately
intuitive. Machine instructions -- teleoperated or not. Software of all
kinds including entertainment and art. Bandwidth; I talk about a router
saving enough micromoney out of switching income to buy a copy of itself.

Maybe even adjudication and physical force, someday. After all, who says we
have to buy violence from the local force monopolies we now call nation
states, especially if we can get it cheaper and better -- and possibly in
smaller amounts -- in a competitive auction market?  Curioser and curioser,
as Alice used to say...

I mean, the nation-state's just another hierarchical artifact of industrial
communication technology, right? Besides, If everyone's paying for things in
cash and no book entry taxes can be collected because there aren't any book
entries, then, as someone said on a Harvard Law School list a few years ago,
"What happens when taxes become a tip"? Of course, there are various
cypherpunks out there who say things like "Write softare, not laws.", which
should make those folks on Mass Ave in Cambridge more than a little nervous
themselves.

So, welcome to the geodesic future. Not hoping to attract the wrath of the
famous curse, isn't it an, um, interesting place?


Cheers,
Bob Hettinga










-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.5.3

iQEVAwUBNOvB0cUCGwxmWcHhAQHVUAgAgYFUDcKLcsTNnevVmPaTp7lXxLo59oMI
qChTR7TmeEi0W6SgSn4nUd5zlJiBkx1ut6n2tIasvfpXgd3OaLqkPo9ZNSrMQZE7
8C1d5dI42/VgN36fDPgB/zVxNrqxDNIFYdOf9aH1A7u4TYUJTe9PSSQdfKxzMyTf
FQ+IfAzJjC3PFfxh566ghtHea7n235djGvAd8oHpr0SKBaSfu7jQjGUeecMDcTlg
ZzQf7V51MFcgKd/UPi2dybzYZoK8bIb7aJ9cazGc5k1chUOeVOykpW4EIvXZrBs7
Z0oRQfxwU/u+oLpA8Vt7xdK0qCTRLdxnsTzEFLUjTH/70ep3YNcgRA==
=9Xak
-----END PGP SIGNATURE-----

-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: 

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: 




----------------------------------------------------------------------
Where people, networks and money come together: Consult Hyperion
http://www.hyperion.co.uk/                   info at hyperion.co.uk
----------------------------------------------------------------------
Full-Strength Cryptographic Solutions for Worldwide Electronic Commerce
http://www.c2.net/                                   stronghold at c2.net
----------------------------------------------------------------------
Like e$? Help pay for it!
For e$/e$pam sponsorship or donations, 
----------------------------------------------------------------------

--- end forwarded text



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: 







From sunder at brainlink.com  Fri Feb 20 08:09:26 1998
From: sunder at brainlink.com (sunder)
Date: Sat, 21 Feb 1998 00:09:26 +0800
Subject: Fwd: Big Brother Sees through walls (from the spyking list)
Message-ID: <34EDA7B4.A7AD9E88@brainlink.com>



1)From: "George Martin" 
Subject: News Release: High-Tech Surveillance

NEWS FROM THE LIBERTARIAN PARTY
2600 Virginia Avenue, NW, Suite 100
Washington DC 20037
 
Do you have any privacy left when Big Brother can spy on
you from space -- or through your walls?

WASHINGTON, DC -- Spy satellites. Gamma ray scanners. 
Thermal-imaging devices.

It's not science fiction -- it's a list of the exotic, high-tech 
surveillance equipment the government now uses to monitor, track, 
and arrest American citizens, the Libertarian Party pointed out
today.

"Yesterday's science fiction has become today's political reality,"
said Steve Dasbach, the party's national chairman. "High-tech military
equipment that was once used against foreign armies is now
being used against American citizens on a routine basis."
  
As a result, the Fourth Amendment's protection against "unreasonable 
search" is under technological siege, he warned -- and government agencies 
are rushing to take advantage of this new power.
   
"Most people don't realize it, but law enforcement agencies are now
spying on us through the walls of our houses, taking high-resolution
photographs of us from space, and conducting drug tests based on trace
elements of chemicals in the air," said Dasbach.

Paranoid fantasy? Not at all: Such high-tech surveillance equipment
is becoming an increasingly common tool for law enforcement, according 
to reports in USA Today and the Wall Street Journal.
     
Here's a sampling of how state and federal agencies are using this
terrifying technology to spy on Americans:

* In North Carolina, county governments use high-resolution spy satellite
photographs to search for property improvements that might increase
property tax assessments.

* On the Mexican border, police use a "gamma ray scanner" to check
tanker trucks for contraband, scanning right through the vehicle's metal
sides.
  
* The Naval Surface Warfare Center has developed an "ion sniffer,"
a metal box that analyzes the chemical makeup of the air -- and can detect,
for example, traces of cocaine through the skin days after drug use.
 
* In Georgia, the state's Department of Revenue will start using
NASA satellites to examine the state's 58,910 square miles for illegal
timber cutting.
 
* In New Jersey, California, and other states, police use thermal
imaging devices to scan houses for unusual heat sources that could indicate
indoor marijuana growing operations. Houses can be scanned while police sit
in their cruisers on the street.
 
* And in Arizona, the state's Department of Water Resources uses
spy satellite photographs to monitor 750,000 acres of state farmland, and
compares the images to a database to discover which farmers don't have
irrigation permits.

Even worse: The federal government will spend another $4.5 million
this year to develop even more intrusive surveillance equipment.
  
Currently under development by the Justice Department: A "super
x-ray" -- combining traditional x-ray technology, ultra-sound imaging, 
and computer-aided metal detectors -- to reveal items hidden under clothes 
from up to 60 feet away.

The courts are currently wrestling with the implications of the new
technology, debating the limits of the government's power to "search"
individuals from a distance with high-tech gadgets. Several contradictory
court decisions have already emerged, for example, about whether
thermal-imaging searches are Constitutional.

Meanwhile, Republican and Democratic politicians continue to look
for new uses of the technology -- with some government officials already
talking about using satellite surveillance to track items as small as
backyard porches to check for zoning violations and construction permits.

"In the name of fighting crime, politicians seem eager to obliterate the
protections against unreasonable search, with equipment that Americans used
to only read about in Tom Clancy technothrillers," said Dasbach. "It's time
for the American public to wake up and realize that Big Brother is here
today -- and he's got a gamma ray scanner in his hand."


-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From sunder at brainlink.com  Fri Feb 20 08:12:34 1998
From: sunder at brainlink.com (sunder)
Date: Sat, 21 Feb 1998 00:12:34 +0800
Subject: FWD: Confirmations of Echelon (from Spy King)
Message-ID: <34EDA873.83F5A3@brainlink.com>



4)From: mkw-detective at t-online.de (MK-Wirtschaftsdienst GmbH)
Subject: NSA spying in Europe

The german online-magaine "Com!" (author: ulrike.duhm at t-online.de)
brought an article about the report of the european parliament.

Here a summary:

The european parliament reported, that the american secret service NSA
is monitoring emails, phonecalls and faxes. The informations are
forwarded from London and Menwith Hill via satellite to Fort Meade in
Maryland. Menwith Hill in Yorkshire, England, is the biggest spy post of
the world, that for the NSA collects political, economical, military and
private informations from europe and the former Sowjetunion.

The 48 year old Glyn Ford, member of the Labour-Party is behind this
report. Author of the 100 page document is Steve Wright of the
Manchester Omega foundation. The complete report can be found under:
www.heise.de/tp/deutsch/inhalt/te/1393/anchor1.html

For the first time, the european parliament confirmed the existence of
the spy network Echelon, the american part of the spysystem UKUSA.
1948, the USA, England, Canada, Australia and New Zeeland signed a
secret contract, the so called "United Kingdom - United States
Agreement" (UKUSA). Goal of it is the collective espionage. Via an
international ring of agents, the partners are exchanging informations.

The german hackers "Chaos Computer Club" (www.ccc.de) thinks, that the
european eMail-user is trapped in a net of foreign forces. They are
concerned, that the newest versions of the encryption software PGP are
in part not compatible with older versions. The result: The exchange
between different versions is not possible. For the computer club, that
is no coincidence: the hackers from Hamburg, Germany,  believe, that a
contract between USA and Germany exists, that Germany is not allowed to
use a software, that the NSA cannot look in."

So far some excerpts out of the article.  Here some homepages:

Glyn Ford:                   www.zen.co.uk/home/page/glyn.ford/index.htm

NSA:                          www.nsa.gov:8080

european parliament:    www.europarl.eu.int

Heise newsticker:
www.telepolis.de/newsticker/data/ae-09.01.98-000

spy post Menwith Hill: www.fas.org/irp/facility/menwith.htm

Electronic telegraph:
www.telegraph.co.uk:80/et?ac=000602131144806&rtmo=
OsKsx2bq&atmo=OsKsx2bq&pg=/et/97/12/16/ecspy16.html

Greetings from Germany
Rolf G. Wilmink
MK-W Security and Investigations
Member: BID, NAIS, WAD
www.mknet.de/mkw
mkw-detective at t-online.de
-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================






From wombat at mcfeely.bsfs.org  Fri Feb 20 21:34:09 1998
From: wombat at mcfeely.bsfs.org (Rabid Wombat)
Date: Sat, 21 Feb 1998 00:34:09 -0500 (EST)
Subject: Jimbelling the Sheep
In-Reply-To: <199802210520.XAA03328@wire.insync.net>
Message-ID: 




The local radio station just played a soundbite explaining that the 
"Anthrax" was not viable, and could not have been used to develop a 
weapon. They went on to state that the perpetrator was a "disgruntled scam 
artist whose scheme to make money off the Internet had failed."

If they can't get anything out of the bio weapons angle, there's always 
the 'net angle. The news goobers are catching onto the concept of "object 
re-use."


On Fri, 20 Feb 1998, Eric Cordian wrote:

> The FBI informant who orchestrated the capture of the recent "Anthrax
> Terrorists" turns out to be a man twice convicted of felony extortion.
>  
> He presently markets something called "The AZ-58 Ray Tube Frequency
> Instrument Prototype" which he advertises as being able to somehow
> purify the body of bacteria and viruses.
>  
> Sounds like a rehash of Radionics.
>  
> You may view the contraption at its very own web site,
>  
>          http://home.sprynet.com/sprynet/jmckenzie
>  
> -----
>  
>  
> LAS VEGAS (AP) -- Far from planning an anthrax attack, William Leavitt
> Jr. was involved in a bizarre deal to buy a $2 million germ-killing
> machine from an FBI informant who double-crossed him, Leavitt's
> lawyers said Friday.
>  
> Leavitt was described by his attorneys as a well-meaning, if gullible
> scientist.
>  
> He and Larry Wayne Harris, both microbiologists, were arrested in
> suburban Henderson Wednesday outside a medical office and charged with
> conspiracy to possess and possession of a biological agent.
>  
> His lawyers said Leavitt was operating under the assumption that what
> Harris had was Anthrax vaccine, which is legal and safe.
>  
> The FBI was awaiting tests Friday to determine if it was vaccine or
> material grade anthrax, which is potent enough to kill thousands of
> people.
>  
> Leavitt is married with three children and runs his own
> fire-protection business. The FBI says he also owns microbiological
> laboratories in his hometown of Logandale, Nev., and Frankfurt,
> Germany.
>  
> His criminal attorney, Lamond Mills, said the FBI's informant, Ronald
> Rockwell, was trying to ``scam'' Leavitt into buying a germ-killing
> machine.
>  
> ``When he couldn't scam 'em, he went the other way. He became a good
> guy for the FBI,'' Mills said.
>  
> Leavitt's business lawyer, Kirby Wells, said the machine was called
> the AZ-58 Ray Tube Frequency Instrument Prototype, and was hyped by
> Rockwell in glossy brochures as being able to flush the body clean of
> bacteria and viruses.
>  
> ``It looked like a bunch of bells and whistles,'' said Wells, who said
> he saw a picture of the machine. ``What made my client believe there
> was substance to that thing, I don't know. I wish I did.''
>  
> A promotion on the Internet has a bold headline: ``ANTHRAX,'' and goes
> on to say the AZ-58 ``can treat large numbers of people at the same
> time.''
>  
> ``Has the greatest health discovery in history been suppressed?'' the
> ad asks.
>  
> Leavitt was close to buying the machine in a $2 million deal, but
> wanted to test it before making a $100,000 down-payment and arranged
> to fly Harris to Las Vegas about a week ago to help, said Wells.
>  
> Leavitt believed that Harris was transporting anthrax vaccine, Mills
> said. But Rockwell told the FBI that Leavitt described it as
> military-grade.
>  
> On the''NBC Nightly News'' Friday, Rockwell reiterated that Leavitt
> and Harris said they had military grade anthrax.
>  
> ``They lied on what they were going to do,'' Rockwell said. ``It
> scared me so bad.''
>  
> There is no phone listing for Rockwell in the Las Vegas area. His
> attorney has not returned calls to The Associated Press.
>  
> Leavitt and Harris were arrested Wednesday night after the FBI, with
> Rockwell's help, tailed the men to a medical office in suburban
> Henderson. Authorities removed a cooler and petri dishes from the
> office, and sealed the men's beige Mercedes in plastic before
> transporting it to an Air Force base.
>  
> Leavitt, 47, and Harris, 46, of Lancaster, Ohio, are being held
> without bond.
>  
> In an affidavit, the FBI said described Rockwell as a cancer research
> scientist who was convicted of felony extortion in 1981 and 1982. But
> the FBI has vouched for his credibility, saying he came forward
> without getting a deal and was a ``citizen performing his civic
> duty.''
>  
> Harris' attorney, Michael Kennedy, said Thursday that Rockwell's
> credibility ``is something we're going to look into.''
>  
> It was unclear how Leavitt, a Mormon bishop with strong political
> ties, got hooked up with Harris, an alleged white supremacist who has
> been plugging his self-published book about germ warfare.
>  
> The FBI has said Harris met Rockwell last summer at a Denver science
> conference, while Leavitt's attorneys said they believed Rockwell got
> the men together.
>  
> Mills said the results of the FBI tests will determine if they remain
> united in their defense. ``If the tests come back non-toxin, there is
> no case,'' said Mills. ``If it comes back military grade, then whoa,
> time out, that's not our fault. We separate from (Harris)
> completely.''
> 
> -- 
> Eric Michael Cordian 0+
> O:.T:.O:. Mathematical Munitions Division
> "Do What Thou Wilt Shall Be The Whole Of The Law"
>  
> 
> 






From jadam at ino.com  Fri Feb 20 09:47:49 1998
From: jadam at ino.com (J. Adam Hewison)
Date: Sat, 21 Feb 1998 01:47:49 +0800
Subject: Last Chance ...less than 149 copies left! Plus FREE Bonus.
Message-ID: <199802202027.MAA24586@demon.ino.com>



Dear Fred,

The folks who produce The 1998 ULTIMATE FUTURES TRADING GUIDE,  just 
informed me that they have less than 149 copies available for sale

Check it out at: http://www.marketdepot.com/products/utg/

See what the GUIDE has to say about El Nino ... and what effect it will 
have on the economy and the markets and ultimately your money.

Featured New In The 1998 Guide : 

* Annual Price Projections on Every Major Commodity 
* Seasonal Chart Trends
* El Nino Weather Impact
* 15 Year Historical Chart Reference - New Contracts 
* Hundreds of Essential Fundamental & Technical Charts 
* 233 Commodity Trend Timing Windows
* Key US & International Tables on  Supply, Demand
* Cycle Timing & Anniversary Dates 
* Government Report Dates, Futures & Options Expirations 
* Fundamental & Technical Forecasts    
* And much, much more!

(over 17,500 sold this year alone).

ORDER NOW and RECEIVE A SPECIAL FREE BONUS:
 "The 17 Most Important Candlestick Formations" It's our way of saying 
Thank You for your business.

YOU HAVE NO RISK with our 30-DAY MONEY BACK GUARANTEE.

Even if you return the Guide for a FULL REFUND, (excluding shipping and
handling charges), the "The 17 Most Important Candlestick Formations" is 
yours to keep.

With only one printing of the '98 guide SUPPLIES ARE (seriously, 
seriously) LIMITED.   When the '98 Guide is sold out, that's it. There 
will be no other press runs.

ORDER NOW as we have less than 149 copies

GO TO:  http://www.marketdepot.com/products/utg/

or order NOW  by calling any of the numbers below.

888-MKT-DEPOT 888-658-3376 or 410-867-7490
(9:30 a.m. to 7:30 p.m. Eastern Standard Time, Monday - Friday
Fax 410-867-4203 or order online 24-hours a day.

A perfect companion to the '98 Guide is "The Traders Logbook"

This simple, easy to use Logbook makes certain your orders and positions 
are accurate, and creates a history of your trades to show where you 
go right and wrong. And, what can be very important, it as also 
valuable evidence in a case of dispute with your broker.

Check out the Logbook at:

http://www.marketdepot.com/products/logbook

Thank you for your time, and remember I personally endorse both these  
products and stand behind them with our 30 DAY MONEY BACK GUARANTEE 
Policy. That's right. You must be 100% satisfied with the product or 
will will refund you the entire purchase price. No hassles, no 
questions.

No risk to you.

Thank you for your time,

Adam Hewison
President of INO Global Markets.

P.S. Judging by the enormous response and success we had with our 
initial mailing, I expect we will sell out of the remaining  149 
Guides quickly. To avoid disappointment, I recommend that you order as 
soon as possible. Orders will be processed on a first come first 
served basis.

++++++++++++++++++++++++++++++++++++++++++++++++++++++++
IMPORTANT NOTICE
You received this e-mail because your name and e-mail address were
entered at a website operated by INO Global Markets. We specialize in
futures and options information. Our web sites are located at
http://www.ino.com, http://www.quotewatch.com and  
http://www.globalcharts.com.  Products and services connected with the 
futures and options trading are
marketed on our sites and by e-mail. We have a strict practice to
avoid, where possible, sending out unsolicited e-mails. If you wish to
instruct us to discontinue sending e-mails to you. please reply to
this message.

Make sure you insert the word
 REMOVE
 in the subject line of the return e-mail, otherwise we may not see it.
 
 Thank you.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++

****** Other recommended  INO Global Markets sites ******

http://www.ino.com
	The Web Center for Futures and Options Traders.
http://www.marketcenter.com
	FREE resources for the Trader.
http://www.marketdepot.com
	#1 Superstore for Futures and Options Traders
http://options.quotewatch.com
	FREE stock, futures and Index Options
http://quotewatch.com
	FREE Intraday Charts, Quotes and News
http://www.managedmoney.com
	FREE resource for picking a money manager
http://www.ino.com/rovers
	Everythings FREE!
http://www.globalcharts.com
	The Premier charting service on the Web
http://www.ino.com/power
        Options Traders Heaven!







From ravage at ssz.com  Fri Feb 20 11:30:51 1998
From: ravage at ssz.com (Jim Choate)
Date: Sat, 21 Feb 1998 03:30:51 +0800
Subject: On War, Legends, and Crypto (fwd)
Message-ID: <199802201934.NAA24685@einstein.ssz.com>



Forwarded message:

> Date: Fri, 20 Feb 1998 14:06:36 -0500
> From: Anonymous 
> Subject: On War, Legends, and Crypto

Are you proposing that Cypherpunks are the Sheriff and his posse or the
outlaws?

> There is an old story about a band of outlaws in the wild west.  The local
> sheriff and his men had decided to make an example of this group of
> troublemakers, and chased them into their hideout in a cave outside of
> town.

> After a few weeks a man came riding by to tell the Sheriff that the outlaws
> had just robbed a train in the next town, and everyone was wondering what
> the law enforcement idiots were doing guarding an empty cave instead of
> chasing the criminals.
> 
> It seems that the cave had another way out.  Whether or not this story is
> true, it illustrates an important point - The battle which is won, is the
> one not fought.

>From the trainrobbers perspective this is certainly true. From the Sheriff's
perspective it shows the futility of his job if his goal is to stop all
crime.

Are the Cypherpunks here to rob trains or to keep trains from being robbed?



    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From whgiii at invweb.net  Fri Feb 20 11:59:51 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Sat, 21 Feb 1998 03:59:51 +0800
Subject: On War, Legends, and Crypto (fwd)
In-Reply-To: <199802201934.NAA24685@einstein.ssz.com>
Message-ID: <199802202021.PAA05000@users.invweb.net>



-----BEGIN PGP SIGNED MESSAGE-----

In <199802201934.NAA24685 at einstein.ssz.com>, on 02/20/98 
   at 01:34 PM, Jim Choate  said:

>Are the Cypherpunks here to rob trains or to keep trains from being
>robbed?

Depends on which pays more at the time. :)

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: PATH=C:\DOS;C:\DOS\RUN;C:\WIN\CRASH\DOS;C:\ME\DEL\WIN

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO3Qro9Co1n+aLhhAQGiWAP+Oat08v1SdnOWU4eeq2NJklfFXciKknd3
Nepys5vvqoSfDZ17HAmTSE42YBas/SZpqiVdr3n402pRrGRg/6Kc0JRxpgirnlNr
uza9I5X790a75sPbl4CLGhxXcY67MTjAMELzDhFu7zeMcbnGSHM8qSFolOLLsypC
JFaI6aLZFR8=
=r01j
-----END PGP SIGNATURE-----






From vznuri at netcom.com  Fri Feb 20 12:01:37 1998
From: vznuri at netcom.com (Vladimir Z. Nuri)
Date: Sat, 21 Feb 1998 04:01:37 +0800
Subject: The Political Education of Eric Tune
In-Reply-To: <199802200632.AAA01478@wire.insync.net>
Message-ID: <199802201950.LAA16165@netcom17.netcom.com>



EC
>Kuwait provoked Iraq far more than places like Panama and Grenada have
>provoked the United States, when US forces poured in to remove
>existing governments, and install regimes sympathetic to Washington,
>also killing thousands of uninvolved civilians.
> 
>Then again, perhaps you believed the touching "Baby Incubator" story
>performed by the daughter of the Kuwaiti ambassador for an
>appreciative Congress, who were unaware of who she was, or that she
>was lying through her teeth.  Perhaps you were also unaware that
>American public opinion during the Persian Gulf War was under the
>control of a domestic public relations firm hired by the government of
>Kuwait.

wow!! well said.

a great book that nails this: "toxic sludge is good for you"
about the public relations industry and how it's playing the
tune while rome burns.

>America always manages to find some pretense to fight the wars it
>decides to fight.  Sometimes there is a staged attack, and an
>arrangement for allies to "invite" us into the conflict.  Other times,
>some imagined threat, like the chance that an infant formula factory
>"could be used" to produce material that "might be used" for chemical
>or biological warfare. Most of us who have watched the antics of
>America for more than a few decades see through the transparent
>rhetoric employed in such situations to manufacture public consent.

yes, and the cracks are starting to show-- how about that recent
rally in Ohio or whereever it was in which the audience refused
to stick to the "wag the dog" script? hee, hee. maybe there is
hope for us yet eh? one of the questions: "if other governments
of the middle east have weapons of mass destruction, why
are we singling out iraq?"

>America needs a low-level format.  Soon.

ouch!! that would hurt!!

another problem you don't mention is that the population has let
our own government run away. we send masses tax money but fail
to hold our own government responsible. "I am not responsible"
is the motto of immature children. we have an entire nation
of them, many on this list.






From tcmay at got.net  Fri Feb 20 12:43:43 1998
From: tcmay at got.net (Tim May)
Date: Sat, 21 Feb 1998 04:43:43 +0800
Subject: Making fun of the Postal Service is not allowed
Message-ID: <199802202021.MAA16586@always.got.net>



Things are really getting whacked out, if what this guy says is true.

(I was partly joking in my comments, but he claims some serious actions
are happening. So much for free speech, once again.)

--Tim



> From: Douglas Begle 
> Newsgroups: ba.mountain-folk,scruz.general
> Subject: Re: Making fun of the Postal Service is not allowed
> Date: Fri, 20 Feb 1998 10:59:03 -0800
> Organization: Sun Microsystems
> Lines: 30
> Message-ID: <34EDD277.DC25199E at sun.com>
> 
> Tim May wrote:
> 
> > It's not the County one has to worry about, it's the U.S. Postal Service.
> >
> > I assume you all saw the proposal that making fun of the Postal Service be
> > made a crime? Seems the USPS is not amused by a computer game called
> > "Going Postal," and wants this game renamed, else they'll file defamation
> > charges.
> >
> > A bit like the head of the American Bar Association telling us a year or
> > so ago that the ABA was considering legal remedies for the epidemic of
> > lawyer jokes.
> >
> > Only in Amerika.
> >
> > --Tim May
> 
> Ha!  so true.  A friend of mine created  the Disgruntled Postal Worker Zone at
> 
> http://www.well.com/user/ecp/index.html
> 
> The USPS issued a cease-and-desist demand.  Twice.  He hasn't.  Twice. I think
> the USPS is still jawing at his lawyer, but he keeps the site updated.
> 
> I bought some of the "Disgruntled?  Ask me."  buttons a while back.  Gems.
> 
> Doug



From jkwilli2 at unity.ncsu.edu  Sat Feb 21 04:45:29 1998
From: jkwilli2 at unity.ncsu.edu (Ken Williams)
Date: Sat, 21 Feb 1998 04:45:29 -0800 (PST)
Subject: Fwd: Big Brother Sees through walls (from the spyking list)
In-Reply-To: <199802202304.SAA05606@panix2.panix.com>
Message-ID: 


On Fri, 20 Feb 1998, Information Security wrote:

>   >   From: sunder 
>   >   
>   >   1)From: "George Martin" 
>   >   Subject: News Release: High-Tech Surveillance
>   >   
>   >   Here's a sampling of how state and federal agencies are using this
>   >   terrifying technology to spy on Americans:
>   >   
>   >   * In North Carolina, county governments use high-resolution spy satellite
>   >   photographs to search for property improvements that might increase
>   >   property tax assessments.
>
>Was this cost authorized by taxpayers?
>

I have lived in Raleigh, North Carolina my entire life (over 30 yrs).
County governments consist of an elected board of commissioners who have
the power to make such decisions and expenditures without holding public
hearings on these matters.  Unless the local media jumps on one of these
proposals weeks in advance, nobody will even know about it or have an
opportunity to petition for a public hearing.  Once the county
commisioners vote on and approve it, our money is spent and the public has
no recourse (until the next election).  Here in Raleigh, Wake County, NC,
for instance, we have a Republican county commissioner and a board of
members.  When I heard from his daughter, a personal friend, about his
plans to cut funding to drug education and rehab programs and redirect all
of those funds to the county prison system, I decided to act.  I contacted
the commissioner himself, his office, and even had lunch with his wife and
daughter to discuss this issue.  As a family friend, I thought I would at
least be able to get a friendly, receptive ear.  His wife and daughter
were in full agreement with me, but the commissioner dismissed all of my
suggestions and pleas.  In fact, he told me that I was "high on crack" for
even suggesting that he *not* cut spending to drug education and rehab
programs.  i then appealed to the media, the public, and various county
drug rehab and education facilities and tried to petition for public
hearings on the issue.  After getting stonewalled by the GOP-controlled
county board of commissioners, funding to drug rehab and education
programs was cut by over 50%.  Since that time (two years ago), drug
arrests and convictions, violent crime, murder, non-violent crimes,
and admissions to treatment centers have all risen, in all of the basic
statistical measurement categories.

Wake county taxes have increased dramatically (almost 50%), and we have
just completed building a new county jail and several county jail annex
facilities.  In both percentage and numbers, our county jail population is
at the highest rate it has ever been.

On a related note, seven of the Wake county sherriff's deputies, who all
had laptop computers (with Internet access) in their cruisers, were
recently busted for spending all of their time on the clock surfing the
web and going to porno websites and adult chatrooms.  One of the deputies
has been arrested for using a sherriff's department scanner to scan in a
picture of his genitals which he then sent to a young girl, a minor, from
his cruiser while on duty.

Additionally, the officer in charge of the weapons armory for the
sherriff's department, which contains full-auto weapons such as the HK MP5
and the M16, was recently dismissed because it was discovered that he had
been spending all of his time on the clock in another section of the
building surfing adult sites on the web.  Meanwhile, the armory was left
unlocked, deputies were unable to get their weapons serviced within a
reasonable period of time, and an M16 "disappeared".

My tax dollars at work...

>
>No amount of control over the population is enough for the U.S. Government.
>---guy
>

Next...i'll fill you in on some of the more interesting discoveries I made
while working for the NC Dept of Crime Control and Public Safety.  They
don't need satellites to watch you here in Raleigh...they have hi-tech,
hi-res cameras perched on top of all the tallest buildings, in the
projects, at selected street corners, and various other points.

so much for your privacy...

TATTOOMAN

/--------------------------[   TATTOOMAN   ]--------------------------\
| ORG: NC State Computer Science Dept    VP of The  E. H. A. P. Corp. |
| EML: jkwilli2 at adm.csc.ncsu.edu         ehap at hackers.com             |
| EML: jkwilli2 at unity.ncsu.edu           ehap-secure at hackers.com      |
| WWW: http://www4.ncsu.edu/~jkwilli2/   http://www.hackers.com/ehap/ |
| FTP: ftp://152.7.11.38/pub/personal/tattooman/                      |
| W3B: http://152.7.11.38/~tattooman/w3board/                         |
| PGP: finger tattooman at 152.7.11.38                                   |
\----------------[   http://152.7.11.38/~tattooman/  ]----------------/







From dstoler at globalpac.com  Sat Feb 21 05:51:41 1998
From: dstoler at globalpac.com (dstoler)
Date: Sat, 21 Feb 1998 05:51:41 -0800
Subject: Request for Web Browser Information
Message-ID: 


I would like to know the information my browser makes available to web sites. I use both Netscape and Internet Explorer.

Obviously web sites can determine my IP address for any given session; they can also look at cookies left by themselves and other sites.

Can anyone point me to where I can learn exactly what other information is made available (browser version?, OS version?, system name?, user name?, etc.)?

Thanks in advance.

David




From dstoler at globalpac.com  Sat Feb 21 05:52:35 1998
From: dstoler at globalpac.com (dstoler)
Date: Sat, 21 Feb 1998 05:52:35 -0800 (PST)
Subject: Request for Web Browser Information
Message-ID: 


I would like to know the information my browser makes available to web sites. I use both Netscape and Internet Explorer.

Obviously web sites can determine my IP address for any given session; they can also look at cookies left by themselves and other sites.

Can anyone point me to where I can learn exactly what other information is made available (browser version?, OS version?, system name?, user name?, etc.)?

Thanks in advance.

David







From ulf at fitug.de  Fri Feb 20 13:53:08 1998
From: ulf at fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Sat, 21 Feb 1998 05:53:08 +0800
Subject: FWD: Confirmations of Echelon (from Spy King)
In-Reply-To: <34EDA873.83F5A3@brainlink.com>
Message-ID: <9802201745.AA74814@public.uni-hamburg.de>



> Manchester Omega foundation. The complete report can be found under:
> www.heise.de/tp/deutsch/inhalt/te/1393/anchor1.html

They just copied it from John Young's site, and their copy lacks the
references.






From declan at well.com  Fri Feb 20 13:53:28 1998
From: declan at well.com (Declan McCullagh)
Date: Sat, 21 Feb 1998 05:53:28 +0800
Subject: Report from CFP, from the Netly News (fwd)
Message-ID: 





---------- Forwarded message ----------
Date: Fri, 20 Feb 1998 07:52:01 -0800 (PST)
From: Declan McCullagh 
To: politech at vorlon.mit.edu
Subject: Report from CFP, from the Netly News


*****

http://cgi.pathfinder.com/netly/opinion/0,1042,1754,00.html

The Netly News Network (http://netlynews.com/)
February 20, 1998

Vive la Conference
by Declan McCullagh (declan at well.com)

       Richard Stallman is nothing if not determined. For over two
   decades this bristly MIT geek has championed an arcane cause: free
   computer programs. Stallman wants you to have the right to twiddle
   your software -- to be able to add features, rewrite it and, if you
   can figure out how, teach it get down and do the fandango. Last month
   Netscape endorsed Stallman's idea by deciding to open the lid to its
   software toolbox and encouraging any interested programmer to tinker
   with it.

       Yesterday Stallman won an award from the Electronic Frontier
   Foundation for his efforts, including writing the popular (and, of
   course, free) EMACS text editor. "I was trying to give people
   freedom," he said during the ceremony at the Computers, Freedom and
   Privacy (CFP) conference.

       Stallman is the type of fellow who frequents CFP, an annual event
   that brings together academics, government officials and Pilot-toting
   bitheads. Sparring is commonplace. Lawyers from the ACLU and the
   Center for Democracy and Technology shouted at each other yesterday
   morning when debating whether to cut deals on legislation in Congress.
   Former FTC commissioner Christine Varney said that the government
   should regulate corporations' privacy practices, and Solveig Singleton
   from the Cato Institute argued on a panel that the private sector
   should (not that I'm biased or anything). But the folks who trekked to
   Austin, Texas, this week generally share a common goal: preserving the
   unique culture of the Internet.

[...]








From anon at anon.efga.org  Fri Feb 20 13:55:01 1998
From: anon at anon.efga.org (Anonymous)
Date: Sat, 21 Feb 1998 05:55:01 +0800
Subject: What is the latest version of PGP 5.5.x Biz?
Message-ID: <4b35b9bfbebb51c9c44a07987e2df5d8@anon.efga.org>



Uh!  All thses different versions floating about!  Can anyone tell me what the
latest version of PGP 5.5 Biz is?
5.5.2 ?  5.5.3?  (Win32 platform)

Thanks in advance










From lreed at west.cscwc.pima.edu  Fri Feb 20 13:55:44 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Sat, 21 Feb 1998 05:55:44 +0800
Subject: Prologue 2/0 / Space Aliens Hide My Drugs
Message-ID: <009C217C.9FF29980.11@west.cscwc.pima.edu>



SPACE ALIENS HIDE MY DRUGS !!!???!!! / Prologue 2/0

If This Is Sunday, I must be Toto:
[Was: Oh, what a Lucky man he Was:]
  It was only the third CypherPunks physical meeting I had attended 
and, as usual I spent the whole time watching from a distance, this 
time with Bianca watching me from a distance, to see who was watching 
me from a distance.
  The cellular rang.

  "Toto?"
  "Yes..."
  "You must be TruthMonger, today, because CJ just told Lucky Green 
that *he* is Toto."
  "OK. I guess it must be because he's so used to being Toto on the 
weekends, when he has to be back in the Home on Monday morning."
  "Bye."
  "Bye, dear." I hung up the phone.

  CJ doesn't get out a lot (pun intended).
  Normally, Bianca and I would have objected to him attending a 
CypherPunks physical meeting, but, since most of us have gone to 
ground recently, we thought there would be little danger in finding 
out what reaction his presence would elicit in certain individuals 
known to have so little sense as to be willing to be publically 
associated with Radical Anarchists who are too old and wise to merely 
be pretentious poseurs, and who actually have the knowledge, skills 
and experience to pose a serious threat to NWO plans to bring the 
Brave New Digital World into a state of CyberStatism.
  Thus, after clothing him in a manner that would make it obvious to 
anyone nervous about his appearance and demeanor that he was not 
likely to be carrying any concealed weapons of mass destruction, we 
ascertained that he had already 'gone potty' and sent him off to the 
C2Net offices in Oakland to act as our WeatherMan and ascertain which 
direction John Gilmore, et al, were blowing.

  Those who know CJ Parker only as a person who, after years of 
working in some of the most technologically advanced areas of the 
computer industry, still refers to a hard drive as "...the 
whatchamacallit...you know, the thing that spins around inside and 
you keep all of your information on it..." often fail to understand 
his usefulness to us a fount of information in regard to the subtle 
nuances that most people fail to pick up on in the busy madness of 
daily activity and social interaction.
  Although superficially inept and ill-equipped for life as we know 
it, those capable of seeing beyond the Veil of Maya recognize that, 
although he may be incapable of brain-registering whether or not the 
woman he has loved and lived with for a quarter of a century wears 
glasses, he has the ability to read the soul and psyche of those whom 
he only meets in passing, on the highways, byways, sidestreets and 
alleys of life.

  I originally thought that he was a totally useless conduit for 
information which needed to be gleaned in a reconnaisance mission 
type of manner. 
  It was one of Bianca's pre-teen computer neophytes who explained to 
me, "It's no use asking him any questions. If you ask him to estimate 
the numbers of at a meeting that thirty people attended, you will get 
an answer ranging between five and a hundred. If you want to find out 
things that even God doesn't know, you just have to make a statement 
that points to something which is likely to be totally untrue. He's 
the TruthMonger, you know."
  For some strange reason, children seem to have little trouble 
instinctively understanding the things that CJ discusses, even if 
they seem to be random, insane blatherings dealing with things far 
beyond the knowledge and experience one would expect a child to have 
had contact with thus far in life.

  "I bet everyone at the CypherPunks meeting was wearing blue socks." 
I told CJ after we met back in Berkeley at his sister's house.
  "No," he replied, "there was a lady wearing interesting jeans, who 
used to be the lover, or something, of one of the men there, and 
seemed to be temporarily in need of a lot of intellectual/emotional 
reassurance about her value and competency because of spending so 
many years of being a female with a brain in a penis-dominated 
industry."
  I now know CJ well enough that I realized that I had only to make 
one more false assumption, even though it was perfectly logical, in 
order to elicit a mountain of information about what took place, even 
though it was unlikely that he remembered, even vaguely, what the 
meeting had been about, from a normal point of view.
  "She spent a lot of time discussing various things with him?" I 
asked.
  "No." CJ replied, looking at me like I had just fallen off the 
turnip truck and had no idea how life really worked. "She barely paid 
any attention to him, and only spoke a few words to him at the end of 
the meeting."
  Moving right along, as if this statement clarified the foundation 
upon which he was basing this information, he proceeded to give us a 
full account of the meeting. An account which we knew would be 
totally accurate, once we had sifted out the parts which existed only 
in his own mind, since they would have made the experience so much 
more interesting and full of 'joi de vivre' if they *had* actually 
happened. (e.g. "...and every time Greg Broiles left the room, they 
would stop whatever they were discussing, and tell lawyer jokes until 
he got back. They've obviously been doing that for years, and he's 
never suspected.")

Random Excerpts From the ClueServer With One 512K Memory Bank:
  "I got to tell Peter Trei that his stuff kicks butt!"

  "Lucky Green and Bill Stewart are wearing the opposite bodies in 
real life that they have in my mind from knowing them on the 
CypherPunks mailing list."

  "The broads were phenomenal. I always figured that it would not be 
a mistake to marry any of the women on the CypherPunks list, sight 
unseen, and I knew I was right just by looking at them.
  "Oh...and when they talked, it wasn't like it burst the bubble of 
some sort of fantasy, or something...they were still like that."  
 {This is the statement that had Bianca snortling and giggling so 
hard that she was drooling on herself and blowing foam out of her 
nostrils. Later, she commented, "That was an example of the types of 
things he would say when I first met him that convinced me what a 
boorish, chauvanistic asshole he was, until I would think about them 
later and realize how sensitive and romantic they were if you really 
thought about what he was saying.")

  "Sameer sure looked at me funny. I guess he might have thought I'd 
just knocked off Billy Gates, and that he was next on the list.
  "I kind of wondered why, until I realized that we never really say 
anything nice about him to balance out all the bad shit we lay on him 
in our Dark Forces conspiracy theories, so that the people who fuck 
with us are less likely to fuck with him.
  "Shit, he's the guy who is taking all of the stuff that the 
idealists and theorists in cryptoanarchy are talking about and 
spreading it out in the real world where money and product rule the 
roost of results.
  "Oh, Yeah! That reminds me...
  "The only time I talked was when Eric Hughes was talking about 
Linux and saying the same bullshit that we all listened to--and said 
ourselves--decades ago, about UNIX. You know, about how UNIX should 
be ruling the world, instead of DOS, only now it's Linux, instead of 
Windows. Except it wasn't bullshit, then or now, except that what 
Hughes was saying was as true as what we used to say, and there isn't 
time anymore to go through this shit more times until we get it 
right, so I knew I had to ask what would make it turn out different 
this time.
  "I couldn't resist stepping on a few corns to see who was cool and 
who wasn't so I phrased my question to throw a little praise in 
Micro$not's direction. I mentioned that UNIX failed to take the hill 
even back when DOS sucked, big-time, and asked how it would be 
possible to do so with Linux, now that BadBillyG had a product that 
was actually functional, and worked, for the most part.
  "I was kind of disappointed in the answers, although I realized 
later that the only comments that came out were the knee-jerk 
reactions of those who had spent years in the industry being tortured 
by having to work with, or live in the shadow of, a primitive M$ 
operating system designed to torture people who actually wanted to 
make computers do something useful.
  "Some of them were very quiet and went inside their heads when I 
asked my question. Probably because its the kind of question you have 
to ask and answer for yourself, usually when you're laying awake in 
bed at four in the morning.
  "Actually, though, Eric Hughes, before I asked it, or afterwards, I 
don't really know, gave what is probably the only real answer, 
although some of us said it way back when, probably even him, but 
maybe we all just need to understand why it is the real answer. He 
said that it was up to people such as those gathered in that room, 
that day, to write the programs and make the links to existing 
software, systems and protocols that would provide end-users with the 
tools that they needed for Linux to legitimately serve their needs.
  "He might have also said that we/they would need to be prepared to 
do it regardless of whether or not it had any immediate or long-term 
financial payoff/incentive for us/them, but even if he didn't, I 
heard that in what he said, and I'm sure most of the others did, 
too."
  "Anyway, saying something nice about Micro$not in that room was as 
much fun as seeing the reaction at a wedding when you crap on the 
wedding cake."

  "I think I comported myself very well, even though it meant 
breaking my promise to my nephew to ask all of the CypherChicks 
whether or not they were wearing panties."

And In Case You Were Thinking About Filing the Preceding In The 
'Humor' Directory:
   Anyone at that CypherPunks physical meeting who failed to think 
seriously about the question CJ posed, either at the time, or later, 
upon reflection, is either an idiot, or quite possibly just too young 
to have been through more than a single "War to end all wars."

  Bianca told me that Lucky Green had mentioned to CJ that he had 
read "The Xenix Chainsaw Massacre" and had made a comment to the 
effect that he didn't really understand what it was, or was supposed 
to be, about. She said that she suspected that the reason for this 
was along the lines of the current status of such works as "1984," 
"Animal Farm" and "Brave New World."
  "1984," for example, is no longer some futuristic tale of a dark 
and menacing fate which may someday befall all of society and 
mankind. Rather, it contains a plethora of evil scenarios which have 
not only come to pass, but which have been realized more completely 
and in a more technologically effecient manner that the author could 
possibly have conceived of.
  Having grown up in an era when many of these futuristic projections 
were already a fait accompli, or in the beginning stages of becoming 
so, I sometime would reflect on how the work would have affected 
those who had read it decades before, when it was originally written. 
What parts seemed as if they might be whisperingly prophetic? What 
parts seemed to be semi-real fantasies about what might occur if the 
whole world went to hell in a handbasket? What parts seemed to be 
totally ludicrous scenarios which were the product of an author with 
too much time on his hands, and an overactive imagination?
  Now I wonder how the Chainsaw Massacre is perceived by those whose 
experience of 'the way things are, and always have been' encompasses 
many of the things which TXCSM had portrayed as dark undercurrents 
swirling about in the vortex of a rapidly spinning new technology.

  Undoubtedly the answer to that question is as multi-faceted and as 
context-dependent as a question asking "Who are you?"
  When the son of gomez describes computers that know all, see all, 
and can spit out the names of the miscreants at the speed of light, 
in order to dispose of them before the battle for the souls of all 
mankind begins, it must assuredly be read and understood differently 
by one whose elders told them tales about the great battles they 
fought to win the 'equal rights' and 'anti-discrimination' battles of 
recent eras, than by one whose elders described to them the dark 
terror of living in fear of being discovered for not wearing the 
yellow star which signified that the identification papers they were 
required to present to those in authority should be checked against 
the list of those to be bundled in cattle-cars which reeked of 
oppression and death, separated from their loved ones and sent to 
far-away labor camps.

  The morning after CJ had spoken to Lucky, Bianca woke in the wee 
hours to find him lying in bed and thinking, not having slept all 
night. She quiety asked him what it was he was thinking about. I 
heard his reply from the next room.
  The words he spoke, in a soft and quietly accepting tone, sent 
shivers down my spine, and left me with much to contemplate as I lay 
awake for some time before drifting off back to sleep.

  "Lucky is a nice kid. He's got bounce in his step and a gleam in 
his eye. He's got the world by the tail and every reason to believe 
that doing what he loves and living life with high standards and 
moral certitude will lead to a future where light will rule over 
darkness, and children will have a reason to smile.
  "I hope he's right. I desperately hope that he's right."
  "I want him to live in a world where "WebWorld & The Mythical 
Circle of Eunuchs" isn't prophetic. Where it is just an interesting 
story about how life could have been if the whole world turned to 
shit.
  "I don't want him to live in a world where, in the end, he ends up 
saying, as in the Prologue to 'WebWorld'--'If only we had known...'"

  "What Eric Hughes said at the CypherPunks meeting made me feel like 
it was 'Deja vu, all over again.' as Yogi Berra used to say.
  "He could well have been Bubba Rom Dos, speaking at the original 
meeting of the Circle of Eunuchs, telling those gathered, 'It's up to 
you. *You* need to pick up the torch. *You* need to write the 
code--to do the groundwork and light the way for those who will come 
after you. *You* need to do it, not for fame, fortune, or profit, but 
simply because it is right, and because it needs doing.'"

  "Linux isn't going to win out because it's the best. And it's not 
even going to be the best unless those who know its value and its 
capabilities *make* it the best for those who will never know or 
understand it, but will only know whether or not it serves them and 
suits their needs.
  "And it's not just Linux. The same goes for all of the other tools 
and trappings of future technolgy--censorware, encryption, monitoring 
tools, anonymity, identity based data-gathering."
  "The masses will use what they are given, what works best for them. 
They will take the easiest road, for the most part, as we all do in 
matters which we cannot control for ourselves. The masses aren't 
crying out for filtering software which will allow their children 
only to access a limited and prejudicial view of the world they live 
in--they are using it because that is what is being made available."

  "The same idealistic computer cowboys and self-proclaimed elitest 
programming gurus who decry the fact that the 'sheeple' are not 
willing to become computer experts in order to make use of what is 
'freely available' would be outraged if an airline company denied 
them a ticket because they didn't have a pilot's license, or didn't 
know from memory where all of the emergency exit doors are on a 
DC-7."

  "I shouldn't have been nice to Lucky. When he told me that he 
didn't understand 'The Xenix Chainsaw Massacre,' I should have 
grabbed him by the throat, thrown him against the wall, slapped him 
silly, and said, 'Read it again, you dumb bastard! It's about you. 
It's about John Gilmore, Tim May, Sandy Sandfort, Lynne Harrison, 
Hallam-Baker, and everyone else who is still wondering why the fuck 
we're spamming their mailing list with all of this semi-literate, 
mystical garbage about a mythical rag-tag band of lunatics striving 
to fight some nebulous battle between the Forces of Light and the 
Forces of Darkness.'
  "I should have told him, 'It's about the CypherPunks, you 
lame-witted dip-shit! "The True Story of the InterNet" was begun long 
before the CypherPunks even existed, because in order for the future 
of mankind to have any hope of all of surviving the next wave of 
technology with any of true life, liberty and freedom intact, 
individuals and groups like the CypherPunks *had* to come into 
existence.'

   "TXCSM was an allegory for the hackers, crackers, phreaks and 
punks who would have to serve as the soldiers, troops and armies that 
would be willing to leave behind the comfort and security of their 
home and hearth, if need be, to defend CyberSpace from those who 
would use it to rule and conquer all of MeatSpace. It's about the 
lawyers and programmers and middle-managers who abhor the hackers, 
crackers, phreaks and punks, but who are working within the system to 
defend the same ideals and concepts, in their own way.
  "The heros from the beginning of time, to the dark days of 
the Third Reich, were'nt soldiers. They were men, women, and 
sometimes even children, who *became* soldiers of one ilk or another, 
in order to defend themselves, their families and neighbors, their 
fellow humans, from rulers and forces which were striving to bring 
all of humanity under their thumb.
  "The Nazi death camps weren't liberated by soldiers. They were 
liberated by the same kind of people who were imprisoned in them. 
Farmers from Moscow, carpenters from Omaha, accountants from France, 
or Sweden, or Austrailia. People with dark skin or light skin, people 
speaking a multitude of different languages, people who had been 
preparing for war from the moment the dark clouds began forming over 
Europe and people who thrust themselves forward into battles they 
were ill-prepared for, when they realized the terror that lay ahead 
if they failed to resist the dark forces which were prepared to do 
them great harm."

  "The war in CyberSpace may lie in the future, when the majority of 
the masses realize that CyberHitler wants *more* than just 
CyberPoland. When the masses realize that the CyberGestapo aren't 
coming only for the CyberJews.
  "...but the revolution is *now*."

  "God help us all if those present at the CypherPunks meeting don't 
understand the true importance of Eric Hughes, a decade after 'The 
Xenix Chainsaw Massacre' was written, echoing the words of Bubba Rom 
Dos when he said, 'It's up to *you* and *I*.'"
  "God help us all if those involved with Alt2600 believe that they 
are just playing an interesting game of 'good guys versus bad guys,' 
and fail to see that the importance of the guerilla manuals they make 
available on this or that system is not in the affrontery it provides 
to the self-proclaimed, righteous, namby-pamby do-gooders, but to 
make it possible for some child of the future to know how to make a 
molotov cocktail when the Sedona, Arizona, SWAT-Team is preparing to 
assault their home with the heavy artillery proved for them by the 
federal government.
  "God help us all if normal, average, boring mathematicians like 
Peter Trei fail to realize that every line of code they write may 
someday become a chambered round of ammunition that provides the 
final blow which brings down the Great Digital Beast that is destined 
to rule us all if it is able to grow and prosper without resistance."

  "I hope and pray that Lucky Green, and others like him, begin to 
realize that the future is now, and that they *are* the future...that 
we *all* are the future.
  "The revolution is *now*, and *we* are the revolution.
  "If enough people realize that, and write the single lines of code 
with their attitudes, their beliefs, their votes and their actions, 
then maybe 'The True Story of the InterNet' will become just an 
interesting story--a cute fantasy instead of a dark harbinger of the 
future.
  "Maybe the dark clouds gathering over Digital Europe will dissipate 
and the sun will shine through, to make us all laugh at our silly 
fears about bad men and beasts who have dark designs to imprison our 
bodies and minds in physical and digital prisons, and who will 
require us to place a yellow star at the beginning of our email 
address."

  "Am I being silly, again? God, I hope so.  Goodnight, dear..."

[TBC]






From honig at otc.net  Fri Feb 20 13:56:15 1998
From: honig at otc.net (David Honig)
Date: Sat, 21 Feb 1998 05:56:15 +0800
Subject: news chaos
Message-ID: <3.0.5.32.19980220095854.007cf2b0@otc.net>



http://dailynews.yahoo.com/headlines/technology/wired/story.html?s=n/reuters
/980220/wired/stories/chaos_1.html

 Friday February 20 9:44 AM EST 

 Chaos may hold key to encryption, researchers say

 WASHINGTON (Reuters) - The key to secret communications may lie in chaos,
researchers reported Thursday. 

 They said they managed to encrypt information by making use of a noisy and
chaotic optical circuit. 

 Gregory VanWiggeren and Rjarshi Roy of the Georgia Institute of Technology
in Atlanta said they were able to use the chaotic
 fluctuations in a light signal to hide information. Duplicating qualities
of the transmitter allowed them to decode the message. 

 The value of such tools is growing as electronic commerce becomes more
widespread and businesses try to encode their material
 for secure transactions and communications. 

 They did not suggest how their scientific experiment, which they reported
in the journal Science, might be given a practical
 application. 

 VanWiggeren and Roy said they used an erbium-doped fiber ring laser. 

 "These lasers are particularly well suited for communication purposes
purposes because their lasing wavelengths roughly
 correspond to the minimum-loss wavelength in optical fiber," they wrote. 

 "A small 10 megahertz message was embedded in the larger chaotic carrier
and transmitted to the receiver system," they added.
 "The receiver has the same non-linearities as the transmitter, allowing it
to unfold the message from the chaos." 

 Researchers have in the past been able to bury messages in a noisy
electronic circuit but the low bandwidths of the systems make
 them less practical for high-speed communications. Optical circuits have
higher bandwidths. 

 "These preliminary but intriguing results suggest that chaos-based
applications may be more than just a laboratory curiosity," D. J.
 Gauthier at Duke University wrote in a commentary on the findings. 
------------------------------------------------------------
      David Honig                   Orbit Technology
     honig at otc.net                  Intaanetto Jigyoubu

   If you plan to enter text which our system might consider to be obscene, 
   check here to certify that you are old enough to hear the resulting
output. 
		http://www.bell-labs.com/project/tts/voices.html






	
















From anon at squirrel.owl.de  Fri Feb 20 13:56:17 1998
From: anon at squirrel.owl.de (Secret Squirrel)
Date: Sat, 21 Feb 1998 05:56:17 +0800
Subject: (none)
Message-ID: <9bd637742d4e1b3e993aef90790ea8ac@squirrel.owl.de>



SEND ME CHEESE FOR CRACKERS!!!









From ulf at fitug.de  Fri Feb 20 13:57:12 1998
From: ulf at fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Sat, 21 Feb 1998 05:57:12 +0800
Subject: "carefully monitor the Internet"
Message-ID: 



   To keep pace with the fast-moving money launders, FAFT said it would
   carefully monitor the Internet and so-called electronic purse systems,
   whereby cash is passed from person to person via electronic chips,
   leaving no audit trail in its wake.

http://www.yahoo.com/headlines/980212/wired/stories/money_2.html
http://www.oecd.org/fatf/






From netcenter-news at netscape.com  Sat Feb 21 06:04:33 1998
From: netcenter-news at netscape.com (netcenter-news at netscape.com)
Date: Sat, 21 Feb 1998 06:04:33 -0800 (PST)
Subject: Welcome to Netcenter!
Message-ID: <199802211404.GAA07734@toad.com>


Dear Netcenter Member, 

Welcome to Netscape Netcenter and congratulations on joining the Internet's best resource for software,
content, commerce, and community. With your free Netcenter registration, you're automatically signed
up for all Netcenter services and sweepstakes. Here's just a sampling of what Netcenter can do for you
every day: 

READ MORE, SURF LESS 
In-Box Direct transforms your email in-box into a customized newsstand, delivering free subscriptions
to over 120 top online publications - from The Wall Street Journal to CNN to Fox Sports - right to your
desktop. 

GET THE LATEST BUZZ 
Business Journal distills news from leading sources and sends you daily personalized briefings on any of
11 industries. 

But this is just the beginning. Netcenter is constantly growing - and we'll send you a free monthly email
newsletter featuring updates on Netcenter programs and introductions to new services. We'll even alert
you to Netcenter members-only specials from our online commerce sites: Marketplace, Software Depot,
and the Netscape Store. 

Visit Netcenter [http://home.netscape.com/netcenter/] again to check out all the services. 

Thanks again for joining the Netcenter community. 

The Netcenter Team 

Please note: Netscape respects your online time and Internet privacy. If you would prefer not to receive
future issues of Netcenter News, please reply to this message with the word "unsubscribe" in the subject
line






From bill.stewart at pobox.com  Fri Feb 20 14:10:21 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Sat, 21 Feb 1998 06:10:21 +0800
Subject: bugged?
In-Reply-To: 
Message-ID: <3.0.5.32.19980219181444.0087fd60@popd.ix.netcom.com>



>Sounds like he has a 56k modem and his ISP just upgraded to the same sort
>of 56k modem he has.  That is part of the protocol negotiation.  (In the
>future, it will take 30 minutes to finish connecting with a modem, but we
>will all get 666k transmission speed over normal phone lines.)

Yeah.  Credit-card verification terminals and similar devices are typically
locked into some low speed, 300 baud or 1200 or rarely 2400,
because they don't have many characters to send in a standard transaction,
and the slow speeds have a much faster setup/training time, especially
when they don't have to adaptively negotiate a connection speed.
				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639






From guy at panix.com  Fri Feb 20 14:11:38 1998
From: guy at panix.com (Information Security)
Date: Sat, 21 Feb 1998 06:11:38 +0800
Subject: Five industry giants propose encryption plan to protect Hollywood
Message-ID: <199802200635.BAA20101@panix2.panix.com>



   >   Date: Thu, 19 Feb 1998 11:13:50 -0800 (PST)
   >   From: William Knowles 
   >   
   >   BURBANK, Calif. (February 19, 1998 09:06 a.m. EST
   >   http://www.nando.net) -- Five computer and electronics industry giants
   >   have agreed on a strategy to prevent people from illegally copying
   >   digital movies and music, the Los Angeles Times reported Thursday.
   >    
   >   According to the proposal, high-definition TV sets, personal
   >   computers, digital video disc players, digital video cassette
   >   recorders and set-top boxes would be equipped with technology that
   >   requires a code before a copyrighted piece of work can be transferred
   >   from one device to another.
   >    
   >   It would ensure that someone who watches or listens to digital movies
   >   or music over satellite services, cable networks and the Internet
   >   won't be able to make copies without permission.
   >    
   >   The encryption technique scrambles the copyrighted material in one
   >   device so it cannot be unscrambled by another device without the
   >   correct software key.

It's unscrambled when it is listened to...what are they thinking?
---guy

   Escpecially regarding computers, this won't work.






From anon at anon.efga.org  Fri Feb 20 14:11:39 1998
From: anon at anon.efga.org (Anonymous)
Date: Sat, 21 Feb 1998 06:11:39 +0800
Subject: US law on re-exporting crypto software?
Message-ID: <883a59b4f8023618756b179357fba606@anon.efga.org>



An article in the current issue of the German journal `Datenschutz und
Datensicherheit' claims that exporting crypto software from anywhere
outside the US to a third country violates US law if the software
contains (only marginal amounts of) US-developed code, such as a C
standard library, and that anyone distributing crypto software that
has been compiled with an American compiler had better not visit the
United States.  Is that true?






From guy at panix.com  Fri Feb 20 14:16:47 1998
From: guy at panix.com (Information Security)
Date: Sat, 21 Feb 1998 06:16:47 +0800
Subject: PK & Re: Is spam really a problem?
Message-ID: <199802200602.BAA18990@panix2.panix.com>



   >   From sunder at brainlink.com Thu Feb 19 15:43:54 1998
   >   
   >   Information Security wrote:
   >   
   >   >    >   From sunder at brainlink.com Wed Feb 18 15:58:46 1998
   >   >    >
   >   >    >   Anonymous wrote:
   >   >    >   >
   >   >    >   > I see discussion of spam here and everywhere on
   >   >    >   > the net. But who finds it a *real* problem, and
   >   >    >   > why?
   >   > 
   >   > Why are you asking the cypherpunks list?
   >   
   >   I didn't. Anonymous did.  

Seth Breidbart (Mr. BI>20 == SPAM) insists it is a valid style
of attribution to give it once at the top.

My question was obviously directed at "Anonymous".

So you don't get confused again, I'll keep repeating the attributions:


   >   From sunder at brainlink.com Thu Feb 19 15:43:54 1998
   >
   >   Information Security wrote:
   >
   >   >    >   From sunder at brainlink.com Wed Feb 18 15:58:46 1998
   >   >    >
   >   >    >   There are nice technical solutions to this.  If sendmail
   >   >    >   didn't transport things unauthenticated it could be done,
   >   >    >   but at a cost in CPU cycles on mail servers:
   >   >    >
   >   >    >   Have every sendmail server use a PK scheme to talk to
   >   >    >   every other server and authenticate the connection.
   >   >    >   Have every sendmail server accept mail only from those
   >   >    >   whose key is verified.
   >   > 
   >   > Nonsense.
   >   > 
   >   > We (NANA) already know where spam comes from,
   >   > and when we complain about it, they are terminated.
   >   
   >   Until someone else gets a throw away $10 account and uses it to 
   >   spam, right?  By the time you track'em down, they already gave up
   >   that account.  All ISP's do is to delete the spamming account, which
   >   the spammer doesn't care about anyway.  So you achive nothing.

Talk about achieving nothing: what does server-to-server authentication
have to do with overcoming spam from throw-away accounts?

Hey, at least ISPs are making money from terminating accounts. ;-)



   >   From sunder at brainlink.com Thu Feb 19 15:43:54 1998
   >
   >   Further one can generate fake headers and you would not know exactly
   >   where it comes from, though you could have some idea since it would
   >   be one of many sites it was relayed from.  One could send messages
   >   from an ISP that doesn't mind spammers who won't help you track down
   >   the bitch that just slimed your machine, etc.

Jeez, take a breath between thoughts, will ya?

It is standard practice to trust only the last "Received" line.

What of it?

Again: what does server-to-server authentication have to do with
known unhelpful ISPs?



   >   From sunder at brainlink.com Thu Feb 19 15:43:54 1998
   >
   >   Information Security wrote:
   >    
   >   > PK authentication would change nothing.
   >   > 
   >   > Show a single spam with a forged IP address.
   >   
   >   IP addresses won't be forged, but one could send
   >   a mail with extra Recieved-By: headers, etc.

And how would throw-away accounts be affected by your proposed
massive change in SMTP protocol?





   >   From sunder at brainlink.com Thu Feb 19 15:43:54 1998
   >
   >   Information Security wrote:
   >    
   >   > PK authentication would only lead us down the
   >   > road of everyone being tattooed with barcodes
   >   > of our own making - and incredibly dumb idea.
   >   > 
   >   > It would be like requiring a smart card for Internet access.
   >   
   >   Bullshit.  PK auth with a central repository would be Big Brotherish.
   >   Having each user gen their own PK pair is what I suggested.

But these keys must be registered somewhere: whether it's at a centralized
site or distributed, *requiring* everyone to have a digital signature for
Internet access is twisting this elegant crypto-related technology: to
number each and every one of us, and is exactly what will make CDA legal,
because as soon as it's in place attributes such as "age" will be attached.

Required identity repositories are a bad idea.



   >   Relaying is a big problem.

What, you want _me_ to solve the UCE problem?

Okay.

I think if Brad (EFF Director) Templeton's whitelist system were
made available at the firewall/enterprise level, then widely
deployed, spam would be dead.

It's a handy little bot-reply mechanism that asks unknown authors
to verify they aren't sending UCE, else face a monetary penalty.

Replying correctly automatically causes the original email to go through.

Thus achieving the legal right to sue the spammer without
the legislation CAUCE is pushing.

The most important part of this design is that it requires
no control-freak changes to the Internet.

Don't suggest solutions that *require* digital signatures of everyone.

Sheesh.


This might work too:

Throttle email going through the ISP's mailserver.

Maybe 5/minute limit, flagging attempts to go faster to the admins.

As for direct PPP connectivity, upgrade router software to throttle.
(Port SMTP traffic)

Certain people, at the ISP's choice, would have a higher limit,
for mailing lists and such.
---guy

   Think.






From nobody at REPLAY.COM  Fri Feb 20 14:20:12 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Sat, 21 Feb 1998 06:20:12 +0800
Subject: about AES
Message-ID: <199802200515.GAA26034@basement.replay.com>




What is the encryption method that thinks to become
Advanced Encryption Standard (AES)? 
        






From whgiii at invweb.net  Sat Feb 21 07:08:46 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Sat, 21 Feb 1998 07:08:46 -0800 (PST)
Subject: I was auto-outed by an IMG tag in HTML spam
In-Reply-To: <3.0.5.32.19980220184839.008d4b50@popd.ix.netcom.com>
Message-ID: <199802211540.KAA14217@users.invweb.net>


-----BEGIN PGP SIGNED MESSAGE-----

In <3.0.5.32.19980220184839.008d4b50 at popd.ix.netcom.com>, on 02/20/98 
   at 09:48 PM, Bill Stewart  said:

>>   at 03:00 AM, Anonymous  said:
>>>Use mail readers that don't automatically process HTML and
>>>connect to image servers, accept cookies, or run javascripts.  You are
>>>being watched by tricky defective, er, detective types. es.
>>
>>Several things here:
>>
>At 02:32 AM 2/18/98 -0500, William H. Geiger III wrote:
>>1. HTML in mail:
>>There is just no place for this crap in e-mail. If multipart/alternative
>>is used it is tolarable but pure text/html messages go into the bitbucket
>>with a autoreply explaining to the poster the error of their ways. :)

>HTML is a fine format for email.  It's ASCII readable, and supports
>content description tags that the user's mail reader can render as
>bold/italic/underline/header-levels//color/etc.  It's far superior to
>using bloated undocumented Microsoft Word attachments. 95% of the HTML
>email I get IS spam, but that's a separate problem :-) (After all,
>SPAMMERs like bright colored blinking attention-getting mail.)

Yes but who needs all this crap in e-mail?? E-Mail is a messaging protocol
not a protocol for large documents (HTML is not sutable for large
documents either but that is for another rant).

WARNING: This is the only time you will see me say somthing good about
MickySloth.

I must admit that atleast MS Outlook follows the RFC's and makes use of
multipart/alternative when sending out HTML formated messages so others
are not forced to use a webbrowser to read their mail (unlike Net$cape or
Eudora).

There is no place for HTML in e-mail plain and simple. I do not wan't to
have to load a huge bloated bugfilled webbrowser just to process my e-mail
messages.

>>My recomendations is to dump the Netscape garbage and get a real e-mail
>>client. Netsacpe has done a good job at screwing up the web we really
>>don't need the same favor from them with e-mail.

>Netscape mail is adequate for many people, just as Eudora is. Newer
>versions are pretty bloated, but including S/MIME mail encryption for
>everybody is a Good Thing.

Now this is really scary. You consider pushing weak 40bit S/MIME on the
internet users a GoodThing(TM)? I think you need to sit down and rethink
this one Bill.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
  Hi
 
Tag-O-Matic: Have you crashed your Windows today?

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO7gPo9Co1n+aLhhAQEE4QQAkukbQzy1Dtw6g/vunMEBZ2o0tLs97lzw
oOAv01R/clFfPEOS64Zk+Yk+EZPg9vp++tLzgpijMOBEz0/pyEnSE3/9mCukhMm/
iQcaUy03eLm6wjK9hDOG04ktS69mVCgK49b9pmPDCdTXJz+MhNBgbenebNGa+97k
eVaA0mNCgcM=
=jjnj
-----END PGP SIGNATURE-----






From tcmay at got.net  Fri Feb 20 15:12:08 1998
From: tcmay at got.net (Tim May)
Date: Sat, 21 Feb 1998 07:12:08 +0800
Subject: about AES
In-Reply-To: <199802200515.GAA26034@basement.replay.com>
Message-ID: 



At 9:15 PM -0800 2/19/98, Anonymous wrote:
>What is the encryption method that thinks to become
>Advanced Encryption Standard (AES)?

The encryption method that "thinks to become Advanced Encryption Standard"
is the Hal 9000 Davomatic Supercryptalyzer. At least he told me he _thinks
to become_.

I suspect others have other ideas, though.

--Klaus! von Future Prime









From pleontks at hotmail.com  Fri Feb 20 15:16:09 1998
From: pleontks at hotmail.com (Perrin .)
Date: Sat, 21 Feb 1998 07:16:09 +0800
Subject: funny #1
Message-ID: <19980220225404.16861.qmail@hotmail.com>




A guy, a pig, and a dog are the survivors of a terrible shipwreck, and
they find themselves stranded on a desert island.  After being there =
awhile,
they get into a ritual of going to the beach every evening to watch=20
the sun go down.  One particular evening the sky was red with 
beautiful=20
cirrus clouds, the breeze was warm  and gentle - a perfect night for =
romance! =20
Well, that pig started looking better and better and pretty soon the guy 
=

rolled toward thepig and put his arm around it.  The dog was not very=20
happy with this and growled fiercely at the guy, until he removed his =
arm=20
from the pig.  They continued to enjoy the sunsets together, but no more 
=

cuddling.  A few weeks passed by, and lo and behold, there was 
another=20
shipwreck.  The only survivor was a beautiful young woman.  She was in a 
=

pretty bad way when they rescued her and they slowly nursed her back 
to=20
good health.  When she was well enough they introduced her to their=20
evening beach ritual.
It was another beautiful evening, red sky, cirrus clouds, warm gentle
breeze, perfect for romance, the four of them lying there.  The guy
started getting 'those' ideas again, so he leaned over toward the 
girl=20
and said, "Um...would you mind taking the dog for a walk?"




______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com






From guy at panix.com  Fri Feb 20 15:16:50 1998
From: guy at panix.com (Information Security)
Date: Sat, 21 Feb 1998 07:16:50 +0800
Subject: Fwd: Big Brother Sees through walls (from the spyking list)
Message-ID: <199802202304.SAA05606@panix2.panix.com>



   >   From: sunder 
   >   
   >   1)From: "George Martin" 
   >   Subject: News Release: High-Tech Surveillance
   >   
   >   Here's a sampling of how state and federal agencies are using this
   >   terrifying technology to spy on Americans:
   >   
   >   * In North Carolina, county governments use high-resolution spy satellite
   >   photographs to search for property improvements that might increase
   >   property tax assessments.

Was this cost authorized by taxpayers?

   >   * On the Mexican border, police use a "gamma ray scanner" to check
   >   tanker trucks for contraband, scanning right through the vehicle's metal
   >   sides.

Good!!!

CM excerpt:

#  Those rumor-level stories about our government encouraging
#  drugs to reach the inner cities were weird.
#   
#  Remember, we've been having a Drug War for four decades now.
#   
#  I guess there is a certain logic to it. Obviously the government is into
#  hysteria on the matter: it is then possible that they would want to continue
#  having a drug problem so they could continue the hysteria.
#   
#  Even the Attorney General was drooling over drug forfeiture dollars, to the
#  point of shunting aside other cases.
#   
#   
#  Recently...
#   
#  :   CBS 60 Minutes, Steve Croft reporting.
#  :
#  :   Remember that story of the hero customs agent snagging a tanker truck full
#  :   of cocaine? There is a strange twist to the story.
#  :
#  :   The Federal agent's manager repeatedly tried to interfere with him making
#  :   the bust.
#  :
#  :   The agent's dog had flagged the truck; the agent weighed it and found a
#  :   discrepancy. His manager said it must be in the tires. You can only check
#  :   the tires for drugs he was told.
#  :
#  :   But the agent persisted, and made the bust. His manager let the driver
#  :   of the truck leave. The driver literally fled on foot back to Mexico.
#   
#  What the hell was that about???
#   
#  Was it a single corrupt Federal agent?
#   
#  :   CBS 60 Minutes, Steve Croft reporting.
#  :
#  :   Standing at a fence about a hundred feet from the U.S. Customs lanes,
#  :   Steve Croft and an ex-agent with a walkie-talkie tuned to the right
#  :   frequency began videotaping the border crossings.
#  :
#  :   Truck after truck drove right through the individual Customs lanes,
#  :   not even stopping. "Nafta express lanes" explained the ex-agent.
#  :
#  :   Truck after truck drove straight into the U.S. unmonitored.
#  :
#  :   Then a message came through the walkie-talkie: "We got some cameras
#  :   watching, better get out there and cover traffic".
#  :
#  :   Suddenly several Customs agents came out of the booths and started
#  :   inspecting trucks.
#   
#  That makes at least five people at a minimum!
#   
#  What the hell is going on???
#  
#   
#  IF the rumor is true, THIS looks like it would be the smoking gun.
#   
#  How did our country get so twisted around that they can invade our
#  bodies to drug test, yet allow truck after truck after truck to
#  just wander right in knowing HUGE drug shipment after HUGE drug
#  shipment is crossing? Gosh, there's no drug problem with Mexican
#  police, military and even their president.
#   
#  *   The New York Times, February 19 1997
#  *
#  *   Brig. General Jesus Gutierrez Rebollo, Mexico's top Military Drug War
#  *   point man, was arrested on charges of receiving payoffs from Jaurez
#  *   cartel kingpin Amado Carrillo Fuentes, Defense Minister Enrique Cervantes
#  *   announced.
#  *
#  *   U.S. Drug Czar Gen. Barry McCaffrey had weeks earlier called General
#  *   Gutierrez "a guy of absolute unquestioned integrity."
#   
#   
#  And what if some terrorists wanted to sneak in an atom bomb?
#   
#  Put a NAFTA sticker on it and drive right on in, y'all. Welcome to the USA.
#   
#  If you want to really be certain, hide the A-bomb in a truck full of cocaine.
#   
#  If a terrorist nuclear bomb ever goes off in this country,
#  it drove in from Mexico.
#   
#  Meanwhile, Los Alamos National Laboratories developed technology that
#  allows an officer walking or driving down the street, as shown on MSNBC TV
#  6/9/97 www.TheSite.com, to determine whether anyone on the sidewalk is
#  carrying a gun.
#   
#  The priorities are all out of whack.
#   
#  Apply Military technology towards securing the border, not by spending
#  billions and billions and billions each year to secure each and every
#  one of us.
#   
#  We don't put governing-monitors on all car engines to control speeding.
#  Get an Operations Research clue.
#   
#   
#  Is our government perpetuating the availability of drugs?
#   
#  The 60 Minutes report sure makes it look like it is.
#   
#  How could letting unchecked Mexican truck after unchecked Mexican truck
#  through not be?
#   
#  !   FBI Director Louis J. Freeh, Senate Judiciary Committee, June 4, 1997
#  !
#  !   NEW CORRIDORS HAVE OPENED TO CONTINUE THE FLOOD OF DRUGS INTO AMERICA.
#   
#  No shit, Sherlock!   Ya don't nafta say another word.
#   
#  Every single truck can be checked using Military technology.
#   
#  But no, massive monitoring of people suspected of no crime is the
#  appropriate response.
#   
#  They were just warming us up for the CALEA telephone monitoring bill.
#   
#  ----
#   
#  Here is part of the story on why we let trucks full of cocaine and
#  heroin just roll right into the United States.
#   
#  *   "Diminished U.S. Role Below Border Plays Into Traffickers' Hands"
#  *
#  *   By Molly Moore and John Ward Anderson
#  *   Washington Post Foreign Service
#  *   Sunday, September 8 1996; Page A01
#  *   The Washington Post
#  *
#  *   Due to their new 'Mexicanization policy':
#  *   Mexico became the main gateway into the United States for illegal
#  *   narcotics, with the amount of cocaine making the journey climbing to
#  *   an estimated 210 tons last year.
#  *
#  *   Mexico's drug arrests plunged nearly 65 percent, from 27,369 the year
#  *   before the policy changes to 9,728 last year, according to data that
#  *   the Mexican government supplied to the State Department.
#  *
#  *   Cocaine seizures in Mexico were cut in half, dropping from more than
#  *   50 tons in 1993 to slightly more than 24 tons in each of the last two
#  *   years -- the smallest amounts since 1988, Mexican government figures
#  *   show.
#  *
#  *   The GAO report charges that Mexico's greatest problem is, in
#  *   fact, the "widespread, endemic corruption" throughout its law
#  *   enforcement agencies. Earlier this month, in an indictment of his own
#  *   department, Attorney General Lozano fired 737 members of his federal
#  *   police force -- 17 percent of his entire corps -- saying they did not
#  *   have "the ethical profile" required for the job. In a recent meeting
#  *   with foreign reporters, Lozano said it could take 15 years to clean up
#  *   the force.
#  *
#  *   In November 1993, President Clinton signed Presidential Decision Directive
#  *   No. 14, shifting U.S. anti-drug efforts away from intercepting cocaine as
#  *   it passed through Mexico and the Caribbean, and, instead, attacking the
#  *   drug supply at its sources in Colombia, Bolivia and Peru.
#   
#  The President himself ordered them to stop checking!!! This is in the same
#  leadership vein as Reagan declaring himself a "Contra".
#   
#  And why did President Clinton change strategy?
[snip]


   >   * The Naval Surface Warfare Center has developed an "ion sniffer,"
   >   a metal box that analyzes the chemical makeup of the air -- and can detect,
   >   for example, traces of cocaine through the skin days after drug use.

Bad.

   >   * In Georgia, the state's Department of Revenue will start using
   >   NASA satellites to examine the state's 58,910 square miles for illegal
   >   timber cutting.

Good.

   >   * In New Jersey, California, and other states, police use thermal
   >   imaging devices to scan houses for unusual heat sources that could indicate
   >   indoor marijuana growing operations. Houses can be scanned while police sit
   >   in their cruisers on the street.

Bad.

CM excerpt:

#  Here is a more detailed example of how government expands surveillance
#  (and thus control) in a seemingly never-ending manner...consider this when
#  talking about a National ID Card:
#   
#  Is it okay for the government to look at your property while walking by and
#  if the officer spots marijuana plants growing to get a search warrant?
#   
#  Of course it is.
#   
#  *   "The Right To Privacy", ISBN 0-679-74434-7, 1997
#  *   By Attorneys Ellen Alderman and Caroline Kennedy
#  *
#  *   ...then the Supreme Court ruled that if the yard was big enough that "An
#  *   individual may not legitimately demand privacy for activities conducted
#  *   out of doors in fields," the Court wrote, "except in the area immediately
#  *   surrounding the home."
#  *
#  *   ...then the Supreme Court ruled that a barn sixty yards from a farmhouse
#  *   was too far away from a house to expect privacy.
#  *
#  *   ...then the Supreme Court ruled that aerial surveillance did not constitute
#  *   a Fourth Amendment search.
#  *
#  *   ...then the Supreme Court ruled that a "precision aerial mapping camera"
#  *   that was able to capture objects as small as one-half inch in diameter did
#  *   not constitute a Fourth Amendment search.
#   
#  ...then courts ruled that infrared surveillance of homes was permissible.
#   
#   
#  What is this?
#   
#  *   Subject:      Re: Law Enforcement Aviation
#  *   From:         aufsj at imap2.asu.edu
#  *   Date:         1996/12/27
#  *   Newsgroups:   rec.aviation.military
#  *
#  *   What interests me is how new technologies will be interpreted. I recently
#  *   inquired at the local Law School about the courts views towards the use
#  *   of impulse radar, and they said "Impulse what the heck?"
#  *
#  *   Basically it is a radar that "sees through" things (like, say, your
#  *   house).
#  *
#  *   Their capabilities vary widely, but the feds are already using
#  *   them and I know that Hughes corp. is designing a low-cost set up
#  *   specifically for major police departments.
#  *
#  *   They are driving towards a unit that can be mounted on a police helicopter.
#  *
#  *   Will the police need a warrant? Who knows. Since they are allowed
#  *   to do airborne infra-red analysis of your house, why not an take an
#  *   airborne "x-ray" equivalent?
#  *
#  *   ---------------------------------------------------------------------
#  *   Steven J Forsberg   at  aufsj at imap2.asu.edu              Wizard 87-01


   >   * And in Arizona, the state's Department of Water Resources uses
   >   spy satellite photographs to monitor 750,000 acres of state farmland, and
   >   compares the images to a database to discover which farmers don't have
   >   irrigation permits.

Good, I guess.

   >   Even worse: The federal government will spend another $4.5 million
   >   this year to develop even more intrusive surveillance equipment.

Bad.

   >   Currently under development by the Justice Department: A "super
   >   x-ray" -- combining traditional x-ray technology, ultra-sound imaging, 
   >   and computer-aided metal detectors -- to reveal items hidden under clothes 
   >   from up to 60 feet away.

Bad.

   >   The courts are currently wrestling with the implications of the new
   >   technology, debating the limits of the government's power to "search"
   >   individuals from a distance with high-tech gadgets. Several contradictory
   >   court decisions have already emerged, for example, about whether
   >   thermal-imaging searches are Constitutional.
   >   
   >   Meanwhile, Republican and Democratic politicians continue to look
   >   for new uses of the technology -- with some government officials already
   >   talking about using satellite surveillance to track items as small as
   >   backyard porches to check for zoning violations and construction permits.

Smart cards are transponders.

Never forget that.

   >   "In the name of fighting crime, politicians seem eager to obliterate the
   >   protections against unreasonable search, with equipment that Americans used
   >   to only read about in Tom Clancy technothrillers," said Dasbach. "It's time
   >   for the American public to wake up and realize that Big Brother is here
   >   today -- and he's got a gamma ray scanner in his hand."

No amount of control over the population is enough for the U.S. Government.
---guy






From pleontks at hotmail.com  Fri Feb 20 15:17:42 1998
From: pleontks at hotmail.com (Perrin .)
Date: Sat, 21 Feb 1998 07:17:42 +0800
Subject: funny #2
Message-ID: <19980220225636.17947.qmail@hotmail.com>




A man who smelled like a distillery flopped on a subway seat next to a =
priest. =20
The man's tie was stained, his face was plastered with red lipstick, and 
=
a=20
half empty bottle of gin was sticking out of his torn coat pocket.  he =
opened=20
his newspaper and began reading. After a few minutes the disheveled guy 
=
turned=20
to the priest and asked,  "Say, father, what causes arthritis?"
"Mister, it's caused by loose living, being with cheap, wicked women, =
too much=20
alcohol and a contempt for your fellow man."
"Well I'll be damned."  the drunk muttered, returning to his paper.
The priest, thinking about what he had said, nudged the man and =
apologized. =20
"I'm very sorry.  I didn't mean to come on so strong.  How long did you 
=
have=20
arthritis?"
"I don't have it father.  I was just reading here that the Pope does."





______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com






From wombat at mcfeely.bsfs.org  Sat Feb 21 04:39:22 1998
From: wombat at mcfeely.bsfs.org (Rabid Wombat)
Date: Sat, 21 Feb 1998 07:39:22 -0500 (EST)
Subject: Some children are rabid and need to be put down
In-Reply-To: <199802212106.QAA16832@users.invweb.net>
Message-ID: 


> >I call things as I see them. I've heard no spin-doctoring, just reports
> >of the child's behavior, admitted by her father.
> 
> So one temper-tantrum by a 5 year old and its off to the BigHouse on
> Felony Assault Charges??

>From the sound if it; this was not "one tantrum", but a pattern of 
behavior that the parents failed to address after being requested to do so.

Would you want your children class with another child who repeatedly went 
into room-smashing rages with no appearant consequences for such behavior???

Sounds like the parents failed to "get around to" the counseling, and the 
school forced the issue.



From jkwilli2 at unity.ncsu.edu  Sat Feb 21 04:45:20 1998
From: jkwilli2 at unity.ncsu.edu (Ken Williams)
Date: Sat, 21 Feb 1998 07:45:20 -0500 (EST)
Subject: Fwd: Big Brother Sees through walls (from the spyking list)
In-Reply-To: <199802202304.SAA05606@panix2.panix.com>
Message-ID: 


On Fri, 20 Feb 1998, Information Security wrote:

>   >   From: sunder 
>   >   
>   >   1)From: "George Martin" 
>   >   Subject: News Release: High-Tech Surveillance
>   >   
>   >   Here's a sampling of how state and federal agencies are using this
>   >   terrifying technology to spy on Americans:
>   >   
>   >   * In North Carolina, county governments use high-resolution spy satellite
>   >   photographs to search for property improvements that might increase
>   >   property tax assessments.
>
>Was this cost authorized by taxpayers?
>

I have lived in Raleigh, North Carolina my entire life (over 30 yrs).
County governments consist of an elected board of commissioners who have
the power to make such decisions and expenditures without holding public
hearings on these matters.  Unless the local media jumps on one of these
proposals weeks in advance, nobody will even know about it or have an
opportunity to petition for a public hearing.  Once the county
commisioners vote on and approve it, our money is spent and the public has
no recourse (until the next election).  Here in Raleigh, Wake County, NC,
for instance, we have a Republican county commissioner and a board of
members.  When I heard from his daughter, a personal friend, about his
plans to cut funding to drug education and rehab programs and redirect all
of those funds to the county prison system, I decided to act.  I contacted
the commissioner himself, his office, and even had lunch with his wife and
daughter to discuss this issue.  As a family friend, I thought I would at
least be able to get a friendly, receptive ear.  His wife and daughter
were in full agreement with me, but the commissioner dismissed all of my
suggestions and pleas.  In fact, he told me that I was "high on crack" for
even suggesting that he *not* cut spending to drug education and rehab
programs.  i then appealed to the media, the public, and various county
drug rehab and education facilities and tried to petition for public
hearings on the issue.  After getting stonewalled by the GOP-controlled
county board of commissioners, funding to drug rehab and education
programs was cut by over 50%.  Since that time (two years ago), drug
arrests and convictions, violent crime, murder, non-violent crimes,
and admissions to treatment centers have all risen, in all of the basic
statistical measurement categories.

Wake county taxes have increased dramatically (almost 50%), and we have
just completed building a new county jail and several county jail annex
facilities.  In both percentage and numbers, our county jail population is
at the highest rate it has ever been.

On a related note, seven of the Wake county sherriff's deputies, who all
had laptop computers (with Internet access) in their cruisers, were
recently busted for spending all of their time on the clock surfing the
web and going to porno websites and adult chatrooms.  One of the deputies
has been arrested for using a sherriff's department scanner to scan in a
picture of his genitals which he then sent to a young girl, a minor, from
his cruiser while on duty.

Additionally, the officer in charge of the weapons armory for the
sherriff's department, which contains full-auto weapons such as the HK MP5
and the M16, was recently dismissed because it was discovered that he had
been spending all of his time on the clock in another section of the
building surfing adult sites on the web.  Meanwhile, the armory was left
unlocked, deputies were unable to get their weapons serviced within a
reasonable period of time, and an M16 "disappeared".

My tax dollars at work...

>
>No amount of control over the population is enough for the U.S. Government.
>---guy
>

Next...i'll fill you in on some of the more interesting discoveries I made
while working for the NC Dept of Crime Control and Public Safety.  They
don't need satellites to watch you here in Raleigh...they have hi-tech,
hi-res cameras perched on top of all the tallest buildings, in the
projects, at selected street corners, and various other points.

so much for your privacy...

TATTOOMAN

/--------------------------[   TATTOOMAN   ]--------------------------\
| ORG: NC State Computer Science Dept    VP of The  E. H. A. P. Corp. |
| EML: jkwilli2 at adm.csc.ncsu.edu         ehap at hackers.com             |
| EML: jkwilli2 at unity.ncsu.edu           ehap-secure at hackers.com      |
| WWW: http://www4.ncsu.edu/~jkwilli2/   http://www.hackers.com/ehap/ |
| FTP: ftp://152.7.11.38/pub/personal/tattooman/                      |
| W3B: http://152.7.11.38/~tattooman/w3board/                         |
| PGP: finger tattooman at 152.7.11.38                                   |
\----------------[   http://152.7.11.38/~tattooman/  ]----------------/




From attila at hun.org  Fri Feb 20 23:57:36 1998
From: attila at hun.org (Attila T. Hun)
Date: Sat, 21 Feb 98 07:57:36 +0000
Subject: destruction of chemical weapons
In-Reply-To: <3.0.5.32.19980220092346.008dd590@popd.ix.netcom.com>
Message-ID: <19980221.075736.attila@hun.org>


-----BEGIN PGP SIGNED MESSAGE-----

on or about 980220:0923, in <3.0.5.32.19980220092346.008dd590 at popd.ix.netcom.com>, 
    Bill Stewart  was purported to have 
    expostulated to perpetuate an opinion:

    [snip]

>but the US refused for a long time to sign the CBW treaties, and I'm not
>sure they ever did follow through and destroy their supplies.
>				Thanks! 
>					Bill

    they built an enormous incinerator in Utah near the Nevada border
    in the area of Dugway, but not within that restricted zone. it went
    operation about 18-24 months ago, was closed last year for 
    verification of contamination (Utah and EPA obviously against it),
    and as far as I know, it's opeartional and doing its thing.

    the govt was also building a facility in the south pacific; maybe
    on what's left of Bimini or one nearby which are within the 
    protectorate --no idea what the status of that one is except 
    Greenpeace was doing their usual howling about transporting 
    the stuff both in the US and across the big pond --they were
    planning on exporting the stuff through the port at Oakland
    Navy Yard.

    one of the largest caches of obsolete stuff used to be in
    the old munitions bunkers just south of Long Beach between 
    the freeway and the ocean --if not seal beach, then huntington
    beach --the bunkers were for the Long Beach naval ship yard
    and the port of LA.  have no idea what the status is as that
    was years ago --you can see the bunkers from the freeway --they
    go on for a couple miles.

    we did not want the incinerator on Utah, and are not too
    enthused about the reactivation of Dugway as a "more secure"
    Area 51 --it is, and much harder to access with no visibility
    points that plagued area 51.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNO6L57R8UA6T6u61AQEbkQIAlj3rAwPjFadjaNFXk4lM0M5uePUnHXTz
wzgLPQZsLCPa3VmDcxDFIpQAl/K7fyNruJzLRAYJ6f2r096/DdKpyA==
=AW4q
-----END PGP SIGNATURE-----
    



From paladin at lvcablemodem.com  Fri Feb 20 16:01:56 1998
From: paladin at lvcablemodem.com (Eric J. Tune)
Date: Sat, 21 Feb 1998 08:01:56 +0800
Subject: Diffie-Hellman vs RSA
Message-ID: <3.0.5.32.19980220155427.007c1880@pop3.lvcablemodem.com>



Can anyone tell me the differences between the Diffie-Hellman algorithm and
the RSA algorithm?  Is one cryptologically better? (DH let's you use 4096
bit keys versus 2048 bit keys for RSA in PGP 5.5).  Thanks for any and all
info.

Eric Tune







From rah at shipwright.com  Sat Feb 21 05:33:36 1998
From: rah at shipwright.com (Robert Hettinga)
Date: Sat, 21 Feb 1998 08:33:36 -0500
Subject: A Geodesic Society?
In-Reply-To: <3.0.5.32.19980220091102.008dd590@popd.ix.netcom.com>
References: 
Message-ID: 


At 12:11 PM -0500 on 2/20/98, Bill Stewart wrote:


> Heh - West Coast Cypherpunks end up on Japanese TV :-)

So do Anguillan ones. And Boston ones, but they get edited out for talking
too much. And not having the requisite goatee ;-). Anyway, when they do pay
attention to these things moneypunks are more interested places in like
Financial Times, Institutional Investor, and of course Forbes. :-). Nikkei,
which is the Japanese equivalent of the Wall Street Journal, will do.  Of
course, J. Pierpont Morgan hired a PR man to keep J. P. Morgan & Co., Inc.,
*out* of the papers. I expect that'll happen soon enough... :-).

> Good article.

Thank you.

> If you're trying to emphasize the financial stuff,
> moving it up to the beginning would help, but I don't know the audience
> you wrote it for.

There were three lists, each with it's own group of paid ringers. One about
the net in general, with Rheingold on it, one on the net in Asia, with no
one I recognised, and one on net commerce, with me. :-). I was just warming
them all up for the next rant, which will be more on finance, with the
stuff at the end. That rant will only go to the commerce list.

> _Bell_ Labs,


Oops. Drag. Even a spelling checker would have caught that one...


> However, the Electro-Mechanical telephone switch was Not Invented Here -

I know the story about the mortician. The point I was trying to make was
that AT&T were "incentivized", by the cost of regulation, certainly, but
mostly by economics in general, to automate switching, not that they
invented the electromechanical switch in particular.

> The difficulty, of course, is that geodesic markets with bearer
> instruments make it easy to do business anonymously - so everyone
> may know that fraud was committed, but not know who committed it.

Actually, with anonymous bearer settlement, like with blind signatures, you
still need a perfect pseudonym to clear the trade, which, modulo a few
biometric peculiarities which I wrote a 40k rant about here in December
:-), is perfect anonymity. That pseudonym can have reputation, which is
(roughly) orthogonal to the biometric identity of the person owning that
pseudonym's private key.

Anyway, the whole point to bearer-settled transactions is that you're
trusting the issuer as far as the integrity of the certificates themselves
are concerned. First by the financial reputation of the issuer, and then by
the ability to inspect and validate the certificates when they're exchanged.

Since we haven't figured out a way to do a workable offline protocol,
modulo hints of one on the FC98 program :-), the problem of inspection is
handled by using an on-line protocol, which, in the case of Chaum,
essentially issues new, but blinded, certificates in the "name" of the
public key accepting them for payment or receipt. For larger value
transactions, anyway. The whole issue of doing a transaction offline with
current bearer settlement technology is obviously a question of financial
risk. I claim that the cost of bearer protocols, even when you reissue
blinded bearer certificates for every transaction, will still be cheaper
than book-entry settlement. It'll certainly be faster to clear and settle.

The exception to this, of course, is micropayments, where hash collision
tokens like MicroMint and hashcash, will probably be tested stocastically
for double spending, and expiration and other thing will probably handle
the rest. Since these will eventually be device-level payment systems, I
expect that fraudulent devices will have a harder time operating if their
reputation goes than people will, but maybe not.

The problem of the reputation of the issuer is simply a matter of
demonstrating nonperformance of the obligation represented by the bearer
certificate.

Which brings us to the parties using the certificates for exchange. I
expect the functional anonymity of blinded bearer protocols will be good
enough, but, like I said before, if someone wants to accept
second-generation offline blinded certificates in payment, their
willingness to do so is a function of financial risk. More to the point,
the reciever can test these certificates, and the person who offers them
for exchange is simply out their value if they turn out to be double spent,
so the risk is actually borne by the spender, same as it ever was.

Finally, there's the issue of fraud outside the integrity of bearer
certificates. Again, it's a function of financial risk. For low value
transactions, even the use of a perfect pseudonym is not necessary, and you
could use utterly anonymous transaction. However, I expect that persistant
perfect pseudonymity will be the rule, and that it will be functional
enough anonymity (modulo the biometric problems of transaction analysis I
talked about in December) for even the most decerning cypherpunk.


> The lack of need for accounts and reputation capital is part of what
> makes geodesic markets financially advantageous.  On the other hand,
> reconciling these differences is complex enough that cryptographers
> and financial folks can make big bucks getting it right :-)

Say 'amen', somebody. :-). If, as I claim, digital bearer settlement can
reduce the cost of transactions by three orders of magnitude over all forms
of book-entry settlement, then we'll have no choice to adopt them. As
people quite familiar with Moore's Law, we all know how much money can be
made when you reduce the cost of doing something so much. The rest, of
course, will be history. :-).

Cheers,



-----------------
Robert Hettinga (rah at shipwright.com), Philodox
e$, 44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
The e$ Home Page: http://www.shipwright.com/
Ask me about FC98 in Anguilla!: 




From whgiii at invweb.net  Fri Feb 20 16:38:36 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Sat, 21 Feb 1998 08:38:36 +0800
Subject: Five industry giants propose encryption plan to protect Hollywood
In-Reply-To: <199802200635.BAA20101@panix2.panix.com>
Message-ID: <199802210056.TAA07362@users.invweb.net>



-----BEGIN PGP SIGNED MESSAGE-----

In <199802200635.BAA20101 at panix2.panix.com>, on 02/20/98 
   at 01:35 AM, Information Security  said:

>   >   Date: Thu, 19 Feb 1998 11:13:50 -0800 (PST)
>   >   From: William Knowles 
>   >   
>   >   BURBANK, Calif. (February 19, 1998 09:06 a.m. EST
>   >   http://www.nando.net) -- Five computer and electronics industry
>giants
>   >   have agreed on a strategy to prevent people from illegally copying
>   >   digital movies and music, the Los Angeles Times reported Thursday.
>   >    
>   >   According to the proposal, high-definition TV sets, personal
>   >   computers, digital video disc players, digital video cassette
>   >   recorders and set-top boxes would be equipped with technology that
>   >   requires a code before a copyrighted piece of work can be
>transferred
>   >   from one device to another.
>   >    
>   >   It would ensure that someone who watches or listens to digital
>movies
>   >   or music over satellite services, cable networks and the Internet
>   >   won't be able to make copies without permission.
>   >    
>   >   The encryption technique scrambles the copyrighted material in one
>   >   device so it cannot be unscrambled by another device without the
>   >   correct software key.

>It's unscrambled when it is listened to...what are they thinking? ---guy

what they are talking about is *every* VCR, TapeRecorded, ...ect will not
record data that has this security feature without a proper record code.
(keep hold of the old VCR's and Tape Players). Even though the data is
decrypted to be viewed you will still have a stego data channel that will
tell these recording devices to to record.

Will this prevent the professional bootleger from making copies? No. The
finanical incentives for working around these security measures are there
(bootleging is a multi-billion dollor business). What this will do is
prevent you from recording songs off a CD to play on a tape in your car or
prevent you from recording that movie you just watched on PPV.

>   Escpecially regarding computers, this won't work.

Well I have gone over this in previous posts that right's management
woun't work against the bootlegers as at some time you have to display the
raw data to the user. what it will to is make things that much harder for
the average user.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: Windows: The Gates of hell.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO4RHI9Co1n+aLhhAQFG2QP/UB+mC12eokmLdoZcW80HhDzffc6AhDvm
JvVnMra07WTfv9+0axDUHlf7K940yTAeB9gIygPyprNcecB0LndEt0dUB3202oeS
1H2Hztl6Ub/cZVkxnIILeGUDKd/g5jIAnM+/J7e1SHdqPqh0+Bx7WVv2wMLaxl1o
riku/bZu5FY=
=yOdL
-----END PGP SIGNATURE-----






From sunder at brainlink.com  Sat Feb 21 08:53:56 1998
From: sunder at brainlink.com (sunder)
Date: Sat, 21 Feb 1998 08:53:56 -0800 (PST)
Subject: Is spam really a problem?
In-Reply-To: <199802182107.QAA00482@panix2.panix.com>
Message-ID: <34EC98A6.363D0100@brainlink.com>


Information Security wrote:

>    >   From sunder at brainlink.com Wed Feb 18 15:58:46 1998
>    >
>    >   Anonymous wrote:
>    >   >
>    >   > I see discussion of spam here and everywhere on
>    >   > the net. But who finds it a *real* problem, and
>    >   > why?
> 
> Why are you asking the cypherpunks list?

I didn't. Anonymous did.  
 
>    >   There are nice technical solutions to this.  If sendmail didn't transport
>    >   things unauthenticated it could be done, but at a cost in CPU cycles on mail
>    >   servers:
>    >
>    >   Have every sendmail server use a PK scheme to talk to every other
>    >   server and authenticate the connection.  Have every sendmail server accept
>    >   mail only from those whose key is verified.
> 
> Nonsense.
> 
> We (NANA) already know where spam comes from,
> and when we complain about it, they are terminated.

Until someone else gets a throw away $10 account and uses it to 
spam, right?  By the time you track'em down, they already gave up
that account.  All ISP's do is to delete the spamming account, which
the spammer doesn't care about anyway.  So you achive nothing.

Further one can generate fake headers and you would not know exactly where
it comes from, though you could have some idea since it would be one of
many sites it was relayed from.  One could send messages from an ISP
that doesn't mind spammers who won't help you track down the bitch that
just slimed your machine, etc.

 
> PK authentication would change nothing.
> 
> Show a single spam with a forged IP address.

IP addresses won't be forged, but one could send
a mail with extra Recieved-By: headers, etc.
 
> PK authentication would only lead us down the
> road of everyone being tattooed with barcodes
> of our own making - and incredibly dumb idea.
> 
> It would be like requiring a smart card for Internet access.

Bullshit.  PK auth with a central repository would be Big Brotherish.
Having each user gen their own PK pair is what I suggested. That
would allow anon users to have persistant (or even throw away)
identities, but prevent Joe Spambitch from telnetting to port 25
and spamming that way.

Even if Joe Spambitch does gen PK pairs and uses them, he can't
gen a pair for every message he sends, the recipient servers won't
recognize his PK pair and might have been instructed to block messages
from bad (and possibly unknown PK's), or at least refuse to relay
messages from unknown PK's.  Relaying is a big problem.

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================





From whgiii at invweb.net  Sat Feb 21 06:02:13 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Sat, 21 Feb 98 09:02:13 -0500
Subject: I was auto-outed by an IMG tag in HTML spam
In-Reply-To: <3.0.5.32.19980220184839.008d4b50@popd.ix.netcom.com>
Message-ID: <199802211540.KAA14217@users.invweb.net>


-----BEGIN PGP SIGNED MESSAGE-----

In <3.0.5.32.19980220184839.008d4b50 at popd.ix.netcom.com>, on 02/20/98 
   at 09:48 PM, Bill Stewart  said:

>>   at 03:00 AM, Anonymous  said:
>>>Use mail readers that don't automatically process HTML and
>>>connect to image servers, accept cookies, or run javascripts.  You are
>>>being watched by tricky defective, er, detective types. es.
>>
>>Several things here:
>>
>At 02:32 AM 2/18/98 -0500, William H. Geiger III wrote:
>>1. HTML in mail:
>>There is just no place for this crap in e-mail. If multipart/alternative
>>is used it is tolarable but pure text/html messages go into the bitbucket
>>with a autoreply explaining to the poster the error of their ways. :)

>HTML is a fine format for email.  It's ASCII readable, and supports
>content description tags that the user's mail reader can render as
>bold/italic/underline/header-levels//color/etc.  It's far superior to
>using bloated undocumented Microsoft Word attachments. 95% of the HTML
>email I get IS spam, but that's a separate problem :-) (After all,
>SPAMMERs like bright colored blinking attention-getting mail.)

Yes but who needs all this crap in e-mail?? E-Mail is a messaging protocol
not a protocol for large documents (HTML is not sutable for large
documents either but that is for another rant).

WARNING: This is the only time you will see me say somthing good about
MickySloth.

I must admit that atleast MS Outlook follows the RFC's and makes use of
multipart/alternative when sending out HTML formated messages so others
are not forced to use a webbrowser to read their mail (unlike Net$cape or
Eudora).

There is no place for HTML in e-mail plain and simple. I do not wan't to
have to load a huge bloated bugfilled webbrowser just to process my e-mail
messages.

>>My recomendations is to dump the Netscape garbage and get a real e-mail
>>client. Netsacpe has done a good job at screwing up the web we really
>>don't need the same favor from them with e-mail.

>Netscape mail is adequate for many people, just as Eudora is. Newer
>versions are pretty bloated, but including S/MIME mail encryption for
>everybody is a Good Thing.

Now this is really scary. You consider pushing weak 40bit S/MIME on the
internet users a GoodThing(TM)? I think you need to sit down and rethink
this one Bill.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
  Hi
 
Tag-O-Matic: Have you crashed your Windows today?

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO7gPo9Co1n+aLhhAQEE4QQAkukbQzy1Dtw6g/vunMEBZ2o0tLs97lzw
oOAv01R/clFfPEOS64Zk+Yk+EZPg9vp++tLzgpijMOBEz0/pyEnSE3/9mCukhMm/
iQcaUy03eLm6wjK9hDOG04ktS69mVCgK49b9pmPDCdTXJz+MhNBgbenebNGa+97k
eVaA0mNCgcM=
=jjnj
-----END PGP SIGNATURE-----



From whgiii at invweb.net  Sat Feb 21 06:13:43 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Sat, 21 Feb 98 09:13:43 -0500
Subject: Some children are rabid and need to be put down
In-Reply-To: 
Message-ID: <199802211552.KAA14306@users.invweb.net>


-----BEGIN PGP SIGNED MESSAGE-----

In , on 02/20/98 
   at 08:30 PM, Tim May  said:


>At 6:29 PM -0800 2/20/98, William H. Geiger III wrote:

>>No not at all. We have some serious problems with the County Sherifs
>>Department down here.
>>

>I'm having a hard time understanding all this criticism of the actions.
>>From what I've read, the girl bit, scratched, threw chairs, etc.

>Many of us think 13- and 14-year-olds who commit murder should be
>executed (well, I do), so why should younger children be exempt from
>legal action?

Well I think that we have a large gap between a 5 year old little girl
having a temper tantrum and a teanager gangbanger going and shooting
people.

>I know that if a kid was throwing chairs at me I'd be tempted to throw a
>punch back...something that is strictly verboten. Lawsuits, criminal
>prosecution, never work in the school system again, that sort of
>verboten.

Well you have definatly jumped off the deep end on this one Tim. If we
were talking a teenager going out of control then I would agree with you.
A 5 year old though??

>If a teacher can't defend herself, legally and professionally, from
>children biting and throwing chairs, the cops have to be called.

If a teacher can not subdue and control a 5 year old little girl without
resorting to physical violence or calling in the storm troopers it's time
to look for another line of work.

>And from what I've heard about this little girl, it's beginning to sound
>like she ought to be put down like a dog that can't stop biting. Or at
>least kicked out of the school completely...perhaps a reform school will
>straighten her out.

When have you ever been so quick to blindly believe the spindoctoring of
the government Tim?

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
  Hi
 
Tag-O-Matic: Have you crashed your Windows today?

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO7i7I9Co1n+aLhhAQGCQgQAtKNhMFDKgk3Mxw7HbZv8aWAX0D50mola
dnJcEIqa/qtgoXhRt0jnGUZa8ilz6yHtZX78KlDv4KY4ps78bb/JKroLFG7Nfyg6
xVmzwGVLqRxRxC10LA7BIlive9ulaY6/diysNdRkFlgWYTuSzqUxt2dP+FCYH5p4
8mpGKRZ7mI0=
=YxPX
-----END PGP SIGNATURE-----



From emc at wire.insync.net  Fri Feb 20 17:20:10 1998
From: emc at wire.insync.net (Eric Cordian)
Date: Sat, 21 Feb 1998 09:20:10 +0800
Subject: Diffie-Hellman vs RSA
In-Reply-To: <3.0.5.32.19980220155427.007c1880@pop3.lvcablemodem.com>
Message-ID: <199802210105.TAA02965@wire.insync.net>



"Eric J. Tune"  writes:
 
> Can anyone tell me the differences between the Diffie-Hellman
> algorithm and the RSA algorithm?  Is one cryptologically better? (DH
> let's you use 4096 bit keys versus 2048 bit keys for RSA in PGP 5.5).
> Thanks for any and all info.
 
AltaVista Search (http://altavista.digital.com/)
 
Search [the Web] for documents in [any language]
"RSA algorithm"__________________________________________________
 
1627 documents match your query.
Click here to find related books at amazon.com
 
 
Search [the Web] for documents in [any language]
"Diffie-Hellman"_________________________________________________
 
3426 documents match your query.
Click here to find related books at amazon.com

You're welcome.

--  
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
 






From eristic at gryzmak.lodz.pdi.net  Fri Feb 20 17:40:18 1998
From: eristic at gryzmak.lodz.pdi.net (Marek Jedlinski)
Date: Sat, 21 Feb 1998 09:40:18 +0800
Subject: Is spam really a problem?
In-Reply-To: 
Message-ID: <34eeebcf.17966504@gryzmak.lodz.pdi.net>



Tim May wrote:

If:

>Indeed, discussion of "what to do about spam?" periodically consumes all of
>the main lists I'm on. Discussion of spam is worse than the actual spam.

then:

Discussion of net abuse is worse than net abuse.
Discussion of theft is worse than theft.
Discussion of, hey, abortion is worse than...

Hear Mister Free-Speech talk, and shudder.

.marek




From whgiii at invweb.net  Fri Feb 20 17:51:32 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Sat, 21 Feb 1998 09:51:32 +0800
Subject: Is spam really a problem?
In-Reply-To: <34eeebcf.17966504@gryzmak.lodz.pdi.net>
Message-ID: <199802210219.VAA07980@users.invweb.net>



-----BEGIN PGP SIGNED MESSAGE-----

In <34eeebcf.17966504 at gryzmak.lodz.pdi.net>, on 02/21/98 
   at 12:33 AM, eristic at gryzmak.lodz.pdi.net (Marek Jedlinski) said:

>Tim May wrote:

>If:

>>Indeed, discussion of "what to do about spam?" periodically consumes all of
>>the main lists I'm on. Discussion of spam is worse than the actual spam.

>then:

>Discussion of net abuse is worse than net abuse.
>Discussion of theft is worse than theft.
>Discussion of, hey, abortion is worse than...

>Hear Mister Free-Speech talk, and shudder.

Oh PLEASE! You can't really be that much of a moron can you??

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: Don't be held back by yesterday's DOS!  Try today's OS/2!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO4kio9Co1n+aLhhAQFRIwP+PYYJrui8ofFVmBnfIDV+iXHi6j9DXfPo
krouRLrOCmxAgW9+3LxOFmoW/tIz+T6ZrIe7sixhbL+FVEqbj3aUODmS6Fg9u7at
7IBRhnxTxODQkTfyrEcaofCPPFE4FDgD4CLfMYXWARWx1vAoVBdCYx5N1luDy2Sg
04Nqvgr+bzI=
=9I+8
-----END PGP SIGNATURE-----






From anon at squirrel.owl.de  Sat Feb 21 02:13:01 1998
From: anon at squirrel.owl.de (Secret Squirrel)
Date: 21 Feb 1998 10:13:01 -0000
Subject: Vile Vial Files
Message-ID: <12833561a6e4adb37573fcda57df3627@squirrel.owl.de>


Timothy May wrote:

>(One can asssume that with more and more such things being added to the
>"watch lists" each year, that there will be less acceptance of cash, or
>anonymous digital cash, for such purchases.)

I tried to buy some chemicals down here with cash about six months ago. They
tried everything they could to get me to write a check and in the end I
stormed out of the building, leaving the merchandise on the counter. I
haven't been back yet, and there's probably a good chance that the security
camera footage was sent to the FBI. Come to think of it, that would explain
some rather wierd incidents I've observed since then.

People say that the only reason to pay in cash is if you have something to
hide. You're damned right. The last thing I want is a bunch of government 
shills keeping track of what I buy so that they can stage some raid because 
they have a record of me paying for a beaker "which could be used" to mix 
chemicals which "could be used" as explosives, or metal "which could be 
used" to make thermite which "could be used" for some nefarious purpose.

In America today if you have interests in biology, chemistry, or physics it
is considered grounds by both the government and the pathetic sheep to shoot
you. Pardon me if I'm a little bit paranoid these days. It used to be
intellectuals were just beat up and made fun of by the others in schools.
Now it's fashionable to throw them in jail or kill them. "Unauthorized 
and illegitimate research:" what a stupid concept.

The American people consider anybody who does things in secret to be
automatically guilty. Forget the principles that America was founded on! When 
the government sends the ninjas into your home because you were going 56 mph
when you passed a cop on the highway and looked over at him the wrong way
they sieze your computer. They find that you're running Linux. Oooh, you
must be evil because your computer is password protected but the Microshaft
apologist across the hall has his computer wide open. They find that you
have blocks of random data on your drive, and even if they don't get them
decrypted because they *ARE* blocks of completely random data they wave it
in front of a jury and get a guilty verdict.

It's a sad, sad state of affairs.

>ObMinorNote: I recently tried to buy a bag of ammonium nitrate for my
>yard...the local yard store says it hasn't been available to ordinary
>customers since OKC. I had to settle for ammonium sulfate instead.

It is when I read things like this that I realize how completely stupid the
entire government position is. Why do you need to buy ammonium nitrate to
make a bomb?

Assuming you just don't use something else which is more effective, why not
do this?

 NH OH + HNO --> NH NO  + H O
   3        3      3  3    2

So this naturally leads to the following question: Is having nitric acid and
ammonium hydroxide now a crime worthy of ninjas flying through your windows
with big guns in the middle of the night and shooting you because "you
looked like you were going for a weapon" when you flushed the toilet and
pulled your pants up?

Then if they don't have anything to charge you with they plant some drugs in
your toilet tank and claim that you were in "possession of drugs with
intention to distribute." Of course you were going to distribute them! You
had a truck and you frequently drove around! 

>We live in a dangerous world, full of potentially dangerous substances and
>things. Instead of dealing with the danger on a personal basis, we are
>using the government as our nanny, and also letting it record our
>purchases, open files on us for "unusual" purchases, and generally track
>our actions. Which actually won't have much effect on dedicated terrorists
>and criminals.

Exactly. Welcome to the shakedown extortion police state known as Amerika,
Land of the Freeh.



From tcmay at got.net  Sat Feb 21 10:22:42 1998
From: tcmay at got.net (Tim May)
Date: Sat, 21 Feb 1998 10:22:42 -0800
Subject: Some children are rabid and need to be put down
In-Reply-To: <199802211552.KAA14306@users.invweb.net>
References: 
Message-ID: 


At 6:13 AM -0800 2/21/98, William H. Geiger III wrote:

>Well you have definatly jumped off the deep end on this one Tim. If we
>were talking a teenager going out of control then I would agree with you.
>A 5 year old though??
>
>>If a teacher can't defend herself, legally and professionally, from
>>children biting and throwing chairs, the cops have to be called.
>
>If a teacher can not subdue and control a 5 year old little girl without
>resorting to physical violence or calling in the storm troopers it's time
>to look for another line of work.

My sister teaches Kindergarten/first grade in the LA County School
District, specifically, Inglewood (shudder). She is forbidden to:

- physically touch the children in any way

- discipline them in any meaningful way

- flunk them if they fail to behave or learn what is supposedly required

("Flunking Kindergarten" is tough, so where this rule really become
significant is in the higher grades, where all kids are promoted, even
those who can't read, can't add, etc.)

My sister says the teachers have zero power to do anything, and the kids
know it.

>When have you ever been so quick to blindly believe the spindoctoring of
>the government Tim?
>

Spare me the casual insults.

I call things as I see them. I've heard no spin-doctoring, just reports of
the child's behavior, admitted by her father.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.





From whgiii at invweb.net  Fri Feb 20 18:47:15 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Sat, 21 Feb 1998 10:47:15 +0800
Subject: Pensacola Police have lost their mind!!
Message-ID: <199802210306.WAA08336@users.invweb.net>



-----BEGIN PGP SIGNED MESSAGE-----

I don't know if this story has reached the AP wire or not but today the
brave defenders of the faith here in Pensacola, FL have done their sworn
duty to protect us all by arresting a 5yr old on assault charges (againts
one of the Adult staff of the school).

These are the same brave soles who a few months ago when confronted by a
man sitting in his car with a gun to his head solved this problem by
riddeling his car, surrounding buildings, and a McDonalds playground with
over 100 rounds.

As soon as I have some more information on this I will post a full report.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
 
Tag-O-Matic: Windows: The Gates of hell.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO4vbI9Co1n+aLhhAQF7WwP/YrKBFkxLWHjmkX+oU/N58bBqiORWYZvA
ceEXVavR+hhtse+dDZQjVwu1O/mUQsnhGZvs3ichG+kl3f1Uonyze9EFdxkSpK8T
f4bR/um/UlobMDusOdG4HjUyTBw/h7rLuORFm4KvGxH3AS5hii2fGeEpQnUIabQQ
lPYLStK7TUg=
=rLlC
-----END PGP SIGNATURE-----






From jkunken at uclink4.berkeley.edu  Sat Feb 21 10:59:15 1998
From: jkunken at uclink4.berkeley.edu (Joshua Kunken)
Date: Sat, 21 Feb 1998 10:59:15 -0800 (PST)
Subject: Request for Web Browser Information
Message-ID: <199802211859.KAA19501@uclink4.berkeley.edu>


Sure, check out:  http://www.autobahn.org/main/addr.shtml

What year is it? 1984? hehhehe

Lates...

At 05:51 AM 2/21/98 -0800, you wrote:
>I would like to know the information my browser makes available to web
sites. I use both Netscape and Internet Explorer.
>
>Obviously web sites can determine my IP address for any given session;
they can also look at cookies left by themselves and other sites.
>
>Can anyone point me to where I can learn exactly what other information is
made available (browser version?, OS version?, system name?, user name?,
etc.)?
>
>Thanks in advance.
>
>David
> 

Joshua Kunken
Administrative Computing
jkunken at uclink4.berkeley.edu

"100% uptime? You betcha!"






From fnorky at geocities.com  Sat Feb 21 10:59:32 1998
From: fnorky at geocities.com (Douglas L. Peterson)
Date: Sat, 21 Feb 1998 10:59:32 -0800 (PST)
Subject: Fwd: Big Brother Sees through walls (from the spyking list)
In-Reply-To: 
Message-ID: <34f12039.131228245@smtp.ix.netcom.com>


On Sat, 21 Feb 1998 07:45:20 -0500 (EST), you wrote:

>
>On Fri, 20 Feb 1998, Information Security wrote:
>
>>   >   From: sunder 
>>   >   
>>   >   1)From: "George Martin" 
>>   >   Subject: News Release: High-Tech Surveillance
>>   >   
>>   >   Here's a sampling of how state and federal agencies are using this
>>   >   terrifying technology to spy on Americans:
>>   >   
>>   >   * In North Carolina, county governments use high-resolution spy satellite
>>   >   photographs to search for property improvements that might increase
>>   >   property tax assessments.
>>
>>Was this cost authorized by taxpayers?
>>
>
>I have lived in Raleigh, North Carolina my entire life (over 30 yrs).
>County governments consist of an elected board of commissioners who have
>the power to make such decisions and expenditures without holding public
>hearings on these matters.  Unless the local media jumps on one of these
>proposals weeks in advance, nobody will even know about it or have an
>opportunity to petition for a public hearing.  Once the county
>commisioners vote on and approve it, our money is spent and the public has
>no recourse (until the next election).  Here in Raleigh, Wake County, NC,
>for instance, we have a Republican county commissioner and a board of
>members.  When I heard from his daughter, a personal friend, about his
>plans to cut funding to drug education and rehab programs and redirect all
>of those funds to the county prison system, I decided to act.  I contacted
>the commissioner himself, his office, and even had lunch with his wife and
>daughter to discuss this issue.  As a family friend, I thought I would at
>least be able to get a friendly, receptive ear.  His wife and daughter
>were in full agreement with me, but the commissioner dismissed all of my
>suggestions and pleas.  In fact, he told me that I was "high on crack" for
>even suggesting that he *not* cut spending to drug education and rehab
>programs.  i then appealed to the media, the public, and various county
>drug rehab and education facilities and tried to petition for public
>hearings on the issue.  After getting stonewalled by the GOP-controlled
>county board of commissioners, funding to drug rehab and education
>programs was cut by over 50%.  Since that time (two years ago), drug
>arrests and convictions, violent crime, murder, non-violent crimes,
>and admissions to treatment centers have all risen, in all of the basic
>statistical measurement categories.
>
>Wake county taxes have increased dramatically (almost 50%), and we have
>just completed building a new county jail and several county jail annex
>facilities.  In both percentage and numbers, our county jail population is
>at the highest rate it has ever been.
>
>On a related note, seven of the Wake county sherriff's deputies, who all
>had laptop computers (with Internet access) in their cruisers, were
>recently busted for spending all of their time on the clock surfing the
>web and going to porno websites and adult chatrooms.  One of the deputies
>has been arrested for using a sherriff's department scanner to scan in a
>picture of his genitals which he then sent to a young girl, a minor, from
>his cruiser while on duty.
>
>Additionally, the officer in charge of the weapons armory for the
>sherriff's department, which contains full-auto weapons such as the HK MP5
>and the M16, was recently dismissed because it was discovered that he had
>been spending all of his time on the clock in another section of the
>building surfing adult sites on the web.  Meanwhile, the armory was left
>unlocked, deputies were unable to get their weapons serviced within a
>reasonable period of time, and an M16 "disappeared".
>
>My tax dollars at work...

May I suggest trying what we did here in Colorado.  Take a look at our
Taxpayers Bill of Rights.  No government in Colorado (state, county or
local) can raise taxes without putting the measure before the public
for a vote.  We have, for the time being, tied the hands of the
government.  They can't just spend money and expect to raise taxes to
cover the short fall.

It took 5 state wide elections to amend the constitution, but the
public finely wised up.  Each election, the State would promise to
change their spending habits.  They broke that promise every time,
once within days of the election.

We have also, on a few occasions, amended our state constitution to
force the government to fund specific items (Education for one) before
any other items may be funded.

If your North Carolina allows the public to patition to have a measure
put before the public in an election, try doing it.  It's not perfect,
but it might send a clear message to the government.

-Doug

p.s.
  Please forgive the grammar errors.  I suffer from using a Microsoft
spelling checker that likes to change the meaning of my words.
-------------------
Douglas L. Peterson
mailto:fnorky at geocities.com
http://www.geocities.com/SiliconValley/Heights/1271/






From jkunken at uclink4.berkeley.edu  Sat Feb 21 10:59:38 1998
From: jkunken at uclink4.berkeley.edu (Joshua Kunken)
Date: Sat, 21 Feb 1998 10:59:38 -0800
Subject: Request for Web Browser Information
Message-ID: <199802211859.KAA19501@uclink4.berkeley.edu>


Sure, check out:  http://www.autobahn.org/main/addr.shtml

What year is it? 1984? hehhehe

Lates...

At 05:51 AM 2/21/98 -0800, you wrote:
>I would like to know the information my browser makes available to web
sites. I use both Netscape and Internet Explorer.
>
>Obviously web sites can determine my IP address for any given session;
they can also look at cookies left by themselves and other sites.
>
>Can anyone point me to where I can learn exactly what other information is
made available (browser version?, OS version?, system name?, user name?,
etc.)?
>
>Thanks in advance.
>
>David
> 

Joshua Kunken
Administrative Computing
jkunken at uclink4.berkeley.edu

"100% uptime? You betcha!"



From ravage at ssz.com  Fri Feb 20 19:01:56 1998
From: ravage at ssz.com (Jim Choate)
Date: Sat, 21 Feb 1998 11:01:56 +0800
Subject: Pensacola Police have lost their mind!! (fwd)
Message-ID: <199802210309.VAA27046@einstein.ssz.com>



Forwarded message:

> From: "William H. Geiger III" 
> Date: Fri, 20 Feb 98 20:27:22 -0500
> Subject: Pensacola Police have lost their mind!!

> I don't know if this story has reached the AP wire or not but today the
> brave defenders of the faith here in Pensacola, FL have done their sworn
> duty to protect us all by arresting a 5yr old on assault charges (againts
> one of the Adult staff of the school).

It made it to CNN.

> These are the same brave soles who a few months ago when confronted by a
> man sitting in his car with a gun to his head solved this problem by
> riddeling his car, surrounding buildings, and a McDonalds playground with
> over 100 rounds.
> 
> As soon as I have some more information on this I will post a full report.

Their story was that the child had a behavioral problem and the parents
refused to get counceling when the school requested. She apparently goes on
room smashing temper tantrums on a regular basis. The father of the child
said it was the most ludicrous thing he had ever heard of, reportedly.

Can't say that changes the situation a heck of a lot though...


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From fnorky at geocities.com  Sat Feb 21 11:06:39 1998
From: fnorky at geocities.com (Douglas L. Peterson)
Date: Sat, 21 Feb 1998 11:06:39 -0800 (PST)
Subject: "carefully monitor the Internet"
In-Reply-To: 
Message-ID: <34f223bb.132126550@smtp.ix.netcom.com>


On Fri, 20 Feb 1998 18:38:04 +0100 (GMT+0100), you wrote:

>
>   To keep pace with the fast-moving money launders, FAFT said it would
>   carefully monitor the Internet and so-called electronic purse systems,
>   whereby cash is passed from person to person via electronic chips,
>   leaving no audit trail in its wake.
>
>http://www.yahoo.com/headlines/980212/wired/stories/money_2.html
>http://www.oecd.org/fatf/

Hmm, lets see.  I login using secure shell.  Now I start a SSL session
to someplace where I want to exchange money.  Next I use e-cash.  The
monitor will see encrypted garbage.

Quick, kick in the door.  He is using encryption!  Must be money
launders!

-Doug


-------------------
Douglas L. Peterson
mailto:fnorky at geocities.com
http://www.geocities.com/SiliconValley/Heights/1271/






From tcmay at got.net  Sat Feb 21 11:12:12 1998
From: tcmay at got.net (Tim May)
Date: Sat, 21 Feb 1998 11:12:12 -0800
Subject: The Secret Side of Government
In-Reply-To: <3.0.5.32.19980220092346.008dd590@popd.ix.netcom.com>
References: <199802201043.FAA00924@users.invweb.net>
 <89B3250098@ou20.csm.port.ac.uk>
Message-ID: 


At 9:23 AM -0800 2/20/98, Bill Stewart wrote:

>They'd also be focusing on the great job they've done eliminating the
>entire US stock of CBW and nukes.  Oh, we haven't?  Well their weapons
>of mass destruction are Evil, and ours are Freedom Fighting Tools.
>Actually the US and Former Soviet Union have substantially reduced the
>nuclear forces, especially older missiles that are hard to maintain,
>but the US refused for a long time to sign the CBW treaties,
>and I'm not sure they ever did follow through and destroy their supplies.

Nixon made a very big deal of signing some papers which would supposedly
get rid of CBW supplies and research. This was back in 1972.

(I remember this clearly, because I was in college and my roomates and I,
all libertarians, hooted when the supposedly eliminated CBW weapons got
loose at Dugway Proving Grounds and killed a bunch of sheeple (er, "sheep")
in Utah...and an excellent and rage-inspiring movie with George C. Scott,
"Rage," had a similar theme. Highly recommended, if you can find it.)

What really happened is that a bunch of military bacteriological warfare
facilities were turned over to the private sector. Oh, and renamed "cancer
research," which looked good to the sheeple, as Nixon had just declared a
War on Cancer.

So, Litton Bionetics took a big piece, the National Cancer Institute
formally took over some of the military's labs (but the staff remained
unchanged, and some of the military brass "retired" to these
now-civilianized facilities), and things went on as usual. Well, not "as
usual," as it appears the secret side of governtment drastically stepped-up
work on biological and chemical weapons.

And the stockpiles still exist, of course. Some are corroding inside VX
warheads near Hanford, Washington (a good place to be far away from). Some
are stockpiled in Germany, apparently too dangerous to even move. And some
are no doubt stockpiled in lots of other places.

Here's a little personal story:

I worked for two summers in one of the labs probably related to this whole
thing. I worked in an immunology lab in the summers of 1969 and 1970,
working on immunoassay methods. My job was mundane, to run experiments
directed by others, to bleed mice for their serum, to run centrifuges, and
so on. Others in the lab worked with monkeys, on cancer, and hepatitus.
Yep, we had one of the first clean rooms in the nation, with double
airlocks, devoted to Hepatitus B (I think it was). All of this in a
nondescript warehouse building in Springfield, Virginia, just down Highway
95 from Washington. The company was initially Melpar, then the lab was spun
off into Melloy Labs. Some of the labs, Melpar at least, were sold to
E-Systems, the spook/SIGINT private contractor.

(For those who live, or lived, in the D.C. area, here are a few more
details. The lab was originally at the Arlington Boulevard facility of
Melpar, near the intersection with the Beltway. The biological labs were
spun-off and moved to West Springfield in 1970.)

I hadn't thought about this work for many years, until in the past couple
of years I've been reading up on the history of AIDS and the military's
work on monkey viruses. (Books, "Hot Zone," "AIDS, Ebola, and Emerging
Viruses," "Mary, Ferry, and the Monkey Virus," etc.)

It turns out that the period 1969-73 was a period of "privatizing" much
research that the military had formerly done. Several labs affiliated with
defense contractors were actively working with monkey cultures, and
maintaining contacts with Fort Detrick, the NIH, and the NCI. One figure
that stands out in this time period is Dr. Robert Gallo, who later achieved
fame for his HIV discovery (prior credit is often given to the French head
of the Pasteur Institute, Dr. Luc M.). I honestly have no way of recalling
if Gallo was circulating through our lab, or if the doctors I worked for
(Dr. Anne Jackson and Dr. Frederick Hyams) had contact with him.

As I learn more about this period, and the links between Hepatitus-B, AIDS,
and the timing of the big AIDS/HIV outbreak in the late 70s and early 80s,
I can't help wondering if the lab I worked in was involved in this whole
affair. A lot of things match up closely, and the absorbtion of Melpar into
E-Systems is part of the coincidences.

But all of this was a long time ago, before many of you were born.

The larger issue is that the spook side of government is only the tip of
the iceberg. For every $600 million "unindentified" building out past
Dulles Airport, eventually identified as the new headquarters of the
supersecret National Reconnaissance Organization (NRO), there are many
times as many "contractors" and "subcontractors" doing work too sensitive
even for the government to do. In fact, the unknown huge building in the
Virginia countryside was officially labelled as a Rockwell building, if I
recall correctly.)

(Readers may be familiar with Wackenhut, Science Applications, MITRE, etc.
Besides the large aerospace companies, all with large spook divisions, and
all with outlying offices doing work that few in the parent companies are
even cleared to know about.)

This is precisely the military-industrial complex that Eisenhower warned us
about in his Farewell Speech, and that Washington in effect warned us about
in _his_ speech, when he warned about foreign entanglements and foreign
wars.

Footnote: Did the U.S. government and its subcontractors develop HIV as a
biological weapon? To be tested in Africa, as some suggest? Or was it an
accident, an accident let out of the labs of the Naval Health Sciences labs
(later Litton Bionetics) the East Bay of the Bay Area (site of many early
AIDS cases)? Or is it true that HIV viruses have been found in biological
specimens preserved for 40 years? And even if some HIV-like viruses existed
in nature, could the U.S. have isolated it and concentrated it in those
labs doing the work I described in the early 70s?

I don't know the answer to these questions. As my favorite researcher into
these matters puts it, "Food for thought and grounds for further research."
(Dave Emory, whose tapes can be bought. Use web search engines to find URLs
if interested.)

One thing I know for sure, the "secret" side of government is far larger
than most people think.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.





From ravage at ssz.com  Fri Feb 20 19:26:48 1998
From: ravage at ssz.com (Jim Choate)
Date: Sat, 21 Feb 1998 11:26:48 +0800
Subject: Anthrax suspect predicts attack on US [CNN]
Message-ID: <199802210335.VAA27136@einstein.ssz.com>



Forwarded message:

> Subject: http:--www.cnn.com-US-9802-20-anthrax.arrests-

>                MAN SUSPECTED OF HAVING ANTHRAX PREDICTED ATTACK
>        
>      February 20, 1998
>      Web posted at: 10:15 p.m. EST (0315 GMT)
>      
>      LAS VEGAS, Nevada (CNN) -- A man arrested on charges of possessing
>      what is believed to be the deadly toxin anthrax predicted on a radio
>      talk show the day before his arrest that the United States would be
>      the target of a major biological attack within two years.
>      
>      Tuesday, Larry Wayne Harris, speaking on Talk America Radio
>      Network's "The Buck Stops Here," gave a detailed description of what
>      he said was a plot involving more than 200 "sleeper cells" of Iraqi
>      students poised to unleash anthrax and bubonic plague bacteria on
>      the American people.
>      
>      "The odds of us making it through even the end of this century
>      without a major biological incident are very low," Harris said.
>      
>      Harris, 46, and William Leavitt Jr., 47, were arrested Wednesday
>      night in a Las Vegas suburb after an informant called the FBI to
>      report the two men told him they had anthrax. They are being held at
>      the Clark County Detention Center.
>      
>      Laboratory test results to determine whether a substance seized was
>      in fact anthrax were delayed Friday. No reason was given. 
>      
>   Leavitt's attorney: Tests will be negative
>   
>      
>      
>      Leavitt's attorney, Lamond Mills, said in an interview with CNN in
>      Las Vegas he believes the tests will prove negative.
>      
>      "On Monday, I think the test results will be in and show that it's
>      non-toxic, and they're going to have to stand up and acknowledge
>      that. And their case is going to be flushed," Mills said.

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From anon at anon.efga.org  Fri Feb 20 19:29:23 1998
From: anon at anon.efga.org (Anonymous)
Date: Sat, 21 Feb 1998 11:29:23 +0800
Subject: On War, Legends, and Crypto (fwd)
In-Reply-To: <199802201934.NAA24685@einstein.ssz.com>
Message-ID: 




> From the trainrobbers perspective this is certainly true. From the Sheriff's
> perspective it shows the futility of his job if his goal is to stop all
> crime.
> 
> Are the Cypherpunks here to rob trains or to keep trains from being robbed?


I was suggesting that when finding oneself in a conflict with LEOs, it is
better to be in the position of a trainrobber hiding in a cave with a
backdoor, rather than in the position of someone getting bombed in their
house at Waco or Ruby Ridge.

You are always better off if you can show your opponent the futility of
his goal.






From whgiii at invweb.net  Fri Feb 20 19:31:40 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Sat, 21 Feb 1998 11:31:40 +0800
Subject: Pensacola Police Need a Reality Check
Message-ID: <199802210357.WAA08703@users.invweb.net>



-----BEGIN PGP SIGNED MESSAGE-----

News Story
Pensacola News Journal
Friday, Febuary 20, 1998

Kindergartner arrested in school scuffle
By Sonja Lewis and Lesley Conn
New Journal Staff Writters

    Her daddy told her it was like finger-painting, but 5 yaer-old
Chaquita Doman was actually being fingerprinted following her arrest
Wednesday and it wasn't fun.
    The Edgewater Elementary kindergarten student was booked on a felony
battery warrant at the Department of Youth Services after scuffling with
her school counselor. Linda green, 51, told Escambia deputies Chaquita bit
and scratched her Feb. 3 when she tried to calm the girl. The warrant for
battery of an elected official or educator was issued the day of the
incident.
    Escambia deputies have never arrested anyone younger, a spokeswoman
said.
    Chaquita's father, Lee Ernest Middleton, said the arrest is the most
ludicrous thing he's ever experienced.
    District spokeswoman Barbara Frye said school officials were making
sure a child with "an-out-of-contorl rage" got some counseling.
    Deputies notified Chaquita's parents Tuesday of the arrest warrant.
Her parents brought her in Wednesday.
    "Can you imagine what it's like to have your daughter fingerprinted
and escorted by a deputy to a juvenile facility?" asked her father.
    Middleton, 35, said he plans to contact a lawer as early as this
morning because of the emotional trauma suffered by his daughter and her
identical twin sister, Shakita.
    He took his daughters out of school Thursday.
    Missing four of her front teeth, Chaquita nodded Thursday that she bit
and scratched someone. "She's good", she said tossing her thumb towards
her twin. "I'm bad".
    Chaquita threw furniture and inflicted at least 27 deep scratches and
bit Green's arm to cause "significant bleeding," Frye said.
    Chaquita was suspended for three days and her parents were asked to
sign a counseling referral slip, Frye said. Because Green wanted the child
to be councled, she called deputies.
    Middleton says he was not asked to sign anything until her suspention
was up. He said he agreed to counseling.
    Because of juvenile protection laws, the State Attorney's Office could
not say what action was taken. But her parents were told there would be no
charges filed, they said.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
  Hi
 
Tag-O-Matic: Don't be held back by yesterday's DOS!  Try today's OS/2!

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO47fY9Co1n+aLhhAQGJZgP9HC6ShbPuPct2BdtqRdNMs7ZFh8rcHHje
Bxrdd1cXW/sWDZfFTofygPn1TI+C6TUsOkepzFqWs2aHEgkV21Fy4c7B3o/dNuFL
56z7nKwDFiurTh8+5s1qtN9CK3xgFoS0EfOW8VgG7onHq18806rTyqggj4sZzwX4
g3RNsCbftKE=
=8TIn
-----END PGP SIGNATURE-----






From whgiii at invweb.net  Fri Feb 20 19:39:06 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Sat, 21 Feb 1998 11:39:06 +0800
Subject: Pensacola Police have lost their mind!! (fwd)
In-Reply-To: <199802210309.VAA27046@einstein.ssz.com>
Message-ID: <199802210406.XAA08800@users.invweb.net>



-----BEGIN PGP SIGNED MESSAGE-----

In <199802210309.VAA27046 at einstein.ssz.com>, on 02/20/98 
   at 09:09 PM, Jim Choate  said:

>Their story was that the child had a behavioral problem and the parents
>refused to get counceling when the school requested. She apparently goes
>on room smashing temper tantrums on a regular basis. The father of the
>child said it was the most ludicrous thing he had ever heard of,
>reportedly.

Well sounds like we are getting some CYA spindoctoring going on now that
there is National Attention. None of the early reports had any mention of
a cronic behavior problem. I posted the article from our local paper in a
seperate post.

>Can't say that changes the situation a heck of a lot though...

No not at all. We have some serious problems with the County Sherifs
Department down here.

- -- 
- ---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
- ---------------------------------------------------------------
  Hi
 
Tag-O-Matic: If Windows sucked it would be good for something.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3a-sha1
Charset: cp850
Comment: Registered_User_E-Secure_v1.1b1_ES000000

iQCVAwUBNO49e49Co1n+aLhhAQExhgP/S1zh7YQr0RRa9V3n7jMZnNZ8MJwCWVS5
lQAA7NPiWoZpGrD2LmWzA9QRCA+j0P7EnLzPT4o4e3h5Gby3z3PKv+xNtvZC0JY6
8h9DPqbz7m0V2l3RQnZXwopiDTVfO+//7G2x2x5V1QjKjouYBPnqhdTVfMglAtzF
ZI4gCQEL2MU=
=GvPe
-----END PGP SIGNATURE-----






From ravage at ssz.com  Fri Feb 20 19:40:25 1998
From: ravage at ssz.com (Jim Choate)
Date: Sat, 21 Feb 1998 11:40:25 +0800
Subject: On War, Legends, and Crypto (fwd)
Message-ID: <199802210345.VAA27317@einstein.ssz.com>



Forwarded message:

> Date: Fri, 20 Feb 1998 22:31:16 -0500
> From: Anonymous 
> Subject: Re: On War, Legends, and Crypto (fwd)

> I was suggesting that when finding oneself in a conflict with LEOs, it is
> better to be in the position of a trainrobber hiding in a cave with a
> backdoor, rather than in the position of someone getting bombed in their
> house at Waco or Ruby Ridge.

True, but the Waco and Ruby Ridge incidents aren't equivalent. In neither
case were the people involved committing aggregious crimes nor were they
expecting to be attacked by massed forces.

I suspect that implicit with the premeditated train robbery is the
expectation of pursuit.

> You are always better off if you can show your opponent the futility of
> his goal.

I don't remember the date, but....

During the American Civil War, Lincoln and his wife were having dinner with
several other government and military persons. During the dinner a
discussion arose about the best way to end the war. After much discussion
and depracation of the South Lincoln spoke. The gist of his rebuttal was
that the *best* way to win a war was to make the enemy your friend.


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From nobody at REPLAY.COM  Sat Feb 21 02:55:13 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Sat, 21 Feb 1998 11:55:13 +0100 (MET)
Subject: Last Chance ...less than 149 copies left! Plus FREE Bonus.
Message-ID: <199802211055.LAA12091@basement.replay.com>


You spammed to the Cypherpunks list:

>Dear Fred,
>
>The folks who produce The 1998 ULTIMATE FUTURES TRADING GUIDE,  just
>informed me that they have less than 149 copies available for sale
>
>Check it out at: http://www.marketdepot.com/products/utg/
>
>See what the GUIDE has to say about El Nino ... and what effect it will
>have on the economy and the markets and ultimately your money.

Go fuck yourself, preferably up the ass with a large metal hook.



From nobody at REPLAY.COM  Fri Feb 20 20:01:29 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Sat, 21 Feb 1998 12:01:29 +0800
Subject: The Eloquence of Timothy C. May
Message-ID: <199802210345.EAA21038@basement.replay.com>



>From the archives.  Check for yourself if you don't believe me.

9 May 1997:
> Chiles and his co-conspirators should be shot for high crimes against the
> Constitution. After Clinton, Freeh, Kerrey, and the other traitors.
>
> Every day that passes, I'm more convinced that McVeigh did the right thing.
> Some innocents died, but, hey, war is hell. Broken eggs and all that.


12 Nov 1997:
> At 10:37 PM -0700 11/12/97, Nobuki Nakatuji wrote:
> >There are RC4 sourcecode in ftp.replay.com.
> >but, Is it  same RC4 developed RSADSI ?
> >
> 
> It am developed.
> 
> You go back where you came. You go back hotmail. We tired your stupid
> questions on RC4 and your Misty posts.
> 
> Sayonara!
> 
> (And they wonder why we kicked Japan's butt.)
> 
> --Tim May


26 Sep 1997:
> At 8:00 PM -0700 9/26/97, Nobuki Nakatuji wrote:
> >Does anybody want MISTY algorithm ?
> >If you want it,Please send e-mail to me.
> >
> 
> I thought we got rid of your sorry ass two weeks ago!
> 
> Go back to trying to arrange "male penpals," which Dejanews shows to be
> your activity on the Net prior to this recent playing of Misty.
> 
> You go, chop chop.


Sad, isn't it?



From jya at pipeline.com  Fri Feb 20 20:07:15 1998
From: jya at pipeline.com (John Young)
Date: Sat, 21 Feb 1998 12:07:15 +0800
Subject: putting down the US military
Message-ID: <1.5.4.32.19980221040626.00742578@pop.pipeline.com>



It's easy to fault the military as an organization, as easy as
with any other. Most of us have had enough experience with
them to know what Dilbert knows, even if we can't quip like
the master.

What's hard is to know the unexplainable of combat and
be unable to convey what it's like to those who haven't
had the peculiar disorientation of losing whatever ability 
you've ever had to tell the difference between living and 
dying.

No book or film or general has ever got right, nor any tale told 
by skulled out vets sober or not.

What's never told is what it's like to lose control of mind and
body for days weeks and months. Maybe it can't be told, 
can't be remembered, can't be related in normal ways of 
communicating. Maybe that's why some of the best war
stuff is created by those who've never been there.

Enduring an artillery barrage is beyond comprehension, your
body goes to pieces under the crushing sound and concussion,
and involuntary reactions overwhelm the normal controls of all
organs and orifices. Every part goes haywire, beyond stopping,
everybody on the scene can't help becoming beaten meat
flopping and scrambling to get underground, trying to scream
amidst god's loudest roar of thunder and screeching richocheting
metal.

Bombing is far worse than that.

Even the hit of high speed round will hydraulic-ram your blood into
parts of your carcass it was never meant to go, and your senses
go numb with shock, and nothing works, body or mind. And that's
before you become conscious enough to see the savagery the 
slug's done to your precious gut, arm, leg, crotch -- if it didn't
fly through your helmet and skull leaving you permanently
satisfied.

There's no way to get ready for the worst you'll ever experience
and wish you hadn't. Maybe that's why most vets forget what
they actually experienced and fall back on the tired and true lies
of war stories. Nobody could possibly believe the other if you
could manage to tell the truth, which I doubt anybody's got the
courage to do, to relive that, when every instinct of survival 
is to go blank.

Which is why you'll see now and then some who just sit and stare 
a long way past the horizon, like math geniuses in Princeton deep
thought.

Anyway, this has nothing to do with recruiting and patriotism 
which are about wholly believable war stories like you see
on tv and hear down at the lodge and bar.








From anon at anon.efga.org  Fri Feb 20 20:31:43 1998
From: anon at anon.efga.org (Anonymous)
Date: Sat, 21 Feb 1998 12:31:43 +0800
Subject: Digital copy prot3ction
In-Reply-To: <199802200216.UAA09021@manifold.algebra.com>
Message-ID: <92d01a45e1bce58469855d407660b28c@anon.efga.org>



Igor Chudov @ home wrote:

> I can hardly believe that any of these schemes are undefeatable.
>
> As soon as the CPU starts talking to a video and sound board,
> this whole thing becomes easily breakable. All one needs to do is
> to capture the signals that go to these boards and re-record them.
>
> Right?

Of course.

Such schemes usually increase the amount of piracy in the long-term,
because it encourages people to convert the material into a more easily
copied form.

If you've ever followed any of the warez scenes, what you find is
generally about 1% of the population acutally obtain and convert the
material, and the other 99% just trade copies around.  (Consider, for
example, the number of people who actually know how to dump the
contents of an eprom chip versus the number of sites where you can
download copies of nintendo/sega/etc games.)






From tcmay at got.net  Fri Feb 20 20:32:50 1998
From: tcmay at got.net (Tim May)
Date: Sat, 21 Feb 1998 12:32:50 +0800
Subject: Some children are rabid and need to be put down
In-Reply-To: <199802210309.VAA27046@einstein.ssz.com>
Message-ID: 



At 6:29 PM -0800 2/20/98, William H. Geiger III wrote:

>No not at all. We have some serious problems with the County Sherifs
>Department down here.
>

I'm having a hard time understanding all this criticism of the actions.
>From what I've read, the girl bit, scratched, threw chairs, etc.

Many of us think 13- and 14-year-olds who commit murder should be executed
(well, I do), so why should younger children be exempt from legal action?

I know that if a kid was throwing chairs at me I'd be tempted to throw a
punch back...something that is strictly verboten. Lawsuits, criminal
prosecution, never work in the school system again, that sort of verboten.

If a teacher can't defend herself, legally and professionally, from
children biting and throwing chairs, the cops have to be called.

And from what I've heard about this little girl, it's beginning to sound
like she ought to be put down like a dog that can't stop biting. Or at
least kicked out of the school completely...perhaps a reform school will
straighten her out.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.








From bill.stewart at pobox.com  Fri Feb 20 20:39:59 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Sat, 21 Feb 1998 12:39:59 +0800
Subject: your mail
In-Reply-To: <241e4ef7f128aa790d464cb6e45d4dd2@anon.efga.org>
Message-ID: <3.0.5.32.19980220091731.008ddc00@popd.ix.netcom.com>



>> In case my last message doesn't get through,
>> I'm looking for info on how one can create and
>> use a persistent Nym. I looked and can't find
>> info on how to do this anywhere (besides the
>> creation of a "free" email account somewhere).
>> Can any cypherpunks help?

Cypherpunks have discussed this intensely;
ask AltaVista where to find "nymserver"s and
"encrypted reply block"s.

The Anonymous Remailer List claims to be at
http://www.cs.berkeley.edu/~raph/remailer-list.html
(though it might be on publius.net these days), and has some
pointers to starting places.

Private Idaho is a convenient user-interface tool for crypto
and remailers, and really simplified setting up and using some
of the early servers.

Another approach is to create a PGP key for your nym
(or a Crypto Kong key), always sign your postings,
and use anonymous remailers for sending mail,
and either read replies on the cypherpunks list
or on some broadcast medium like alt.anonymous.messages.
				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639






From bill.stewart at pobox.com  Fri Feb 20 20:40:00 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Sat, 21 Feb 1998 12:40:00 +0800
Subject: Fallaciousness of the Chicago School of Economics
In-Reply-To: <199802161934.TAA03259@server.eternity.org>
Message-ID: <3.0.5.32.19980220093846.008dd100@popd.ix.netcom.com>



Adam:
>>I tend to agree with the view that monopolies exist due to government
>>subsidies (eg. free government enforcement services for copyright,
>>corporate welfare, government contracts.)

Monopolies may depend on government for long-term stability,
but fads can stick around for quite a while before dying out.
Remember Disco?  :-)

Attila also talked about Intel making badly-designed microprocessors.
It was somewhat of a vicious circle, since the big market for 80*86s
required bug-for-bug compatibility with Microsloth's "640K is enough" 
real-mode DOS, partly because of the large investment companies had in 
applications like word processors that ran in that environment.
Getting out of the problem requires replacing a whole bunch of things
at the same time, and incremental upgrades can't get you there.
(For a horrendous example, there's the Air Traffic Control system,
brought to you by the same government that wants to help us fix our
Microsoft addictions; got any spare 360/90 clones?)

Tim:
>I am trying to sit out this latest "Microsoft" thread as much as I can bear
>to. (It seems that several lists I'm are consumeed by the dual memes of
>"What to do about Microsoft?" and "What to do about spam?" Same arguments,
>recycled endlessly.)
Obviously, ship the spam to Microsoft and be done with it :-)
The Spam Wars does seem to be muscling out "Libertarians vs. Statists"
as the canonical all-consuming political discussion on the net,
though there's a fair bit of overlap.




>My view is a simple one: those who don't like Microsoft products should use
>something else. It works for me.

Sigh.  In the business world, we tend to be stuck with Microsoft products,
chosen by the same clueless bureaucrats who choose 10-pound laptops :-)
				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639






From bill.stewart at pobox.com  Fri Feb 20 20:40:08 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Sat, 21 Feb 1998 12:40:08 +0800
Subject: No Real Debate Yet on the War
In-Reply-To: <89B3250098@ou20.csm.port.ac.uk>
Message-ID: <3.0.5.32.19980220092346.008dd590@popd.ix.netcom.com>



>>The more American, British, Australian, French etc. troops that die  in
>>the Gulf War II (tm), the more the western world will realise that  war
>>involves losses and that we cannot go on policing the world.  

As with the previous round of Desert Scam, very few invaders will die,
because the military objective is to cause mass destruction, not to 
conquer and hold.  And the press will focus on the invaders that die,
not on the tens or hundreds of thousands of Iraqis killed.

>Well if the US was to really take the moral HighGround on this they would
>be bombing France and Germany for supplying them with CBW supplies for
>years.

They'd also be focusing on the great job they've done eliminating the
entire US stock of CBW and nukes.  Oh, we haven't?  Well their weapons 
of mass destruction are Evil, and ours are Freedom Fighting Tools.
Actually the US and Former Soviet Union have substantially reduced the
nuclear forces, especially older missiles that are hard to maintain,
but the US refused for a long time to sign the CBW treaties,
and I'm not sure they ever did follow through and destroy their supplies.
				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639






From bill.stewart at pobox.com  Fri Feb 20 20:40:27 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Sat, 21 Feb 1998 12:40:27 +0800
Subject: A Geodesic Society?
In-Reply-To: 
Message-ID: <3.0.5.32.19980220091102.008dd590@popd.ix.netcom.com>



At 10:18 AM 2/20/98 -0500, Robert Hettinga wrote:
>The following is something I wrote for a private online conference
>sponsored by Nikkei, the Japanese financial news organization. Since
>they're supposedly combing the list for quotable bon mots, I may end up in
>the Japanese papers. :-).
Heh - West Coast Cypherpunks end up on Japanese TV :-)

Good article.  If you're trying to emphasize the financial stuff, 
moving it up to the beginning would help, but I don't know the audience 
you wrote it for.  A few nitpicks:

>Okay. Now let's look at the future, shall we? Oddly enough, the "future"
>starts with the grant of telephone monopoly to AT&T in the 1920's in
>exchange for universal telephone service. When AT&T figured out that a
>majority of people would have to be telephone operators for that to happen,
>it started to automate switching, from electricomechanical, to electronic
>(the transistor was invented at Ball Labs, remember), to, finally,
>semiconducting microprocessors.  

_Bell_ Labs, and BTW they developed one of the first 8-bit microprocessors;
the MAC-8 was used for building telephone things back in late 4004 days.
However, the Electro-Mechanical telephone switch was Not Invented Here -
Strowger developed it to protect privacy and increase reliability
(he suspected that a competitor had bribed the telephone operator to
connect customers to the competitor's business instead of Strowger's.)
He offered it for sale to the Bell Telephone Companies, who were too
clueless to see the economics and buy it; they caught on a few years later,
and had to pay tons of money to the competitor who'd licensed the patent. 

> But, what, you ask, do I do when someone defrauds me? .....
> In a geodesic market, if someone commits fraud, everyone knows it. 
> Instantly. And, something much worse than incarceration happens to
> that person. That person's reputation "capital" disappears. 

The difficulty, of course, is that geodesic markets with bearer 
instruments make it easy to do business anonymously - so everyone
may know that fraud was committed, but not know who committed it.
(Like the US political excuse "Mistakes were made".)
The lack of need for accounts and reputation capital is part of what
makes geodesic markets financially advantageous.  On the other hand,
reconciling these differences is complex enough that cryptographers
and financial folks can make big bucks getting it right :-)
				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639






From brianbr at together.net  Fri Feb 20 20:43:35 1998
From: brianbr at together.net (Brian B. Riley)
Date: Sat, 21 Feb 1998 12:43:35 +0800
Subject: The Political Education of Eric Tune
Message-ID: <199802210438.XAA03845@mx01.together.net>



On 2/20/98 1:32 AM, Eric Cordian (emc at wire.insync.net)  passed this 
wisdom:

>> Listen up jerk, in case you didn't get any news during 1990, 
>> Iraq attacked Kuwait, and murdered thousands of Kuwaitis.
> 
>Iraq, mislead by the US into believing that there would be no 
>interference in its long-standing dispute with Kuwait, annexed it, 
>providing a pretense for the US to do some dirty work for the 
>Israelis, who did not want to tolerate an Arab military giant in 
>their region.
>
>Kuwait provoked Iraq far more than places like Panama and Grenada 
>have provoked the United States, when US forces poured in to remove 
>existing governments, and install regimes sympathetic to 
>Washington, also killing thousands of uninvolved civilians. 

 Somewhere in there I also remember reading about the fact that Kuwait 
was slant drilling into a major Iraqi oil field and systematically 
pumping it for all it was worth. Not exactly kosher! Many greater 
conflicts have been begun for far more trivial transgressions.


Brian B. Riley --> http://members.macconnect.com/~brianbr
  For PGP Keys  

  "Do not go where the path may lead, go instead where there is
    no path, and leave a trail"  - Ralph Waldo Emerson







From bill.stewart at pobox.com  Fri Feb 20 20:45:15 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Sat, 21 Feb 1998 12:45:15 +0800
Subject: I was auto-outed by an IMG tag in HTML spam
In-Reply-To: <37a52bf54844994eb90c8e8af06b07b7@anon.efga.org>
Message-ID: <3.0.5.32.19980220184839.008d4b50@popd.ix.netcom.com>



>   at 03:00 AM, Anonymous  said:
>>Use mail readers that don't automatically process HTML and
>>connect to image servers, accept cookies, or run javascripts.  You are
>>being watched by tricky defective, er, detective types. es.
>
>Several things here:
>
At 02:32 AM 2/18/98 -0500, William H. Geiger III wrote:
>1. HTML in mail:
>There is just no place for this crap in e-mail. If multipart/alternative
>is used it is tolarable but pure text/html messages go into the bitbucket
>with a autoreply explaining to the poster the error of their ways. :)

HTML is a fine format for email.  It's ASCII readable, and supports
content description tags that the user's mail reader can render as
bold/italic/underline/header-levels//color/etc.  It's far superior
to using bloated undocumented Microsoft Word attachments.
95% of the HTML email I get IS spam, but that's a separate problem :-)
(After all, SPAMMERs like bright colored blinking attention-getting mail.)

>2. AutoProcessing of Attachments:
>This is *allways* a BadThing(TM). Not only is it an obvious security risk
>it is a PITA for the user. I would be rally pissed if my mailer launched a
>V-Card app everytime someone thought it was a GoodThing(TM) to add these
>attachments to every message they sent out.

>3. AutoDownloading of Data:
>I imagine what happend here is the internal logic for N$ mailreader when
>processing a html/text e-mail message is to treat it just like a WebPage
>and processes it accordingly.
>IMHO a mail client that is going out to an external site to DL data wether
>it be part of a html/text message or Message/External-Body the mailer
>should prompt the user on wether or not he wishes to retreive the data.

Doesn't even need a prompt - a basic missing-picture icon is fine,
with a load-images command somewhere.  While it's not as dangerous as
auto-processing, autodownloading is annoying, and can be both a
security risk (the auto-outing problem) and a denial-of-service risk.

Needs to be either off by default or not there at all.

>My recomendations is to dump the Netscape garbage and get a real e-mail
>client. Netsacpe has done a good job at screwing up the web we really
>don't need the same favor from them with e-mail.

Netscape mail is adequate for many people, just as Eudora is.
Newer versions are pretty bloated, but including S/MIME mail encryption
for everybody is a Good Thing.
				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639






From ravage at ssz.com  Fri Feb 20 20:45:20 1998
From: ravage at ssz.com (Jim Choate)
Date: Sat, 21 Feb 1998 12:45:20 +0800
Subject: Some children are rabid and need to be put down (fwd)
Message-ID: <199802210451.WAA27987@einstein.ssz.com>



Forwarded message:

> Date: Fri, 20 Feb 1998 20:30:43 -0800
> From: Tim May 
> Subject: Some children are rabid and need to be put down

> I know that if a kid was throwing chairs at me I'd be tempted to throw a
> punch back...something that is strictly verboten. Lawsuits, criminal
> prosecution, never work in the school system again, that sort of verboten.

Let me get this straight, you would punch a 5 year old child?

Tim, you truly have my sympathy and I sincerely hope that someday you deal
with whatever it is that drives that sense of personal injustice and anger.


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From jya at pipeline.com  Fri Feb 20 21:01:51 1998
From: jya at pipeline.com (John Young)
Date: Sat, 21 Feb 1998 13:01:51 +0800
Subject: BBC Gnaws Crypto
Message-ID: <1.5.4.32.19980221050004.00755974@pop.pipeline.com>



The BBC has a special report on encryption policy today on
its Web site, with disputes among the UK, EU and US:

http://news.bbc.co.uk/hi/english/special_report/1998/encryption/newsid_58000
/58499.stm


Thanks to Yaman Akdeniz on UK Crypto list.






From ravage at ssz.com  Fri Feb 20 21:19:08 1998
From: ravage at ssz.com (Jim Choate)
Date: Sat, 21 Feb 1998 13:19:08 +0800
Subject: 2killo pounds of explosives stolen [CNN]
Message-ID: <199802210524.XAA28243@einstein.ssz.com>



Forwarded message:

>                2,000 POUNDS OF EXPLOSIVES STOLEN IN PENNSYLVANIA
>                                        
>      February 20, 1998
>      Web posted at: 9:20 p.m. EST (0220 GMT)
>      
>      SLIGO, Pennsylvania (CNN) -- A coal company in Pennsylvania told the
>      federal Bureau of Alcohol, Tobacco and Firearms Friday that 2,000
>      pounds of mining explosives have been stolen.
>      
>      The explosives were taken from the C&K Coal Co. on February 16, and
>      authorities are offering a $5,000 reward for information leading to
>      the arrest of those responsible.

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From emc at wire.insync.net  Fri Feb 20 21:26:39 1998
From: emc at wire.insync.net (Eric Cordian)
Date: Sat, 21 Feb 1998 13:26:39 +0800
Subject: Some children are rabid and need to be put down
In-Reply-To: 
Message-ID: <199802210518.XAA03312@wire.insync.net>



Tim May writes:

> And from what I've heard about this little girl, it's beginning to sound
> like she ought to be put down like a dog that can't stop biting. Or at
> least kicked out of the school completely...perhaps a reform school will
> straighten her out. 

In other Florida news, a 23 year old female daycare worker picked up a
kitchen knife and stabbed a mother to death, after the mother complained
that the worker had hit and pinched her 5 year old son. 

We don't really know what the counselor said or did to this 5 year old
girl before the biting started, and given the anti-youth bias of the
mainstream press, we are unlikely to find out.  Even if some horrendous
tale of harrassment by school staff emerges, it will simply be suggested
that they were "disciplining" her for her "behavior problem." 

Now she may have a legitimate problem, and may have started biting and
scratching in response to the counselor saying - "Good morning.  You look
lovely today." 

Then again.... 

It is rarely useful to take things like this at face value, especially
given the spin control talents of school administrators and the teachers
union.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"









From emc at wire.insync.net  Fri Feb 20 21:28:06 1998
From: emc at wire.insync.net (Eric Cordian)
Date: Sat, 21 Feb 1998 13:28:06 +0800
Subject: Jimbelling the Sheep
Message-ID: <199802210520.XAA03328@wire.insync.net>



The FBI informant who orchestrated the capture of the recent "Anthrax
Terrorists" turns out to be a man twice convicted of felony extortion.
 
He presently markets something called "The AZ-58 Ray Tube Frequency
Instrument Prototype" which he advertises as being able to somehow
purify the body of bacteria and viruses.
 
Sounds like a rehash of Radionics.
 
You may view the contraption at its very own web site,
 
         http://home.sprynet.com/sprynet/jmckenzie
 
-----
 
 
LAS VEGAS (AP) -- Far from planning an anthrax attack, William Leavitt
Jr. was involved in a bizarre deal to buy a $2 million germ-killing
machine from an FBI informant who double-crossed him, Leavitt's
lawyers said Friday.
 
Leavitt was described by his attorneys as a well-meaning, if gullible
scientist.
 
He and Larry Wayne Harris, both microbiologists, were arrested in
suburban Henderson Wednesday outside a medical office and charged with
conspiracy to possess and possession of a biological agent.
 
His lawyers said Leavitt was operating under the assumption that what
Harris had was Anthrax vaccine, which is legal and safe.
 
The FBI was awaiting tests Friday to determine if it was vaccine or
material grade anthrax, which is potent enough to kill thousands of
people.
 
Leavitt is married with three children and runs his own
fire-protection business. The FBI says he also owns microbiological
laboratories in his hometown of Logandale, Nev., and Frankfurt,
Germany.
 
His criminal attorney, Lamond Mills, said the FBI's informant, Ronald
Rockwell, was trying to ``scam'' Leavitt into buying a germ-killing
machine.
 
``When he couldn't scam 'em, he went the other way. He became a good
guy for the FBI,'' Mills said.
 
Leavitt's business lawyer, Kirby Wells, said the machine was called
the AZ-58 Ray Tube Frequency Instrument Prototype, and was hyped by
Rockwell in glossy brochures as being able to flush the body clean of
bacteria and viruses.
 
``It looked like a bunch of bells and whistles,'' said Wells, who said
he saw a picture of the machine. ``What made my client believe there
was substance to that thing, I don't know. I wish I did.''
 
A promotion on the Internet has a bold headline: ``ANTHRAX,'' and goes
on to say the AZ-58 ``can treat large numbers of people at the same
time.''
 
``Has the greatest health discovery in history been suppressed?'' the
ad asks.
 
Leavitt was close to buying the machine in a $2 million deal, but
wanted to test it before making a $100,000 down-payment and arranged
to fly Harris to Las Vegas about a week ago to help, said Wells.
 
Leavitt believed that Harris was transporting anthrax vaccine, Mills
said. But Rockwell told the FBI that Leavitt described it as
military-grade.
 
On the''NBC Nightly News'' Friday, Rockwell reiterated that Leavitt
and Harris said they had military grade anthrax.
 
``They lied on what they were going to do,'' Rockwell said. ``It
scared me so bad.''
 
There is no phone listing for Rockwell in the Las Vegas area. His
attorney has not returned calls to The Associated Press.
 
Leavitt and Harris were arrested Wednesday night after the FBI, with
Rockwell's help, tailed the men to a medical office in suburban
Henderson. Authorities removed a cooler and petri dishes from the
office, and sealed the men's beige Mercedes in plastic before
transporting it to an Air Force base.
 
Leavitt, 47, and Harris, 46, of Lancaster, Ohio, are being held
without bond.
 
In an affidavit, the FBI said described Rockwell as a cancer research
scientist who was convicted of felony extortion in 1981 and 1982. But
the FBI has vouched for his credibility, saying he came forward
without getting a deal and was a ``citizen performing his civic
duty.''
 
Harris' attorney, Michael Kennedy, said Thursday that Rockwell's
credibility ``is something we're going to look into.''
 
It was unclear how Leavitt, a Mormon bishop with strong political
ties, got hooked up with Harris, an alleged white supremacist who has
been plugging his self-published book about germ warfare.
 
The FBI has said Harris met Rockwell last summer at a Denver science
conference, while Leavitt's attorneys said they believed Rockwell got
the men together.
 
Mills said the results of the FBI tests will determine if they remain
united in their defense. ``If the tests come back non-toxin, there is
no case,'' said Mills. ``If it comes back military grade, then whoa,
time out, that's not our fault. We separate from (Harris)
completely.''

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"
 






From Hua at teralogic-inc.com  Sat Feb 21 13:43:33 1998
From: Hua at teralogic-inc.com (Ernest Hua)
Date: Sat, 21 Feb 1998 13:43:33 -0800
Subject: Pensacola Police have lost their mind!! (fwd)
Message-ID: <413AC08141DBD011A58000A0C924A6D50D7DA6@MVS2>


Those of you who are parents of toddlers and have watched in horror as
other parents seem to have zero control over their children, would
understand why the school reacted this way.  Getting the police involved
may not necessarily be the "right" thing to do, but there is a LOT of
pressure on public schools to be passive or suffer the wrath of
child-abuse lawsuits.

There are many times when they respond with "we don't do things that way
..." when they should just send the kid home.  There is no middle ground
where both the school and the parents are happy, unless the parents
really care and participate.  Getting the police involved was probably
just a way for the teachers and/or the administrators to pass the buck
to someone else because they feel powerless to deal with the situation.

(Isn't this a bit off topic?  But for the police part?)

Ern

	-----Original Message-----
	From:	Jim Choate [SMTP:ravage at ssz.com]
	Sent:	Friday, February 20, 1998 7:09 PM
	To:	cypherpunks at ssz.com
	Subject:	Pensacola Police have lost their mind!! (fwd)


	Forwarded message:

	> From: "William H. Geiger III" 
	> Date: Fri, 20 Feb 98 20:27:22 -0500
	> Subject: Pensacola Police have lost their mind!!

	> I don't know if this story has reached the AP wire or not but
today the
	> brave defenders of the faith here in Pensacola, FL have done
their sworn
	> duty to protect us all by arresting a 5yr old on assault
charges (againts
	> one of the Adult staff of the school).

	It made it to CNN.

	> These are the same brave soles who a few months ago when
confronted by a
	> man sitting in his car with a gun to his head solved this
problem by
	> riddeling his car, surrounding buildings, and a McDonalds
playground with
	> over 100 rounds.
	> 
	> As soon as I have some more information on this I will post a
full report.

	Their story was that the child had a behavioral problem and the
parents
	refused to get counceling when the school requested. She
apparently goes on
	room smashing temper tantrums on a regular basis. The father of
the child
	said it was the most ludicrous thing he had ever heard of,
reportedly.

	Can't say that changes the situation a heck of a lot though...



____________________________________________________________________
	   |
|
	   |            When a man assumes a public trust, he should
|
	   |            consider himself public property.
|
	   |
|
	   |                                      Thomas Jefferson
|
	   |
|
	   |
| 
	   |            _____                             The Armadillo
Group   |
	   |         ,::////;::-.                           Austin, Tx.
USA     |
	   |        /:'///// ``::>/|/
http://www.ssz.com/   |
	   |      .',  ||||    `/( e\
|
	   |  -====~~mm-'`-```-mm --'-                         Jim
Choate       |
	   |
ravage at ssz.com     |
	   |
512-451-7087      |

|____________________________________________________________________|



From amp at pobox.com  Sat Feb 21 10:45:56 1998
From: amp at pobox.com (amp at pobox.com)
Date: Sat, 21 Feb 1998 13:45:56 -0500
Subject: SF Chronicle on Sen. Dianne Feinstein: "Feinstein Offline"
References: 
Message-ID: 





> > Tim May  said...

=snip=
 
> > In Feinstein's view, ``This whole information thing is moving so
> > fast that one has to be sure that kids are protected,'' she said.
> > ``I'm concerned when kids blow themselves up by building bombs (they
> > learned to make) by reading things in the encyclopedia. There is a
> > philosophy that anything goes. This is why I support the repeal of
> > the First Amendment and prison terms for thought criminals."

 
> She's a buffoon who is probably the first one who'll be sent to the wall
> if there's ever a Second American Revolution.

> As for her concern about Social Security numbers being posted online, did
> it ever occur to her and her ilk that perhaps the problem is the
> widespread use of SS numbers by increasing numbers of government
> agencies, by requirements that banks use them, by requirements that motor
> vehicle departments use them, and so on?

> "Duh."
 
> The solution is not a new set of laws to felonize information like this,
> but the elimination of the SS number as a universal identifier. Far too
> late for that, of course, but Fineswine's laws won't help anybody. In
> fact, law enforcement will continue its abuse of SS numbers, its role in
> falsifying records and official documents, and so on.

Along similar lines, the state of texas recently (last year) made it 
illegal to post information such as drivers license numbers and whatnot on 
the net. The company that was doing so promptly moved its web server from 
dallas to antigua. Gee, seems like they had an effective law eh?

The problem is, the company was getting the information from the state in 
the first place. Anyone with a bit of cash can buy the entire drivers 
license database from the state of texas on CD-rom. Rather than 
criminalizing private actions, it would have been much better for the state 
to just =stop selling the information=! The databases already held would 
quickly become stale, and the problem would pretty much go away.

The state sees such things as revenue streams they are intitled to. Even 
though citizen-units cannot opt out of the database, they will sell it to 
anyone who has the $$$ they are asking for it. 

This is a great example of exactly how much respect a government agency has 
for your privacy.


For instance, here is the information contained on George Bush's drivers 
license...

Name: BUSH,GEORGE HERBERT
License number: 000173204
Address:  9 S West Oak Dr
Date of birth: 6/12/24
City/Zip code:> HOUSTON 77056-2121
Gender: MaleRace: White
Height: 6.01
Weight: 190 pounds
Eye color: Gray
Hair: Brown
Last transaction date: 3/30/93
Last transaction: Renewal



> Let's try to be sure DiFi is in D.C. when Abu Nidal makes his move.


Let's hope it takes place during a state of the union speech.


---------------End of Original Message-----------------

------------------------
Name: amp
E-mail: amp at pobox.com
Date: 02/21/98
Time: 13:45:57
Visit me at http://www.pobox.com/~amp
==
     -export-a-crypto-system-sig -RSA-3-lines-PERL
#!/bin/perl -sp0777i



Forwarded message:

> From: Eric Cordian 
> Subject: Jimbelling the Sheep
> Date: Fri, 20 Feb 1998 23:20:51 -0600 (CST)

> The FBI informant who orchestrated the capture of the recent "Anthrax
> Terrorists" turns out to be a man twice convicted of felony extortion.

In one of the news reports that I heard the informant was described as a
cancer researcher who was approached with an offer to purchase some surplus
lab equipment.


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From ravage at ssz.com  Fri Feb 20 21:53:36 1998
From: ravage at ssz.com (Jim Choate)
Date: Sat, 21 Feb 1998 13:53:36 +0800
Subject: Some children are rabid and need to be put down (fwd)
Message-ID: <199802210556.XAA28525@einstein.ssz.com>



Forwarded message:

> From: Eric Cordian 
> Subject: Re: Some children are rabid and need to be put down
> Date: Fri, 20 Feb 1998 23:18:04 -0600 (CST)

> Now she may have a legitimate problem, and may have started biting and
> scratching in response to the counselor saying - "Good morning.  You look
> lovely today." 

Apparently the girls problems had been going on for a while, if the reports
are accurate. Which raises the question of why she was still in a regular
school environment in the first place. If it was a 'all of a sudden' attack
then perhaps the instructor needs some looking into as well.

I'd like to know what the 'significant blood loss' from scratches was
refering to, as well as what experience the teacher had with the child prior
to this.

> It is rarely useful to take things like this at face value, especially
> given the spin control talents of school administrators and the teachers
> union.

Agreed.


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From tcmay at got.net  Sat Feb 21 13:54:33 1998
From: tcmay at got.net (Tim May)
Date: Sat, 21 Feb 1998 13:54:33 -0800
Subject: speaking of tax dollars at work...
Message-ID: 



We've been having some interesting discussions in scruz.general, my local
newsgroup. (We get together every few months for a "scruzfest," so a sense
of community amonst the discussants has been emerging. I probably now know
more folks by sight in scruz.general than I know Cypherpunks.)

I will forward a couple of my articles.


>X-From_: tcmay at got.net Fri Feb 20 19:22:21 1998
>X-Delivered: at request of tcmay on always
>Date: Fri, 20 Feb 1998 19:25:17 -0800
>From: tcmay at got.net (Tim May)
>To: tcmay at got.net
>Subject: Re: speaking of tax dollars at work...
>Newsgroups: scruz.general
>Organization: None
>
>In article <6clf84$buc at news.scruz.net>, glena at armory.com (Dirt Devil) wrote:
>
>
>>
>> I am actually on somewhat shakey ground in agreeing with Tim's desire
>> to hold to the BOR, simply because they have been so perferated.
>>
>
>Sure the Amendments have been perforated, but they're all we have left.
>Even now, as various laws try to close in on controlling speech, the First
>Amendment's crystal clear "Congress shall make no law..." language is all
>we have to hold back the tide.
>
>(And it is _still_ a battle, with Brandeis' "shouting "Fire!" in a crowded
>theater" being used to justify all manner of speech restrictions.)
>
>As for the Second, equally crystal clear, the record is even shabbier.
>>From outright bans on ownership of weapons in New York, to restrictions in
>California, to moves for confiscation of all guns, the tide is _barely_
>being held back.  (As Heather noted in her earlier message, all the
>folderol about the Second referring to a state-run militia, like the
>National Guard, is pure nonsense: the Founders were worried about the
>citizenry being able to fight back, and understood that only free men are
>allowed to possess weaponry.)
>
>In all cases where there is no crystal clear, solid, indisputable,
>"Congress shall make no law..."  language, the statist and professional
>bureaucrats, aided by foolish and short-sighted voters, whittle away the
>freedoms and rights of us all.
>
>The Bill of Rights ain't enough, but it's all we've got.
>
>And it's going fast.
>
>--Tim May
>
>--
>Just Say No to "Big Brother Inside"
>---------:---------:---------:---------:---------:---------:---------:----
>Timothy C. May              | Crypto Anarchy: encryption, digital money,
>ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
>W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
>Higher Power: 2^3,021,377   | black markets, collapse of governments.
>




From tcmay at got.net  Sat Feb 21 13:57:36 1998
From: tcmay at got.net (Tim May)
Date: Sat, 21 Feb 1998 13:57:36 -0800
Subject: Anthrax--The Four Horsemen are Riding
Message-ID: 



Another article I wrote for scruz.general.


>X-From_: tcmay at got.net Sat Feb 21 12:54:42 1998
>X-Delivered: at request of tcmay on always
>Date: Sat, 21 Feb 1998 12:57:39 -0800
>From: tcmay at got.net (Tim May)
>To: tcmay at got.net
>Subject: Re: Anthrax--The Four Horsemen are Riding
>Newsgroups: scruz.general
>Organization: None
>
>In article <34ee3039.1340384 at cnews.newsguy.com>, mmelpremo at cruzio.com
>(mmelpremo at cruzio.com) wrote:
>
>> On Thu, 19 Feb 1998 10:34:16 -0800, tcmay at got.net (Tim May) wrote:
>>
>> >Cruzans,
>> >
>> >Here's one of my articles to the Cypherpunks list, a list FBI Director
>> >Louis Freeh recently denounced as being a haven for information
>> >terrorists. If I get busted for having a lab which the Feds decide is
>> >thoughtcrime, I want someone in Santa Cruz to know what I think about
>> >these issues.
>> 
>>
>> So, Tim, what do you think ought to be done, (if anything), about
>> Iraq?  Should we stop sanctions and let the Middle East worry about
>> him?  Should we continue sanctions?  Should we forget about UN
>> inspections?
>
>1. Nothing. Ain't my problem, ain't yours, ain't anyone else I know of's.
>
>2. Sanctions almost never work. Sanctions for 38 years on Cuba have had
>almost no effect on Castro except to consolidate his position. (Much as I
>may dislike Castro's policies, no American should be threatened with jail
>time for committing the "crime" of travelling to Cuba, or selling stuff
>they own to Cubans, or buying Cuban cigars, etc. In a free country, which
>neither the U.S. nor Cuba are, one does not criminalize actions which do
>not directly harm other persons.)
>
>3. Bombing Iraq will be unlikely to work this time any more than last
>time(s). I have no energy to recount the info being provided on CNN and
>elsewhere, but consider that the weapons inspectors themselves claimed
>that their work over the past half dozen years had more effect on getting
>rid of weapons than the bombing campaign in 1991 did. Assuming they're not
>lying, how, pray tell, does a lesser bombing than 1991 then solve the
>putative problem?
>
>4. As for the "putative problem," it is indeed putative. So Iraq has
>"weapons of mass destruction." So does Iran. So does Syria. So does
>Israel. And so on, for most of the countries in the world. (Let us not
>rant about how Iraq used WOMD on its own people, or on the Kurds. The Sovs
>used WOMD on the Afghanis...did we threaten to bomb them? How about the
>Chinese? And so on.
>
>5. I repeat, it ain't our problem. Washington (the President, not the
>pesthole) warned us to avoid foreign entanglements and foreign wars, and
>yet the U.S. squanders its money and its soldiers' lives in dozens of
>foreign wars.
>
>(There hasn't been a legitimate war since the Revolution, possibly since
>the War of 1812, in my view.)
>
>>
>> I find myself in the middle on this one.  On the one hand, I think
>> Saddam's a threat to neighboring countries (particularly Kuwait),
>> although I don't know how big a threat.  On the other hand, I agree
>> with you that America should not be Cop of the World.
>
>Countries invade other countries frequently. I didn't see us going to war
>with the Soviet Union over Afghanistan. I didn't see us going to war with
>Israel when it (several times) invaded and occupied the southern part of
>Lebanon.
>
>Ah, but the U.S. likes wars with _little_ countries. Panama, which we
>invaded because our CIA-installed leader was taking too large a share of
>the drug trade. Grenada, because it distracted attention from the 240
>Americans killed a few days before in Lebanon. Nicaragua, because we
>didn't like the leader the people had elected. Somalia, for reasons no one
>seems to be able to articulate. Bosnia, because the Europeans, in whose
>backyard the Balkan states are, decided not to bother.
>
>And so it goes.
>
>--Tim May
>
>--
>Just Say No to "Big Brother Inside"
>---------:---------:---------:---------:---------:---------:---------:----
>Timothy C. May              | Crypto Anarchy: encryption, digital money,
>ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
>W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
>Higher Power: 2^3,021,377   | black markets, collapse of governments.
>




From tcmay at got.net  Sat Feb 21 13:59:36 1998
From: tcmay at got.net (Tim May)
Date: Sat, 21 Feb 1998 13:59:36 -0800
Subject: Keeping the Oil Price Up
Message-ID: 



The last, for now, of the articles.

--Tim


>X-From_: tcmay at got.net Sat Feb 21 13:11:09 1998
>X-Delivered: at request of tcmay on always
>Date: Sat, 21 Feb 1998 13:14:07 -0800
>From: tcmay at got.net (Tim May)
>To: tcmay at got.net
>Subject: Re: Anthrax--The Four Horsemen are Riding
>Newsgroups: scruz.general
>Organization: None
>
>In article ,
>cbishop at scruznet.com wrote:
>
>> In article <6cm4nv$edi$1 at shell3.ba.best.com>, obob at shell3.ba.best.com (Bob
>> O`Brien) wrote:
>>
>> > In article <34ee3039.1340384 at cnews.newsguy.com>,
>> > mmelpremo at cruzio.com  wrote:
>> > >
>> > >It seems Clinton has backed himself into a corner on the situation,
>> > >and now has the choice of bombing Iraq or backing down from threats of
>> > >bombing Iraq.  Both are losing propositions.
>> > >
>> > >I'm also interested in hearing everyone else's opinions, as well,
>> > >since I'm still trying to form one.
>> > >
>> >
>> > At the end of the last "war", Saddam _personally_agreed_ to
>> > the UN's plan that would have accomplished all the inspections
>> > IN FIFTEEN DAYS.
>> >
>> > [Bob's for military action agains Iraq]
>>
>> If the UN had accomplished the inspections in fifteen days, would they
>> have been done and not done any more inspections?
>
>
>The realpolik of it all is that the last thing the "Oil Patch" wants is
>Iraq pumping a couple million barrels of oil and selling it on the world
>market.
>
>When oil prices plummeted in the mid-80s, Texas was hit hardly. Texas oil
>men were wiped out, refineries were closed, and the seeds of the S&L
>collapse were nurtured. (The seeds of the S&L collapse were of course
>planted when the government agreed to bail out banks and S&Ls, regardless
>of the risks they took.)
>
>Many of George Bush's friends, and even his own investments (Zapata, for
>example), were affected.
>
>Iraq was expected to pump more of the oil from the disputed oilfields than
>the Kuwaitis were willing to pump.
>
>As the war evolved, oil prices went up, and the Texans were partly saved.
>
>Having any final settlement of the Iraqi situation, and thus having them
>further depress the world oil price, would be unacceptable to the Oil
>Boys.
>
>Oil prices have been falling again, even with Iraq out of the oil market.
>Prices for light sweet crude are down to around $16 a barrel, maybe less.
>Texas is feeling the pinch again.
>
>A coincidence that the saber rattling suddenly is picking up?
>
>Wouldn't it be great for the Oil Boys if a war with Iraq spread, and maybe
>took out the Kuwaiti and even Saudi oil fields? Oil at $30 a barrel would
>shure be a purty sight to them good ole boys.
>
>Call me a cynic, but nothing is as simple as the sheeple are being led to
>believe.
>
>--Tim May
>
>--
>Just Say No to "Big Brother Inside"
>---------:---------:---------:---------:---------:---------:---------:----
>Timothy C. May              | Crypto Anarchy: encryption, digital money,
>ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
>W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
>Higher Power: 2^3,021,377   | black markets, collapse of governments.
>




From whgiii at invweb.net  Sat Feb 21 11:30:32 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Sat, 21 Feb 98 14:30:32 -0500
Subject: Some children are rabid and need to be put down
In-Reply-To: 
Message-ID: <199802212106.QAA16832@users.invweb.net>

A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 2908 bytes
Desc: not available
URL: 

From bill.stewart at pobox.com  Fri Feb 20 22:43:06 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Sat, 21 Feb 1998 14:43:06 +0800
Subject: SF Chronicle on Sen. Dianne Feinstein: "Feinstein Offline"
In-Reply-To: <199802200032.TAA28422@users.invweb.net>
Message-ID: <3.0.5.32.19980220215127.008be2a0@popd.ix.netcom.com>



At 04:33 PM 2/19/98 -0800, Tim May wrote:
>At 2:55 PM -0800 2/19/98, William H. Geiger III wrote:
>>>She's a buffoon who is probably the first one who'll be sent to the wall
>>>if there's ever a Second American Revolution.
>>Third. We had a Second American Revolution and we lost.
>You're quite right...I stand corrected.
>
>Though in some sense it was a "secessionist movement," which is subtly
>different from a revolution. 

We've had bunches of local ones - Shay's Rebellion, the Whiskey Rebellion.
There was a big secession followed by a reconquest, but that wasn't
really a revolution.  There were a bunch of events like Wounded Knee
in which our conquered neighbors tried to fight back and lost.


				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639






From bill.stewart at pobox.com  Fri Feb 20 22:43:08 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Sat, 21 Feb 1998 14:43:08 +0800
Subject: putting down the US military
In-Reply-To: <3.0.5.32.19980219140712.007bda40@pop3.lvcablemodem.com>
Message-ID: <3.0.5.32.19980220214430.008be9a0@popd.ix.netcom.com>



>>PEOPLE DIED IN SOMALIA, including a personal friend of mine. 
>> They were all somebody's son, brother, and friend  [snip]
>    my oldest son's LAR recon/black unit had been stood down for
>    Somalia, gear turned in, etc.  
...
>    how do you think the all the families with sons, husbands,
>    lovers, siblings, etc. felt with the spectacle of a dead

Sorry to hear about your friend, and I'm glad your son got back.
A friend of mine lives in Somalia about half the time,
except when his wife's tribe's over in Ethiopia.  They've been through
years of civil war, in a society that until the colonialists
took over was extremely free and relatively peaceful (for a bunch of 
semi-nomadic cattle herders armed to the teeth like pre-industrial Swiss;
they tend to have occasional short armed squabbles when the
normal social structures for peacefully resolving differences fail)
and the wars for control of the post-colonial government have
made it impossible for their economy to do well during drought.

Michael's friends were quite pleased at kicking the UN's butts,
and at kicking the US Army's butts, but they thought that even
if there hadn't been a civil war going on, the idea of trying to 
disarm Somalis is blatantly foolish - you'd have better luck
trying to disarm an NRA convention, where people carry guns for fun
rather than to protect their families and livestock like Somalis.
After all, most NRA members believe in Nations and Governments;
Somalis believe in their families and tribes and the Law,
and any "leader" who expects blind obedience from his followers
quickly finds out that nobody's following him.

...
>    absolutely. misplaced criticism and a personal offense to me
>    as well as all other servicemen.

Sending US soldiers in to do a fool's errand like that should
offend you even more.   And telling a free people that they should
give up the guns they protect their families with because
the UN will take care of protecting them is an offense to them.
				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639






From bill.stewart at pobox.com  Fri Feb 20 22:43:18 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Sat, 21 Feb 1998 14:43:18 +0800
Subject: Should the Feds ban spam? (fwd)
In-Reply-To: <199802152236.QAA26477@einstein.ssz.com>
Message-ID: <3.0.5.32.19980220223638.008be2a0@popd.ix.netcom.com>



>At 16:36 -0600 2/15/98, Jim Choate wrote:
>>Newspaper editors work according to policies and trusts empowered by the
>>owners of the paper. They are allowed as a function of the views of the
>>owners to express that choice as an *employee* of those owners. Those
>>policies do not apply to the readers as would happen in the case of an ISP.
>>Unless you propose that each person should have multiple accounts at
>>multiple ISP's.

At 06:43 PM 2/15/98 -0500, Declan McCullagh wrote:
>This is so incoherent that it's not possible to turn into a positive statement.

I found it pretty easy to parse, though incorrect -
Jim assumes that each person will only deal with one ISP,
and that getting spam filtering from that ISP means turning
over control of all your incoming mail/news to the ISP.
It's a bad assumption (even if I'm mistaken in claiming Jim assumes it :-)
-- of course everybody should have multiple Internet service providers.
As a Silicon Valley geek, I deal with several different ISPs offering
dialup IP service, not counting my employer's dial and LAN access,
or Metricom if I get it, but for most people, that's an exception.

Dialup IP packet forwarding isn't the only service provided on the Net!
I subscribe to a bunch of mailing lists, 
and even if I used an ISP that provided filtering services, 
I'd expect it to leave the mailing list traffic alone 
(and expect some of the lists to try and reduce spam sent to the list.)  
I also use a couple of mail forwarders - I advertise pobox.com,
since it's convenient to have a permanent address even if I change ISPs.
Occasionally I'll use a nymserver if I want to keep separate
reputations, or an anonymous remailer for non-persistent or
non-replyable email services.  Pobox offers spam filtering,
and while I don't use it, I think it's the service that
gives you a summary of all the email it rejected if you want,
which makes it much more likely that I'd buy such a service.

I've found that almost all the mail I get addressed directly to 
my netcom address is spam (some of it's mail from real people 
with my old address, or mailing lists I haven't reconfigured yet.)
It's convenient to be able to tell, just as I know that
junk snailmail addressed to "Wired Stewart" is from the
subscription I had a few years ago...

I also have a couple of free services that I play with, and one 
of my cats has a Juno account she's been using to experiment 
with remailers on.   And for new people getting on the net,
it really makes sense to use hotmail or juno for a while
until you know what you're doing, so you don't have spam
following you around your whole life.
				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639






From bill.stewart at pobox.com  Fri Feb 20 22:43:36 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Sat, 21 Feb 1998 14:43:36 +0800
Subject: PLO censoring pro-Iraqi sentiments
In-Reply-To: <3.0.5.32.19980219204255.007c3680@pop3.lvcablemodem.com>
Message-ID: <3.0.5.32.19980220212147.008be2a0@popd.ix.netcom.com>



>>What the world needs now is not another mass killing of Iraqis by the
>>United States government.  What the world really needs now is a fifty
>>dollar weapon that sinks aircraft carriers.

The Stinger missile and the bazooka have been a good start, letting 
local defenders stop the expensive tools of attacking armies.

At 08:42 PM 2/19/98 -0800, Eric J. Tune wrote:
>>> These soldiers went where they were ordered to go, as befits a soldier,
>>> and tried to do the job they were given and accomplish the mission, and
>>> for that EVERY ONE OF THEM DESERVES Y O U R RESPECT.  I am quite sure
>>> the vast majority of them thought it was patently stupid to go to
>>> Somalia in the first place, but a soldier follows orders, legal ones,
>>> and tries to get the job done regardless of personal feelings.

Following stupid orders gets your fellow soldiers killed stupidly.
Following immoral orders gets your fellow soldiers killed, and gets the 
opposing soldiers killed, and gets the civilian collateral damage killed,
and the fact that you're following orders doesn't absolve you of guilt.
Once you're in the war, you're also fighting to keep your buddies from
getting killed, and to keep from getting killed yourself, and if the
orders are tactically correct and sacrifice you and your buddies as
the price of an overall victory, that's the price of being a soldier.
But if you shouldn't be there, you shouldn't be there, no matter how
competent and brave and patriotic you're being while you're there.
Most soldiers I've known believe in following orders, and the politicians
who send them there pull out all the stops to keep them believing it.

>Listen up jerk, in case you didn't get any news during 1990, Iraq attacked
>Kuwait, and murdered thousands of Kuwaitis. ... America would have never
>been involved if Iraq hadn't invaded Kuwait.  

Yeah?  In 1980, Iraq attacked Iran, and the US sold them weapons,
and Saddam was Reagan & Bush's good buddy and ally.  And in 1990
when Saddam was talking with the US Ambassador about their border problem,
she said the US had no interest in such a purely local problem.
OK, it wasn't like we had to twist Saddam's arm to get him to invade;
he is a militarist asshole - but in 1980 that was a Good Thing.
And in 19{pick a number} Israel invaded South Lebanon - Good Thing Too!

Is it possible that it's got a lot more to do with US Foreign policy
or geopolitical interests?  Or about the fact that the US Military-
Industrial Complex was severely threatened by the lack of Commies?
Or just partly because George Bush's Neilsen ratings were down
and he'd had good results invading Panama?  Or that the Ayatollah
had gotten rid of one of America's favorite dictators in Iran
just a year or two before (even though he disliked Commies too)?
Or because the US Army wanted to make sure everybody knows that
they can kick anybody's ass, anywhere, anytime?

In the process of demolishing Iraq, Bush's army killed hundreds of
thousands of civilians, demolishing much of the civilian infrastructure
for safe drinking water (which probably killed more people than
the bombing did), as well as killing tens of thousands of
draftee soldiers.  If the objective had been to get rid of Saddam,
a couple dozen good Mossad agents or Green Berets could have
taken him out quickly and efficiently.  That wasn't the objective.

> I don't think air strikes are the answer to this, and I think 
> Clinton is a moron for his present policy,

He's a sleaze, but no moron - his objectives are maintaining his own
political influence, which he's very good at, as opposed to doing
anything positive for the Kuwaitis or Iraqis or Americans....

>Evidently, you again know nothing of what the Iraqis did to the Kuwaitis on
>their way in to Kuwait.  Get educated, shithead. 
Probably about like what they did to the Iranians or what the
Israelis did to the South Lebanese, except that it was Bad instead of Good.

>To everyone else besides Cordian who reads this, my apologies, but for all
>it's failings, I still have pride in America... ...not for all the foreign
>policy bullshit or the way the government fucks us over, or starts wars, or
>sticks their collective nose in other countries business...but for the fact
>that as a whole people, Americans still keep trying, everyday, to be a
>better people. I'm proud of that.

I agree.  And telling the government to stop initiating wars and trying
to get the people not to jump in line behind a propaganda bandwagon
are a good part of trying to be a better people.
				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639






From bill.stewart at pobox.com  Fri Feb 20 22:45:55 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Sat, 21 Feb 1998 14:45:55 +0800
Subject: Should the Feds ban spam? (fwd)
In-Reply-To: <199802151940.NAA25592@einstein.ssz.com>
Message-ID: <3.0.5.32.19980220221605.008be2a0@popd.ix.netcom.com>



Jim wrote:
>>Absolutely they do, but the right is that *they* must do the filtering and
>>*not* the ISP (it's a business and doesn't have fundamental rights).

At 05:00 PM 2/15/98 -0500, Declan McCullagh wrote:
>1. No, they can delegate that authority to the ISP. This is part of the
>freedom to contract.

Yeah.  Netcom doesn't have the right to decide what I'm allowed to read,
but it can decide what materials that it will transmit, if it wants,
and I can decide whether to do business with them, if I want.
Two of the ISPs I use for receiving email offer spam-filtering services;
I'm not currently buying either of them, but if spam goes from
5% to 50% of my mail, I'll certainly consider it.
(And one of them gives a summary of what it's blocked, which is good.)
Ray Arachelian and Eric Blossom can't decide what messages on Cypherpunks 
I'm allowed to read, but they can offer the most interesting 5-10%
and maybe I'll use their editing capabilities instead of reading the
whole firehose myself.  (I alternate between FCPUNX and the full list.)

>2. People acting together have rights. A corporation is an artificial legal
>construct, but a necessary one, and it has rights. Think of The New York
>Times Co. and the First Amendment.

Corporations aren't a necessity, just a convenience; the big
law firms and accounting firms are all partnerships, and do just fine
without being corporations.  Corporations do have artificial rights,
but as constructs of the state, the state can decide which rights to
give them and which rights not to give them in return for the favor
of granting corporate charters.

But Jim should know better than to say that businesses don't have rights.
Businesses are activities that people engage in, either as individual
proprietors, or as contractors, or as partnerships, or as employees,
or as corporations.  One of my ISPs is a sole proprietor, though he's
now got an employee or two.  Doesn't diminish his rights any.
Another of my ISPs is a corporation; they're big and clumsy,
but I can still hire them to perform services for me, including
editing if I want to.


>>No true Libertarian would allow any 3rd party to censor or limit the
>>information available to them.  Such actions are fundamentally 
>>non-libertarian which believes in individual choice.

Nonsense - there's far more stuff written every day than you or I
have time to read; even on Usenet, I had to stop reading every
newsgroup sometime around 1984 (a few years before Henry Spencer stopped :-)
Depending on other people to find interesting stuff is necessary;
the question is how you pick your sources and filters,
and how much you trust them to tell you everything.

>>Oh really? It is clear from many examples that the press is not to be
>>trusted because of its interactions in past political and criminal episodes.

Of course they're not - do you think anybody actually believes everything 
they read or see on TV (well, yeah, there seem to be people who do :-)
If you want to be well-informed, you need lots of sources;
one of the cool things about the net is that you _can_ get
lots of information that seldom got through the official channels
before.  Some of it didn't get through because it didn't match
the political biases of the editors or newspaper corporate owners;
other stuff didn't get through because it was boring or bogus,
and if you're filtering all the news yourself, you'll need to
do your own guessing and fact-checking.


				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639






From whgiii at invweb.net  Sat Feb 21 11:53:49 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Sat, 21 Feb 98 14:53:49 -0500
Subject: SF Chronicle on Sen. Dianne Feinstein: "Feinstein Offline"
In-Reply-To: 
Message-ID: <199802212126.QAA17001@users.invweb.net>

A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 1888 bytes
Desc: not available
URL: 

From attila at hun.org  Sat Feb 21 07:02:50 1998
From: attila at hun.org (Attila T. Hun)
Date: Sat, 21 Feb 98 15:02:50 +0000
Subject: putting down the US military
In-Reply-To: <3.0.5.32.19980220214430.008be9a0@popd.ix.netcom.com>
Message-ID: <19980221.140415.attila@hun.org>


-----BEGIN PGP SIGNED MESSAGE-----

on or about 980220:2144, in <3.0.5.32.19980220214430.008be9a0 at popd.ix.netcom.com>, 
    Bill Stewart  was purported to have 
    expostulated to perpetuate an opinion:

    [snip]
>...
>>    absolutely. misplaced criticism and a personal offense to me
>>    as well as all other servicemen.

>Sending US soldiers in to do a fool's errand like that should offend you
>even more.   
>
    absolutely, the government has obviously offended me more by
    its incredible stupidity: Vietnam, Somalia, Panama,
    Honduras, and the rest of their ill-conceived police actions
    and meddling; installing Khadafi, Hussein, the Shah, Nasser,
    whatever his name is in Syria, etc.; and now, the incredible
    attempt of Bubba to cover his domestic problems of an
    insatiable wandering dick with a "surgical" strike on the 
    long suffering Iraqi population who will again be the 
    collateral damage which doesn't happen (at least in theory).

    all the U.S. gains is an Iraqi population who hate the U.S.
    even more for our stupidity and therefore turn to Saddam who
    at least gives them pride, even if it does not feed their
    children --not to mention the enmity of the rest of the Arab
    world. even Iran is supporting Iraq which ought to tell us
    something.  

    Pax Americana --yeah, Americana it is, but where's the Pax? 

    if Bubba's going to press the button, he might as well press
    the big one and leave everything east of the beaches in Tel
    Aviv, all the way to Burma, a glass parking lot.

    out of the ashes of Iraq and the American morality, dont be
    surprised to see the man in the blue turban rise like the
    phoenix...

>And telling a free people that they should give up the guns
>they protect their families with because
>the UN will take care of protecting them is an offense to them.
>
    well, as I said: I have no regrets for what I did, but I
    sure as hell have regrets for whom I did the deeds. the
    sorry bastards who claim to be "my" government have no
    claim on my respect. 

    as I said before: is it not odd that the more the government
    tries to abridge our freedom of speech, the more they want
    to confiscate our weapons?

    a well-armed populace is a threat to a corrupt, suppressive
    government; the first step in subjugating the American 
    population to become part of the UN/NWO "family" is to 
    confiscate personal arms in the name of public safety --or,
    the fear of criminal actions by loose cannons, etc. 

    arms registration is the first step towards confiscation.

    I've been trying to find something about that pack of 
    thieves trying to deify themselves that has not earned my
    contempt. I'll announce it, when I find it, but dont hold 
    your breath.


-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: latin1
Comment: No safety this side of the grave. Never was; never will be

iQBVAwUBNO7sN7R8UA6T6u61AQEPggH/SQ8zCg9XDzAqp/EGYtZXk8Y/r7TY1i8V
a4iGgShOPlo/vdXQPFWni6yQHvlLZmweO5R1plS4XeyHkJa3xcoabA==
=zbOm
-----END PGP SIGNATURE-----



From ravage at ssz.com  Fri Feb 20 23:06:57 1998
From: ravage at ssz.com (Jim Choate)
Date: Sat, 21 Feb 1998 15:06:57 +0800
Subject: Should the Feds ban spam? (fwd)
Message-ID: <199802210709.BAA28924@einstein.ssz.com>



Forwarded message:

> Date: Fri, 20 Feb 1998 22:36:38 -0800
> From: Bill Stewart 
> Subject: Re: Should the Feds ban spam? (fwd)

> >At 16:36 -0600 2/15/98, Jim Choate wrote:
> >>Newspaper editors work according to policies and trusts empowered by the
> >>owners of the paper. They are allowed as a function of the views of the
> >>owners to express that choice as an *employee* of those owners. Those
> >>policies do not apply to the readers as would happen in the case of an ISP.
> >>Unless you propose that each person should have multiple accounts at
> >>multiple ISP's.
> 
> At 06:43 PM 2/15/98 -0500, Declan McCullagh wrote:
> >This is so incoherent that it's not possible to turn into a positive statement.

It means the employee's of the paper act as agents of the owners and not as
direct right-holders of the paper itself. In other word the job of the
editor, not his civil right as an owner, is what gives them the privilige at
the behest of the owners to edit what appears in the paper.

The only people who have a right to 'freedom of the press' are the people
who *own* the press. Employees don't have rights, per se, in this only
duties and responsibilities to carry out the desires of the owners.

Now if we address the issue, as some proposed, of ISP's having 'global
filtering' rules (eg "All cyberpromo.com accounts are filtered") *and* the
purchaser may for some reason *want* to recieve cyberpromo.com traffic they
are left with the only option of going to a second (or third, or ...) ISP
in order to get what they want.

> I found it pretty easy to parse, though incorrect -
> Jim assumes that each person will only deal with one ISP,

Not at all, I assume that people can deal with as many ISP's as they have
money for. What I do assume is that if we expect ISP's to filter spam they
have only a single option open to them. That option is to impliment a
filtering policy based upon an interview and oversight by the purchasers of
that account. This will increase the costs of Internet access far above the
current levels. This increase in cost will naturaly strain already limited
budgets and force some people to drop secondary (or tertiary, or ...)
accounts because of this basic access price increase.

> and that getting spam filtering from that ISP means turning
> over control of all your incoming mail/news to the ISP.

Not at all, the purchaser defines a spam policy that the ISP impliments.
Whatever filtering the recipient wants to do over and above this is left
unremarked. However, for an ISP to filter ones email to determine if it fits
the policy the purchaser/recipient has defined they *will* be required to
review *all* incoming mail. Otherwise how do they determine if it fits one
of the categories that were defined in the contract, whether we look at it
from the perspective of what to filter or what to pass along and let the
customer process on their own.


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From ravage at ssz.com  Fri Feb 20 23:19:17 1998
From: ravage at ssz.com (Jim Choate)
Date: Sat, 21 Feb 1998 15:19:17 +0800
Subject: Public transportation open to terrorism [CNN]
Message-ID: <199802210724.BAA29014@einstein.ssz.com>



Forwarded message:

>                     STUDY: PUBLIC TRANSIT INVITES TERRORISM
>                                        
>      graphic February 20, 1998
>      Web posted at: 6:59 p.m. EST (2359 GMT)
>      
>      WASHINGTON (AP) -- The arrests in Nevada of two men accused of
>      possessing anthrax or its precursor highlight the findings of a
>      recent federal report warning that public buses and trains are
>      vulnerable to terrorist attack.
>      
>      Indeed, an FBI affidavit said that one of the Nevada men had talked
>      about plans to spread bubonic plague toxins in the New York City
>      subway system.
>      
>      "For those determined to kill in quantity and willing to kill
>      indiscriminately, public transportation offers an ideal target," the
>      report said.
>      
>      The report was commissioned by the U.S. Department of Transportation
>      and written last year by terrorism expert Brian Jenkins.

[text deleted]

>      Amy Coggin, a spokeswoman for the American Public Transit
>      Association, the trade group for public transportation authorities,
>      said in an interview: "There are multiple entry points (to transit
>      systems), most of them on a street. There's no way screen everybody
>      who walks down a street. Unless we're going to become a police
>      state, you won't see that thing happening."

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|






From info at inexchange.net  Sat Feb 21 16:33:54 1998
From: info at inexchange.net (Info Desk)
Date: Sat, 21 Feb 1998 16:33:54 -0800 (PST)
Subject: Advertisement: Website Hosting
Message-ID: <19980220172300666.AGT297@out.inexchange.net>


http://www.inexchange.net
info at inexchange.net

InExchange would like to introduce our complete Hosting and Promotional service.

     FOR ONLY $19.95 PER MONTH !

* 20 MB (megabytes) of disk space
* 750 MB  of data transfer per month
* 5 E-mail accounts
* INTERNATIONAL Hosting
* Access to your account anytime via the Web Control Panel
* Full MS Front Page support
* Unlimited FTP updates
* Personal CGI directory for your own scripts (or use ours)
* The best statistics analyzer in the industry
* E-mail forwarding, auto responders and vacation reply
* Domain name registration (www.yourname.com)
* FREE registration of your domain with over 250 search   engines
* Real Audio/Video support

* Inquire about our $16.95 plan

* Other plans also include:
  Shopping cart application and database access/utilities
  Cold Fusion Hosting
  CyberCash, iBill and VersaNet ready
  Instant on-line credit card processing

For additional details, please refer to our website:
http://inexchange.net
info at inexchange.net

Inexchange offers you a full 30 day money back guarantee if not satisfied with our services.










From fnorky at geocities.com  Sat Feb 21 10:39:23 1998
From: fnorky at geocities.com (Douglas L. Peterson)
Date: Sat, 21 Feb 1998 18:39:23 GMT
Subject: Digital copy prot3ction
In-Reply-To: <199802200259.SAA10250@ammonia.geoworks.com>
References: <199802200259.SAA10250@ammonia.geoworks.com>
Message-ID: <34ef1ee0.130883701@smtp.ix.netcom.com>


On Thu, 19 Feb 1998 18:59:25 -0800 (PST), you wrote:

>
>> 
>> I can hardly believe that any of these schemes are undefeatable.
>> 
>> As soon as the CPU starts talking to a video and sound board, 
>> this whole thing becomes easily breakable. All one needs to do is
>> to capture the signals that go to these boards and re-record them.
>
>In general, there's no way of building a secure system that
>prevents copying of information, but permits its consumption.
>The two are too closely related.
>
>The best you could do is a tamper-resistant hardware key on
>the audio/video card.  (This locks you into a design where
>the content is decoded on the card, which may be suboptimal.)
>And anyone who can crack the crypto chip can get unprotected
>digital copies and distribute them.  This is probably doable
>by the same kind of people who set up pirate CD factories.


Ala VideoCypher from the 80's.  It didn't take much to cause the cpu
in the box to spill its guts.  Then again, it may have been because
the cpu was from TI.

-Doug
-------------------
Douglas L. Peterson
mailto:fnorky at geocities.com
http://www.geocities.com/SiliconValley/Heights/1271/



From jamesd at echeque.com  Sat Feb 21 18:39:57 1998
From: jamesd at echeque.com (James A. Donald)
Date: Sat, 21 Feb 1998 18:39:57 -0800 (PST)
Subject: US law on re-exporting crypto software?
Message-ID: <199802220239.SAA21614@proxy3.ba.best.com>


    --
At 06:49 PM 2/19/98 -0500, Anonymous wrote:
> An article in the current issue of the German journal 
> `Datenschutz und Datensicherheit' claims that exporting 
> crypto software from anywhere outside the US to a third 
> country violates US law if the software contains (only 
> marginal amounts of) US-developed code, such as a C  
> standard library, and that anyone distributing crypto 
> software that has been compiled with an American compiler 
> had better not visit the United States.  Is that true?

No one knows what the laws on cryptography in the US are, 
least of all the courts or the lawyers.

There is a law against exporting armaments, or indeed doing 
diddly squat with armaments, and the bureaucrats have decreed 
crypto an armament, however they have displayed profound 
reluctance to take this issue to court, so the implications 
of such a law, and such a definition remain entirely unknown.

However since no one has yet been actually indicted, it is 
unlikely that you will be the first.  

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     MukYGG/TcTpm9PDncEpXfT4BfC8t7mVXt7WWsJtm
     42je0WMVidgZLmeFqZcxiIvUBWPKVWWUER4SS70Ko
 ---------------------------------------------------------------------
We have the right to defend ourselves and our property, because of 
the kind of animals that we are. True law derives from this right, 
not from the arbitrary power of the state.

http://www.jim.com/jamesd/



From fnorky at geocities.com  Sat Feb 21 10:40:57 1998
From: fnorky at geocities.com (Douglas L. Peterson)
Date: Sat, 21 Feb 1998 18:40:57 GMT
Subject: Digital copy prot3ction (fwd)
In-Reply-To: <199802200241.UAA20917@einstein.ssz.com>
References: <199802200241.UAA20917@einstein.ssz.com>
Message-ID: <34f01f84.131046895@smtp.ix.netcom.com>


On Thu, 19 Feb 1998 20:41:16 -0600 (CST), you wrote:

>
>Forwarded message:
>
>> Subject: Digital copy prot3ction
>> Date: Thu, 19 Feb 1998 20:16:49 -0600 (CST)
>> From: ichudov at algebra.com (Igor Chudov @ home)
>
>> I can hardly believe that any of these schemes are undefeatable.
>> 
>> As soon as the CPU starts talking to a video and sound board, 
>> this whole thing becomes easily breakable. All one needs to do is
>> to capture the signals that go to these boards and re-record them.
>> 
>> Right?
>
>> The proposed technology would have no effect on televisions, video
>> cassette recorders or computers already in use, the paper said.
>
>I suspect that this part is the key, what they will propose is some
>mechanism to alter the chipsets from the one currently implimented. Expect
>them to impliment something similar to the DAT tape systems where the machine
>won't execute a copy function if it sees the correct signal.

I do hope it is like the DAT tape systems.  They are relatively easy
to get around.

-Doug
-------------------
Douglas L. Peterson
mailto:fnorky at geocities.com
http://www.geocities.com/SiliconValley/Heights/1271/



From jamesd at echeque.com  Sat Feb 21 18:41:25 1998
From: jamesd at echeque.com (James A. Donald)
Date: Sat, 21 Feb 1998 18:41:25 -0800 (PST)
Subject: US law on re-exporting crypto software?
Message-ID: <199802220239.SAA21614@proxy3.ba.best.com>


    --
At 06:49 PM 2/19/98 -0500, Anonymous wrote:
> An article in the current issue of the German journal 
> `Datenschutz und Datensicherheit' claims that exporting 
> crypto software from anywhere outside the US to a third 
> country violates US law if the software contains (only 
> marginal amounts of) US-developed code, such as a C  
> standard library, and that anyone distributing crypto 
> software that has been compiled with an American compiler 
> had better not visit the United States.  Is that true?

No one knows what the laws on cryptography in the US are, 
least of all the courts or the lawyers.

There is a law against exporting armaments, or indeed doing 
diddly squat with armaments, and the bureaucrats have decreed 
crypto an armament, however they have displayed profound 
reluctance to take this issue to court, so the implications 
of such a law, and such a definition remain entirely unknown.

However since no one has yet been actually indicted, it is 
unlikely that you will be the first.  

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     MukYGG/TcTpm9PDncEpXfT4BfC8t7mVXt7WWsJtm
     42je0WMVidgZLmeFqZcxiIvUBWPKVWWUER4SS70Ko
 ---------------------------------------------------------------------
We have the right to defend ourselves and our property, because of 
the kind of animals that we are. True law derives from this right, 
not from the arbitrary power of the state.

http://www.jim.com/jamesd/






From fnorky at geocities.com  Sat Feb 21 10:57:25 1998
From: fnorky at geocities.com (Douglas L. Peterson)
Date: Sat, 21 Feb 1998 18:57:25 GMT
Subject: Fwd: Big Brother Sees through walls (from the spyking list)
In-Reply-To: 
References: 
Message-ID: <34f12039.131228245@smtp.ix.netcom.com>


On Sat, 21 Feb 1998 07:45:20 -0500 (EST), you wrote:

>
>On Fri, 20 Feb 1998, Information Security wrote:
>
>>   >   From: sunder 
>>   >   
>>   >   1)From: "George Martin" 
>>   >   Subject: News Release: High-Tech Surveillance
>>   >   
>>   >   Here's a sampling of how state and federal agencies are using this
>>   >   terrifying technology to spy on Americans:
>>   >   
>>   >   * In North Carolina, county governments use high-resolution spy satellite
>>   >   photographs to search for property improvements that might increase
>>   >   property tax assessments.
>>
>>Was this cost authorized by taxpayers?
>>
>
>I have lived in Raleigh, North Carolina my entire life (over 30 yrs).
>County governments consist of an elected board of commissioners who have
>the power to make such decisions and expenditures without holding public
>hearings on these matters.  Unless the local media jumps on one of these
>proposals weeks in advance, nobody will even know about it or have an
>opportunity to petition for a public hearing.  Once the county
>commisioners vote on and approve it, our money is spent and the public has
>no recourse (until the next election).  Here in Raleigh, Wake County, NC,
>for instance, we have a Republican county commissioner and a board of
>members.  When I heard from his daughter, a personal friend, about his
>plans to cut funding to drug education and rehab programs and redirect all
>of those funds to the county prison system, I decided to act.  I contacted
>the commissioner himself, his office, and even had lunch with his wife and
>daughter to discuss this issue.  As a family friend, I thought I would at
>least be able to get a friendly, receptive ear.  His wife and daughter
>were in full agreement with me, but the commissioner dismissed all of my
>suggestions and pleas.  In fact, he told me that I was "high on crack" for
>even suggesting that he *not* cut spending to drug education and rehab
>programs.  i then appealed to the media, the public, and various county
>drug rehab and education facilities and tried to petition for public
>hearings on the issue.  After getting stonewalled by the GOP-controlled
>county board of commissioners, funding to drug rehab and education
>programs was cut by over 50%.  Since that time (two years ago), drug
>arrests and convictions, violent crime, murder, non-violent crimes,
>and admissions to treatment centers have all risen, in all of the basic
>statistical measurement categories.
>
>Wake county taxes have increased dramatically (almost 50%), and we have
>just completed building a new county jail and several county jail annex
>facilities.  In both percentage and numbers, our county jail population is
>at the highest rate it has ever been.
>
>On a related note, seven of the Wake county sherriff's deputies, who all
>had laptop computers (with Internet access) in their cruisers, were
>recently busted for spending all of their time on the clock surfing the
>web and going to porno websites and adult chatrooms.  One of the deputies
>has been arrested for using a sherriff's department scanner to scan in a
>picture of his genitals which he then sent to a young girl, a minor, from
>his cruiser while on duty.
>
>Additionally, the officer in charge of the weapons armory for the
>sherriff's department, which contains full-auto weapons such as the HK MP5
>and the M16, was recently dismissed because it was discovered that he had
>been spending all of his time on the clock in another section of the
>building surfing adult sites on the web.  Meanwhile, the armory was left
>unlocked, deputies were unable to get their weapons serviced within a
>reasonable period of time, and an M16 "disappeared".
>
>My tax dollars at work...

May I suggest trying what we did here in Colorado.  Take a look at our
Taxpayers Bill of Rights.  No government in Colorado (state, county or
local) can raise taxes without putting the measure before the public
for a vote.  We have, for the time being, tied the hands of the
government.  They can't just spend money and expect to raise taxes to
cover the short fall.

It took 5 state wide elections to amend the constitution, but the
public finely wised up.  Each election, the State would promise to
change their spending habits.  They broke that promise every time,
once within days of the election.

We have also, on a few occasions, amended our state constitution to
force the government to fund specific items (Education for one) before
any other items may be funded.

If your North Carolina allows the public to patition to have a measure
put before the public in an election, try doing it.  It's not perfect,
but it might send a clear message to the government.

-Doug

p.s.
  Please forgive the grammar errors.  I suffer from using a Microsoft
spelling checker that likes to change the meaning of my words.
-------------------
Douglas L. Peterson
mailto:fnorky at geocities.com
http://www.geocities.com/SiliconValley/Heights/1271/



From fnorky at geocities.com  Sat Feb 21 11:02:23 1998
From: fnorky at geocities.com (Douglas L. Peterson)
Date: Sat, 21 Feb 1998 19:02:23 GMT
Subject: "carefully monitor the Internet"
In-Reply-To: 
References: 
Message-ID: <34f223bb.132126550@smtp.ix.netcom.com>


On Fri, 20 Feb 1998 18:38:04 +0100 (GMT+0100), you wrote:

>
>   To keep pace with the fast-moving money launders, FAFT said it would
>   carefully monitor the Internet and so-called electronic purse systems,
>   whereby cash is passed from person to person via electronic chips,
>   leaving no audit trail in its wake.
>
>http://www.yahoo.com/headlines/980212/wired/stories/money_2.html
>http://www.oecd.org/fatf/

Hmm, lets see.  I login using secure shell.  Now I start a SSL session
to someplace where I want to exchange money.  Next I use e-cash.  The
monitor will see encrypted garbage.

Quick, kick in the door.  He is using encryption!  Must be money
launders!

-Doug


-------------------
Douglas L. Peterson
mailto:fnorky at geocities.com
http://www.geocities.com/SiliconValley/Heights/1271/



From emc at wire.insync.net  Sat Feb 21 17:28:44 1998
From: emc at wire.insync.net (Eric Cordian)
Date: Sat, 21 Feb 1998 19:28:44 -0600 (CST)
Subject: Pensacola Police have lost their mind!! (fwd)
In-Reply-To: <413AC08141DBD011A58000A0C924A6D50D7DA6@MVS2> from "Ernest Hua" at Feb 21, 98 01:43:33 pm
Message-ID: <199802220128.TAA04522@wire.insync.net>


Ern writes:

> Those of you who are parents of toddlers and have watched in horror as
> other parents seem to have zero control over their children, would
> understand why the school reacted this way.  Getting the police involved
> may not necessarily be the "right" thing to do, but there is a LOT of
> pressure on public schools to be passive or suffer the wrath of
> child-abuse lawsuits. 

Florida is a corporal punishment state where teachers may slap, hit, beat,
paddle, manhandle, and otherwise bully students in their charge, without
parental permission, and "educators" are protected by laws which make even
laying a finger on them a crime comparable with beating an elected
official to a blody pulp. 

So one Florida five year old gets bent out of shape and tries to tear a
school employee to shreds? 

Unremarkable. 

If five year olds in places like Vermont and Connecticut, where teachers
are actually restrained by laws which limit their behavior, begin to do
similar things, then I will begin to take notice. 

However incidents like this, and even mass shootings in places like Texas,
simply show that the press gives more attention to retaliation by slaves,
than it does to atrocities by slave owners.

-- 
Eric Michael Cordian 0+
O:.T:.O:. Mathematical Munitions Division
"Do What Thou Wilt Shall Be The Whole Of The Law"



From jkwilli2 at unity.ncsu.edu  Sat Feb 21 19:56:40 1998
From: jkwilli2 at unity.ncsu.edu (Ken Williams)
Date: Sat, 21 Feb 1998 19:56:40 -0800 (PST)
Subject: Request for Web Browser Information
In-Reply-To: 
Message-ID: 


On Sat, 21 Feb 1998, dstoler wrote:

>I would like to know the information my browser makes available to web sites. I use both Netscape and Internet Explorer.
>
>Obviously web sites can determine my IP address for any given session; they can also look at cookies left by themselves and other sites.
>
>Can anyone point me to where I can learn exactly what other information is made available (browser version?, OS version?, system name?, user name?, etc.)?
>
>Thanks in advance.
>
>David
>
>
>

check these out...

Your Environmental Variables
http://152.7.11.38/~tattooman/variable.cgi

Your Privacy Online
http://www4.ncsu.edu/~jkwilli2/browserscript.html

So Much for your Privacy...
http://www4.ncsu.edu/~jkwilli2/main/NO_Privacy.html


if you want copies of any of these scripts and snippets, then feel free to
grab them off of my ftp server at
ftp://152.7.11.38/pub/personal/tattooman/
check in the "javascript", "java" and "code" subdirectories.

email me if you have any questions, comments, etc...

regards,

TATTOOMAN

/--------------------------[   TATTOOMAN   ]--------------------------\
| ORG: NC State Computer Science Dept    VP of The  E. H. A. P. Corp. |
| EML: jkwilli2 at adm.csc.ncsu.edu         ehap at hackers.com             |
| EML: jkwilli2 at unity.ncsu.edu           ehap-secure at hackers.com      |
| WWW: http://www4.ncsu.edu/~jkwilli2/   http://www.hackers.com/ehap/ |
| FTP: ftp://152.7.11.38/pub/personal/tattooman/                      |
| W3B: http://152.7.11.38/~tattooman/w3board/                         |
| PGP: finger tattooman at 152.7.11.38                                   |
\----------------[   http://152.7.11.38/~tattooman/  ]----------------/







From nobody at REPLAY.COM  Sat Feb 21 11:03:00 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Sat, 21 Feb 1998 20:03:00 +0100 (MET)
Subject: Some children are rabid and need to be put down
Message-ID: <199802211903.UAA10144@basement.replay.com>


Tim May is spot on about the feral kid. Yet, battering the 
clone bruises the produce and harms sales.

Kids are over-coddled species and that's the cause of the 
rise in black market of kiddie porn, kidnapping, rape, incest 
and murder, what with crazed adults (parents and wannabes) 
wanting to develop for home domination hyper-valued Benets, 
since they're worth more on the market as icons than as 
needy brats begging for affection and attention, and interfering 
with dad and mom getting on with maximum self-indulgence.

And there's way too many kids, anyhow, the market's saturated. 
Especially those over the age of adorable cuddling and grandma 
gaga for adverts. Harvest all over the age of two, say, when they 
become unruly, as the Brit pedophagist proposed for the Irish 
surplus to solve the famine. Shut the day cares, schools, colleges,
boot camps for homicidals. Unplug the Net for those under 30,
they're more socially useful as protein, as anciently preached
by St. Peter's Eunuchs.

Eat the kids, doom the race. Evolution stops with the me-gen.

The technical solution to the after-me-nada agribusiness is set out in 
Tim's aggra-sig:

Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.



From ravage at ssz.com  Sat Feb 21 19:02:01 1998
From: ravage at ssz.com (Jim Choate)
Date: Sat, 21 Feb 1998 21:02:01 -0600 (CST)
Subject: Pseudorandomness and Cryptographic Applications [Book]
Message-ID: <199802220302.VAA31933@einstein.ssz.com>


Hi,

Pseudorandomness and Cryptographic Applications
Michael Luby
ISBN 0-691-02546-0
~$25 US

Discusses techniques to take one-way functions and produce pseudo-random
number generators. The second half of the book discusses various
applications of these algorithms.

private key cryptosystems
pseudorandom function generators
pseudorandom permutation generators
digital signature schemes
bit commitment protocols
zero-knowledge interactive proof systems


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|



From ravage at ssz.com  Sat Feb 21 19:48:36 1998
From: ravage at ssz.com (Jim Choate)
Date: Sat, 21 Feb 1998 21:48:36 -0600 (CST)
Subject: CDR Breakage?....
Message-ID: <199802220348.VAA32237@einstein.ssz.com>


Forwarded message:

> Date: 22 Feb 1998 03:31:35 -0000
> From: Secret Squirrel 
> Subject: Vile Vial Files

>  Hopefully it'll pass. Apologies if this hits the list more than once.>

I've seen something similar a couple of times now. What other kinds of
anomolies are you experiencing that indicate a breakdown in the CDR?


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|



From ravage at ssz.com  Sat Feb 21 20:36:32 1998
From: ravage at ssz.com (Jim Choate)
Date: Sat, 21 Feb 1998 22:36:32 -0600 (CST)
Subject: One Anthrax suspect released [CNN]
Message-ID: <199802220436.WAA32688@einstein.ssz.com>


Forwarded message:

>                ONE SUSPECT IN ANTHRAX CASE RELEASED FROM CUSTODY
>                                        
>      Leavitt Leavitt   February 21, 1998
>      Web posted at: 10:08 p.m. EST (0308 GMT)
>      
>      LAS VEGAS, Nev. (CNN) -- One of the two men arrested for posession
>      of what turned out to be non-lethal anthrax was released from
>      custody Saturday evening.
>      
>      William Leavitt Jr., 47, thanked God, his family, law enforcement
>      officials, a federal magistrate judge and his lawyers for getting
>      him out of prison on his own recognizance, saying the past three
>      days have been the "most difficult days of my life."
>      
>      Leavitt and Larry Wayne Harris, 46, were arrested Wednesday night
>      and charged with conspiracy to possess and possession of a
>      biological agent.
>      
>      Leavitt's release came just hours after FBI agents raided the
>      microbiologist's home north of Las Vegas in search of more evidence.

[text deleted]


    ____________________________________________________________________
   |                                                                    |
   |            When a man assumes a public trust, he should            |
   |            consider himself public property.                       |
   |                                                                    |
   |                                      Thomas Jefferson              |
   |                                                                    |
   |                                                                    | 
   |            _____                             The Armadillo Group   |
   |         ,::////;::-.                           Austin, Tx. USA     |
   |        /:'///// ``::>/|/                     http://www.ssz.com/   |
   |      .',  ||||    `/( e\                                           |
   |  -====~~mm-'`-```-mm --'-                         Jim Choate       |
   |                                                 ravage at ssz.com     |
   |                                                  512-451-7087      |
   |____________________________________________________________________|



From tcmay at got.net  Sat Feb 21 22:48:17 1998
From: tcmay at got.net (Tim May)
Date: Sat, 21 Feb 1998 22:48:17 -0800
Subject: Jimbelling the Sheep
In-Reply-To: <19980222.040835.attila@hun.org>
References: 
Message-ID: 


At 8:08 PM -0800 2/21/98, Attila T. Hun wrote:

>    sprynet: "the site has been taken down and there will be
>              no further information available."

Just like the Heaven's Gate site.

Interesting that the U.S.  Government uses a twice-convicted fraudster
selling a snake oil medical device as its confidential informant.

Here's to hoping Harris and Leavitt sue for false arrest. Last Olympics it
was Richard Jewell, this Olympics it's these guys.

But the corrections are being given less coverage than the original lurid,
headline news, so the Administration will have gotten what it wanted.

Disgraceful.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.





From jkwilli2 at unity.ncsu.edu  Sat Feb 21 19:56:32 1998
From: jkwilli2 at unity.ncsu.edu (Ken Williams)
Date: Sat, 21 Feb 1998 22:56:32 -0500 (EST)
Subject: Request for Web Browser Information
In-Reply-To: 
Message-ID: 


On Sat, 21 Feb 1998, dstoler wrote:

>I would like to know the information my browser makes available to web sites. I use both Netscape and Internet Explorer.
>
>Obviously web sites can determine my IP address for any given session; they can also look at cookies left by themselves and other sites.
>
>Can anyone point me to where I can learn exactly what other information is made available (browser version?, OS version?, system name?, user name?, etc.)?
>
>Thanks in advance.
>
>David
>
>
>

check these out...

Your Environmental Variables
http://152.7.11.38/~tattooman/variable.cgi

Your Privacy Online
http://www4.ncsu.edu/~jkwilli2/browserscript.html

So Much for your Privacy...
http://www4.ncsu.edu/~jkwilli2/main/NO_Privacy.html


if you want copies of any of these scripts and snippets, then feel free to
grab them off of my ftp server at
ftp://152.7.11.38/pub/personal/tattooman/
check in the "javascript", "java" and "code" subdirectories.

email me if you have any questions, comments, etc...

regards,

TATTOOMAN

/--------------------------[   TATTOOMAN   ]--------------------------\
| ORG: NC State Computer Science Dept    VP of The  E. H. A. P. Corp. |
| EML: jkwilli2 at adm.csc.ncsu.edu         ehap at hackers.com             |
| EML: jkwilli2 at unity.ncsu.edu           ehap-secure at hackers.com      |
| WWW: http://www4.ncsu.edu/~jkwilli2/   http://www.hackers.com/ehap/ |
| FTP: ftp://152.7.11.38/pub/personal/tattooman/                      |
| W3B: http://152.7.11.38/~tattooman/w3board/                         |
| PGP: finger tattooman at 152.7.11.38                                   |
\----------------[   http://152.7.11.38/~tattooman/  ]----------------/




From tcmay at got.net  Sat Feb 21 23:14:03 1998
From: tcmay at got.net (Tim May)
Date: Sat, 21 Feb 1998 23:14:03 -0800
Subject: Some children are rabid and need to be put down
In-Reply-To: 
References: 
Message-ID: 


At 10:11 PM -0800 2/21/98, Brad wrote:
>It occurs to me that society has been restructured so that "the
>authorities" are the only ones permitted to fix many sorts of
>commonly-encountered problems  which individual citizens used to be able
>to take care of themselves. Like spanking a spoiled 5 year old child
>instead of charging her with a felony.  Further, said authorities have
>great and arbitrary powers to fix things however they want.
>
>Combine this regular dependence on arbitrary authority with an Orwellian
>database of Good Citizens and Troublemakers in the hands of that authority
>and what have you got?  A cowed citizenry, to say the least.

I don't disagree with the larger point.

The solution is the one libertarians have argued for for many years:
provide choice in schools. Then a school could pick and choose its pupils,
and vice versa.

But with the system as it stands now, a child who throws chairs, bites,
kicks, and whatnot needs to be dealt with.

One of the very few legitimate functions of a government is police action.
Against assaults, by assaulters of whatever age.

While we may think it is "ludicrous" for the police to be called in,
consider the alternative. Is the teacher supposed to allow herself to be
hit over the head with chairs, even if wielded by 5-year-olds?

The system is fucked up, to be sure. But automatically arguing that the
school should not have called in the police given the constraints they are
under is foolish.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.





From anon at anon.efga.org  Sat Feb 21 20:14:05 1998
From: anon at anon.efga.org (Anonymous)
Date: Sat, 21 Feb 1998 23:14:05 -0500
Subject: S887
Message-ID: <7ae19d60988252f07e8400ac09206729@anon.efga.org>


Remailer validation. Ignore.



From jamesd at echeque.com  Sat Feb 21 23:14:53 1998
From: jamesd at echeque.com (James A. Donald)
Date: Sat, 21 Feb 1998 23:14:53 -0800 (PST)
Subject: WoT discussions, Trust for Nyms
Message-ID: <199802220714.XAA18934@proxy3.ba.best.com>


    --
Rick Smith  writes:
> > I admit I can't figure out what crypto mechanism Kong is 
> > really using since there's obfuscating talk of 
> > passphrases and secrets.

At 12:06 AM 12/6/97 GMT, Adam Back wrote:
> What James describes on the page is that he is storing the 
> private EC key in a file.  The file is optionally encrypted 
> with a passphrase.

No

The file, if you have one, is merely a continuation of the  
passphrase.

The secret key is generated on the fly from the passphrase,  
the file, and the name:

In my web page "How Kong Works"  I write:

       To generate our secret key, your computer hashes the  
       passphrase, the secret file, and the name, to generate 
       a big number, a two hundred and forty bit number. That 
       is a number somewhere around 1000 000 000 000 000 000 
       000 000 000 000 000 000 000 000 000 000 000 000 000  
       000 000 000 000 000 

       So the secret generated from your secret key is really 
       a very big number. 

       The public key, which appears in your signature, is an 
       elliptic point, the generator multiplied by that  
       number. This point is represented by the x coordinate 
       of the elliptic point, a 255 bit number, plus a sign  
       bit, represented in base 64 format. 

 Rick Smith
> > Since Kong does not use certificates, it is vulnerable to 
> > the Man in the Middle (MIM) attack and indeed to forgery.

Not so.

For example how could a man in the middle pass himself off as 
the author of Crypto Kong?

> > However, I also suspect that the behavior of a long lived 
> > cyberspace identity would make a MIM attack detectable 
> > and/or impractical in the long run.

Exactly so.

Any document is potentially a certificate. 

Commonly you wish to link a document to network reputation, 
rather than a physical person.  For this purpose PGP key 
signing parties are largely irrelevant.   Verisign 
certificates primarily work to link your digital signature to 
your credit rating, and thus, unfortunately, also liink your 
digital signature to the number of the beast.

At present there is insufficient internet commerce for a 
credit rating not linked to the number of the beast to be 
useful, though this may change in the future.

> In general John Doe's strategy to avoid being the subject 
> of a MITM attack should be to be unpredictable in the 
> channels he uses for authentication and communication.

John Doe usually wishes to avoid a MITM attack because his 
reputation is valuable.  He fears Malloc will use that 
reputation for Mallocs own purposes.

If John Doe's reputation is valuable, he has emitted many 
communications over a lengthy time.

If these are signed, and each signature contains John Doe's 
public key, Malloc cannot perform a man in the middle attack,
and thus cannot steal John Doe's reputation, or use it for
his own purposes. 

    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     KsnYz0T1NR0Dp/XX6Pri0xg59C+MF79KO/GUuXZW
     49sq/p4ywrtYwg1Kl/PsTHBHGYfBfWYLF6pkKH+UU

>
>
>Interlock protocols are another method of complicating the MITM's
>task.  If Joe develops the habit of posting the hash of messages he is
>about to post a day in advance, the MITM must think of something to
>say also, and publish the hash, so that it can publish something a day
>later.
>
>As the MITM's messages now don't match with what Joe said, the MITM
>has to lie some more to keep up the game.  We would like to overload
>the MITM so that his task of lying becomes computationally infeasible.
>
>Adam
>
>
 ---------------------------------------------------------------------
We have the right to defend ourselves and our property, because of 
the kind of animals that we are. True law derives from this right, 
not from the arbitrary power of the state.

http://www.jim.com/jamesd/



From jamesd at echeque.com  Sat Feb 21 23:14:56 1998
From: jamesd at echeque.com (James A. Donald)
Date: Sat, 21 Feb 1998 23:14:56 -0800 (PST)
Subject: Who is netcash?
Message-ID: <199802220714.XAA18935@proxy3.ba.best.com>


    --
The netcash site
http://www.netbank.com/~netcash/ncquick1.html contains no
obvious information as to who they are.

The netcash people are effectively anonymous.

This is a little strange for an organization that solicits 
people to deposit money with them.

Who is netbank/netcash?


    --digsig
         James A. Donald
     6YeGpsZR+nOTh/cGwvITnSR3TdzclVpR0+pr3YYQdkG
     VojePU/6xWQxNtczN+1p6+8bVR16XMeSMVa5NDMn
     4j4e1Z788YGIc8/VPlppxukDbo+BWge0b8JpDxPOb
 ---------------------------------------------------------------------
We have the right to defend ourselves and our property, because of 
the kind of animals that we are. True law derives from this right, 
not from the arbitrary power of the state.

http://www.jim.com/jamesd/



From tien at well.com  Sat Feb 21 23:33:05 1998
From: tien at well.com (Lee Tien)
Date: Sat, 21 Feb 1998 23:33:05 -0800
Subject: US law on re-exporting crypto software?
In-Reply-To: <883a59b4f8023618756b179357fba606@anon.efga.org>
Message-ID: 


At 3:49 PM -0800 2/19/98, Anonymous wrote:
>An article in the current issue of the German journal `Datenschutz und
>Datensicherheit' claims that exporting crypto software from anywhere
>outside the US to a third country violates US law if the software
>contains (only marginal amounts of) US-developed code, such as a C
>standard library, and that anyone distributing crypto software that
>has been compiled with an American compiler had better not visit the
>United States.  Is that true?

Probably not.  I can see why someone might think that, though.  I'm doing
this from recollection, not research; corrections are welcome.

Obviously, US law says that US crypto software is export-controlled,
including re-exports.

Under EAR (Commerce export regs) a minimum content rule takes account of
how US-ness dilutes, e.g., a US part is US but if it's incorporated into a
foreign car that doesn't make the foreign car US.

Exception:  no minimum content rule for crypto items.  Take the PGP plug-in
for Eudora and integrate it into a foreign OS.  Even if that's the only
crypto in the OS it's enough.  Can't dilute US-ness of US crypto.

The hypo by Anonymous, however, presumes US code that isn't crypto code.
Foreign crypto is mixed with US non-crypto code.  That's different.

I've heard of no US action in this regard; be interested to know of any.
Other countries also have minimum content rules, e.g., Canada.  But Canada,
I heard, has no crypto exception.  So at some point, I think, a crypto item
stops being US under Canadian export law, but still is US under US law.
Obvious conflict.

Lee Tien






From whgiii at invweb.net  Sat Feb 21 21:10:59 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Sun, 22 Feb 98 00:10:59 -0500
Subject: Some children are rabid and need to be put down
In-Reply-To: 
Message-ID: <199802220652.BAA21602@users.invweb.net>

A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 2249 bytes
Desc: not available
URL: 

From whgiii at invweb.net  Sat Feb 21 21:36:50 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Sun, 22 Feb 98 00:36:50 -0500
Subject: One Anthrax suspect released [CNN]
In-Reply-To: <199802220436.WAA32688@einstein.ssz.com>
Message-ID: <199802220726.CAA21996@users.invweb.net>

A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 2176 bytes
Desc: not available
URL: 

From Kmiller at aol.com  Sun Feb 22 00:52:37 1998
From: Kmiller at aol.com (Kmiller at aol.com)
Date: Sun, 22 Feb 1998 00:52:37 -0800 (PST)
Subject: $:)$
Message-ID: <97269476_54455892>



WARNING: THIS IS REAL !!
Pass This Up Lightly And You�ll Be Making
One Of The Biggest Mistakes Of Your Life!

----FREE----FREE----FREE----FREE----
REGISTERED version of NetContact
     Retails for $300 and up
This bulk E-mail software will EXPLODE your business
----FREE----FREE----FREE----FREE----

ALL I DO IS MAIL OUT 10 OF THE EXACT SAME SALES
LETTER EVERYDAY !!

That is all I do! I earn $140,  $200, even $250 a day mailing out
the exact same sales letter! There is absolutely no catch or crazy
gimmick involved here, I promise you. This has nothing to do with
any ridiculous  envelope stuffing program, illegal chain-letter scam
or worthless multi-level scheme!

There is not an easier way to make $140 a day than this- if you
would like to gain financial independence and success, listen up...

I tried every moneymaking plan under the sun. After a couple years
of constant attempts at striking it rich, I had done nothing but
strike out.

I tried multi-level marketing... I failed!
I tried chain letters... They failed me!
I tried envelope stuffing... What a joke!

I figured I could afford the $30 or $40 for each of the programs I
tried; until I realized not only does that build up, but I was making
no money in the mean time. Bills piled up and the future started
looking bleak.

Luckily a friend informed me of this program, which turned my
finances around. Not only is it profitable, but immensely profitable
with only an hour or two a day worth of work!

Here is what my 3 diskette program includes:

1) NetContact bulk mail software- REGISTERED
2) Master copies of my Special Sales Letters that
     make $140 per day
3)Complete business startup guides
4)Complete instructions and internet access to our secret website

As you can see, for only $20, you are getting a complete business
system with all the support you need! In the past I have licensed
this system for $79.95. Available only for Windows95 and NT.

cut here____________________________________________

I want to receive $140 every time I mail out 10 copies of the
same sales letter that you will supply. Please rush me your
Every-Day Cash Plan!! Enclosed is the $20 dollar cost.

Send $20 cash or check to: 	HyperReal
				Box 136
				2051 Richmond Road Suite 125
				Lexington, KY 40502

Make checks payable to HyperReal
				
				
Name_________________________________________________

Address_______________________________________________

City__________________________________________________

State/Province______________ Zip/Postal code_______________

Country if other than U.S._________________________________






From whgiii at invweb.net  Sat Feb 21 22:04:54 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Sun, 22 Feb 98 01:04:54 -0500
Subject: Pensacola Police have lost their mind!! (fwd)
In-Reply-To: <199802220128.TAA04522@wire.insync.net>
Message-ID: <199802220739.CAA22110@users.invweb.net>

A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 1826 bytes
Desc: not available
URL: 

From bdolan at USIT.NET  Sat Feb 21 22:11:09 1998
From: bdolan at USIT.NET (Brad)
Date: Sun, 22 Feb 1998 01:11:09 -0500 (EST)
Subject: Some children are rabid and need to be put down
In-Reply-To: 
Message-ID: 


It occurs to me that society has been restructured so that "the
authorities" are the only ones permitted to fix many sorts of
commonly-encountered problems  which individual citizens used to be able
to take care of themselves. Like spanking a spoiled 5 year old child
instead of charging her with a felony.  Further, said authorities have
great and arbitrary powers to fix things however they want.

Combine this regular dependence on arbitrary authority with an Orwellian
database of Good Citizens and Troublemakers in the hands of that authority
and what have you got?  A cowed citizenry, to say the least.

bd



On Sat, 21 Feb 1998, Tim May wrote:

> At 6:13 AM -0800 2/21/98, William H. Geiger III wrote:
> 
> >Well you have definatly jumped off the deep end on this one Tim. If we
> >were talking a teenager going out of control then I would agree with you.
> >A 5 year old though??
> >
> >>If a teacher can't defend herself, legally and professionally, from
> >>children biting and throwing chairs, the cops have to be called.
> >
etc.




From whgiii at invweb.net  Sat Feb 21 22:16:05 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Sun, 22 Feb 98 01:16:05 -0500
Subject: DLing from Replay.com
In-Reply-To: 
Message-ID: <199802220747.CAA22186@users.invweb.net>

A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 2407 bytes
Desc: not available
URL: 

From mix at anon.lcs.mit.edu  Sat Feb 21 17:20:03 1998
From: mix at anon.lcs.mit.edu (lcs Mixmaster Remailer)
Date: 22 Feb 1998 01:20:03 -0000
Subject: Vile Vial Files
Message-ID: <19980222012003.14986.qmail@nym.alias.net>


Timothy May wrote:

>(One can asssume that with more and more such things being added to the
>"watch lists" each year, that there will be less acceptance of cash, or
>anonymous digital cash, for such purchases.)

I tried to buy some chemicals down here with cash about six months ago. They
tried everything they could to get me to write a check and in the end I
stormed out of the building, leaving the merchandise on the counter. I
haven't been back yet, and there's probably a good chance that the security
camera footage was sent to the FBI. Come to think of it, that would explain
some rather wierd incidents I've observed since then.

People say that the only reason to pay in cash is if you have something to
hide. You're damned right. The last thing I want is a bunch of government 
shills keeping track of what I buy so that they can stage some raid because 
they have a record of me paying for a beaker "which could be used" to mix 
chemicals which "could be used" as explosives, or metal "which could be 
used" to make thermite which "could be used" for some nefarious purpose.

In America today if you have interests in biology, chemistry, or physics it
is considered grounds by both the government and the pathetic sheep to shoot
you. Pardon me if I'm a little bit paranoid these days. It used to be
intellectuals were just beat up and made fun of by the others in schools.
Now it's fashionable to throw them in jail or kill them. "Unauthorized 
and illegitimate research:" what a stupid concept.

The American people consider anybody who does things in secret to be
automatically guilty. Forget the principles that America was founded on! When 
the government sends the ninjas into your home because you were going 56 mph
when you passed a cop on the highway and looked over at him the wrong way
they sieze your computer. They find that you're running Linux. Oooh, you
must be evil because your computer is password protected but the Microshaft
apologist across the hall has his computer wide open. They find that you
have blocks of random data on your drive, and even if they don't get them
decrypted because they *ARE* blocks of completely random data they wave it
in front of a jury and get a guilty verdict.

It's a sad, sad state of affairs.

>ObMinorNote: I recently tried to buy a bag of ammonium nitrate for my
>yard...the local yard store says it hasn't been available to ordinary
>customers since OKC. I had to settle for ammonium sulfate instead.

It is when I read things like this that I realize how completely stupid the
entire government position is. Why do you need to buy ammonium nitrate to
make a bomb?

Assuming you just don't use something else which is more effective, why not
do this?

 NH OH + HNO --> NH NO  + H O
   3        3      3  3    2

So this naturally leads to the following question: Is having nitric acid and
ammonium hydroxide now a crime worthy of ninjas flying through your windows
with big guns in the middle of the night and shooting you because "you
looked like you were going for a weapon" when you flushed the toilet and
pulled your pants up?

Then if they don't have anything to charge you with they plant some drugs in
your toilet tank and claim that you were in "possession of drugs with
intention to distribute." Of course you were going to distribute them! You
had a truck and you frequently drove around! 

>We live in a dangerous world, full of potentially dangerous substances and
>things. Instead of dealing with the danger on a personal basis, we are
>using the government as our nanny, and also letting it record our
>purchases, open files on us for "unusual" purchases, and generally track
>our actions. Which actually won't have much effect on dedicated terrorists
>and criminals.

Exactly. Welcome to the shakedown extortion police state known as Amerika,
Land of the Freeh.



From mix at anon.lcs.mit.edu  Sat Feb 21 18:20:01 1998
From: mix at anon.lcs.mit.edu (lcs Mixmaster Remailer)
Date: 22 Feb 1998 02:20:01 -0000
Subject: S888
Message-ID: <19980222022001.208.qmail@nym.alias.net>


Remailer validation. Ignore.



From nobody at REPLAY.COM  Sat Feb 21 18:25:09 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Sun, 22 Feb 1998 03:25:09 +0100 (MET)
Subject: S886 
Message-ID: <199802220225.DAA16885@basement.replay.com>


Remailer validation. Ignore.



From anon at squirrel.owl.de  Sat Feb 21 19:31:35 1998
From: anon at squirrel.owl.de (Secret Squirrel)
Date: 22 Feb 1998 03:31:35 -0000
Subject: Vile Vial Files
Message-ID: <8e995c5afba45feab24501d363af854b@squirrel.owl.de>




Timothy May wrote:

>(One can asssume that with more and more such things being added to the
>"watch lists" each year, that there will be less acceptance of cash, or
>anonymous digital cash, for such purchases.)

I tried to buy some chemicals down here with cash about six months ago. They
tried everything they could to get me to write a check and in the end I
stormed out of the building, leaving the merchandise on the counter. I
haven't been back yet, and there's probably a good chance that the security
camera footage was sent to the FBI. Come to think of it, that would explain
some rather wierd incidents I've observed since then.

People say that the only reason to pay in cash is if you have something to
hide. You're damned right. The last thing I want is a bunch of government 
shills keeping track of what I buy so that they can stage some raid because 
they have a record of me paying for a beaker "which could be used" to mix 
chemicals which "could be used" as explosives, or metal "which could be 
used" to make thermite which "could be used" for some nefarious purpose.

In America today if you have interests in biology, chemistry, or physics it
is considered grounds by both the government and the pathetic sheep to shoot
you. Pardon me if I'm a little bit paranoid these days. It used to be
intellectuals were just beat up and made fun of by the others in schools.
Now it's fashionable to throw them in jail or kill them. "Unauthorized 
and illegitimate research:" what a stupid concept.

The American people consider anybody who does things in secret to be
automatically guilty. Forget the principles that America was founded on! When 
the government sends the ninjas into your home because you were going 56 mph
when you passed a cop on the highway and looked over at him the wrong way
they sieze your computer. They find that you're running Linux. Oooh, you
must be evil because your computer is password protected but the Microshaft
apologist across the hall has his computer wide open. They find that you
have blocks of random data on your drive, and even if they don't get them
decrypted because they *ARE* blocks of completely random data they wave it
in front of a jury and get a guilty verdict.

It's a sad, sad state of affairs.

>ObMinorNote: I recently tried to buy a bag of ammonium nitrate for my
>yard...the local yard store says it hasn't been available to ordinary
>customers since OKC. I had to settle for ammonium sulfate instead.

It is when I read things like this that I realize how completely stupid the
entire government position is. Why do you need to buy ammonium nitrate to
make a bomb?

Assuming you just don't use something else which is more effective, why not
do this?

 NH OH + HNO --> NH NO  + H O
   3        3      3  3    2

So this naturally leads to the following question: Is having nitric acid and
ammonium hydroxide now a crime worthy of ninjas flying through your windows
with big guns in the middle of the night and shooting you because "you
looked like you were going for a weapon" when you flushed the toilet and
pulled your pants up?

Then if they don't have anything to charge you with they plant some drugs in
your toilet tank and claim that you were in "possession of drugs with
intention to distribute." Of course you were going to distribute them! You
had a truck and you frequently drove around! 

>We live in a dangerous world, full of potentially dangerous substances and
>things. Instead of dealing with the danger on a personal basis, we are
>using the government as our nanny, and also letting it record our
>purchases, open files on us for "unusual" purchases, and generally track
>our actions. Which actually won't have much effect on dedicated terrorists
>and criminals.

Exactly. Welcome to the shakedown extortion police state known as Amerika,
Land of the Freeh.



From anon at squirrel.owl.de  Sat Feb 21 19:58:05 1998
From: anon at squirrel.owl.de (Secret Squirrel)
Date: 22 Feb 1998 03:58:05 -0000
Subject: DLing from Replay.com
Message-ID: 


On Wed, 28 Jan 1998 10:29:32 GMT, Adam Back  wrote:
>enough anyway, as anyone can verify looking at www.replay.com where a
>good collection of 128 bit browsers can be obtained.

Perhaps someone from this list would be kind enough to explain to the
obviously ignorant just how one manages to DL from replay.com 
without encountering the following problem:



|Forbidden

|You don't have permission to access /security/browsers/128bit/CommunicatorUS-v401-Pro/windows/cp16d401.exe on this
|server.

|There was also some additional information available about the error:
|[Mon Feb 16 21:13:24 1998] access to
|/pub/WWW/www.replay.com/security/browsers/128bit/CommunicatorUS-v401-Pro/windows/cp16d401.exe
|failed for xxxxxx.xxxxx.xxxxx.xxx, reason: file permissions deny server execution 



I have tried DLing this file (and others) from more than one server, 
and at different times, but encounter the same error each time, so 
obviously I don't know what I am doing. Any help would be appreciated. 
Thanks in advance!




From attila at hun.org  Sat Feb 21 20:08:35 1998
From: attila at hun.org (Attila T. Hun)
Date: Sun, 22 Feb 98 04:08:35 +0000
Subject: Jimbelling the Sheep
In-Reply-To: 
Message-ID: <19980222.040835.attila@hun.org>


on or about 980221:0034, in , 
    Rabid Wombat  was purported to have 
    expostulated to perpetuate an opinion:
>On Fri, 20 Feb 1998, Eric Cordian wrote:

>> The FBI informant who orchestrated the capture of the recent "Anthrax
>> Terrorists" turns out to be a man twice convicted of felony extortion.
>>  
>> He presently markets something called "The AZ-58 Ray Tube Frequency
>> Instrument Prototype" which he advertises as being able to somehow
>> purify the body of bacteria and viruses.
>>  
>> Sounds like a rehash of Radionics.
>>  
>> You may view the contraption at its very own web site,
>>  
>>          http://home.sprynet.com/sprynet/jmckenzie
>>  

    sprynet: "the site has been taken down and there will be
              no further information available."



From usura at REPLAY.COM  Sun Feb 22 05:02:35 1998
From: usura at REPLAY.COM (Alex de Joode)
Date: Sun, 22 Feb 1998 05:02:35 -0800 (PST)
Subject: DLing from Replay.com
Message-ID: <199802221302.OAA27880@basement.replay.com>


In article  you wrote:

: |Forbidden

: |You don't have permission to access /security/browsers/128bit/CommunicatorUS-v401-Pro/windows/cp16d401.exe on this
: |server.

: |There was also some additional information available about the error:
: |[Mon Feb 16 21:13:24 1998] access to
: |/pub/WWW/www.replay.com/security/browsers/128bit/CommunicatorUS-v401-Pro/windows/cp16d401.exe
: |failed for xxxxxx.xxxxx.xxxxx.xxx, reason: file permissions deny server execution 

My fault: the extension .exe is used for cgi-scripts @replay, so the
webinterface thinks that the file is a cgi script, and not a downloadable
archive so it tries to execute it which ofcourse doesn�t work.

try the following URL:

ftp://ftp.replay.com/pub/crypto/browsers/128bit/

Sorry for the mess ..
--
  Alex de Joode | adejoode at REPLAY.COM | http://www.replay.com
	Replay Associates: Your Internet Problem Provider.





From nobody at REPLAY.COM  Sat Feb 21 20:05:10 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Sun, 22 Feb 1998 05:05:10 +0100 (MET)
Subject: Pensacola Police have lost their mind!! (fwd)
Message-ID: <199802220405.FAA29904@basement.replay.com>


>Florida is a corporal punishment state where teachers may slap, hit, beat,
>paddle, manhandle, and otherwise bully students in their charge, without
>parental permission, and "educators" are protected by laws which make even
>laying a finger on them a crime comparable with beating an elected
>official to a blody pulp.
>
>So one Florida five year old gets bent out of shape and tries to tear a
>school employee to shreds?
>
>Unremarkable.

Exactly. As far as I'm concerned, if the "educators" act physically
theatening towards any student then the student is perfectly within his or
her rights to beat the living shit out of the "teacher." 

It's classic. The government has a monopoly on violence, even in schools. If
an "educator" beats up a student it's "discipline." If a student beats up
another student it's a "boys will be boys" situation which gets a slap on
the hand. But a student better not touch an "educator" or all kinds of hell
will rain down on them, including expulsion from a facility they have to pay
for anyway, and criminal charges.

There was a situation much like this in Texas a while back that I heard about.

Fuck the screwools.



From MikeF at sbbsonline.com  Sun Feb 22 06:02:26 1998
From: MikeF at sbbsonline.com (MikeF at sbbsonline.com)
Date: Sun, 22 Feb 1998 06:02:26 -0800 (PST)
Subject: Your WEB Site should pay you...
Message-ID: <2077628_24777421>



Should you have your business on the WEB?

Introducing:

The WEB Site that pays YOU!


You know the old story.  Your ISP promises a free WEB site.  You try a personal site and then a great idea comes to you.  I can put my business on the WEB!  But then the story changes.  For commercial use, your ISP wants to charge you a monthly fee.  Well, that's OK, you think.  But then for a commercial site that represents your business, you want something flashy and professional looking.  Don't know how?  Never fear - your friendly ISP will be happy to do it for you for a BIG PRICE!  Then, every time you want to change something, more money to pay out!

People often pay out anywhere from $50 to  $thousands to have a WEB site designed for them because they don't know how to do it themselves.  They then pay $30 to $100 per month for the ISP to " host" or "maintain" their WEB page.  They then get nickled and dimed to death for changes to their own page!

We can change all that.  We have professional WEB pages that you don't pay a fortune for.  They can be made with simple to use, professionally designed templates, that a 6th grader could use!  You don't pay a monthly "hosting" fee, you change the messages, graphics, or even the whole look of the site ANYTIME you want, easily, and with no charges.  If you want to get fancier, you can, with a direct edit mode.

And best of all, this WEB site (with up to 100 pages for YOUR business) PAYS YOU!

This WEB site takes the "value added" concept to the internet.  Your WEB Site, that promotes YOUR business, is actually a store front to one of the internet's fastest growing virtual malls.  When people enter the mall through your storefront and make purchases through their secure payment system, the mall pays YOU a commission.

For more information, send  E-MAIL to     mikef at sbbsonline.com     with just the word     "webinfo" (without the quotes) in the subject line  or visit us at:

http://www.wimall.com/skyshop

Remember,  99% of all Internet Sites on the Web are just that...SITES!. This website is the first to make money for EVERY owner!

If this message offends you, please pardon the intrusion - if you would kindly reply to this message with just the word "remove" in the subject line, you will automatically be removed from this database.

Thank you for your time...





From jya at pipeline.com  Sun Feb 22 09:49:04 1998
From: jya at pipeline.com (John Young)
Date: Sun, 22 Feb 1998 09:49:04 -0800 (PST)
Subject: CIA Blasts Bay of Pigs Op
Message-ID: <1.5.4.32.19980222175049.006808d4@pop.pipeline.com>


The NY Times reports today that the National Security Archive 
has obtained under FOIA the sole remaining copy of the
CIA's 1962 Top Secret survey of the Bay of Pigs disaster. 
The highly critical document is termed one of the most secret 
documents of the cold war. We've put a copy of the article at:

   http://jya.com/cia-pigs.htm

The full declassified docs are at:

   http://www.seas.gwu.edu/nsarchive

They are entirely in JPG images, over 400 of them. We're
transcribing to ASCII but it will take a day or two.








From brianbr at together.net  Sun Feb 22 07:49:32 1998
From: brianbr at together.net (Brian B. Riley)
Date: Sun, 22 Feb 1998 10:49:32 -0500
Subject: Test: please ignore
Message-ID: <199802221549.KAA30094@mx02.together.net>


test, please ignore, thanks


Brian B. Riley --> http://members.macconnect.com/~brianbr
   For PGP Keys  

  "Patriotism is the last refuge of the scoundrel" -- Samuel Johnson
  "With all due respect to an enlightened but inferior lexicographer I
    beg to submit that it is the first." 
           -- Ambrose Bierce's commentary on Johnson's definition.




From ANDROCK at geocities.com  Sun Feb 22 13:40:17 1998
From: ANDROCK at geocities.com (ANDROCK)
Date: Sun, 22 Feb 1998 13:40:17 -0800 (PST)
Subject: Hello
Message-ID: <01bd4060$ce1d80c0$03dfdfdf@tower200>




Please, include me in the list
ANDROCK



From bove at rockument.com  Sun Feb 22 13:51:10 1998
From: bove at rockument.com (Tony Bove)
Date: Sun, 22 Feb 1998 13:51:10 -0800 (PST)
Subject: Update
Message-ID: 


Hello all you FOBBheads,

The Flying Other Brothers Band is enjoying itself! Featuring Roger McNamee,
Giles McNamee, Bill Bennett, Tony Bove, Bert Keely, and Larry Marcus, with
guest percussionist Corrine.


NEWS
------
* Tony just had an amazing El Nino experience and is now with vehicle
courtesy of Hertz. You can read his story at:

http://www.rockument.com/downflood.html


* Tom Cottingham shows up at Deer Valley, Utah gig for a mini-Random Axes
reunion. Read about that gig below.


UPCOMING EVENTS
--------------------
* March 10, Internet World, L.A. -- at Billboard Live, 7pm-10pm. Fleischman
Hillard party, featuring FOBBs and a band from Excite. Details to come.

* March 30, DMG private party, Hotel Sofitel, Redwood City, CA --
tentative. Details to come.

* July 4, Gualalapalooza, Gualala, CA -- tentative. Details to come.

* Sometime in July, Amazon.com Picnic, Seattle, WA -- tentative. Details to
come.


THE LAST GIG
---------------

We recently returned from an elite financial retreat, Morgan Stanley's Ski
Weekend in Deer Valley, Utah (I know, life is tough), where we played two
sets for a crowd of CEOs and CFOs, and we had them dancing on the tables!

Highlights from that show:

Back in the U.S.S.R. (Beatles)
Secret Agent Man (Johnny Rivers)
-- Roger leads these openers, both howlers, got them on their feet with a
not-so-subtle political message.

Brown-Eyed Girl (Van Morrison)
-- Giles sings that souful lead, but this time with the two conference
organizers singing backup!

City of New Orleans (Arlo Guthrie)
-- with guest vocalist Tom Cottingham, an original member of Random Axes

Deal (Grateful Dead)
-- perfect for those investment bankers in the audience.

One Toke Over the Line (Brewer & Shipley)
-- ... and for once, Tony's home town was not introduced as the capital of
Calif. largest cash crop.

Dead Flowers (Rolling Stones)
-- another good one for investment bankers, this time with Morgan Stanley's
chief organizer Rex playing drums.

Layla (Eric Clapton)
-- Just about our finest version, merging the laid-back style that won Eric
so many awards with the high-octane guitar solo that made this song so
interesting, plus the Duane Allman slide second part sans piano.

Paint It, Black (Rolling Stones)
-- Whoa! What a tambourine ride, Corrine! Giles screams this one while Tony
gives us his Morroccan interpretation.

Like a Rolling Stone (Bob Dylan)
-- You can't beat this message. How many of these financial types actually
feel like they have no home, no direction known? Complete unknown?

Ticket to Ride (Beatles)
-- Bert gets this guitar part exactly perfect, while Roger and Tony play
John and Paul.

Jack Straw (Grateful Dead)
-- We can share the women, we can share the wine. Now that's something
those financial types can understand... This was incandescent. Larry was
once again brilliant.

The Night They Drove Old Dixie Down (The Band)
-- Our "Gone With the Wind" interpretation, led by Roger.

Six Days on the Road (Flying Burrito Brothers and others)
-- Thanks Giles, for your life story. Way to play, Tony and others...

White Room (Cream)
-- Tony sings, and Bert just wails on lead guitar!

Last Time (Rolling Stones) -> Goin' Down the Road Feelin' Bad (Grateful
Dead and others)
-- Goin' where the climate suits my clothes... Dr. Bill, he of the big
bottom sound, rocked the house.

White Shoe Shuffle (Flying Other Brothers Band)
-- Our own truly original number, written by Dr. Bill Bennett, had them
rolling the aisles (laughing) as Tony sang lead.

Uncle John's Band (Grateful Dead)
-- We had the audience singing along on this one, in 4-part harmony. Once
again, Larry knows where the time goes.

Abbey Road Side 2 (Beatles)
-- Bert's "Here Comes the Sun" into Roger's "Mean Mr. Mustard" and on
through the rest of the songs into "The End" which absolutely captivated
this crowd.


Encores (yes they hollered for more):

Iko Iko (Neville Brothers, Grateful Dead, lots of others)
-- We brought back Rex for drums, and introduced Roger Lynch on guitar, who
was already too good for us!

Johnny B. Goode (Chuck Berry and everyone else)
-- We just had to do it. Thanks everyone, and good night!


- - - - - - - - - -
They've been going in and out of style
But they're guaranteed to raise a smile.
--Beatles, "Sgt. Pepper's Lonely Hearts Club Band" (Lennon/McCartney)
- - - - - - - - - -
Tony Bove
bove at rockument.com
http://www.rockument.com







From usura at REPLAY.COM  Sun Feb 22 05:02:18 1998
From: usura at REPLAY.COM (Alex de Joode)
Date: Sun, 22 Feb 1998 14:02:18 +0100 (MET)
Subject: DLing from Replay.com
Message-ID: <199802221302.OAA27880@basement.replay.com>


In article  you wrote:

: |Forbidden

: |You don't have permission to access /security/browsers/128bit/CommunicatorUS-v401-Pro/windows/cp16d401.exe on this
: |server.

: |There was also some additional information available about the error:
: |[Mon Feb 16 21:13:24 1998] access to
: |/pub/WWW/www.replay.com/security/browsers/128bit/CommunicatorUS-v401-Pro/windows/cp16d401.exe
: |failed for xxxxxx.xxxxx.xxxxx.xxx, reason: file permissions deny server execution 

My fault: the extension .exe is used for cgi-scripts @replay, so the
webinterface thinks that the file is a cgi script, and not a downloadable
archive so it tries to execute it which ofcourse doesn�t work.

try the following URL:

ftp://ftp.replay.com/pub/crypto/browsers/128bit/

Sorry for the mess ..
--
  Alex de Joode | adejoode at REPLAY.COM | http://www.replay.com
	Replay Associates: Your Internet Problem Provider.






From Kelly1 at primenet.com  Sun Feb 22 14:08:09 1998
From: Kelly1 at primenet.com (Kelly1 at primenet.com)
Date: Sun, 22 Feb 1998 14:08:09 -0800 (PST)
Subject: Hi, how are you !
Message-ID: <199802222208.OAA16738@toad.com>


Dear Friend:

This is an extremely IMPORTANT announcement for you!

iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii
               IMPORTANT ANNOUNCEMENT
               IMPORTANT ANNOUNCEMENT
               ''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''
               Your Future May Depend on it!!!
iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii

Before you learn about this 'Important Announcement', please read the
following 'Editorial Excerpts' first from some important publications in the
United States:

New York Times:     "In concluding our review of Financial Organizations
'''''''''''''''''''''''''''''''''''''''''''''''      to effect change in the 90's, special attention should
be called to 'World Currency Cartel' organization based in California.  The
members of this organization are amassing hundreds of millions of dollars
in the currency market using a very LEGAL method which has NEVER
been divulged to the general public. While their purpose is not yet known,
their presence has most certainly been felt".

NBC  Nightly News:    " Members of the World Currency Cartel organization,
''''''''''''''''''''''''''''''''''''''''''''''''''''''    who always keep very Low Profile of themselves ,
are some of the most powerful and wealthiest people in this hemisphere".

More Excerpts later, but first let us give you this "Important Announcement":
```````````````````````````````````````````````````````````````````````````````````````````````````````````
We are glad to announce that for the very first time, the World Currency
Cartel organization will instruct a LIMITED number of people Worldwide
HOW TO CONVERT $25 INTO ONE HUNDRED OF LEGAL CURRENCY.
We will transact the first conversion for you, after that you can quickly and
easily do this on your own hundreds or even thousands of times each and
every month.

TAKE ADVANTAGE OF THIS "SECRET FLAW" !
===================================

It is even more explosive than we have yet disclosed. While currency
does fluctuates daily, we can show you  HOW TO CONVERT $99 
INTO $580 as many times as you want. That means, you will be able
to CONVERT $99 AMERICAN LEGAL CURRENCY DOLLARS FOR 
$580 OF THE SAME. You can do this as many times as you wish, 
every day, every week, every month. All very LEGALLY and effort-
lessly!

It only takes about 5 to 10 minutes each time you do this. You can do
this from your home, office or even while travelling. All you need is an
access to a phone line and an address. Best of all, you can do this
from ANY CITY ON THIS EARTH!!!

Again, we must reiterate, anyone can do this and the source is NEVER-
ENDING. For as long as the global financial community continues to
use different currencies with varying exchange rate, this "Secret Flaw"
will exist.                                                                    '''''''''''''''''''''''''''''''''''''''''''

As we said earlier, we will do the first transaction for you and will also
show you exactly how to do this on your own, over and over again.

The amount of exchange you would do each time is entirely up to you.
Working just 2 to 10 hrs a week, you can soon join the list of Mllionaires
who do this on a daily basis and many times a day. The transaction is
so simple that even a high school kid can do it!

We at the World Currency Cartel organization would like to see a uniform
global  currency backed by gold. But, until then, we will allow a LIMITED
number of individuals worldwide to share in the Unlimited Profits provided
for by the world currency differentials.

We will espouse no more political views nor will we ask you do so. We
can say however, that our parent organization Wealth Exchange Int. 
benefits greatly by the knowledge being shared as we ourselves along
with you benefit likewise. Your main concern surely will be, how you will
benefit.

In a short time, after you become a member, you can start making trans-
actions from your home, office, by telephone or through the mail and even
while travelling. As we said earlier, we will do the first transaction for you
and will show you exactly how to do this over and over again.

No one can stop you from earning hundreds of thousands and even
millions of dollars each year for as long as this "SECRET FLAW" exist!
                                                                       ''''''''''''''''''''''''''''''''''''''''''''''
Don't believe us, experience it for ourself !
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;     Unlike anyone else, we
will assure you a great financial freedom and you will add to our quickly
growing base of supporters and join the list of Mllionaires being created
using this " Secret Flaw " in the world currency market!!

DON'T ENVY US, JOIN US TODAY !!!
*******************************************
There is a one time membership fee of only $195.00. BUT, if you join
us by March 15, 1998, which is our company's second Anniversarry
date, you can join us for only $25 administrative cost. Your important
documents, instructions, contact name/address/phone number and
all other pertinent information will be mailed to you immediately. So ,
take advantage of our Anniversarry date and join us today.

(If you are replying AFTER March 15, 1998; you must pay $195  for
the membership. NO EXCEPTIONS and no more e-mail enquiries).

Upon becoming a member, you promise to keep all infos CONFIDENTIAL.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Should you choose to cancel your membership for any reason, you must
return all documents for a refund within 60 days.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

IMPORTANT:
''''''''''''''''''''''''''''''''''''''
1.....Write your name & mailing address VERY CLEARLY on paper
2.....Below your address, please write your E-mail address (Optional)
3.....At the top Left hand corner, write the word "NEW MEMBER"
4.....Attache a CHECK or M.O. for $25 plus $3 for postage & shipping
        (Total  US$ 28.00)
5.....Make it payable to 'WEALTH EXCHANGE INT.' and mail to:

                   WEALTH EXCHANGE INT.
                   9903 SANTA MONICA BL;
                   SUITE #  405
                   BEVERLY HILLS,
                   CA 90212.
                   U.S.A.

( Overseas request MUST ADD US$ 10.00 EXTRA for the postage ).
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

Here are some more Editorial Excerpts:
````````````````````````````````````````````````````````
Wall Street:     " A discreet group of Americans, operating under the
                        guise of World Currency Cartel have recently begun
making rumbles in world finance market. While at this time, their game
is not completely known, they certainly be watched by those making
major moves in the curency contracts".

Financial Week:    " Watch them, monitor them, extract their knowledge
                               and try to become one of them. That is the soundest
financial advice we could give someone".

National Business Weekly :   " While this reporter has been left in the cold
                                               as to its method of operation, we have been
able to confirm that World Currency Cartel and its members are literally
amassing great fortunes overnight".

$$$$$$$$$$$$$$$$$$$$$$$$$$$ END $$$$$$$$$$$$$$$$$$$$$$$$$$$$








From partners at worldgaming.net  Sun Feb 22 17:27:54 1998
From: partners at worldgaming.net (Tracy Kurz)
Date: Sun, 22 Feb 1998 17:27:54 -0800 (PST)
Subject: Online Casino Partners wanted...
Message-ID: <19980223010310.CQN18236@worldgaming.net>


Over the next three years, the Internet gaming market is expected to
generate revenues of anywhere from US$10 billion to US$20 billion, says PC
Computing. A leader in recognizing new and emerging markets, World Gaming
is pleased to become a significant resource for enabling webmasters to
participate in this exciting opportunity. 

World Gaming (www.worldgaming.net) is an innovative on-line gaming
operation offering casino-style games, a Sportsbook with real-time betting
lines, an international lottery ticket brokerage, and live video/audio
Internet broadcasting of horse-racing from around the world. World Gaming
is a wholly owned subsidiary of Starnet Communications International Inc.
(www.starnetcommunications.com), a publicly traded company and developer
and broadcaster of revenue-producing content for the Internet since 1995. 

Licensed in Antigua to accept, process, and manage real money wagers via
the Internet, World Gaming has now introduced the Partners Program, aimed
at web site operators wanting to generate more revenue and offer customers
greater entertainment value from their site. You can become a World Gaming
Partner, earning commissions, at no expense and no risk to you or your web
site. 

To collect generous revenues, all you have to do is strategically place one
of the attractive World Gaming banners on your web site. If you prefer, you
can devote an entire page to World Gaming - it's up to you. As customers
click through, you will share in the "house" profits every time one of your
customers places a wager. The more members you refer, the more commissions
you receive! 

To sign up, please go to the World Gaming Partners Program web site at:
http://www.worldgaming.net/partners 

Value is guaranteed. World Gaming is a state-of-the-art international
gaming web site and CD-ROM software package. World Gaming offers:
o Outstanding casino graphics and 3-D animations in a variety of casino
environments, including a unique "Adult-theme" casino
o A wide variety of internationally appealing casino-style games
o Complete Sportsbook with direct betting lines from Las Vegas and Europe
o Lottery brokerage featuring lotteries from all over the world
o Pari-mutuel wagering on live horse races from international race tracks
o Top-notch, reliable technical support 24 hours a day, seven days a week
o Guaranteed security of all Internet financial transactions
o Translation into 8 international languages

Because we do not accept wagers from the U.S. or Canada, World Gaming does
not believe that its business actions violate any existing regulations in
those areas. World Gaming will focus on the market outside of North America
until such time as U.S. and Canadian laws regarding Internet gaming are
clarified. It is estimated that as much as 80% of the world gambling market
is from regions outside of North America, specifically in Asia and Europe.

Details:
o You will earn 25% of the revenues earned from the customers you turn onto
World Gaming.
o Each Partner is given a unique identifying code that enables World Gaming
to ensure you receive your commissions every time one of your customers
logs in to play.
o There is absolutely no investment on your behalf.
o There is absolutely no risk on your behalf.
o You accept no liability whatsoever for the legal ramifications of
Internet gambling.

Join the World Gaming Partners Program today!








From amf/h/o at nowhere.com  Sun Feb 22 17:45:39 1998
From: amf/h/o at nowhere.com (AMF Investments)
Date: Sun, 22 Feb 1998 17:45:39 -0800 (PST)
Subject: HOTTEST MONEY MAKING OPPORTUNITY ON THE INTERNET!!
Message-ID: <18161.235848.82837616 cypherpunks@toad.com	>


BEFORE YOU HASTILY DELETE THIS MAILING, PLEASE PRINT IT OUT. 
(NEED TO REPLY IF YOU WANT TO BE REMOVED FROM MY MAILING LIST, 
FAILURE TO RESPOND WILL AUTOMATICALLY REMOVE YOU FROM THE 
LIST)

THIS IS THE HOTTEST OPPORTUNITY ON THE INTERNET AND ONE THAT 
WILL CHANGE YOUR LIFE (STYLE) FOREVER!

IF YOU THINK "NOT FOR ME", THEN WHAT ABOUT FOR YOUR FAMILY!

How Many Things Did You And Your Family Go Without This Past Year,
Simply Because You Couldn't Afford Them? Isn't it about time you and
your family got the things you always wanted? Aren't you tired of always
having to tell your family: "Maybe next year we can get that new car, we
just can't afford to take that kind of vacation," "I'm sorry, all I can afford
for you, is junior college," or "look, my boss said he'd try to give me that
raise in 6 months"

THIS PROGRAM IS PROVEN OVER AND OVER, TIME AND TIME AGAIN!

THERE ARE THOUSANDS OF THOSE WHO HAVE SEEN IT WORK AND 
CONTINUE TO USE IT BECAUSE IT DOES WORK!!!


Hello!

My name is Matthew Forti; I'm a 45-year-old father, and husband. As a rule, I delete 
all unsolicited "junk" e-mail and use my account primarily for business.  I received 
what I assumed was this same e-mail countless times and deleted it each time.

About two months ago I received it again and, because of the catchy subject line,  I 
finally read it.  Afterwards, I thought , "OK, I give in, I'm going to try this.  I can certainly 
afford to invest $20 and, on the other hand, there's nothing wrong with creating a little 
excess cash."  I promptly mailed four $5 bills and, after receiving the reports, paid a 
friend of mine a small fee to send out some e-mail advertisements for me.  After 
reading the reports, I also learned how easy it is to bulk e-mail for free! 

I was not prepared for the results.  Everyday for the last six weeks, my  P.O. box has 
been overflowing with $5 bills; many days the excess fills up an extra mail bin and 
I've had to upgrade to the corporate-size box!  I am stunned by all the cash  that 
keeps rolling in!

I promise you, if you follow the directions in this e-mail and be prepared to 
eventually set aside about an hour each day to follow up (and count your money!), 
you will make at least as much money as we did.  You don't need to be a wiz at the 
computer, but I'll bet you already are.   If you can open an envelope, remove the 
money, and send an e-mail message, then you're on your way to the bank.  Take 
the time to read this so you'll understand how easy it is. Believe me, it works!

                                                       GO FOR IT NOW!
Sincerely,

Matthew Forti

The following is a copy of the e-mail I read:

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

This is a LEGAL, LOW-COST, MONEY-MAKING PHENOMENON.

PRINT this letter, read the directions, THEN GET STARTED TODAY!

You are about to embark on the most profitable and unique program you may ever 
see.  Many times over, it has demonstrated and proven its ability to generate large 
amounts of cash.  This program is showing fantastic appeal with a huge and ever-
growing on-line population desirous of additional income.

This is a legitimate, LEGAL, money-making opportunity.  It does not require you to 
come in contact with people, do any hard work, and best of all, you never have to 
leave the house, except to get the mail and go to the bank!

This truly is that lucky break you've been waiting for!  Simply follow the easy 
instructions in this letter, and your financial dreams will come true! When followed 
correctly, this electronic, multi-level marketing program works perfectly... 100% OF 
THE TIME!

Thousands of people have used this program to:

    -  Raise capital to start their own business
    -  Pay off debts
    -  Buy homes, cars, etc.,
    -  Even retire!

This is your chance, so read on and get started today!

----------------------------------------------------------------------------------
OVERVIEW OF THIS EXTRAORDINARY 
ELECTRONIC MULTI-LEVEL MARKETING PROGRAM
----------------------------------------------------------------------------------

Basically, this is what we do:

We send thousands of people a product for $5.00 that costs next to nothing to 
produce and e-mail. As with all multi-level businesses, we build our business by 
recruiting new partners and selling our products.  Every state in the U.S. allows you 
to recruit new multi- level business online (via your computer).

The products in this program are a series of four business and financial reports 
costing $5.00 each.  Each order you receive via "snail mail" will include:

  * $5.00 cash
  * The name and number of the report they are ordering
  * The e-mail address where you will e-mail them the report they
     ordered.

To fill each order, you simply e-mail the product to the buyer.  THAT'S IT!  The 
$5.00 is yours!  This is the EASIEST electronic multi-level marketing business 
anywhere! 

FOLLOW THE INSTRUCTIONS TO THE LETTER AND
BE PREPARED TO REAP THE STAGGERING BENEFITS!

******* I  N  S  T  R  U  C  T  I  O  N  S *******

This is what you MUST do:

1. Order all 4 reports shown on the list below (you can't sell them if you don't order 
them).
     
     *  For each report, send $5.00 CASH, the NAME & NUMBER OF THE
        REPORT YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and 	YOUR 
NAME & RETURN ADDRESS (in case of a problem) to the 	person  whose 
name appears on the list next to the report. MAKE 	SURE YOUR RETURN 
ADDRESS IS ON YOUR ENVELOPE IN 	CASE OF ANY MAIL 
PROBLEMS!
  
     *  When you place your order, make sure you order each of the
        four reports.  You will need all four reports so that you can save
        them on your computer and resell them.

     *  Within a few days you will receive, via e-mail, each of the four
        reports. Save them on your computer so they will be accessible
        for you to send to the 1,000's of people who will order them
        from you.

2.  IMPORTANT-- DO NOT alter the names of the people who are listed
     next to each report, or their sequence on the list, in any way other
     than is instructed below in steps "a" through "f" or you will lose
     out on the majority of your profits.  Once you  understand the way
     this works, you'll also see how it doesn't work if you change it.
     Remember, this method has been tested, and if you alter it, it will
     not work. ( I talked to a friend last month who has also done this
     program.  He said he had tried "playing" with it to change the
     results.  Bad idea.... he never got as much money as he did with
     the un-altered version.  Remember, it's a proven method!

    a.  Look below for the listing of available reports.

    b.  After you've ordered the four reports, take this advertisement and 
         remove the name and address under REPORT #4. This person has 
         made it through the cycle and is no doubt counting their 50 grand!

    c.  Move the name and address under REPORT #3 down to  REPORT #4.  

    d.  Move the name and address under REPORT #2 down to REPORT #3.

    e.  Move the name and address under REPORT #1 down to REPORT #2.

    f.  Insert your name/address in the REPORT #1 position.

Please make sure you copy every name and address ACCURATELY!

3.  Take this entire letter, including the modified list of names, and
     save it to your computer.  Make NO changes to the instruction
     portion of this letter.
  
4.  Now you're ready to start an advertising campaign on the
     INTERNET!  Advertising on the 'Net is very, very inexpensive,
     and there are HUNDREDS of FREE places to advertise. Another
     avenue which you could use for advertising is e-mail lists.  
     You can buy these lists for under $20/2,000 addresses or you
     can pay someone a minimal charge to take care of it for you. 
     BE SURE TO START YOUR AD CAMPAIGN IMMEDIATELY!

5.  For every $5.00 you receive, all you must do is e-mail them the
     report they ordered.  THAT'S IT!  ALWAYS PROVIDE SAME-DAY
     SERVICE ON ALL ORDERS!  This will guarantee that the e-mail THEY
     send out, with YOUR name and address on it, will be prompt
     because they can't advertise until they receive the report!

------------------------------------------
AVAILABLE REPORTS
------------------------------------------

*** Order Each REPORT by NUMBER and NAME ***

Notes:

-  ALWAYS SEND $5 CASH (U.S. CURRENCY) FOR EACH REPORT
   CHECKS NOT ACCEPTED
-  ALWAYS SEND YOUR ORDER VIA FIRST CLASS  MAIL 
-  Make sure the cash is concealed by wrapping it in at least two
   sheets of paper  
-  On one of those sheets of paper, include: (a) the number & name
   of the report you are ordering, (b) your e-mail address, and
   (c) your name & postal address.

PLACE YOUR ORDER FOR THESE REPORTS NOW:
______________________________________________________________

REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES" 

      ORDER REPORT #1 FROM:  
           
	 AMF Investments
          2319 South Kirkwood   #144
           Houston,  TX  77077

______________________________________________________________

REPORT #2 "MAJOR CORPORATIONS AND MULTI-LEVEL SALES"

      ORDER REPORT #2 FROM:

	  Fusion Marketing Ltd.
            8895 Towne Centre Drive
            Suite 105-303A
            La Jolla, CA 92122-5542

______________________________________________________________

REPORT #3 "SOURCES FOR THE BEST MAILING LISTS"

      ORDER REPORT #3 FROM:
		LockMan
            P.O. Box 927603
            San Diego, CA  92192-0603


______________________________________________________________

REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS"

      ORDER REPORT #4 FROM:
		KEY
            P.O. Box 270227
            San Diego, CA 92198

______________________________________________________________

----------------------------------------------------------------------------------------------
HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$
------------------------------------------------------------------------------------------------

Let's say you decide to start small just to see how well it works. Assume your goal 
is to get 10 people to participate on your first level. (Placing a lot of FREE ads on 
the internet will EASILY get a larger response.) Also assume that everyone else in 
YOUR ORGANIZATION gets ONLY 10 downline members.  Follow this example to 
achieve the STAGGERING results below.

1st level--your 10 members with $5............................................$50
2nd level--10 members from those 10 ($5 x 100).....................$500
3rd level--10 members from those 100 ($5 x 1,000)............$5,000
4th level--10 members from those 1,000 ($5 x 10,000)...$50,000
                      THIS TOTALS        ----------->$55,550

Remember friends, this assumes that the people who participate only recruit 10 
people each.  Think for a moment what would happen if they got 20 people to 
participate!  Most people get 100's of participants! THINK ABOUT IT!

Your cost to participate in this is practically nothing (surely you can afford $20). You 
obviously already have an Internet connection and e-mail is FREE! 

REPORT#3 shows you the most productive methods for bulk e-mailing and 
purchasing e-mail lists.  Some list & bulk e-mail vendors even work on trade!

About 50,000 new people get online every month!

******* TIPS FOR SUCCESS *******

 *  TREAT THIS AS YOUR BUSINESS!  Be prompt, professional, and
     follow the directions accurately.

 *  Send for the four reports IMMEDIATELY so you will have them
    when the orders start coming in because:

        When you receive a $5 order, you MUST send out the requested
        product/report to comply with the U.S. Postal & Lottery Laws, Title
        18,Sections 1302 and 1341 or Title 18,  Section 3005 in the U.S. Code,
        also Code of Federal Regs. vol. 16, Sections 255 and 436, which state 
        that "a product or service must be exchanged for money received."

 *  ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.

 *  Be patient and persistent with this program. If you follow the 
    instructions exactly, your results WILL be SUCCESSFUL!

 *  ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL
    SUCCEED!


******* YOUR SUCCESS GUIDELINES *******

Follow these guidelines to guarantee your success:

If you don't receive 10 to 20 orders for REPORT #1 within two weeks, continue 
advertising until you do.  Then, a couple of weeks later you should receive at least 
100 orders for REPORT #2.  If you don't, continue advertising until you do.

Once you have received 100 or more orders for REPORT #2, YOU CAN RELAX, 
because the system is already working for you, and the cash will continue to roll in!

THIS IS IMPORTANT TO REMEMBER:

Every time your name is moved down on the list, you are placed in front of a 
DIFFERENT report.  You can KEEP TRACK of your PROGRESS by watching 
which report people are ordering from you.  If you want to generate more income, 
send another batch of e-mails and start the whole process again!  There is no limit 
to the income you will generate from this business!


******* T  E  S  T  I  M  O  N  I  A  L  S *******

     This program does work, but you must follow it EXACTLY!  Especially the rule of 
not trying to place your name in a different position, it won't work and you'll lose a lot 
of potential income.  I'm living proof that it works.  It really is a great opportunity to 
make relatively easy money, with little cost to you.  If you do choose to participate, 
follow the program exactly, and you'll be on your way to financial security. 
          Sean McLaughlin, Jackson, MS

     My name is Frank. My wife, Doris, and I live in Bel-Air, MD. I am a cost accountant 
with a major U.S. Corporation and I make pretty good money. When I received the 
program I grumbled to Doris about receiving "junk mail." I made fun of the whole 
thing, spouting my knowledge of the population and percentages involved.  I 
"knew" it wouldn't work. Doris totally ignored my supposed intelligence and jumped 
in with both feet. I made merciless fun of her, and was ready to lay the old "I told you 
so" on her when the thing didn't work... well, the laugh was on me!  Within two weeks 
she had received over 50 responses. Within 45 days she had received over 
$147,200 in $5 bills! I was shocked!  I was sure that I had it all figured and that it 
wouldn't work.  I AM a believer now. I have joined Doris in her "hobby."   I did have 
seven more years until retirement, but I think of the "rat race" and it's not for me. We 
owe it all to MLM.
           Frank T., Bel-Air, MD

    I just want to pass along my best wishes and encouragement to you.  Any doubts 
you have will vanish when your first orders come in. I even checked with the U.S. 
Post Office to verify that the plan was legal. It definitely is! IT WORKS!!!
           Paul Johnson, Raleigh, NC

    The main reason for this letter is to convince you that this system is honest, lawful, 
extremely profitable, and is a way to get a large amount of money in a short time. I 
was approached several times before I checked this out. I joined just to see what 
one could expect in return for the minimal effort and money required.  To my 
astonishment, I received $36,470.00 in the first 14 weeks, with money still coming in.
           Sincerely yours, Phillip A. Brown, Esq.

    Not being the gambling type, it took me several weeks to make up my mind to 
participate in this plan. But conservative that I am, I decided that the initial 
investment was so little that there was just no way that I wouldn't get enough orders 
to at least get my money back. Boy, was I surprised when I found my medium-size 
post office box crammed with orders!  For awhile, it got so overloaded that I had to 
start picking up my mail at the window. I'll make more money this year than any 10 
years of my life before. The nice thing about this deal is that it doesn't matter where 
in the U.S. the people live. There simply isn't a better investment with a faster return.
         Mary Rockland, Lansing, MI

    I had received this program before. I deleted it, but later I wondered if I shouldn't 
have given it a try. Of course, I had no idea who to contact to get another copy, so I 
had to wait until I was e-mailed another program...11 months passed then it came...I 
didn't delete this one!...I made more than $41,000 on the first try!!
          D. Wilburn, Muncie, IN

     This is my third time to participate in this plan. We have quit our jobs, and will 
soon buy a home on the beach and live off the interest on our money.  The only 
way on earth that this plan will work for you is if you do it. For your sake, and for your 
family's sake don't pass up this golden opportunity.  Good luck and happy 
spending!
           Charles Fairchild, Spokane, WA


ORDER YOUR REPORTS TODAY AND
GET STARTED ON YOUR ROAD TO 
GETTING EXTRA CASH DAILY!

NOW  IS THE TIME FOR YOUR TURN

DECISIVE ACTION YIELDS
POWERFUL RESULTS





























From ichudov at algebra.com  Sun Feb 22 19:00:31 1998
From: ichudov at algebra.com (Igor Chudov @ home)
Date: Sun, 22 Feb 1998 19:00:31 -0800 (PST)
Subject: Privacy books
Message-ID: <199802230259.UAA09876@manifold.algebra.com>


Could anyone suggest a book that gives recommendations on improving
privacy? I do not want my name to be in too many databases. There are
very many such books but I am not sure which one is best.

Thank you.

	- Igor.





From rfiero at pophost.com  Sun Feb 22 19:49:34 1998
From: rfiero at pophost.com (Richard Fiero)
Date: Sun, 22 Feb 1998 19:49:34 -0800 (PST)
Subject: CIA Blasts Bay of Pigs Op
In-Reply-To: <1.5.4.32.19980222175049.006808d4@pop.pipeline.com>
Message-ID: <199802230348.UAA17099@pophost.com>


John Young writes:
>
>The NY Times reports today that the National Security Archive 
>has obtained under FOIA the sole remaining copy of the
>CIA's 1962 Top Secret survey of the Bay of Pigs disaster. 
>The highly critical document is termed one of the most secret 
>documents of the cold war. We've put a copy of the article at:
>
>   http://jya.com/cia-pigs.htm
. . .

Central Intelligence is now portraying itself as a bungling and hopelessly
harmless bureaucracy.
Sure.
-- Richard Fiero





From jtatz at chemistry.ohio-state.edu  Sun Feb 22 20:41:41 1998
From: jtatz at chemistry.ohio-state.edu (Jim Tatz)
Date: Sun, 22 Feb 1998 20:41:41 -0800 (PST)
Subject: CIA Blasts Bay of Pigs Op
In-Reply-To: <199802230348.UAA17099@pophost.com>
Message-ID: 


> Central Intelligence is now portraying itself as a bungling and hopelessly
> harmless bureaucracy.
> Sure.
> -- Richard Fiero

Is this something new?

-Jim






From 57324685 at aol.com  Sun Feb 22 22:09:23 1998
From: 57324685 at aol.com (57324685 at aol.com)
Date: Sun, 22 Feb 1998 22:09:23 -0800 (PST)
Subject: JUST RELEASED!  16 Million!!!
Message-ID: <011297055501222@g_fantasm.com>



IT WAS JUST RELEASED!!
 
INTRODUCING...MILLIONS VOL. 1

We took a total of over 92 million email addresses from many of the
touted CD's that are out there (bought them all - some were $300+)!
We added the millions we had in storage to those.   When we
combined them all, we had in  excess of 100+ million addresses
in one huge file.

We then ran a super "sort/de-dupe" program against this huge list.
It cut the file down to less than 25 million!!! Can you believe that? It
seems that most people that are selling CD's are duping the public
by putting numerous files of addresses in the CD over and over. This
created many duplicate addresses. They also had many program
 "generated" email addresses like Compuserve, MCI, ANON's, etc.
This causes a tremendous amount of undeliverables, and for  those
that use Stealth programs, clogs up servers quickly with trash, etc.

We then ran a program that contained 150+ keywords to remove
addresses with vulgarity,  profanity, sex-related names, postmaster,
 webmaster, flamer, abuse, spam, etc., etc.   Also eliminated all .edu,
.mil, .org, .gov, etc.   After that list was run against the remaining list,
it  reduced it down to near 16 million addresses!

So, you see, our list will save people hundreds of dollars buying all
others that are out there on  CD and otherwise. Using ours will be like
 using the 100+ million that we started with, but a lot  less money and
alot less time!!

We also purchased Cyber-Promos ($995.00) CD.   We received it just
prior to finishing production work on the new CD.   We had our people
take a random sample of 300,000 addresses  from the touted 2.9 that
they advertised.   We used a program that allows us to take a random
sample of addresses from any list.   We were able to have the program
take every 9th address, thus giving us a 300,000 list of Cyber's email
addresses from top to bottom.  We did not clean  these, but we did create
3 seperate files named cyber1.txt, cyber2.txt, & cyber3.txt of 100,000
addresses each. This will give all people that use the list a opportunity to
send mail to the list before deciding if their CD is all it's hyped to be.

We also included a 2+ million "Remove/Flamer" file broke into seperate
files for ease of  extracting and adding to your own database of removes.

 "You can buy from the REST or you can buy from the BEST.   Your choice.
_____________________________

What others are saying:
 
"I received the CD on Friday evening.   Like a kid with a new toy, I
immediately started bulking out using the new email addresses.  Over
the course of the weekend, I emailed out over 500,000 emails and I
received less than TWENTY undeliverables!!  I am totally satisfied
with my purchase!!  Thanks Premier!!"

Dave Buckley
Houston,  TX

"This list is worth it's weight in gold!!  I sent out 100,000 emails for my
product and received over 55 orders!

Ann Colby
New Orleans, LA

****************************************
 
                  HERE'S THE BOTTOM LINE

Here is what you get when you order today!

>> 16 Million Email Addresses... 1 per line in simple text format on a CD.
Files are in lots of 100,000 (no codes needed to open files).
All files are separated by domain name for your convenience.
 
PLUS you receive a tremendous REMOVE list!
 
AND
 
the a sampling of CyberPromo's HOT list.

>>> NOW ONLY $149.00!

This price is effective for the next seven days, thereafter the price will be
$199.00 so ORDER NOW!

All lists are completely free of any Duplicates. We also on a continual
basis, add New Names and Remove Undeliverables and Remove
Requests.
 
The result is the Cleanest Email Addresses Available Anywhere
to use over and over again, for a FRACTION of the cost that other
companies charge. Typical rates for acquiring email lists are from
1 cent to as high as 3 cents per email address - that's
"INFORMATION HIGHWAY" ROBBERY!.

Don't even hesitate on this one or you will miss out on the most
effective way to market anywhere..PERIOD!

If you have any further questions or to place an order by
phone, please do not hesitate to call us at:

                              908-245-1143

To order our email package, simply print out the EZ ORDER FORM
below and fax or mail it to our office today.
 
We accept Visa, Mastercard, AMEX, Checks by Fax and Mail.
 
 _________________
EZ Order Form
 
 
 _____Yes! I would like to order MILLIONS Vol. 1 email addresses
for only $149.00.
 
 
*Please select one of the following for shipping..
 
____I would like to receive my package OVERNIGHT. I'm including
$15 for shipping. (outside US add an additional $25 for shipping)
 
____I would like to receive my package 2 DAY delivery. I'm including
$10 for shipping.  (outside US add an additional $25 for shipping)
 
DATE_____________________________________________________
 
NAME____________________________________________________

COMPANY NAME___________________________________________

ADDRESS_________________________________________________

CITY, STATE, ZIP___________________________________________
 
PHONE NUMBERS__________________________________________
 
FAX NUMBERS_____________________________________________
 
EMAIL ADDRESS___________________________________________
 
TYPE OF CREDIT CARD:
 
______VISA _____MASTERCARD
 
CREDIT CARD# __________________________________________
 
EXPIRATION DATE________________________________________
 
NAME ON CARD___________________________________________
 
AMOUNT $____________________
 
 
(Required) SIGNATURE:x________________________
 
DATE:x__________________
 
You may fax your order to us at:   1-908-245-3119
 
CHECK BY FAX SERVICES!
 
If you would like to fax a check, paste your check below and fax it to
our office along with all forms to: 1-908-245-3119

******************************************************

***24 HOUR FAX SERVICES*** PLEASE PASTE YOUR
 
CHECK HERE AND FAX IT TO US AT 1-908-245-3119
 
*******************************************************
 
If You fax a check, there is no need for you to send the original check.
We will draft up a new check, with the exact information from your
original check. All checks will be held for bank clearance.

If you feel more comfortable sending payment through the mail,
please send all forms and Check or Money Order to:
 
JKP Enterprises
700 Boulevard 
Suite 102
Kenilworth, NJ 07033







From MegaLeads at aol.com  Sun Feb 22 23:39:07 1998
From: MegaLeads at aol.com (MegaLeads at aol.com)
Date: Sun, 22 Feb 1998 23:39:07 -0800 (PST)
Subject: request for remailler services
Message-ID: <58eeb372.34f12773@aol.com>


please send any info you can to megaleads at aol.com





From nobody at REPLAY.COM  Mon Feb 23 07:47:38 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Mon, 23 Feb 1998 07:47:38 -0800 (PST)
Subject: Is spam really a problem?
Message-ID: <199802231547.QAA29528@basement.replay.com>



Hi!

'Masque' here again. The same one who wrote the
original 'Is spam really a problem?' post. (I
won't attempt to prove that :-).

I'm really astounded at "sunder's" PK based 
solution; it's akin to proposing decapitation
as a cure for pimples.

>It eats up your valuable time.  You might not see it for what it is, but
>it is an interruption of normal service.  It's annoying as having your
>pager go off durring sex and having to call back your boss instead of
>ignoring it.  (Presume you can't shut off your pager.)  It takes away
>from the continuity of life.

You can't even come up with a valid analogy. Any
pager I've ever carried could be put in silent mode.
With email, you decide when to check it, and if you 
have two brain cells to rub together you can identify
and kill spam reliably on just the Subject and Sender
data, without reading it. To reiterate, it takes me
less time to manually kill spam than to trash the junk
in my snail mail. Spam is simply Not A Big Problem, and
much less an irritation than telemarketer calls.

What do you propose?

>Have every sendmail server use a PK scheme to talk to every other
>server and authenticate the connection.  Have every sendmail server accept
>mail only from those whose key is verified.

Oh boy. Mandatory signing, with registered keys. Great. Why not
also require people to have their SSN's tattooed on the inside of
their forearms? That way, if some one is so foolish as to say 
something you didn't want to hear, you'll know 
who to sue 'for the theft of your valuable time'.

You're doing the Surveilance State's work for it.  
People who whine 'there oughta be a law' 
everytime anything in life goes against their 
expectations are helping build Big Brother. 
This is called 'being a Useful Idiot'.

>Further, some of us use ISDN to get their email and transferring the
>extra junk adds to the pay/minute connections.

So the rest of the world should give up privacy and anonymity to
fix your poor choice of service provider? You made your bed; now
lie in it.

sunder: get a grip. Coercive legislation is simply not the
appropriate solution for such a minor problem as spam.

guy at panix.com writes:
>Why are you asking the cypherpunks list?

Because I'm active on the list, and I spend more
time here skipping messages about spam than
I do killing actual spam.

Masque.










From mf at mediafilter.org  Mon Feb 23 08:12:55 1998
From: mf at mediafilter.org (MediaFilter)
Date: Mon, 23 Feb 1998 08:12:55 -0800 (PST)
Subject: CryptoGate, from CAQ
Message-ID: <1323889970-327546@mediafilter.org>


            Crypto AG: The NSA's Trojan Whore?

                    by Wayne Madsen

        FOR AT LEAST HALF A CENTURY, THE US HAS BEEN
         INTERCEPTING AND DECRYPTING THE TOP SECRET
        DOCUMENTS OF MOST OF THE WORLD'S GOVERNMENTS

      It may be the greatest intelligence scam of
      the century: For decades, the US has routinely
      intercepted and deciphered top secret
      encrypted messages of 120 countries. These
      nations had bought the world's most
      sophisticated and supposedly secure
      commercial encryption technology from
      Crypto AG, a Swiss company that staked its
      reputation and the security concerns of its
      clients on its neutrality. The purchasing
      nations, confident that their communications
      were protected, sent messages from their
      capitals to embassies, military missions, trade
      offices, and espionage dens around the world,
      via telex, radio, teletype, and facsimile. They
      not only conducted sensitive albeit legal
      business and diplomacy, but sometimes
      strayed into criminal matters, issuing orders
      to assassinate political leaders, bomb
      commercial buildings, and engage in drug and
      arms smuggling. All the while, because of a
      secret agreement between the National
      Security Agency (NSA) and Crypto AG, they might as
      well have been hand delivering the message to Washington.

      Their Crypto AG machines had been rigged so that when
      customers used them, the random encryption key
      could be automatically and clandestinely
      transmitted with the enciphered message. NSA
      analysts could read the message traffic as easily
      as they could the morning newspaper.

      [...]


>From CAQ #63 http://caq.com/cryptogate







From declan at well.com  Mon Feb 23 08:17:23 1998
From: declan at well.com (Declan McCullagh)
Date: Mon, 23 Feb 1998 08:17:23 -0800 (PST)
Subject: A virtual Swiss bank for the rest of us, from Time/Netly News
Message-ID: 


Sicherheit und Privat will be issuing digital cash, digital letters of
credit, and use a secret-sharing crypto app on a Pilot to handle stock
trading. A bunch of cypherpunk regulars, including Black Unicorn, are
involved.

Below is my writeup that's in this week's Time magazine. For details check
out my article in today's Netly News:

  http://cgi.pathfinder.com/netly/opinion/0,1042,1756,00.html

-Declan

****

A VIRTUAL SWISS BANK FOR THE REST OF US

Time Magazine
March 2, 1998
Page 20

Got the urge for offshore banking but not the cash to try
it? Rather than saving up for a plane ticket to Grand
Cayman, check out a new online bank opening its virtual
doors this week. Sicherheit und Privat (Security and
Privacy) is an Austrian bank that offers encrypted
communications, digital cash transactions and a
privacy-protected MasterCard for a minimum deposit of
$1,000 (as opposed to $10K to $50K in a typical Swiss
bank). Could be just the thing for low rollers trying to
hide cash from a spouse's divorce lawyers--or the IRS.








From sorrin at syndata.com  Mon Feb 23 08:40:29 1998
From: sorrin at syndata.com (Steve Orrin)
Date: Mon, 23 Feb 1998 08:40:29 -0800 (PST)
Subject: FYI!!!! - NETA to buy TIS
Message-ID: <19980223164221625.AAA314.388@Satan.syndata.domain>


Hot off the Press:

http://biz.yahoo.com/snp/980223/tisx_dtp_m_1.html


Monday February 23, 10:21 am Eastern Time

Trusted Information Systems to Be Acquired by Network Associates

TRUSTED INFORMATION SYSTEMS INC. Signs Definitive Agreement to Be Acquired
by
Network Associates Inc.

Feb. 23, 1998, Network Associates Inc. (Nasdaq:NETA - news) and Trusted
Information Systems Inc. (Nasdaq:TISX -
news) said they signed a definitive agreement under which NETA will acquire
TISX in a transaction valued at over
$300,000,000.

Each TISX share will be exchanged for 0.323 of a NETA share.

Subject to approval by TISX stockholders, among other conditions, the
transaction is expected to close within about 90 days. 




A Picture Tells A Thousand Words.
                    STEGO





From bcrosby at mncs.k12.mn.us  Mon Feb 23 09:00:32 1998
From: bcrosby at mncs.k12.mn.us (Brandon Crosby)
Date: Mon, 23 Feb 1998 09:00:32 -0800 (PST)
Subject: Is spam really a problem? (fwd)
Message-ID: <199802231704.LAA25326@ted.mncs.k12.mn.us>


> 
> >It eats up your valuable time.  You might not see it for what it is, but
> >it is an interruption of normal service.  It's annoying as having your
> >pager go off durring sex and having to call back your boss instead of
> >ignoring it.  (Presume you can't shut off your pager.)  It takes away
> >from the continuity of life.
> 
> You can't even come up with a valid analogy. Any
> pager I've ever carried could be put in silent mode.
> With email, you decide when to check it, and if you 
> have two brain cells to rub together you can identify
> and kill spam reliably on just the Subject and Sender
> data, without reading it. To reiterate, it takes me
> less time to manually kill spam than to trash the junk
> in my snail mail. Spam is simply Not A Big Problem, and
> much less an irritation than telemarketer calls.
> 

Asside from this, when everyone finally figures out how to MIME encrypt
images, movies, sounds, etc. into their E-Mails, the net will become a
sespool of junk mail w/ 16-bit images that only really use 16 colors,
constantly flowng to and fro in a broth. Try to go to world-famous sites?
Ha! Spam is there, too.

The net can only handle so much, and spam by tradition isn't high on the
list.

> What do you propose?
> 
> >Have every sendmail server use a PK scheme to talk to every other
> >server and authenticate the connection.  Have every sendmail server accept
> >mail only from those whose key is verified.
> 
> Oh boy. Mandatory signing, with registered keys. Great. Why not
> also require people to have their SSN's tattooed on the inside of
> their forearms? That way, if some one is so foolish as to say 
> something you didn't want to hear, you'll know 
> who to sue 'for the theft of your valuable time'.

When this happens, two problems arise:
 (1) people (not to forget Gov) will have a reason to break singing codes
 (2) confidence in the system will make signing fraud a very happy-day
       bussiness.

I would suggest, we all send a bit of spam out, 'accidentally' freeze the net
and show people what can happen. Asside from this personality change, little
can be done to keep people from sending spam (or, for that matter, pesonal
letters).
-Brandon Crosby





From sal at panix.com  Mon Feb 23 09:51:25 1998
From: sal at panix.com (Sal Denaro)
Date: Mon, 23 Feb 1998 09:51:25 -0800 (PST)
Subject: FCPUNX:'close to the machine'
In-Reply-To: <199802192206.RAA15832@anon7.pfmc.net>
Message-ID: 


On Sun, 15 Feb 1998, Vladimir Z. Nuri wrote:
> fun new book: "close to the machine" by Ellen Ullman. anybody
> here seen/read it? a highly
> personal and emotional book at times about working in the computer 
> industry.  author is a software engineer whose done a lot of contract
> work. I think many here will find it worth a look and/or worth

I read it. After a while I noticed that I had a lot in common with
the young programmer that she had an affair with. 

It took a while to come to terms with being a "type" :)

There were two things about the book that I disliked:

1) Macho-computing. A number of consultants tend to act as if they are
   sliting the atom or landing a man on the moon as they work. While I
   agree that programming is hard work, and that a lot of what programmers
   do is on the edge, it is hardly ground breaking to implement YA DBMS,
   even if it is Java based and web-centric.

2) I think she was tring to hard to look technical.  

--
sal at panix.com                                       Salvatore Denaro
"The reality of the software business today is that if you find
something that can make you ridiculously rich, then that's something
that Microsoft is going to take away from you." -- Max Metral






From austin at total.net  Mon Feb 23 09:51:43 1998
From: austin at total.net (Austin Hill)
Date: Mon, 23 Feb 1998 09:51:43 -0800 (PST)
Subject: FYI!!!! - NETA to buy TIS
Message-ID: <199802231751.MAA20933@bretweir.total.net>




                    TIS provides a full line of security products and
                    services including: Gauntlet firewalls to protect
                    network connections; Gauntlet Global Virtual Private
                    Networks to secure electronic communications 
worldwide;
                    Stalker misuse detection solutions to ensure the
                    integrity of servers which, when used in conjunction
                    with Network Associates' CyberCop, extends this level 
of
                    protection to networks; and TIS Consulting and 
Training
                    services to facilitate a company's network running
                    smoothly.

                    TIS' RecoverKey encryption technology provides 
flexible,
                    scalable, user-controlled key recovery, and has been
                    implemented by multinational organizations for their
                    global networks. TIS is a founding member of the Key
                    Recovery Alliance, an organization of over 60
                    international companies working together to facilitate
                    the worldwide commercial use of strong encryption.

                    "This announcement represents a fundamental shift in 
the
                    way large customers will implement security 
technology,"
                    said Bill Larson, chairman and CEO of Network
                    Associates. "Network Associates is the first company 
to
                    deliver this caliber of technology and this breadth of
                    security products. The ability to tie all of these
                    components together in a centralized management
                    environment is critical to customer success, and 
Network
                    Associates is the only company to combine security 
with
                    industry-leading network management capabilities."


Well I guess this returns Network Associates to the Key Recovery 
Alliance.  I wonder what the PGP division thinks about the new member of 
the family being the founding member of the KRA?

-Austin

Quoted text from Steve Orrin (sorrin at syndata.com ) on 2/23/98 11:46 AM

>Hot off the Press:
>
>http://biz.yahoo.com/snp/980223/tisx_dtp_m_1.html
>
>
>Monday February 23, 10:21 am Eastern Time
>
>Trusted Information Systems to Be Acquired by Network Associates
>
>TRUSTED INFORMATION SYSTEMS INC. Signs Definitive Agreement to Be Acquired
>by
>Network Associates Inc.
>
>Feb. 23, 1998, Network Associates Inc. (Nasdaq:NETA - news) and Trusted
>Information Systems Inc. (Nasdaq:TISX -
>news) said they signed a definitive agreement under which NETA will acquire
>TISX in a transaction valued at over
>$300,000,000.
>
>Each TISX share will be exchanged for 0.323 of a NETA share.
>
>Subject to approval by TISX stockholders, among other conditions, the
>transaction is expected to close within about 90 days. 
>
>
>
>
>A Picture Tells A Thousand Words.
>                    STEGO
>





From brianbr at together.net  Mon Feb 23 10:24:41 1998
From: brianbr at together.net (Brian B. Riley)
Date: Mon, 23 Feb 1998 10:24:41 -0800 (PST)
Subject: CryptoGate, from CAQ
Message-ID: <199802231824.NAA08548@mx01.together.net>


-----BEGIN PGP SIGNED MESSAGE-----

On 2/23/98 11:15 AM, MediaFilter (mf at mediafilter.org)  passed this
wisdom:

>   Their Crypto AG machines had been rigged so that when
>   customers used them, the random encryption key
>   could be automatically and clandestinely
>   transmitted with the enciphered message. NSA
>   analysts could read the message traffic as easily
>   as they could the morning newspaper.

 While I feel that, considering its holier than thou attitude, the USG
is acting in a morally reprehensible fashion, these countries got what
they deserve; if they didn't have one of their own on hand, they should
have rented a crypto specialist from "Cypherpunks R Us" (TCM prop) to
check out the equipment/software. If the damned key was passed along
with the ciphertext it seems to me that it should have been easy enough
to tell by creating some known very short text messages ... are they
really that lazy/stupid/trusting?????

-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQEVAwUBNPG+3z7r4fUXwraZAQF8rAf9HzVd03y+Dgjx8GkmjHxBS7hFW8rRXqZB
0wnVOuYYrSqGGcNTOKDReHBWhPvVnHT9A8DCSYFc1/tjRvFwbtZo6ultwWJDDZ3m
0GwcVg9AK9J/jqrxshjebayzCQOSFZhCnxUZnaFHC6PXx4caKQ3AdEQZ/9Ff64qE
Sdkwu9C2Pq2j3+VdifF6+P0g90JHIqqd0AWLSEuuZJdZBIkPon4JBpwAHHkSpmN4
WdC71lKl8OxJfBapTFTUW4qBitH2PmwA6NIPZ+2SLVfGAOORWEYwHXoLsy8oqeWU
7Hvq6HBC7JngAD3L/ozVVML3dlqnr0i3C7mUd7GwFnVTQo3Qo4Jxpw==
=Ijtu
-----END PGP SIGNATURE-----


Brian B. Riley --> http://members.macconnect.com/~brianbr
  For PGP Keys  

 "Sometimes it is said that man cannot be trusted with the government
  of himself.  Can he, then, be trusted with the government of others?
  Or have we found angels in the forms of kings to govern him?  Let
  history answer this question."  Thomas Jefferson, 1st Inaugural Addr







From sorrin at syndata.com  Mon Feb 23 11:01:29 1998
From: sorrin at syndata.com (Steve Orrin)
Date: Mon, 23 Feb 1998 11:01:29 -0800 (PST)
Subject: PGP's Response
Message-ID: <19980223190148109.AAA317.313@Satan.syndata.domain>


The following is PGP's official response (from there web site) to the TIS
acquisition by NETA. What it infers is that while PGP for Personal use
won't (at least until NETA decides otherwise) incorporate TIS technology,
it leaves the door wide open for PGP for Business use....

Network Associates and Key Recovery

With the acquisition of Trusted Information Systems (TIS) by
Network Associates, NAI has added a new technology to its product
portfolio -- key recovery. This TIS-developed technology
addresses the market needs for encryption key recovery and
management. NAI will continue to provide this technology to the
market.

NAI's PGP product group already provides the capability for
corporations to recover information from PGP products deployed in
corporate environments. The requirement for this capability from
corporations has been evident and well-known for quite sometime. 

However, NAI does not believe there is a need for key recovery in
PGP products for the individual. NAI will develop and market
products that its customers need and want but will not include
any technology that is not required by its customers.






A Picture Tells A Thousand Words.
                    STEGO





From sunder at brainlink.com  Mon Feb 23 16:24:09 1998
From: sunder at brainlink.com (sunder)
Date: Mon, 23 Feb 1998 16:24:09 -0800 (PST)
Subject: Five industry giants propose encryption plan to protect Hollywood
In-Reply-To: <199802210056.TAA07362@users.invweb.net>
Message-ID: <34F21246.7B6B00A8@brainlink.com>


Oh please.  You could always (for computers anyway) write your own drivers for
video cards and sound cards that not only display stuff, but also save it to
a hard drive as it's being recieved.  Whoop!

 >   >   Date: Thu, 19 Feb 1998 11:13:50 -0800 (PST)
> >   >   From: William Knowles 
> >   >
> >   >   BURBANK, Calif. (February 19, 1998 09:06 a.m. EST
> >   >   http://www.nando.net) -- Five computer and electronics industry
> >giants
> >   >   have agreed on a strategy to prevent people from illegally copying
> >   >   digital movies and music, the Los Angeles Times reported Thursday.
> >   >
> >   >   According to the proposal, high-definition TV sets, personal

> Well I have gone over this in previous posts that right's management
> woun't work against the bootlegers as at some time you have to display the
> raw data to the user. what it will to is make things that much harder for
> the average user.

Exactly, it will probably require the average user to get involved in weird
type in the 5th word of the 6th paragraph on page 60 in volume 6 of your 
book and your ssn and your 3rd daughter's birth hour to display.  But once
displayed... it's yours.  Shit, things like Lotus ScreenCam can grab anything
displayed on screen.


-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================





From sunder at brainlink.com  Mon Feb 23 16:49:12 1998
From: sunder at brainlink.com (sunder)
Date: Mon, 23 Feb 1998 16:49:12 -0800 (PST)
Subject: PK & Re: Is spam really a problem?
In-Reply-To: <199802200602.BAA18990@panix2.panix.com>
Message-ID: <34F21824.8FFA08B3@brainlink.com>


Information Security wrote:

>    >
>    >   Until someone else gets a throw away $10 account and uses it to
>    >   spam, right?  By the time you track'em down, they already gave up
>    >   that account.  All ISP's do is to delete the spamming account, which
>    >   the spammer doesn't care about anyway.  So you achive nothing.
> 
> Talk about achieving nothing: what does server-to-server authentication
> have to do with overcoming spam from throw-away accounts?

Gives you a way of tracing the spammer and avoiding forged headers.
 
> Hey, at least ISPs are making money from terminating accounts. ;-)

Hey, ISP's do suffer damage from spammers.   If they let too many spammers on,
they'll get black listed and none of their users will be able to send mail to
some sites that chose to drop all mail from spam supporting ISP's.  This way
it's an incentive for them to drop spammers.

> And how would throw-away accounts be affected by your proposed
> massive change in SMTP protocol?

There being a contract between the ISP and the throw away account requiring
the payment of damages caused, it would provide teeth to prevent spamming.  If
spamming occurs, the spammer gets to pay for their advertising.  Right now,
spamming is relatively free for the advertiser.
 
> But these keys must be registered somewhere: whether it's at a centralized
> site or distributed, *requiring* everyone to have a digital signature for
> Internet access is twisting this elegant crypto-related technology: to
> number each and every one of us, and is exactly what will make CDA legal,
> because as soon as it's in place attributes such as "age" will be attached.

No, there is no need for a central server.  It's more than enough to require
the user to gen keys of a certain minimal length.  This takes CPU time to do
and enough so to prevent spamming.  If they use the same keys, the servers
will recognize and count the total, thus limiting them to a fixed number of
posts.
 
> Required identity repositories are a bad idea.

None are needed.  Just valid public keys linked to the IP of the incoming
messages.
i.e. a public key along with the ip the shit comes from signed with the private
key
is enough.  If the ip doesn't match the connection IP, the connection gets
dropped.
The fact that there's a public key means that the receiver server can track ip
to 
keys.  Maybe throwing a secured form of identd might help as well.
 
> What, you want _me_ to solve the UCE problem?
> 
> Okay.

Erm, if you chose to, have fun doing it.  These are suggestions for a 
cryptographic solution as opposed to a congressional fuck you up the ass
and kill your rights solution.

> I think if Brad (EFF Director) Templeton's whitelist system were
> made available at the firewall/enterprise level, then widely
> deployed, spam would be dead.

Sounds good to me, except that it's a huge pain for the senders to send
any messaage to anyone.
 
> It's a handy little bot-reply mechanism that asks unknown authors
> to verify they aren't sending UCE, else face a monetary penalty.
 
> The most important part of this design is that it requires
> no control-freak changes to the Internet.

As does my scheme.

> Don't suggest solutions that *require* digital signatures of everyone.

Pushing crypto over legislation is worthwhile in any case, and pushes
towards anonymous reputation capital systems.

> This might work too:
> 
> Throttle email going through the ISP's mailserver.
> 
> Maybe 5/minute limit, flagging attempts to go faster to the admins.

With a count of users.  If Dick Spammer is spamming someone he doesn't
much give a shit about 5 minute delays.  It only prevents massive massive
spams.  As long as the sysadmins don't notice you can send a fuckload of
mail even with 5min delays.
 
> As for direct PPP connectivity, upgrade router software to throttle.
> (Port SMTP traffic)

Yep.

> Certain people, at the ISP's choice, would have a higher limit,
> for mailing lists and such.
> ---guy

Yep.
 
>    Think.

Erm, Think Different.  (I always did prefer Apple over IBM.)

-- 

=====================================Kaos=Keraunos=Kybernetos==============
.+.^.+.|  Ray Arachelian    |Prying open my 3rd eye.  So good to see |./|\.
..\|/..|sunder at sundernet.com|you once again. I thought you were      |/\|/\
<--*-->| ------------------ |hiding, and you thought that I had run  |\/|\/
../|\..| "A toast to Odin,  |away chasing the tail of dogma. I opened|.\|/.
.+.v.+.|God of screwdrivers"|my eye and there we were....            |.....
======================= http://www.sundernet.com ==========================





From celeste at seeme.net  Mon Feb 23 17:57:49 1998
From: celeste at seeme.net (celeste at seeme.net)
Date: Mon, 23 Feb 1998 17:57:49 -0800 (PST)
Subject: Valentine Suprise
Message-ID: <36591454_72901966>



Me and my friends are so lonely!! 
I wish that you would come and see me. 
With Valentines day coming I don't want to be alone. 
I will do anything to make you happy, 
if you want me to I'll even invite a friend over to join us.  
Just PLEASE don't let me be alone!  
I'll be awaiting for you every night.
I'll be at: http://www.cyber-fantasy.com/





From trei at ziplink.net  Mon Feb 23 19:57:17 1998
From: trei at ziplink.net (Peter Trei)
Date: Mon, 23 Feb 1998 19:57:17 -0800 (PST)
Subject: DDJ Crypto CD has arrived!
Message-ID: <34F252DA.652A@ziplink.net>


Well, it's finally here.

Frankly, I'm a little disapointed with the presentation. It's based
around a program called Hyper Reader, from Intergaid. This seems a bit
out of date - the copyright runs from 1987-1994. While this may have
been driven by a desire to support Win 3.1 without extra software, an
HTML based approach would have been my preference.

I've encountered a few minor bugs in the few minutes I've played with
it; not all of the buttons work properly, and the color maps go to hell
when the program's window is not selected.

While the book data is stored in some proprietary format with an *.hw4
extension, chapters can be easily exported to flat text files. They
can also be exported in WP format, but diagrams don't seem to come
out (at least when I export them to MS Word) - figures seem to 
be scanned bitmaps from the books.

Here's the copyright data, which lists the books present:


>Applied Cryptography, Cryptographic Protocols, and Computer Security >Models by Richard Demillo. Copyright 1983, American Mathematical >Society. All rights reserved.

>Applied Cryptography: Protocols, Algorithms, and Source Code in C, >Second Edition, by Bruce Schneier. Copyright  1995, John Wiley & Sons, >Inc. All rights reserved.

>Contemporary Cryptology: The Science of Information Integrity, edited >by Gustavus J. Simmons, Copyright  1992, IEEE. All rights reserved. No >part of this book may be reproduced or transmitted in any form or by >any means, electronic or mechanical, including photocopying, recording >or by any information storage and retrieval system, without permission >in writing from the IEEE.

>Cryptography and Data Security by Dorothy Denning. Copyright 1982, >Addison-Wesley Publishing Co., Inc. All rights reserved. No part of >this book may be reproduced or transmitted in any form or by any means, >electronic or mechanical, including photocopying, recording, or by any >information storage and retrieval system, without permission in writing >from Addison-Wesley Longman, Inc. Use of this licensed CD-ROM version >is subject to the terms of the individual, noncommercial license >granted the purchaser of this CD-ROM version.

>Cryptography: A New Dimension in Computer Data Security, by Carl Meyer. >Copyright 1982, John Wiley &Sons. All rights reserved.

>Cryptography: Theory and Practice, by Douglas Stinson., Copyright 1995, >CRC Press. All rights reserved.

>Handbook of Applied Cryptography, by Paul C. Van Oorschot, Scott A. >Vanstone, and Alfred Menezes. Copyright 1996, CRC Press. All rights >reserved.

>Military Cryptanalysis, Volume I, by William Friedman, Aegean Park >Press. All rights reserved
> Military Cryptanalysis, Volumes II, by William Friedman, Aegean Park >Press. All rights reserved. 
>Military Cryptanalysis, Volumes III, by William Friedman, Aegean Park >Press. All rights reserved. 
>Military Cryptanalysis, Volumes IV, by William Friedman, Aegean Park >Press. All rights reserved.

>"RSA Laboratories FAQ on Cryptography," "RSA Laboratories Technical >Reports," "RSA Laboratories Security Bulletins," and "CrytoBytes >Newsletter" Copyright 1997 RSA Data Security, Inc. All rights >reserved.

For those wondering: Applied Cryptography includes the source code
appendix. I have not checked if it has the 5th printing corrections.


Peter Trei
ptrei at securitydynamics.com





From ichudov at algebra.com  Mon Feb 23 20:25:00 1998
From: ichudov at algebra.com (Igor Chudov @ home)
Date: Mon, 23 Feb 1998 20:25:00 -0800 (PST)
Subject: return.C -- performance tracking tool (fwd)
Message-ID: <199802240424.WAA21282@manifold.algebra.com>



I have been using this program for a while and decided to share it
with the other readers. It is written in C++.

/***********************************************************************

This program calculates the total portfolio return.  It may be used
to find out an individual's stock picking performance and compare it
to some benchmark.

Right now it compiles under Unix, but I would expect it to work under
DOS and Win32 console interface. To compile it, type

	gcc -lm -lg++ -o return return.C

This program was written because I was not satisfied with the existing
portfolio tracking websites due to their extremely limited and incorrect
functionality.

It works by treating your investments as a "mutual fund". It tracks
the number of "shares" held. It means that additional cash infusions,
withdrawals, stock splits, sales of securities do not affect the per share
value. This is done so that the changing size of the portfolio would not
skew the estimate of the true performance of the stock picker. However,
dividends, fees and recorded capital appreciation do affect the per
share value.

Short sales are allowed by specifying a negative stock amount.

I strongly suggest that investors regularly record stock prices into their
transaction files (using the VAL operator) to monitor how they are doing.

USAGE:

	portfolio-return transaction-file-name TICKER=price TICKER=price ...

EXAMPLE

	portfolio-return MYSTOCKS.TXT MSFT=130 T=65.56

It reads a text file that contains the record of transactions, and 
prices, and requests to print out the portfolio value.

# This is a typical file used to calculate total return.
# This file contains comments, marked by "#" characters,
# and transaction info.
#
# Transaction info consists of records of the following form:
#
# INV Amount                    -- tells how much was invested in Category
# PUR Ticker numshares share_price   -- stock purchase info
# SAL Ticker numshares share_price   -- stock sale
# DIV Ticker Amount                  -- how much dividend was received
# WDR Amount                         -- cash withdrawal
# VAL Ticker Amount                  -- Value per share
# SPL Ticker new_to_old              -- stock split
# FEE amount                         -- various fees (like margin loan 
#					interest, commission etc)
# (negative FEE means incoming cash, from e.g interest on the cash held
# by the broker)
# PRN Comment                        -- Print portfolio with Comment
#

Happy investing.

Copyright (c) Igor Chudov 1997. 

	ichudov at algebra.com
	http://www.algebra.com/~ichudov

GNU Copyright applies. There is NO WARRANTY WHATSOEVER. By using this
program you agree to indemnify and hold it author harmless from any
liabilities resulting in connection with your use of the program.

You are allowed to copy this program freely provided that the copyright 
notice remains intact.

*/
 
#include 
#include 
#include 
#include 
#include 
 
#define Money       double
#define StockTicker char *
#define Date        int
 
class Stock {
public:
   Stock( const StockTicker theTicker,
          int theQuantity = 0,
          Money theValue = 0.0 )
      : Ticker( strdup( theTicker ) ),
        Quantity( theQuantity ),
        Value( theValue )
        {
           // nothing
        }
 
   ~Stock( void ) { delete[] Ticker; }
   void  Purchase( int theQuantity )         { Quantity += theQuantity; }
   int   GetQuantity( void ) const           { return Quantity; };
   void  SetValue( Money theValue )          { Value = theValue; }
   Money GetValue( void ) const              { return Value; }
   const StockTicker GetTicker( void ) const { return Ticker; }
   void  Split( Money factor ) { Quantity *= factor, Value /= factor; }
private:
   Money Value;
   StockTicker Ticker;
   int Quantity;
};
 
typedef Stock * PStock;
 
class Portfolio {
public:
  Portfolio( void );
  ~Portfolio( void );
 
  // What can happen to the portfolios:
  // Add cash to the portfolio
  void Invest( Money Cash );
 
  // Purchase (or sell (even short) if Quantity is negative)
  void Purchase( const StockTicker Ticker, int Quantity, Money Value );
 
  // Dividend received, 1 success, 0 failure
  int Dividend( const StockTicker Ticker, Money DividendPerShare );
 
  // Split, factor is new # of shares to old # of shares, 1 success, 0 failure
  int Split( const StockTicker Ticker, Money factor );
 
  // Withdrawal
  void Withdraw( Money Amount );

  // Fee -- margin interest, commission etc
  void Fee( Money amount );
 
  // Change in Stock valuation
  int Valuation( StockTicker Ticker, Money theValue );
 
  /////////////////////////////
  // Equity = Cash + StockValue
  Money Equity( void ) const;
 
  Money EquityPerShare( void ) const { return Equity()/NumShares; }
 
  int GetNumShares( void ) const { return NumShares; }
 
  void Print( ostream & os, const char * comment = 0 );
 
protected:
 
  void Revaluate( void );
 
  int FindStock( const StockTicker Ticker );
 
private:
 
  Stock ** Stocks;
  int NumberStocks;
  int MaxNumberStocks;
  Money Return;
  Money LastDate;
  Money Cash;
  Money NumShares;
};
 
Portfolio::Portfolio( void )
   : NumberStocks( 0 ),
     MaxNumberStocks( 100 ),
     Cash( 0.0 ),
     NumShares( 0 ),
     Return( 0.0 ),
     LastDate( 0 )
{
   Stocks = new PStock[ MaxNumberStocks ];
}
 
Portfolio::~Portfolio( void )
{
   delete[] Stocks;
}
 
void Portfolio::Invest( Money theCash )
{
//cout << "investing " << theCash << endl;
 
   if( NumShares != 0 )
     {
       NumShares += theCash/EquityPerShare();
       Cash += theCash;
     }
   else
     {
       Cash = theCash;
       NumShares = Cash;
     }
}
 
 
void Portfolio::Withdraw( Money Amount )
{
   Invest( -Amount );
}
 
void Portfolio::Fee( Money Amount )
{
   Cash -= Amount;
}
 
int Portfolio::FindStock( const StockTicker Ticker )
{
  for( int i = 0; i < NumberStocks; i++ )
    if( !strcmp( Ticker, Stocks[i]->GetTicker() ) )
      {
        return i;
        break;
      }
  return -1;
}
 
void Portfolio::Purchase( const StockTicker Ticker,
                          int Quantity,
                          Money Value )
{
   int found = FindStock( Ticker );
 
   if( found == -1 ) // need to add a stock
     {
       if( NumberStocks == MaxNumberStocks ) // need to resize
         {
            Stock ** NewStocks = new PStock[ MaxNumberStocks * 2 ];
            memcpy( NewStocks, Stocks, sizeof( Stock ) * MaxNumberStocks );
            delete[] Stocks;
            Stocks = NewStocks;
            MaxNumberStocks *= 2;
         }
       found = NumberStocks++;
       Stocks[found] = new Stock( Ticker, Quantity, Value );
     }
   else
     {
        Stocks[found]->Purchase( Quantity );
        Stocks[found]->SetValue( Value );
     }
 
   Cash -= Quantity * Value;
}
 
int Portfolio::Dividend( const StockTicker Ticker, Money DividendPerShare )
{
  int found = FindStock( Ticker );
 
  if( found == -1 )
     return 0;
 
  Cash += DividendPerShare * Stocks[found]->GetQuantity();
}
 
int Portfolio::Split( const StockTicker Ticker, Money Factor )
{
  int found = FindStock( Ticker );
 
  if( found == -1 )
     return 0;
 
  Stocks[found]->Split( Factor );
}
 
 
int Portfolio::Valuation( StockTicker Ticker, Money theValue )
{
  int found = FindStock( Ticker );
  if( found == -1 )
     return 0; // failure
 
  Stocks[found]->SetValue( theValue );
 
  return 1; // success
}
 
 
Money Portfolio::Equity( void ) const
{
   Money e = Cash;
 
   for( int i =0; i < NumberStocks; i++ )
      e += Stocks[i]->GetQuantity() * Stocks[i]->GetValue();
 
   return e ;
}
 
void Portfolio::Print( ostream & os, const char * comment )
{
  os << endl << "Portfolio: " << (comment ? comment : "" ) << endl;
 
  for( int i = 0; i < NumberStocks; i++ )
     os << Stocks[i]->GetTicker() << " "
        << Stocks[i]->GetQuantity() << " "
        << Stocks[i]->GetValue() << ", Total = "
        << Stocks[i]->GetValue() * Stocks[i]->GetQuantity() << endl;
  os << "Cash: " << Cash << endl;
 
  cout << "Equity = " << Equity() << endl;
  cout << "Number of Shares = " << GetNumShares() << endl;
  cout << "Share Value = " << EquityPerShare() << endl;
}
 
void ReadHistory( Portfolio & portfolio, FILE * f )
{
   while( !feof( f ) )
     {
        char buf[2048];
        buf[0] = 0;
        fgets( buf, sizeof( buf ), f );
 
        //cout << buf;
        char * p = strchr( buf, '#' );
        if( p != 0 ) *p = 0;  // Comment #
 
        for( p = buf; *p; p++ ) *p = toupper( *p );
 
        if( !strncmp( buf, "INV", 3 ) )
         {
            //cout << "investing" << endl;
 
            float amount;
            if( sscanf( buf+4, "%f", &amount ) == 1 )
               portfolio.Invest( amount );
            else
               fprintf( stderr, "Invalid transaction: %s\n", buf );
         }
        else if( !strncmp( buf, "WDR", 3 ) )
         {
            float amount;
            if( sscanf( buf+4, "%f", &amount ) == 1 )
               portfolio.Invest( -amount );
            else
               fprintf( stderr, "Invalid transaction: %s\n", buf );
         }
        else if( !strncmp( buf, "PUR", 3 ) )
         {
            float price;
            int numshares;
            char ticker[2048];
 
            if( sscanf( buf+4, "%s %d %f", &ticker, &numshares, &price ) == 3 )
              portfolio.Purchase( ticker, numshares, price );
            else
              fprintf( stderr, "Invalid transaction: %s\n", buf );
         }
        else if( !strncmp( buf, "FEE", 3 ) )
         {
            float amount;
 
            if( sscanf( buf+4, "%f", &amount ) == 1 )
              portfolio.Fee( amount );
            else
              fprintf( stderr, "Invalid transaction: %s\n", buf );
         }
        else if( !strncmp( buf, "SAL", 3 ) )
         {
            float price;
            int numshares;
            char ticker[2048];
 
            if( sscanf( buf+4, "%s %d %f", &ticker, &numshares, &price ) == 3 )
              portfolio.Purchase( ticker, -numshares, price );
            else
              fprintf( stderr, "Invalid transaction: %s\n", buf );
         }
        else if( !strncmp( buf, "DIV", 3 ) )
         {
            float div;
            char ticker[2048];
            if( sscanf( buf+4, "%s %f", &ticker, &div ) == 2 )
              portfolio.Dividend( ticker, div );
            else
              fprintf( stderr, "Invalid transaction: %s\n", buf );
         }
        else if( !strncmp( buf, "VAL", 3 ) )
         {
            float val;
            char ticker[2048];
            if( sscanf( buf+4, "%s %f", &ticker, &val ) == 2 )
              portfolio.Valuation( ticker, val );
            else
              fprintf( stderr, "Invalid transaction: %s\n", buf );
         }
        else if( !strncmp( buf, "SPL", 3 ) )
         {
            float factor;
            char ticker[2048];
            if( sscanf( buf+4, "%s %f", &ticker, &factor ) == 2 )
              portfolio.Split( ticker, factor );
            else
              fprintf( stderr, "Invalid transaction: %s\n", buf );
         }
        else if( !strncmp( buf, "PRN", 3 ) )
         {
              portfolio.Print( cout, buf + 4 );
         }
     }
}
 
int main( int argc, char *argv[] )
{
   Portfolio portfolio;
 
   FILE * input;
   if( argc >= 2 )
   {
      if( (input = fopen( argv[1], "r" )) == 0 )
      {
         fprintf( stderr, "Can't open %s.\n"
               "Usage: %s activity-file TICK=val TICK1=val ...\n",
               argv[1], argv[0] );
         exit( 1 );
      }
   }
   else
   {
      input = stdin;
   }

   ReadHistory( portfolio, input );
 
   for( argc--; argc > 1; argc-- )
      // process arguments of form "TICKER=value"
     {
       char buf[ 2048 ];
       strcpy( buf, argv[argc] );

       for( char * p = buf; *p; p++ ) *p = toupper( *p );
 
       char * pvalue = strchr( buf, '=' );
 
       if( pvalue == 0 )
         {
           cerr << "Wrong argument: " << argv[argc]
                << ". Must be of form TICKER=value" << endl;
           continue;
         }
 
       *pvalue++=0;
 
       float value;
 
       if( sscanf( pvalue, "%f", &value ) != 1 )
       {
          cerr << "Wrong argument: " << argv[argc]
               << ". Must be of form TICKER=value" << endl;
          continue;
       }
 
       if( !portfolio.Valuation( buf, value ) )
       {
          cerr << "Ticker " << buf << " not found in the portfolio!" << endl;
       }
     }
 
   portfolio.Print( cout, "Final Result" );
 
   printf( "\n\n"
"Copyright (C) Igor Chudov, ichudov at algebra.com,\n"
"	http://www.algebra.com/~ichudov\n\n"
"No warranty is provided with this free program. GNU Copyright applies.\n" );

}





From betty at infowar.com  Mon Feb 23 20:56:26 1998
From: betty at infowar.com (Betty G.O'Hearn)
Date: Mon, 23 Feb 1998 20:56:26 -0800 (PST)
Subject: IRC CHAT  Terrorism and Desert Thunder
Message-ID: <3.0.3.32.19980223235855.02f99cd0@mail.infowar.com>

A non-text attachment was scrubbed...
Name: not available
Type: text/enriched
Size: 705 bytes
Desc: not available
URL: 

From whgiii at invweb.net  Tue Feb 24 03:04:15 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Tue, 24 Feb 1998 03:04:15 -0800 (PST)
Subject: Five industry giants propose encryption plan to protect Hollywood
In-Reply-To: <34F21246.7B6B00A8@brainlink.com>
Message-ID: <199802241137.GAA12838@users.invweb.net>

In <34F21246.7B6B00A8 at brainlink.com>, on 02/23/98 
   at 07:20 PM, sunder  said:

>Oh please.  You could always (for computers anyway) write your own
>drivers for video cards and sound cards that not only display stuff, but
>also save it to a hard drive as it's being recieved.  Whoop!

Well sitting down and writting a device driver is above and beyond the
ability of the average WinBlows user. More than likely it is above and
beyond the average "programmer" (ASM what's that??). M$ is already playing
around with using crypto and only allowing signed programs to run under
their OS (Crypto API, Active-X) it is not hard to imagine that they could
have the new version of their OS only allow device drivers that have been
approved and signed by microsoft (when you control +90% of the market you
can get away with silly shit like this).


> >   >   Date: Thu, 19 Feb 1998 11:13:50 -0800 (PST)
>> >   >   From: William Knowles 
>> >   >
>> >   >   BURBANK, Calif. (February 19, 1998 09:06 a.m. EST
>> >   >   http://www.nando.net) -- Five computer and electronics industry
>> >giants
>> >   >   have agreed on a strategy to prevent people from illegally copying
>> >   >   digital movies and music, the Los Angeles Times reported Thursday.
>> >   >
>> >   >   According to the proposal, high-definition TV sets, personal

>> Well I have gone over this in previous posts that right's management
>> woun't work against the bootlegers as at some time you have to display the
>> raw data to the user. what it will to is make things that much harder for
>> the average user.

>Exactly, it will probably require the average user to get involved in
>weird type in the 5th word of the 6th paragraph on page 60 in volume 6 of
>your  book and your ssn and your 3rd daughter's birth hour to display. 
>But once displayed... it's yours.  Shit, things like Lotus ScreenCam can
>grab anything displayed on screen.

Yes but I wouldn't want to use ScreenCam to copy a 100 page document. My
point was it would not make it impossible to copy the data just that it
would raise the "threshold of pain" above what the average user is willing
to endure.

-- 
---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
---------------------------------------------------------------
 
Tag-O-Matic: OS/2, Windows/0

-------------- next part --------------
A non-text attachment was scrubbed...
Name: pgp00001.pgp
Type: application/octet-stream
Size: 339 bytes
Desc: "PGP signature"
URL: 

From wrb at hotmail.com  Tue Feb 24 05:28:42 1998
From: wrb at hotmail.com (William R. Butler)
Date: Tue, 24 Feb 1998 05:28:42 -0800 (PST)
Subject: Valentine Suprise
Message-ID: <19980224132805.19244.qmail@hotmail.com>


FUCK-OFF!!!!!!!!!!!!!!!!
************************

----Original Message Follows----
From: celeste at seeme.net
Date: Mon, 23 Feb 1998 17:57:41 -0800 (PST)
To: 
Subject: Valentine Suprise
Reply-To: celeste at seeme.com


Me and my friends are so lonely!! 
I wish that you would come and see me. 
With Valentines day coming I don't want to be alone. 
I will do anything to make you happy, 
if you want me to I'll even invite a friend over to join us.  
Just PLEASE don't let me be alone!  
I'll be awaiting for you every night.
I'll be at: http://www.cyber-fantasy.com/



______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com





From amaret at infomaniak.ch  Tue Feb 24 05:52:11 1998
From: amaret at infomaniak.ch (Alexandre Maret)
Date: Tue, 24 Feb 1998 05:52:11 -0800 (PST)
Subject: return.C -- performance tracking tool (fwd)
In-Reply-To: <199802240424.WAA21282@manifold.algebra.com>
Message-ID: <34F2CF5D.8276D7FB@infomaniak.ch>


Igor Chudov @ home wrote:
> 
> I have been using this program for a while and decided to share it
> with the other readers. It is written in C++.

this is not a financial mailing list.
and this code is not C++... it just needs a C++ compiler to
compile. real C++ code doesn't use fprintf, scanf, nor strcmp...

$0.02

  alx






From whgiii at invweb.net  Tue Feb 24 06:04:12 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Tue, 24 Feb 1998 06:04:12 -0800 (PST)
Subject: return.C -- performance tracking tool (fwd)
In-Reply-To: <34F2CF5D.8276D7FB@infomaniak.ch>
Message-ID: <199802241436.JAA14156@users.invweb.net>

In <34F2CF5D.8276D7FB at infomaniak.ch>, on 02/24/98 
   at 02:47 PM, Alexandre Maret  said:

>Igor Chudov @ home wrote:
>> 
>> I have been using this program for a while and decided to share it
>> with the other readers. It is written in C++.

>this is not a financial mailing list.
>and this code is not C++... it just needs a C++ compiler to
>compile. real C++ code doesn't use fprintf, scanf, nor strcmp...

Let's not forget that *real* C++ apps are bloated several time that of
comparable C apps (god forbid anyone write some tight ASM code).

$1.00 <== Inflation

-- 
---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
---------------------------------------------------------------
 
Tag-O-Matic: Get OS/2 - the best Windows tip around!

-------------- next part --------------
A non-text attachment was scrubbed...
Name: pgp00002.pgp
Type: application/octet-stream
Size: 339 bytes
Desc: "PGP signature"
URL: 

From canthony at info-nation.com  Tue Feb 24 06:04:33 1998
From: canthony at info-nation.com (Charles Anthony)
Date: Tue, 24 Feb 1998 06:04:33 -0800 (PST)
Subject: In todays CyberTimes--"European Study Paints a Chilling  Portrai
Message-ID: <199802241404.IAA16583@bitstream.net>


FYI - In today's CyberTimes:


"European Study Paints a Chilling  Portrait of Technology's 
Uses"

By BRUNO GIUSSANI

" A massive telecommunications interception network
 operates within Europe and, according to a new
 study circulating on the Internet, "targets the telephone, 
fax   and e-mail messages of private citizens, politicians, 
trade unionists and companies alike." 


The article can be found at:

http://www.nytimes.com/library/cyber/euro/022498euro.html









From guy at panix.com  Tue Feb 24 07:00:49 1998
From: guy at panix.com (Information Security)
Date: Tue, 24 Feb 1998 07:00:49 -0800 (PST)
Subject: In todays CyberTimes--"European Study Paints a Chilling  Portrai
Message-ID: <199802241500.KAA14055@panix2.panix.com>


   >   From: "Charles Anthony" 
   >   The article can be found at:
   >
   >   http://www.nytimes.com/library/cyber/euro/022498euro.html

   "The network, dubbed Echelon, is described in a new study
    by the European Parliament titled

       'An Appraisal of Technologies of Political Control.'" 


It's high time Don Mclean (sic) or someone took the
extensive documentation collected in the Cryptography
Manifesto regarding this, which includes massive USA domestic
spying, and started writing news stories about it, and
get other news organizations interested in the questions
raised. Questions to be put to Senators.

Why?

Because it is ECHELON, not pedophiles, not drug dealers,
that is not only the hold-up for freely exportable
software, but also for why the FBI has openly moved
to regulate all domestic cryptography into oblivion.

The story of massive spying is one "the American people"
can understand. Cryptography is too distant.

Go for it, someone, please.
---guy

   No one listens to me.





From melder at descartes.coker.edu  Tue Feb 24 07:03:00 1998
From: melder at descartes.coker.edu (Michael Elder)
Date: Tue, 24 Feb 1998 07:03:00 -0800 (PST)
Subject: DDJ Crypto CD has arrived!
In-Reply-To: <34F252DA.652A@ziplink.net>
Message-ID: <3.0.5.32.19980224095821.007c1940@descartes.coker.edu>


trei at ziplink.net wrote:

>>Applied Cryptography: Protocols, Algorithms, and Source Code in C,
>Second Edition, by Bruce Schneier. Copyright  1995, John Wiley & Sons,
>Inc. All rights reserved.
>For those wondering: Applied Cryptography includes the source code
>appendix. I have not checked if it has the 5th printing corrections.

Just a little note of interest, AC is currently in its sixth printing. I
just got it last week.

-E.








From melder at descartes.coker.edu  Tue Feb 24 07:05:30 1998
From: melder at descartes.coker.edu (Michael Elder)
Date: Tue, 24 Feb 1998 07:05:30 -0800 (PST)
Subject: Valentine Suprise
In-Reply-To: <19980224132805.19244.qmail@hotmail.com>
Message-ID: <3.0.5.32.19980224100046.007bf100@descartes.coker.edu>


At 05:28 AM 2/24/98 PST, William R. Butler wrote:
>FUCK-OFF!!!!!!!!!!!!!!!!
>************************

...

>Me and my friends are so lonely!! 
>I wish that you would come and see me. 
>With Valentines day coming I don't want to be alone. 
>I will do anything to make you happy, 
>if you want me to I'll even invite a friend over to join us.  
>Just PLEASE don't let me be alone!  
>I'll be awaiting for you every night.
>I'll be at: http://www.cyber-fantasy.com/
>

I think that was the point of the advertisement d=]

-E.








From whgiii at invweb.net  Tue Feb 24 07:27:09 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Tue, 24 Feb 1998 07:27:09 -0800 (PST)
Subject: In todays CyberTimes--"European Study Paints a Chilling  Portrai
In-Reply-To: <199802241500.KAA14055@panix2.panix.com>
Message-ID: <199802241600.LAA14937@users.invweb.net>

In <199802241500.KAA14055 at panix2.panix.com>, on 02/24/98 
   at 10:00 AM, Information Security  said:

>   "The network, dubbed Echelon, is described in a new study
>    by the European Parliament titled

>       'An Appraisal of Technologies of Political Control.'" 


>It's high time Don Mclean (sic) or someone took the
>extensive documentation collected in the Cryptography
>Manifesto regarding this, which includes massive USA domestic spying, and
>started writing news stories about it, and
>get other news organizations interested in the questions
>raised. Questions to be put to Senators.

>Why?

>Because it is ECHELON, not pedophiles, not drug dealers,
>that is not only the hold-up for freely exportable
>software, but also for why the FBI has openly moved
>to regulate all domestic cryptography into oblivion.

>The story of massive spying is one "the American people"
>can understand. Cryptography is too distant.

>Go for it, someone, please.

The sheeple don't care.

The sheeple are well aware of the abuses of power by our government and
they don't care nor have they cared for a long time. So long as they have
a roof over their heads, cloths on their back, a color TV and their
microwave dinners they are willing to let the government do whatever they
want.

Where was the great outcry by the people when the government blatantly
covered up the assassination of JFK with the Warren Commission?

Where was the great outcry by the people with the numerous atrocities
committed by the FBI,CIA,BATF, ...?

Where was the great outcry by the people over the coverup of the murder of
Vince Foster?

Where was the great outcry by the people over the murder of innocent
children at Waco?

They just don't care and this report woun't be so much as a blip on the
radar screen. The Feds will just wrap this up in the cover of fighting the
four horsemen and it will be business as usual.

-- 
---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
---------------------------------------------------------------
 
Tag-O-Matic: Why look thru Windows? Open the door to the future: OS/2

-------------- next part --------------
A non-text attachment was scrubbed...
Name: pgp00003.pgp
Type: application/octet-stream
Size: 339 bytes
Desc: "PGP signature"
URL: 

From fulfill at mail.mcafee.com  Tue Feb 24 07:35:30 1998
From: fulfill at mail.mcafee.com (Mike Stone - McAfee Fulfillment)
Date: Tue, 24 Feb 1998 07:35:30 -0800 (PST)
Subject: McAfee Special Offer
Message-ID: <199802241531.HAA03776@mail.mcafee.com>



Hello again.

I know, I have already e-mailed you once.  But I wanted to follow up 
with you;  you visited our web site in the past and I responded to 
give us a call regarding our Special Pricing.  Your 30 day evaluation 
period has ended and by licensing VirusScan you can continue up-to-date
protection from the over 15,000 viruses including the 250 new viruses 
that appear each month alone!  Give us a call and we can set you up to 
continue your protection.  We can quote you a SPECIAL PRICE on VirusScan 
and even have a special 50% off offer for Nuts & Bolts which recovers 
lost drives and files, optimizes your pc, fixes glitches, and enables
your computer  to operate at peak speed!

Send sensitive information at work or over the net? - We now offer
PGP Encryption software to secure you data, ask us about it today!

This promotion is going to end on February 27th.   I would hate for you to 
miss out.  I'm not the only one at our phones here (800-338-8754 x2225), 
so if you already took us up on it, I'd like to add, "Thanks!!" and 
I hope you enjoy the product! 

This offer limited to USA & Canada

Sincerely,
Mike Stone
Mike_Stone at cc.mcafee.com





From guy at panix.com  Tue Feb 24 07:43:55 1998
From: guy at panix.com (Information Security)
Date: Tue, 24 Feb 1998 07:43:55 -0800 (PST)
Subject: Fight ECHELON while the topic is hot!
Message-ID: <199802241543.KAA18074@panix2.panix.com>


   >   From: "William H. Geiger III" 
   >   Date: Tue, 24 Feb 98 09:16:29 -0500
   >   
   >   >It's high time Don Mclean (sic) or someone took the
   >   >extensive documentation collected in the Cryptography
   >   >Manifesto regarding this, which includes massive USA domestic spying, and
   >   >started writing news stories about it, and
   >   >get other news organizations interested in the questions
   >   >raised. Questions to be put to Senators.
   >   
   >   >Why?
   >   
   >   >Because it is ECHELON, not pedophiles, not drug dealers,
   >   >that is not only the hold-up for freely exportable
   >   >software, but also for why the FBI has openly moved
   >   >to regulate all domestic cryptography into oblivion.
   >   
   >   >The story of massive spying is one "the American people"
   >   >can understand. Cryptography is too distant.
   >   
   >   >Go for it, someone, please.
   >   
   >   The sheeple don't care.
   >   
   >   The sheeple are well aware of the abuses of power by our government and
   >   they don't care nor have they cared for a long time. So long as they have
   >   a roof over their heads, cloths on their back, a color TV and their
   >   microwave dinners they are willing to let the government do whatever they
   >   want.

Whooey!

I'd say a number of senior people on this list are burnt
out fighting the good fight.

Did the government at least acknowledge it fucked up
in the Weaver case to the tune of $3.1 million?

Didn't the person in charge, who Freeh promoted to
second-in-command at the FBI, have his career destroyed?

Didn't the government finally back down on their
attempt to legally kill the Unabomber?

Didn't the Pentagon Papers make it out?

Isn't ECHELON documented by person after person,
including someone formerly in DOJ with top-secret
clearance?

Go for it!

It is *you* who are advocating being a "sheeple"!!!
---guy

   Shame on you.





From whgiii at invweb.net  Tue Feb 24 08:15:22 1998
From: whgiii at invweb.net (William H. Geiger III)
Date: Tue, 24 Feb 1998 08:15:22 -0800 (PST)
Subject: Fight ECHELON while the topic is hot!
In-Reply-To: <199802241543.KAA18074@panix2.panix.com>
Message-ID: <199802241648.LAA15368@users.invweb.net>

In <199802241543.KAA18074 at panix2.panix.com>, on 02/24/98 
   at 10:43 AM, Information Security  said:

>Whooey!

>I'd say a number of senior people on this list are burnt
>out fighting the good fight.

>Did the government at least acknowledge it fucked up
>in the Weaver case to the tune of $3.1 million?

Nope, as a matter of fact the Administration was just arguing before the
SC that the murders in this case should not be held accountable.

>Didn't the person in charge, who Freeh promoted to
>second-in-command at the FBI, have his career destroyed?

One scapegoat and the organization goes on, business as usual. When I see
a 100,000 citizens storm the J.E.Hoover Building and drag that ratbastard
Freeh out by his heals then come back and tell us what a difference you
have made.

>Didn't the government finally back down on their
>attempt to legally kill the Unabomber?

So what? IMHO he should have been fried. Hell I'll even pay for the plane
ticket for him to come down here and meet 'ol sparky. :)

>Didn't the Pentagon Papers make it out?

What did it change? NOTHING

>Isn't ECHELON documented by person after person,
>including someone formerly in DOJ with top-secret
>clearance?

>Go for it!

>It is *you* who are advocating being a "sheeple"!!!

No not at all I just don't have any pie-in-the-sky daydreams that it will
mean squat! I have better things to do with my time than dealing with a
news media who's highest goal is to sell more tampons and toilet paper to
the sheeple.

-- 
---------------------------------------------------------------
William H. Geiger III  http://users.invweb.net/~whgiii
Geiger Consulting    Cooking With Warp 4.0

Author of E-Secure - PGP Front End for MR/2 Ice
PGP & MR/2 the only way for secure e-mail.
OS/2 PGP 2.6.3a at: http://users.invweb.net/~whgiii/pgpmr2.html                        
---------------------------------------------------------------
 
Tag-O-Matic: Windws is ine for bckgroun comunicaions

-------------- next part --------------
A non-text attachment was scrubbed...
Name: pgp00004.pgp
Type: application/octet-stream
Size: 339 bytes
Desc: "PGP signature"
URL: 

From guy at panix.com  Tue Feb 24 08:22:21 1998
From: guy at panix.com (Information Security)
Date: Tue, 24 Feb 1998 08:22:21 -0800 (PST)
Subject: Fight ECHELON while the topic is hot!
Message-ID: <199802241622.LAA21768@panix2.panix.com>


   >   From whgiii at invweb.net Tue Feb 24 11:15:11 1998
   >   
   >   >It is *you* who are advocating being a "sheeple"!!!
   >   
   >   No not at all I just don't have any pie-in-the-sky daydreams that it will
   >   mean squat! I have better things to do with my time than dealing with a
   >   news media who's highest goal is to sell more tampons and toilet paper to
   >   the sheeple.

I said to go for it and *try* for results.

If you want to act like a disgruntled old Andy Rooney and
say "it won't make any difference", fine, but why drag
down everyone else?

The EU, not just anybody, but the EU, is talking
about massive NSA spying via ECHELON!
---guy

   Turn up the heat.





From guy at panix.com  Tue Feb 24 08:24:30 1998
From: guy at panix.com (Information Security)
Date: Tue, 24 Feb 1998 08:24:30 -0800 (PST)
Subject: Cypherpunk Policeman?
Message-ID: <199802241624.LAA22146@panix2.panix.com>


Guy wrote:
>  Has 'cypherpunks at cyberpass.net' replaced 'cypherpunks at toad.com'?

Apparently it hasn't, because I never got a copy of my own post back.

So, here it is again...


   >   From aba at dcs.ex.ac.uk Mon Feb 23 16:26:58 1998
   >   
   >   Guy  claims that he managed to persuade PSInet (who
   >   Dimitri used as his ISP) to pull his plug.

Leaving him with full access to a minimum of three other accounts.

   Don't cry for him, Ukrainia...

   >   I'd just like to feed back to Guy that I think this is uncool, and
   >   that it is counter productive.

Hey, maybe _you_ would get a warm and fuzzy feeling when
Dimitry posts a death threat (including to this list) and
signs your name: not me.

!   I will gladly pay the $50,000 (canadian) reward to whomever KILLS
!   Chris Lewis and his family, who reside in a suburb of Ottawa.
!   I'm putting the notice of the CAUCE reward on http://www.panix.com/~guy
!   ---guy

   >   Guy, you may not have hit it off with Dimitri, but this is no reason
   >   to go attempting to censor people.  Ever heard of a kill file?  

Censor?

Yeah, and the "Freedom Fighters" who are against any spam cancellation
do so because they are fighting "censorship".

I don't think so.

   >   As an aside I don't think getting into a dirty tricks contest with
   >   Dimitri is a good idea, I am pretty sure Dimitri could win by a large
   >   margin if he cared to.

No dirty tricks involved: I complained to PSINet using traffic analysis.

If he had simply called me a cocksucker, I would not have complained.

   >   Guy  writes:
   >   > PSINet terminated Vulis for stalking, which I documented he did to a
   >   > minimum of four people.
   >   
   >   What is your working definition of stalking as applied to a mailing
   >   list, USENET or email?  What are you talking about?

In addition to death threats, forging death threats: he tries to get
people fired from their jobs.

But Dimitry can't figure out where I work (MUHAHAHAHAHAHAHA), reducing
him to saying I was fired from where I _used to_ work.



This stalking: attempting to deprive someone of their right to work.


----


   >   From tcmay at got.net Mon Feb 23 17:14:50 1998
   >   
   >   At 1:24 PM -0800 2/23/98, Adam Back wrote:
   >   >Guy  claims that he managed to persuade PSInet (who
   >   >Dimitri used as his ISP) to pull his plug.
   >   >
   >   >I'd just like to feed back to Guy that I think this is uncool, and
   >   >that it is counter productive.
   >   >
   >   >Guy, you may not have hit it off with Dimitri, but this is no reason
   >   >to go attempting to censor people.  Ever heard of a kill file?
   >   
   >   I agree with Adam. As one who has borne a frontal assault of Vulis' insults
   >   and raves, and (in all probability his) ASCII artwork, I dealt with it by
   >   filtering as much of it as I could into a trash file.

Oh, great, an independently wealthy person is telling me it's not a problem
that a known stalker has posted angrily to this list asking if anyone knows
where I work.

   >   In my 10 years of actively being on the Net (though my first ARPANet
   >   account was in 1973), I've complained a handful of times to postmasters,
   >   and only _once_ because of content. The rest were about spam, mail bombs,
   >   etc.
   >   
   >   The one content-based complaint I made was about Lawrence Detweiler's
   >   attachment of my name to pro-Hitler, anti-Jewish rants he sent to
   >   newsgroups like alt.culture.jewish and alt.culture.german.

Then please explain why you agree with Adam, since I decided to complain
to PSINet about Vulis stalking me and signing my name to death threats?

   >   If Vulis can have his account yanked for calling Guy a pedophile, what
   >   about all those who have called Arthur C. Clarke a pedophile?
   >   
   >   Has there been any determination (and what does that mean anyway?) as to
   >   whether either Guy or Clarke are pedophiles?

Ahhh, that's the wrong question. Look past your nose.

Calling me a pedophile is one part of Vulis' patented style of stalking
attacks. Add to that him saying I was fired from consulting work for
being a pedophile, asking if anyone knows where I now work, etc: stalking.

It wasn't merely him being insulting, but part of a larger
Simon-Barr-Sinister pattern of behavior.

Certain behavior is not permissible regardless of the venue.

Not a direct analogy, but: you would censor (CENSOR! CENSOR!) people
who work for you who wanted to speak "Ebonics" on the job.

Gosh, how dare you deprive them of their right to free speech!.


----


   >   From aba at dcs.ex.ac.uk Mon Feb 23 21:35:47 1998
   >   
   >   John Young  writes:
   >   > Since Guy's death notice Dimitri's telephone has not answered
   >   > several tries. The number of his sig: 1-718-261-2013, in Brooklyn
   >   > across floater bay from here.
   >   > 
   >   > Was he whacked as well as unplugged? Or is he hiding from the
   >   > peds, plotting anthrax terror posing as Jim Kallstrom?
   >   
   >   OK, Guy, could you fill us in on what exactly you did to get PSInet to
   >   pull Dimitri's plug?

Exactly what I said: I submitted traffic analysis reports ("the big picture")
regarding Vulis' stalking activity via PSINet to their legal people.

I have previously posted to this list a dejanews URL for an early
traffic analysis report on him that I posted to Usenet.

It was like that, only more complete and specifically oriented towards
getting him spanked.

   >   Did it involve calls to law enforcement?

No.

He used an anonymous remailer for the death threat.

His personal stalking of me didn't get far before I blew him off PSINet.

I'm sure he's learned his lesson. ;-)

He's still here, but sulking silently. He's run out of dirty tricks.

   >   Is it likely that your claims would have been relayed by PSI to law
   >   enforcement?

Oh, I _wish_ I had that kind of influence.

Of course, in the Cryptography Manifesto polemic, I have said not-nice
things about law enforcement, as part of complaining about Key Recovery
and the general Orwellian state of affairs.

Guy's CM: Louis Freeh is a Scary Man with the morals of a styrofoam cup.

On the other hand, I do believe most FBI personnel are good people
who perform an invaluable service for all of us.

Guy's CM: This posting isn't about the many good FBI and other law enforcement people.

Gee, could I do a better job of offending both "sides"? ;-)


   >   If you have taken this far enough to get Dimitri into legal trouble,
   >   and your claims are untrue, or exaggerated, I think you owe it to
   >   Dimitri to try to undo some of this stuff fast!

Hell.

Freeze.

Over.

   >   What did you tell PSInet?

I documented his stalking behavior via PSINet, documented that he
had begun stalking me via PSINet, and stated that if they didn't
terminate him and he continued stalking me, I would sue them.

And that the traffic analysis report they were holding was
what a jury would use to decide PSINet was liable for their
continued (after _years_ of people's complaints) inaction.
---guy

    With Vulis, the best defense is a good offense.





From anon at anon.efga.org  Tue Feb 24 08:43:41 1998
From: anon at anon.efga.org (Anonymous)
Date: Tue, 24 Feb 1998 08:43:41 -0800 (PST)
Subject: No Subject
Message-ID: <95792e88678c7034939f0d6dcc5a10ed@anon.efga.org>


Michael Elder wrote:
> 
> trei at ziplink.net wrote:
> 
> >>Applied Cryptography: Protocols, Algorithms, and Source Code in C,
> >Second Edition, by Bruce Schneier. Copyright  1995, John Wiley & Sons,
> >Inc. All rights reserved.
> >For those wondering: Applied Cryptography includes the source code
> >appendix. I have not checked if it has the 5th printing corrections.
> 
> Just a little note of interest, AC is currently in its sixth printing. I
> just got it last week.
> 
> -E.

I noticed the sixth printing in Barnes and Noble 2 weeks ago. I didn't 
have too long to peruse thru it... Are there any big error corrections/
other reasons to pay any close attention to the new printing?
-Anon






From wrb at hotmail.com  Tue Feb 24 08:44:35 1998
From: wrb at hotmail.com (William R. Butler)
Date: Tue, 24 Feb 1998 08:44:35 -0800 (PST)
Subject: Valentine Suprise
Message-ID: <19980224164402.8312.qmail@hotmail.com>


Yes you are prob. right but I do get a little burned about it in my mail 
all the time.

----Original Message Follows----
Date: Tue, 24 Feb 1998 10:00:46 -0500
To: "William R. Butler" 
From: Michael Elder 
Subject: Re: Valentine Suprise
Cc: cypherpunks at toad.com,celeste at seeme.com

At 05:28 AM 2/24/98 PST, William R. Butler wrote:
>FUCK-OFF!!!!!!!!!!!!!!!!
>************************

...

>Me and my friends are so lonely!! 
>I wish that you would come and see me. 
>With Valentines day coming I don't want to be alone. 
>I will do anything to make you happy, 
>if you want me to I'll even invite a friend over to join us.  
>Just PLEASE don't let me be alone!  
>I'll be awaiting for you every night.
>I'll be at: http://www.cyber-fantasy.com/
>

I think that was the point of the advertisement d=]

-E.






______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com





From guy at panix.com  Tue Feb 24 08:58:46 1998
From: guy at panix.com (Information Security)
Date: Tue, 24 Feb 1998 08:58:46 -0800 (PST)
Subject: Pentagon Papers
Message-ID: <199802241658.LAA25785@panix2.panix.com>


   >   From William "Grumpy-pie" Geiger III Tue Feb 24 11:46:52 1998
   >   
   >   >Didn't the Pentagon Papers make it out?
   >   
   >   What did it change? NOTHING

My vague understanding of the matter is that
it was an important US Supreme Court case
involving free speech and prior restraint
thereof.

---guy





From melder at descartes.coker.edu  Tue Feb 24 09:45:12 1998
From: melder at descartes.coker.edu (Michael Elder)
Date: Tue, 24 Feb 1998 09:45:12 -0800 (PST)
Subject: 
In-Reply-To: <95792e88678c7034939f0d6dcc5a10ed@anon.efga.org>
Message-ID: <3.0.2.32.19980224123918.006ad548@descartes.coker.edu>


At 11:48 AM 2/24/98 -0500, Anonymous wrote:

>
>I noticed the sixth printing in Barnes and Noble 2 weeks ago. I didn't 
>have too long to peruse thru it... Are there any big error corrections/
>other reasons to pay any close attention to the new printing?
>-Anon

I just got it as of Sunday. I had to special order it because none of the
book stores I went to had it. Not even B & N. So far I haven't had much of
a chance to look through it.

-E.








From guy at panix.com  Tue Feb 24 12:16:46 1998
From: guy at panix.com (Information Security)
Date: Tue, 24 Feb 1998 12:16:46 -0800 (PST)
Subject: Cypherpunk Policeman?
Message-ID: <199802242015.PAA16794@panix2.panix.com>


   >   From aba at dcs.ex.ac.uk Tue Feb 24 14:56:22 1998
   >   
   >   Guy  writes:
   >   
   >   > Has 'cypherpunks at cyberpass.net' replaced 'cypherpunks at toad.com'?
   >   
   >   Er, yes, some time ago now.  cypherpunks at toad.com is no longer, and
   >   that mail to it gets through is just that toad.com feeds what it gets
   >   back to cyberpass.net.  The others replacements are algebra.com, and
   >   ssz.com.

Well, toad.com should stop accepting subscription requests.

   >   You said elsewhere in your expose your claim that Dimitri forged posts
   >   as from you that he used a remailer.  So how can you have traffic
   >   analysis showing that it was him, and secondly how do you know it even
   >   was him.

Because he posted under his own name ~"Chris Lewis should die", etc, and it
matches up with the death threat. He is massively on record in his own
name for stalking Chris Lewis, and contacting Chris Lewis at the same
address.

It was good enough for legal counsel.

---guy

   Plus the easily documented job-stalking of various people.





From proff at iq.org  Tue Feb 24 12:20:41 1998
From: proff at iq.org (Julian Assange)
Date: Tue, 24 Feb 1998 12:20:41 -0800 (PST)
Subject: Fight ECHELON while the topic is hot!
In-Reply-To: <199802241648.LAA15368@users.invweb.net>
Message-ID: 


"William H. Geiger III"  writes:

> No not at all I just don't have any pie-in-the-sky daydreams that it will
> mean squat! I have better things to do with my time than dealing with a

Please, please go do better things.

Cheers,
Julian.





From sunder at brainlink.com  Tue Feb 24 12:55:03 1998
From: sunder at brainlink.com (sunder)
Date: Tue, 24 Feb 1998 12:55:03 -0800 (PST)
Subject: [Q: Information on PhD Cryptography Classes]
Message-ID: <34F332B8.C15DAD56@brainlink.com>

I got this request sent to me directly.  If you have info for this person
please reply directly to: balakrik at goldey.gbc.edu.

To: SUNDER at brainlink.com
Subject: Information on Cryptography
From: Karthik Balakrishnan 
Date: Tue, 24 Feb 1998 11:45:26 -0500

To introduce myself, I am Karthik Balakrishnan, a senior majoring in
 Computer Information Systems. I should be graduating at the end of th
 Fall semester.
 I am planning to pursue my Master's in Cryptography, probably try for
 PhD program.
 I would really appretiate your help in guiding me through this proces
 by giving me some advice on this, as to which schools offer a PhD in
 this field, the schools that you recommend, and how to go about this
 process.
 
 My e-mail address is : balakrik at goldey,gbc.edu
 Thank you very much.





From guy at panix.com  Tue Feb 24 13:29:28 1998
From: guy at panix.com (Information Security)
Date: Tue, 24 Feb 1998 13:29:28 -0800 (PST)
Subject: Cypherpunk Policeman?
Message-ID: <199802242129.QAA24166@panix2.panix.com>


   >   From jya at pipeline.com Tue Feb 24 16:06:28 1998
   >   
   >   Guy,
   >   
   >   Without defending Dimitri's actions I'd like to check that
   >   he's not suffered a Jim Bell snatch, perhaps unrelated
   >   to your complaint.

PSINet snatcheroo?

That's getting tough on complaints. ;-)

I've only submitted a complaint to PSINet so far.

Haven't gotten around to Altopia.

I do actually work for a living, despite Vulis' claims.

He posted from 'cj3 at alt.net' _after_ being terminated from PSINet.

   >   He's not answered his phone since
   >   you announced the unplug, nor answered e-mail (to dm.com,
   >   which is no longer active).
   >   
   >   Do you have any info on who I could contact for leads?
   >   Or can you refer this to someone who does? I've only got 
   >   the phone number listed in his sig.

Whois gives his number as:

   Billing Contact:
      Vulis, Dimitri  (DV1010)  dlv at DM.COM
      718-261-6839

   >   BTW, I'm in Manhattan. Vox: 212-873-8700.

Ain't it great here in NYC, Third Planet From the Sun?

You could always go over and knock on his door.

I hear he posted a picture of himself to the Net in 1992,
and that "he looked dorky, and his wife fat".

Hey, Vulis is probably looking for a real job.

Maybe he's finally found one.

I can hear him saying:

   "Would you like fries with that?"

---guy





From aba at dcs.ex.ac.uk  Tue Feb 24 15:55:51 1998
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Tue, 24 Feb 1998 15:55:51 -0800 (PST)
Subject: Cypherpunk Policeman?
In-Reply-To: <199802242129.QAA24166@panix2.panix.com>
Message-ID: <199802242348.XAA00716@server.eternity.org>



Guy writes :
> He posted from 'cj3 at alt.net' _after_ being terminated from PSINet.

You sure?  I mean it could as easily as not been someone spoofing him,
what with the various anonymous mails, etc., that you reported.

> Hey, Vulis is probably looking for a real job.
> 
> Maybe he's finally found one.

I hear he already had one: he's a lecturer at a University in new york
(not sure of names of NY universitys), unless your actions lead
indirectly to his contract being terminated.

Adam





From ichudov at algebra.com  Tue Feb 24 16:00:23 1998
From: ichudov at algebra.com (Igor Chudov @ home)
Date: Tue, 24 Feb 1998 16:00:23 -0800 (PST)
Subject: return.C -- performance tracking tool (fwd)
In-Reply-To: <199802241436.JAA14156@users.invweb.net>
Message-ID: <199802242358.RAA29739@manifold.algebra.com>


William H. Geiger III wrote:
>    at 02:47 PM, Alexandre Maret  said:
> >Igor Chudov @ home wrote:
> >> 
> >> I have been using this program for a while and decided to share it
> >> with the other readers. It is written in C++.
> 
> >this is not a financial mailing list.
> >and this code is not C++... it just needs a C++ compiler to
> >compile. real C++ code doesn't use fprintf, scanf, nor strcmp...

Excuse me, mah friend, it is C++ in its pure form, with classes and all.

> Let's not forget that *real* C++ apps are bloated several time that of
> comparable C apps (god forbid anyone write some tight ASM code).

Not this one. But you have a good point.

	- Igor.





From ichudov at algebra.com  Tue Feb 24 16:04:26 1998
From: ichudov at algebra.com (Igor Chudov @ home)
Date: Tue, 24 Feb 1998 16:04:26 -0800 (PST)
Subject: return.C -- performance tracking tool (fwd)
In-Reply-To: <34F2CF5D.8276D7FB@infomaniak.ch>
Message-ID: <199802250002.SAA29824@manifold.algebra.com>


Alexandre Maret wrote:
> Igor Chudov @ home wrote:
> > I have been using this program for a while and decided to share it
> > with the other readers. It is written in C++.
> 
> this is not a financial mailing list.

This is not a gun mailing list, not a chemical mailing list, not
a flame mailing list, but all of these things are also discussed.

> and this code is not C++... it just needs a C++ compiler to
> compile. real C++ code doesn't use fprintf, scanf, nor strcmp...

It is the purest form of C++. As my grandma used to say, take your eyes
in your hands and take a look.

	- Igor.





From nobody at REPLAY.COM  Tue Feb 24 18:12:10 1998
From: nobody at REPLAY.COM (Anonymous)
Date: Tue, 24 Feb 1998 18:12:10 -0800 (PST)
Subject: Group to Attack Clinton on Crypto
Message-ID: <199802250211.DAA21296@basement.replay.com>


Date: Tue, 24 Feb 1998 18:49:25 +0000 (GMT)
From: "Dr I. D. Goodyer" 
To: ukcrypto at maillist.ox.ac.uk
Subject: Group to Attack Clinton on Crypto

>From http://www.news.com/News/Item/0,4,19388,00.html
I hope that this isn't too American for us the majority on this list.  I
thought that it was relevant.
See original webpage for hyperlinks.

	Ian


  Group to Attack Clinton on Crypto
  By Courtney Macavinta
  Staff Writer, CNET NEWS.COM
  February 23, 1998, 2:40 p.m. PT 

  A bipartisan group of politicos, high-tech companies,
  and privacy advocates will announce a broad coalition
  next week to overturn the White House's current
  encryption policy through a million-dollar media blitz
  and lobbying campaign, CNET's NEWS.COM has
  learned.

  Encryption secures digital communications, rendering
  it unreadable if intercepted. The technology is the
  center of a U.S. debate with federal law enforcement
  officials asking Congress for access to the "keys" that
  unlock encrypted data on one side, and consumer
  groups and industry representatives arguing that such
  provisions make encryption products useless and
  constitute an invasion of privacy.

  The formation of the coalition--Americans for
  Computer Privacy--signals a shift in the diligent, but
  Beltway-confined, fight against the White House's
  crypto stance. The players in the coalition will
  attempt to force encryption policy on the mainstream
  radar by convincing Americans that the government
  has plans to read their private digital discourse.

  "This will be an effort with very major financial
  backing, and this effort will be joined by a
  breathtaking coalition of interests," Jack Quinn, the
  coalition's legal adviser, told CNET's NEWS.COM
  today. Quinn is a senior partner with Arnold &
  Porter in Washington and is a former counsel to
  President Clinton. 

  "I think people will understand that the FBI director's
  [Louis Freeh] proposal for domestic encryption
  controls is really like asking them to make a duplicate
  of their front door key and leave it at the post office
  in case he wants to get inside...I don't think it will be
  hard to explain," he added.

  The coalition includes the Business Software Alliance,
  which will be just one of the financial backers, the
  trade group confirmed today. The hired guns to head
  up the coalition's strategy and media campaign also
  include Ed Gillespie, president of Policy Impact
  Communications and the strategist behind the
  Republican's sweeping 1994 legislative package
  known as the Contract with America; and the firm of
  Goddard-Claussen, which is best known for creating
  the famous "Harry and Louise" commercials that
  helped defeat the president's health care reform
  initiative the same year.

  In addition, Mindshare Internet Campaigns will be in
  charge of the online strategy and Web site for the
  coalition, with the Dittus Group in charge of public
  relations. Recruiting pamphlets with scant details
  about the coalition's membership, but with clearly
  laid out goals, already were circulated at the
  Computers, Freedom, and Privacy conference in
  Austin, Texas, last week.

  These forces and other yet-to-be named members of
  the coalition will try in about 50 calendar days
  remaining in Congress's session to derail legislation
  already on the table that they say will prevent private
  online communication.

  The group will fight an FBI-backed plan that would
  require all federally funded computers to store
  encryption keys with a government-approved party,
  allowing law enforcement to unscramble documents
  without users' knowledge or even a court order in
  some cases.

  "Even if you don't have a PC at your home or office,
  still there is information about you that is
  computerized; maybe it's your medical or financial
  records. We want to make sure that the technology
  that can keep that information private stays that way,"
  said Tom McMahon, a spokesman for the coalition,
  which officially will launch next Wednesday.

  In addition, the Americans for Computer Privacy will
  ramp up an ongoing battle to overturn Clinton
  administration regulations prohibiting the export of
  strong encryption products unless the codes are made
  available to law enforcement agencies. A bill know as
  the SAFE Act was the vehicle for this export relief,
  but at least one version of the bill altered by the
  House Intelligence Committee would grant law
  enforcement access to encrypted protected
  communication in the United States. (See related
  story)

  "BSA is involved in this broader coalition of users,
  industry, and privacy groups. We are coming
  together to push for a policy that is based on a
  voluntary, market-based system that is based on
  consumer demand vs. the government's demand to
  access your communication in a way that is
  unprecedented and violates privacy," said Kim
  Willard, a spokeswoman for the BSA.

  The media campaign is expected to cost more than $1
  million and will continue over the next eight months.
  The goal is to stimulate grassroots action against the
  bills that add more controls on cryptography. At the
  same time, the coalition's political heavyweights will
  be working with Congress members to secure a
  victory.

  "They clearly want to get this out to broader public
  audiences and move outside the Beltway to focus on
  what the public has at stake in this the debate," said
  Richard Claussen, whose firm will work on the TV
  campaign. "The indication is that we want to move
  pretty aggressively on this."







From afabbro at umich.edu  Tue Feb 24 20:09:27 1998
From: afabbro at umich.edu (andrew fabbro)
Date: Tue, 24 Feb 1998 20:09:27 -0800 (PST)
Subject: Cryptobook: State of the Art in '98?
Message-ID: 


I finally got around to building a cryptobook, as Joel McNamara
described at

	http://www.eskimo.com/~joelm/cryptbk.html

Being cool cypherpunk types, you already know that I'm referring to a
computer that has an encrypted partition, is tricked out with cryptoware,
and has been modified to prevent data leakage as much as possible (e.g.,
the OS swaps on the encrypted drive, the fact that it's a cryptobook is
somewhat concealed, etc.)

Joel's excellent article is two years old.  I'm wondering if anyone
can improve upon it, as there is at least one near-showstopper problem.
(FYI, I'm using Win95 as a platform for various reasons, mostly because
the data I'm encrypting is Win95-based and Joels' guide is Intel-based):

(*) SecureDrive is recommended as a hard drive encryption product.
Unfortunately, it's 16-bit and designed for DOS.  On my laptop, which
(as is typical) only has one hard drive controller, in order to mount
the partition in 16-bit mode, I have to turn off all 32-bit disk access,
which slows everything down a great deal, means loading a 16-bit CD-ROM
driver, etc.  Little things like animated icons also don't work -- yes,
who cares, but it suggests there are probably other side effects.

My winGeek friends don't think there is a way to mount one partition
in 16-bit mode and the other in 32-bit mode.  I'm wondering if anyone
knows of 32-bit program like SecureDrive, preferably one using IDEA,
that would be a worthwhile replacement.  (FYI, another package of the
same generation, SecureDevice, has the same problems).

(*) Anyone care to recommend anything that is not included in Joel's list?
Maybe new or better products since '96?  I'd particularly be interested
in some way of automating some of the manual things Joel proposes --
secure deletions, steganography, etc.  Sorry, I'm a UNIX geek and am
somewhat lost in Windows land...

Thanks all,




--
 Andrew Fabbro [afabbro at umich.edu] www-personal.umich.edu/~afabbro 
 "Solutions are not answers to problems." -- Richard Nixon









From guy at panix.com  Tue Feb 24 22:30:56 1998
From: guy at panix.com (Information Security)
Date: Tue, 24 Feb 1998 22:30:56 -0800 (PST)
Subject: Cypherpunk Policeman?
Message-ID: <199802250630.BAA03674@panix2.panix.com>


   >   From aba at dcs.ex.ac.uk Tue Feb 24 18:55:45 1998
   >   
   >   Guy writes :
   >   > Hey, Vulis is probably looking for a real job.
   >   >
   >   > Maybe he's finally found one.
   >
   >   I hear he already had one: he's a lecturer at a University in new york
   >   (not sure of names of NY universitys), unless your actions lead
   >   indirectly to his contract being terminated.
 
#  http://math.harvard.edu/~verbit/scs/cranks/from-Shlomo.html
#
#  Q: Who is Dimitri Vulis?
#
#  A: Dimitri is an XSoviet immigrant.
#
#  He harasses people all over the net with the most offensive sorts of messages,
#  and uses dirty tricks to retaliate to the people who do get offended. Among
#  his accomplished feats is a series of articles about cat-eating dogs posted to
#  rec.pets.cats (which caused a wave of complaints and made him lost his CUNY
#  account) ; a series of porno binaries with obscene comments about his
#  opponents posted to math-related newsgroups (he lost another academic account,
#  at fordham.edu, after this scandal);
#  [
#     8/3/97 http://corky.fordham.edu/fclc/faculty.html
#     Dimitri Vulis, Adjunct Instructor in Computer Science. BA, MA, CUNY
#     Dimitri: I haven't been teaching at Fordham for a few years.
#              It's too far and the pay's too low.
#  ]
#  ...and a series of racist articles denigrating all aspects of romanian life
#  and culture which used to haunt the romanian newsgroup for years.


----


   >   From aba at dcs.ex.ac.uk Tue Feb 24 18:55:45 1998
   >   
   >   Guy writes :
   >   > He posted from 'cj3 at alt.net' _after_ being terminated from PSINet.
   >   
   >   You sure?  I mean it could as easily as not been someone spoofing him,
   >   what with the various anonymous mails, etc., that you reported.

It is a blatant obviousity.

Traffic analysis simply means convincing one or more people
that it's the same person...
---guy

   Convinced?


#  Subject:      (none)
#  From:         Mix 
#  Date:         1998/02/12
#  Newsgroups:   list.cypherpunks
#  
#  Timothy Mayhem will fuck anything that moves, 
#  but he'd rather be fucking his own mother's dead 
#  body.
#  
#                <<<<
#               o(0-0)o
#            -ooO-(_) Ooo-- Timothy Mayhem
#  
#  Subject:      Archie Plutonium's contributions to science
#  From:         simvlad at bwalk.dm.com (AI Simulation Daemon)
#  Date:         1996/11/28
#  Newsgroups:   alt.sci.physics.plutonium,soc.culture.scientists,alt.flame
#   
#  May the force of 231Pu be with you. Archie Plutonium proves a way to list all
#  solutions to Diophantine equations!
#   
#             <<<<
#            o(0-0)o
#         -ooO-(_) Ooo-- Archie Plutonium



#  Subject:      [ADMINISTRATIVIUM] Firewalls
#  From:         nobody at replay.com (Anonymous)
#  Date:         1998/01/13
#  Newsgroups:   list.cypherpunks
#  
#  Timmy C. Mayonnaise's reheated, refurbished, and regurgitated 
#  cud is completely inappropriate for the mailing lists into which 
#  it is cross-ruminated.
#  
#        ,,,
#   -ooO(o o)Ooo- Timmy C. Mayonnaise
#        (_)
#  
#  Subject:      Ludwig Plutonium's latest contributions to number theory
#  From:         simvlad at bwalk.dm.com (AI Simulation Daemon)
#  Date:         1997/02/02
#  Newsgroups:   alt.sci.physics.plutonium,talk.rumors,misc.invest.options
#   
#  Praise the Lord! Ludwig Plutonium proved that some non-trivial
#  zeroes of the zeta function have real part not equal to 1/2.
#   
#              ,,,
#         -ooO(o o)Ooo- Ludwig Plutonium
#              (_)



#  Subject:      (none)
#  From:         Anonymous 
#  Date:         1997/12/19
#  Newsgroups:   list.cypherpunks
#  
#  Timmy C. May will fuck anything that moves, 
#  but he'd rather be fucking his own mother's 
#  dead body.
#  
#       /'''
#       c-OO Timmy C. May
#          \
#         -
#  
#  Subject:      Ludwig Plutonium, our greatest scientist
#  From:         simvlad at bwalk.dm.com (AI Simulation Daemon)
#  Date:         1997/02/20
#  Newsgroups:   alt.sci.physics.plutonium,soc.culture.scientists,sci.physics.accelerators
#   
#  Reposted without permission from clari.plutonium. Ludwig Plutonium
#  demonstrates that (a+b)^n=a^n+b^n for some a, b, and n!
#   
#            /'''
#            c-OO Ludwig Plutonium
#               \
#              -



#  Subject:      Re: Zero-knowledge commit
#  From:         nobody at replay.com (Anonymous)
#  Date:         1998/02/01
#  Newsgroups:   list.cypherpunks
#  
#  
#  Timmy C[unt] May carries a turd in his wallet for identification purposes.
#  
#                    __|     \ /     |__
#        _ o   ___\o    \o    |    o/    o/___  o _  Timmy C[unt] May
#         /\  /)  |     ( \  /o\  / )     |  (\  /\
#     ___|_\______                          _____/_|__
#  
#  
#  Subject:      Expressing America's appreciation for Archimedes Uranium
#  From:         simvlad at bwalk.dm.com (AI Simulation Daemon)
#  Date:         1996/11/01
#  Newsgroups:   alt.sci.physics.plutonium,alt.usenet.kooks,sci.bio.misc
#   
#  We live in interesting times. Archimedes Uranium proved beyond all
#  doubt that 6 and 28 are the sums of their proper divisors respectively!
#   
#                   __|     \ /     |__
#       _ o   ___\o    \o    |    o/    o/___  o _
#        /\  /)  |     ( \  /o\  / )     |  (\  /\
#    ___|_\______                          _____/_|__



#  Subject:      Secure checksums
#  From:         nobody at replay.com (Anonymous)
#  Date:         1998/01/31
#  Newsgroups:   list.cypherpunks
#  
#  Timmy May sits at his terminal dressed in five-inch 
#  stiletto heels, fishnet stockings, a gold-lame 
#  mini-skirt, a purple halter with girdle underneath to 
#  keep in his flabby gut, a Fredericks of Hollywood 
#  padded bra also underneath the halter, a cheap Naomi 
#  Sims pink afro wig, waiting to yank his crank whenever 
#  a black man responds to one of his inane rants.
#  
#          o   \ o /  _ o         __|    \ /     |__        o _  \ o /   o
#         /|\    |     /\   ___\o   \o    |    o/    o/__   /\     |    /|\ Timmy May
#         / \   / \   | \  /)  |    ( \  /o\  / )    |  (\  / |   / \   / \
#  
#  
#  Subject:      Archimedes Transplutonium, Dartmouth's most respected authority on number theory
#  From:         simvlad at bwalk.dm.com (AI Simulation Daemon)
#  Date:         1996/12/20
#  Newsgroups:   alt.sci.physics.plutonium,misc.test,sci.physics.accelerators
#   
#  Praise the Lord! Archimedes Transplutonium proved beyond all
#  doubt the non-existence of infinitely many primes.
#   
#      o   \ o /  _ o         __|    \ /     |__        o _  \ o /   o
#     /|\    |     /\   ___\o   \o    |    o/    o/__   /\     |    /|\ Archimedes Transplutonium
#     / \   / \   | \  /)  |    ( \  /o\  / )    |  (\  / |   / \   / \



#  Subject:      (none)
#  From:         Anonymous 
#  Date:         1998/01/26
#  Newsgroups:   list.cypherpunks
#  
#  Timothy May prefers to have sex with little kids 
#  because his own penis is like that of a 
#  three-year-old.
#  
#              /\**/\
#             ( o_o  )_) Timothy May
#             ,(u  u  ,),
#            {}{}{}{}{}{}
#   
#  Subject:      Ludwig Pohlmann, Internet's biggest genius
#  From:         simvlad at bwalk.dm.com (AI Simulation Daemon)
#  Date:         1997/02/05
#  Newsgroups:   alt.sci.physics.plutonium,sci.techniques.testing.misc,misc.test
#   
#  May the force of 231Pu be with you. Ludwig Pohlmann proved beyond
#  reasonable doubt the existence of even numbers cannot be represented as a
#  sum of two primes.
#   
#              /\**/\
#             ( o_o  )_) Ludwig Pohlmann
#             ,(u  u  ,),
#            {}{}{}{}{}{}



#  Subject:      (none)
#  From:         Mix 
#  Date:         1998/01/27
#  Newsgroups:   list.cypherpunks
#  
#  The only `culture' Timothy `C' Maypole possesses is that 
#  cultivated from his foreskin scrapings.
#  
#          ,/         \,
#         ((__,-,,,-,__)), Timothy `C' Maypole
#          `--)~   ~(--`
#         .-'(       )`-,
#         `~~`d\   /b`~~`
#             |     |
#             (6___6)
#              `---`
#  
#  Subject:      Re: renaming soc.culture.russian.moderated => soc.culture.smegma.moderated
#  From:         simvlad at bwalk.dm.com (AI Simulation Daemon)
#  Date:         1996/02/25
#  Newsgroups:   news.groups,soc.culture.russian,soc.culture.soviet,soc.culture.ukrainian,soc.culture.romanian,soc\
#  .culture.african.american,ok.general
#   
#  The only "culture" Pyotr Vorobiev and his buddies possess is the bacterial one,
#  cultivated from their foreskin scrapings.
#   
#  This posting was generated by an artificial intelligence program.





From guy at panix.com  Tue Feb 24 22:35:09 1998
From: guy at panix.com (Information Security)
Date: Tue, 24 Feb 1998 22:35:09 -0800 (PST)
Subject: Group to Attack Clinton on Crypto
Message-ID: <199802250635.BAA03768@panix2.panix.com>


   >   From cypherpunks-errors at toad.com Tue Feb 24 21:27:15 1998
   >   To: ukcrypto at maillist.ox.ac.uk
   >   Subject: Group to Attack Clinton on Crypto
   >   
   >   >From http://www.news.com/News/Item/0,4,19388,00.html
   >   
   >     Group to Attack Clinton on Crypto
   >     By Courtney Macavinta
   >     Staff Writer, CNET NEWS.COM
   >     February 23, 1998, 2:40 p.m. PT 
   >   
   >     A bipartisan group of politicos, high-tech companies,
   >     and privacy advocates will announce a broad coalition
   >     next week to overturn the White House's current
   >     encryption policy through a million-dollar media blitz
   >     and lobbying campaign, CNET's NEWS.COM has
   >     learned.


#     # #######    #      ###
 #   #  #         # #     ###
  # #   #        #   #    ###
   #    #####   #     #    #
   #    #       #######
   #    #       #     #   ###
   #    ####### #     #   ###

---guy

   Poor grumpy William H. Geiger III, odd-man-out.





From guy at panix.com  Tue Feb 24 22:42:52 1998
From: guy at panix.com (Information Security)
Date: Tue, 24 Feb 1998 22:42:52 -0800 (PST)
Subject: Killing the Unabomber
Message-ID: <199802250642.BAA03918@panix2.panix.com>


   >   From wendigo at ne-wendigo.jabberwock.org Tue Feb 24 23:43:50 1998
   >   
   >   An entity claiming to be Information Security wrote:
   >   : 
   >   : Didn't the government finally back down on their
   >   : attempt to legally kill the Unabomber?
   >   
   >   This point strikes me as pretty funny.  Kinda like a nurse rooting
   >   for Charles Starkweather.
   >   
   >   Mark

Or trying to be consistent.

Raygun: abortion is killing, but pro-death penalty.

If killing is wrong, killing again is wrong.

Also, there is the part about his brother turning
him in to get help (UB tried to get mental help,
but couldn't get it), and didn't turn him in
to get killed.

Next time, the killer might not be caught because
the person who recognized (yea traffic analysis)
his talktalk might not want them killed as a result.

i.e. in the long run it will save lives.
---guy

   No: "Live and Let Die".





From aba at dcs.ex.ac.uk  Wed Feb 25 01:19:14 1998
From: aba at dcs.ex.ac.uk (Adam Back)
Date: Wed, 25 Feb 1998 01:19:14 -0800 (PST)
Subject: ascii art is not a digital signature (Re: Cypherpunk Policeman?)
In-Reply-To: <199802250630.BAA03674@panix2.panix.com>
Message-ID: <199802250914.JAA01021@server.eternity.org>



Guy  writes:
>    >   From aba at dcs.ex.ac.uk Tue Feb 24 18:55:45 1998
>    >
>    >   You sure?  I mean it could as easily as not been someone spoofing him,
>    >   what with the various anonymous mails, etc., that you reported.
> 
> It is a blatant obviousity.
> 
> [series of ascii art posts posted via different remailer addresses,
> and bwalk.dm.com email addresses]

It is not at all obvious.  You seem to be under the illusion that an
ascii art image is some kind of digital signature.

> Traffic analysis simply means convincing one or more people
> that it's the same person...

Doesn't prove anything.

Here to make the point, I'll use one of your magic digital signature
ascii arts which somehow proves incontrovertably that the post was
made by Dimitri.  

Am I Dimitri too now?

Adam
--
                <<<<
               o(0-0)o
            -ooO-(_) Ooo-- Guy Polis





From guy at panix.com  Wed Feb 25 02:40:48 1998
From: guy at panix.com (Information Security)
Date: Wed, 25 Feb 1998 02:40:48 -0800 (PST)
Subject: ascii art is not a digital signature (Re: Cypherpunk Policeman?)
Message-ID: <199802251040.FAA09365@panix2.panix.com>


   >   From aba at dcs.ex.ac.uk Wed Feb 25 04:19:12 1998
   >   
   >   Guy  writes:
   >   >    >   From aba at dcs.ex.ac.uk Tue Feb 24 18:55:45 1998
   >   >    >
   >   >    >   You sure?  I mean it could as easily as not been someone spoofing him,
   >   >    >   what with the various anonymous mails, etc., that you reported.
   >   > 
   >   > It is a blatant obviousity.
   >   > 
   >   > [series of ascii art posts posted via different remailer addresses,
   >   > and bwalk.dm.com email addresses]
   >   
   >   It is not at all obvious.  You seem to be under the illusion that an
   >   ascii art image is some kind of digital signature.

You seem to think people couldn't share a digital signature.

   >   > Traffic analysis simply means convincing one or more people
   >   > that it's the same person...
   >   
   >   Doesn't prove anything.

Sure it does, I've proven that with PSI.

Guess what happens if those people are a jury?

   >   Here to make the point, I'll use one of your magic digital signature
   >   ascii arts which somehow proves incontrovertably that the post was
   >   made by Dimitri.  

I can see that one flew over your head, and pooped on you.
---guy





From ryan at michonline.com  Wed Feb 25 05:54:34 1998
From: ryan at michonline.com (Ryan Anderson)
Date: Wed, 25 Feb 1998 05:54:34 -0800 (PST)
Subject: DDJ Crypto CD has arrived!
In-Reply-To: <34F252DA.652A@ziplink.net>
Message-ID: 


On Mon, 23 Feb 1998, Peter Trei wrote:

> Well, it's finally here.
> 
Yeah, it surprised the hell out of me to get it so  delyaed from the
order, without any explanation or apology in the packaging... kinda
wierd...

> I've encountered a few minor bugs in the few minutes I've played with
> it; not all of the buttons work properly, and the color maps go to hell
> when the program's window is not selected.

I've noticed that the text appears to be scanned in.  (and ocred).
Ther'ess numerous minor grammatical errors, such as missing commas, a "d"
instead of the ")", and other misc. stuff in the first chapter of Applied
Cryptography...

That's actually more disappointing than the lack of anHTML version of the
books, in my opinion..

Oh well..  Perhaps we can convince them to correct it?

I do notice that the reader tends to make the left edge of the text very
difficult to pick out from the edge of the window.. Ahh... well, , it
obviously suffered some strange problems in manufacture...

Ryan








From ptrei at securitydynamics.com  Wed Feb 25 08:26:05 1998
From: ptrei at securitydynamics.com (Trei, Peter)
Date: Wed, 25 Feb 1998 08:26:05 -0800 (PST)
Subject: No Subject
Message-ID: <6B5344C210C7D011835C0000F8012766010035DD@exna01.securitydynamics.com>


Date: Tue, 24 Feb 1998 23:38:58 -0600
From: David McNett 
To: rc5 at lists.distributed.net
Subject: [RC5] [ADMIN] The secret message is...
Sender: owner-rc5 at llamas.net
Precedence: bulk
Reply-To: rc5 at llamas.net
Status: RO


--UlVJffcvxoiEqYs2
Content-Type: text/plain; charset=us-ascii

Once again I have the great privilege of coming to you with good news.

It is with great pleasure (and a sigh of relief) that I can now inform
you
that the DES-II-1 challenge has been successfully met by
distributed.net.

The winning key to the challenge was detected and submitted to RSA Labs
at 02:26 GMT on Monday, 23-Feb-1998.

The correct key, 76 9E 8C D9 F2 2F 5D EA, revealed the words which we've
been anticipating these past 39 days:

"The secret message is: Many hands make light work."

(If you ask me, this is a nice nod in our direction.  Thanks, RSA Labs!)

In addition to proving that 56-bit DES is no longer sufficient for
protecting
valuable information, we've now also proved that blind luck need not be
a
factor in brute-force decryption attacks.  The original DES Challenge
and
the more recent RC5-56 wins were fortunate and did not have to sweep a
significant portion of the keyspace.  This time around, however, we
managed to
complete almost 90% of the keyspace and have now proven that even when
the 
law of averages chooses to catch up to us and forces us to pay our dues,
we are
still an unstoppable force.  Our collective victory is all the more
impressive
when you consider what we had to accomplish to achieve it.

We tested sixty-three quadrillion keys.  That number is simply
staggering.

Assuming *0* growth between now and July, we'll be able to sweep the
entire
DES-II-2 keyspace in just under 29 days.  That's assuming that we do not
recruit another person, don't add any more machines, and are even more
unlucky
next time.  I daresay at least one of those assumptions is probably
false.

I'd invite all of you to join us in IRC (efnet, #distributed) for a
rowdy
victory party.  Take a breather.  Sit back and watch your clients
automatically roll over to RC5-64.

The only other issue at hand is *who* found the key.  The person who
found the
winning key has politely asked to remain anonymous.  Rest assured, I've
been
in contact with them and they know they've won.  They will be receiving
their
full share of the prize and are quite excited about the victory.  All
I'd ask
is that we all respect this person's wishes and not bother the list with
public speculation as to their identity.  I'm sure we all appreciate
just
how important privacy and anonymity can be.

Here are some numbers to chew on while the stats are down:

Project statistics:
        Start of contest:                       January 13, 1998 at
09:00 PST
        Start of distributed.net effort:        January 13, 1998 at
09:08 PST
        End of Contest:                         February 23, 1998 at
02:26 PST

        Size of keyspace:                       72,057,594,037,927,936
        Approximate keys tested:                63,686,000,000,000,000

        Number of 2^30 (average) keyblocks:                 67,108,864
        Number of keys in average keyblock:              1,073,741,824
        Peak blocks per day:                                 5,540,982
        Peak keys per second:                           34,430,460,000

The unencrypted message: Many hands make light work

Computing equivalents:

   Distributed.net is equivalent in processing power to:

           11,264       DEC Alpha 21064 533s
           15,316       Sun Ultra I 167s
           22,393       Intel Pentium II 333s
           68,859       Macintosh PowerPC 604e/200s.
           41,712       Intel Pentium 166s
          399,374       Intel 486DX2/66s
        7,446,033       Intel 386SX/20s

(based solely on DES client performance)

Prospective:

If Keys were dollars, we could pay off the U.S. National Debt in 6.25
minutes

If Keys were pennies, we could buy 536249385 Mazda Miatas each day.

If Keys were pennies, we could buy 256728249 Jeep Cherokees each day!

If you printed a single page to represent each key block as it was
checked
and placed those pages in a stack, it would grow 12.83 inches taller
every
minute.

If blocks were liters of Dr. Pepper, we could produce 6381493 six-packs
each day

If Key Blocks were cheeseburgers, fries, and a large Dr. Pepper, we
could
feed the entire city of Toronto, Ontario lunch each day.

(on a personal note, It sure feels nice to be doing RC5 blocks again.  I
feel
like I've just slipped on an old, comfortable pair of loafers that were
lost in
the attic for two months)

--

________________________________________________________________________
|David McNett      |To ensure privacy and data integrity this message
has|
|nugget at slacker.com|been encrypted using dual rounds of ROT-13
encryption|
|Birmingham, AL USA|Please encrypt all important correspondence with
PGP!|

--UlVJffcvxoiEqYs2
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBNPOucPqEj3HEBeehAQEKBgQAizpn1SrmYhz/Ycx1aNUxewi9r7X8gRTr
ifuwC+4qAJXWcDOesdOx1V1IzQ6eSHLFuiaDyLsNmUwIoUpwJm0CTlmwtYIDDc4R
mGrO7t0FUne+l+YhFyYJTarnMjmCpySJjEf9I/GNrWfGTnFAWAaaGQp+f1ZyBTkJ
1bDtm3rzbjk=
=iv/8
-----END PGP SIGNATURE-----

--UlVJffcvxoiEqYs2--

--
To unsubscribe, send 'unsubscribe rc5' to
majordomo at lists.distributed.net
rc5-digest subscribers replace rc5 with rc5-digest







From declan at well.com  Wed Feb 25 08:26:08 1998
From: declan at well.com (Declan McCullagh)
Date: Wed, 25 Feb 1998 08:26:08 -0800 (PST)
Subject: Group to Attack Clinton on Crypto
In-Reply-To: <199802250635.BAA03768@panix2.panix.com>
Message-ID: 


Hold the applause. I wrote about this over two weeks ago:
  http://cgi.pathfinder.com/netly/editorial/0,1012,1722,00.html

-Declan

At 01:35 -0500 2/25/98, Information Security wrote:
>   >     Group to Attack Clinton on Crypto
>   >     By Courtney Macavinta
>   >     Staff Writer, CNET NEWS.COM
>   >     February 23, 1998, 2:40 p.m. PT
>   >
>   >     A bipartisan group of politicos, high-tech companies,
>   >     and privacy advocates will announce a broad coalition
>   >     next week to overturn the White House's current
>   >     encryption policy through a million-dollar media blitz
>   >     and lobbying campaign, CNET's NEWS.COM has
>   >     learned.
>
>
>#     # #######    #      ###
> #   #  #         # #     ###
>  # #   #        #   #    ###
>   #    #####   #     #    #
>   #    #       #######
>   #    #       #     #   ###
>   #    ####### #     #   ###
>
>---guy
>
>   Poor grumpy William H. Geiger III, odd-man-out.








From honig at otc.net  Wed Feb 25 13:29:11 1998
From: honig at otc.net (David Honig)
Date: Wed, 25 Feb 1998 13:29:11 -0800 (PST)
Subject: So what *does* happen to a city without power for 6 days
Message-ID: <3.0.5.32.19980225132942.007d21a0@otc.net>




A part of Aukland is finding out.


http://www.tampabayonline.net/news/news101l.htm


------------------------------------------------------------
      David Honig                   Orbit Technology
     honig at otc.net                  Intaanetto Jigyoubu

   If you plan to enter text which our system might consider to be obscene, 
   check here to certify that you are old enough to hear the resulting
output. 
		http://www.bell-labs.com/project/tts/voices.html






	
















From lreed at west.cscwc.pima.edu  Wed Feb 25 17:35:26 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Wed, 25 Feb 1998 17:35:26 -0800 (PST)
Subject: Prologue  3
Message-ID: <009C25A4.C46240A0.4@west.cscwc.pima.edu>


~       SPACE ALIENS HIDE MY DRUGS / PROLOGUE 3/0
	�����������������������������������������

The Most Dangerous Man In Lost Wagess:
  They had followed him from the CypherPunks physical meeting 
to the outskirts of Las Vegas, before losing him. Two days of
frantic searching by a variety of law enforcement agencies 
led to the Plaza Hotel and Casino, where he was playing the
penny slot machine and associating with a variety of local
riff�raff and no�accounts.
  An in�depth consultation with the Plaza head of security
revealed that they had been keeping a close eye on the
subject for the last two days.
  
  "He doesn't cause any real trouble, or anything," the
head honcho said, shrugging, "but everything about him
seems just a little strange, if you know what I mean."
  This comment seemed designed to elicit some sort of
response from the poker�faced men questioning him, but
they failed to respond, merely waiting for him to 
continue.
  "He buys ten dollars worth of pennies," and tips
the change lady a dollar. "He plays for hours on
end, also tipping the waitresses a dollar every
time they bring him a free beer. Hell, he even tips
the cleaning people when they clean his ashtray."
  The honcho shook his head, as if this type of
behavior from someone spending most of their time
playing the penny slots was puzzling and also
disconcerting.
  "Sleeps in his car, with his dog. Only leaves the
slot machines to feed, water, and run his dog around
our parking lot. It's kind of unnatural, the way he
seems to dote on that animal."�� the security honcho
winked knowingly.

  "Has he met with anyone who doesn't usually 
frequent your casino?" one of the men asked,
impatiently, tired of hearing odd details of the
man's lifestyle which seemed intriguing to the
denziens of normality that they were constantly
having to interview in regard to the subject's
movement and activity.

  "He ran into some legal�eagle named Larry Joe,"
the honcho said, noting the first sign of interest
shown by his interrogators. "My second�shift security
chief says he's a middle�weight poker player, taking
part in a tournament at the Rio..." adding with a
knowing tone, "but the mouthpiece is hanging with
one of the heavy hitters on the local poker scene."

  "Larry Joe Dowling, an Austin attorney." one of
the interrogators said to the others. "He usually�j
We'd better shift our surveillance team into
high gear."
  The man rose to leave, telling the others, "Dig
up all you can here, file a report, and get some
sleep. You're going to need it."


Boogers? We don't need no stinking boogers!:
  The agent pulled out his hanky and wiped the disgusting
mess off of his jacket sleeve.
  "I can't believe that they pulled us off of the
Tim May detail to check out this fucking loser."
  "Shit!" he screamed, as he brushed his arm against
the steering column and picked up another piece of
disgusting slime on his jacket sleeve.

  "I've shaken down this guy's personals before." the
man's partner said, with a grin. "That's why I gave
you the driver's side of the vehicle to check out."
  "He feeds his nose�candy to his dog, and he always
leaves her a little desert on the steering wheel
for her to chow down on after he brings her back
from her walk." He laughed as he saw the bile
rising to his new partner's throat.
  He couldn't help himself��he reached over and
plucked a booker off of the horn button and told
his partner, "I'll trade you a green one for a
yellow one..."
  His partner lurched out of the vehicle and
concentrated on tossing his lunch while not messing
up his shiny new shoes.

  The more experienced agent finished snapping photos
of the gathered items and then replaced them carefully
in the same position they had been in before their
intrusion.
  "He usually walks Baby for about ten minutes, to 
give us time to make a complete pass of his vehicle,
so our time is about up." The agent closed and 
locked the doors of the vehicle, motioning his
green�faced partner toward their vehicle.


It's A Nuke! No, It's Anthrax! No, It's...AAARRGGGHHHH!!!":
  Justin Case, Special Agent in Charge of the current
investigation, was bothered by the fact that the suspect
had seemed to be doing nothing more than wandering around
various sites and casinos in Las Vegas, with no apparent
pattern or plan to his movement and actions. Until he
read the report of the suspect's lingering interest in
the placement of the columns serving as the foundation 
for the Stratosphere Casino, and the layout of the
preliminary work on the new Foley Federal Building�j

  "Soft targets." agent Case said out loud, causing
a considerable amount of disconcertment to his fellow
agent, Bobby Siller.
  "Damn!" Siller swore, "We have reports of him having
met with Leavitt and Harris, but we didn't have any
taps on them, so we don't have any details of what
they are planning."

  "Don't worry about it," Case seemed unconcerned, "if
he's scouting soft targets, then he's not planning any
sudden moves."
  "Patience comes to those who wait." Justin Case said,
softly, quoting the Author, and making a mental note to
have agent Siller shake the Anthrax Twins down a few
days after the suspect departed Vegas.

  "Hold it!" agent Siller shouted, motioning for his
superior to remain silent, as Siller adjusted his
earpiece to more clearly hear the live report he was
receiving from his agents at the Riviera gun show.
  "The suspect went into the gun show empty handed,
and left with several copies of 'Gun List' and then
returned to his vehicle. He took his dog for a walk
and our agents discovered a 'Dalian' watch wrapped
in tear�outs from the firearms paper, dealing with
Romanian AK rifles and Bulgarian SLR�95's. The 
'Dalian' watch is some type of Polish/Chinese make,
or something."

  Justin Case rolled his eyes, but remained silent.
The suspect was yanking the chains of the agents who
were shaking down his personals, and it looked like
Siller's men didn't have the experience to know when
they were being toyed with.
  The agent that Case had pulled off of the Tim May
detail would be wise to the suspect's shenanigans,
but it was unlikely he would get in the way of
Siller's men making fools of themselves.

  "He's returning to the casino, using the copies
of 'Gun List' to hide whatever it is he's carrying."
agent Siller said, with great excitement.
  "I think we ought to take him in the parking 
garage, before he reaches the main building at the
Riviera." Siller anxiously awaited the word from
his superior.
  "Maintain." was Case's nonchalant reply, causing
Siller to have an ill�disguised internal shit�fit.
If this operation went totally to hell, it would
be Siller's ass on the line, being the Las Vegas
station chief.





From lreed at west.cscwc.pima.edu  Wed Feb 25 17:35:48 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Wed, 25 Feb 1998 17:35:48 -0800 (PST)
Subject: Prologue3a
Message-ID: <009C25A4.D40628A0.16@west.cscwc.pima.edu>


SAHMD 3A
��������
  "Maintain," Siller told his agents, but couldn't help 
adding, "and disclose."
  This was a vague term meant to signal his men to 
intercept the suspect and do a bump�and�run on him
to sniff out what it was he was hiding��without alerting
Siller's superior that his orders were being countermanded.

  "The Electronic Privacy Papers." agent Case said, to no
one in particular.
  "What?" Siller asked, perplexed.
  "Documents on the Battle for Privacy in the Age of
Surveillance, by Bruce Schneier and David Banisar,
ISBN: 0�471�12297�1."
  Much to agent Siller's consternation, his superior
continued, "That's what your men are going to discover
he is hiding furtively under those copies of the 'Gun
List' magazines when they disobey my orders and risk
blowing their cover."

  "It's the suspect's form of humor." Justin Case
smiled at his subordinate's discomfort.
  "He's laughing at all the spooks from various
agencies, including yours and mine, who are at the
gun show shadowing the Anthrax Twins, the Samsonite
Nuclear Warrior, and various members of the Loose�Screw
Gun Nut Club."
  Seeing the confused look on agent Siller's face, he
explained further. "The suspect is laughing because
he believes he is carrying the most dangerous weapon
available at the gun show."

  "And he's probably right..." Case said, with a far�
away look in his eyes that sent shivers down agent
Siller's spine.
  Special agent Justin Case took a tattered copy of
a paperback titled, "Paper Prison" out of his inside
jacket pocket, and stared at it��lost in a universe
that belonged far in the past, but which seemed to
be intersecting the present in a manner which bode
nothing but ill for those who continued to live in
both.

  "The future is now..." Justin Case said, in a low
monotone voice that seemed to come from a world beyond
the one in which he and agent Siller were so diligently
pursuing the 'Threat of the Day'.

  "He's carrying a book." the voice came crackling
through Siller's earpiece.
  "Never mind." Siller said, adding, "Maintain."

  "Maintain." Siller repeated inwardly, to himself,�j
crept up his spine and into the lower regions of
his mind as he observed the strange, semi�hypnotic
state that his superior had entered into.
  "Maintain."





From lreed at west.cscwc.pima.edu  Wed Feb 25 17:36:32 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Wed, 25 Feb 1998 17:36:32 -0800 (PST)
Subject: Prologue 4
Message-ID: <009C25A4.EE33D1A0.23@west.cscwc.pima.edu>


Prologue 4/0 SPACE ALIENS HIDE MY DRUGS
���������������������������������������

A Nuclear Bullet, With *Everyone's* Name On It:
  [Your Name Here]


Excerpt from an interview with Marilyn Manson on NPR:
MM: A lot of the lies spread by Fundamentalist Christians
   about our tour were believed by people because they 
   read them on the InterNet.
    The InterNet is the CB Radio of the 90's. People perceive
   it as a legitimate news source, which it's not.
    Eventually there will need to be some sort of laws or
   something...


Top Ten Ways To Convince The Sheeple The Revolution Is NOW:
10,9,8,.7,6,5,4,3,2...
1. Put Marilyn Manson's name on the first bullet.


"Give me nuclear freedom, or give me death."
~ Patrick Hussein


The TRUTH About Area 51:
  It's a resort�spa for the reptilian Nazis who are shaping
our present and our future, preparing to rule all of mankind
when they emerge from the underground bunkers beneath Los Alamos,
Livermore, Colorado Springs, Muleshoe, Texas, etc., at the end
of the Milleniuum.
  Why can't you buy a straight 2"x4" anymore? The reptilian Nazis
are keeping all of the good stuff for themselves. The reason for
the tight security at Area 51 is not because of secret spy�planes
and the like. The reptilian Nazi's don't want us to know that
they are all driving '56 Chevy's. (Their original plan was to
have earthlings all driving Edsels, but they tried to implement
the plan before their mind�control experiments had proven 
successful.)


Who It Is OK To Put A Fucking Bullet Through Their Head:

Officially Recognized Bad Guys��For the Sheeple, this is Saddam
  Hussein, Timothy McVeigh, Dennis Rodman, paramilitarists, 
  grandmothers who plug other people's parking meters, Branch
  Davidians (but it's a shame about the children), and The 
  Subject Of A Ten�Second Sound�Byte To Be Named Later.
  For Republicans, this is welfare cheats, the homeless, tax
  cheats making less than $100,000 per year, liberals, Ralph
  Nadar, CypherPunks, Alt2600 avocados, the 4 Horsemen, and
  anyone who looks like me.
  For the Democrats, this is the non�avant�guarde wealthy,�j
  liberals consume, Rush Limbaugh, Republican presidents, 
  rednecks, people who drink water straight out of the tap,
  and anyone who looks like me.
  For Kris Kristofferson, this is "People doing something
  dirty, decent folks can frown on..."


"Sunshine is the best disinfectant."
~ Supreme Court Justice Louis D. Brandeis, 1928

"Bullet holes let the sun shine in."
~ Supreme Asshole TruthMonger, 1998


When Existence Is Outlawed, Only Outlaws Will Exist:
  The revolution is now.
  The only question that those who have the balls to
participate in the inevitable chaos which will be needed
to balance the Tao against the current onslaught of
digitally structured reality that is being forced upon
humanity by the new technology being promoted by the
pawns of the reptilian Nazis whose headquarters is deep
within the confines of the AdamAntarctic is: "Whose brain
do I put my first bullet through?"

  For many, the answer will be, "TruthMonger!"
  Nobody likes to hear the truth, and the truth is: We
all deserve to die.
  Not only that, but the extinction of humanity, according
to our current values, epitomizes the crowning glory of
our evolutionary path.

  What places us *above* the other primates and the other
forms of life on our planet? What is it that makes us
special, that deems us worthy of ruling over all other
life forms on the planet Earth?
  It is our ability to control; our ability to master
our environment and the objects and life�forms contained
within its bounds. Ultimately, it is our ability to *kill*
whatever stands in the way of the fulfillment of our desires
and our goals.
  For all of our soul�searching, spiritual posturing, deep
down inside we all know that we live in a predatorial 
universe. Republicans cry out for bigger guns to defend
our way of life from everyone who fails to salute the flag.
Democrats cry out for the press and political leaders to
invent enemies to justify the liberals crying out for
bigger guns to protect us from the 'bad guys.'
  And it's all bullshit...

  The reason we need to launch wars and destroy our
environment is to keep the price of our refrigerators
and our color TV's reasonable��to keep the price of a�j
dollar high enough that we can feel good about ourselves
for saving a starving child for less than ten cents a day,
while ignoring the fact that an obese Sally Fields could
save more starving children in a week than we possibly 
could in a lifetime, just by donating one of her lunches
to the charity she is promoting.


Think About This, You Stupid Fucking Bastards:
  Why do we need to allow our basic human rights and
freedoms to be compromised?: In order for our hallowed
leaders and our protectors in the law enforcement
community to adequately protect us from the 'bad guys.'
  Why do we need to be protected from the 'bad guys'?:
Because if they win out over the 'good guys', they 
will take away our basic human rights and freedoms.


The Reason TruthMonger Will Die Broke And Alone:
  Because he invested all of his money in ClueServers,
believing that the Sheeple might one day find them
to be of value.

"TV Is Real! (Just go back to sleep, dear.)"






From honig at otc.net  Thu Feb 26 09:33:30 1998
From: honig at otc.net (David Honig)
Date: Thu, 26 Feb 1998 09:33:30 -0800 (PST)
Subject: From Peter Gutmann  Re: So what *does* happen to a city without power
Message-ID: <3.0.5.32.19980226093420.007dd2d0@otc.net>



I wrote: 
> 
>>A part of Aukland is finding out.
>>
>>http://www.tampabayonline.net/news/news101l.htm

Peter G replies: 
>It's pretty serious, so far it's affected (at various times) a number of 
>banking data centres (the first day the power went out was on the Thursday 
>when everyones pay is supposed to be processed - the data centres themselves 
>have generators, but the sources feeding them information don't), the stock 
>exchange, some (unidentified) central city post office buildings, customs
and 
>immigration, inland revenue, internal affairs, social welfare, the Auckland 
>City Council, the central police station, Aucklands main hospital and
medical 
>school complex (they have generators, but one of them failed, leaving the 
>childrens hospital without power for awhile), the city campus of the 
>university and technical institute (affecting 30,000 students in the
middle of 
>enrolment), several TV and radio stations, and God knows what else (the 
>government departments have tentacles all over the city, so it's not so bad 
>for them).  Although many of these places have generators, there were
various 
>glitches in switching over and one or two breakdowns which have caused 
>problems, and most of the generators can't handle anywhere near the load
being 
>placed on them but were designed to power only essential services.  One 
>comment I've heard is that the power company may not survive the lawsuits 
>which follow this (taking out some suburb is serious enough, but taking out 
>the central business district with its cluster of multinational accounting
and 
>legal firms, banks, government departments, and whatnot is really bad).
> 
>There's fairly detailed coverage of what's going on at 
>http://www.cs.auckland.ac.nz/~pgut001/pubs/power.txt, with a temporary
copy at 
>http://www.kcbbs.gen.nz/users/peterg/power.txt (the Auckland site doesn't
have 
>power at the moment, the other one is located outside the city centre, I'll 
>move things to the first site once power is restored).
> 
>Peter (usually pgut001 at cs.auckland.ac.nz when we have power).
>
------------------------------------------------------------
      David Honig                   Orbit Technology
     honig at otc.net                  Intaanetto Jigyoubu

 The Internet Protocol's only guarantee is that your packets will not clog
the net.






	
















From sherman at cs.umbc.edu  Thu Feb 26 10:29:16 1998
From: sherman at cs.umbc.edu (Dr. Alan Sherman)
Date: Thu, 26 Feb 1998 10:29:16 -0800 (PST)
Subject: DES search
Message-ID: 


Why doesn't someone speed up the DES search with Hellman's
time-space tradeoff, whose precomputation could be done within
a month?

Alan T. Sherman
sherman at cs.umbc.edu






From honig at otc.net  Thu Feb 26 11:01:20 1998
From: honig at otc.net (David Honig)
Date: Thu, 26 Feb 1998 11:01:20 -0800 (PST)
Subject: bugging the swiss
Message-ID: <3.0.5.32.19980226100004.0079cb10@otc.net>


	
Mossad was busted for bugging Swiss telephones today.

http://www.newsday.com/ap/rnmpne0j.htm

Swiss Claim Israelis Were Spying

                     By IRENE HARNISCHBERG Associated Press Writer

                     BERN, Switzerland (AP) -- Switzerland said today it
had caught Israel's spy agency in an attempt to bug
                     telephones on the outskirts of the Swiss capital. It
was the third highly publicized Mossad bungle to
                     embarrass the Israeli government in recent months, and
angered Swiss leaders.

                     ``The least Israel can do is apologize quickly,'' said
spokesman Franz Egle of the Swiss Foreign Ministry,
                     which formally protested the alleged bugging attempt
as a violation of national sovereignty.

                     Israel radio said the Israeli agents were trying to
eavesdrop on Iranian diplomats, but Swiss officials denied
                     the report, saying the targets were neither Iranian
nor diplomats.

......
------------------------------------------------------------
      David Honig                   Orbit Technology
     honig at otc.net                  Intaanetto Jigyoubu

 The Internet Protocol's only guarantee is that your packets will not clog
the net.






	
















From bear at gargoyle.apana.org.au  Thu Feb 26 11:27:08 1998
From: bear at gargoyle.apana.org.au (Charles)
Date: Thu, 26 Feb 1998 11:27:08 -0800 (PST)
Subject: From Peter Gutmann  Re: So what *does* happen to a city  wit
In-Reply-To: <3.0.5.32.19980226093420.007dd2d0@otc.net>
Message-ID: <199802261924.FAA25202@gargoyle.apana.org.au>


On 26 Feb 98 at 9:34, David Honig wrote:

> I wrote: 
> > 
> >>A part of Aukland is finding out.
> >>
> >>http://www.tampabayonline.net/news/news101l.htm
> 
> Peter G replies: 
> >It's pretty serious, so far it's affected (at various times) a number of 

Strangely enough (Auckland is just a 3 hour flight ESE of here) at
almost the same time Aucklands power went down Brisbane in
Queensland Australia had its own power problems from last Sunday
through to approx Thursday. Our situation was nowhere near as bad as
Aucklands but it was unusual. The government claimed that all 4 of
our power stations (insert particular fault of the day...I heard
boilers blowing up, pipes getting clogged etc) had an incredibly
unlucky act of god perpetrated on them all at the exact same time
resulting in controlled blackouts to SE Queensland and Brisbane
(excepting the CBD which was not subject to power rationing). The
minister responible claims that it was not due to lack of
maintenance (which would be my guess) but just a one in a billion
chance. I guess we don't have a national power grid here to draw on
during such times.

If anyone has found out what really happened here I'd love to know as 
the pollies usual lies are getting so bad its embaressing.

-- 
   .////.   .//    Charles Senescall           bear at gargoyle.apana.org.au
 o:::::::::///                                   apache at bear.apana.org.au
>::::::::::\\\     Finger me for PGP PUBKEY            Brisbane AUSTRALIA
   '\\\\\'   \\    Apache





From afabbro at umich.edu  Thu Feb 26 13:02:21 1998
From: afabbro at umich.edu (andrew fabbro)
Date: Thu, 26 Feb 1998 13:02:21 -0800 (PST)
Subject: DES search
In-Reply-To: 
Message-ID: 


On Thu, 26 Feb 1998, Dr. Alan Sherman wrote:

> Why doesn't someone speed up the DES search with Hellman's
> time-space tradeoff, whose precomputation could be done within
> a month?

Probably because finding spare CPU cycles on thousands of machines is
easy and free, while finding the disk storage space that you mention
would be expensive, and I doubt distributed.net has the resources.
And people who do have the resources are busy doing other things with
them, or keep them at Fort Meade.

I forget because I haven't read that part of Applied Crypto in a while,
but wasn't it terabytes of storage?

-- 
 Andrew Fabbro [afabbro at umich.edu] [andrewf at jesuswept.com]
 http://www-personal.umich.edu/~afabbro/      313.647.2713 
   "When in Bologna will a Fabbro rise again?" --Dante






From ptrei at securitydynamics.com  Thu Feb 26 13:08:43 1998
From: ptrei at securitydynamics.com (Trei, Peter)
Date: Thu, 26 Feb 1998 13:08:43 -0800 (PST)
Subject: DES, MMX, and FPGAs
Message-ID: <6B5344C210C7D011835C0000F8012766010035E1@exna01.securitydynamics.com>





In DES key search, the speed of a given machine is controlled by three
main factors: clock speed, the algorithm used, and the availability of
multiple issue (the last refers to perfoming 2 or more instructions in
parallel).

Clock speed can be easily factored out for comparison purposes.
Algorithm is harder; a bitslice algorithm is a clear win on 64 bit
machines with lots of registers, but is roughly equivalent to
non-bitslice algorithms on 32 bit machines with a low register 
count (eg, Intel processors, even using MMX).

Multiple issue can greatly speed up a specificly tuned assembly
language version. I can't speak for the non-intel processors below,
but the Pentium code below is all tuned for the vanilla Pentium, and
does not get a boost from the PPro or P2. 

Let's do the numbers:

d.net peak keys per second: 34,430,460,000

cpk (clocks per key) = (equiv * clock speed)/34B

Processor		clock (MHz)	equiv	cpk
DEC Alpha 321064				 142	(4)
DEC Alpha 21066					 220	(4)
DEC Alpha 21064		533		11,264 	 176	(1)
DEC Alpha 21164 (Deschall)			  94	(3)
Sun Ultra I		167		15,316	  75	(1)
SGI r10k					  69	(4)
Macintosh PowerPC 604e  200		68,859	 403	(1)(2)
Macintosh PowerPC 604e  200		         137	(4)
Intel Pentium II        333		22,393   219	(1)(6)
Intel Pentium Pro				 232	(4)(6)
Intel Pentium           166		41,712   203	(1)
Intal Pentium (Bryddes)				 195	(5)
Intel 486DX2		 66	       399,374   775	(1)
Intel 386SX		 20	     7,446,033  4380	(1)

(1) D.net press release.

(2) This figure comes from the press release. I don't believe it 
for a moment. The next line gives a speed determined from a 
posting to the d.net mailing list, and is much more believable - 
if anything, it appears a little slow.

(3) Deschall client

(4) based on d.net mailing list posting.

(5) Sven Mikkelsen's page.

(6) I'm not aware of any fielded bitslice software for Intel MMX
platforms. I suspect that it would not speed things up too much - 
there are simply too few registers, and you'd spend a lot of time
moving stuff in and out of cache. 

I wouldn't be suprised if some of the figures above are incorrect,
but it's clear that the best processors are getting down to 70-100
clock cycles per key. 

Wiener's keysearch engine unrolls the 16 rounds of DES, and is thus
able to run in a similar way to an assembly line; once it's 'filled
up' it tests 1 key per clock cycle. Any other version would run a 
lot slower. 

Some highly uninformed blather about FPGAs follows:

Wiener's paper uses custom VLSI chips, and claims a need for
26k "gates" or 78257 "sites". I'm not sure how this translates to
silicon requirements in FPGAs - it seems that "gate" and "site" are
nominal terms which are not directly equivalent to actual, physical
gates. I've found one reference to a general DES FPGA implementation
which requires 25k gates, though it's not clear if this reuses the
round circuitry, or 'unrolls' it (I suspect the latter, which would
be good).

I'm also not certain if a FPGA running at, for example, 50 MHz, can
actually run logic operations at that speed. Some things I've read
suggest that FPGAs run ops at several clocks per operation - which
is still a lot better than a general purpose microprocessor.

The fastest and largest FPGAs I'm aware of are the Xilinx 4000
series: The xc40125 has about 80,000 gates, and runs at around
100 MHz (and costs $1500!!). 

Suppose we use this chip, and everything works out optimally. We
can fit 3 des engines per chip, and get 300 Mkeys/sec checked. To
duplicate d.net's speed, we would need about 115 chips, or about
$170k for the chips alone. 

A better choice would be the Xilinx Spartan XL series. This might be
in the $20 - $40 a chip, and would run at 80MHz, and would fit only
one des engine. This would be around $9k - $17k, which is still 
pretty high for an individual. 

At this speed (34Gkey/sec), it would still take 12 days to search
half the keyspace, and the prices quoted are for the chip alone, no
boards, chassies, or SW, and the speeds are assumed to be 
1 key/engine/clock, which is optomistic.

On the plus side, implementing a DES cracker in an FPGA actually
affords us some efficiency savings over a non-reconfigurable chip. The
cipher and plaintexts can be compiled into the design, and if you're
willing to reload the chip frequently, the slower-changing portions of
the key can be built in as well. This cuts the gate count
considerably.

I'd really like to see the next DES challenge taken on by some
organization with a few hundred under utilized FPGA boards.

Peter Trei
ptrei at securitydynamics.com














From honig at otc.net  Thu Feb 26 13:55:23 1998
From: honig at otc.net (David Honig)
Date: Thu, 26 Feb 1998 13:55:23 -0800 (PST)
Subject: From Peter Gutmann  Re: So what *does* happen to a city  wit
In-Reply-To: <3.0.5.32.19980226093420.007dd2d0@otc.net>
Message-ID: <3.0.5.32.19980226134354.007ef100@otc.net>


At 05:26 AM 2/27/98 +1000, Charles wrote:
>
 The government claimed that all 4 of
>our power stations (insert particular fault of the day...I heard
>boilers blowing up, pipes getting clogged etc) had an incredibly
>unlucky act of god perpetrated on them all at the exact same time

Several extremely unlikely faults at the same time is what
often causes the great disasters (e.g., Three mi. is.), as is
well-documented in the
comp.risks arena.


------------------------------------------------------------
      David Honig                   Orbit Technology
     honig at otc.net                  Intaanetto Jigyoubu

 The Internet Protocol's only guarantee is that your packets will not clog
the net.






	
















From vcarlos35 at juno.com  Thu Feb 26 13:57:08 1998
From: vcarlos35 at juno.com (vcarlos35 at juno.com)
Date: Thu, 26 Feb 1998 13:57:08 -0800 (PST)
Subject: DES search
In-Reply-To: 
Message-ID: <19980226.163857.9662.0.vcarlos35@juno.com>


A few terabytes of storage isn't THAT expensive.
Let's see:
1,000,000,000,000 bytes
a CDROM holds about 640 MB, which means that 1563 CDs could hold it.
At CompUSA, that were recently selling recordable CD's for $10 for five,
but
with a mail-in $10 rebate which means you're only paying 32 cents for
postage
for 5 CD's. .32*1563=$500 or so.
Add in the cost of a few CD-R drives @ $300 each = $900 for recording.
Combined total=$1400
Within the reach of distributed.net, I would think.

On Thu, 26 Feb 1998 16:01:55 -0500 (EST) andrew fabbro
 writes:
>On Thu, 26 Feb 1998, Dr. Alan Sherman wrote:
>
>> Why doesn't someone speed up the DES search with Hellman's
>> time-space tradeoff, whose precomputation could be done within
>> a month?
>
>Probably because finding spare CPU cycles on thousands of machines is
>easy and free, while finding the disk storage space that you mention
>would be expensive, and I doubt distributed.net has the resources.
>And people who do have the resources are busy doing other things with
>them, or keep them at Fort Meade.
>
>I forget because I haven't read that part of Applied Crypto in a 
>while,
>but wasn't it terabytes of storage?
>

_____________________________________________________________________
You don't need to buy Internet access to use free Internet e-mail.
Get completely free e-mail from Juno at http://www.juno.com
Or call Juno at (800) 654-JUNO [654-5866]






From melder at descartes.coker.edu  Thu Feb 26 14:32:43 1998
From: melder at descartes.coker.edu (Michael Elder)
Date: Thu, 26 Feb 1998 14:32:43 -0800 (PST)
Subject: From Peter Gutmann  Re: So what *does* happen to a city  wit
In-Reply-To: <3.0.5.32.19980226093420.007dd2d0@otc.net>
Message-ID: <3.0.5.32.19980226172749.007bb470@descartes.coker.edu>



	In the New York Times yesterday there was an article about a hacker "game"
where the pentagon said that most unclassified computers were breeched, and
supposedly none of the classified ones were hit, according to the
spokesman. I don't know how much validity my idea has, probably very
little, but if there was a "contest" going on like the article implied,
perhaps it wasn't limited to government computers. AOL went down recently,
along with alot of other power outages, if some computers had been
breeched, how difficult would it have been for someone to cause something
to overload and cause a power outage? But then again, perhaps I have a
vivid imagination.

PS: The article from the NY Times could probably still be accessed from the
archive there at www.nytimes.com

-E.

At 05:26 AM 2/27/98 +1000, Charles wrote:
>On 26 Feb 98 at 9:34, David Honig wrote:
>
>> I wrote: 
>> > 
>> >>A part of Aukland is finding out.
>> >>
>> >>http://www.tampabayonline.net/news/news101l.htm
>> 
>> Peter G replies: 
>> >It's pretty serious, so far it's affected (at various times) a number of 
>
>Strangely enough (Auckland is just a 3 hour flight ESE of here) at
>almost the same time Aucklands power went down Brisbane in
>Queensland Australia had its own power problems from last Sunday
>through to approx Thursday. Our situation was nowhere near as bad as
>Aucklands but it was unusual. The government claimed that all 4 of
>our power stations (insert particular fault of the day...I heard
>boilers blowing up, pipes getting clogged etc) had an incredibly
>unlucky act of god perpetrated on them all at the exact same time
>resulting in controlled blackouts to SE Queensland and Brisbane
>(excepting the CBD which was not subject to power rationing). The
>minister responible claims that it was not due to lack of
>maintenance (which would be my guess) but just a one in a billion
>chance. I guess we don't have a national power grid here to draw on
>during such times.
>
>If anyone has found out what really happened here I'd love to know as 
>the pollies usual lies are getting so bad its embaressing.
>
>-- 
>   .////.   .//    Charles Senescall           bear at gargoyle.apana.org.au
> o:::::::::///                                   apache at bear.apana.org.au
>>::::::::::\\\     Finger me for PGP PUBKEY            Brisbane AUSTRALIA
>   '\\\\\'   \\    Apache
>








From sample at whynot.net  Thu Feb 26 17:43:32 1998
From: sample at whynot.net (sample at whynot.net)
Date: Thu, 26 Feb 1998 17:43:32 -0800 (PST)
Subject: Auction
Message-ID: <3168726_40397477>



This weeks specials at http://www.wildauction.com

All products start at just $1, Higher quantities, low prices!
All auctions close Monday at 10pm Eastern time, International orders welcome.

230 Watt AT Power Supply starting at $1!
S3 ViRGE/DX 3D PCI 4MB Video Accelerator starting at $1!
Datamax P233MMX Multimedia Notebook Debonair starting at $1!
230 watt power supply starting at $1!
Microsoft Windows NT Workstation 4.0 starting at $1!
3.5" Floppy Disk Drive starting at $1!
The Datamax P233MMX Multimedia Reaper starting at $1!
Designer Mid-Tower Case starting at $1!
Microsoft Office 97 Professional 20-Pack starting at $1!
Acer 24x E-IDE CD-Rom Drive starting at $1!
Rockwell 56Kflex Internal Data/Fax/Voice Modem starting at $1!
Intel Pentium II 300MHz Processor starting at $1!
Shuttle Hot255 PCI Wavetable Sound Card starting at $1!
Rockwell 33.6 Internal Data/Fax/Voice Modem starting at $1!
AcerScan 610 Plus Color Flatbed Scanner starting at $1!
8x32 32MB EDO RAM chip starting at $1!
Datamax P233 MMX Multimedia Notebook Excelsior starting at $1!
33.6 Modems (Out of box Special) starting at $1!
Intel Pentium 233MMX Cpu with Fan/Heatsink starting at $1!
Windows 95 OSR2.1 w/ certificate and manual starting at $1!
AcerScan Prisa 310P Scanner starting at $1!
2 x 64 32MB SDRAM chip starting at $1!
Maxtech 1726 17" SVGA Monitor starting at $1!
3 Button 9-pin serial Mouse starting at $1!
Encore 8 port 10Base-T Hub starting at $1!
MGC 1765BA 17" SVGA Monitor starting at $1!
4x32 16MB EDO RAM starting at $1!
MGC 1569 15" Monitor starting at $1!
Datamax Pentium II 300 MHz Multimedia Killer starting at $1!
S3 Trio 64 1MB PCI Video Card starting at $1!
70 Watt Power Amplified Speakers starting at $1!
Microsoft Office Pro 97 starting at $1!
Amptron TXPro Motherboard starting at $1!
Fujitsu 4.3 UltraDMA Hard Drive starting at $1!
Amptron Pentium MMX TX Motherboard starting at $1!





From rdshea at 20315.com  Thu Feb 26 19:43:42 1998
From: rdshea at 20315.com (rdshea at 20315.com)
Date: Thu, 26 Feb 1998 19:43:42 -0800 (PST)
Subject: This is your NEW HOUSE,  or BOAT, or ROLLS ROYCE
Message-ID: <125>



This is your NEW HOUSE,  or BOAT, or ROLLS ROYCE
THIS CAN BE YOUR BEST OF DREAMS! TRY IT!



THIS MAY BE THE MOST SIGNIFICANT LETTER 
                                      YOU WILL RECEIVE THIS YEAR!!
-----------------------------------------------------------------------
***Please,� Follow The Instructions Of This  Letter Very Carefully.       Immediately Make  A Copy,  And Read It Twice.*** 

Subject: It's Only a Game, But You Win Big Money!

Greetings, 

Hopefully my name is still on the list below. I am a retired
attorney, and about two years ago a man came to me with a letter. The
letter he brought me is basically the same as the letter in front of you
now. He asked me to verify the fact that this letter was legal. I told him
that I would review it and get back to him. When I first read the letter I
thought it was some off-the-wall idea to make money. A week later I
met again with my client to discuss the issue. I told him that the letter 
originally brought to me was not 100% legal. My client asked me to
alter the letter to make it 100% legal. I advised him to make a small 
change in the letter and it would be alright.
I was curious about the letter, so he told me how it works. I thought it
was a long shot, so I decided against participating. Before my client
left, I asked him to keep me updated as to his results. About two 
months later he called to tell me that he had received over $800,000
in cash! I didn't believe him so he asked me to try the plan and see 
for myself. I thought about it for a couple of days and decided that 
there was not much to lose. I followed the instructions exactly and 
mailed out 200 letters. Sure enough, the money started coming! 
It came slowly at first, but after three weeks I was getting more 
than I could open in a day. After about three months the money 
stopped coming. I kept a precise record of my earnings and at the
end it totaled $868,439.00.

I was earning a good living as a lawyer, but as anyone in the legal
profession will tell you, there is a lot of stress that comes with the
job. I told myself if things worked out I would retire from practice and
play golf. I decided to try the letter again, but this time I sent 500
letters out. Well, three months later I had totaled $2,344,178.00!!! I
just couldn't believe it. I met my old client for lunch to find out how
this exactly works. He told me that there were a few similar letters 
going around. What made this one different is the fact that there are
six names on the letter, not five like most others. That fact alone
resulted in far more returns. The other factor was the advice I gave
him in making sure the whole thing was perfectly legal, since no one
wants to risk doing anything illegal.
                               
I bet by now you are curious about what little change I told him to
make. Well, if you send a letter like this out, to be legal, you must sell
something if you expect to receive a dollar. I told him that anyone
sending a dollar out must receive something in return. So when you 
send a dollar to each of the six names on the list, you must include a 
slip of paper saying, "Please put me on your mailing list" and include 
your name, mailing address, and email address. (Your phone # is optional).
This is the key to the program! The item you will receive for a dollar you 
send to the six names below, is this letter and the right to earn thousands. 
We will be working together to improve each others lives!

Follow the simple instructions below exactly, and in less than three
months you will receive over $800,000.00 GUARANTEED!!!!!!

A)  Immediately send $1.00 to each of the six people on the list below.
Wrap the dollar in a note (type written or handwritten) saying
"Please add me to your mailing list" and include your name, 
mailing address, and email address. Your phone number is optional:

1) Anthony Thomas  8150 East Hildale St.  Detroit, MI  48234
2) Phillip Smith  24321 Sunnypointe  Southfield, MI  48034
3) Claudia Stephan PO Box 1819 Carmichael, CA 95609
4) Nadia Segun PO Box 1357 Rancho Cordova, CA 95741
5) Lidia Zoring  3500 Data dr. # 147 Rancho Cordova, CA 95670
6) James Thomas 11329 S Peoria St. Chicago, IL 60643


B) Remove the name next to #1 on the list and move the rest of the names
up one position. Then place your name in the #6 spot. This is best done by
typing a new list and taping or gluing it over the old one. Or by saving
this to a text file and editing it yourself and saving the new edited 
copy.

C) When you have completed the above instructions, you have an option
of mailing your new letter out in two ways: 1) Through the U.S. Postal
Service or 2) through e-mail. This letter has been proven perfectly legal
for both ways as long as you follow the above instructions, because you're
purchasing membership in an exclusive mailing list . To mail this 
out over the internet, you can browse through areas and find people to 
send  this to all the time. All you have to do is cut and paste email addresses 
wherever you are on the Internet. Remember, it doesn't cost anything to 
mail on the Internet. Or you can get a Mass Mail Network to mail it
out in large volumes for you.                         

2


One that we recommend is:
Cyber Mail ($15 / 200 names) ($25 / 500 names) ($50 / 1,500 names) 
16500 North Park Dr.
Suite 413
Southfield, MI  48075
(248) 557-7778

Either way will bring big payoffs. If you 
are going to use the traditional U.S. Postal Service to do this program, 
you will want to order a minimum 200 names from a mailing list company. 
Two that have been most effective for these lists are: 

***Be sure to ask for "Opportunity Seekers" and request a list less
      than 30 days old***

S.E. Ring Mailing List ($26 / 200 names)
P.O Box 15061
Ft. Lauderdale, FL 33318 (954) 742-9519

Advon Distributors ($28 / 200 names)
P.O. Box B-11
Shelly, ID 83274 (800) 992-3866

***Keep in mind- there is no limit to the amount of names you can send 
      out.  The more names you send, the more money you'll make.
      We strongly encourage you to mail this letter to family, friends and 
      relatives as well.*** 
     

D) When your mailing list arrives, place one label on a stamped
envelope and drop it in the mail box (Be sure to send out at least 200). 
Within 90 days, you will receive over $800,000. 

E)  Keep a copy of this letter and all the names you receive. Mail it out 
again in about 6 months. But mail it to the addresses you received with 
each dollar. It will work again, only much better.

THIS IS A SERVICE AND IS 100% LEGAL !
(Refer to title 18, Section 1302 & 1342 of the U.S. Postal and Lottery 
Laws)

3                                                           
                                                          

Assume for example you get a 7.5% return rate, which is very conservative.
My first attempt was about 9.5% and my second time was over 11%.

1) When you mail out 200 letters, 15 people will send you $1.00.
2) Those 15 mail out 200 letters, and 225 people will send you $1.00
3) Those 225 mail out 200 letters, and 3,375 people will send you $1.00
4) Those 3,375 mail out 200 letters, and 50,625 people will send you $1.00
5) Those 50,625 mail out 200 letters, and 759,375 people will send you $1.00 

At this point your name drops off the list,
but so far you have received $813,615.00!!!!!

It works every time, but how well depends on how many letters you send
out. In the example above, you mailed out 200 letters, if you mailed out 500
letters, you would have received $2,006,917!! Check the math yourself,
I want you to, but I guarantee it is correct! With this kind of return,
you've got to try it. Try it once and you will do it again!!!

Just make sure you send a dollar to each of the six names on the list with
a note to be added to their mailing list. Together we will all prosper!!!!

PS  You've read this far, so let me ask you one simple question:

Q.                      What do you have to lose??
A.                       Only $ 6.00 

What you can gain is an income, like the example in this letter.
Small Risk, Small Expense, HUGE Potential Return!!!
What do you have to loose?
I invite you to join our mailing list today!!!

Don't throw this away. Keep it, think about it, and in several months you will try it!


I looked at it for over two months and then I said "it's only $6" I have to be nuts not to try it.








From pleontks at hotmail.com  Thu Feb 26 20:18:49 1998
From: pleontks at hotmail.com (Perrin .)
Date: Thu, 26 Feb 1998 20:18:49 -0800 (PST)
Subject: Fwd: Paint War
Message-ID: <19980227041810.1449.qmail@hotmail.com>



remember...................
You Can't Get Someone Whos Already Shot You!!!!!!!!!!
ssssSPLATTTT!!!!   SHMUSH
   *    **     * *  *   *   *   *   *
     *    *   *   *  *  *    *   *
   *     *   *    *     *      *   *    *     *        *
hehe...couldn't resist!!!  
(Hey, wipe the paint off the side of your head...LOL)  :-)


RUMMOR HAS IT THAT THIS IS A PAINT WAR........AND YOU HAVE BEEN
SPLATTED..........SO.......TEE HEE......I GOT YOU FIRST !!!!!
TEE HEE HEEE........NEENER NEENER NEENER.....YOU HAVE BEEN
PAINT SPLATTERED !!!!!!!!!


     You Are Now Officially Involved In
    "Paint War '98"
  
  You Have taken A Severe Shot To The Head.  You must Get As Many People
As
You Possibly Can.


------------
Fixed by Perrin
pleontks at Hotmail.com
http://members.tripod.com/~pleontks
http://www.angelfire.com/az/69frank69

______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com





From dave at bureau42.ml.org  Thu Feb 26 20:48:31 1998
From: dave at bureau42.ml.org (David E. Smith)
Date: Thu, 26 Feb 1998 20:48:31 -0800 (PST)
Subject: DES search
In-Reply-To: <19980226.163857.9662.0.vcarlos35@juno.com>
Message-ID: 


On Thu, 26 Feb 1998 vcarlos35 at juno.com wrote:

> a CDROM holds about 640 MB, which means that 1563 CDs could hold it.
> At CompUSA, that were recently selling recordable CD's for $10 for five,
> but
> with a mail-in $10 rebate which means you're only paying 32 cents for
> postage
> for 5 CD's. .32*1563=$500 or so.
> Add in the cost of a few CD-R drives @ $300 each = $900 for recording.
> Combined total=$1400
Yes, but then you have to be able to read them all too. :) I'm not up on
CD changers, but how much would sufficient changers cost to read from
those 1500+ CDs? (Remember, we only need to read 1560 of 'em since the
CDRs can double as readers... :)

Maybe when DVD-ROM gets out there, and somewhat affordable, but not with
CDs (IMHO OC).

dave



----- David E. Smith, P O Box 324, Cape Girardeau MO 63702
http://bureau42.base.org/people/dave/ dave at bureau42.ml.org

"Quite simply, I'm telling you to GROW UP." -- Dunkelzahn's will






From sara.a.james at usa.net  Thu Feb 26 22:35:41 1998
From: sara.a.james at usa.net (sara.a.james at usa.net)
Date: Thu, 26 Feb 1998 22:35:41 -0800 (PST)
Subject: suggestion
Message-ID: <011297055501222@e-bizness.com>






Visit http:www.sface.com

for free software

Sara James






From dmumford at dmumford.com  Thu Feb 26 06:38:32 1998
From: dmumford at dmumford.com (dmumford at dmumford.com)
Date: Thu, 26 Feb 1998 22:38:32 +0800
Subject: Request for Web Browser Information
Message-ID: <199802220544.AAA00515@speedy.dmumford.com>




Of course, you can always download a copy of NFR and watch as the traffic
passes.

Dodge

Original message:
Date: Sat, 21 Feb 1998 05:51:41 -0800
From: dstoler 
To: cypherpunks at toad.com
Subject: Request for Web Browser Information

I would like to know the information my browser makes available to web sites. I use both Netscape and 
Internet Explorer.

Obviously web sites can determine my IP address for any given session; they can also look at cookies left 
by themselves and other sites.

Can anyone point me to where I can learn exactly what other information is made available (browser 
version?, OS version?, system name?, user name?, etc.)?

Thanks in advance.

David





From jkwilli2 at unity.ncsu.edu  Fri Feb 27 02:57:55 1998
From: jkwilli2 at unity.ncsu.edu (Ken Williams)
Date: Fri, 27 Feb 1998 02:57:55 -0800 (PST)
Subject: (crosspost)  [IWAR] ANONYMITY HTML risk (fwd)
Message-ID: 



---------- Forwarded message ----------
>>From:  
---------- Forwarded message ----------
>From: 7Pillars Partners 
To: g2i list , IWAR list 
Date: Thu, 26 Feb 1998 09:30:06 -0800 (PST)
Reply-To: iwar at sirius.infonex.com
Subject: [IWAR] ANONYMITY HTML risk

Two points: military personal should be particularly aware of this problem, and
users with needs for anonymity should be certain to check out the options
provided by the Anonymizer. --MW

Is Web-Based Mail Bad for Your Anonymity?
 by Steve Silberman 

 5:03am 26.Feb.98.PST
 It's the kind of scare story, posted from an
 anonymous address, that makes the rounds of
 computer security mailing lists and newsgroups.
 This time, however, the scenario was so simple as
 to be highly plausible. 

 The post - made last week to the Cypherpunks
 mailing list - began ominously: "I just had my
 online pseudonym outed to my company's VP of
 marketing, with potentially serious internecine
 political consequences." 

 The author explained that, like many people, he
 maintains two separate email addresses: a work
 account, and an alternate account on a remote
 server at the local college. For the latter, the
 author employs a pseudonym. This, he says,
 allows him to speak his mind about political views,
 as well as his disdain for his employer's use of
 unsolicited bulk emailings - spam - without fear of
 reprisal. 

 The author's cover was blown, he said, the day he
 used Netscape Mail on his workstation to fetch a
 message mailed by his company to his account
 on the college server. 

 So where was the leak? 

 Like more and more email programs, Netscape
 Messenger - along with Outlook Express, Eudora
 4.0 and many free Web-based mail services such
 as Hotmail - offers users the ability to send and
 receive not only text messages, but fully-rendered
 Web pages, in all their graphical glory. If a user
 has both Eudora 4.0 and Internet Explorer, for
 instance, Eudora will borrow IE's HMTL-rendering
 capabilities to display Web pages sent in mail
 messages. 

 The mail targeted by the company to the author's
 pseudonymous address was written in HTML, and
 contained a standard image tag. When Netscape
 opened the mail and rendered the page, the tag
 sent a call to the company's Web server to fetch
 the image, which left a tell-tale footprint - the IP
 address of the author's machine - on his
 employer's logs. Busted! 

 As software designers aim for a seamlessly
 integrated desktop - with multiple email accounts,
 the Web, and local file access all a click away -
 the tools you select for everyday tasks are more
 important than ever. 

 "This isn't really a mail security issue," observes
 Eric S. Raymond, author of a remote mail-retrieval
 utility called fetchmail. "Email security is
 nonexistent anyway unless you use a strong
 end-to-end encryption method like PGP, but that
 wouldn't have helped here. The issue was an
 unintended side effect of having an intelligent
 agent read your mail and go off to the Web to get
 a piece of information. If he'd been using a [text
 mail] program like Elm or Pine or Mutt, he wouldn't
 have gotten bitten." 

 Cryptography consultant Bruce Schneier, author of
 E-Mail Security: How to Keep Your Electronic
 Messages Private, points out that exchanging
 text-only messages and exchanging HTML entail
 different levels of information exchange between
 sender and recipient. 

 "HTML is a robust protocol designed to make
 things run smoothly, therefore it passes a lot of
 information behind the scenes. That's why it's
 useful," he says. 

 Reading Web pages with an HTML-enabled mail
 program doesn't leave any more of a trail behind
 you than surfing through a site - but it doesn't
 leave any less of one, either. 

 You may not even know when you're on the Web
 when you read your mail with a Web-enabled
 program. Several online publications - including
 Wired News - are available in email form, via
 options such as Netscape In-Box Direct. The text
 portion of the publication is sent to your in-box,
 but images may be siphoned from a remote server
 when you open the message. Clicking on links
 may take you out on the Web while you still think
 you're reading mail on your own hard drive. 

 For Simson Garfinkel, author of Web Security and
 Commerce, the lessons to be gleaned from this
 incident are not about text vs. HTML mail
 software, but about workplace rights. 

 "This individual was using his computer at work,
 and he thought that because he was reading
 personal mail on another ISP, his computer was
 not subject to his employer's scrutiny. Employees
 have no rights to privacy in this country," Garfinkel
 says. "If you want to maintain a digital
 pseudonym, don't read your personal mail at
 work." 


Ken Williams

/--------------------------[   TATTOOMAN   ]--------------------------\
| ORG: NC State Computer Science Dept    VP of The  E. H. A. P. Corp. |
| EML: jkwilli2 at adm.csc.ncsu.edu         ehap at hackers.com             |
| EML: jkwilli2 at unity.ncsu.edu           ehap-secure at hackers.com      |
| WWW: http://www4.ncsu.edu/~jkwilli2/   http://www.hackers.com/ehap/ |
| FTP: ftp://152.7.11.38/pub/personal/tattooman/                      |
| W3B: http://152.7.11.38/~tattooman/w3board/                         |
| PGP: finger tattooman at 152.7.11.38                                   |
\----------------[   http://152.7.11.38/~tattooman/  ]----------------/







From cmp at iddqd.org  Fri Feb 27 04:17:29 1998
From: cmp at iddqd.org (Concrete Maintenance Products)
Date: Fri, 27 Feb 1998 04:17:29 -0800 (PST)
Subject: 260298 Concrete Protection & Resurfacing
Message-ID: <199802272451HAA17084@post.intercable.net>


 ===========================================================
  MYTH:
 Concrete will last forever with no protection or maintenance.
 
 FACT: Deterioration starts quietly and instantly. The time to protect
 against costly deterioration is before it begins. 
 ===========================================================
 
 ------------------------------
      CONTENTS
 ------------------------------
 
 1. Protect Concrete
     a. Concrete Conditioner
 2. Repair and/or Resurface Concrete
 3. CMP Web Site
     a. Tour our Web Site

 --------------------------------------
  1. Protect Concrete
 --------------------------------------
 
 When you consider all the elements and wear your concrete is exposed
 to:
 
 ALWAYS BEING RUN OVER
 STEPPED ON AND
 DUMPED ON 
 
 Water, harmful chemicals and abrasion all take their toll on your
 concrete. With all this abuse is it any wonder that concrete does not
 have the long life and good appearance it should have

 -------------------------------------------------------
  1a. THE CONCRETE CONDITIONER
 -------------------------------------------------------
 
*****NOW AVAILABLE TO THE HOMEOWNER*****
 
 Now you can do something to protect your concrete. The Concrete
 Conditioner has been available for commercial and industral use and is
 now available to the home owner.

 *****A Preventive Care Product*****
 
 The conditioner is a liquid treatment that seals your concrete from
 the inside out and makes it dense.  More importantly it transforms the
 surface from a soft limestone to a harder flint like surface.  After
 treatment your concrete is protected from water, salts, harmful
 chemicals and wear.
 
*****DO IT YOUR-SELF*****
 
 The conditioner is safe, easy to use and BEST of all it works.  We 
 have simple do-it-yourself directions.
 
 It's also affordable. It is possible to do your garage floor or drive
 way for less than $100.  When you consider the high cost of
 replacement---every home has $5,000 - $10,000. or more of concrete. 
 Conditioning your concrete is one of the best investments you can
 make. 
 
 >DON'T WAIT TILL YOU SEE WEAR, DAMAGE OR DETERIORATION.
 
 >MAKE PLANS TO TREAT YOUR NEW CONCRETE THE DAY IT IS POURED.  
 
 >CONCRETE OF ANY AGE WILL BENEFIT. 
 
 >STOP OR SLOW DETERIORATION THAT HAS ALREADY STARTED.
 
 -------------------------------------------------------------------------
  2. REPAIR and/or RESURFACECONCRETE
 -------------------------------------------------------------------------

We can provide you with quality surface restoration and protection materials to:
>Clean Concrete
>Repair Cracks
>Patch Concrete
>Resurface Concrete

To make old, cracked, deteriorating surfaces better than new!

*****AT A FRACTION OF THE COST OF REPLACEMENT*****

----------------------------------------------------
  VISIT OUT WEB SITE FOR 
       MORE INFORMATION 
----------------------------------------------------
 
TAKE A BRIEF TOUR OF OUR WEB SITE 
1st Stop -- About Concrete
**A MUST FOR FIRST TIME VISITORS**
Click Here
http://world-space.ids.on.ca/users/cmp/tour/

LEARN HOW TO PREVENT CONCRETE DETERIORATION
Click Here
http://world-space.ids.on.ca/users/cmp/conditioning/prevent.htm

LEARN MORE ABOUT CONCRETE CONDITIONING
Click Here
http://world-space.ids.on.ca/users/cmp/conditioning/conditioning.htm

LEARN MORE ABOUT REPAIRS AND RESURFACING
Click Here
http://world-space.ids.on.ca/users/cmp/randr.htm

 ---------------------------------------------------------------------
     REMOVE ME FROM YOUR LIST NOW
 ---------------------------------------------------------------------
 To be REMOVED from our list send an email to cmpremove at iddqd.org by:
CLICKING HERE
 
*********************************************************************
Concrete Maintenance Products
169 James Avenue
Minneapolis MN  55405






From jya at pipeline.com  Fri Feb 27 04:30:42 1998
From: jya at pipeline.com (John Young)
Date: Fri, 27 Feb 1998 04:30:42 -0800 (PST)
Subject: NYT on Crypto Smoke
Message-ID: <1.5.4.32.19980227123327.00695284@pop.pipeline.com>


   The New York Times, February 27, 1998, p. D1.

   Clinton Continues to Stumble Over the 'E' Word (Encryption)

   By John Markoff

   San Francisco, Feb. 26 -- President Clinton described the
   economic impact of the Internet today in glowing terms to
   an audience of technology investors here, but he failed to
   touch on the issue that increasingly appears to matter most
   to Silicon Valley: the fiery debate over the
   Administration's policy on data scrambling.

   The Clinton Administration has endeared itself to the
   nation's high-technology center by cutting capital gains
   taxes and by calling today for a bill that would bar state
   and local governments from enacting taxes on the Internet
   until 2004. But encryption may prove to be the
   Administration's Achilles' heel in its otherwise friendly
   ties with Silicon Valley.

   The debate over encryption -- which has pitted industry and
   civil liberties groups against law enforcement and
   intelligence agencies -- has sharpened in recent weeks. New
   legislation that would restrict the unlimited use of
   encryption is about to be introduced on Capitol Hill. A
   series of intense behind-the-scenes negotiations over a
   compromise solution between the Clinton Administration and
   a small group of high-technology executives suggests that
   no simple resolution is in sight.

   Encryption policy has become a flash point because it is
   both essential for the growth of Internet commerce and
   vital for the protection of privacy. Techniques that use
   mathematical formulas permit computers to scramble data so
   they cannot be read without access to a special "key,"
   usually a large number that permits a user to unscramble
   the information. Law enforcement officials want to force
   users to put such keys in escrow with independent
   authorities to allow for electronic surveillance in
   criminal investigations.

   President Clinton has told Silicon Valley executives in
   private meetings that he is sympathetic with their
   viewpoint but that he is under great pressure from law
   enforcement and national security officials to put even
   greater controls in place on encryption technology.

   "To us this is really important, but it's just an irritant
   to him," said one Silicon Valley executive who met with the
   President before his speech today and asked not be
   identified further. "His basic message to us was, 'Can we
   get this thing done?' "

   Senators John McCain, Republican of Arizona, and Bob
   Kerrey, Democrat of Nebraska, are circulating a revised
   version of their encryption bill, which includes several
   changes in response to industry and privacy concerns but it
   has so far won few adherents outside of the law-enforcement
   community.

   Critics say the legislation is simply a placeholder for
   future laws that would restrict the use of the technology.

   "Everyone who is looking at the export issue is looking at
   it as a prelude to domestic controls," said Mark Rasch, a
   former Federal prosecutor who is now a specialist in
   encryption and computer security issues at the Science
   Applications International Corporation in McLean, Va.

   Industry opponents of encryption controls, heavily financed
   by high-technology companies, are preparing to announce on
   Wednesday a new coalition, Americans for Privacy, aimed at
   ending restrictions on encryption technology exports.

   At the same time Hewlett Packard plans to announce on
   Friday a new set of encryption technologies, with
   endorsements from the Department of Commerce and companies
   like I.B.M.. These technologies known as the International
   Cryptographic Framework, would let individual governments
   establish potentially conflicting encryption policies -- or
   even place no restrictions.

   Silicon Valley executives argue that the law-enforcement
   demand for the continued ability to wiretap in the
   information age is wishful thinking at best. The easy
   availability of powerful encryption software has made it
   possible for any two people, anywhere in the world to hold
   a secret conversation beyond the prying of even the most
   powerful code-breaking computer, they say.

   The White House is now considering several other industry
   proposals intent on finding a compromise between industry
   and law enforcement interests.

   Another approach that is now being raised in negotiations
   between industry executives and the White House has been
   put forth by executives from Cisco Systems, the company
   that is the dominate provider of Internet routing
   equipment.

   The Cisco proposal, known as Clearzone, would place
   encryption in the network instead of from personal computer
   to personal computer. Then, if a law-enforcement agency had
   a warrant to wiretap, it would be possible to go to an
   Internet provider that could then turn off encryption. But
   this proposal makes no provision for retrieving stored
   information also sought by law-enforcement agents.

   [Photo] President Clinton and Sandy Robertson of
   BancAmerica Robertson Stephens, at a conference of
   technology executives and investors in San Francisco
   yesterday.

   [End]







From jya at pipeline.com  Fri Feb 27 05:06:05 1998
From: jya at pipeline.com (John Young)
Date: Fri, 27 Feb 1998 05:06:05 -0800 (PST)
Subject: KRA Dis-Trust
Message-ID: <1.5.4.32.19980227130857.006a23d8@pop.pipeline.com>


Federal Register: February 27, 1998 (Volume 63, Number 39)
[Page 10040-10041]
>From the Federal Register Online via GPO Access [wais.access.gpo.gov]

-----------------------------------------------------------------------

DEPARTMENT OF JUSTICE

 
Notice Pursuant to the National Cooperative Research and 
Production Act of 1993; Key Recovery Alliance (``KRA'')

    Notice is hereby given that, on October 20, 1997, pursuant to 
Sec. 6(a) of the National Cooperative Research and Production Act of 
1993, 15 U.S.C. 4301 et seq. (``the Act''), the Key Recovery Alliance 
(``KRA'') has filed written notifications simultaneously with the 
Attorney General and the Federal Trade Commission disclosing (1) The 
identities of the parties and (2) the nature and objectives of the 
venture. The notifications were filed for the purpose of invoking the 
Act's provisions limiting the recovery of antitrust plaintiff's to 
actual damages under specified circumstances. Pursuant to Sec. 6(b) of 
the Act, the identities of the parties are: Apple Computer, Inc., 
Cupertino, CA; Cylink Corporation, Sunnyvale, CA; Data Securities 
International, Inc., San Diego, CA; Digital Equipment Corporation, 
Nashua, NH; Golden Star Technology, Inc.,

[[Page 10041]]

Cerritos, CA; Information Resource Engineering, Inc., Baltimore, MD; 
Intel Corporation, Hillsboro, OR; International Business Machines, 
Inc., Somers, NY; Motorola, Scottsdale, AZ; NCR, West Columbia, SC; 
Novell Inc., Provo, UT; Sourcefile, Atlanta, GA; Sun Microsystems, 
Inc., Mountain View, CA; Trusted Information Systems, Inc., McLean, VA.

    KRA was formed for the following purposes: (a) Stimulate global 
electronic commerce by encouraging the harmonization of market driven 
solutions available globally for secure communication using strong 
encryption; (b) serve as a focal point for industry efforts to develop 
commercially acceptable solutions for recovery of encrypted 
information; (c) determine interoperability concerns and potential 
architectural solutions among key recovery technologies and non-key 
recovery technologies; (d) support the development of a global 
infrastructure that supports recovery of encrypted information and (e) 
promote the implementation, deployment and use of interoperable key 
recovery technologies in the market. In furtherance of the foregoing 
purposes, KRA may undertake research, development, analysis, testing, 
study, and experimentation concerning or relating to key recovery 
technologies, and it may engage in the collection, exchange and 
analysis of research information concerning key recovery technologies.

    Additional parties may become members of KRA. KRA will file 
supplemental written notifications disclosing all new members.

Constance K. Robinson,
Director of Operations, Antitrust Division.
[FR Doc. 98-5014 Filed 2-26-98; 8:45 am]
BILLING CODE 4410-11-M








From interactive.services at gartner.com  Fri Feb 27 07:13:05 1998
From: interactive.services at gartner.com (Gartner Interactive)
Date: Fri, 27 Feb 1998 07:13:05 -0800 (PST)
Subject: New enhancements introduced today!
Message-ID: <199802271512.HAA21801@toad.com>


Dear Gartner Interactive User,

We are excited to announce significant enhancements to Gartner
Interactive (http://www.gartner.com).  We have updated Gartner
Interactive to provide more convenient and easy access to your
GartnerGroup research, whether it is from GartnerAnalytics/Research
and Advisory Services, Dataquest, GartnerMeasurement or from an
@vantage Content Partner.

We continue to leverage technology to provide you with the
simplest and fastest way to access your GartnerGroup research.

KEY ENHANCEMENTS INCLUDE:

*Home Page (http://www.gartner.com) - We have redesigned the Home
Page to provide more convenient access to the areas on Gartner
Interactive that are important to you.

*Client Access page
(http://www.gartner.com/public/static/home/clientaccess.html) - Our
redesign makes it easier to access your research and adds useful
information about your relationship with GartnerGroup.  You should
use the Client Access page as your gateway to Gartner Interactive.

*Profiling (http://www.gartner.com/ggbin/profile/personalpage) - With
profiling you may receive automatic e-mail notification of documents
that match the subjects you are interested in.  We have updated
profiling so that profile results are limited to only the documents
to which you already have access.  By default we are excluding
documents that are purchasable online, although you may easily change
your profile to include these documents.  If you haven't already, you
may establish a profile by going to "My Home Page."
(http://www.gartner.com/ggbin/profile/personalpage)
PLEASE NOTE:  If you have already set up a profile and want to
include the titles and summaries of documents to which you do not
have full access, please update your profile by going to the Profile
Management Menu (http://www.gartner.com/ggbin/profile/profmain.pl).

*Search (http://www.gartner.com/ggbin/ggquery) - When searching, the
words you have searched for are automatically highlighted in red and
bolded wherever they appear in a document.  This makes it easy to
scroll through a document and find the words you searched for.

*Purchasable documents - In search, browse and profile results
lists, the documents you do not already have access to are now
excluded by default.  To include them, simply select "Yes" where you
are asked "Do you want to include documents available for purchase
or license in your results?"  Documents you do not have access to
and documents that are available for purchase are now clearly
identified with a $ icon.

*Shop our Store on Gartner Interactive
(http://www.gartner.com/public/static/store/gartnerstore.html) - The
Store provides you with one place to find important and noteworthy
research from GartnerGroup and the @vantage Content Partners that is
available for credit card purchase.

*GartnerGroup Events
(http://www.gartner.com/public/static/events/main.html) - We have
updated this section to provide you with better access to
information on GartnerGroup's events.  You may also register
online for events.  Soon you will be able to keep up-to-date on
future events with our Events e-mail list.

*Leaders OnLine
(http://www.gartner.com/gg/static/leaders/leaders_home.html) - Join
the debate currently underway with Bill Kirwin, GartnerGroup
analyst, and our leaders on Total Cost of Ownership (TCO).
Additional forums will be introduced soon.

*Coming soon on Gartner Interactive:
-Gartner Live
(http://www.gartner.com/public/static/store/gartnerlive.html) will
be broadcasting from GartnerGroup's Predicts, Remote Access, and
Internet and Electronic Commerce conferences.  Stay tuned for more
information.

We have made these changes based on feedback from our clients.
Please tell us what you like and what needs improvement using the
"feedback" link located at the bottom of every page on Gartner
Interactive.

If you would like more information on these changes, please visit
our "About this site" section for additional details.

Best Regards,

Drew Seath
SVP, Interactive Services
Gartner Group, Inc.
==============================================================

To have yourself removed from our updates mailing list, please
send an e-mail to mailto:unsubscribe.updates at gartner.com.

If you have more questions, you may contact us at:
mailto:help at gartner.com.  If you prefer to talk to someone live,
please call the Interactive Services Hotline in the United
States at +1-203-316-3600 or the European Support Centre at one
of the free-of-charge numbers listed below:

Austria:         0660-5815
Belgium:         0800-15171
Denmark:         80-01-87-79
Eire:            1-800-409-139
Finland:         0800-118045
France:          0800-90-8506
Germany:         0130-8142-64
Italy:           1678-76002
Luxembourg:      0800 2886
Netherlands:     06-022-1336
Norway:          800 1 1018
Sweden:         020 795266
Switzerland:     0800-55-8252
United Kingdom:  0800 716089

==============================================================






From honig at otc.net  Fri Feb 27 09:30:19 1998
From: honig at otc.net (David Honig)
Date: Fri, 27 Feb 1998 09:30:19 -0800 (PST)
Subject: FBI national wiretap stalled for $$
Message-ID: <3.0.5.32.19980227092656.007ed320@otc.net>




The telcos don't want to be stuck for the > $500,000,000 cost of installing
the national
surveillience infrastructure.



http://www.newsday.com/ap/rnmpwh19.htm

	
Reno: Impasse on Digital Wiretaps

                     WASHINGTON (AP) -- Attorney General Janet Reno says an
``impasse'' between the government and telephone companies
                     is delaying installation of new technology that would
enable the FBI and other law enforcement agencies to wiretap into new
                     digital phone lines.

                     Under a 1994 law the government was to pay the phone
companies up to $500 million to develop new computer codes and
                     switches and have them installed by next October.

                     The effort, however, was delayed for at least two
years while the FBI and the phone companies battled with each other over
                     the extent of how much wiretapping capability would be
provided.

                     Testifying Thursday before a House appropriations
subcommittee, Reno conceded that meeting law enforcement's future needs
                     will likely cost the phone companies more than $500
million. She said the phone companies have balked at moving forward
                     unless the government agrees to reimburse their costs
above that amount.

                     ``We may be at an impasse,'' she said. ``Simply said,
industry's proposal is that all equipment, services and facilities
installed or
                     deployed as of October 1998 would be deemed in
compliance forever ... unless the government agrees to pay to modify or to
                     upgrade it.''

                     Reno said the Justice Department likely will file a
petition with the Federal Communications Commission next month ``stating
                     that the proposed industry technical solution is
deficient'' and asking the agency to make the phone companies meet law
                     enforcement needs.

                     She said the FBI's electronic surveillance is already
being hampered because of the impasse. But given the six months that the
                     FCC says it would need to decide the case and another
18 months required to install the necessary software and switches,
                     Reno said it may be two years before police agencies'
wiretapping capability fully is restored.

                     Meanwhile, the Justice Department has asked for
another $100 million in next year's budget to reimburse the phone companies.

                     The subcommittee's chairman, Rep. Harold Rogers,
R-Ky., told Reno to not expect any more money until the dispute is
                     resolved.

                     ``I not only hope that it's going to happen; I'm going
to make it happen,'' he said, ``or you won't get any money. I don't know
                     how more bluntly I can put it. You dragged your feet
for three years ..., the industry has dragged their feet. I think it's a
plague
                     on both your houses.''

------------------------------------------------------------
      David Honig                   Orbit Technology
     honig at otc.net                  Intaanetto Jigyoubu

 The Internet Protocol's only guarantee is that your packets will not clog
the network.






	
















From billp at nmol.com  Fri Feb 27 10:57:14 1998
From: billp at nmol.com (bill payne)
Date: Fri, 27 Feb 1998 10:57:14 -0800 (PST)
Subject: cyber FOIA/settlement e-mail
Message-ID: <34F70889.508F@nmol.com>


Friday February 27, 1998 11:18 AM

By e-mail and US mail

Lieutenant General Kenneth A Minihan, USAF
Director, National Security Agency
National Security Agency
9800 Savage Road
Fort George G. Meade, MD 20755-6000

Dear General Minihan:

Purposes of the letter are to

1  request information under the Freedom of Information Act
2  explore settlement possibilities of our current lawsuit.

In about 1986 Sandia National Laboratories assigned me the 
task of  design and construction of a Comprehensive Test Ban 
Treaty seismic data authenticator.

In the initial stages of the project, Sandia cryptographer 
Gustavus Simmons attempted to convince both Sandia 
management and NSA employees Tom White, Mark Unkenholtz,
and Ed Georgio that a form of public key authentication should 
replace NSA employee Ronald Benincasa�s National Seismic
Station/Unmaned Seismic Observatory 11-bit data authentication
algorithm.

My Sandia supervisor John Holovka and project leader H B [Jim]
Durham ordered me to write a paper explaining public key 
cryptography.

This paper,  RSA ENCRYPTION, along with my SAND report
describing my implementation of Benincasa�s algorithm and
filings in our lawsuit, now appear on Internet at
http://www.jya.com/index.htm, click CRYPTOME, then OpEd,
then http://www.jya.com/whprsa.htm.

Sandia explored the merits of switching from Benincasa�s
algorithm to a public key-based authentication method suggested
by Simmons.

For Sandia�s evaluation of the merits of public key, electronic tagging,
and Bureau of Engraving and Printing projects ,  I bought for Sandia 
samples both the Cylink CY1024 and AT&T A & B two chip sets for
modulo m arithmetic computations.

NSA employee Tom White sent me a copy of the SECRET classified
NSA report on IBM�s hardware public key chip FIREFLY.

I wrote in my tutorial paper

  RSA hardware computations

  The slow speed of software RSA computations plus the potential
  wide use prompted several companies to build chips which compute
  modular arithmetic to at least several hundred bits.  Most of
  these chips "cascade" to compute with a larger number of bits.

  Corporations involved in building these chips are

     1  IBM  Firefly

     2  AT&T

     3  Motorola (apparently a three chip set)

     4  Cylink   Pittway-First alert

     5  Sandia Labs (Algorithm M and predecessor chip)

  Details of the IBM chip is classified.  AT&T as of July 1987 has
  not released details of their chip.  Little information is
  available on the Motorola chip set.

  The Cylink chip is commercially available.  Its price dropped
  from $1,500 to $600 each in June 1987.  Data is transferred to
  and from the chip with serial shift register communication.

  The early Sandia chip was limited in speed.  The replacement
  chip is cascadeable, communicates with 8 or 16 bits parallel,
  matches the speed of the Cylink chip, but is not out of
  fabrication.

  Rumors circulate that there is about an order of magnitude
  performance difference between some of these chips.

  These hardware chips improve exponentiation speed about 3 orders
  of magnitude over software implementation benchmarked on an Intel
  8086 family microcomputer.

Whitfield Diffie writes about both the Cylink and Sandia chips.  And
is quoted at  http://www.aci.net/kalliste/nukearse.htm.

Sandia had terrible luck with its public key chips.  

I reported SOME of the troubles to Electronic Engineering Times editor
Loring Wirbel [http://techweb.cmp.com/eet/823/] on March 23, 1994.

        Dr. John Wisniewski was a supervisor at Sandia's Center for
        Radiation-hardened Microelectronics.  Wisniewski was a graduate
        student at Washington State University in about 1975.  I was a
        professor at WSU.

        Wisniewski knows all about the failing Sandia chips in the
nuclear
        arsenal.  I took notes on February 13, 1993.  Wisniewski
reviewed
        the problems again for me.

             1    No quality initiative.  Each chip lot had a different
                  process.
             2    Overall yield - 40-50%.  Down to 10% after packaging.
             3    Metalization problems.  No planarization.  No flow of
                  glass.  Couldn't use high temperature.  Step coverage
                  problems.  Layed down over tension.  100% field
returns
                  over several years.
             4    Sandia would store lots of parts for replacements.

        Sandia management made the decision to place low yield parts in
        the nuclear arsenal.  Sandia must meet DOD schedules management
        reasoned.  Hundreds of millions spent on CRM.  Sandia must show
        productivity.

        Wisniewski told me that low yield chip test survivors are those
which
        the tests failed to detect failures.  Wisniewski will talk. 
503-625-
        6408.  Wisniewski now works for Intel in Oregon.  Have
Wisniewski
        tell you about the fire in the CRM clean room!

Sandia supervisor Jerry Allen later told me it cost $300,000 each to
remove
Sandia�s failing chips at Pantex from a nuclear bomb.

NSA apparently is biased toward hardware implementations of
cryptographic
and authentication algorithms.  As opposed to software implementation.

NSA representatives and Sandia management decided not to use a public
key authentication scheme for its CTBT seismic data authenticator
because
of all of the problems with implementing public key algorithms.

But NSA surely has spent MUCH MONEY on public key chip implementations.

NSA is promoting its Clipper crypto chips as described at
http://cpsr.org/dox/clipper.html.

And we get some information about technical specifications of NSA�s
Clipper
chip at http://www.us.net/softwar/http://www.us.net/softwar/clip.html

  Clipper Chip Information

  MYK-78 CLIPPER CHIP ENCRYPTION/DECRYPTION  ON A CHIP 

     1 micron double level metal CMOS technology 
     0.35 watts power 
     28 pin plastic leaded chip carrier (PLCC) package 
     Transistor to transistor logic (TTL) interface 
     Chip ID, family key and device unique key are installed at
programming. 
     Chip ID, family key and device unique key are installed at
programming           facility and are completely transparent to the
user.

Therefore, Under the provision of the Freedom of Information Act, 
5 USC 552, I am requesting access to: 

1  Copies of all invoices from

	A   AT&T
	B   Motorola
	C   IBM
	D  Sandia National Laboratories

to NSA for payments for developing ANY public key-related chips between
January 1, 1980 and February 27, 1998.

2  Copies of all invoices to NSA from ANY corporation involved in
development
of ANY Clipper chip-related hardware between January 1, 1980 and 
February 27, 1998.

The public has a right to know how much NSA spent on TRYING monoploize
the crypto
business.

If there are any fees for searching for, or copying, the records I have 
requested, please inform me before you fill the request.

As you know, the Act permits you to reduce or waive the fees when the 
release of the information is considered as "primarily benefiting the
public."  
I believe that this requests fits that category and I therefore ask that
you waive 
any fees.

If all or any part of this request is denied, please cite the specific
exemption(s) 
which you think justifies your refusal to release the information and
inform 
me of your agency's administrative appeal procedures available to me
under the law.

I would appreciate your handling this request as quickly as possible,
and I look 
forward to hearing from you within 20 working days, as the law
stipulates.

With respect to our current FOIA lawsuit, I feel that we should settle
this
unfortunate matter.

I see from your biography at  http://www.nsa.gov:8080/ and
http://www.nsa.gov:8080/dirnsa/dirnsa.html that you are

         1979   Distinguished Graduate
         Master of Arts degree in National Security Affairs 
         Naval Postgraduate School 
         Monterey, California

One of my former M.S. and Ph.D students in Computer Science,
Ted Lewis, is currently the chairman of Computer Science at
Naval Postgraduate School [http://www.friction-free-economy.com/].

Small world.

But I think that this emphasizes that WE SHOULD all be on the same side.
Not engaged in a conflict in US federal court.  Or on Internet.

NSA attempts to withhold requested information are possibly unwise.  

In our wired world the aggrieved know what happened to them.
http://www.wpiran.org/,http://www.netlink.co.uk/users/impact/namir/namirm.html

And moderates in Iran, http://persia.org/khatami/biography.html, appear
want
settlement too.

My family and I have been damaged by these crypto wars.

I ask you that consider fair settlement of damages caused by the
National
Security Agency.

I cannot find your e-mail address on Internet.

Therefore I will forward the e-mail copy of this FOIA/settlement letter
to 
Ray Kammer of NIST [http://www.nist.gov/], who along with the FBI 
[http://www.fbi.gov/, http://www.fbi.gov/fo/nyfo/nytwa.htmand], and NSA 
are trying to control the crypto business so that Kammer can possibly
forward an e-mail copy of the FOIA/Settlement letter to you.

Sincerely,

bill

William Payne
13015 Calle de Sandias
Albuquerque, NM 87111
505-292-7037 [I am not reading e-mail]







From pbx at shell.monmouth.com  Fri Feb 27 11:25:43 1998
From: pbx at shell.monmouth.com (William Towey)
Date: Fri, 27 Feb 1998 11:25:43 -0800 (PST)
Subject: FBI national wiretap stalled for $$
Message-ID: <199802271925.OAA18807@shell.monmouth.com>










From lreed at west.cscwc.pima.edu  Fri Feb 27 13:48:37 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Fri, 27 Feb 1998 13:48:37 -0800 (PST)
Subject: Prologue 5/0
Message-ID: <009C2717.6A6E31C0.72@west.cscwc.pima.edu>







From lreed at west.cscwc.pima.edu  Fri Feb 27 13:49:14 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Fri, 27 Feb 1998 13:49:14 -0800 (PST)
Subject: Prologue 5a/0
Message-ID: <009C2717.82F09BC0.78@west.cscwc.pima.edu>







From lreed at west.cscwc.pima.edu  Fri Feb 27 13:50:04 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Fri, 27 Feb 1998 13:50:04 -0800 (PST)
Subject: Prologue 5c/0
Message-ID: <009C2717.9EA050E0.80@west.cscwc.pima.edu>







From lreed at west.cscwc.pima.edu  Fri Feb 27 13:54:51 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Fri, 27 Feb 1998 13:54:51 -0800 (PST)
Subject: Prologue 3/0
Message-ID: <009C2718.4A375160.13@west.cscwc.pima.edu>


~       SPACE ALIENS HIDE MY DRUGS / PROLOGUE 3/0
	�����������������������������������������

The Most Dangerous Man In Lost Wagess:
  They had followed him from the CypherPunks physical meeting 
to the outskirts of Las Vegas, before losing him. Two days of
frantic searching by a variety of law enforcement agencies 
led to the Plaza Hotel and Casino, where he was playing the
penny slot machine and associating with a variety of local
riff�raff and no�accounts.
  An in�depth consultation with the Plaza head of security
revealed that they had been keeping a close eye on the
subject for the last two days.
  
  "He doesn't cause any real trouble, or anything," the
head honcho said, shrugging, "but everything about him
seems just a little strange, if you know what I mean."
  This comment seemed designed to elicit some sort of
response from the poker�faced men questioning him, but
they failed to respond, merely waiting for him to 
continue.
  "He buys ten dollars worth of pennies," and tips
the change lady a dollar. "He plays for hours on
end, also tipping the waitresses a dollar every
time they bring him a free beer. Hell, he even tips
the cleaning people when they clean his ashtray."
  The honcho shook his head, as if this type of
behavior from someone spending most of their time
playing the penny slots was puzzling and also
disconcerting.
  "Sleeps in his car, with his dog. Only leaves the
slot machines to feed, water, and run his dog around
our parking lot. It's kind of unnatural, the way he
seems to dote on that animal."�� the security honcho
winked knowingly.

  "Has he met with anyone who doesn't usually 
frequent your casino?" one of the men asked,
impatiently, tired of hearing odd details of the
man's lifestyle which seemed intriguing to the
denziens of normality that they were constantly
having to interview in regard to the subject's
movement and activity.

  "He ran into some legal�eagle named Larry Joe,"
the honcho said, noting the first sign of interest
shown by his interrogators. "My second�shift security
chief says he's a middle�weight poker player, taking
part in a tournament at the Rio..." adding with a
knowing tone, "but the mouthpiece is hanging with
one of the heavy hitters on the local poker scene."

  "Larry Joe Dowling, an Austin attorney." one of
the interrogators said to the others. "He usually�j
We'd better shift our surveillance team into
high gear."
  The man rose to leave, telling the others, "Dig
up all you can here, file a report, and get some
sleep. You're going to need it."


Boogers? We don't need no stinking boogers!:
  The agent pulled out his hanky and wiped the disgusting
mess off of his jacket sleeve.
  "I can't believe that they pulled us off of the
Tim May detail to check out this fucking loser."
  "Shit!" he screamed, as he brushed his arm against
the steering column and picked up another piece of
disgusting slime on his jacket sleeve.

  "I've shaken down this guy's personals before." the
man's partner said, with a grin. "That's why I gave
you the driver's side of the vehicle to check out."
  "He feeds his nose�candy to his dog, and he always
leaves her a little desert on the steering wheel
for her to chow down on after he brings her back
from her walk." He laughed as he saw the bile
rising to his new partner's throat.
  He couldn't help himself��he reached over and
plucked a booker off of the horn button and told
his partner, "I'll trade you a green one for a
yellow one..."
  His partner lurched out of the vehicle and
concentrated on tossing his lunch while not messing
up his shiny new shoes.

  The more experienced agent finished snapping photos
of the gathered items and then replaced them carefully
in the same position they had been in before their
intrusion.
  "He usually walks Baby for about ten minutes, to 
give us time to make a complete pass of his vehicle,
so our time is about up." The agent closed and 
locked the doors of the vehicle, motioning his
green�faced partner toward their vehicle.


It's A Nuke! No, It's Anthrax! No, It's...AAARRGGGHHHH!!!":
  Justin Case, Special Agent in Charge of the current
investigation, was bothered by the fact that the suspect
had seemed to be doing nothing more than wandering around
various sites and casinos in Las Vegas, with no apparent
pattern or plan to his movement and actions. Until he
read the report of the suspect's lingering interest in
the placement of the columns serving as the foundation 
for the Stratosphere Casino, and the layout of the
preliminary work on the new Foley Federal Building�j

  "Soft targets." agent Case said out loud, causing
a considerable amount of disconcertment to his fellow
agent, Bobby Siller.
  "Damn!" Siller swore, "We have reports of him having
met with Leavitt and Harris, but we didn't have any
taps on them, so we don't have any details of what
they are planning."

  "Don't worry about it," Case seemed unconcerned, "if
he's scouting soft targets, then he's not planning any
sudden moves."
  "Patience comes to those who wait." Justin Case said,
softly, quoting the Author, and making a mental note to
have agent Siller shake the Anthrax Twins down a few
days after the suspect departed Vegas.

  "Hold it!" agent Siller shouted, motioning for his
superior to remain silent, as Siller adjusted his
earpiece to more clearly hear the live report he was
receiving from his agents at the Riviera gun show.
  "The suspect went into the gun show empty handed,
and left with several copies of 'Gun List' and then
returned to his vehicle. He took his dog for a walk
and our agents discovered a 'Dalian' watch wrapped
in tear�outs from the firearms paper, dealing with
Romanian AK rifles and Bulgarian SLR�95's. The 
'Dalian' watch is some type of Polish/Chinese make,
or something."

  Justin Case rolled his eyes, but remained silent.
The suspect was yanking the chains of the agents who
were shaking down his personals, and it looked like
Siller's men didn't have the experience to know when
they were being toyed with.
  The agent that Case had pulled off of the Tim May
detail would be wise to the suspect's shenanigans,
but it was unlikely he would get in the way of
Siller's men making fools of themselves.

  "He's returning to the casino, using the copies
of 'Gun List' to hide whatever it is he's carrying."
agent Siller said, with great excitement.
  "I think we ought to take him in the parking 
garage, before he reaches the main building at the
Riviera." Siller anxiously awaited the word from
his superior.
  "Maintain." was Case's nonchalant reply, causing
Siller to have an ill�disguised internal shit�fit.
If this operation went totally to hell, it would
be Siller's ass on the line, being the Las Vegas
station chief.





From lreed at west.cscwc.pima.edu  Fri Feb 27 13:55:26 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Fri, 27 Feb 1998 13:55:26 -0800 (PST)
Subject: Prologue 3a/0
Message-ID: <009C2718.5FE98460.15@west.cscwc.pima.edu>


SAHMD 3A
��������
  "Maintain," Siller told his agents, but couldn't help 
adding, "and disclose."
  This was a vague term meant to signal his men to 
intercept the suspect and do a bump�and�run on him
to sniff out what it was he was hiding��without alerting
Siller's superior that his orders were being countermanded.

  "The Electronic Privacy Papers." agent Case said, to no
one in particular.
  "What?" Siller asked, perplexed.
  "Documents on the Battle for Privacy in the Age of
Surveillance, by Bruce Schneier and David Banisar,
ISBN: 0�471�12297�1."
  Much to agent Siller's consternation, his superior
continued, "That's what your men are going to discover
he is hiding furtively under those copies of the 'Gun
List' magazines when they disobey my orders and risk
blowing their cover."

  "It's the suspect's form of humor." Justin Case
smiled at his subordinate's discomfort.
  "He's laughing at all the spooks from various
agencies, including yours and mine, who are at the
gun show shadowing the Anthrax Twins, the Samsonite
Nuclear Warrior, and various members of the Loose�Screw
Gun Nut Club."
  Seeing the confused look on agent Siller's face, he
explained further. "The suspect is laughing because
he believes he is carrying the most dangerous weapon
available at the gun show."

  "And he's probably right..." Case said, with a far�
away look in his eyes that sent shivers down agent
Siller's spine.
  Special agent Justin Case took a tattered copy of
a paperback titled, "Paper Prison" out of his inside
jacket pocket, and stared at it��lost in a universe
that belonged far in the past, but which seemed to
be intersecting the present in a manner which bode
nothing but ill for those who continued to live in
both.

  "The future is now..." Justin Case said, in a low
monotone voice that seemed to come from a world beyond
the one in which he and agent Siller were so diligently
pursuing the 'Threat of the Day'.

  "He's carrying a book." the voice came crackling
through Siller's earpiece.
  "Never mind." Siller said, adding, "Maintain."

  "Maintain." Siller repeated inwardly, to himself,�j
crept up his spine and into the lower regions of
his mind as he observed the strange, semi�hypnotic
state that his superior had entered into.
  "Maintain."





From JWRCLUM at aol.com  Fri Feb 27 14:10:12 1998
From: JWRCLUM at aol.com (JWRCLUM)
Date: Fri, 27 Feb 1998 14:10:12 -0800 (PST)
Subject: Medical Privacy Alert  ---  please redistribute to all concerned
Message-ID: <476eb078.34f7399b@aol.com>


AMERICAN CIVIL LIBERTIES UNION OF MASSACHUSETTS
99 Chauncy Street, Suite 310, Boston, MA 02111
(617) 482-3170  Fax (617) 451-000


CONTACT:	John Roberts
(617) 482-3170     http://users.aol.com/mcluf/home.html

BENNETT-JEFFORDS BILL PLACES MEDICAL RECORD PRIVACY AT RISK

	The confidentiality of the doctor-patient relationship will be totally
undermined as medical records become widely available without patient
knowledge or consent.	

	BOSTON - February 27, 1998.   On Thursday 2/26/98 the United State Senate's
Labor and Human Resources Committee heard testimony concerning a bill proposed
by Senators Bennett and Jeffords that, if passed, would license the widespread
disclosure of personal medical information contained in files held by doctors,
hospitals, employers, educational institutions, and others.
	The bill which purports to be a privacy bill is, in fact, just the opposite.
It places virtually no restrictions on the disclosure of personal medical
records within health care entities (no matter how large and geographically
widespread) or to a long list of other entities and agencies including the
following:  
	-  any agents or contractors of the health care entities 
	-  Public Health Agencies, Oversight Agencies
	-  Health Care Accreditation Agencies
	-  State Health Care Databases
There are major loopholes in access provisions for
	-  Health Care Researchers
	-  "Outcome" analysts ("cost/benefit" analysts for hospitals, HMO's,
insurers, etc)
	
	Even law enforcement agencies will have easy access to browse computerized
medical record systems for so-called "legitimate" investigatory purposes.
This will make every American's medical record part of a new massive law
enforcement database.
	The bill will destroy the confidential "doctor-patient relationship" and
replace it with a new "patient-health care industry relationship."
	"This bill serves only the interests of the burgeoning health care industry,"
said John Roberts, Executive Director of the ACLU of Massachusetts.  "It
allows the transfer of your medical records to many entities that stand to
profit from its information.  Gone is doctor-patient confidentiality.  Your
doctor cannot protect your most sensitive medical information from many
entities outside your medical facility.  Even employers who have health plans
are considered 'health care providers' in the Bennett-Jeffords bill.  How many
of us want our employers to have access to any of our medical records without
our knowledge or consent?"  
	The bill will also
	-  Impose requirements that patients sign blanket consent forms for release
of information as a condition of getting treatment, even for self-pay patients
	- Redefine "treatment" to make the patient's record a subject of continuous
research
	- Blur the boundaries between individual patient care and the so-called
"Population Management" and "Disease System Management"
	The bill will pre-empt all state laws which may be more protective of the
confidentiality of medical records.
	The bill will not apply even its own minimal privacy protections to so-called
"non-identifiable" medical records information.  But...interestingly, the bill
also refers to issuing "keys" to re-identify previously purportedly "non-
identified" information.  A formal logical analysis of this reveals that the
bill itself admits that what it calls "nonidentifiable" medical record
information is actually identifiable (i.e. containing patient information).
	The ACLU of Massachusetts believes that what is really needed for medical
privacy protection would be the following:
	-  Federal law should set a foundation or floor of privacy protection
	-  State laws which are more-protective of patient's rights should not be
preempted 
	-  No "Unique Patient Identification Numbers"
	-  No electronic "linkage" of patient records stored in various sites
	-  Computerized patient records must be encrypted with keys provided only to
those directly involved in the individual patient care
	-  The right of the individual patient to contract directly with physicians
and health care providers regarding the privacy of the patient's medical
records.

	-end-




 

 







From bill.stewart at pobox.com  Fri Feb 27 14:20:41 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Fri, 27 Feb 1998 14:20:41 -0800 (PST)
Subject: Killing the Unabomber
In-Reply-To: <199802250642.BAA03918@panix2.panix.com>
Message-ID: <3.0.5.32.19980227124515.008aa420@popd.ix.netcom.com>


>   >   : Didn't the government finally back down on their
>   >   : attempt to legally kill the Unabomber?  
>   >   This point strikes me as pretty funny.  Kinda like a nurse rooting
>   >   for Charles Starkweather.

>Or trying to be consistent.
>Raygun: abortion is killing, but pro-death penalty.
>If killing is wrong, killing again is wrong.

No consistency involved - many of them would like to kill him.
But they've Got Their Man, and he's made it clear that a trial
will be difficult, long, expensive, involve lots of firing lawyers
and arguing about mental competency, and generally be trouble,
and he's offered to plead guilty if they won't kill him.

Even though he's a highly intelligent cold-blooded killer,
he's also close enough to crazy that the public will have
enough sympathy for him that killing him won't be highly popular,
especially because his brother wouldn't have turned him in
if he'd expected him to be killed.

Also, while his killings have been somewhat scary and weird,
they haven't generated the kind of public outrage that the
OKCity bombing did, with dead babies on the front page of the papers.
The defendents there are going to get killed, and the public
is going to enjoy it, and the Neilsen Ratings will be high.

>Next time, the killer might not be caught because
>the person who recognized (yea traffic analysis)
>his talktalk might not want them killed as a result.
>i.e. in the long run it will save lives.

I think you're right here.
				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From wowcom at ctia.org  Fri Feb 27 14:30:14 1998
From: wowcom at ctia.org (wowcom at ctia.org)
Date: Fri, 27 Feb 1998 14:30:14 -0800 (PST)
Subject: WOW-COM News Update
Message-ID: <34F2A7B8.5CD9EAE7@ctia.org>


======================================================
 This update is sponsored by Hughes Network Systems
 http://www.hns.com/2CAREERS/careerMain.html

 ======================================================
 WOW-COM named a "TOP WEBSITE" by Mobile Computing & Communications
 Magazine (2/98)

 Dear WOW-COM Reader:

 WOW-COM(TM) is the wireless industry's online information source, a
 free service of CTIA.  The world of wireless is in constant motion.
 Stay on top of the news  and benefit from CTIA's analysis by reading
http://www.wow-com.com  everyday.

 INDEX:
 ======
 1) LARGEST WIRELESS INDUSTRY SHOW, WIRELESS 98, BEGAN TODAY IN ATLANTA,

GA.

 2) CTIA AGAIN CALLS ON FCC TO TAKE ACTION ON WIRETAP STANDARDS

 3)  CTIA ASKS FCC FOR IMPROVEMENTS IN ENHANCED 9-1-1 RULES


 **WIRELESS JOB OPPORTUNITY OF THE WEEK***********

 http://www.hns.com/2CAREERS/careerMain.html

 Company:   Hughes Network Systems
 Job Title: Senior Digital Design Engineer - Hardware
 Location:  Germantown, MD - US
 Job Description:   Lead digital design engineer for satellite
 baseband communications hardware.  Position requires experience in
 design of digital communications subsystems such as modulators,
 demodulators, digital filters, NCOs and FEC encoders/decoders.
 Requires BSEE (MSEE preferred) and 7-10 years of digital design
 experience with emphasis on communication circuit design.

 **********************************************************************

 WIRELESS 98 TO BEGIN NEXT WEEK IN ATLANTA
 ==========================================================


 http://www.wow-com.com/professional/convention/

 CTIA's WIRELESS 98 is breaking all records.  Sessions at the largest,
 global wireless convention feature hot topics and top industry
 speakers.  On February 23-25, join the largest gathering of analysts,
 CEO's, equipment suppliers, hardware manufacturers, network operators,
 retailers, regulators, software developers and venture capitalists
from around the world for the most comprehensive wireless
 telecommunications exposition - - WIRELESS 98. It's only 6 days away!
 Don't miss it!

CTIA AGAIN CALLS ON FCC TO TAKE ACTION ON WIRETAP STANDARDS
 =========================================================

 http://www.wow-com.com/professional/WirelessDigest/

 The Cellular Telecommunications Industry Association has filed
 comments with the Federal Communications Commission again asking
 that it take several steps in regard to implementation of the federal
 Communications Assistance for Law Enforcement Act. CTIA points
 out that the telecommunications industry has moved forward
 towards timely implementation of the Act, but that the law enforcement
 community, represented by the Federal Bureau of Investigation, has
continued to delay the process.  Read it here.  Simply click above for
full text.


 CTIA ASKS FCC FOR IMPROVEMENTS IN ENHANCED 9-1-1 RULES
 ==========================================================
 http://www.wow-com.com/results/professional/news/index.cfm

 "Enhanced 9-1-1" will provide the next generation of emergency
 services for wireless phone users.  The basic outline for Enhanced
 9-1-1 services was developed jointly by the public safety
 communications community and CTIA.  In a petition filed yesterday,
 CTIA points out that the FCC should improve wireless emergency calls
 throughout the United States.  To learn more about CTIA's petition and
 other implementation issues regarding 9-1-1 please click above.


 =============================
 MORE WOW-COM(TM) FEATURES
 =============================
 WOW-COM(TM) is current: Routine Updates throughout the business day
 WOW-COM(TM) is insightful: CTIA's unbiased analysis
 WOW-COM(TM) is beneficial: Find products and services in
 WOW-COM(TM)'s Virtual Trade Show.   List open positions
 in the WOW-COM(TM) Career Center, receive resumes via email
 and hire qualified individuals.

 ========================================================

 This update sponsored by: HUGHES NETWORK SYSTEMS
 http://www.hns.com/2CAREERS/careerMain.html

 Hughes Network Systems is one of the fastest-growing digital
 communications companies  in the world, providing world-class
wireless, satellite and broadcast  products to customers in  over 60
countries.  Today, HNS employs over 500 software engineers and
 200 hardware engineers dedicated to developing our products,
 services and systems from our Germantown, Maryland headquarters
 and San Diego, California facility.  To be part of the next HNS
 breakthrough, visit our Web site:
http:// www.hns.com/2CAREERS/careerMain.html to explore the 100+
opportunities
 currently available.








From Hua at teralogic-inc.com  Fri Feb 27 14:31:59 1998
From: Hua at teralogic-inc.com (Ernest Hua)
Date: Fri, 27 Feb 1998 14:31:59 -0800 (PST)
Subject: Cylink + NSA
Message-ID: <413AC08141DBD011A58000A0C924A6D50D7DAC@MVS2>


Did anyone notice that Cylink just got a new VP of product development?
Did anyone notice that this person just retired from the NSA?

Care to guess the name and former rank?

Ern





From billp at nmol.com  Fri Feb 27 16:55:52 1998
From: billp at nmol.com (bill payne)
Date: Fri, 27 Feb 1998 16:55:52 -0800 (PST)
Subject: With Respect to the Japanese
Message-ID: <34F75FD2.2084@nmol.com>

Friday 2/27/98 5:27 PM

Merat

After Sandia unloaded on me for TRYING to be friendly with a 
Japanese [and perhaps other things too] , I enrolled in the UNM 
US-Japan program.

One of the professors in the program is Jack Condon.

   name: John Carl Condon
   work_phone: 505 277-5811
   title: Professor
   organization: Communication & Journalism
   org_address: C & J Building

Condon teaches both at the University of New Mexico and
a Japanese University.

Condon is a very nice touchy-feely-type person.

Condon wrote [amazon.com]
                          
                            With Respect to the Japanese
                            by John C. Condon
                            List: $12.95
                            Our Price: $12.95

                            Availability: This title is currently on
back order. We do
                            not have a reprint date for this title, but
we expect to be
                            able to ship it to you within 3-5 weeks.

                            Paperback
                            Published by Intercultural Press
                            Publication date: June 1983
                            ISBN: 0933662491

Condon told our class,

   The US does not do very well without an enemy.

So.  Let�s do OUR BEST to insure that that US does
not do very well, at least with Iran.

And Merat, another of my former Ph D students in Computer
Science is

   name: John Sobolewski
   work_phone: 505 277-8125
        title: Assoc VP,Info Technology
  organization: CIRT - Administration
  org_address: 2701 Campus Blvd NE
  email: jssob at unm.edu

Let's all hope this mess gets settled.

Best
bill

Title: UNM Computer and Information Resources and Technology (CIRT)













Help!
How to get quick help: Answers to frequently asked questions, Help Desk, publications and documentation, 
who to contact, CIRT hours.

Services
What CIRT can do for you: Details about our services such as computing
facilities (pods), help desk, consulting, hardware maintenance, security,
software distribution, computer accounts, training, conference support and much more.

�Qu� Pasa?
What's happening at CIRT: Announcements, important systems news, scheduled system availability,
major projects we've undertaken, technical directions and job opportunities.

About CIRT
Who we are and how we are organized: Our mission and vision, a map
of the CIRT building, CIRT group organization, the annual report,
our system configurations and standards.










Send us your ideas on how CIRT can improve services to the UNM community!



Comments to CIRT Publications: docs at unm.edu

Last Revised: 10/28/97



The University of New Mexico
Albuquerque, New Mexico USA
Copyright � 1995 The University of New Mexico.




Title: Welcome to the Japan America Society of New Mexico










    
        Crane logo
        JAPAN AMERICA SOCIETY OF
        NEW MEXICO
        
        Crane logo
    







Ohayoo Gozaimasu! 

Greetings and welcome to the Web site of
the Japan America Society of New
Mexico. The Board of Directors
and the Membership extend to you our desire that you visit the
"Land of Enchantment" and sample the
"chili-hot" welcome and hospitality shown here. The
vistas are broad; the cuisine superb. In a multi-cultural
environment, we embrace all that is the state, and wait to enfold
you as well! Please enjoy. Yoroshiku, onegai shimasu!


    
        
    





    
        single lantern image
        BACKGROUND AND MISSION
        
        single lantern image
        BOARD OF DIRECTORS AND OFFICERS
    
    
        single lantern image
        MEMBERSHIP
        single lantern image
        BENEFITS
    
    
        single lantern image
        FUNDING
        single lantern image
        CONTACT INFORMATION
    
    
        single lantern image
        FUTURE EVENTS
        single lantern image
        PAST EVENTS
    
    
        �
        �
        �
        �
    






Friday February 27, 1998 3:15 PM


By e-mail and US mail

Lieutenant General Kenneth A Minihan, USAF
Director, National Security Agency
National Security Agency
9800 Savage Road
Fort George G. Meade, MD 20755-6000

Dear General Minihan:

Purposes of the letter are to

1  request information under the Freedom of Information Act
2  explore settlement possibilities of our current lawsuit.

In about 1986 Sandia National Laboratories assigned me the 
task of  design and construction of a Comprehensive Test Ban 
Treaty seismic data authenticator.

In the initial stages of the project, Sandia cryptographer 
Gustavus Simmons attempted to convince both Sandia 
management and NSA employees Tom White, Mark Unkenholtz,
and Ed Georgio that a form of public key authentication should 
replace NSA employee Ronald Benincasa's National Seismic
Station/Unmaned Seismic Observatory 11-bit data authentication
algorithm.

My Sandia supervisor John Holovka and project leader H B [Jim]
Durham ordered me to write a paper explaining public key 
cryptography.

This paper,  RSA ENCRYPTION, along with my SAND report
describing my implementation of Benincasa's algorithm and
filings in our lawsuit, now appear on Internet at
http://www.jya.com/index.htm, click CRYPTOME, then OpEd,
then http://www.jya.com/whprsa.htm.

Sandia explored the merits of switching from Benincasa's
algorithm to a public key-based authentication method suggested
by Simmons.

For Sandia's evaluation of the merits of public key, electronic tagging,
and Bureau of Engraving and Printing projects ,  I bought for Sandia 
samples both the Cylink CY1024 and AT&T A & B two chip sets for
modulo m arithmetic computations.

NSA employee Tom White sent me a copy of the SECRET classified
NSA report on IBM's hardware public key chip FIREFLY.

I wrote in my tutorial paper

  RSA hardware computations

  The slow speed of software RSA computations plus the potential
  wide use prompted several companies to build chips which compute
  modular arithmetic to at least several hundred bits.  Most of
  these chips "cascade" to compute with a larger number of bits.

  Corporations involved in building these chips are

     1  IBM  Firefly

     2  AT&T

     3  Motorola (apparently a three chip set)

     4  Cylink   Pittway-First alert

     5  Sandia Labs (Algorithm M and predecessor chip)

  Details of the IBM chip is classified.  AT&T as of July 1987 has
  not released details of their chip.  Little information is
  available on the Motorola chip set.

  The Cylink chip is commercially available.  Its price dropped
  from $1,500 to $600 each in June 1987.  Data is transferred to
  and from the chip with serial shift register communication.

  The early Sandia chip was limited in speed.  The replacement
  chip is cascadeable, communicates with 8 or 16 bits parallel,
  matches the speed of the Cylink chip, but is not out of
  fabrication.

  Rumors circulate that there is about an order of magnitude
  performance difference between some of these chips.

  These hardware chips improve exponentiation speed about 3 orders
  of magnitude over software implementation benchmarked on an Intel
  8086 family microcomputer.

Whitfield Diffie writes about both the Cylink and Sandia chips.  And
is quoted at  http://www.aci.net/kalliste/nukearse.htm.

Sandia had terrible luck with its public key chips.  

I reported SOME of the troubles to Electronic Engineering Times editor 
Loring Wirbel [http://techweb.cmp.com/eet/823/] on March 23, 1994.

        Dr. John Wisniewski was a supervisor at Sandia's Center for
        Radiation-hardened Microelectronics.  Wisniewski was a graduate
        student at Washington State University in about 1975.  I was a
        professor at WSU.

        Wisniewski knows all about the failing Sandia chips in the nuclear
        arsenal.  I took notes on February 13, 1993.  Wisniewski reviewed
        the problems again for me.

             1    No quality initiative.  Each chip lot had a different
                  process.
             2    Overall yield - 40-50%.  Down to 10% after packaging.
             3    Metalization problems.  No planarization.  No flow of
                  glass.  Couldn't use high temperature.  Step coverage
                  problems.  Layed down over tension.  100% field returns
                  over several years.
             4    Sandia would store lots of parts for replacements.

        Sandia management made the decision to place low yield parts in
        the nuclear arsenal.  Sandia must meet DOD schedules management
        reasoned.  Hundreds of millions spent on CRM.  Sandia must show
        productivity.

        Wisniewski told me that low yield chip test survivors are those   
        whichthe tests failed to detect failures.  Wisniewski will talk.  
        503-625-6408.  Wisniewski now works for Intel in Oregon.  Have 
        Wisniewski tell you about the fire in the CRM clean room!

Sandia supervisor Jerry Allen later told me it cost $300,000 each to remove
Sandia's failing chips at Pantex from a nuclear bomb.

NSA apparently is biased toward hardware implementations of cryptographic
and authentication algorithms.  As opposed to software implementation.

NSA representatives and Sandia management decided not to use a public
key authentication scheme for its CTBT seismic data authenticator because
of all of the problems with implementing public key algorithms.

But NSA surely has spent MUCH MONEY on public key chip implementations.

NSA is promoting its Clipper crypto chips as described at 
http://cpsr.org/dox/clipper.html.

And we get some information about technical specifications of NSA's Clipper
chip at http://www.us.net/softwar/http://www.us.net/softwar/clip.html

  Clipper Chip Information

  MYK-78 CLIPPER CHIP ENCRYPTION/DECRYPTION  ON A CHIP 

     1 micron double level metal CMOS technology 
     0.35 watts power 
     28 pin plastic leaded chip carrier (PLCC) package 
     Transistor to transistor logic (TTL) interface 
     Chip ID, family key and device unique key are installed at 
     programming. 
     Chip ID, family key and device unique key are installed at programming           
     facility and are completely transparent to the user.

Therefore, Under the provision of the Freedom of Information Act, 
5 USC 552, I am requesting access to: 

1  Copies of all invoices from

	A   AT&T
	B   Motorola
	C   IBM
	D  Sandia National Laboratories

to NSA for payments for developing ANY public key-related chips between 
January 1, 1980 and February 27, 1998.

2  Copies of all invoices to NSA from ANY corporation involved in 
development
of ANY Clipper chip-related hardware between January 1, 1980 and 
February 27, 1998.

The public has a right to know how much NSA spent on TRYING monoploize the 
crypto business.

If there are any fees for searching for, or copying, the records I have 
requested, please inform me before you fill the request.

As you know, the Act permits you to reduce or waive the fees when the 
release of the information is considered as "primarily benefiting the 
public."
  
I believe that this requests fits that category and I therefore ask that 
you waive any fees.

If all or any part of this request is denied, please cite the specific 
exemption(s) which you think justifies your refusal to release the information and inform me of your agency's administrative appeal procedures available to me under the law.

I would appreciate your handling this request as quickly as possible, and I 
look forward to hearing from you within 20 working days, as the law stipulates.

With respect to our current FOIA lawsuit, I feel that we should settle this
unfortunate matter.

I see from your biography at  http://www.nsa.gov:8080/ and
http://www.nsa.gov:8080/dirnsa/dirnsa.html that you are

         1979   Distinguished Graduate
         Master of Arts degree in National Security Affairs 
         Naval Postgraduate School 
         Monterey, California

One of my former M.S. and Ph.D students in Computer Science,
Ted Lewis, is currently the chairman of Computer Science at
Naval Postgraduate School [http://www.friction-free-economy.com/].

Small world.

But I think that this emphasizes that WE SHOULD all be on the same side.
Not engaged in a conflict in US federal court.  Or on Internet.

NSA attempts to withhold requested information are possibly unwise.  

In our wired world the aggrieved know what happened to them.
[http://www.aci.net/kalliste/speccoll.htm]. http://www.wpiran.org/,
http://www.netlink.co.uk/users/impact/namir/namirm.html

And moderates in Iran, [http://persia.org/khatami/biography.html], appear 
want settlement too.

My family and I have been damaged by these crypto wars.

I ask you that consider fair settlement of damages caused by the National
Security Agency.

I cannot find your e-mail address on Internet.

Therefore I will forward the e-mail copy of this FOIA/settlement letter to 
Ray Kammer of NIST [http://www.nist.gov/], who along with the FBI 
[http://www.fbi.gov/, http://www.fbi.gov/fo/nyfo/nytwa.htmand], and NSA 
are trying to control the crypto business so that Kammer can possibly
forward an e-mail copy of the FOIA/Settlement letter to you.

Sincerely,

bill

William Payne
13015 Calle de Sandias
Albuquerque, NM 87111
505-292-7037 [I am not reading e-mail]





From carol.a1 at usa.net  Fri Feb 27 19:05:24 1998
From: carol.a1 at usa.net (carol.a1 at usa.net)
Date: Fri, 27 Feb 1998 19:05:24 -0800 (PST)
Subject: Attraction
Message-ID: <0000000000.AAA000@usa.net>


Do you want to succeed at dating, or you just need a little spark to your
relationship or marriage?

Well here is the Answer for you!

Sensations., the new Compact Disc that  uses proven subliminal techniques to
increase your chances of SEXUAL success with the opposite sex.. Simply play it
and watch it work!!!!

do you want to be a winner?   

If yes then go to http://207.134.166.10/users/subliminal/subliminal.htm







From awsales at www.a-world.com  Fri Feb 27 22:35:14 1998
From: awsales at www.a-world.com (awsales at www.a-world.com)
Date: Fri, 27 Feb 1998 22:35:14 -0800 (PST)
Subject: Your #1 place for computer hardware and software deals!
Message-ID: <199802280636.BAA26562@out.a-world.com>



Would you like some CableTV with your PC?!
->Cable TV for Your Computer                                 from $1.00

Maybe some tunes?
->FM Radio Tuner Card for your PC                         from $1.00

Check these deals out!
DVDs/Opticals:
 TOSHIBA DVD-ROM DRIVE                                 from $41.00
 Rewritable Optical Drive(6X IDE)                           from $51.00

Monitors:
 Dell Multisync 20'' Sony Trinitron Monitor                 from $451.00
 AmpView 14'' .28mm NI SVGA Color Monitor          from $41.00
 AmpView 15'' .28mm NI SVGA Color Monitor          from $91.00
 AmpView 17'' .28mm NI SVGA Color Monitor          from $151.00

Hard Drives:
 Fujitsu 9.1GB Fast SCSI-2 HDD                              from $201.00
 Hawk 4 Seagate 4.3Gig SCSI-2                              from $141.00

CD-ROMs:
 4 Disk CD Changer(8X IDE)                                    from $41.00
 Sanyo CD-ROM Drive(8X IDE)                                from $21.00
 Hitachi 7730 (4X IDE)                                              from $11.00

Multimedia:
 3D Hardware Wavetable with Amplified Spkrs       from $21.00
 Multimedia Stereo Keyboard                                  from $6.00
 Logitech WingMan Warrior Joystick                      from $6.00
 Logitech WingMan Extreme Digital Joystick          from $6.00
 Duplex 3D Wavetable Sound Card                        from $6.00

Software:
 MS Office Pro 97 Full Version!!                              from $56.00
 MS Windows95(USb)                                             from $41.00

Scanners:
 30-bit Color Flatbed Scanner                                 from $11.00
 PageScan Color Professional Scanner                  from $21.00
 LOGITECH PageScan Color Scanner                   from $11.00

Miscellaneous:
 56Kbps Internal Fax/Data Modem(X2 compatible) from $41.00
 SCSI CD-ROM Case                                                from $6.00
 Mini-Tower Case(250 Watt)                                     from $11.00
 Pentium Pro ATX motherboard                                from $21.00
 75MHz to 233MHz Pentium/MMX PnP Mboard     from $31.00
 3D 4mb 128-bit PCI Video Card                              from $61.00







-For a world of opportunity, come to-
 --> http://www.AuctionWorld.net <--



Auction World, Inc. (c)1998




If you would like to be removed from our special promotional list,
please reply to this email with only the word 'unsubscribe' as the subject heading.






From bill.stewart at pobox.com  Sat Feb 28 00:28:38 1998
From: bill.stewart at pobox.com (Bill Stewart)
Date: Sat, 28 Feb 1998 00:28:38 -0800 (PST)
Subject: FC: Quotes of the Day (and cybercrime)
In-Reply-To: 
Message-ID: <3.0.5.32.19980228002208.008eb7d0@popd.ix.netcom.com>


James Glave's Wired News article at
	http://www.wired.com/news/news/technology/story/10605.html
is nice, especially the quote from Peter Neumann about how this
may be a con game by Janet Reno to get more budget.  After all,
the Feds has been doing computer security for a while, though
not with the expertise of the NSA.  So if they're so hot,
why do they keep getting cracked so badly, and on such critical stuff
as payroll data, which in the government is almost certain to include SSNs?
There's already a National Computer Security Center - she could
ask them for help, rather than starting a competing one.

>LIVERMORE, Calif. (AP) - To combat the threat of cyber attack, Attorney
>General Janet Reno said Friday a new high-tech crime center will be
>created under the jurisdiction of the FBI.
...
>	Reno played down the Big Brother aspects of an Internet police
>force.
>	"We must not and we will not sacrifice any constitutional
>protections," the attorney general said.

				Thanks! 
					Bill
Bill Stewart, bill.stewart at pobox.com
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





From jya at pipeline.com  Sat Feb 28 05:14:54 1998
From: jya at pipeline.com (John Young)
Date: Sat, 28 Feb 1998 05:14:54 -0800 (PST)
Subject: Radio Frequency Warfare Hearing
Message-ID: <1.5.4.32.19980228131755.00718780@pop.pipeline.com>


We offer the lengthy prepared testimony at the Joint 
Economic Committee hearing February 25 on "Radio Frequency 
Weapons and Proliferation: Potential Impact on the Economy."

  http://jya.com/rfw-jec.htm  (112K)

Or zipped:

  http://jya.com/rfw-jec.zip (39K)

It provides descriptions of the RF weapons, their 
development, research and testing, global spread, and 
threat to the infrastructure and national security.

The Internet availability of Carlo Kopp's paper on the 
E-bomb and similar RFW information is cited as evidence 
of the spread of the threatening technology.

The hearing evolved from JEC hearing testimony in 
June 1997 which described the threat from RFW,
especially that developed by the Former Soviet Union:

  Magnetohydrodynamic Generator Frequency (MHDGF)
  Explosive Magnetic Generator of Frequency (EMGF)
  Implosive Magnetic Generator of Frequency (IMGF)
  Cylindrical Shock Wave Source (CSWS)
  Spherical Shock Wave Source (SSWS)
  Ferromagnetic Generator of Frequency (FMGF)
  Superconductive Former of Magnetic Field Shock Wave (SFMFSW)
  Piezoelectric Generator of Frequency (PEGF)
  Superconducting Ring Burst Generator (SCRBG)







From jya at pipeline.com  Sat Feb 28 05:38:57 1998
From: jya at pipeline.com (John Young)
Date: Sat, 28 Feb 1998 05:38:57 -0800 (PST)
Subject: Backyard RF Weapon
Message-ID: <1.5.4.32.19980228134202.006d0960@pop.pipeline.com>


Excerpt from congressional hearing on RF weapons:

      Mr. David Schriner is the Principal Engineer directed energy studies 
with Electronic Warfare Associates and a recently retired engineer with the 
naval weapons testing facility at China Lake. He has numerous patents, has
received superior service awards, and given technical presentations over 42 
years of civil and military service. He will discuss the difficulty in 
building a RF weapon and the terrorist threat.

[Excerpt]

      In support of the information presented in this testimony and taking 
advantage of the winter's need to work indoors, a unit that uses oil spark-gaps 
was designed, built, and tested. The materials for it were mail-ordered at a
cost of about $500 and about one week was needed to fabricate the mechanical 
hardware. It use two ignition coils and a battery for power, an automobile fuel 
pump and filter for the oil circulation, and commonly available transformer
oil. 
An additional week was required to work out all of the electrical wiring, the 
oil lines, and the general finishing details. This unit was ready for testing 
in two weeks after starting the effort. 

      The signal radiated from the unit was measured and found to be a very 
significant power level that can be compared against available vulnerability
and 
susceptibility levels of military equipment. When the weather permits, this
unit 
will be tested against a set of infrastructure targets at an official test
range. 
>From the measurements and known signal levels, this unit is expected to be 
consistently deadly to many types of infrastructure items at ranges suitable
for 
terrorist usage. 

      This quickly-developed low-cost system could easily be placed in a small 
van and used in a parking lot or directed at buildings that the van was driven 
past. It is highly likely that this type of device would be a very effective 
terrorist system and the findings of its design could be factored into another 
either a larger, higher powered device, or a more advanced design each with 
significantly greater effectiveness. 

      The net result of all of this design, experimentation, fabrication and 
measurement proves that such a weapon system could be made by anyone with an 
engineering degree or even a bright technician with good hardware experience. 
The technical information required can be found in open sources, if not just 
from good common engineering sense. The materials needed are nothing special
and 
if the effort is made, advanced concepts can be made using everyday hardware
such 
as automotive ignition systems. The testing to date has been very limited but
the results of this testing have provided considerable insight to just what is 
vulnerable in infrastructure systems. This insight and work leads to a firm 
opinion that a terrorist would have little trouble developing such technology
and that he would have a high probability of success in the use as an RF weapon 
against our infrastructure elements found in any city or near facilities around 
the country. 

      This work has been done within the proper security guidelines since: 

      1.The models made in my home laboratory/workshop used off-the-shelf
materials 
        and open-source references.
      2.The laboratory tests of this hardware were made in a controlled
environment 
        with the proper security in place.
      3.The results of these tests, the data capabilities, and the target set 
        identities are kept in a facility cleared for classified storage.
      4.The development of any of this hardware is reported on a regular
basis to 
        those with whom I relate at a classified level to assure that they are 
        informed of the work and are able to apply this to their interests and 
        efforts if necessary. Any of this hardware can be used by them for any
        determination of utility to military interests. 

      Work in this area will be continued and an aggressive test and
evaluation of 
these "back yard" techniques and methods will be accomplished. This process
will be 
done in cooperation, and if requested, under the direction of agencies with an 
interest in this non-military weapon related process. The author of this
report will, 
if requested, provide to the Committee further details at a classified level
in the 
proper security environment. 

-----

Full hearing testimony: http://jya.com/rfw-jec.htm






From BBopper at aol.com  Sat Feb 28 09:25:55 1998
From: BBopper at aol.com (BBopper)
Date: Sat, 28 Feb 1998 09:25:55 -0800 (PST)
Subject: Fwd: Party Invitation
Message-ID: <296051a0.34f84790@aol.com>



To: "'bbopper at aol.com'" 
Subject: Party Invitation
From: "Steer, Dave" 
Date: Fri, 27 Feb 1998 16:51:45 -0600
Return-Receipt-To: "Steer, Dave" 

> **** KEEP READING -- YOU DON'T WANT TO MISS THIS PARTY!!****
> 
> 
> Join us for the first annual 
> 
> Fleishman-Hillard 
> Technology Practice 'IPO' -- Internet Party Offering
>  
> during Spring Internet World in Los Angeles
> 
> It's happening at Billboard Live on Sunset Boulevard in West Hollywood
> on Tuesday, March 10th from 7:00-11:00 PM
> 
> We've invited our favorite industry bands Where's Julio? (featuring
> founders of Excite) and The Flying Other Brothers, and a couple
> hundred of our friends, colleagues, soulmates and supporters (that
> means YOU) for a night of music, food & drink.  
> 
> Please RSVP by March 6th to Robert Delgado
> (email:delgador at fleishman.com or phone: 415/356-1034), and let us know
> where to snailmail your entry ticket.  
> YOU MUST HAVE AN ENTRY TICKET TO GET IN!!!
> 
> We will also provide shuttle transportation to the party from the Omni
> Hotel in downtown L.A. at 6:30 PM.  Just let us know if you think
> you'll be taking it!
> 
> 
> 
> 
> 
> 
************
Dave Steer
Fleishman-Hillard/SF
595 Market Street, #2700
San Francisco, CA  94105
415/356.1024
steerd at fleishman.com
*************





From melder at descartes.coker.edu  Sat Feb 28 11:21:36 1998
From: melder at descartes.coker.edu (Michael Elder)
Date: Sat, 28 Feb 1998 11:21:36 -0800 (PST)
Subject: HP Crypto Export
Message-ID: <3.0.2.32.19980228141822.006aee98@descartes.coker.edu>



>From the NY Times online (www.nytmes.com)

February 28, 1998




Hewlett-Packard Granted License
For Encryption System 

By PETER WAYNER 

The Commerce Department has granted Hewlett-Packard an export license for
its VerSecure encryption architecture allowing the company and its
licensees to export strong encryption tools, the company announced Friday.
The catch is that the products must take their orders from a central
computer system that will dictate how all the products will behave in each
country. 

The company hopes that the solution would break the deadlock between the
Clinton Administration, which continues to restrict the export of secure
computer technology throughout the world, and the computer industry, which
contends that foreigners are not interested in buying products that don't
protect their secrets. 

The new solution effectively disconnects the problem of distributing
encryption technology from the process of determining the policy for
government access to information. The heart is a new class of trusted
hardware cards and chips that take their orders from a central company
known as a Security Domain Authority or SDA. In countries, like France,
that require people to keep a record of keys for unlocking data, the SDA
would only allow the computers to encrypt information if it complied with
the laws. In countries with no laws about encryption usage like the United
States, Germany and Great Britain, the SDA would allow users to encrypt in
whatever manner they choose. 



------------------------------------------------------------------------
�It is very hardware-specific with the flexibility of software and that
gives us a lot of strength in terms of tamper resistance� 

Feisal Mosleh, 
business development manager at Hewlett-Packard 


------------------------------------------------------------------------



Hewlett-Packard sees the solution as a win for the industry, which will be
able to build one set of hardware and software that can be shipped
throughout the world. The SDA's will set the local rules because the
computers will not encrypt information without first getting permission
from the SDA.

Doug McGowan, one of the director of Hewlett-Packard's efforts, said in a
telephone interview, "Never before has a general purpose cryptography tool
been exportable from the United States, with or without key recovery. We're
opening a huge market for American industry to enable commerce on a
worldwide basis." 

The price for this flexibility is the need for specialized hardware that
treats the SDA as its master. In an ordinary computer, the owner can
control all aspects of what the computer does. This extra hardware will
raise the price of machines and is bound to be more expensive than software
which can be distributed at minimal cost. 

Feisal Mosleh, a business development manager at Hewlett-Packard, pointed
out that specialized hardware can offer faster performance and more
security. "It is very hardware-specific with the flexibility of software
and that gives us a lot of strength in terms of tamper resistance" he said
in a phone interview.

Many security experts continue to point out that general-use microcomputers
and their operating systems are dangerously insecure. In one recent attack,
hackers were able to begin transfers from a bank account by manipulating
accounting software. Off-loading the process to specialized hardware makes
it simpler to ensure that the system is secure because the special hardware
has only one job.

Hewlett-Packard says that it is licensing the architecture to a number of
different computer vendors and announced that IBM, Motorola, CertCo,
Trusted Information System, Microsoft and RSA Data Securities had already
signed licenses. The vendors will be free to choose how they implement the
special computer hardware, but most will probably use firmware with an
embedded microprocessor. The initial version will reportedly include DES,
tripleDES, RSA, RC2, RC4 and DiffieHellman algorithms. Each of these
solutions can be sped up by specialized hardware, but only a general
microprocessor can handle all of them with equal agility. 

The specialized hardware will also be tamper-proof to prevent people from
circumventing the commands of the SDA. When an encryption card is first
started up, it cannot begin working until it has received instructions from
an SDA in its country. This information is contained in a "policy token."
Joe Beyers, general manager of Hewlett-Packard's Internet Software business
unit, explained, "The token says, 'You can use this amount of key, this
amount of strength for this amount of time.'"

Beyers went on to say, "The aspect of time allows the government to evolve
their policy. Time limits are one of the attributes that made it attractive
to the U.S. government." It would be possible for a government to change
policy with the system from time to time, perhaps forcing citizens to use
long keys in time of war to protect themselves and then relaxing the policy
after peace emerged. 

In the current plan, policy tokens would be good for one year, forcing
computers to re-register with an SDA in order to keep working. The SDA
would have no control of a token after it was issued and would only be able
to change policies at the renewal. 

The relationship between the SDA and the key recovery program is more
difficult to describe. The SDA would not keep any records of any keys that
would allow the police to eavesdrop on calls. But the policy tokens would
force the embedded hardware to obey the local laws that might include key
recovery. The FBI has asked Congress to mandate key recovery systems that
give it clear access to all communications. 

The yearly interrogation between the SDA and the individual computers does
not mean that the system will be foolproof. Someone could simply carry a
laptop from a country that allows personal privacy to a country with more
invasive laws and use it freely until the policy token runs out. Also, it
may be possible to spoof the token authorization procedure by pretending
that the request came from one country instead of another. 

Some critics found the use of special hardware to be problematic. Jim
Lucier, a policy analyst for the Americans for Tax Reform, a Republican
think tank, pointed out that specialized hardware was ignored by the
marketplace in the past. "None of it ever works" he said, "because the more
obvious solution, which is end-to-end encryption, is already there."

Lucier also pointed out that specialized hardware is more complicated to
engineer and much more expensive to distribute than software. "Atoms cost
more than bits, it just comes down to that," he said. In a press conference
Friday morning, Beyers promised that the new hardware was "months, not
years away" and also promised that the hardware costs would be as low as
possible. 

Marc Rotenberg, director of the Electronic Privacy Information Center,
suggested that replacing the current export control bureaucracy with a
network of SDA's was not a significant advance. "Government efforts to
regulate crypto will only slow the development of commerce," he said.

In fact, the decision by the United States government to grant a license to
Hewlett-Packard's architecture is far from liberating. Companies making
VerSecure products can only ship them to countries approved by the United
States government, a list which at this time is limited to the United
Kingdom, Germany, France, Denmark and Australia. More countries will become
open if and when they create an SDA infrastructure that is acceptable to
the United States. 

Hewlett-Packard has gone to great lengths to prevent rogue nations from
setting up their own unauthorized SDA's by cloning hardware. The
infrastructure uses CertCo's secure certificate servers to restrict the
ability to create the software necessary to build the tokens. Beyers says
that no one person at Hewlett-Packard has the ability to do this in order
to reduce the potential for corruption and theft.

Hewlett-Packard is also working heavily with foreign countries to assure
them that the system does not include back doors that might be accessible
by the United States government. Beyers said that the company had retained
an international group of cryptographic experts to vet the system and allay
any fears of hidden back doors. 

A press release from Hewlett-Packard quoted William A. Reinsch,
undersecretary of commerce, as saying, "We are pleased to support HP's
effort to develop and market encryption products that encourage the use of
key recovery in providing robust, secure encryption. This approval and our
ongoing dialogue with the industry are consistent with the Clinton
Administration's goal of allowing the market to develop recoverable
encryption products."

Peter Wayner at pwayner at nytimes.com welcomes your comments and suggestions.


Copyright 1998 The New York Times Company 













From tcmay at got.net  Sat Feb 28 12:05:27 1998
From: tcmay at got.net (Tim May)
Date: Sat, 28 Feb 1998 12:05:27 -0800 (PST)
Subject: HP Crypto Export
In-Reply-To: <3.0.2.32.19980228141822.006aee98@descartes.coker.edu>
Message-ID: 


At 11:18 AM -0800 2/28/98, Michael Elder wrote:
>>From the NY Times online (www.nytmes.com)
>Hewlett-Packard Granted License
>For Encryption System
>
>By PETER WAYNER

>known as a Security Domain Authority or SDA. In countries, like France,
>that require people to keep a record of keys for unlocking data, the SDA
>would only allow the computers to encrypt information if it complied with
>the laws. In countries with no laws about encryption usage like the United
>States, Germany and Great Britain, the SDA would allow users to encrypt in
>whatever manner they choose.

Until, of course, the U.S. changes its policy.

A constant danger with any of these "solutions" is that they make later
imposition of controls so much easier. Consider the implications of
widespread deployment of the HP-type system (which, BTW, I don't think will
happen in the U.S., or elsewhere).

A simple change in the law and all new tokens (and they must be renewed
yearly, so says HP) will implement the new law.

The camel's nose in the tent strategy.

The HP/IBM product is perniciously evil and should be fought with all
technical and memetic means.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.








From VG2Hot at aol.com  Sat Feb 28 12:58:09 1998
From: VG2Hot at aol.com (VG2Hot)
Date: Sat, 28 Feb 1998 12:58:09 -0800 (PST)
Subject: Well here it is...
Message-ID: <8cd785f9.34f82c14@aol.com>


   This really is a blast.  With all these movies coming out about virtual
reality, it's amazing to actually have a virtual reality program like this 
for your own computer.

   The Virtual Girlfriend and Virtual Boyfriend are artificial intelligence
programs for your IBM PC or compatible and also for MACINTOSH. You 
can watch them, talk to them, ask them questions, tell them secrets, and 
relate with them.  Watch them as you ask them to take off different clothes
and guide them through many different activities.  Watch and participate 
in the hottest sexual activities available on computer, including: several
sexual positions, using many unique toys, even bringing in multiple partners.
This is no doubt one of the most realistic, sexually stimulating computer
games available.  They will remember your name, birthday, your likes and 
your dislikes.  Every time you start the program, they say different things, 
and act differently.  Each time, they have a different personality. With the 
VGA digital graphics, the Virtual Girlfriend and Virtual Boyfriend software 
have some of the hottest, sexiest graphics out there.  You can actually 
hear their voice as they talk to you.  This is the first adult software title
that was designed for both heterosexual and homosexual people.  We
would like you to try the actual full copy out before it is put on the market
this spring. It will be sold for 1/7 of the actual price (only $7.95) until we
can get back some information on what people think of the program before
it hits the stores.  Please give it a try and write back any comments.
   Thank you.


     Virtual Girlfriend and Virtual Boyfriend are artificial intelligence 
programs, meaning they are completely interactive.  It would be just like 
if you were talking to someone.  You can actually have simple 
conversations.  Their attitudes change with the different things you say, 
so you can say things that will upset them, and then say things that will 
please them.  The more you play/talk with them, the more you learn what 
they can do, and what they like to do.  It's easy to install and instructions
are easy to follow.

         ~~~~~~~~~~~~~~~~~~~Special Offer~~~~~~~~~~~~~~~~~~~
       *Get two more new and exciting adult games for an additional $13.45*
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                          Here are two of the best adult games ever!!

     This is to inform you about the new adult game that VCS Magazine
rated "The best game of "97" and gave an "Outstanding ****" (4 stars).
"The Search for Paradise is no doubt one of the greatest XXX adult games 
available".  The first game where it is as much fun as it is a turn on!
Travel the world to every continent, every country you can think of, and meet
some of the most beautiful women in existence.  These women will treat 
you like a king and obey your every command.  Any sexual wish you can 
think of,  these women know it all.  There is a certain paradise for every
guy out there, and this game will have them all.  This game uses real 
models, digital video, and digital sound to make it as realistic as possible.
You will feel like you're in the same room as the girl you're talking to!!!

     The last adult game we are going to inform you about is the newly
released "Club Celebrity X".  Imagine being in a club with some very 
beautiful, well known, ACTUAL celebrities that with skill, will be making 
you breakfast in bed the next day.  These girls you have seen on television,
magazines, and billboard ads, and now they are on your computer, begging
for action.  Each girl you will recognize and you won't believe your eyes 
when you got them in your own bedroom.  This game is hot, and once you
start playing, you won't be able to stop.  
******************************************************************************
**********
                                (((((((((LIMITED TIME ONLY))))))))
T00 H0T!!  for Virtual girlfriend.... These were too sexually graphic to
include in VG and VB.  These are some of most 
arousing & attractive models ever put in one collection.  You MUST be 18 or 
over to purchase & not easily offened.

******************************************************************************
***********                                             
*Required: 386 or better, 4 meg ram or better, Windows 3.1 or higher 
(Win95 is fine), sound card or CD-rom are optional.  Games are given 
either on CD-rom or compressed 3.5" diskettes.  Required is VGA graphics, 
and a hard drive.  Macintosh requires at least 4 meg of ram.  They will run 
on any IBM or MACINTOSH compatible.  If you are interested and would 
like to order a copy, then you can read the mailing instructions below.  
Games come in an unmarked package and are sent out at most 4 days 
after the order is received.  You are not put on any mailing lists
whatsoever, guaranteed.  ~At your request, the programs can come with
a password protection utility that only allows the program to run when the
correct password is entered.~


To order, 
      please send to:             
                                        C&M PROMOTIONS
                                         6185 Magnolia Ave.
                                             Suite# 360
                                       Riverside CA, 92506
                                    Phone # 1-888-341-1643 

        Please fill out the following form and mail it to the address above.  
              (Feel free to write out the order form by hand, if you wish).
      ________________________________________________________
   __________________________ (Cut here)_________________________

                   send to:             C&M Promotions
                                      6185 Magnolia Ave. #360
                                          Riverside CA, 92506


Your Name __________________________________ Date ___________

Address _____________________________________________________

City ____________________________ State ___ Zip Code ____________

Phones: Home  ___________________E-mail Address _______________

Do you use a?  IBM__  MACINTOSH __
Would you like? 3.5 Disks__ CD ROM__ 
 
(   ) Virtual
Girlfriend..............................................................$7.95
(   ) Virtual
Boyfriend.............................................................$7.95
(   ) Both Virtual Girlfriend and
Boyfriend................................$13.95
(   ) The Search for Paradise & Club Celebrity X......................$13.45
(   ) Too HOT for VG &
VB....................................................$17.50
(   ) Everything!!! The Search for Paradise, Club Celebrity X 
      and Virtual Girlfriend and Virtual
Boyfriend.......................$21.90

                                                             (ADD)
S&H.......$2.00

*money order or check*                        Amount enclosed?________


~Please indicate year of birth___________

Code:3785







From panam at information4u.com  Sat Feb 28 13:27:04 1998
From: panam at information4u.com (panam at information4u.com)
Date: Sat, 28 Feb 1998 13:27:04 -0800 (PST)
Subject: Utilities *!
Message-ID: <199802282122.QAA24239@ren.globecomm.net>


X-Info:
X-Info:Sent using Zen Bulk Emailer (FREE)
X-Info:See End Of Email For Free Copy And Download Address

                                 Important Information For You
 
You have been chosen to get this important information. 
 
Effective 1 January 1998 Congress mandated the deregulation of the Utilities Industry. Opening up a 215 Billion dollar industry. An 
opportunity now exists to make profit off the customer usage of services we provide.  
 
NSI  is a $1.5 Billion US based company incorporated in 1984. NSI is a debt-free company. Success Magazine named NSI as one of 
only eight hyper-growth companies in US history ever to achieve $1 Billion in annual sales within 10 years. Now NSI is launching a 
new technology division that will revolutionize the Internet, Discount Utilities, Telecommunication, Cellular,  Cable, Digital 
Satellite TV, Home Security, Business and Financial Services, World Wide Electronic Home Shopping - Internet Commerce. etc. All 
of the services being all on one bill with great discount. Something that everyone uses but being provide in a bundle for great saving.  
 
Being an Ex-Excel Representative I know how important it is to be at the Ground Floor level. The people who get in any Network 
Marketing business at the ground floor are the people making the most money. This Division of NSI is still in the Pre-launch stage. 
Getting the information couldn't come at a better time. Please just call us at : 
 
                                         1-580-353-1909 or e-mail us by clicking REPLY
 
                                                You will not Regret!!!!!!!!!!!!! 


*** Get The Zen Bulk Emailer FREE - Where To Get it ***
*** FAX/CALL +1 212 2082904 (US) or FAX +44 (01772) 492507 (UK) ***
*** No Question, No Hard Sell, It's Freeware ! ***





From lreed at west.cscwc.pima.edu  Sat Feb 28 14:10:38 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Sat, 28 Feb 1998 14:10:38 -0800 (PST)
Subject: SAHMD 4/0
Message-ID: <009C27DF.0E08A460.45@west.cscwc.pima.edu>


Prologue 4/0 SPACE ALIENS HIDE MY DRUGS
---------------------------------------

A Nuclear Bullet, With *Everyone's* Name On It:
  [Your Name Here]


Excerpt from an interview with Marilyn Manson on NPR:
MM: A lot of the lies spread by Fundamentalist Christians
   about our tour were believed by people because they 
   read them on the InterNet.
    The InterNet is the CB Radio of the 90's. People perceive
   it as a legitimate news source, which it's not.
    Eventually there will need to be some sort of laws or
   something...


Top Ten Ways To Convince The Sheeple The Revolution Is NOW:
10,9,8,.7,6,5,4,3,2...
1. Put Marilyn Manson's name on the first bullet.


"Give me nuclear freedom, or give me death."
~ Patrick Hussein


The TRUTH About Area 51:
  It's a resort-spa for the reptilian Nazis who are shaping
our present and our future, preparing to rule all of mankind
when they emerge from the underground bunkers beneath Los Alamos,
Livermore, Colorado Springs, Muleshoe, Texas, etc., at the end
of the Milleniuum.
  Why can't you buy a straight 2"x4" anymore? The reptilian Nazis
are keeping all of the good stuff for themselves. The reason for
the tight security at Area 51 is not because of secret spy-planes
and the like. The reptilian Nazi's don't want us to know that
they are all driving '56 Chevy's. (Their original plan was to
have earthlings all driving Edsels, but they tried to implement
the plan before their mind-control experiments had proven 
successful.)


Who It Is OK To Put A Fucking Bullet Through Their Head:

Officially Recognized Bad Guys--For the Sheeple, this is Saddam
  Hussein, Timothy McVeigh, Dennis Rodman, paramilitarists, 
  grandmothers who plug other people's parking meters, Branch
  Davidians (but it's a shame about the children), and The 
  Subject Of A Ten-Second Sound-Byte To Be Named Later.
  For Republicans, this is welfare cheats, the homeless, tax
  cheats making less than $100,000 per year, liberals, Ralph
  Nadar, CypherPunks, Alt2600 avocados, the 4 Horsemen, and
  anyone who looks like me.
  For the Democrats, this is the non-avant-guarde wealthy,\j
  liberals consume, Rush Limbaugh, Republican presidents, 
  rednecks, people who drink water straight out of the tap,
  and anyone who looks like me.
  For Kris Kristofferson, this is "People doing something
  dirty, decent folks can frown on..."


"Sunshine is the best disinfectant."
~ Supreme Court Justice Louis D. Brandeis, 1928

"Bullet holes let the sun shine in."
~ Supreme Asshole TruthMonger, 1998


When Existence Is Outlawed, Only Outlaws Will Exist:
  The revolution is now.
  The only question that those who have the balls to
participate in the inevitable chaos which will be needed
to balance the Tao against the current onslaught of
digitally structured reality that is being forced upon
humanity by the new technology being promoted by the
pawns of the reptilian Nazis whose headquarters is deep
within the confines of the AdamAntarctic is: "Whose brain
do I put my first bullet through?"

  For many, the answer will be, "TruthMonger!"
  Nobody likes to hear the truth, and the truth is: We
all deserve to die.
  Not only that, but the extinction of humanity, according
to our current values, epitomizes the crowning glory of
our evolutionary path.

  What places us *above* the other primates and the other
forms of life on our planet? What is it that makes us
special, that deems us worthy of ruling over all other
life forms on the planet Earth?
  It is our ability to control; our ability to master
our environment and the objects and life-forms contained
within its bounds. Ultimately, it is our ability to *kill*
whatever stands in the way of the fulfillment of our desires
and our goals.
  For all of our soul-searching, spiritual posturing, deep
down inside we all know that we live in a predatorial 
universe. Republicans cry out for bigger guns to defend
our way of life from everyone who fails to salute the flag.
Democrats cry out for the press and political leaders to
invent enemies to justify the liberals crying out for
bigger guns to protect us from the 'bad guys.'
  And it's all bullshit...

  The reason we need to launch wars and destroy our
environment is to keep the price of our refrigerators
and our color TV's reasonable--to keep the price of the
dollar high enough that we can feel good about ourselves
for saving a starving child for less than ten cents a day,
while ignoring the fact that an obese Sally Fields could
save more starving children in a week than we possibly 
could in a lifetime, just by donating one of her lunches
to the charity she is promoting.


Think About This, You Stupid Fucking Bastards:
  Why do we need to allow our basic human rights and
freedoms to be compromised?: In order for our hallowed
leaders and our protectors in the law enforcement
community to adequately protect us from the 'bad guys.'
  Why do we need to be protected from the 'bad guys'?:
Because if they win out over the 'good guys', they 
will take away our basic human rights and freedoms.


The Reason TruthMonger Will Die Broke And Alone:
  Because he invested all of his money in ClueServers,
believing that the Sheeple might one day find them
to be of value.

"TV Is Real! (Just go back to sleep, dear.)"






From lreed at west.cscwc.pima.edu  Sat Feb 28 14:12:10 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Sat, 28 Feb 1998 14:12:10 -0800 (PST)
Subject: SAHMD 5/0
Message-ID: <009C27DF.62CAA3E0.49@west.cscwc.pima.edu>


Prologue 5/0
-------------

The Story Thus Far:
  (Or so we would have you believe...)


It is now commonly known that:
  American overt and covert spook agencies of one sort or 
another monitor--legally and illegally--almost all of
the electronic communications in the world.
  American overt and covert spook agencies, legally and
illegally make and break the finances of nations and
corporations around the world.
  Overt and covert spook agencies of other nations do
exactly the same thing, on differing scales.

  Internationally powerful financial agencies, groups
and individuals make daily decisions affecting the lives
of individuals, societies and nations, based on the
desires and goals of individuals who are above and beyond
the control of any nation or group of nations.
  Joe and Jane Sheeple are not privy to information as
to who, exactly, these people are, or what their ultimate
designs are for our future.

  Human rights and freedoms, throughout the world, are
contingent upon heavily armed governments allowing us
those rights and freedoms which they perceive to be
in our best overall interest.
  Those heavily armed governments are increasingly 
acting in concert with one another, dividing up our
finances, property and our human rights among themselves
at the slightest whim.


If It Prevents Just A Single Starving Biafran Child
>From Exposure To A Picture Of A Naked Breast...:
  This is why 'Higher Authority' (government, business,
a person with a large wallet or a large gun) feels compelled
to 'serve and protect' the Sheeple.
  Of course, this all comes at a cost...

  Own your own home? Bullshit!
  I don't care if you paid cash and have clear title--if you
fail to pay property taxes to men with guns who say that you
*have* to, then you are out on the street, tomorrow.

  Growing organic vegetables? Bullshit!
  Unless you have proper state certification, after having
filled in the mountains of documentation and paid numerous
filing fees, registration fees, incremental fees and 
excremental fees, as well as having paid for a mountain
of testing by an independent (government approved) laboratory, thenyour sorry ass is going to jail if you whisper the word 
"organic" in your sleep.

  Do you have a name? Bullshit!
  I don't care what you call yourself, what your momma calls
you, or what name is on your birth certificate, you are a 
number, and you goddamn well better *have* that fucking
number ready if you want to drive a car, cross the street,
make a purchase, sell something, stand in line to get a
number, or breathe.

NEWS FLASH!!!
[Author's Note: You may want to skip the next paragraph,
 if you have a weak heart, or have suicidal tendencies,
 because it speaks a truth that is too ugly for most of
 us to face, even in the best of times.]
  The ONLY time that the powers-that-be recognize you as
a unique individual with a personality, character and a
history, is when they want to USE you, or FUCK you.

  Trust me, you don't really want to think about this
too much, unless you are prepared to face the truth,
because the more you think about it, the more obviously
true it becomes.
  
  The information you are required to provide in applying
for a driver's license--picture, height, weight, race,
hair and eye color--is for the purpose of connecting you,
and only you, to the number on the license.

  Contributed to Social Security all of your life, and now
you are entitled to collect?
  If you have the wrong numnber, Fuck You! If the government
has misplaced your number, Fuck You! If the government is
using a new numbering system, Fuck You!
  Your name is Joe Sheeple, and you worked at the same job
all of your life, and your employer, your family and your
CongressPerson can all attest to the fact that you paid
your share of SS each and every week, and you are now
old enough to retire? Fuck you! Got a number?

  You are a number. Your number is used to categorize
your position and status in life for use by the government
and business during your journey from the cradle to the
grave.

  Fought for your country in the Gulf War? Picked up some
sort of exotic disease or disability?
  Spare me the detail, pal. It doesn't matter how hard you
fought, how valiantly you risked your life, how many kids
you have to feed, what sort of medical history you can
provide about yourself before, during and after the event.
  Your number gets lumped in with the other numbers who
got sick or disabled, and then the number-crunchers decide
if the country you defended can afford for you all to
be sick and disabled.
  Sorry, pal, but the figures are too high. So you
and all of the other numbers get a big, group,
Fuck You!

  You are a number.
  Trust me on this. If you can't trust 608-335-345, then
who *can* you trust?





From lreed at west.cscwc.pima.edu  Sat Feb 28 14:14:02 1998
From: lreed at west.cscwc.pima.edu (Linda Reed--PCC West Campus CSC)
Date: Sat, 28 Feb 1998 14:14:02 -0800 (PST)
Subject: SAHMD 6/0
Message-ID: <009C27DF.BE4A6840.53@west.cscwc.pima.edu>


PROLOGUE 6/0 -- SPACE ALIENS HIDE MY DRUGS
------------------------------------------

Wasting (Everyone) Away In Mongeritaville:
  A man with a gun came to my door recently, and demanded
that I pony-up thirty dollars to members of his gang's
protection racket. If I refuse to pay, he will be back
with other armed thugs.
  If I resist them, they will kill me.

  Sure, when they drag me in front of one of the big
bosses in their protection racket, I can try to talk
them out of robbing and/or killing me, but it will
inevitably end up with Frank Moretti telling Al Capone,
"If we let this schmuck walk away without ponying-up,
then how are we going to keep the others in line."
  In the end, I either pay up or die. 

  It's all because of my dog...
  "Dog running at large." That's what the first threatening
message from the Town of Bienfait said.
  "Voluntary fine." It also said that--with a veiled hint
that if I refused to 'do the right thing', that I might
find myself having a little 'trouble'.

  I had an uncle who found himself forced to deal with these
kind of thugs when he had a small shop on the bad side of
the tracks in a big city. Then he moved to the 'good side 
of town' and found out that the only difference was that
the vigorish was higher, and the thugs were better dressed.
  It's the American Way (TM)... If you want to be robbed
by a better class of thugs, then you can expect to pay a
little more for being beaten with gold-knuckles, instead
of brass-knuckles, if you're a little late on your payment.


I'm A Funny Guy, Eh?:
  No, I'm serious...
  If I fail to pay the Town of Bienfait thirty dollars
for allowing my dog, whom I have not had a single complaint
about from any of my neighbors or fellow citizens, to 
experience the freedom that should be the birthright of
every living creature, then those who rule over the
land I currently live on (under the authority of armed
enforcers), are willing to put me to death.

  They don't like to kill the goose that laid the golden
egg, Jane or Joe Sheeple, so they prefer to start by
placing them in bondage, kidnapping them, and holding
them prisoner in small cages until they get the message
that they are not to be fucked with.
  If you resist being kidnapped and imprisoned, they have
no choice but to send more and better armed thugs to
overcome your resistance, murdering you if you refuse to
recognize and submit to their authority over you, no 
matter how unjust or uncivilized their decisions and
their actions.

  My dog, Baby, doesn't speak Cherokee, so when the
armed thugs approach, she just barks.
  She barks, "The Revolution Is NOW!"


TownShip of MongerItaville -- Population - 1:
  I have self-incorporated (self-actualized, for you
people living in New Age, California) the Township of
MongerItaville, in my own mind, and voted myself the
Grand Pooh-Bah(Humbug) of the domain it encompasses,
which can be found by reaching behind myself and
grabbing my ass. (Wherever I go, there I am...)
  I was elected unanimusly (not a typo), since in
MongerItaville dogs can vote, but women can't.
  (Sorry, Baby, but I only had the Founding Fathers
to use as a role-model...there weren't any Founding
Mothers.)

  As the sole citizen and the head of government of
MongerItaville, I had to make a decision as to 
whether it was better to attempt to reinvent the
wheel, so to speak, by following the example of
the founders of American democracy, or to take a
more realistic approach and automatically grant
myself all of the same powers as have been assumed
by the current governmental and bureacratic 
representatives of the evolution of freedom and
democracy.
  In the beginning, I decided to do both, no matter
how schizophrenic the results, since it seemed obvious
that anything less would be the equivalent of bending
over for the soap in the shower at the Home For The
Criminally Insane.

  I wrote a 'Realistic Bill of Rights' for the TownShip]
of MongerItaville, including such gems as:
~A well-armed and well-lubricated milita being essential
to the security of my butt-hole, my right to get stinking
fucking drunk and 'Load and Lock' (or whatever) shall not
be a bridge over troubled water.
[Editor's Note: Realistically, the preceeding should
read, "Load (Boom!--"Goddamn, I just blew my foot
off!") and Lock."]
~My right to be secure in my person (especially in the
rear part) and my electronic emmissions (internal and
external) will be the responsibility of no one other
than myself (and possibly Phil Zimmerman and Matt
Blaze).
~I will not discriminate against anyone on the basis
of age, race, sex, sexual orientation, or breed.
(Although I reserve the right to call any living
entity 'old fart', 'nigger', 'slut', 'faggot', or
'mutt', if they--start a sentence with, "Kids
nowdays...'--give me soap, instead of crack, for
my twenty dollars--fuck all of my friends and 
everyone in my band--drop the soap in the shower--
jump into bed before me and take the good pillow.)


Hey! Those Aren't Amendments! Those Are Justifications!:
  I decided on only two amendments. One to my physical
constitution--a double-shot of Jim Beam, and one to
my intellectual Constitution--I'm the government, and
I can do anything I fucking want..."
  I suppose that the latter amendment may no be
politically correct in a Berkeley kind of society,
but at least it is consistent with the recognition
of my right to life, liberty, and pursuit of cynicism.

I May Be A Stupid Fuck, But At Least I'm Not A Stupid Fuck:
  Anyone who thinks I am overreacting reads the daily 
news with their blinders on...
  Remember the old broad in New England whose family 
decided she had to be imprisoned against her will in
a looney bin for observation ("We just want to ask
you a few questions...") because she had put up with
society's bullshit long enough to have earned the
right to be 'eccentric'. (That's what you're called
if your filthy fucking rich and let your toenails
grow so long that they curl up like a ram's horns.)
  Would the armed thugs pretending to 'serve and
protect' have been using rubber bullets if there was
no press present? (Can you say 'Ruby Ridge'? Sure
you can...)
  What if the grandmother busted for helping a stranger
avoid paying vigorish to the armed thugs by plugging
parking meters had told the thugs, "Fuck you! You 
assholes are crazy and out of control. I refuse to
be subject to the insanity of your armed rule over
every detail of the citizen's life."?
  She would be one dead cunt...


What's Good For The Gander Is Good For Those Getting Goosed:
  Am I overreacting?
  I am being muscled by thugs that will murder me over
thirty dollars, just to maintain their control over the
Sheeple that they rule.
  Any way you want to cut it, you cannot deny that you know
this is true.

  Do you understand?
  Do you understand that these people are willing to murder
a compound full of people holding 'eccentric' religious
beliefs--men, women and children--justifying their actions
on the grounds of what they later admit are lies?
  Do you understand that instead of admitting to their
criminal actions, they will make criminals of the survivors,
placing them in prisons designed to reinforce upon the
citizenry that even their children will be slaughtered if
they are so bold as to say, "The King has no clothes."


I Know You Can Read...But Can You Understand?:
    Can you pick up a paper without reading about some
atrocity being perpetrated on individuals and groups of
citizens by the armed thugs in power?
[Tuscon Nutly News--MILITARY ANALYSTS REPORT THAT IN
the last three years, 42,384,672 senior and general
Army officers were accused of offenses including child
molestation and adultery--and not one was prosecuted.
Each was allowed simply to retire.
  Sgt. Maj. Gene C. McKinney, however, not being an
officer, faces 55 years in prison for lechery, as 
a result of being accused of an act of foreplay
that occured during consensual sex with a woman
not his wife.
  Sgt. Maj. McKinney, when reached for comment by
the Left Nutly News, said, "I should have 'accidentally'
killed her after sex. Under the Uniform Code of Military
Justice, negligent homicide only carries a maximum
sentence of *three* years."
  Joseph Finder, author of the novel "High Crimes," told
Nutly News reportwhores, in response to allegations that
the Nutly News was misquoting his article and inflating
the numbers involved for shock effect, said, "I write 
for the mainstream media. I'm supposed to pretend that
murdering a hundred innocent children makes someone
more of a monster than murdering a single innocent child,
especially if the murderer voted to give my publisher
a huge tax-break for requiring his staff to make certain
that the child was born naked, and thus was obviously
involved in some sort of child-pornography ring."
When asked for comment, a Pentagon spin-liar told 
Nutly News reportwhores, "It's called the Uniform Code
of Military Justice because we look at what kind of
uniform they are wearing, and then decide what kind of
justice they are going to get."]

  Can you pick up a newspaper without reading about some
totally clueless dickwad--who is licensed to carry a gun,
shoot any citizen on the slightest whim, and then lie
about it in court under cover of a neatly-pressed uniform
and shiny badge--performing some outrageous act that an
ordinary citizen would be lynched for?
[Tucson Nutly News--WHEN THE POLICE OFFICER WHO PLAYS THE
role of McGruff, the police dog (Take a bite out of crime)
was unavailable, a fellow police monger called upon the
services of an inmate incarcerated for child molestation
to fill in as McGruff, in a school classroom containing
one of the child rapist's victims.
Although the voice of Charles Darwin could be heard
calling out from the grave, "Put a bullet in this ignorant
Pig's head, before he breeds.", the citizenry merely turned
to the weather section of the paper, to see if the weekend
would be nice enough for them to take their children to
the park, where the same ignorant piece-of-shit police
officer would be in charge of 'serving' the children up
to convicted child-molesters, and 'protecting' himself
from suffering the consequences of his incompetence by
making sure that his union dues were paid up.
  When asked for comment, McGruff, the police dog, told
this reportwhore, "The regular guy's not back yet...do
you have any children...do you have any pictures of 
them naked?"
  In the 'Real Sports' section of the same newspaper,
the ClueServer Sports Wire reported the results of the
True Justice Championship Game as: Child Molesters - 1,
Children - 0.]


Lucky Strike, Lucky Green -- by Defcon McCullagh Chainsaw
[Time We Found The Path--FOR THE FIRST TIME IN DIGITALLY
recorded history, the voice of the netizens has triumphed
over the paid political spin-doctoring of the mainstream
media.
In a startling development with global consequences, the
recent actions taking place in a Cult of One community
in Southern Saskatchewan, the TownShip of MongerItaville,
have been embraced by citizens around the globe in light
of the information reported by independent observers
relaying a wide variety of details via the InterNet and
the World-Wide-Web, rather from the standard government
hand-outs provided to the mainstream media reportwhores
gathered around the free drinks and snacks left over from
Desert Storm.
  TruthMonger, the Grand Pooh-Bah(Humbug) of the
physico-virtual nation of MongerItaville, launched
a surprise First Strike against the dangerous armed
thugs who had threatened his physico-virtual existence
over the paltry sum of thirty dollars.
  TruthMonger told this reportwhore, "John Lennon called
me the 'Fifth Horseman of the Apocalypse' because I used
to say, 'Throw them all in the laundry bag, and let the
maid sort them out.' I know that this statement doesn't
make any sense, but, believe it or not, this is one of
my *good* days."
  Cult of One analysts from around the globe agree
that the straw-dog that broke Joe Camel's back was
provided by a post to the CypherPunks mailing list
by Lucky Green and his secret lover, Anna R. Christ.
  "We finally understand what 'The Xenix Chainsaw
Massacre' was all about.
  "It was about an individual whose brain had been
destroyed from too many electroshock treatments and
years of drug abuse, finally taking a stand and 
deciding to do what was right, even though he had
no idea what that meant.
  "It was about people who heard the voice barfing
in the wilderness, which told them that it was
OK to tell the fruitcakes wearing crystals around
their necks to go fuck themselves, and kick their
ass if they didn't give them back the five hundred
bucks they paid to take a seminar which was nothing
more than 'The Power of Positive Thinking' with
a Barnum & Bailey/New Age spin-doctoring tacked
on to rook Spiritually Correct Rubes.
  "It was about learning to follow your own wisdom,
your own conscience, and give the guru whose ass
you just kicked a few dollars to cover the cost
of the hot-dog provided by the Sufi vendor at
the back of the seminar hall, who delivered on
his promise to '...make you one with everything.'
  "It was about ninety pages long..."
  Jean Chretien, the former Prime Minister of
Canada, the country brought down by the Cult of
One seperatist movement inspired by the seige
at MongerItaville, said, "You can fool some of
the people all of the time, and all of the people
some of they time, but...hey, we kept the citizens
believing, for a hundred years, that Louis Riel
acted alone..."
When contacted by this reportwhore, God, the Supreme
Creator of the Universe, said that, due to the Cult Of
One phenomena currently sweeping over the face
of the earth, due to everyone now having their
own web site, "Now I, like Dog, speak only for
myself..."
  This is Defcon McCullagh Chainsaw, going with the
flow and mediating on the Zen koan, "Is this a new
spin on the revolution, or vice-versa?"]


Am I Being Silly Again?:
  Sure...so what's your point?






From declan at well.com  Sat Feb 28 15:00:34 1998
From: declan at well.com (Declan McCullagh)
Date: Sat, 28 Feb 1998 15:00:34 -0800 (PST)
Subject: HP Crypto Export
In-Reply-To: <3.0.2.32.19980228141822.006aee98@descartes.coker.edu>
Message-ID: 


At 12:08 -0800 2/28/98, Tim May wrote:
>A constant danger with any of these "solutions" is that they make later
>imposition of controls so much easier. Consider the implications of
>widespread deployment of the HP-type system (which, BTW, I don't think will
>happen in the U.S., or elsewhere).
>
>A simple change in the law and all new tokens (and they must be renewed
>yearly, so says HP) will implement the new law.

It's a sign of the times when Tim and I can agree on these things, or at
least recognize the same problems. Note NONE of HP's press materials
included that 1 year detail. --Declan

====

http://cgi.pathfinder.com/netly/afternoon/0,1012,1771,00.html

One-Year Itch

Even if you studiously ignore the arcana of encryption export rules, it's
worth paying attention to a new product from Hewlett Packard.
The government has OK'ed the overseas sale of HP's "VerSecure" boards and
computer chips that have full-strength encryption built in -- but turned
off by default. To engage the data-scrambling features, you'll need an
"activation token."

Catch is, however, that they last only one year, and the tokens also can
open a "key recovery" electronic peephole for snooping government agents.
This is the only way HP can hawk these things in France, a country with no
shortage of such police.

Now, the FBI wants to ban U.S. software without such peepholes. Doesn't
crypto-crippleware make it much easier for the government to issue only
key recovery tokens when everyone's existing ones expire?
"Whatever the law is in the U.S., we will comply," says CEO Lewis Platt.
--By Declan McCullagh/Washington







From billp at nmol.com  Sat Feb 28 15:52:54 1998
From: billp at nmol.com (bill payne)
Date: Sat, 28 Feb 1998 15:52:54 -0800 (PST)
Subject: cyber FOIA/settlement e-mail
Message-ID: <199802282352.AAA09743@basement.replay.com>



God, what a nut!


Friday February 27, 1998 11:18 AM

By e-mail and US mail

Lieutenant General Kenneth A Minihan, USAF
Director, National Security Agency
National Security Agency
9800 Savage Road
Fort George G. Meade, MD 20755-6000

Dear General Minihan:

Purposes of the letter are to

1  request information under the Freedom of Information Act
2  explore settlement possibilities of our current lawsuit.

.... etc. shit deleted.





From real at inet.com  Sat Feb 28 18:56:50 1998
From: real at inet.com (real at inet.com)
Date: Sat, 28 Feb 1998 18:56:50 -0800 (PST)
Subject: ///// Have You Ever!! ////////////
Message-ID: <199803010256.SAA01837@toad.com>


Subject: Amazing Program! Make $50,000.00 in 2 months with your computer and the net !

     IT REALLY WORKS FOLKS!!
////////////////////////////////////////////////////////////////////////////////////
   IMAGINE $50,000 , ALL YOURS IN 2 MONTHS

HERES HOW TO MAKE $50,000 EASY. DO NOT DELETE!  I AM SERIOUS
THAT THIS WORKS. THIS IS THE SECOND TIME I HAVE DONE THIS, AND I GOT $66,000
MY FIRST TIME. I AM A 17 YEAR OLD WITH A BMW!!!! IT ONLY TAKES ABOUT A
MONTH AND A HALF TOO!! JUST FOLLOW THE DIRECTIONS BELOW AND YOU'LL GET
MONEY FAST, EASY, AND HAVE FUN DOING IT.

The following is a copy of the e-mail I read:

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

This is a LEGAL, MONEY-MAKING PHENOMENON.
PRINT this letter, read the directions, THEN READ IT AGAIN !!!

You are about to embark on the most profitable and unique program you
may ever see. Many times over, it has demonstrated and proven its ability
to generate large amounts of cash. This program is showing fantastic appeal
with a huge and ever-growing on-line population desirous of additional
income.

This is a legitimate, LEGAL, money-making opportunity.  It does not
require you to come in contact with people, do any hard work, and best of all,
you never have to leave the house, except to get the mail and go to the
bank!

This truly is that lucky break you've been waiting for!  Simply follow
the easy instructions in this letter, and your financial dreams will come
true! When followed correctly, this electronic, multi-level marketing program
works perfectly...100% EVERY TIME!

Thousands of people have used this program to:
    -  Raise capital to start their own business
    -  Pay off debts
    -  Buy homes, cars, etc.,
    -  Even retire!

This is your chance, so don't pass it up!

------------------------------------------------------------
OVERVIEW OF THIS EXTRAORDINARY ELECTRONIC
MULTI-LEVEL MARKETING PROGRAM
------------------------------------------------------------

Basically, this is what we do:

We send thousands of people a product for $5.00 that costs next to nothing
to produce and e-mail. As with all multi-level businesses, we build
our
business by recruiting new partners and selling our products.  Every
state
in the U.S. allows you to recruit new multi- level business online (via
your
computer).

The products in this program are a series of four business and financial
reports costing $5.00 each.  Each order you receive via "snail mail"
will
include:

  * $5.00 cash
  * The name and number of the report they are ordering
  * The e-mail address where you will e-mail them the report they ordered.

To fill each order, you simply e-mail the product to the buyer.  THAT'S
IT!
The $5.00 is yours!  This is the EASIEST electronic multi-level marketing
business anywhere!

FOLLOW THE INSTRUCTIONS TO THE LETTER AND BE PREPARED TO REAP THE
STAGGERING BENEFITS!

     ******* I  N  S  T  R  U  C  T  I  O  N  S *******

This is what you MUST do:

1. Order all 4 reports shown on the list below (you can't sell them
if you
don't order them).

     *  For each report, send $5.00 CASH, the NAME & NUMBER OF THE REPORT
YOU ARE ORDERING, YOUR E-MAIL ADDRESS, and YOUR RETURN POSTAL
ADDRESS
(in case of a problem) to the person whose name appears on the list
next
to the report.

     *  When you place your order, make sure you order each of the four
reports.  You will need all four reports so that you can save them on
your
computer and resell them.

     *  Within a few days you will receive, via e-mail, each of the
four
reports. Save them on your computer so they will be accessible for you
to
send to the 1,000's of people who will order them from you.

2.  IMPORTANT-- DO NOT alter the names of the people who are listed
next to
each report, or their sequence on the list, in any way other than is
instructed below in steps "a" through "d" or you will lose out on the
majority of your profits.  Once you  understand the way this works,
you'll
also see how it doesn't work if you change it.  Remember, this method
has
been tested, and if you alter it, it will not work.

    a.  Look below for the listing of available reports.

    b.  After you've ordered the four reports, replace the name and
address
        under REPORT #1 with your name and address, moving the one that
        was there down to REPORT #2.

    c.  Move the name and address that was under REPORT #2 down to REPORT
        #3.

    d.  Move the name and address that was under REPORT #3 down to REPORT
        #4.

    e.  The name and address that was under REPORT #4 is removed from
the
        list and has NO DOUBT collected their 50 grand.

Please make sure you copy everyone's name and address ACCURATELY!!!

3.  Take this entire letter, including the modified list of names, and
save
it to your computer.  Make NO changes to the instruction portion of
this
letter.

4.  Now you're ready to start an advertising campaign on the WORLDWIDE
WEB!
Advertising on the WEB is very, very inexpensive, and there are HUNDREDS
of
FREE places to advertise. Another avenue which you could use for advertising
is e-mail lists.  You can buy these lists for under $20/2,000 addresses
or
you can pay someone a minimal charge to take care of it for you.

BE SURE TO START YOUR AD CAMPAIGN IMMEDIATELY!

5.  For every $5.00 you receive, all you must do is e-mail them the
report
they ordered.  THAT'S IT!  ALWAYS PROVIDE SAME-DAY SERVICE ON ALL ORDERS!
This will guarantee that the e-mail THEY send out, with YOUR name and
address on it, will be prompt because they can't advertise until they
receive the report!

------------------------------------------
AVAILABLE REPORTS
------------------------------------------

***Order Each REPORT by NUMBER and NAME***

Notes:
-  ALWAYS SEND $5 CASH FOR EACH REPORT
-  ALWAYS SEND YOUR ORDER VIA FIRST CLASS MAIL
-  Make sure the cash is concealed by wrapping it in at least two sheets
of
paper
-  On one of those sheets of paper, include: (a) the number & name of
the
report you are ordering, (b) your e-mail address, and (c) your postal
address.
________________________________________

REPORT #1 "HOW TO MAKE $250,000 THROUGH MULTI-LEVEL SALES"

ORDER REPORT #1 FROM:
                        Tgar Enterprise
                         P.O. Box 1984
                    Stafford, VA 22555-1984
_______________________________________

REPORT #2 "MAJOR CORPORATIONS AND MULTI-LEVEL SALES"

ORDER REPORT #2 FROM:
                    RWC Ent.
                    Unit 50 Hamlyn Road Plaza
                    Suite #110
                    St. John's, Newfoundland
                    Canada, A1E 5X7
________________________________________

REPORT #3 "SOURCES FOR THE BEST MAILING LISTS"

ORDER REPORT #3 FROM:
                      MMS Publications
                      P.O. Box 116101
                      Carrollton, TX 75011    
________________________________________

REPORT #4 "EVALUATING MULTI-LEVEL SALES PLANS"

ORDER REPORT #4 FROM:
                          M.M.L.I.
                          1011 Cimarron Cir. N.W.
                          Bradenton, FL 34209
________________________________________

------------------------------------------------------------
HERE'S HOW THIS AMAZING PLAN WILL MAKE YOU $MONEY$
------------------------------------------------------------

Let's say you decide to start small just to see how well it works. Assume
your goal is to get 10 people to participate on your first level. (Placing
a
lot of FREE ads on the internet will EASILY get a larger response.)
Also
assume that everyone else in YOUR ORGANIZATION gets ONLY 10 downline
members.  Follow this example to achieve the STAGGERING results below.

1st level--your 10 members with $5...........................$50
2nd level--10 members from those 10 ($5 x 100...............$500
3rd level--10 members from those 100 ($5 x 1,000).........$5,000
4th level--10 members from those 1,000 ($5 x 10,000).....$50,000
                                THIS TOTALS  ----------->$55,550

Remember friends, this assumes that the people who participate only
recruit
10 people each.  Think for a moment what would happen if they got 20
people
to participate!  Most people get 100's of participants! THINK ABOUT
IT!

Your cost to participate in this is practically nothing (surely you
can
afford $20). You obviously already have an internet connection and e-mail
is FREE!!! REPORT#3 shows you the most productive methods for bulk e-mailing
and purchasing e-mail lists.  Some list & bulk e-mail vendors even work
on
trade!

About 50,000 new people get online every month!

*******TIPS FOR SUCCESS*******

 *  TREAT THIS AS YOUR BUSINESS!  Be prompt, professional, and follow
the
directions accurately.

 *  Send for the four reports IMMEDIATELY so you will have them when
the
orders start coming in because:

    When you receive a $5 order, you MUST send out the requested
product/report to comply with the U.S. Postal & Lottery Laws, Title
18,Sections 1302 and 1341 or Title 18,  Section 3005 in the U.S. Code,
also
Code of Federal Regs. vol. 16, Sections 255 and 436, which state that
"a
product or service must be exchanged for money received."

 *  ALWAYS PROVIDE SAME-DAY SERVICE ON THE ORDERS YOU RECEIVE.

 *  Be patient and persistent with this program. If you follow the
instructions exactly, the results WILL undoubtedly be SUCCESSFUL!

 *  ABOVE ALL, HAVE FAITH IN YOURSELF AND KNOW YOU WILL SUCCEED!

*******YOUR SUCCESS GUIDELINE*******

Follow these guidelines to guarantee your success:

If you don't receive 10 to 20 orders for REPORT #1 within two weeks,
continue advertising until you do.  Then, a couple of weeks later you
should
receive at least 100 orders for REPORT #2.  If you don't, continue
advertising until you do.  Once you have received 100 or more orders
for
REPORT #2, YOU CAN RELAX, because the system is already working for
you, and
the cash will
continue to roll in!

THIS IS IMPORTANT TO REMEMBER:

Every time your name is moved down on the list, you are placed in front
of
a DIFFERENT report.  You can KEEP TRACK of your PROGRESS by watching
which
report people are ordering from you.  If you want to generate more income,
send another batch of e-mails and start the whole process again!  There
is
no limit to the income you will generate from this business!

NOTE:  If you need help with starting a business, registering a business
name, how income tax is handled, etc., contact your local office of
the
Small Business Administration (a Federal agency) for free help and answers
to questions. Also, the Internal Revenue Service offers free help via
telephone and free seminars about business taxes.

*******T  E  S  T  I  M  O  N  I  A  L  S*******

     This program does work, but you must follow it EXACTLY!  Especially
the rule of not trying to place your name in a different position, it
won't
work and you'll lose a lot of potential income.  I'm living proof that
it
works.  It really is a great opportunity to make relatively easy money,
with
little cost to you.  If you do choose to participate, follow the program
exactly, and you'll be on your way to financial security.
          Sean McLaughlin, Jackson, MS

     My name is Frank. My wife, Doris, and I live in Bel-Air, MD. I
am a cost accountant with a major U.S. Corporation and I make pretty good
money. When I received the program I grumbled to Doris about receiving "junk
mail ". I made fun of the whole thing, spouting my knowledge of the population
and percentages involved.  I "knew" it wouldn't work. Doris totally ignored
my supposed intelligence and jumped in with both feet. I made merciless
fun of her, and was ready to lay the old "I told you so" on her when the thing
didn't work... well, the laugh was on me!  Within two weeks she had
received over 50 responses. Within 45 days she had received over $147,200
in $5 bills! I was shocked!  I was sure that I had it all figured and that
it wouldn't work.  I AM a believer now. I have joined Doris in her "hobby."
  I did have seven more years until retirement, but I think of the "rat
race" and it's not for me. We owe it all to MLM.

           Frank T., Bel-Air, MD

    I just want to pass along my best wishes and encouragement to you.
 Any doubts you have will vanish when your first orders come in. I even checked
with the U.S. Post Office to verify that the plan was legal. It definitely
is! IT WORKS!!!
           Paul Johnson, Raleigh, NC

    The main reason for this letter is to convince you that this system
is honest, lawful, extremely profitable, and is a way to get a large amount
of money in a short time. I was approached several times before I checked
this out. I joined just to see what one could expect in return for the minimal
effort and money required.  To my astonishment, I received $36,470.00
in the first 14 weeks, with money still coming in.
           
         Sincerely yours, Phillip A. Brown, Esq.

    Not being the gambling type, it took me several weeks to make up
my mind to participate in this plan. But conservative that I am, I decided
that the initial investment was so little that there was just no way that
I wouldn't get enough orders to at least get my money back. Boy, was I
surprised when I found my medium-size post office box crammed with orders!
For awhile, it got so overloaded that I had to start picking up my mail
at the window. I'll make more money this year than any 10 years of my life
before. The nice thing about this deal is that it doesn't matter where
in the U.S. the people live. There simply isn't a better investment with
a faster return.

         Mary Rockland, Lansing, MI

    I had received this program before. I deleted it, but later I wondered
if I shouldn't have given it a try. Of course, I had no idea who to
contact to get another copy, so I had to wait until I was e-mailed another
program...11 months passed then it came...I didn't delete this one!...I
made more than $41,000 on the first try!!

          D. Wilburn, Muncie, IN

 This is my third time to participate in this plan. We have quit
our jobs, and will soon buy a home on the beach and live off the interest
on our money. The only way on earth that this plan will work for you is if
you do it. For your sake, and for your family's sake don't pass up this golden
opportunity.  Good luck and happy spending!

           Charles Fairchild, Spokane, WA

     My name is John and I live in Bradenton, FL. a friend of mine has
mad $15,000 and is driving around a new jeep chrrokee and it makes me jealous!!!
So I am going to try it and collect my $5 bills!!!!!!!!

         John Miller, Bradenton Florida

ORDER YOUR REPORTS TODAY AND GET
STARTED ON THE ROAD TO FINANCIAL FREEDOM!!!








From billp at nmol.com  Sat Feb 28 18:59:06 1998
From: billp at nmol.com (bill payne)
Date: Sat, 28 Feb 1998 18:59:06 -0800 (PST)
Subject: Chemical, Biological, or Radiation (CBR) weapons
Message-ID: <34F8CC2A.20BA@nmol.com>

Saturday 2/28/98 7:22 PM

Tim May

Just saw your stuff at jya.com.

Got in the mail today  

  Volume 9, Number 4, 1997

  MILITARY PSYCHOLOGY

  The Official Journal of the 
  Division of Military Psychology
  American Psychological Association

  Special Issue:  Effects of Chemical Protective
                  Clothing of Military Performance
  Guest Editors:  Gerald P. Krueger and
                  Louis E. Banderet

I�ll transcribe some of the text.

The US government drugs soldiers before they go into battle.

Trust me.

Banderet was ANOTHER of my Ph. D. students.

Later
bill

Title: HP Crypto Export






28 February 1998

  
Date: Sat, 28 Feb 1998 14:18:22 -0500
To: cypherpunks at toad.com
From: Michael Elder 
Subject: HP Crypto Export


>From the NY Times online (www.nytmes.com)

February 28, 1998


Hewlett-Packard Granted License For Encryption System 

By Peter Wayner 

The Commerce Department has granted Hewlett-Packard an export license for
its VerSecure encryption architecture allowing the company and its
licensees to export strong encryption tools, the company announced Friday.
The catch is that the products must take their orders from a central
computer system that will dictate how all the products will behave in each
country. 

The company hopes that the solution would break the deadlock between the
Clinton Administration, which continues to restrict the export of secure
computer technology throughout the world, and the computer industry, which
contends that foreigners are not interested in buying products that don't
protect their secrets. 

The new solution effectively disconnects the problem of distributing
encryption technology from the process of determining the policy for
government access to information. The heart is a new class of trusted
hardware cards and chips that take their orders from a central company
known as a Security Domain Authority or SDA. In countries, like France,
that require people to keep a record of keys for unlocking data, the SDA
would only allow the computers to encrypt information if it complied with
the laws. In countries with no laws about encryption usage like the United
States, Germany and Great Britain, the SDA would allow users to encrypt in
whatever manner they choose. 

Hewlett-Packard sees the solution as a win for the industry, which will be
able to build one set of hardware and software that can be shipped
throughout the world. The SDA's will set the local rules because the
computers will not encrypt information without first getting permission
from the SDA.

Doug McGowan, one of the director of Hewlett-Packard's efforts, said in a
telephone interview, "Never before has a general purpose cryptography tool
been exportable from the United States, with or without key recovery. We're
opening a huge market for American industry to enable commerce on a
worldwide basis." 

The price for this flexibility is the need for specialized hardware that
treats the SDA as its master. In an ordinary computer, the owner can
control all aspects of what the computer does. This extra hardware will
raise the price of machines and is bound to be more expensive than software
which can be distributed at minimal cost. 

Feisal Mosleh, a business development manager at Hewlett-Packard, pointed
out that specialized hardware can offer faster performance and more
security. "It is very hardware-specific with the flexibility of software
and that gives us a lot of strength in terms of tamper resistance" he said
in a phone interview.

Many security experts continue to point out that general-use microcomputers
and their operating systems are dangerously insecure. In one recent attack,
hackers were able to begin transfers from a bank account by manipulating
accounting software. Off-loading the process to specialized hardware makes
it simpler to ensure that the system is secure because the special hardware
has only one job.

Hewlett-Packard says that it is licensing the architecture to a number of
different computer vendors and announced that IBM, Motorola, CertCo,
Trusted Information System, Microsoft and RSA Data Securities had already
signed licenses. The vendors will be free to choose how they implement the
special computer hardware, but most will probably use firmware with an
embedded microprocessor. The initial version will reportedly include DES,
tripleDES, RSA, RC2, RC4 and DiffieHellman algorithms. Each of these
solutions can be sped up by specialized hardware, but only a general
microprocessor can handle all of them with equal agility. 

The specialized hardware will also be tamper-proof to prevent people from
circumventing the commands of the SDA. When an encryption card is first
started up, it cannot begin working until it has received instructions from
an SDA in its country. This information is contained in a "policy token."
Joe Beyers, general manager of Hewlett-Packard's Internet Software business
unit, explained, "The token says, 'You can use this amount of key, this
amount of strength for this amount of time.'"

Beyers went on to say, "The aspect of time allows the government to evolve
their policy. Time limits are one of the attributes that made it attractive
to the U.S. government." It would be possible for a government to change
policy with the system from time to time, perhaps forcing citizens to use
long keys in time of war to protect themselves and then relaxing the policy
after peace emerged. 

In the current plan, policy tokens would be good for one year, forcing
computers to re-register with an SDA in order to keep working. The SDA
would have no control of a token after it was issued and would only be able
to change policies at the renewal. 

The relationship between the SDA and the key recovery program is more
difficult to describe. The SDA would not keep any records of any keys that
would allow the police to eavesdrop on calls. But the policy tokens would
force the embedded hardware to obey the local laws that might include key
recovery. The FBI has asked Congress to mandate key recovery systems that
give it clear access to all communications. 

The yearly interrogation between the SDA and the individual computers does
not mean that the system will be foolproof. Someone could simply carry a
laptop from a country that allows personal privacy to a country with more
invasive laws and use it freely until the policy token runs out. Also, it
may be possible to spoof the token authorization procedure by pretending
that the request came from one country instead of another. 

Some critics found the use of special hardware to be problematic. Jim
Lucier, a policy analyst for the Americans for Tax Reform, a Republican
think tank, pointed out that specialized hardware was ignored by the
marketplace in the past. "None of it ever works" he said, "because the more
obvious solution, which is end-to-end encryption, is already there."

Lucier also pointed out that specialized hardware is more complicated to
engineer and much more expensive to distribute than software. "Atoms cost
more than bits, it just comes down to that," he said. In a press conference
Friday morning, Beyers promised that the new hardware was "months, not
years away" and also promised that the hardware costs would be as low as
possible. 

Marc Rotenberg, director of the Electronic Privacy Information Center,
suggested that replacing the current export control bureaucracy with a
network of SDA's was not a significant advance. "Government efforts to
regulate crypto will only slow the development of commerce," he said.

In fact, the decision by the United States government to grant a license to
Hewlett-Packard's architecture is far from liberating. Companies making
VerSecure products can only ship them to countries approved by the United
States government, a list which at this time is limited to the United
Kingdom, Germany, France, Denmark and Australia. More countries will become
open if and when they create an SDA infrastructure that is acceptable to
the United States. 

Hewlett-Packard has gone to great lengths to prevent rogue nations from
setting up their own unauthorized SDA's by cloning hardware. The
infrastructure uses CertCo's secure certificate servers to restrict the
ability to create the software necessary to build the tokens. Beyers says
that no one person at Hewlett-Packard has the ability to do this in order
to reduce the potential for corruption and theft.

Hewlett-Packard is also working heavily with foreign countries to assure
them that the system does not include back doors that might be accessible
by the United States government. Beyers said that the company had retained
an international group of cryptographic experts to vet the system and allay
any fears of hidden back doors. 

A press release from Hewlett-Packard quoted William A. Reinsch,
undersecretary of commerce, as saying, "We are pleased to support HP's
effort to develop and market encryption products that encourage the use of
key recovery in providing robust, secure encryption. This approval and our
ongoing dialogue with the industry are consistent with the Clinton
Administration's goal of allowing the market to develop recoverable
encryption products."

Peter Wayner at pwayner at nytimes.com welcomes your comments and suggestions.

Copyright 1998 The New York Times Company 



Date: Sat, 28 Feb 1998 12:08:30 -0800
To: Michael Elder , cypherpunks at toad.com
From: Tim May 
Subject: Re: HP Crypto Export

At 11:18 AM -0800 2/28/98, Michael Elder wrote:
>>From the NY Times online (www.nytmes.com)
>Hewlett-Packard Granted License
>For Encryption System
>
>By PETER WAYNER

>known as a Security Domain Authority or SDA. In countries, like France,
>that require people to keep a record of keys for unlocking data, the SDA
>would only allow the computers to encrypt information if it complied with
>the laws. In countries with no laws about encryption usage like the United
>States, Germany and Great Britain, the SDA would allow users to encrypt in
>whatever manner they choose.

Until, of course, the U.S. changes its policy.

A constant danger with any of these "solutions" is that they make later
imposition of controls so much easier. Consider the implications of
widespread deployment of the HP-type system (which, BTW, I don't think will
happen in the U.S., or elsewhere).

A simple change in the law and all new tokens (and they must be renewed
yearly, so says HP) will implement the new law.

The camel's nose in the tent strategy.

The HP/IBM product is perniciously evil and should be fought with all
technical and memetic means.

--Tim May

Just Say No to "Big Brother Inside"
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May              | Crypto Anarchy: encryption, digital money,
ComSec 3DES:   408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA  | knowledge, reputations, information markets,
Higher Power: 2^3,021,377   | black markets, collapse of governments.





Title: Untitled Document









Viewing this page requires a browser capable of displaying frames.





Friday February 27, 1998 3:15 PM


By e-mail and US mail

Lieutenant General Kenneth A Minihan, USAF
Director, National Security Agency
National Security Agency
9800 Savage Road
Fort George G. Meade, MD 20755-6000

Dear General Minihan:

Purposes of the letter are to

1  request information under the Freedom of Information Act
2  explore settlement possibilities of our current lawsuit.

In about 1986 Sandia National Laboratories assigned me the 
task of  design and construction of a Comprehensive Test Ban 
Treaty seismic data authenticator.

In the initial stages of the project, Sandia cryptographer 
Gustavus Simmons attempted to convince both Sandia 
management and NSA employees Tom White, Mark Unkenholtz,
and Ed Georgio that a form of public key authentication should 
replace NSA employee Ronald Benincasa's National Seismic
Station/Unmaned Seismic Observatory 11-bit data authentication
algorithm.

My Sandia supervisor John Holovka and project leader H B [Jim]
Durham ordered me to write a paper explaining public key 
cryptography.

This paper,  RSA ENCRYPTION, along with my SAND report
describing my implementation of Benincasa's algorithm and
filings in our lawsuit, now appear on Internet at
http://www.jya.com/index.htm, click CRYPTOME, then OpEd,
then http://www.jya.com/whprsa.htm.

Sandia explored the merits of switching from Benincasa's
algorithm to a public key-based authentication method suggested
by Simmons.

For Sandia's evaluation of the merits of public key, electronic tagging,
and Bureau of Engraving and Printing projects ,  I bought for Sandia 
samples both the Cylink CY1024 and AT&T A & B two chip sets for
modulo m arithmetic computations.

NSA employee Tom White sent me a copy of the SECRET classified
NSA report on IBM's hardware public key chip FIREFLY.

I wrote in my tutorial paper

  RSA hardware computations

  The slow speed of software RSA computations plus the potential
  wide use prompted several companies to build chips which compute
  modular arithmetic to at least several hundred bits.  Most of
  these chips "cascade" to compute with a larger number of bits.

  Corporations involved in building these chips are

     1  IBM  Firefly

     2  AT&T

     3  Motorola (apparently a three chip set)

     4  Cylink   Pittway-First alert

     5  Sandia Labs (Algorithm M and predecessor chip)

  Details of the IBM chip is classified.  AT&T as of July 1987 has
  not released details of their chip.  Little information is
  available on the Motorola chip set.

  The Cylink chip is commercially available.  Its price dropped
  from $1,500 to $600 each in June 1987.  Data is transferred to
  and from the chip with serial shift register communication.

  The early Sandia chip was limited in speed.  The replacement
  chip is cascadeable, communicates with 8 or 16 bits parallel,
  matches the speed of the Cylink chip, but is not out of
  fabrication.

  Rumors circulate that there is about an order of magnitude
  performance difference between some of these chips.

  These hardware chips improve exponentiation speed about 3 orders
  of magnitude over software implementation benchmarked on an Intel
  8086 family microcomputer.

Whitfield Diffie writes about both the Cylink and Sandia chips.  And
is quoted at  http://www.aci.net/kalliste/nukearse.htm.

Sandia had terrible luck with its public key chips.  

I reported SOME of the troubles to Electronic Engineering Times editor 
Loring Wirbel [http://techweb.cmp.com/eet/823/] on March 23, 1994.

        Dr. John Wisniewski was a supervisor at Sandia's Center for
        Radiation-hardened Microelectronics.  Wisniewski was a graduate
        student at Washington State University in about 1975.  I was a
        professor at WSU.

        Wisniewski knows all about the failing Sandia chips in the nuclear
        arsenal.  I took notes on February 13, 1993.  Wisniewski reviewed
        the problems again for me.

             1    No quality initiative.  Each chip lot had a different
                  process.
             2    Overall yield - 40-50%.  Down to 10% after packaging.
             3    Metalization problems.  No planarization.  No flow of
                  glass.  Couldn't use high temperature.  Step coverage
                  problems.  Layed down over tension.  100% field returns
                  over several years.
             4    Sandia would store lots of parts for replacements.

        Sandia management made the decision to place low yield parts in
        the nuclear arsenal.  Sandia must meet DOD schedules management
        reasoned.  Hundreds of millions spent on CRM.  Sandia must show
        productivity.

        Wisniewski told me that low yield chip test survivors are those   
        whichthe tests failed to detect failures.  Wisniewski will talk.  
        503-625-6408.  Wisniewski now works for Intel in Oregon.  Have 
        Wisniewski tell you about the fire in the CRM clean room!

Sandia supervisor Jerry Allen later told me it cost $300,000 each to remove
Sandia's failing chips at Pantex from a nuclear bomb.

NSA apparently is biased toward hardware implementations of cryptographic
and authentication algorithms.  As opposed to software implementation.

NSA representatives and Sandia management decided not to use a public
key authentication scheme for its CTBT seismic data authenticator because
of all of the problems with implementing public key algorithms.

But NSA surely has spent MUCH MONEY on public key chip implementations.

NSA is promoting its Clipper crypto chips as described at 
http://cpsr.org/dox/clipper.html.

And we get some information about technical specifications of NSA's Clipper
chip at http://www.us.net/softwar/http://www.us.net/softwar/clip.html

  Clipper Chip Information

  MYK-78 CLIPPER CHIP ENCRYPTION/DECRYPTION  ON A CHIP 

     1 micron double level metal CMOS technology 
     0.35 watts power 
     28 pin plastic leaded chip carrier (PLCC) package 
     Transistor to transistor logic (TTL) interface 
     Chip ID, family key and device unique key are installed at 
     programming. 
     Chip ID, family key and device unique key are installed at programming           
     facility and are completely transparent to the user.

Therefore, Under the provision of the Freedom of Information Act, 
5 USC 552, I am requesting access to: 

1  Copies of all invoices from

	A   AT&T
	B   Motorola
	C   IBM
	D  Sandia National Laboratories

to NSA for payments for developing ANY public key-related chips between 
January 1, 1980 and February 27, 1998.

2  Copies of all invoices to NSA from ANY corporation involved in 
development
of ANY Clipper chip-related hardware between January 1, 1980 and 
February 27, 1998.

The public has a right to know how much NSA spent on TRYING monoploize the 
crypto business.

If there are any fees for searching for, or copying, the records I have 
requested, please inform me before you fill the request.

As you know, the Act permits you to reduce or waive the fees when the 
release of the information is considered as "primarily benefiting the 
public."
  
I believe that this requests fits that category and I therefore ask that 
you waive any fees.

If all or any part of this request is denied, please cite the specific 
exemption(s) which you think justifies your refusal to release the information and inform me of your agency's administrative appeal procedures available to me under the law.

I would appreciate your handling this request as quickly as possible, and I 
look forward to hearing from you within 20 working days, as the law stipulates.

With respect to our current FOIA lawsuit, I feel that we should settle this
unfortunate matter.

I see from your biography at  http://www.nsa.gov:8080/ and
http://www.nsa.gov:8080/dirnsa/dirnsa.html that you are

         1979   Distinguished Graduate
         Master of Arts degree in National Security Affairs 
         Naval Postgraduate School 
         Monterey, California

One of my former M.S. and Ph.D students in Computer Science,
Ted Lewis, is currently the chairman of Computer Science at
Naval Postgraduate School [http://www.friction-free-economy.com/].

Small world.

But I think that this emphasizes that WE SHOULD all be on the same side.
Not engaged in a conflict in US federal court.  Or on Internet.

NSA attempts to withhold requested information are possibly unwise.  

In our wired world the aggrieved know what happened to them.
[http://www.aci.net/kalliste/speccoll.htm]. http://www.wpiran.org/,
http://www.netlink.co.uk/users/impact/namir/namirm.html

And moderates in Iran, [http://persia.org/khatami/biography.html], appear 
want settlement too.

My family and I have been damaged by these crypto wars.

I ask you that consider fair settlement of damages caused by the National
Security Agency.

I cannot find your e-mail address on Internet.

Therefore I will forward the e-mail copy of this FOIA/settlement letter to 
Ray Kammer of NIST [http://www.nist.gov/], who along with the FBI 
[http://www.fbi.gov/, http://www.fbi.gov/fo/nyfo/nytwa.htmand], and NSA 
are trying to control the crypto business so that Kammer can possibly
forward an e-mail copy of the FOIA/Settlement letter to you.

Sincerely,

bill

William Payne
13015 Calle de Sandias
Albuquerque, NM 87111
505-292-7037 [I am not reading e-mail]





From stephen at iu.net  Sat Feb 28 21:09:33 1998
From: stephen at iu.net (Stephen Cobb, CISSP)
Date: Sat, 28 Feb 1998 21:09:33 -0800 (PST)
Subject: Cylink + NSA
In-Reply-To: <413AC08141DBD011A58000A0C924A6D50D7DAC@MVS2>
Message-ID: <3.0.5.32.19980228235649.007b3550@iu.net>


At 02:24 PM 2/27/98 -0800, you wrote:
>Did anyone notice that Cylink just got a new VP of product development?
>Did anyone notice that this person just retired from the NSA?
>Care to guess the name and former rank?

Ern

For more about NSA + Cylink, see The Puzzle Palace : A Report on America's Most Secret Agency, James Bamford, Viking Press, 1983, ISBN: 0140067485. Also, The Stephen Cobb Complete Guide to PC&LAN Security, TAB-Windcrest-McGraw-Hill, 1991, ISBN: 0830632808, page 268.

Also, this was announced in a press release in January:
 
Former Deputy Director of the National Security Agency Brings Security Leadership to Strengthen Customer Relationships for Cylink and Drive Product Management

Cylink Corp. (NASDAQ:CYLK), a leading worldwide supplier of network security solutions, today names William P. Crowell Vice President, Product Management and Strategy. Crowell, recently retired from the United States National Security Agency (NSA) as Deputy Director, will partner with the senior management of Cylink customers worldwide to assist them in developing and implementing strategic business plans and solutions to meet their network security needs. He also will be responsible for Product Management of all Cylink offerings. Crowell brings 17 years of executive management experience in both private industry and government to Cylink. In his previous position at the NSA, he served as Deputy Director for 3.5 years and was chief operations officer of the Agency, guiding and directing the development of strategies and polices, and serving as the principal advisor to the Director. He has extensive technical and practical knowledge of the technologies needed to achieve integrated network security, including encryption technology, digital signatures, public key management, and infrastructure issues. He also has experience managing research and development projects, and programs associated with information systems deployment. 

Stephen
<<<<<<<<<<<<<<>>>>>>>>>>>>>>>>
Certified Information Systems Security Professional
tel: 1.407.383.0977 fx: 0336 email: scobb at miora.com
For information security info, http://www.miora.com





From billp at nmol.com  Sat Feb 28 21:11:32 1998
From: billp at nmol.com (bill payne)
Date: Sat, 28 Feb 1998 21:11:32 -0800 (PST)
Subject: chemical, biological, or radiation (CBR) weapons
Message-ID: <34F8ED42.3986@nmol.com>

Saturday 2/28/98 9:44 PM

I transcribe some of what I got in the mail today.

Volume 9, Number 4, 1997

  MILITARY PSYCHOLOGY

  The Official Journal of the 
  Division of Military Psychology
  American Psychological Association

  Special Issue:  Effects of Chemical Protective
                  Clothing of Military Performance
  Guest Editors:  Gerald P. Krueger and
                  Louis E. Banderet

         Psychological Aspects of Chemical Defense and Warfare

	James W. Stokes
	U.S. Army Medical Department Center and School
	Fort Sam Houston, Texas

	Louis E. Banderet
	U.S. Army Research Institute of Environmental Medicine
	Natick, Massachusetts

  Concerns about chemical, biological, or radiation (CBR) weapons  and 
  their potential for warfare can be very stressful.  Such concerns
subject
  people to unfamiliar threats in highly ambiguous situations, in which 
  people feel they may be wronged or they are helpless.  Maladaptive
  psychological overreactions or underreactions may result.  Such
reactions
  to chemical warfare are illustrated with the experience from World War
I,
  the 1991 Persian Gulf War, and the 1995 terrorist attack in the Tokyo
  subway.  General principles of psychology suggest strategies and
tactics for
  training and materiel development that should enhance military
performance
  and reduce maladaptive stress in CBR threat situations.  Some of these
practices
  may be relevant to nonmilitary law enforcement and relief agencies
that manage
  CBR threats.

page 395.

Now I transcribe some of the more relevant stuff.

  Effects of Chemical Protective Clothing on Military Performance:

  A Review of the Issues

  Gerald P. Krueger
  Star Mountain, Inc.
  Alexandria, Virginia

  Lous E. Banderet
  U.S. Army Research Institute of Environmental Medicine
  Natick, Massachusetts
	
  This review in this special issue of Military Psychology on the
effects of chemical
  protective clothing (CPC) on military performance provide a historical
perspective
  on continued anxieties over likely use of battlefield
chemical-biological weapons and
  summarizes significant concerns of military personnel weaning CPC in
training and
  combat.  This review describes pschophysiological stresses such
protective ensembles
  have on personnel and how these affect military performance, and it
summarizes major
  military psychological research program on the effect of wearing CPC. 
This article
  reviews what is known about wearing CPC, describes future CPC
developments, and 
  identifies domains for improved military training with CPC.

              MEDICAL AND PSYCHOLOGICAL EFFECT 
              OF C-B WEAPONS

  There are many medical, physiological and psychological reactions from
exposure to
  chemical-biological (C-B) weapons.  Many bio-warfare agents and most
chemical weapons
  are designed to interfere with function of the nervous system and to
disrupt normal control
  of vital organ systems that sustain life.  For example,  the more
common chemical war
  nerve agents involve organophosphate compounds,  similar to
insecticides, that inhibit 
  cholinesterase enzymes throughout the body.  Because cholinesterase
hydrolyzes 
  acetylcholine where ever liberated, this inhibition  results in
excessive concentrations of 
  acetylcholine at various sites - from the ending of the
parasympathetic nerves to smooth
  muscles of the iris, ciliary body, bronchi, gastrointestinal trace,
bladder, and blood  vessels;
  to secretary gland of the respiratory tract� and to endings of the
sympathetic nerves to sweat
  glands (Newhouse, 1987; Simmons et at 1989).  Exposure to large
amounts of nerve agent
  may lead to loss of muscle control, twitching, paralysis,
unconsciousness, convulsions,
  coma, and even death.  The most common cause of death after acute
exposure is respiratory
  arrest.  Death may occur within minutes or take several hours.
     In terms of psychological functioning, moderate but nonlethal
exposure to nerve agent 
  produces severe impairment in cognition, vigilance, memory and
language.  Acute
  intoxication produces confusion, drowsiness, and difficulty in
concentration (Newhouse,
  1987).  These impairment make it difficult to continue to perform may
soldier tasks.
  Effects on cognition may persist after only a slight exposure. 
Performance improvement
  appears to correlate with the body�s regeneration of
acetycholinesterase, usually requiring
  several months.
    Neurophysychological testing (Newhouse, 1987) reveals that chronic
exposure to 
  organophosphates significantly impairs higher mental function
requiring use of the frontal
  lobes, particularly the left lobe.  Organophosphate poisoning
selectively  impairs memory of 
  recently learned information, and this impairment is likely related to
cholinergic involvement
  in the memory processes.  The effects include defects in long-term
memory, visual searching,
  and response alteration - effects similar to those caused by a frontal
lobotomy.  In chronically
  exposed individuals, speed of task performance and overall cognitive
efficiency also declines.
  Persistent visual impairments are reported in workers poisoned with
anticholinesterase 
  insecticides, and acute poisoning impair oculomotor function. 
Poisoning with nerve agents may
  also cause psychiatric disturbances such as depression.
    Use of C-B weapons results not only in large number of physical
casualties on the battlefield
  by in may psychological casualties as well.  Concern over the mere
threat that C-B weapons 
  might be used raises battlefield anxiety of combatants and can produce
a level of fear 
  disproportionate to that evoked by countless alternative conventional
battlefield means of
  killing or maiming, such a with guns, artillery, and bombs.  Such
anxieties can create large
  numbers of psychological stress casualties contribution to unit
ineffectiveness on the battlefield
  and combat losses.  Such adverse emotions may also cause posttraumatic
stress disorders after
  combat ceases.
		
		DEVELOPMENT OF COUNTERMEASURES
		FOR THE COMBAT THEATER

   Modern military forces recognize the C-B weapons can be the
attention-getting equivalent
  of a poor country�s nuclear weapons.  Such weapons can be
counter-acted, however, and
  concerned nations prepare their forces to preserve their health and
safety against C-B
  warfare.   ...

I will send a complete copy to John Young.

So I skip to the next section.

			THE THREAT OF C-B WARFARE

  Although biological warfare was used centuries ago by the Romans and
was used in the
  14th century by the Tartars, who catapulted plague-infected bodies
into cities under
  siege (Hewish, 1997),  military forces have made scant use of
biological warfare in modern
  times.  The more recent innovation of chemical warfare dates to 1914
when the French used
  tear gas against unprotected German forces, who in turn introduced
chlorine and phosgene
  in 1915 and mustard gas in 1917 against the British, who sustained
14,000 casualties in
  3 months (Hewish, 1997).  May World Ware I soldiers were grotesquely
injured or died in gas
  war trenches in France and Russia;  Russia�s gas casualties exceed a
half million, including
  50,000 fatalities (Westerhoff, 1980).
    In 1925, many countries signed a Geneva Protocol prohibiting first
use of chemical and
  bacteriological weapons.  However, during the 1930s, several
countries, notably Germany,
  encouraged chemists to develop chemical weapons as a by-product of
insecticide research
  production.  By World War II, Germany and powers stockpiled huge
caches of chemical, but
  probably due to fear of in-kind retaliation, chemical weapons were not
used in World War II.
  After the war, Germany�s organophoshporous arsenal fell into Russian
hands, and for the next
  50 years, military forces relegated C-B warfare efforts to relatively
quiet development programs
  for future battlefields.
    Since World War II, C-B weapons have been employed several times on
a relatively small
  scale.  In the 1970s, the Vietnamese used chemical and �yellow rain�
biological agents in 
  Cambodian jungles, the Soviets used chemical in Afghanistan (U.S.
Department of State,
  1980), Iraq used sulfur mustard  and other chemical in the Iran-Iraq
conflict (1979-1980),
  and Iraq used chemical in 1980 - this time against its own people, the
northern Kurds 
  (Studeville, 1997).
    There have been periodic threats to use chemical weapons on a grand
scale.  In the 
  1970s, the Warsaw Pact possessed huge stockpiles of chemical weapons (
mostly soman,
  cyanide, and mustard gas), and Soviet chemical warfare teams openly
conducted extensive
  training in gas warfare tactics.  Such readiness for large scale C-B
warfare was underscored 
  in the Persian Gulf War of 1991, as Iraq threatened to use chemical
(sarin) and biologicals
  (anthrax spores) against coalition forces and possibly against
neighboring cities in Saudi 
  Arabia and Israel (Begley, Barry,  & Hager, 1991).  By January 1991,
Saudi Arabia had
  predug 50,000 graves planned for burying civilian (noncombat)
casualties expected to 
  succumb to Iraqi chemical poisoning from anticipated rocket attacks on
Saudi cities or
  aerosols drifting from the battlefields (Kaplan, 1991).
    Although Iraq did not unleash such chemical, and the battles were
ultimately short, 
  many U.S. military personnel may been exposed to chemical during the
March 1991
  destruction of Iraqi weapon stockpiled (mostly sarin) near Khamisiyah,
Iraq (Stuteville,
  1997).  The U. S. government continue to investigate whether exposures
to chemical 
  agents may have contributed to the so-called Gulf War illnesses
experienced by many 
  U.S. military veterans of that encounter.  Exposure of soldiers to
multiple chemical and
   and environmental stressors may be linked to psychophysiological
illnesses that manifest
  in symptomatology such as disabling fatigue, insomnia, malaise, joint
and muscle pains, 
  skin sores, hair loss, and gastrointestinal and respiratory
difficulties (Brown &
  Priest, 1996).  Others asset that U.S. military personnel were exposed
to Iraq chemical 
  warfare from Scud missiles, artillery and aircraft (Stuteville, 1997)

			PUBLIC CONCERN

  Open, frank, public news of existent military chemical stockpiles,
proliferation of chemical
  or biological weaponry, and periodic �saber-ratting� threats to use
such weapons amplify world
  public concerns over the enormity of what someday could be a horrific
chemical or biological
  calamity.  Unprotected civilian populations fear they may be
deliberately attacked by 
  chemical and biological weapons or inadvertently by aerosol warfare
agents drifting into
  populated areas of a battlefield.  Disastrous incident like the one in
1984 at a chemical 
  factory in Bhopal, India, which killed over 2,000 people and sickened
countless others, 
  sensitized citizenry to the lethal potential of such chemical
compounds.  In 1995, terrorist
  attacks on the Tokyo subway, and news media discussion of possible use
of nerve agents in
  terrorist disruption of public gathering like the 1992 and 1996
Olympics, heightened Public
  fears over such chemical incidents have become almost visceral.  News
of recent advances
  in genetic technologies (Dando, 1997)  suggest use of future
biological weapons with
  unprecedented insidiousness and specificity is possible.  Moreover,
the mass media and media
  expert sources remind the public that the United States  may not be
adequately prepared or
  trained to defend itself against chemical or biological warfare (Beal,
1997).  ...

Send more money, of course.

Banderet�s Ph. D. thesis article is

              Visual Marking Following Transient Adaptation

	Journal of the Optical Society of America, Vol 51, 7 955-958
	July 1971

Banderet has worked for US Army Institute of Environmental Medicine
since 1971.

Banderet is another of my former Ph. D. students. In human factors, not
computer science.

US soldiers, of course, need some tranquilizers to calm them down is the
face of such
threats.  To improve battlefield performance.

Keep in mind guys that the US goverment is not above killing a bunch of
its
own citizens for its own BUSINESS goals.

Keep up-wind
bill

Title: Untitled Document









Viewing this page requires a browser capable of displaying frames.







From jenny.n18 at usa.net  Sat Feb 28 22:20:02 1998
From: jenny.n18 at usa.net (jenny.n18 at usa.net)
Date: Sat, 28 Feb 1998 22:20:02 -0800 (PST)
Subject: Attraction
Message-ID: <0000000000.AAA000@usa.net>


Do you want to succeed at dating, or you just need a little spark to your
relationship or marriage?

Well here is the Answer for you!

Sensations�, the new Compact Disc that  uses proven subliminal techniques to
increase your chances of SEXUAL success with the opposite sex.. Simply play it
and watch it work!!!!

do you want to be a winner?   

If yes then go to http://207.134.166.10/users/subliminal/subliminal.htm







From ravage at ssz.com  Sat Feb 28 21:52:33 1998
From: ravage at ssz.com (Jim Choate)
Date: Sun, 1 Mar 1998 13:52:33 +0800
Subject: Return of Bass-O-Matic (was PGP)
Message-ID: <199803010600.AAA01504@einstein.ssz.com>



Forwarded message:

> Date: Sun, 01 Mar 1998 15:25:00 +1000
> From: Reeza! 
> Subject: PGP

> I'm looking for some real information on PGP.
> I have a friend who swears up and down that every version of PGP since the
> first one has been compromised by key escrow and is not really safe.
> 
> Does anyone know where the source for the *original* version of PGP can be
> found? 

Holy bezesus...

It just so happens that I have a copy of pgp10.arj and pgp10src.arj.

Send me a note and I'll make arrangements to get them to you provided you're
in the US and a US citizen (I hate these fuckin' laws - I wanna be paid for
this shit!).


    ____________________________________________________________________

                When a man assumes a public trust, he should
                consider himself public property.

                                         Thomas Jefferson
                                     _____                         
       The Armadillo Group       ,::////;::-.          James Choate
       Austin, Tx               /:'///// ``::>/|/      ravage at ssz.com
       www.ssz.com            .',  ||||    `/( e\      512-451-7087
                           -====~~mm-'`-```-mm --'-
    --------------------------------------------------------------------